i
NICE
Filter interviews by
The pillars of OOP are encapsulation, inheritance, and polymorphism.
Encapsulation: bundling of data and methods into a single unit
Inheritance: ability to create new classes from existing ones
Polymorphism: ability to use a single interface for multiple types
Web API security mechanisms protect against unauthorized access and ensure data integrity.
Authentication: Verify the identity of the user or client accessing the API.
Authorization: Determine what actions the authenticated user or client is allowed to perform.
Encryption: Securely transmit data over the network using encryption algorithms.
Input validation: Validate and sanitize user input to prevent common security vulne...
Deadlock in SQL occurs when two or more transactions permanently wait for each other to release resources.
Deadlock happens when two or more transactions acquire locks on resources and wait for each other indefinitely.
It can occur due to poor transaction scheduling, lock contention, or incorrect use of transactions.
To prevent deadlock, use proper transaction isolation levels, minimize lock contention, and ensure transac...
I was interviewed before Mar 2024.
I applied via Company Website and was interviewed in Sep 2024. There were 2 interview rounds.
Testing Pyramid is a testing strategy that suggests the right balance of different types of automated tests.
The Testing Pyramid consists of three layers: Unit Tests, Service Tests, and UI Tests.
Unit Tests are at the bottom of the pyramid and focus on testing individual components or functions in isolation.
Service Tests are in the middle layer and focus on testing the interactions between different components or service...
Developers perform unit testing to ensure individual units of code are working correctly.
Developers are responsible for writing unit tests for their own code.
Unit testing is typically done using testing frameworks like JUnit, NUnit, or pytest.
Unit tests focus on testing small, isolated parts of the codebase, such as functions or methods.
Unit testing helps identify bugs early in the development process.
Automated unit te...
Automation code for handling multiple windows
Use getWindowHandles() method to get handles of all open windows
Switch between windows using switchTo().window() method
Perform actions on each window as needed
Convert string to array and extract vowels into a new array
Iterate through each character in the string
Check if the character is a vowel (a, e, i, o, u)
Add the vowel to a new array of strings
What people are saying about NICE
I applied via Campus Placement and was interviewed in Nov 2024. There were 2 interview rounds.
It was nice, it was nice, it was nice
NICE interview questions for popular designations
Performance testing process involves planning, designing, executing, and analyzing tests to evaluate the speed, stability, and scalability of a system.
1. Planning: Define objectives, metrics, and scenarios for testing.
2. Designing: Create test scripts, data sets, and environment configurations.
3. Executing: Run tests under various load conditions to simulate real-world usage.
4. Analyzing: Monitor system performance, id...
Performance testing life cycle involves planning, preparation, execution, analysis, and reporting.
1. Planning phase involves defining objectives, scope, resources, and timelines.
2. Preparation phase includes creating test scenarios, scripts, and environment setup.
3. Execution phase involves running tests, monitoring performance metrics, and collecting data.
4. Analysis phase includes identifying bottlenecks, performance...
Get interview-ready with Top NICE Interview Questions
I was interviewed in Dec 2024.
Nice and nice and nice and nice and nice and nice and nice and nice and nice and
Aptitude test and attribute of the day of the day of the day of
There is aptitude+DBMS+OS+coding online test round
Mirror image of a binary tree involves swapping the left and right children of each node.
Start with the root node and recursively swap the left and right children of each node.
Repeat this process for all nodes in the binary tree.
The resulting tree will be the mirror image of the original binary tree.
I applied via Approached by Company and was interviewed in Apr 2024. There was 1 interview round.
Java program to reverse string and check if it is a palindrome.
Create a function to reverse the input string.
Compare the reversed string with the original string to check if it is a palindrome.
Use built-in functions like StringBuilder or StringBuffer for string manipulation.
Handle cases where input is null or empty.
Selenium questions covering list vs set, findelement vs findelements, Actions class, implicit wait, and explicit wait.
List vs Set: List allows duplicate elements and maintains insertion order, while Set does not allow duplicates.
findElement vs findElements: findElement returns the first matching element, findElements returns a list of all matching elements.
Actions class: Used for performing complex user interactions li...
API testing involves checking various response codes to ensure the API functions correctly.
Test for common response codes like 200 (OK), 400 (Bad Request), 401 (Unauthorized), 404 (Not Found), 500 (Internal Server Error)
Verify the response code matches the expected result based on the API request
Use tools like Postman or RestAssured to automate API testing and check response codes
Check for edge cases where the API may
User story is a description of a feature from an end-user perspective, and sprint is a time-boxed iteration in Agile development.
User story is a short, simple description of a feature told from the perspective of the person who desires the new capability.
Sprint is a time-boxed iteration in Agile development, usually lasting 1-4 weeks, where a team works on a set of user stories.
User stories are written in a specific fo...
I applied via Campus Placement and was interviewed in Aug 2024. There were 2 interview rounds.
1st round had aptitude , OS , and software development cycle qns , and then 2 coding questions easy and medium level
I applied via LinkedIn and was interviewed in Nov 2024. There was 1 interview round.
Authentication verifies the identity of a user, while authorization determines what actions they are allowed to perform.
Authentication confirms the user's identity through credentials like passwords or biometrics.
Authorization controls the access rights of authenticated users to specific resources or actions.
Example: Logging into a system with a username and password is authentication, while being able to view/edit cer
I applied via Referral and was interviewed in Aug 2024. There was 1 interview round.
Feature selection techniques are methods used to select the most relevant features for a predictive model.
Filter methods: Select features based on statistical measures like correlation, chi-squared, or mutual information.
Wrapper methods: Use a specific model to evaluate the importance of features by training and testing subsets of features.
Embedded methods: Features are selected as part of the model training process, l...
Covariance measures the relationship between two variables, while correlation measures the strength and direction of a relationship.
Covariance can be positive, negative, or zero, indicating the direction of the relationship.
Correlation is always between -1 and 1, with 1 indicating a perfect positive relationship, -1 indicating a perfect negative relationship, and 0 indicating no relationship.
Covariance is affected by t...
The duration of NICE interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 82 interviews
Interview experience
Software Engineer
250
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
173
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
162
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineering Specialist
128
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer and Technical Lead
124
salaries
| ₹0 L/yr - ₹0 L/yr |
Infosys
TCS
Wipro
HCLTech