i
Odessa
Filter interviews by
I applied via Recruitment Consulltant and was interviewed before Apr 2023. There were 3 interview rounds.
Authentication process is the verification of a user's identity before granting access to a system.
User provides credentials (username, password, etc.)
Credentials are verified by the system
If credentials are valid, user is granted access
Common authentication methods include username/password, biometrics, tokens, etc.
Designing API involves defining endpoints, data formats, authentication, and documentation.
Identify the purpose and functionality of the API
Define the endpoints and methods (GET, POST, PUT, DELETE)
Choose data formats (JSON, XML) and parameters
Implement authentication and authorization mechanisms
Document the API including usage examples and error codes
Top trending discussions
Transactions in Spring Boot help manage database operations as a single unit of work.
Transactions ensure ACID properties (Atomicity, Consistency, Isolation, Durability) for database operations.
Use @Transactional annotation to mark a method as transactional.
Transactions can be managed programmatically using TransactionTemplate.
Rollback can be triggered manually in case of exceptions.
Spring Boot supports both declarative
I applied via LinkedIn and was interviewed in Feb 2024. There was 1 interview round.
I applied via Referral and was interviewed before Dec 2023. There were 2 interview rounds.
Load balancers distribute incoming network traffic across multiple servers to ensure no single server is overwhelmed.
Load balancers monitor the health of servers and distribute traffic based on predefined algorithms.
They can be hardware-based or software-based.
Common algorithms used by load balancers include round-robin, least connections, and IP hash.
Load balancers can improve reliability and scalability of a website ...
The Two Sum problem involves finding two numbers in an array that add up to a target value.
Iterate through the array and store the difference between the target and current element in a hashmap.
Check if the current element exists in the hashmap, if yes, return the indices of the current element and the stored difference.
Time complexity of O(n) can be achieved by using a hashmap to store elements and their indices.
I applied via Naukri.com and was interviewed in Feb 2021. There were 4 interview rounds.
Implemented the Observer design pattern.
Used to maintain consistency between related objects
Allows for one-to-many relationships between objects
Used in event-driven systems
Example: Used to update UI when data changes in backend
I have implemented a microservices architecture for scalability and flexibility.
Implemented microservices architecture using Docker and Kubernetes
Used API Gateway for routing and load balancing
Implemented service discovery using Consul
Implemented circuit breaker pattern using Hystrix
Implemented centralized logging using ELK stack
Implemented distributed tracing using Zipkin
Implemented event-driven architecture using Kaf...
I improved stored procedure performance by optimizing queries and indexes.
Identified and removed unnecessary joins and subqueries
Used appropriate indexing to speed up query execution
Reduced the number of round trips to the database by using batch processing
Rewrote complex queries to simpler ones
Used stored procedure parameters instead of variables to avoid recompilation
Used SET NOCOUNT ON to reduce network traffic
Used
posted on 24 Dec 2024
I applied via Approached by Company and was interviewed before Dec 2023. There were 2 interview rounds.
Interview experience
based on 14 reviews
Rating in categories
Business Analyst
274
salaries
| ₹8.2 L/yr - ₹15 L/yr |
Senior Software Engineer
220
salaries
| ₹5 L/yr - ₹18 L/yr |
Software Engineer
215
salaries
| ₹4 L/yr - ₹11 L/yr |
Senior Business Analyst
130
salaries
| ₹10 L/yr - ₹23.1 L/yr |
Associate Business Analyst
108
salaries
| ₹8 L/yr - ₹11 L/yr |
Nucleus Software Exports
Newgen Software Technologies
TCS
Infosys