Filter interviews by
Top trending discussions
String is immutable in Java to ensure security, thread safety, and optimization.
Immutable strings are thread-safe as they cannot be modified concurrently by multiple threads.
Immutable strings prevent security vulnerabilities like SQL injection attacks.
Immutable strings allow for string interning, reducing memory usage and improving performance.
ArrayList is implemented as a resizable array, LinkedList is implemented as a doubly linked list.
ArrayList provides fast random access, LinkedList provides fast insertion and deletion.
ArrayList uses more memory as it needs to allocate a fixed size array, LinkedList uses more memory for storing references to next and previous elements.
Example: ArrayList is suitable for scenarios where random access is required, LinkedLi...
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
To retrieve a value, the key is hashed a...
posted on 14 Jun 2024
posted on 31 Aug 2024
I applied via Campus Placement and was interviewed in Jul 2024. There were 2 interview rounds.
Asked quant and reasoning and English
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down data into smaller, more manageable tables
It helps in reducing data redundancy by storing data in a structured manner
Normalization ensures data integrity by minimizing data anomalies
There are different normal forms such as 1NF, 2NF, 3NF, BCNF, etc.
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Types of normalization include 1NF, 2NF, 3NF, BCNF, and 4NF.
1NF (First Normal Form) ensures that each column contains atomic values.
2NF (Second Normal Form) eliminates partial dependencies by ensuring all non-key attributes are fully functionally dependent on the primary key.
3NF (Third Normal Form) eliminates t...
I applied via Approached by Company and was interviewed in Dec 2022. There were 5 interview rounds.
Find the 2nd largest element in an array of strings.
Sort the array in descending order
Access the element at index 1 to get the 2nd largest element
To get the top view of a binary tree, we need to find the nodes that are visible when looking at the tree from the top.
Start from the root node and assign it a horizontal distance of 0.
Traverse the tree using a queue and keep track of the horizontal distance of each node.
For each horizontal distance, only keep the node with the smallest level in the result.
Repeat the process for left and right child nodes, updating the
NotificationCenter is a system that enables communication between different parts of an application.
NotificationCenter allows components of an application to communicate without having direct references to each other.
It uses the observer pattern where objects register themselves as observers for specific notifications.
Notifications can be posted to the NotificationCenter with optional data.
Observers can then receive an...
Design a Twitter feed using SOLID principles
Separate classes for each responsibility (Single Responsibility Principle)
Use interfaces to define behavior and allow for easy swapping of implementations (Open/Closed Principle)
Dependency Injection to decouple components and make testing easier (Dependency Inversion Principle)
Liskov Substitution Principle to ensure derived classes can be substituted for their base classes wi...
Find the first occurrence of a given number in a sorted array.
Use binary search to efficiently find the first occurrence of the number.
Keep track of the index of the first occurrence as you search through the array.
Return the index of the first occurrence once found.
posted on 29 Dec 2022
I applied via Naukri.com and was interviewed in Nov 2022. There were 2 interview rounds.
I applied via Referral and was interviewed before Mar 2023. There were 2 interview rounds.
To use JAVA code in Oracle BPEL, you can create a Java Embedding activity within a BPEL process.
Create a Java Embedding activity within the BPEL process
Write the Java code within the Java Embedding activity
Compile the Java code and deploy the BPEL process
Integration of BPM human task with SOA involves connecting business processes with service-oriented architecture.
BPM human task defines the steps and actions required for a specific task in a business process.
SOA is an architectural style that enables the creation of loosely coupled, reusable services.
Integration involves connecting the human tasks defined in BPM with the services in SOA to automate and streamline busi...
posted on 14 Jun 2024
based on 1 interview
Interview experience
based on 17 reviews
Rating in categories
Senior Consultant
1.3k
salaries
| ₹7.5 L/yr - ₹21 L/yr |
Staff Consultant
1.2k
salaries
| ₹4.5 L/yr - ₹13.6 L/yr |
Associate Consultant
1.1k
salaries
| ₹3.2 L/yr - ₹10 L/yr |
Principal Consultant
720
salaries
| ₹10 L/yr - ₹27.6 L/yr |
Application Developer
507
salaries
| ₹6 L/yr - ₹23 L/yr |
Oracle
TCS
Infosys
Wipro