Filter interviews by
Memory leak is a situation where a program fails to release memory it has allocated, leading to a gradual loss of available memory.
Memory leaks occur when a program allocates memory but does not free it after use.
This can lead to a gradual increase in memory usage over time, potentially causing the program to slow down or crash.
Common causes of memory leaks include improper memory management in languages like C or C++.
...
To connect a database to Java, you need to use JDBC (Java Database Connectivity) API.
Import JDBC library in your Java project
Load the database driver using Class.forName() method
Establish a connection to the database using DriverManager.getConnection() method
Create a statement object to execute SQL queries
Execute SQL queries and process the results
I applied via Campus Placement and was interviewed in Sep 2023. There were 3 interview rounds.
Time and distance, ages, interest, speed and circular arrangment
Hirepro 45 mins 2questions
What people are saying about Oracle Financial Services Software
I was interviewed in Nov 2016.
Oracle Financial Services Software interview questions for designations
I applied via Campus Placement and was interviewed in Oct 2024. There were 3 interview rounds.
In first round 4 coding question like 1 dsa 2 database and one is api and question is very simple . coding round was conducted in hackerrank
Again same but dsa question and oops concept in deep level
1 hour , dsa, hackerearth, medim to hard
2 hours of duration and medium level leetcode questions
OS stands for Operating System. It is a software that manages computer hardware and provides services for computer programs.
OS is the software that acts as an intermediary between computer hardware and user applications.
It manages computer resources such as memory, processors, devices, and file systems.
Examples of popular operating systems include Windows, macOS, Linux, and Android.
Deadlock can be avoided by implementing proper resource allocation strategies and using techniques like deadlock prevention, avoidance, detection, and recovery.
Implement proper resource allocation strategies such as resource ordering, wait-die, wound-wait, etc.
Use techniques like deadlock prevention by ensuring that the system never enters a deadlock state, avoidance by ensuring that the system does not enter an unsafe...
posted on 10 Jun 2024
diff var let const
var is function-scoped, let and const are block-scoped
var can be redeclared and reassigned, let can be reassigned but not redeclared, const cannot be reassigned or redeclared
const must be initialized during declaration, let and var can be declared without initialization
I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.
posted on 31 Jul 2024
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
To retrieve a value, the key is hashed a...
Java uses automatic memory management through garbage collection to allocate and deallocate memory.
Java uses garbage collection to automatically manage memory allocation and deallocation.
Garbage collection runs in the background to reclaim memory from objects that are no longer in use.
Java provides the 'finalize()' method to allow objects to perform cleanup before being garbage collected.
based on 5 interviews
1 Interview rounds
based on 34 reviews
Rating in categories
Senior Consultant
1.3k
salaries
| ₹5.8 L/yr - ₹21 L/yr |
Staff Consultant
1.1k
salaries
| ₹4.5 L/yr - ₹13.6 L/yr |
Associate Consultant
1.1k
salaries
| ₹3.2 L/yr - ₹10 L/yr |
Principal Consultant
717
salaries
| ₹10 L/yr - ₹29 L/yr |
Application Developer
492
salaries
| ₹6 L/yr - ₹23 L/yr |
Oracle
TCS
Infosys
Wipro