i
Persistent Systems
Filter interviews by
Prioritizing tasks based on importance and deadlines is key. Use tools like Eisenhower Matrix or MoSCoW method.
Identify and categorize tasks based on urgency and importance
Use tools like Eisenhower Matrix to prioritize tasks into four quadrants: urgent and important, important but not urgent, urgent but not important, neither urgent nor important
Consider using the MoSCoW method to categorize tasks as Must have, Should ...
The technique used for project is Agile methodology.
Agile methodology involves iterative development, where requirements and solutions evolve through collaboration between self-organizing cross-functional teams.
It promotes adaptive planning, evolutionary development, early delivery, and continuous improvement.
Examples of Agile methodologies include Scrum, Kanban, and Extreme Programming (XP).
I applied via Campus Placement
Moderate I will say.
I applied via Campus Placement and was interviewed in Mar 2024. There were 2 interview rounds.
All type of quant reasoning questions
Networking is the practice of connecting computers and other devices to share resources. DBMS queries are commands used to retrieve data from a database.
Networking involves connecting computers and devices to share information and resources.
DBMS queries are commands used to retrieve specific data from a database.
Networking can be wired or wireless, such as Ethernet or Wi-Fi.
Examples of DBMS queries include SELECT, INSE
Persistent Systems interview questions for popular designations
I applied via Approached by Company and was interviewed in Mar 2024. There was 1 interview round.
Get interview-ready with Top Persistent Systems Interview Questions
I applied via Recruitment Consulltant and was interviewed in Apr 2024. There was 1 interview round.
Dependency Injection is a design pattern where components are given their dependencies rather than creating them internally.
Dependency Injection helps in making components more modular, testable, and reusable.
It can be implemented using constructor injection, setter injection, or interface injection.
Multiple inheritance can be implemented in languages like C++ using virtual inheritance to avoid the diamond problem.
SOLID principles are a set of five design principles that help make software designs more understandable, flexible, and maintainable.
Single Responsibility Principle (SRP) - A class should have only one reason to change.
Open/Closed Principle (OCP) - Software entities should be open for extension but closed for modification.
Liskov Substitution Principle (LSP) - Objects of a superclass should be replaceable with objects o...
I applied via Referral and was interviewed in Feb 2024. There were 3 interview rounds.
CI/CD pipeline is a set of automated processes for building, testing, and deploying software. String manipulation programs involve manipulating text data.
CI/CD pipeline automates the process of integrating code changes, testing them, and deploying them to production.
String manipulation programs involve tasks like searching, replacing, and modifying text data.
Examples of string manipulation programs include finding the ...
I was interviewed in Jul 2024.
SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate a database.
SQL injection occurs when a user input is not properly sanitized and allows an attacker to execute malicious SQL commands.
It can lead to unauthorized access to sensitive data, data loss, and even complete server takeover.
Example: Entering ' OR '1'='1' into a login form to bypass authentication and gai
I applied via Campus Placement and was interviewed in Jan 2024. There were 3 interview rounds.
Aptitude test along with a code. This was online.
I applied via Campus Placement and was interviewed in Nov 2023. There were 3 interview rounds.
Basic java dsa question aptitude question
2 String question were asked of medium level.
Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.
Encapsulation helps in hiding the internal state of an object and restricting access to it.
It allows for better control over the data by preventing direct access from outside the class.
Encapsulation also helps in achieving data abstraction, where the internal details are hidden and only the necessary information is exp...
1NF and 2NF are normalization forms in database design to reduce redundancy and improve data integrity.
1NF (First Normal Form) ensures that each column in a table contains atomic values and there are no repeating groups.
2NF (Second Normal Form) builds on 1NF by ensuring that all non-key attributes are fully functional dependent on the primary key.
For example, if we have a table 'Orders' with columns 'OrderID', 'Product...
A program demonstrating virtual function in C++
Create a base class with a virtual function
Create derived classes that override the virtual function
Instantiate objects of derived classes and call the virtual function
To convert 1NF to 2NF, identify partial dependencies and move them to separate tables.
Identify the primary key in the 1NF table
Identify any non-key attributes that are dependent on only part of the primary key
Move these attributes to a new table with a composite key including the partial key and the original primary key
What people are saying about Persistent Systems
The duration of Persistent Systems interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 543 interviews
Interview experience
based on 3.9k reviews
Rating in categories
Software Engineer
4.4k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
3.9k
salaries
| ₹0 L/yr - ₹0 L/yr |
Lead Engineer
3.2k
salaries
| ₹0 L/yr - ₹0 L/yr |
Lead Software Engineer
3k
salaries
| ₹0 L/yr - ₹0 L/yr |
Project Lead
1.9k
salaries
| ₹0 L/yr - ₹0 L/yr |
Cognizant
TCS
IBM
Wipro