i
Plus IT Park
Filter interviews by
I applied via Referral and was interviewed in Feb 2024. There were 2 interview rounds.
Provided 3 Coding Questions
I applied via Referral and was interviewed in Jun 2023. There were 2 interview rounds.
CRUD functioning working
I applied via Referral and was interviewed before Nov 2022. There were 5 interview rounds.
The aptitude was a 100 Question Aptitude Round Which Included Language , Aptitude ,Logic etc
The Coding Rounds Included 5 Question on various Levels, The Coding Rounds Changes based on Department of Hiring, Based on Web it will be more focused on Back end and Front end where For Blockchain It is Based on Coding
Yes
Led a team of developers in a previous project
Managed and coordinated tasks to ensure timely completion
Provided guidance and support to team members
Implemented agile methodologies to improve efficiency
Collaborated with stakeholders to define project goals and requirements
Top trending discussions
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
There are three main types of IoT devices: consumer, commercial, and industrial.
Consumer IoT devices: Smart home devices like thermostats, lights, and security cameras.
Commercial IoT devices: Smart meters, asset tracking systems, and connected vending machines.
Industrial IoT devices: Sensors and actuators used in manufacturing, agriculture, and healthcare.
I applied via LinkedIn and was interviewed in Mar 2024. There were 3 interview rounds.
Assignment was to create an API for an expenses sharing application where users can input the total amount and the people to be shared the amount with and each individual amount in terms of either actual amount, percentage or split equally
Processes are independent instances of a program, while threads are smaller units within a process sharing resources.
Processes have their own memory space, while threads share the same memory space within a process.
Processes are heavyweight, requiring more resources, while threads are lightweight.
Processes communicate with each other through inter-process communication mechanisms, while threads can communicate directly...
Indexing in DBMS is a technique used to improve the performance of queries by allowing faster retrieval of data.
Indexes are data structures that store a small portion of the table data in an optimized format for quick retrieval.
They help in speeding up data retrieval operations like SELECT, UPDATE, DELETE queries.
Examples of indexes include primary keys, unique keys, and composite keys.
Asymmetric encryption algorithms use a pair of keys to encrypt and decrypt data, providing secure communication.
RSA (Rivest-Shamir-Adleman) is a popular asymmetric encryption algorithm.
Elliptic Curve Cryptography (ECC) is another commonly used asymmetric encryption algorithm.
Asymmetric encryption is slower than symmetric encryption but provides better security.
Public key is used for encryption and private key is used f
Different sorting methods are beneficial in different scenarios based on factors like time complexity, space complexity, and input size.
Quick Sort: Best for large datasets due to its average time complexity of O(n log n)
Bubble Sort: Simple and easy to implement, but inefficient for large datasets with its time complexity of O(n^2)
Merge Sort: Stable and efficient for large datasets with its time complexity of O(n log n)
...
ACID properties are a set of properties that guarantee reliability and consistency in database transactions.
Atomicity: Ensures that either all operations in a transaction are completed successfully or none at all.
Consistency: Ensures that the database remains in a consistent state before and after the transaction.
Isolation: Ensures that the execution of multiple transactions concurrently does not interfere with each ot...
Indexing typically uses data structures like B-trees or hash tables for efficient retrieval, with time complexity of O(log n) or O(1) respectively.
Common data structures for indexing include B-trees and hash tables
B-trees are typically used for indexing in databases due to their balanced nature and efficient search operations
Hash tables are used for indexing in scenarios where constant time lookup is desired, but may h
Time complexity of recursive fibonacci code is O(2^n)
The time complexity of a recursive fibonacci code is exponential, O(2^n)
This is because each call branches into two recursive calls, leading to exponential growth
For example, calculating fibonacci(5) would result in 15 function calls
Web Sockets is a communication protocol that provides full-duplex communication channels over a single TCP connection.
Web Sockets allow for real-time, bi-directional communication between a client and a server.
They are commonly used in chat applications, online gaming, and live data streaming.
Web Sockets use the ws:// or wss:// protocol scheme in URLs.
The protocol is initiated with a handshake between the client and se...
I applied via Recruitment Consulltant and was interviewed in Aug 2024. There were 2 interview rounds.
Weather dashboard app
Js coding test on array and loops
I applied via Approached by Company and was interviewed in Nov 2023. There were 5 interview rounds.
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
posted on 14 Feb 2024
I applied via Job Portal
based on 3 interviews
Interview experience
based on 79 reviews
Rating in categories
Flutter Developer
3
salaries
| ₹5 L/yr - ₹8.8 L/yr |
Busibud
Miko
Kratikal Tech Private Limited
SP Robotic Works