Filter interviews by
There were several basic questions of aptitude
I applied via Campus Placement
50 minutes aptitude test
I applied via LinkedIn and was interviewed before Oct 2022. There were 3 interview rounds.
Aptitude, Logical, English
DDL commands are used to define and manage the structure of a database.
DDL stands for Data Definition Language.
DDL commands are used to create, modify, and delete database objects such as tables, indexes, and views.
Examples of DDL commands include CREATE, ALTER, and DROP.
DDL commands do not manipulate the data within the database, only the structure.
Truncate is a DDL statement that removes all rows from a table, while delete is a DML statement that removes specific rows.
Truncate is faster than delete as it doesn't generate any rollback information.
Truncate cannot be rolled back, while delete can be.
Truncate resets the identity of the table, delete does not.
Truncate does not fire triggers, delete does.
Truncate is non-logged operation, delete is logged.
Priority Technology Holdings interview questions for popular designations
Top trending discussions
I applied via Approached by Company and was interviewed before May 2017. There were 6 interview rounds.
posted on 18 Dec 2020
Service provides data and functionality while Component handles UI and user interaction.
Service is a singleton object that can be injected into multiple components
Component is a directive with a template and styles
Service provides data and functionality to components
Component handles UI and user interaction
Services can be used to share data between components
Components can communicate with services using dependency inj
State variables are best for managing component's internal state, while properties are best for passing data from parent to child components.
State variables are mutable and can be changed within the component
Properties are immutable and cannot be changed within the component
State variables are used to manage the component's internal state
Properties are used to pass data from parent to child components
State variables ar...
Authentication system in API service must be configured securely to prevent external hacking.
Use strong encryption algorithms to store passwords
Implement multi-factor authentication
Use HTTPS protocol to encrypt data in transit
Implement rate limiting to prevent brute force attacks
Regularly update and patch the authentication system
Use secure coding practices to prevent injection attacks
Clients of one domain can access API service through authentication and authorization managed by API service.
API service can use OAuth2.0 for authentication and authorization
Different domains can have different client IDs and secrets for OAuth2.0
API service can use JWT for token-based authentication
Cross-Origin Resource Sharing (CORS) can be used to allow access from different domains
posted on 9 Sep 2020
I applied via Naukri.com and was interviewed in Aug 2020. There were 3 interview rounds.
Python compiles source code to bytecode for faster execution, stored in .pyc files.
Python interpreter compiles source code to bytecode before execution
Bytecode is platform-independent and faster to execute than source code
Compiled bytecode is stored in .pyc files for future use and faster startup time
If source code is modified, .pyc files are automatically recompiled
Django life cycle involves request processing, URL routing, view function execution, template rendering, and response generation.
When a request is made, Django checks the URL patterns defined in urls.py file.
If a match is found, the corresponding view function is executed.
The view function processes the request and returns a response.
The response is rendered using a template, if applicable.
The final response is sent ba
Ownership of the project approach refers to taking responsibility for the project's success and making decisions accordingly.
The owner of the project approach should have a clear understanding of the project's goals and objectives.
They should be able to make informed decisions about the project's direction and prioritize tasks accordingly.
The owner should also be accountable for the project's success or failure and be ...
Difference between sort and sorted, dump vs dumps, load vs loads etc.
sort() is a method of list object while sorted() is a built-in function
dump() serializes an object to a file while dumps() serializes to a string
load() deserializes an object from a file while loads() deserializes from a string
Design patterns are reusable solutions to common problems in software design.
Design patterns provide a structured approach to solving design problems.
Python has several design patterns such as Singleton, Factory, Observer, etc.
Each design pattern has its own purpose and usage.
Design patterns promote code reusability, maintainability, and scalability.
Understanding design patterns helps in writing cleaner and more effici
Data structures in Python: dict, tuple, list, set, string
dict: unordered collection of key-value pairs
tuple: ordered, immutable collection of elements
list: ordered, mutable collection of elements
set: unordered collection of unique elements
string: ordered collection of characters
I have used multiple python modules for various purposes.
I have used NumPy for numerical computations.
I have used Pandas for data analysis and manipulation.
I have used Matplotlib for data visualization.
I have used Flask for web development.
I have used Requests for making HTTP requests.
I have used BeautifulSoup for web scraping.
I have used Scikit-learn for machine learning tasks.
I have used TensorFlow for deep learning
Yes, but only if the list is immutable.
Lists are mutable and cannot be used as dict keys.
Tuples are immutable and can be used as dict keys.
If a list needs to be used as a key, it can be converted to a tuple.
List slices are a way to extract a portion of a list by specifying start and end indices.
List slices are denoted by using square brackets with start and end indices separated by a colon.
The start index is inclusive and the end index is exclusive.
If the start index is omitted, it defaults to 0. If the end index is omitted, it defaults to the length of the list.
Negative indices can be used to count from the end of the li...
Lambda functions are anonymous functions that can be passed as arguments to other functions.
Lambda functions are also known as anonymous functions because they don't have a name.
They are often used as arguments to higher-order functions like map, reduce, and filter.
Map applies a function to each element of an array and returns a new array with the results.
Reduce applies a function to the elements of an array and return...
Python uses automatic memory management through garbage collection.
Python uses reference counting to keep track of objects in memory.
When an object's reference count reaches zero, it is deleted by the garbage collector.
Python also uses a cyclic garbage collector to detect and delete objects with circular references.
Memory can be managed manually using the ctypes module.
Python's memory management is efficient and transp
GIL stands for Global Interpreter Lock, which is a mechanism used in CPython to ensure thread safety.
GIL is a mutex that allows only one thread to execute Python bytecode at a time.
It is necessary because CPython's memory management is not thread-safe.
GIL can cause performance issues in CPU-bound multi-threaded applications.
However, it does not affect I/O-bound or multi-process applications.
Alternative Python implement...
Threading in Python allows multiple threads of execution to run concurrently within a single process.
Python's threading module provides a way to create and manage threads.
Threads share the same memory space and can access the same variables and data structures.
Threading can improve performance for I/O-bound tasks, but not for CPU-bound tasks.
Python's Global Interpreter Lock (GIL) limits true parallelism in multi-thread...
posted on 19 Nov 2020
posted on 2 Sep 2020
I applied via Naukri.com and was interviewed in Aug 2020. There were 6 interview rounds.
based on 51 reviews
Rating in categories
1-5 Yrs
₹ 10-25 LPA
2-5 Yrs
₹ 10-20 LPA
Analyst
33
salaries
| ₹2.4 L/yr - ₹7.9 L/yr |
Software Engineer
25
salaries
| ₹4.7 L/yr - ₹13 L/yr |
Associate Engineer
18
salaries
| ₹5 L/yr - ₹10 L/yr |
Team Lead
14
salaries
| ₹4.9 L/yr - ₹21.3 L/yr |
Senior Software Engineer
13
salaries
| ₹7 L/yr - ₹28.8 L/yr |
Fiserv
FIS
Global Payments
WEX Inc