i
Publicis Sapient
Filter interviews by
I applied via Naukri.com and was interviewed in Jun 2022. There were 4 interview rounds.
Data structure Hash Map problem and java 8 code
Coding singlton code and immutable code hashcode equals java 8 code data structure spring boot microservicis
What people are saying about Publicis Sapient
Easy online test with basic coding questions and one coding problem
posted on 22 Sep 2024
Some difficulty is there but on hard work u can crack
It's a technical round
I am impressed by the company's innovative projects, strong team culture, and commitment to employee growth.
Innovative projects such as developing cutting-edge software solutions for healthcare industry
Strong team culture focused on collaboration and continuous learning
Commitment to employee growth through training programs and career development opportunities
My strengths include problem-solving skills, adaptability, and strong technical knowledge.
Strong problem-solving skills - I enjoy tackling complex issues and finding creative solutions.
Adaptability - I am able to quickly learn new technologies and adapt to changing project requirements.
Strong technical knowledge - I have a solid understanding of various programming languages and frameworks.
posted on 7 Feb 2024
I applied via Campus Placement and was interviewed before Feb 2023. There were 2 interview rounds.
For a fresher there will be aptitude interview
1. JVM is a virtual machine that executes Java bytecode. JRE is a runtime environment that includes JVM and libraries. JDK is a development kit that includes JRE and tools for developing Java applications. 2. Null is a special value that represents the absence of a value. Its value is typically used to indicate that a variable does not refer to any object. 3. Pass by reference is a method of parameter passing where the...
I applied via Recruitment Consulltant and was interviewed in Aug 2024. There was 1 interview round.
Logic App logs are stored in Azure Monitor Logs (formerly known as Log Analytics).
Logic App logs are stored in Azure Monitor Logs, which is a centralized log storage and analytics service in Azure.
Logs can be viewed and analyzed using Azure Monitor Logs queries.
Logs can also be integrated with other Azure services for monitoring and alerting purposes.
Use the OFFSET and FETCH clauses in SQL to get the 5th top position data.
Use the ORDER BY clause to sort the data in descending order.
Use the OFFSET clause to skip the first 4 rows.
Use the FETCH clause to retrieve only the next row after skipping the first 4 rows.
Custom middleware in .NET Core can be implemented by creating a class that implements the IMiddleware interface and adding it to the application pipeline.
Create a class that implements the IMiddleware interface
Implement the InvokeAsync method in the middleware class to handle the request processing logic
Add the custom middleware to the application pipeline in the Configure method of the Startup class
Authentication verifies the identity of a user, while authorization determines what resources a user can access.
Authentication confirms the identity of a user through credentials like username and password.
Authorization determines the permissions and access levels of a user based on their authenticated identity.
In ASP.NET Core, authentication is handled through middleware like Identity, OAuth, or JWT tokens.
Authorizati...
Session management in ASP.NET Core involves storing and retrieving user-specific data during a user's visit to a website.
Session data is stored on the server side by default in ASP.NET Core
Session data can be accessed and manipulated using the HttpContext.Session property
Session data can be configured to use different storage providers such as in-memory, distributed cache, or SQL Server
Session data is typically used to...
I applied via Naukri.com and was interviewed in Oct 2024. There were 2 interview rounds.
Quantitative , figure ,mcq question based on tech stack and 2 coding question which are basic. 90 minute time limit.
I applied via Approached by Company and was interviewed in Jul 2023. There were 3 interview rounds.
posted on 9 May 2024
There are 4 coding questions in first round
Coding related questions. They may ask System design also for experienced developer role.
Security and authentication are implemented using JWT tokens and role-based access control.
JWT tokens are generated upon successful login and sent in the Authorization header of each request
Role-based access control is used to restrict access to certain endpoints based on user roles
Sensitive data is encrypted before storing in the database
Two-factor authentication is implemented for additional security
OAuth authentication is a protocol that allows secure authorization of third-party applications to access user data without sharing credentials.
OAuth stands for Open Authorization
It allows users to grant access to their resources stored on one site to another site without sharing their credentials
OAuth uses tokens instead of passwords for secure access
OAuth 2.0 is the current version and is widely used for authenticati...
based on 1 review
Rating in categories
Senior Associate
2.2k
salaries
| ₹10.9 L/yr - ₹40 L/yr |
Associate Technology L2
1.5k
salaries
| ₹6.5 L/yr - ₹20 L/yr |
Senior Associate Technology L1
1.2k
salaries
| ₹10.1 L/yr - ₹32 L/yr |
Senior Software Engineer
729
salaries
| ₹9.2 L/yr - ₹36 L/yr |
Senior Associate 2
608
salaries
| ₹14.7 L/yr - ₹41 L/yr |
Accenture
IBM
TCS
Infosys