Filter interviews by
Inheritance is a way to create a new class using properties and methods of an existing class, while polymorphism allows objects of different classes to be treated as objects of a common superclass.
Inheritance allows a class to inherit properties and methods from another class.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
Inheritance promotes code reusability and reduce...
Code to check if two strings are anagrams
Create a function that takes in two strings as input
Convert both strings to lowercase and remove any spaces
Sort both strings and compare if they are equal to determine if they are anagrams
Promise.all vs promise.allsettled how to resolve asynchronus call using promises
Addressing any gaps in education during the interview process.
Acknowledge any gaps in education and explain how you have worked to overcome them
Highlight any additional courses, certifications, or self-study you have done to fill in the gaps
Discuss how you have applied your knowledge in real-world projects to compensate for any educational shortcomings
What people are saying about PwC
I applied via LinkedIn and was interviewed in Dec 2022. There were 3 interview rounds.
PwC interview questions for designations
I applied via Company Website and was interviewed before May 2022. There were 4 interview rounds.
Related to data structures, array questions and strung related
TMG events refer to events related to Threat Management Gateway, a Microsoft network security product.
TMG events are generated by Threat Management Gateway (TMG), a network security product developed by Microsoft.
These events provide information about network traffic, security threats, and system health.
Examples of TMG events include firewall rule violations, malware detection, and system errors.
Events in interactive report refer to user interactions like clicking, hovering, or scrolling.
Events can trigger actions or functions in the report.
Common events include click, hover, scroll, keypress, etc.
Events can be used to enhance user experience and interactivity.
Examples: Clicking on a data point to view more details, hovering over a chart to see tooltips.
RFC is a protocol for requesting services from a server, while BAPI is a specific type of RFC used in SAP systems.
RFC stands for Remote Function Call and is a protocol used to request services from a server over a network.
BAPI stands for Business Application Programming Interface and is a specific type of RFC used in SAP systems for integrating external applications with SAP.
RFC can be used in various systems and techn...
ABAP on HANA is a programming language that combines ABAP with the in-memory database technology of SAP HANA.
ABAP on HANA allows developers to leverage the speed and power of SAP HANA for their ABAP-based applications.
It enables real-time analytics, predictive modeling, and faster data processing.
Developers can use ABAP on HANA to optimize existing ABAP code for better performance.
It provides a seamless integration bet...
CDs Views have limitations in terms of performance and scalability.
Limited support for complex queries and joins
Performance degradation with large datasets
Scalability issues when handling high volume of data
Difficulty in maintaining and updating views as database schema changes
I applied via Referral and was interviewed before Sep 2023. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed before Aug 2023. There was 1 interview round.
Authentication verifies the identity of a user, while authorization determines what actions a user is allowed to perform.
Authentication confirms the user's identity through credentials like passwords or biometrics
Authorization controls access to resources based on the authenticated user's permissions
Example: Logging into a system with a username and password is authentication, while being able to view or edit specific
HashMap is a key-value pair collection while HashSet is a collection of unique elements.
HashMap allows duplicate values but keys must be unique
HashSet does not allow duplicate elements
HashMap uses key-value pairs for storing data
HashSet uses a single value for storing data
I applied via Naukri.com and was interviewed in Nov 2023. There were 3 interview rounds.
I applied via LinkedIn and was interviewed in May 2024. There was 1 interview round.
Hibernate transaction is a way to manage database transactions in Hibernate framework.
Hibernate transaction allows grouping multiple database operations into a single unit of work.
It ensures data consistency and integrity by either committing all changes or rolling back in case of failure.
Transactions in Hibernate are managed using Session interface.
Example: session.beginTransaction(); session.save(entity); session.get
Use efficient database design, indexing, partitioning, and caching to handle large amounts of data.
Optimize database schema for efficient storage and retrieval.
Implement indexing on frequently queried columns to speed up search operations.
Partition data to distribute load across multiple servers or disks.
Utilize caching mechanisms like Redis or Memcached to reduce database load.
Consider using sharding to horizontally s...
based on 4 interviews
Interview experience
based on 38 reviews
Rating in categories
Senior Associate
16.1k
salaries
| ₹8 L/yr - ₹30.2 L/yr |
Associate
13.7k
salaries
| ₹4.8 L/yr - ₹15.9 L/yr |
Manager
6.9k
salaries
| ₹14 L/yr - ₹45 L/yr |
Senior Consultant
4.5k
salaries
| ₹9 L/yr - ₹33 L/yr |
Associate2
4.4k
salaries
| ₹4.7 L/yr - ₹17.6 L/yr |
Deloitte
Ernst & Young
Accenture
TCS