Filter interviews by
I applied via Campus Placement and was interviewed in Feb 2024. There was 1 interview round.
Path variables are part of the URL path, while query variables are part of the URL query string.
Path variables are used to identify a specific resource in the URL path, while query variables are used to provide additional parameters for a resource.
Path variables are typically used for essential parameters, while query variables are optional.
Example: Path variable in URL - /users/{userId}, Query variable in URL - /users...
NodeJS is a runtime environment for executing JavaScript code outside of a web browser.
NodeJS allows JavaScript to be run on the server-side, enabling backend development.
NodeJS has a built-in library of modules that can be easily integrated into applications.
NodeJS is event-driven and non-blocking, making it efficient for handling multiple requests simultaneously.
posted on 5 Sep 2022
I applied via campus placement at Poornima College of Engineering, Jaipur and was interviewed before Sep 2021. There were 3 interview rounds.
posted on 9 Jan 2025
I applied via Naukri.com and was interviewed in Dec 2024. There was 1 interview round.
I applied via Recruitment Consulltant and was interviewed in Sep 2024. There were 2 interview rounds.
Find the second largest element from array of strings
Sort the array in descending order
Access the element at index 1 to get the second largest element
Failsafe integrators prioritize system stability by handling errors gracefully, while fail fast integrators prioritize quick detection and resolution of errors.
Failsafe integrators focus on ensuring the system continues to function even in the presence of errors.
Fail fast integrators aim to quickly identify and address errors to prevent further issues.
Failsafe integrators often use techniques like retries, circuit brea...
I applied via Naukri.com and was interviewed in Oct 2024. There was 1 interview round.
JVM is the virtual machine that runs Java bytecode, JRE is the runtime environment for Java programs, and JDK is the development kit for creating Java applications.
JVM (Java Virtual Machine) is responsible for running Java bytecode on different platforms.
JRE (Java Runtime Environment) includes JVM, libraries, and other components necessary to run Java applications.
JDK (Java Development Kit) is a software development ki...
String is immutable in Java to ensure security, thread safety, and optimization.
Immutable strings prevent accidental changes to sensitive data like passwords.
Immutable strings allow for safe sharing of string literals across multiple threads.
Immutable strings enable string pooling for memory optimization.
Example: String str = "Hello"; str.concat(" World"); // str remains "Hello"
I applied via Walk-in and was interviewed in Oct 2024. There was 1 interview round.
Def factorial_iterative(n):
result = 1
for i in range(1, n + 1):
result *= i
return result
posted on 19 Sep 2024
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
Overloading is having multiple methods with the same name but different parameters, while overriding is implementing a method in a subclass with the same signature as in the superclass.
Overloading allows different methods to have the same name but different parameters.
Overriding involves implementing a method in a subclass with the same signature as in the superclass.
Overloading is determined at compile time based on t...
I applied via Naukri.com and was interviewed in Apr 2024. There were 3 interview rounds.
SAGA pattern is a design pattern used in microservices architecture to manage distributed transactions.
SAGA pattern breaks down a long-running transaction into a series of smaller, independent transactions.
Each step in the SAGA pattern is a separate service that communicates with other services through events.
If a step fails, compensating transactions are executed to rollback the changes made by previous steps.
Example:...
API stands for Application Programming Interface. It defines the methods and data formats that applications can use to communicate with each other.
API is a set of rules and protocols that allows different software applications to communicate with each other.
To secure an API, you can use authentication methods like OAuth, API keys, or JWT tokens.
Implementing encryption (HTTPS) and rate limiting can also enhance API secu...
posted on 29 May 2024
Find duplicate characters in a given array of strings
Iterate through each string in the array
For each string, iterate through each character and store the count in a hashmap
If the count of any character is greater than 1, it is a duplicate
Code for REST API using Spring Boot with annotations
Use @RestController annotation to define the class as a REST controller
Use @RequestMapping annotation to map HTTP requests to handler methods
Use @GetMapping, @PostMapping, @PutMapping, @DeleteMapping annotations for specific HTTP methods
Use @PathVariable annotation to extract values from the URI
Use @RequestBody annotation to bind HTTP request body to a method paramete
Tax Expert
7
salaries
| ₹4.2 L/yr - ₹8 L/yr |
Full Stack Developer
5
salaries
| ₹7 L/yr - ₹8.4 L/yr |
Software Developer
4
salaries
| ₹3 L/yr - ₹10 L/yr |
Product Manager
3
salaries
| ₹6 L/yr - ₹10.8 L/yr |
Full Stack Software Developer
3
salaries
| ₹7.2 L/yr - ₹8.4 L/yr |
ClearTax
Zerodha
Upstox
Groww