Filter interviews by
Clear (1)
I applied via Approached by Company and was interviewed in Jun 2024. There was 1 interview round.
Pivoting columns in SQL involves transforming rows into columns to display data in a different format.
Use the PIVOT keyword in SQL to pivot columns
Specify the columns to pivot on and the values to display in the new columns
Aggregate functions like SUM, AVG, COUNT can be used with PIVOT
Example: SELECT * FROM table_name PIVOT (SUM(value_column) FOR pivot_column IN ('value1', 'value2', 'value3'))
I applied via Naukri.com and was interviewed in Aug 2023. There were 4 interview rounds.
OOPs concepts, abstraction vs interface, MVC architecture, stored procedures, joins
OOPs concepts include inheritance, polymorphism, encapsulation, and abstraction
Abstraction is hiding the implementation details while interface is a contract that defines the methods that a class must implement
MVC architecture separates the application into Model, View, and Controller components for better organization and maintenance
Sto...
SQL queries, ddl,dml TCL commands, primary key and foreign key differences,what is composite key,hash table in c#,generics in c#.
I applied via Recruitment Consultant and was interviewed in Apr 2021. There were 4 interview rounds.
Scope of variable in Perl determines where the variable can be accessed.
Perl has three types of variable scope: global, local, and lexical.
Global variables can be accessed from anywhere in the program.
Local variables are declared using the 'my' keyword and can only be accessed within the block they are declared in.
Lexical variables are declared using the 'state' keyword and can be accessed within the block they are dec...
Hash is a data structure that stores data in key-value pairs while array is an ordered list of scalar values.
Hashes are denoted by % symbol and arrays by @ symbol in Perl.
Hashes are useful for storing and retrieving data quickly based on a unique key.
Arrays can be accessed using index numbers starting from 0.
Both hashes and arrays can store different data types such as strings, numbers, and references.
Example: %hash = ...
CDATA is a way to include special characters in XML data without causing parsing errors.
CDATA stands for Character Data
It is used to include data that contains characters that would otherwise be interpreted as XML markup
CDATA is enclosed in tags
Example:
Top trending discussions
posted on 28 Mar 2018
I applied via Other and was interviewed in Nov 2017. There were 5 interview rounds.
As a Senior Software Engineer, I worked with various tools and technologies to develop and maintain software applications.
Developed and maintained software applications using Java, Python, and C++ programming languages
Used Agile methodology for software development and collaborated with cross-functional teams
Worked with various tools such as Git, JIRA, Jenkins, and Docker for version control, issue tracking, continuous...
I applied via Recruitment Consultant and was interviewed in Jul 2018. There were 3 interview rounds.
The biggest challenge in developing Azure solution was managing the complexity of the cloud environment.
Managing the complexity of the cloud environment
Ensuring scalability and reliability
Integrating with existing systems
Securing the solution
Optimizing cost
Example: Migrating a legacy application to Azure
Implementing tumbling window in Azure Data Factory without using the feature
Create a pipeline with a trigger that runs at the desired interval
Use a lookup activity to retrieve the data for the current window
Use a foreach activity to iterate over the retrieved data
Perform the required operations on the data within the foreach activity
Write the output to the desired destination
My suggestion for implementation in Azure Data Factory v2 is to use the Mapping Data Flow feature.
Utilize Mapping Data Flow for complex data transformations
Take advantage of the visual interface to design and debug data flows
Leverage the built-in data integration capabilities with other Azure services
Use data flow parameters and expressions for dynamic transformations
Monitor and optimize data flow performance using dat
posted on 24 Mar 2021
I applied via Naukri.com and was interviewed before Jan 2021. There was 1 interview round.
I applied via Naukri.com and was interviewed in Sep 2020. There were 5 interview rounds.
I applied via Monster and was interviewed in Oct 2018. There were 3 interview rounds.
Hands-on experience with software and its practical applications.
I have worked on various software projects and have experience in developing, testing, and deploying software applications.
I have experience in programming languages such as Java, Python, and C++.
I have worked on projects involving web development, mobile app development, and database management.
I have experience in using software development tools such a...
I applied via Naukri.com and was interviewed in Dec 2019. There were 3 interview rounds.
A controller is a component that handles incoming requests and returns a response, while a REST controller specifically handles RESTful requests.
A controller is responsible for handling various types of requests, such as HTTP, WebSocket, etc.
A REST controller is a type of controller that specifically handles RESTful requests, which follow the principles of Representational State Transfer (REST).
REST controllers typical...
A functional interface is an interface that has only one abstract method.
Functional interfaces are used in lambda expressions and method references.
They can have default methods and static methods.
Examples include Runnable, Comparator, and Function interfaces.
Functional interfaces can be annotated with @FunctionalInterface annotation.
Lambda expression is a concise way to represent anonymous functions in programming languages.
Lambda expressions are commonly used in functional programming languages.
They can be used to create functions on the fly without having to define them explicitly.
Lambda expressions are often used in higher-order functions, such as map, filter, and reduce.
They can also be used to create closures, which are functions that capture...
Exception propagation is the process of passing an exception up the call stack to be handled by a higher-level method.
Exceptions are thrown when an error occurs in a method.
If the exception is not caught and handled within the method, it is propagated up the call stack.
Each method in the call stack has the option to catch and handle the exception or propagate it further up.
If the exception reaches the top of the call s...
get() method returns null if the object is not found in the cache or database, while load() method throws an exception.
get() method is eager loading while load() method is lazy loading.
get() method returns the object from the database or cache while load() method returns a proxy object.
get() method is slower than load() method.
get() method is used when we are not sure if the object exists in the database or cache while...
Method overriding is when a subclass provides its own implementation of a method that is already defined in its superclass.
Method overriding is used to achieve runtime polymorphism.
The method signature (name, parameters, return type) must be the same in both the superclass and subclass.
The access level of the overriding method cannot be more restrictive than the overridden method.
Example: class Dog extends Animal { pub...
IOC and DI are design patterns used in Spring framework for loose coupling and dependency injection.
IOC (Inversion of Control) is a design pattern where the control of object creation and lifecycle is handed over to a container or framework.
DI (Dependency Injection) is a design pattern where the dependencies of an object are injected into it by an external entity, rather than the object creating them itself.
Spring fram...
HashMap is a data structure that stores key-value pairs and uses hashing to retrieve values quickly.
HashMap uses an array of buckets to store key-value pairs
Each bucket contains a linked list of entries with the same hash code
When a key-value pair is added, its hash code is used to determine the bucket and added to the linked list
When a value is retrieved, its hash code is used to find the bucket and search the linked ...
Spring Boot provides rapid application development and microservices architecture.
Easy configuration and setup
Embedded servers for faster development
Auto-configuration of dependencies
Supports multiple data sources
Actuator for monitoring and managing applications
Simplifies development of RESTful web services
Enables building of microservices architecture
Provides a wide range of plugins and extensions
Reduces boilerplate c
based on 5 interviews
Interview experience
based on 16 reviews
Rating in categories
Document Specialist
1.1k
salaries
| ₹0 L/yr - ₹0 L/yr |
Financial Associate
629
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Document Specialist
414
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Finance Associate
372
salaries
| ₹0 L/yr - ₹0 L/yr |
Financial Analyst
322
salaries
| ₹0 L/yr - ₹0 L/yr |
Foundever
Firstsource Solutions
WNS
Genpact