R Systems International
10+ Gevinst Technologies Interview Questions and Answers
Q1. What is oAuth, what method did you use for Authentication/ Authorisation is your project?
oAuth is an open standard for authorization. In my project, I used the oAuth 2.0 protocol for authentication and authorization.
oAuth is a protocol that allows users to grant limited access to their resources on one website to another website without sharing their credentials.
It provides a secure way for users to authenticate and authorize third-party applications to access their data.
oAuth 2.0 is the most widely used version of the protocol, which uses access tokens for authe...read more
Q2. If the data in a table is already normalized, what can we do to further optimize is?
Further optimization of normalized data can be achieved through indexing, denormalization, and caching.
Create appropriate indexes on frequently queried columns to improve query performance.
Consider denormalizing the data by combining related tables to reduce the number of joins required.
Implement caching mechanisms to store frequently accessed data in memory for faster retrieval.
Use materialized views or summary tables to precompute and store aggregated data for complex queri...read more
Q3. How do you perform indexing in a database, which column you use for indexing?
Indexing in a database improves query performance by creating a data structure that allows for faster data retrieval.
Indexing involves creating an index on one or more columns of a database table.
The column used for indexing should be chosen based on the frequency of data retrieval and the cardinality of the column.
Columns with high selectivity and frequent data retrieval are good candidates for indexing.
Examples of commonly indexed columns include primary keys, foreign keys,...read more
Q4. How much experience do you have in SQL and Node JS.
I have 5 years of experience in SQL and Node JS.
I have worked extensively with SQL databases, writing complex queries and optimizing performance.
I am proficient in using Node JS for server-side development, building RESTful APIs and handling database operations.
I have experience in integrating SQL databases with Node JS applications using libraries like Sequelize or Knex.
I have successfully delivered projects that involve data modeling, database design, and implementing busin...read more
Q5. What are the different types of Normalization in DBMS?
Normalization is a process in DBMS that eliminates data redundancy and ensures data integrity.
Normalization is used to organize data in a database efficiently.
There are different normal forms, such as 1NF, 2NF, 3NF, BCNF, and 4NF.
Each normal form has specific rules and dependencies to achieve data normalization.
Normalization helps in reducing data duplication, improving data consistency, and simplifying database maintenance.
Example: 1NF ensures atomicity by eliminating repeat...read more
Q6. What is the difference between Webtokens and APIs?
Webtokens and APIs are both used in web development, but they serve different purposes.
Webtokens are used for authentication and authorization, providing a secure way to transmit user information between client and server.
APIs (Application Programming Interfaces) are sets of rules and protocols that allow different software applications to communicate and interact with each other.
Webtokens are often used within APIs to authenticate and authorize requests.
Webtokens are typical...read more
Q7. What does JWT stand for? How do we use them?
JWT stands for JSON Web Token. It is a compact, URL-safe means of representing claims between two parties.
JWT is used for authentication and authorization purposes in web applications.
It consists of three parts: header, payload, and signature.
The header contains the algorithm used to sign the token.
The payload contains the claims or information about the user.
The signature is used to verify the integrity of the token.
JWTs are typically sent in the Authorization header of HTTP...read more
Q8. Tell me something about Internet of Things.
Internet of Things (IoT) refers to the network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and connectivity.
IoT enables devices to collect and exchange data over the internet.
It allows for remote monitoring and control of devices and systems.
IoT has applications in various industries such as healthcare, transportation, agriculture, and smart homes.
Examples of IoT devices include smart thermostats, wearable fitness trackers, an...read more
Q9. What do you know about Views in mySQL?
Views in mySQL are virtual tables that are based on the result of a query. They can be used to simplify complex queries and provide a layer of abstraction.
Views are created using the CREATE VIEW statement.
They are stored in the database and can be accessed like regular tables.
Views can be used to hide complexity by encapsulating complex queries into a single view.
They can also be used to restrict access to certain columns or rows of a table.
Views are updated automatically whe...read more
Q10. What are the loops in power shell
PowerShell has four types of loops: For, ForEach, While, and Do-While.
For loop is used to iterate a specific number of times.
ForEach loop is used to iterate through each element in a collection.
While loop is used to execute a block of code repeatedly as long as the condition is true.
Do-While loop is similar to While loop, but it executes the block of code at least once before checking the condition.
Q11. What is Index in SQL?
Indexes in SQL are data structures that improve the speed of data retrieval operations on database tables.
Indexes are created on one or more columns of a table to allow faster searching and sorting of data.
They work similar to the index of a book, allowing the database engine to quickly locate the data.
Indexes can be created on primary keys, foreign keys, or any other frequently searched columns.
They reduce the amount of data that needs to be scanned, improving query performa...read more
Q12. What are Stored Procedures?
Stored Procedures are precompiled database objects that contain a set of SQL statements and can be executed with a single call.
Stored Procedures are used to encapsulate and execute frequently used SQL statements.
They improve performance by reducing network traffic and optimizing query execution.
They can accept input parameters and return output values.
Stored Procedures can be used for data manipulation, data retrieval, and other database operations.
Examples include procedures...read more
Q13. What is agile methodologies
Agile methodologies are iterative and incremental approaches to software development that prioritize flexibility and customer satisfaction.
Agile methodologies prioritize individuals and interactions over processes and tools
They emphasize working software over comprehensive documentation
They value customer collaboration and respond to change over following a plan
Examples of agile methodologies include Scrum, Kanban, and Extreme Programming (XP)
Q14. Array list of javascript
Array list in JavaScript is a dynamic data structure that can store multiple strings.
Use square brackets [] to define an array list.
Access elements in the array using index starting from 0.
Add elements to the array using push() method.
Remove elements from the array using splice() method.
More about working at R Systems International
Interview Process at Gevinst Technologies
Top Software Engineer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month