Add office photos
Engaged Employer

R Systems International

3.3
based on 1k Reviews
Video summary
Filter interviews by

10+ Gevinst Technologies Interview Questions and Answers

Updated 2 Apr 2024
Popular Designations

Q1. What is oAuth, what method did you use for Authentication/ Authorisation is your project?

Ans.

oAuth is an open standard for authorization. In my project, I used the oAuth 2.0 protocol for authentication and authorization.

  • oAuth is a protocol that allows users to grant limited access to their resources on one website to another website without sharing their credentials.

  • It provides a secure way for users to authenticate and authorize third-party applications to access their data.

  • oAuth 2.0 is the most widely used version of the protocol, which uses access tokens for authe...read more

Add your answer

Q2. If the data in a table is already normalized, what can we do to further optimize is?

Ans.

Further optimization of normalized data can be achieved through indexing, denormalization, and caching.

  • Create appropriate indexes on frequently queried columns to improve query performance.

  • Consider denormalizing the data by combining related tables to reduce the number of joins required.

  • Implement caching mechanisms to store frequently accessed data in memory for faster retrieval.

  • Use materialized views or summary tables to precompute and store aggregated data for complex queri...read more

Add your answer

Q3. How do you perform indexing in a database, which column you use for indexing?

Ans.

Indexing in a database improves query performance by creating a data structure that allows for faster data retrieval.

  • Indexing involves creating an index on one or more columns of a database table.

  • The column used for indexing should be chosen based on the frequency of data retrieval and the cardinality of the column.

  • Columns with high selectivity and frequent data retrieval are good candidates for indexing.

  • Examples of commonly indexed columns include primary keys, foreign keys,...read more

Add your answer

Q4. How much experience do you have in SQL and Node JS.

Ans.

I have 5 years of experience in SQL and Node JS.

  • I have worked extensively with SQL databases, writing complex queries and optimizing performance.

  • I am proficient in using Node JS for server-side development, building RESTful APIs and handling database operations.

  • I have experience in integrating SQL databases with Node JS applications using libraries like Sequelize or Knex.

  • I have successfully delivered projects that involve data modeling, database design, and implementing busin...read more

Add your answer
Discover Gevinst Technologies interview dos and don'ts from real experiences

Q5. What are the different types of Normalization in DBMS?

Ans.

Normalization is a process in DBMS that eliminates data redundancy and ensures data integrity.

  • Normalization is used to organize data in a database efficiently.

  • There are different normal forms, such as 1NF, 2NF, 3NF, BCNF, and 4NF.

  • Each normal form has specific rules and dependencies to achieve data normalization.

  • Normalization helps in reducing data duplication, improving data consistency, and simplifying database maintenance.

  • Example: 1NF ensures atomicity by eliminating repeat...read more

Add your answer

Q6. What is the difference between Webtokens and APIs?

Ans.

Webtokens and APIs are both used in web development, but they serve different purposes.

  • Webtokens are used for authentication and authorization, providing a secure way to transmit user information between client and server.

  • APIs (Application Programming Interfaces) are sets of rules and protocols that allow different software applications to communicate and interact with each other.

  • Webtokens are often used within APIs to authenticate and authorize requests.

  • Webtokens are typical...read more

Add your answer
Are these interview questions helpful?

Q7. What does JWT stand for? How do we use them?

Ans.

JWT stands for JSON Web Token. It is a compact, URL-safe means of representing claims between two parties.

  • JWT is used for authentication and authorization purposes in web applications.

  • It consists of three parts: header, payload, and signature.

  • The header contains the algorithm used to sign the token.

  • The payload contains the claims or information about the user.

  • The signature is used to verify the integrity of the token.

  • JWTs are typically sent in the Authorization header of HTTP...read more

Add your answer

Q8. Tell me something about Internet of Things.

Ans.

Internet of Things (IoT) refers to the network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and connectivity.

  • IoT enables devices to collect and exchange data over the internet.

  • It allows for remote monitoring and control of devices and systems.

  • IoT has applications in various industries such as healthcare, transportation, agriculture, and smart homes.

  • Examples of IoT devices include smart thermostats, wearable fitness trackers, an...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What do you know about Views in mySQL?

Ans.

Views in mySQL are virtual tables that are based on the result of a query. They can be used to simplify complex queries and provide a layer of abstraction.

  • Views are created using the CREATE VIEW statement.

  • They are stored in the database and can be accessed like regular tables.

  • Views can be used to hide complexity by encapsulating complex queries into a single view.

  • They can also be used to restrict access to certain columns or rows of a table.

  • Views are updated automatically whe...read more

Add your answer

Q10. What are the loops in power shell

Ans.

PowerShell has four types of loops: For, ForEach, While, and Do-While.

  • For loop is used to iterate a specific number of times.

  • ForEach loop is used to iterate through each element in a collection.

  • While loop is used to execute a block of code repeatedly as long as the condition is true.

  • Do-While loop is similar to While loop, but it executes the block of code at least once before checking the condition.

Add your answer

Q11. What is Index in SQL?

Ans.

Indexes in SQL are data structures that improve the speed of data retrieval operations on database tables.

  • Indexes are created on one or more columns of a table to allow faster searching and sorting of data.

  • They work similar to the index of a book, allowing the database engine to quickly locate the data.

  • Indexes can be created on primary keys, foreign keys, or any other frequently searched columns.

  • They reduce the amount of data that needs to be scanned, improving query performa...read more

Add your answer

Q12. What are Stored Procedures?

Ans.

Stored Procedures are precompiled database objects that contain a set of SQL statements and can be executed with a single call.

  • Stored Procedures are used to encapsulate and execute frequently used SQL statements.

  • They improve performance by reducing network traffic and optimizing query execution.

  • They can accept input parameters and return output values.

  • Stored Procedures can be used for data manipulation, data retrieval, and other database operations.

  • Examples include procedures...read more

Add your answer

Q13. What is agile methodologies

Ans.

Agile methodologies are iterative and incremental approaches to software development that prioritize flexibility and customer satisfaction.

  • Agile methodologies prioritize individuals and interactions over processes and tools

  • They emphasize working software over comprehensive documentation

  • They value customer collaboration and respond to change over following a plan

  • Examples of agile methodologies include Scrum, Kanban, and Extreme Programming (XP)

Add your answer

Q14. Array list of javascript

Ans.

Array list in JavaScript is a dynamic data structure that can store multiple strings.

  • Use square brackets [] to define an array list.

  • Access elements in the array using index starting from 0.

  • Add elements to the array using push() method.

  • Remove elements from the array using splice() method.

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Gevinst Technologies

based on 7 interviews
2 Interview rounds
Resume Shortlist Round
Technical Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Software Engineer Interview Questions from Similar Companies

3.9
 • 50 Interview Questions
3.9
 • 13 Interview Questions
3.9
 • 13 Interview Questions
3.5
 • 10 Interview Questions
3.3
 • 10 Interview Questions
3.9
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter