Filter interviews by
I applied via Naukri.com and was interviewed in Dec 2022. There were 2 interview rounds.
I have experience with hardware troubleshooting and maintenance.
I have built and upgraded my own desktop computer
I have replaced components such as RAM, hard drives, and power supplies
I have experience with troubleshooting hardware issues such as overheating and component failure
I have worked with various hardware peripherals such as printers and scanners
I applied via Recruitment Consulltant and was interviewed in Apr 2022. There were 3 interview rounds.
Free speech is a fundamental right that allows individuals to express their opinions without censorship or fear of retaliation.
Free speech is protected by the First Amendment of the US Constitution.
It allows individuals to express their opinions, even if they are unpopular or controversial.
However, there are limits to free speech, such as hate speech and incitement to violence.
Free speech is important for promoting dem...
Mac and Windows have different operating systems, user interfaces, and software compatibility.
Mac uses macOS while Windows uses Windows OS
Mac has a dock for launching apps while Windows has a start menu
Mac has better built-in security features while Windows is more vulnerable to viruses
Mac is more compatible with iOS devices while Windows is more compatible with Android devices
Mac has limited software options while Win...
I excel as an individual contributor and transition smoothly into a team lead role by leveraging my technical expertise and leadership skills.
Demonstrate strong technical skills and consistently deliver high-quality work as an individual contributor.
Proactively seek opportunities to mentor and guide team members, showcasing leadership potential.
Communicate effectively with team members, fostering collaboration and driv...
posted on 14 Oct 2024
I applied via campus placement at National Institute of Technology, (NIT), Sikkim and was interviewed in Sep 2024. There were 2 interview rounds.
60 min total
45-aptitude question
2-coding question
Garbage collector is a program that automatically frees up memory by reclaiming memory occupied by objects that are no longer in use.
Garbage collector is a part of the memory management system in programming languages like Java, C#, and Python.
It helps prevent memory leaks by identifying and freeing up memory that is no longer needed.
Garbage collection can be automatic or manual, depending on the programming language a
Public key is used for encryption and decryption in asymmetric cryptography, while foreign key is used to establish a relationship between tables in a database.
Public key is used in asymmetric cryptography for secure communication.
Foreign key is used in databases to establish relationships between tables.
Public key is shared with others for encryption, while private key is kept secret for decryption.
Foreign key links a...
I applied via Naukri.com and was interviewed in Jun 2024. There were 2 interview rounds.
Non functional requirements are criteria that specify how a system should behave, rather than what it should do.
Performance - system should respond within 2 seconds for all user interactions
Scalability - system should be able to handle 1000 concurrent users
Reliability - system should have a 99.99% uptime
Security - system should encrypt all sensitive data
Usability - system should have a user-friendly interface
Improve legacy app performance by optimizing code, implementing caching, and scaling resources.
Optimize code by identifying and removing bottlenecks
Implement caching to reduce database calls and improve response time
Scale resources by using containers or serverless architecture
Use asynchronous processing for long-running tasks
Upgrade hardware or infrastructure if necessary
Security in microservices involves implementing authentication, authorization, encryption, and monitoring to protect data and services.
Implement authentication and authorization mechanisms to control access to microservices.
Use encryption to secure communication between microservices and external clients.
Implement monitoring and logging to detect and respond to security incidents.
Consider using API gateways for central...
Microservices architecture for a wealth management app involves breaking down the application into smaller, independent services.
Each microservice focuses on a specific business function, such as client onboarding, portfolio management, or reporting.
Services communicate through APIs, allowing for flexibility and scalability.
Each microservice can be developed, deployed, and scaled independently, leading to faster develo...
posted on 27 Sep 2024
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
Managed Identity is a feature in Azure Active Directory that provides an identity for applications to use when connecting to resources.
Managed Identity eliminates the need to store credentials in code or configuration files.
It allows applications to authenticate to Azure services without needing to manage credentials.
Managed Identity can be assigned to Azure resources like Virtual Machines, App Services, and Functions.
...
I applied via Referral and was interviewed in May 2024. There were 3 interview rounds.
Hacker Rank test, problem solving. Java 8
Java8 Stream program to filter even numbers and double them
Use Stream to filter even numbers
Use map to double the filtered numbers
Use collect to collect the results into a list
I applied via LinkedIn and was interviewed in Sep 2024. There was 1 interview round.
Cognizant
Teleperformance
Reliance Retail
iEnergizer