Filter interviews by
Basic coding question and math questions
Easy problem statement
Object-oriented programming concepts in Java
Encapsulation: bundling data and methods together
Inheritance: creating new classes from existing ones
Polymorphism: using a single interface to represent multiple forms
Abstraction: hiding complex implementation details
Encapsulation: grouping related data and methods together
Method overloading is when multiple methods have the same name but different parameters. Method overriding is when a subclass provides a different implementation of a method that is already defined in its superclass.
Method overloading is achieved by having methods with the same name but different parameters.
Method overriding is achieved by having a subclass provide a different implementation of a method that is already...
Method overloading can confuse the compiler when multiple methods match the call signature.
Method overloading occurs when multiple methods have the same name but different parameters.
The compiler determines which method to call based on the method signature (name + parameter types).
Ambiguity arises when two or more overloaded methods could match the call, leading to a compile-time error.
Example: If you have methods `vo...
Top trending discussions
I applied via LinkedIn and was interviewed in Feb 2023. There were 2 interview rounds.
Cybersecurity is the practice of protecting systems, networks, and data from digital attacks.
Cybersecurity involves implementing measures to prevent unauthorized access to information.
It includes techniques such as encryption, firewalls, and antivirus software.
Examples of cyber attacks include malware, phishing, and denial of service attacks.
Maths reasoning english
A public IP address is an Internet Protocol address that is accessible over the internet, allowing devices to communicate globally.
Public IPs are assigned by Internet Service Providers (ISPs).
They are unique across the entire internet, ensuring no two devices have the same public IP.
Example: A home router typically has a public IP that allows all connected devices to access the internet.
Public IPs can be static (unchan...
I applied via LinkedIn
Python coding tests and technical interviews.
I possess strong cybersecurity skills including knowledge of network security, encryption, penetration testing, and incident response.
Knowledge of network security protocols and best practices
Experience with encryption techniques and tools
Proficiency in conducting penetration testing to identify vulnerabilities
Ability to respond to and mitigate security incidents
Familiarity with security compliance standards such as GD...
General mathematics, pseudo code.
Time: 30min
GD: lead tech concepts
Select a primary coding language and ensure that the fundamental concepts are well understood.
Java, Python, and the fundamentals of networking.
I applied via Company Website and was interviewed in Nov 2024. There were 2 interview rounds.
2+2 coding formula in java script
I appeared for an interview in Jun 2025, where I was asked the following questions.
I have extensive experience with SQL, including data manipulation, querying, and database management across various projects.
Proficient in writing complex SQL queries for data extraction and analysis.
Experience with database design and normalization to optimize performance.
Utilized SQL for data cleaning and transformation in ETL processes.
Worked with various SQL databases like MySQL, PostgreSQL, and SQL Server.
Implemen...
based on 2 interview experiences
based on 17 reviews
Rating in categories
Software Engineer
44
salaries
| ₹2.4 L/yr - ₹7.8 L/yr |
Software Developer
24
salaries
| ₹4.4 L/yr - ₹10.9 L/yr |
QA Engineer
7
salaries
| ₹3.8 L/yr - ₹8.5 L/yr |
Senior Software Engineer
6
salaries
| ₹3.9 L/yr - ₹9.6 L/yr |
Team Lead
5
salaries
| ₹5.9 L/yr - ₹13.5 L/yr |
Bhash Software Labs
Apptunix
QR Crypher
HirePro Consulting