i
REDVision Global Technologies
Filter interviews by
I applied via Approached by Company and was interviewed in May 2024. There was 1 interview round.
Node.js achieves asynchronous behavior through event-driven architecture and non-blocking I/O operations.
Node.js uses event-driven architecture to handle asynchronous operations.
It utilizes non-blocking I/O operations to allow multiple operations to be executed concurrently.
Node.js uses callbacks, promises, and async/await to manage asynchronous code execution.
Example: Using callbacks in Node.js to handle asynchronous
Lookup in MongoDB is used to perform a left outer join to retrieve documents from another collection.
Lookup is used to combine data from two collections based on a common field.
It is similar to a SQL join operation.
Lookup is used in aggregation pipelines to fetch related documents from another collection.
Example: db.collection.aggregate([{ $lookup: { from: 'anotherCollection', localField: 'field', foreignField: 'field'
Top trending discussions
posted on 30 Aug 2016
I applied via Campus Placement
posted on 14 Apr 2024
I applied via Naukri.com and was interviewed in Mar 2024. There were 3 interview rounds.
Technical Aptitude on singalton pattern
A man-in-the-middle attack is a cyber security attack where the attacker secretly intercepts and possibly alters the communication between two parties.
Attacker intercepts communication between two parties
Attacker may alter the communication
Commonly occurs in public Wi-Fi networks
Can lead to data theft or unauthorized access
Protecting API involves using authentication, authorization, encryption, rate limiting, and monitoring.
Implement authentication mechanisms such as OAuth, JWT, or API keys
Use authorization to control access to different parts of the API
Encrypt sensitive data using SSL/TLS
Implement rate limiting to prevent abuse and protect against DDoS attacks
Monitor API traffic for unusual activity and potential security threats
CSRF stands for Cross-Site Request Forgery, a type of attack where a malicious website tricks a user into performing actions on another website without their knowledge.
CSRF attacks exploit the trust that a site has in a user's browser, by sending unauthorized requests using the user's session.
Prevent CSRF attacks by using tokens in forms, checking the origin of requests, and implementing proper authentication and autho...
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
DSA leetcode on hackerrank
posted on 7 Apr 2024
I have 2 years of experience in ReactJS, including building interactive user interfaces and integrating with backend services.
Developed a responsive web application using ReactJS, Redux, and Material-UI
Implemented RESTful APIs to fetch and update data in the application
Utilized React Router for client-side routing and navigation
Worked on optimizing performance by using memoization and lazy loading techniques
I applied via Approached by company and was interviewed in Aug 2021. There were 2 interview rounds.
Quant focussed Case Study (be prepared for calculations)
I applied via Company Website and was interviewed before Oct 2020. There was 1 interview round.
based on 1 interview
Interview experience
CapitalOne
OneCard
Airpay Payment Services
PolicyX.com