i
Smollan Group
Filter interviews by
Indexing in MySQL is a technique to improve the performance of database queries by creating a data structure that allows for faster data retrieval.
Indexes are created on one or more columns of a table.
They help in speeding up the search, sorting, and joining of data.
Indexes can be created using different algorithms like B-tree, hash, or bitmap.
Using indexes appropriately can significantly enhance query performance.
Exam...
Object-oriented programming concepts in PHP
Encapsulation: bundling data and methods together in a class
Inheritance: creating new classes based on existing ones
Polymorphism: using a single interface to represent different types
Abstraction: hiding unnecessary details and exposing only essential features
Class: blueprint for creating objects
Object: instance of a class
Method: function defined inside a class
Property: variabl
Top trending discussions
I applied via Naukri.com and was interviewed in Aug 2023. There were 3 interview rounds.
Calender, time, relationship
The program capitalizes the first letter of each reversed word in a sentence.
Split the sentence into an array of words using space as a delimiter.
Reverse each word in the array and capitalize the first letter.
Join the modified words back into a sentence.
I applied via Approached by Company and was interviewed in Jun 2024. There were 2 interview rounds.
Built an app using dot net and angular
posted on 9 Oct 2024
Two Medium DSA questions, then questions about react and springboot
Leetcode easy-medium
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Cyber security involves implementing measures to prevent unauthorized access, data breaches, and other cyber threats.
It includes technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
Examples of cyber security measures include firewalls, ant...
Types of encryption include symmetric encryption, asymmetric encryption, and hashing.
Symmetric encryption: Uses the same key for both encryption and decryption, examples include AES and DES.
Asymmetric encryption: Uses a pair of public and private keys for encryption and decryption, examples include RSA and ECC.
Hashing: Converts data into a fixed-size string of bytes, examples include MD5 and SHA.
I applied via Job Portal
It was a virtual coding round with coding questions on Java fundamentals, Array, LinkedList
Questions on java fundamentals, some code snippets, Array
posted on 24 Jun 2024
I applied via Referral and was interviewed in May 2024. There were 2 interview rounds.
DSA - Linked List, Trees
posted on 16 Aug 2021
I applied via Referral and was interviewed in Feb 2021. There was 1 interview round.
High-level design for a Dropbox-like system
Use a distributed file system to store files
Implement a synchronization mechanism to ensure consistency across devices
Use encryption to protect user data
Implement a user authentication and authorization system
Provide a web interface and mobile apps for easy access
Consider scalability and fault tolerance
Implement version control to allow users to revert to previous versions of
based on 5 reviews
Rating in categories
Sales Executive
96
salaries
| ₹1.5 L/yr - ₹4.2 L/yr |
Marketing Executive
92
salaries
| ₹1.4 L/yr - ₹3.6 L/yr |
Team Lead
84
salaries
| ₹2.1 L/yr - ₹6 L/yr |
Field Manager
72
salaries
| ₹5.2 L/yr - ₹15 L/yr |
Rural Sales Promoter
60
salaries
| ₹1.3 L/yr - ₹3.2 L/yr |
WPP
Accenture
Deloitte
PwC