Filter interviews by
I applied via Company Website and was interviewed before May 2021. There were 2 interview rounds.
Familiarity with legacy .NET and ability to migrate to new technologies.
Demonstrate experience with both legacy .NET and newer technologies.
Highlight any successful migration projects you have led or been a part of.
Discuss your approach to evaluating and selecting new technologies for migration.
Emphasize the importance of maintaining compatibility and minimizing disruption during migration.
Provide examples of how you h...
posted on 11 Dec 2024
I applied via LinkedIn and was interviewed in Nov 2024. There were 3 interview rounds.
Basic DSA from the hacker rank website
Technology advantage or not
All aptitude topics,logical reasoning
Dependency Injection is a design pattern in which components are given their dependencies rather than creating them internally.
Allows for easier testing by providing mock dependencies
Promotes loose coupling between components
Improves code reusability and maintainability
Examples: Constructor injection, Setter injection, Interface injection
In Java, exceptions can be handled using try-catch blocks to catch and handle specific exceptions.
Use try-catch blocks to catch exceptions and handle them gracefully
Use multiple catch blocks to handle different types of exceptions
Use finally block to execute code regardless of whether an exception is thrown or not
Throw custom exceptions using throw keyword
map transforms each element in a stream, while flatMap transforms each element into multiple elements
map applies a function to each element in a stream and returns a new stream of the results
flatMap applies a function that returns a stream for each element in the original stream, then flattens the streams into a single stream
Example: map - stream.map(x -> x * x), flatMap - stream.flatMap(str -> Arrays.stream(str.split(
ConcurrentModificationException occurs when a collection is modified while iterating over it.
Use Iterator to iterate over the collection instead of foreach loop.
If modification is necessary, use Iterator's remove() method instead of collection's remove() method.
Consider using synchronized collections or ConcurrentHashMap to avoid ConcurrentModificationException.
Linked list is a data structure where elements are stored in nodes with pointers to the next node. Array list is a dynamic array that can grow or shrink in size.
Linked list allows for efficient insertion and deletion of elements anywhere in the list.
Array list provides fast access to elements using index, but slower insertion and deletion compared to linked list.
Example: Linked list - 1 -> 2 -> 3 -> 4 -> 5, Array list
The @Controller annotation is used for traditional MVC controllers, while @RestController is used for RESTful web services.
The @Controller annotation is used to define a class as a Spring MVC controller, which can handle HTTP requests and return a view.
The @RestController annotation is used to define a class as a controller for RESTful web services, which can handle HTTP requests and return data in JSON or XML format.
T...
I want to switch to explore new technologies and challenges in a different industry.
Interested in learning new skills and technologies
Seeking new challenges and opportunities for growth
Want to explore different industry perspectives
I applied via Referral
I applied via Approached by Company and was interviewed in Oct 2023. There were 2 interview rounds.
Abstract class is used when there is a need for default implementation, while interfaces are used for multiple inheritance.
Abstract classes can have both abstract and non-abstract methods, while interfaces can only have abstract methods.
Abstract classes can provide default implementations for methods, while interfaces cannot.
Interfaces allow a class to implement multiple interfaces, but can only inherit from one abstra...
NET core is a cross-platform, open-source framework for building modern, cloud-based, internet-connected applications. NET framework is a Windows-only framework for building Windows desktop applications. NET is a general term encompassing both .NET core and .NET framework.
NET core is cross-platform and open-source, while .NET framework is Windows-only.
.NET core is modular and lightweight, allowing for faster performanc...
Pipelines and Middlewares in .NET are used for request processing and can be configured using middleware components.
Pipelines in .NET are used to define a series of middleware components that process an HTTP request.
Middlewares are components that can handle requests and responses in the pipeline.
To configure pipelines and middlewares in .NET, you can use the 'UseMiddleware' method in the 'Configure' method of the Star...
App.Use() is used for adding middleware to the request pipeline, while App.Run() is used for handling the request directly.
App.Use() is used to add middleware components to the request pipeline.
App.Run() is used to handle the request directly without passing it to the next middleware component.
App.Use() is typically used for setting up middleware like authentication, logging, etc.
App.Run() is used for handling the fina...
String is immutable, while StringBuilder is mutable. StringBuilder is faster and more memory efficient for string manipulation.
String is immutable, meaning once created, it cannot be changed. StringBuilder is mutable, allowing for efficient string manipulation.
StringBuilder is faster than String for concatenating multiple strings, as it does not create a new string object each time.
String uses more memory as it creates...
Unique, Primary Key, Clustered, and Non-Clustered Indices are all used in database management to enforce data integrity and improve query performance.
Unique constraint ensures that all values in a column are unique, but allows NULL values.
Primary Key constraint ensures that all values in a column are unique and not NULL. Each table can have only one Primary Key.
Clustered Index physically reorders the way records in the...
JWT authentication and OAuth example for API
Implement JWT authentication by generating a token upon user login and including it in the Authorization header of API requests
Use OAuth for user authorization by obtaining access tokens from a third-party provider like Google or Facebook
Ensure API endpoints validate JWT tokens and OAuth access tokens before allowing access to resources
Both $.post and $.ajax are methods in jQuery used for making AJAX requests, but $.ajax is more versatile and customizable.
Both $.post and $.ajax are used for making AJAX requests in jQuery.
$.post is a shorthand method for $.ajax with predefined settings for POST requests.
$.ajax is more versatile and customizable, allowing for different types of requests and more options.
Example: $.post('example.php', {data: 'example'},...
I applied via Naukri.com and was interviewed in Mar 2024. There was 1 interview round.
based on 2 reviews
Rating in categories
Teleperformance
FIS
Nagarro
Optum