i
Solid Systems Global
Filter interviews by
Top trending discussions
I applied via Referral and was interviewed in May 2024. There were 3 interview rounds.
Hacker Rank test, problem solving. Java 8
posted on 21 May 2024
I applied via Approached by Company
Talk about one of three topics for 2 mins
DHCP is a network protocol that automatically assigns IP addresses to devices, DNS translates domain names to IP addresses, routers connect networks, gateways connect networks with different protocols, booting into safe mode allows troubleshooting.
DHCP automatically assigns IP addresses to devices on a network
DNS translates domain names to IP addresses for easier access
Routers connect different networks together to ena...
IP address is a unique identifier assigned to each device connected to a network. Classes of IP include A, B, C, D, and E. Workgroup and domain are network organization structures. BSOD is Blue Screen of Death.
IP address is a unique numerical label assigned to each device on a network
Classes of IP include A, B, C, D, and E with different ranges of addresses
Workgroup is a peer-to-peer network where each computer has its...
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
SOA focuses on large, monolithic services while Microservices are small, independent services.
SOA is a centralized architecture with shared services, while Microservices are decentralized with each service having its own database.
SOA is typically implemented using ESB (Enterprise Service Bus), while Microservices communicate via lightweight protocols like HTTP or messaging queues.
SOA is more suitable for large enterpri...
I applied via Approached by Company and was interviewed in Oct 2023. There were 4 interview rounds.
posted on 24 Jul 2024
I applied via Job Portal and was interviewed in Aug 2023. There were 3 interview rounds.
Code for linked list duplicate removal
I applied via Naukri.com and was interviewed before Mar 2020. There were 3 interview rounds.
I applied via Approached by Company and was interviewed in Jan 2022. There was 1 interview round.
IOC Container is a core feature of Spring Framework that manages the dependencies between objects.
IOC stands for Inversion of Control
It is used to achieve loose coupling between objects
It allows objects to be created and wired together by an external framework
It reduces the amount of code needed for configuration and maintenance
Examples of IOC Containers in Spring are ApplicationContext and BeanFactory
We use @Value in Spring Boot to inject values from properties files or environment variables.
Allows for external configuration of application properties
Values can be injected from properties files or environment variables
Can be used to inject values into fields, constructors, or methods
Example: @Value("${my.property}") private String myProperty;
SQL databases are relational and use structured data, while NoSQL databases are non-relational and use unstructured data.
SQL databases use tables with predefined schema, while NoSQL databases use documents, key-value pairs, or graphs.
SQL databases are better for complex queries and data analysis, while NoSQL databases are better for scalability and flexibility.
Examples of SQL databases include MySQL, Oracle, and Postgr...
Abstract classes and interfaces are used to achieve abstraction and provide a blueprint for classes to implement.
Used abstract class to create a base class for different types of vehicles, with common properties and methods.
Used interface to define a contract for different payment methods, with each method implementing its own logic.
Abstract classes are used when we want to provide a default implementation for some met...
Authentication and authorization were handled using a combination of technologies and protocols.
Used OAuth 2.0 for authentication
Implemented role-based access control for authorization
Stored user credentials securely using bcrypt hashing algorithm
Used JSON Web Tokens (JWT) for session management
Implemented two-factor authentication for sensitive operations
Customer information will be encrypted using industry-standard encryption algorithms and stored securely.
Use industry-standard encryption algorithms such as AES or RSA
Ensure that encryption keys are securely stored and managed
Implement secure storage mechanisms such as hashing and salting
Regularly review and update encryption protocols to ensure they remain secure
Serialization is used to convert complex data structures into a format that can be easily transmitted or stored.
Serialization allows data to be sent over a network or saved to a file.
It enables objects to be stored in a database or memory.
Serialization is used in web services, messaging systems, and distributed computing.
Examples include JSON, XML, and binary formats like Protocol Buffers and Apache Avro.
Yes, I have experience with Jenkins and Cloud Deployment.
I have used Jenkins for continuous integration and continuous deployment.
I have experience with setting up Jenkins pipelines for automated deployment.
I have worked with cloud platforms like AWS and Azure for deploying applications.
I have used tools like Ansible and Terraform for infrastructure automation.
I have experience with containerization using Docker and Ku...
Yes, logging is an essential part of software development.
Logging helps in debugging and troubleshooting issues.
It provides a record of events and actions taken by the system.
It helps in monitoring system performance and identifying bottlenecks.
Examples of logging mechanisms include log4j, syslog, and ELK stack.
posted on 13 Feb 2022
Customer Support Executive
13
salaries
| ₹1.6 L/yr - ₹4.4 L/yr |
Technical Support Engineer
13
salaries
| ₹2.5 L/yr - ₹8 L/yr |
Team Lead
8
salaries
| ₹2.2 L/yr - ₹3.5 L/yr |
Senior Associate
7
salaries
| ₹1.5 L/yr - ₹5 L/yr |
Senior Technical Support Engineer
6
salaries
| ₹5 L/yr - ₹10 L/yr |
TCS
Infosys
Wipro
HCLTech