Filter interviews by
I applied via Job Portal
2 Hard problems. 1 MCQ. Was able to solve all but 1 problem all test cases werent passing. Got rejected
Top trending discussions
posted on 8 Jan 2025
I applied via Referral and was interviewed in Dec 2024. There was 1 interview round.
posted on 5 Oct 2024
Inheritance is a mechanism in object-oriented programming where a class inherits properties and behaviors from another class.
Allows a class to inherit attributes and methods from another class
Promotes code reusability and reduces redundancy
Creates a parent-child relationship between classes
Derived class can override or extend the functionality of the base class
Types of joins in MySQL include inner join, left join, right join, and full join.
Inner join: Returns rows when there is a match in both tables.
Left join: Returns all rows from the left table and the matched rows from the right table.
Right join: Returns all rows from the right table and the matched rows from the left table.
Full join: Returns rows when there is a match in one of the tables.
Use a centralized API gateway to manage and route requests to multiple APIs efficiently.
Implement a centralized API gateway to handle incoming requests and route them to the appropriate API based on the endpoint.
Utilize API management tools like Apigee, Kong, or AWS API Gateway to manage and monitor multiple APIs.
Consider implementing a caching layer to improve performance and reduce the number of requests to external
strstr function searches for a substring within a string and returns a pointer to the first occurrence of the substring.
Used in C programming language
Syntax: char *strstr(const char *haystack, const char *needle)
Example: char *str = strstr("hello world", "world")
I applied via Campus Placement and was interviewed in Jul 2024. There were 3 interview rounds.
The topic given to me is AI is good or bad
A program to find prime numbers in a given range.
Iterate through numbers in the given range
Check if each number is divisible by any number other than 1 and itself
If not divisible, then the number is prime
Program to find duplicates in an array of strings
Iterate through the array and store each element in a hash set
If an element is already in the hash set, it is a duplicate
Return a list of all duplicates found
The project code is a web application that allows users to create and share interactive quizzes.
The code uses HTML, CSS, and JavaScript to create the front-end interface.
It utilizes Node.js and Express for the back-end server.
MongoDB is used as the database to store user-generated quizzes.
Socket.io is used for real-time communication between users during quiz sessions.
I applied via Naukri.com and was interviewed in Nov 2024. There were 2 interview rounds.
DESIGN 40 MINS HACKERRANK
DESIGN 40 MINS HACCKERANK
posted on 11 Dec 2023
I was interviewed in Jun 2023.
I have 5 years of experience in SQL and Node JS.
I have worked extensively with SQL databases, writing complex queries and optimizing performance.
I am proficient in using Node JS for server-side development, building RESTful APIs and handling database operations.
I have experience in integrating SQL databases with Node JS applications using libraries like Sequelize or Knex.
I have successfully delivered projects that invo...
Indexes in SQL are data structures that improve the speed of data retrieval operations on database tables.
Indexes are created on one or more columns of a table to allow faster searching and sorting of data.
They work similar to the index of a book, allowing the database engine to quickly locate the data.
Indexes can be created on primary keys, foreign keys, or any other frequently searched columns.
They reduce the amount ...
Normalization is a process in DBMS that eliminates data redundancy and ensures data integrity.
Normalization is used to organize data in a database efficiently.
There are different normal forms, such as 1NF, 2NF, 3NF, BCNF, and 4NF.
Each normal form has specific rules and dependencies to achieve data normalization.
Normalization helps in reducing data duplication, improving data consistency, and simplifying database mainte...
Views in mySQL are virtual tables that are based on the result of a query. They can be used to simplify complex queries and provide a layer of abstraction.
Views are created using the CREATE VIEW statement.
They are stored in the database and can be accessed like regular tables.
Views can be used to hide complexity by encapsulating complex queries into a single view.
They can also be used to restrict access to certain colu...
Stored Procedures are precompiled database objects that contain a set of SQL statements and can be executed with a single call.
Stored Procedures are used to encapsulate and execute frequently used SQL statements.
They improve performance by reducing network traffic and optimizing query execution.
They can accept input parameters and return output values.
Stored Procedures can be used for data manipulation, data retrieval,...
Internet of Things (IoT) refers to the network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and connectivity.
IoT enables devices to collect and exchange data over the internet.
It allows for remote monitoring and control of devices and systems.
IoT has applications in various industries such as healthcare, transportation, agriculture, and smart homes.
Examples of IoT device...
JWT stands for JSON Web Token. It is a compact, URL-safe means of representing claims between two parties.
JWT is used for authentication and authorization purposes in web applications.
It consists of three parts: header, payload, and signature.
The header contains the algorithm used to sign the token.
The payload contains the claims or information about the user.
The signature is used to verify the integrity of the token.
J...
Webtokens and APIs are both used in web development, but they serve different purposes.
Webtokens are used for authentication and authorization, providing a secure way to transmit user information between client and server.
APIs (Application Programming Interfaces) are sets of rules and protocols that allow different software applications to communicate and interact with each other.
Webtokens are often used within APIs to...
oAuth is an open standard for authorization. In my project, I used the oAuth 2.0 protocol for authentication and authorization.
oAuth is a protocol that allows users to grant limited access to their resources on one website to another website without sharing their credentials.
It provides a secure way for users to authenticate and authorize third-party applications to access their data.
oAuth 2.0 is the most widely used v...
Further optimization of normalized data can be achieved through indexing, denormalization, and caching.
Create appropriate indexes on frequently queried columns to improve query performance.
Consider denormalizing the data by combining related tables to reduce the number of joins required.
Implement caching mechanisms to store frequently accessed data in memory for faster retrieval.
Use materialized views or summary tables...
Indexing in a database improves query performance by creating a data structure that allows for faster data retrieval.
Indexing involves creating an index on one or more columns of a database table.
The column used for indexing should be chosen based on the frequency of data retrieval and the cardinality of the column.
Columns with high selectivity and frequent data retrieval are good candidates for indexing.
Examples of co...
posted on 19 Apr 2024
There should be 2 coding questions we have to solve that
Interview experience
based on 1 review
Rating in categories
Senior Software Engineer
9
salaries
| ₹18 L/yr - ₹70 L/yr |
Software Engineer2
9
salaries
| ₹18 L/yr - ₹31 L/yr |
Software Engineer
6
salaries
| ₹22 L/yr - ₹30 L/yr |
Software Developer
4
salaries
| ₹29 L/yr - ₹40 L/yr |
Software Development Engineer
4
salaries
| ₹12 L/yr - ₹32 L/yr |
Freshworks
Zoho
Druva
InMobi