Filter interviews by
I applied via Company Website and was interviewed in Jan 2021. There were 4 interview rounds.
SQL Injections are a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate the database.
SQL Injections occur when an attacker inserts malicious SQL statements into an entry field
This can manipulate the database and give the attacker access to sensitive information
Prevention methods include using parameterized queries and input validation
Topological sorting of a tree is a linear ordering of its nodes such that for every directed edge (u, v), node u comes before node v.
Topological sorting is used in scheduling jobs with dependencies.
It can be implemented using Depth First Search (DFS) algorithm.
Kahn's algorithm is another popular algorithm for topological sorting.
Topological sorting is not possible if the graph contains a cycle.
I applied via Walk-in and was interviewed in Feb 2021. There were 4 interview rounds.
SQL injection is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate a database.
SQL injection attacks exploit vulnerabilities in web applications that do not properly validate user input.
Attackers can use SQL injection to steal sensitive data, modify or delete data, or even take control of the entire database.
Preventing SQL injection involves using parameterized queries,...
Top trending discussions
I applied via Recruitment Consulltant and was interviewed in Jul 2024. There was 1 interview round.
Day to day activities of a software developer, features in Java-17, tracking queries in SpringBoot
Day to day activities include coding, debugging, testing, and collaborating with team members
Java-17 features include sealed classes, pattern matching for switch statements, and new APIs like Stream.toList()
To track queries in SpringBoot, enable logging for the datasource and use tools like Spring Boot Actuator or database
Protecting API on node.js involves using authentication, authorization, rate limiting, input validation, and encryption.
Use authentication mechanisms like JWT tokens or OAuth to verify the identity of clients accessing the API.
Implement authorization checks to control what actions different users can perform on the API.
Apply rate limiting to prevent abuse and ensure fair usage of the API.
Validate input data to prevent ...
Time and distance , travel,
Java data structure and algo rithm
String and arrays duplicate and sorting questions
based on 7 reviews
Rating in categories
Software Engineer
30
salaries
| ₹6.4 L/yr - ₹17 L/yr |
QA Engineer
19
salaries
| ₹3.8 L/yr - ₹9.1 L/yr |
Senior Software Engineer
11
salaries
| ₹12.5 L/yr - ₹26 L/yr |
Product Support Engineer
9
salaries
| ₹5.1 L/yr - ₹6.8 L/yr |
Software Developer
8
salaries
| ₹9 L/yr - ₹14.5 L/yr |
PolicyBazaar
Coverfox
ACKO
Digit Insurance