Filter interviews by
Be the first one to contribute and help others!
SCD Type 2 implementation involves tracking historical changes in data by creating new records for each change.
Identify the columns that need to be tracked for changes
Add effective start and end dates to track the validity of each record
Insert new records for changes and update end dates for previous records
Maintain a surrogate key to uniquely identify each version of the record
I can join the team within 2 weeks.
I can start within 2 weeks of receiving the offer.
I need to give notice to my current employer.
I may need to relocate, which could affect my start date.
For example, a โน10 LPA CTC could mean an in-hand salary of โน70,000โโน75,000 per month, depending on deductions and benefits.
โจ ๐ฃ๐ฟ๐ผ ๐ง๐ถ๐ฝ: Always request a detailed salary structure during negotiationsโitโs your roadmap to making informed decisions
๐๐ง๐ ๐๐ ๐๐ป-๐๐ฎ๐ป๐ฑ ๐ฆ๐ฎ๐น๐ฎ๐ฟ๐: ๐ง๐ต๐ฒ ๐ฅ๐ฒ๐ฎ๐น๐ถ๐๐ ๐๐ต๐ฒ๐ฐ๐ธ ๐๐๐ฒ๐ฟ๐ ๐ฃ๐ฟ๐ผ๐ณ๐ฒ๐๐๐ถ๐ผ๐ป๐ฎ๐น ๐ก๐ฒ๐ฒ๐ฑ๐!
Weโve all been thereโexcitedly discussing job offers and hearing about the impressive CTC (Cost to Company). But when payday arrives, you wonder
I applied via Company Website and was interviewed in Dec 2024.ย There were 2 interview rounds.
There are two main sections: foundation and advanced. The foundation section consists of three subsections: quantitative, reasoning, and verbal. If you pass the foundation section but do not clear the advanced section, you will be considered for either the ninja role or the digital role during the interview process. The advanced section includes advanced aptitude questions and two coding questions.
I applied via Approached by Company and was interviewed in Dec 2024.ย There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Nov 2024.ย There were 2 interview rounds.
Its very easy
Basic maths questions learned up to 10
Basic Apptitude questions
I applied via Walk-in and was interviewed in Nov 2024.ย There were 3 interview rounds.
It's walkin, so they conducted 1 technical mcqs round.
HashMap in Java is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values based on keys.
HashMap uses an array of buckets to store key-value pairs.
Keys are hashed to determine the index in the array where the key-value pair will be stored.
In case of hash collisions, a linked list or a balanced tree is used to store multiple key-value pairs in the same bucket.
HashMap allows null keys...
Function to find and return all non-repeating characters in an array of strings.
Iterate through the array and count the occurrences of each character using a HashMap.
Then iterate through the array again and check if the count of each character is 1, if so add it to the result list.
Return the list of non-repeating characters.
To find the 3rd highest salary in a database, we can use a SQL query with the 'LIMIT' and 'OFFSET' keywords.
Use a SQL query with 'ORDER BY salary DESC' to sort the salaries in descending order.
Use 'LIMIT 1 OFFSET 2' to skip the first two highest salaries and retrieve the third highest salary.
Example: SELECT salary FROM employees ORDER BY salary DESC LIMIT 1 OFFSET 2;
A qualifier in Java is used to specify additional information about a primary, which is the main data type or variable.
A primary in Java is the main data type or variable, while a qualifier provides additional information about the primary.
Qualifiers can be used to modify the behavior or characteristics of a primary.
For example, in Java, 'final' is a qualifier that can be used to make a variable constant.
The main difference is that @RestController is a specialized version of @Controller that is used for RESTful web services.
Both @Controller and @RestController are used in Spring MVC to handle HTTP requests, but @RestController is specifically used for RESTful web services.
@Controller is used to create web pages, while @RestController is used to return data in JSON or XML format.
@RestController is a convenience annotati...
OOP concepts include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class. Example: class Dog extends Animal.
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: private variables with public getter and setter methods.
Polymorphism: Ability for objects to be treated as instances of their paren...
Microservices communicate with each other through various communication protocols like HTTP, messaging queues, and gRPC.
Microservices can communicate over HTTP using RESTful APIs.
Messaging queues like RabbitMQ or Kafka can be used for asynchronous communication between microservices.
gRPC is a high-performance, open-source RPC framework that can be used for communication between microservices.
Service discovery mechanism...
Microservice endpoints can be accessed using HTTP requests with the appropriate URL
Use HTTP methods like GET, POST, PUT, DELETE to interact with the microservice
Construct the URL with the base URL of the microservice and the specific endpoint path
Include any necessary headers or parameters in the request for authentication or data filtering
Microservices allow for modular, scalable, and flexible software development by breaking down applications into smaller, independent services.
Microservices enable easier maintenance and updates as each service can be developed, deployed, and scaled independently.
They improve fault isolation, as failures in one service do not necessarily affect the entire application.
Microservices promote agility and faster time-to-mark...
Polymorphism allows objects of different classes to be treated as objects of a common superclass. Generators produce items one at a time. Decorators add functionality to existing functions or methods.
Polymorphism: Enables objects of different classes to be treated as objects of a common superclass. Example: Animal superclass with Dog and Cat subclasses.
Generator: Produces items one at a time, allowing for efficient mem...
Embeddings are a way to represent words or phrases as vectors in a high-dimensional space, capturing semantic relationships.
Embeddings are important for tasks like natural language processing, where words need to be represented in a meaningful way.
They can be created using techniques like Word2Vec, GloVe, or using neural networks like Word Embeddings.
Embeddings help in capturing semantic relationships between words, al...
Encoder-decoder is a neural network architecture used for tasks like machine translation.
Encoder processes input data and generates a fixed-length representation
Decoder uses the representation to generate output sequence
Example: Seq2Seq model for translating English to French
I applied via Walk-in and was interviewed in Dec 2024.ย There were 3 interview rounds.
English speaking test , one minute talk on particular topic , english grammar, typing test , reasoning and quants little
posted on 17 Dec 2024
I applied via Referral and was interviewed in Nov 2024.ย There was 1 interview round.
BGP is used for routing and exchanging routing information between different autonomous systems.
BGP allows for dynamic routing between different autonomous systems
It provides redundancy and load balancing by choosing the best path for data traffic
BGP helps in preventing network loops and ensuring efficient data routing
It is commonly used by Internet Service Providers (ISPs) to exchange routing information
BGP is essenti...
A switch stack is a group of network switches that are interconnected and operate as a single unit.
Switch stack simplifies network management by allowing multiple switches to be managed as one entity.
It provides high availability and redundancy by allowing one switch to take over if another fails.
Switch stack can also increase network performance by load balancing traffic across multiple switches.
Examples of switch sta...
Configurations required in wireless networking include SSID, security settings, encryption type, and channel selection.
Set up a unique SSID to identify the network
Choose appropriate security settings such as WPA2-PSK
Select encryption type like AES for secure data transmission
Optimize channel selection to avoid interference
Different types of VPNs include remote access VPN, site-to-site VPN, and client-to-site VPN.
Remote access VPN allows individual users to connect to a private network remotely.
Site-to-site VPN connects multiple networks together over the internet.
Client-to-site VPN allows individual devices to connect to a private network remotely.
Other types include MPLS VPN, SSL VPN, and IPsec VPN.
The purpose of native VLAN is to carry untagged traffic across a trunk link.
Native VLAN is used for untagged traffic on a trunk link
It allows devices that do not support VLAN tagging to communicate over the trunk link
Native VLAN should be the same on both ends of the trunk link to avoid VLAN hopping attacks
I applied via Naukri.com and was interviewed in Oct 2024.ย There were 2 interview rounds.
10 min, simple question on programming skills
I have used the asynchronous messaging pattern for Microservice communication.
Implemented messaging queues like RabbitMQ or Kafka for decoupled communication
Used message brokers to enable communication between Microservices
Leveraged event-driven architecture for real-time updates and scalability
I have used Application Insights for monitoring and analyzing the performance of .NET applications.
Used Application Insights to track application performance metrics
Analyzed telemetry data to identify performance bottlenecks
Set up alerts and notifications for critical issues
Integrated Application Insights with Azure DevOps for continuous monitoring
We use in-memory caching technique in our project to improve performance and reduce database load.
In-memory caching is used to store frequently accessed data in memory for quick retrieval
Helps reduce database load and improve application performance
Examples: using MemoryCache in .NET, Redis caching, caching frequently accessed data like user profiles or product information
Yes, API Gateways are used in Microservices to manage and secure communication between services.
API Gateways act as a single entry point for clients to access multiple microservices
They handle authentication, authorization, rate limiting, logging, and monitoring
Examples of API Gateways include Kong, Apigee, and AWS API Gateway
We are using OAuth 2.0 for single sign on in the project.
OAuth 2.0 is a widely used authorization framework that enables a third-party application to obtain limited access to an HTTP service.
It allows users to log in once and access multiple applications without having to log in again.
OAuth 2.0 provides secure delegated access to resources without sharing user credentials.
JWT token is a JSON Web Token used for secure transmission of information between parties.
JWT token is a compact and self-contained way to transmit information between parties.
It is digitally signed to verify its authenticity and integrity.
JWT tokens consist of three parts: header, payload, and signature.
They are commonly used for authentication and information exchange in web applications.
Example: JWT tokens are often
Exception handling and filters in .NET Core Web API
Use try-catch blocks to handle exceptions in the code
Implement global exception handling middleware to catch unhandled exceptions
Use filters like [Authorize] for authentication and [ValidateAntiForgeryToken] for CSRF protection
Create custom exception filters by implementing IExceptionFilter interface
based on 9 reviews
Rating in categories
Software Engineer
4
salaries
| โน3 L/yr - โน5 L/yr |
Test Engineer
4
salaries
| โน1.5 L/yr - โน2.4 L/yr |
HR Executive
4
salaries
| โน2 L/yr - โน4 L/yr |
Business Development Executive
4
salaries
| โน1.1 L/yr - โน1.8 L/yr |
Software Developer
3
salaries
| โน2.4 L/yr - โน4.3 L/yr |
TCS
Infosys
Wipro
HCLTech