i
Tavant Technologies
Filter interviews by
Clear (1)
I was interviewed in Jun 2024.
Polymorphism is the ability of a single function or method to operate on different types of data.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).
Example of compile-time polymorphism: function overloading where multiple functions have the same name but different paramete...
Abstract classes and interfaces are used in object-oriented programming to define common behavior and structure for classes.
Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
Classes can implement multiple interfaces but can only inherit from one abstract class.
Abstract classes can have constructors, while interfaces cannot.
Example: abstract class Animal { abs...
To improve performance of a Stored procedure, optimize query, use indexes, minimize data retrieval, and avoid cursors.
Optimize query by using proper indexing
Minimize data retrieval by fetching only required columns
Avoid using cursors for looping through data
Use SET NOCOUNT ON to stop the message indicating the number of rows affected by a Transact-SQL statement
JWT stands for JSON Web Token, a compact and self-contained way for securely transmitting information between parties as a JSON object.
JWT is commonly used for authentication and information exchange in web development.
It consists of three parts: header, payload, and signature.
The header typically consists of the type of token and the signing algorithm being used.
The payload contains the claims, which are statements ab...
Dependency Injection is a design pattern in which components are given their dependencies rather than creating them internally.
Allows for easier testing by providing mock dependencies
Promotes loose coupling between components
Improves code reusability and maintainability
Commonly used in frameworks like Spring in Java
Dependency Injection in ASP.NET Core is registered in ConfigureServices method of Startup class.
Add services.AddSingleton
Add services.AddScoped
Add services.AddTransient
Inceptor in Angular is a service that allows intercepting HTTP requests and responses.
Inceptor is used for modifying requests or responses before they are sent or received.
It can be used for adding headers, logging, error handling, etc.
Example: intercepting requests to add authentication token.
Read-only variables can be modified by the program, while const variables cannot be changed.
Read-only variables can be modified by the program during runtime, while const variables cannot be changed at all.
Using 'const' keyword ensures that the value of the variable remains constant throughout the program.
Read-only variables are typically used when the value needs to be initialized at runtime, while const variables are...
Top trending discussions
I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Oct 2020. There was 1 interview round.
I applied via Approached by Company and was interviewed in Dec 2018. There were 3 interview rounds.
SOX Compliance is a set of regulations that public companies must follow to ensure accurate financial reporting.
SOX stands for Sarbanes-Oxley Act
It was enacted in 2002 after accounting scandals at Enron and WorldCom
It requires companies to establish and maintain internal controls over financial reporting
It also mandates regular audits and certifications of financial statements
Non-compliance can result in fines, legal a
PCI DSS stands for Payment Card Industry Data Security Standard.
It is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment.
It was created by major credit card companies such as Visa, Mastercard, American Express, Discover, and JCB International.
It includes requirements for network security, data protection, access...
ISO 27K is a set of standards for information security management systems.
ISO 27K provides guidelines for managing and protecting sensitive information.
It includes controls for risk management, access control, and incident management.
ISO 27K certification is often required for companies handling sensitive data.
Examples of ISO 27K standards include ISO 27001 and ISO 27002.
Risk assessment for an application involves identifying potential threats and vulnerabilities and evaluating their impact.
Identify potential threats and vulnerabilities
Evaluate the impact of each threat or vulnerability
Determine the likelihood of each threat or vulnerability occurring
Prioritize risks based on their impact and likelihood
Develop a plan to mitigate or manage each risk
I applied via Approached by Company and was interviewed in Nov 2017. There were 3 interview rounds.
We can achieve this by sending the data in chunks using pagination.
Implement pagination to limit the amount of data sent per request.
Use a cursor-based pagination approach to efficiently retrieve large amounts of data.
Consider compressing the data to reduce the size of each chunk.
Use HTTP range requests to retrieve specific chunks of data.
To achieve load balance and fault tolerance while deploying an application, we can use techniques like load balancing, clustering, and redundancy.
Implement load balancing to distribute incoming traffic across multiple servers.
Use clustering to group multiple servers together to work as a single unit.
Ensure redundancy by having multiple instances of critical components to handle failures.
Implement fault-tolerant mechani...
Shared variables are accessible by all tasks in a process, while job shared variables are only accessible by tasks in a specific job.
Shared variables are used to share data between tasks in a process.
Job shared variables are used to share data between tasks in a specific job.
Shared variables can cause race conditions and should be used with caution.
Job shared variables are useful for passing data between tasks in a job
DB activities that can be part of a transaction group
Insertion of data into a table
Updating data in a table
Deletion of data from a table
Creating or dropping a table
Altering the structure of a table
Executing stored procedures
Executing functions
Executing triggers
I applied via Naukri.com and was interviewed before Feb 2021. There were 3 interview rounds.
Subject
I applied via Recruitment Consultant and was interviewed in Oct 2019. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed before Dec 2020. There were 6 interview rounds.
based on 1 interview
Interview experience
based on 4 reviews
Rating in categories
Senior Software Engineer
810
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
577
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
518
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Technical Architect
254
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Quality Engineer
241
salaries
| ₹0 L/yr - ₹0 L/yr |
Infosys
Wipro
Tech Mahindra
HCLTech