i
Tavant Technologies
Filter interviews by
I appeared for an interview in Jun 2024.
Polymorphism is the ability of a single function or method to operate on different types of data.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).
Example of compile-time polymorphism: function overloading where multiple functions have the same name but different paramete...
Abstract classes and interfaces are used in object-oriented programming to define common behavior and structure for classes.
Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
Classes can implement multiple interfaces but can only inherit from one abstract class.
Abstract classes can have constructors, while interfaces cannot.
Example: abstract class Animal { abs...
To improve performance of a Stored procedure, optimize query, use indexes, minimize data retrieval, and avoid cursors.
Optimize query by using proper indexing
Minimize data retrieval by fetching only required columns
Avoid using cursors for looping through data
Use SET NOCOUNT ON to stop the message indicating the number of rows affected by a Transact-SQL statement
JWT stands for JSON Web Token, a compact and self-contained way for securely transmitting information between parties as a JSON object.
JWT is commonly used for authentication and information exchange in web development.
It consists of three parts: header, payload, and signature.
The header typically consists of the type of token and the signing algorithm being used.
The payload contains the claims, which are statements ab...
Dependency Injection is a design pattern in which components are given their dependencies rather than creating them internally.
Allows for easier testing by providing mock dependencies
Promotes loose coupling between components
Improves code reusability and maintainability
Commonly used in frameworks like Spring in Java
Dependency Injection in ASP.NET Core is registered in ConfigureServices method of Startup class.
Add services.AddSingleton
Add services.AddScoped
Add services.AddTransient
Inceptor in Angular is a service that allows intercepting HTTP requests and responses.
Inceptor is used for modifying requests or responses before they are sent or received.
It can be used for adding headers, logging, error handling, etc.
Example: intercepting requests to add authentication token.
Read-only variables can be modified by the program, while const variables cannot be changed.
Read-only variables can be modified by the program during runtime, while const variables cannot be changed at all.
Using 'const' keyword ensures that the value of the variable remains constant throughout the program.
Read-only variables are typically used when the value needs to be initialized at runtime, while const variables are...
I applied via Naukri.com and was interviewed in Mar 2021. There was 1 interview round.
I appeared for an interview in Jun 2024.
Using a crypto price API to fetch and display real-time cryptocurrency prices in a machine coding project.
Utilize a crypto price API to fetch real-time cryptocurrency prices
Implement error handling for API requests
Display the fetched prices in a user-friendly format
I applied via Referral and was interviewed before Jan 2021. There were 3 interview rounds.
OOPs concepts are used in real life to model objects and their behavior.
Encapsulation: A car's engine is encapsulated and can only be accessed through specific methods.
Inheritance: A sports car is a type of car that inherits properties and methods from the car class.
Polymorphism: A person can be a student, teacher, or employee, each with their own unique behavior.
Abstraction: A TV remote has buttons that abstract the c...
Hashmap is a data structure that stores key-value pairs and uses hashing to locate values based on their keys.
Hashmap uses an array of linked lists to store key-value pairs.
The hash function is used to convert the key into an index of the array.
If two keys have the same hash value, they are stored in the same linked list.
Hashmap provides constant time complexity for insertion, deletion, and retrieval of values.
Java's H...
I applied via Referral and was interviewed in Jul 2021. There were 4 interview rounds.
posted on 8 Jan 2025
I applied via Job Portal and was interviewed before Mar 2023. There were 3 interview rounds.
I applied via Job Portal
based on 1 interview
Interview experience
based on 4 reviews
Rating in categories
Senior Software Engineer
813
salaries
| ₹6.8 L/yr - ₹22 L/yr |
Software Engineer
585
salaries
| ₹4 L/yr - ₹12.7 L/yr |
Technical Lead
519
salaries
| ₹8.9 L/yr - ₹30 L/yr |
Senior Quality Engineer
246
salaries
| ₹5.5 L/yr - ₹15.1 L/yr |
Associate Technical Architect
233
salaries
| ₹14 L/yr - ₹40 L/yr |
Xoriant
Photon Interactive
CitiusTech
Iris Software