Add office photos
Engaged Employer

Tavant Technologies

3.9
based on 560 Reviews
Filter interviews by

60+ Nippon Koei India Interview Questions and Answers

Updated 25 Nov 2024
Popular Designations

Q1. Can you tell me what are the design patterns you worked?

Ans.

I have worked with various design patterns including MVC, Singleton, Factory, and Observer.

  • MVC pattern for separating concerns in web applications

  • Singleton pattern for ensuring only one instance of a class is created

  • Factory pattern for creating objects without exposing the instantiation logic

  • Observer pattern for implementing event-driven architectures

View 1 answer

Q2. Why string is immutable , is it possible to write our own immutable class?

Ans.

String is immutable to ensure thread safety and security. Yes, we can write our own immutable class.

  • String is immutable to prevent accidental modification of data.

  • Immutable classes ensure thread safety and security.

  • We can write our own immutable class by making all fields final and not providing any setters.

  • Examples of immutable classes are String, Integer, and LocalDate.

Add your answer

Q3. Do you know difference between functional programming and object oriented programming?

Ans.

Functional programming focuses on functions while object oriented programming focuses on objects and their interactions.

  • Functional programming emphasizes immutability and avoids side effects.

  • Object oriented programming uses classes and objects to encapsulate data and behavior.

  • Functional programming languages include Haskell and Lisp while object oriented programming languages include Java and C++.

  • Functional programming is often used for mathematical computations while object ...read more

Add your answer

Q4. What is the real time scenario , where you are using the circuit breaker ?

Ans.

Circuit breaker is used to prevent cascading failures in distributed systems.

  • Circuit breaker is used to handle faults in microservices architecture.

  • It is used to prevent overloading of a service by temporarily stopping requests to it.

  • It helps in improving the resilience of the system by handling failures gracefully.

  • Example: If a service is down, circuit breaker will stop sending requests to it and will try again after a specified time interval.

  • It is also used for monitoring t...read more

Add your answer
Discover Nippon Koei India interview dos and don'ts from real experiences

Q5. How you previously handling microservices deployment?

Ans.

I have experience using containerization tools like Docker and Kubernetes for microservices deployment.

  • I have used Docker to create container images for each microservice.

  • I have used Kubernetes to manage the deployment, scaling, and load balancing of the microservices.

  • I have also used Helm charts to package and deploy the microservices as a group.

  • I have implemented CI/CD pipelines using tools like Jenkins or GitLab to automate the deployment process.

  • I have monitored the micro...read more

Add your answer

Q6. How you implementing and validating the JWT token ?

Ans.

JWT tokens are implemented and validated using a combination of server-side and client-side code.

  • The server generates a JWT token and sends it to the client upon successful authentication.

  • The client stores the token in local storage or a cookie.

  • For each subsequent request, the client sends the token in the Authorization header.

  • The server verifies the token's signature and expiration time before processing the request.

  • If the token is invalid or expired, the server returns a 40...read more

Add your answer
Are these interview questions helpful?

Q7. Which one is best constructor injection or Setter injection?

Ans.

Constructor injection is preferred over Setter injection.

  • Constructor injection ensures that all required dependencies are provided at the time of object creation.

  • Setter injection allows for optional dependencies and can be used for dynamic changes.

  • Constructor injection is more secure as the object is fully initialized before use.

  • Setter injection can lead to inconsistent object states if not used carefully.

  • Constructor injection is easier to test and maintain.

  • Setter injection c...read more

Add your answer

Q8. Have you configured saga design pattern in your project?

Ans.

Yes, I have configured saga design pattern in my project.

  • I have used saga design pattern to manage complex workflows and transactions.

  • I have implemented sagas using libraries like Redux-Saga and NServiceBus.

  • I have used sagas to handle scenarios like order processing, payment processing, and inventory management.

  • I have also used sagas to handle compensating transactions in case of failures.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Write own singleton class and secure it in multi threading environment?

Ans.

A singleton class is a class that can only be instantiated once. It is important to secure it in a multi-threading environment.

  • Create a private constructor to prevent external instantiation

  • Create a private static instance of the class

  • Create a public static method to return the instance

  • Use synchronized keyword to ensure thread safety

  • Consider using double-checked locking to improve performance

Add your answer

Q10. Write code to find repeated characters in string with count using java 8?

Ans.

Code to find repeated characters in string with count using Java 8

  • Convert string to char array

  • Use streams to group by character and count

  • Filter out characters with count less than 2

  • Print the repeated characters with their count

Add your answer

Q11. Do you know about orchestration and choreography design patterns?

Ans.

Orchestration and choreography are design patterns used in distributed systems.

  • Orchestration involves a central controller that coordinates the interactions between services.

  • Choreography involves services communicating with each other directly without a central controller.

  • Orchestration is more suitable for complex workflows while choreography is more flexible.

  • Examples of orchestration tools include Kubernetes and Apache Airflow.

  • Examples of choreography tools include Apache Ka...read more

Add your answer

Q12. Get third highest salary in given employee list use java 8?

Ans.

Get third highest salary in given employee list using Java 8

  • Sort the employee list in descending order of salary using Comparator

  • Use distinct() to remove duplicates

  • Skip the first two highest salaries using skip()

  • Use findFirst() to get the third highest salary

Add your answer

Q13. Difference between @Configuration and @Component annotations?

Ans.

Difference between @Configuration and @Component annotations

  • The @Configuration annotation is used to define a configuration class that provides bean definitions

  • The @Component annotation is used to mark a class as a Spring component

  • Configuration classes can be imported into other configuration classes using @Import annotation

  • Components can be scanned and automatically registered as beans using @ComponentScan annotation

Add your answer

Q14. Introduce Your Self? Explain 4 Pillars of OOPS? Explain Different types of Normalization? Explain Heap Tree and Give Real world Example? Explain Quick and Merge Sort ? What is the Time Complexity of Quick and M...

read more
Ans.

Answers to questions asked in a Software Engineer Trainee interview

  • 4 pillars of OOPS: Abstraction, Encapsulation, Inheritance, Polymorphism

  • Normalization types: 1NF, 2NF, 3NF, BCNF

  • Heap tree: complete binary tree, used in heap sort, priority queue

  • Quick sort: divide and conquer, worst case O(n^2), best case O(nlogn)

  • Merge sort: divide and conquer, always O(nlogn)

  • Join types: inner, outer, left, right

  • Class and constructor can be made private

  • Method is used to perform an action, cons...read more

Add your answer

Q15. Have you involved in CI/CD process ?

Ans.

Yes, I have extensive experience in implementing CI/CD pipelines.

  • I have worked with tools like Jenkins, GitLab CI/CD, and Travis CI.

  • I have automated build, test, and deployment processes for multiple projects.

  • I have integrated code quality checks and security scans into the pipeline.

  • I have also implemented blue-green and canary deployment strategies.

  • Overall, I understand the importance of continuous integration and delivery in modern software development.

Add your answer

Q16. Why we need Autowire in Spring ?

Ans.

Autowire simplifies dependency injection in Spring by automatically wiring beans together.

  • Autowire eliminates the need for manual bean wiring in XML configuration files.

  • It reduces the amount of boilerplate code needed to configure dependencies.

  • Autowire can be used with different types of injection, such as constructor, setter, and field injection.

  • Example: @Autowired private MyService myService; will automatically inject the MyService bean into the field.

  • Example: @Autowired pu...read more

Add your answer

Q17. How you securing your microservices?

Ans.

We secure our microservices using a combination of authentication, authorization, encryption, and monitoring.

  • We use OAuth2 for authentication and authorization.

  • We encrypt sensitive data using AES-256 encryption.

  • We use SSL/TLS for secure communication between microservices.

  • We implement rate limiting to prevent DDoS attacks.

  • We monitor our microservices using tools like Prometheus and Grafana.

  • We perform regular security audits and penetration testing.

Add your answer

Q18. Explain about design patterns you used ?

Ans.

I have used various design patterns such as Singleton, Factory, Observer, and Decorator.

  • Singleton pattern was used to ensure only one instance of a class is created.

  • Factory pattern was used to create objects without exposing the instantiation logic to the client.

  • Observer pattern was used to notify the dependent objects when there is a change in the state of an object.

  • Decorator pattern was used to add new functionality to an existing object without altering its structure.

Add your answer

Q19. What is the benefit of Java8 Stream?

Ans.

Java8 Stream provides a functional approach to processing collections of objects.

  • Allows for functional-style operations on collections like map, filter, reduce

  • Supports parallel processing for improved performance

  • Lazy evaluation allows for efficient processing of large datasets

  • Reduces boilerplate code and promotes cleaner, more concise code

  • Example: List names = Arrays.asList("Alice", "Bob", "Charlie"); names.stream().filter(name -> name.startsWith("A")).forEach(System.out::pri...read more

Add your answer

Q20. Do you know about VPN, Task manager and what is the use of the control panel?,where did you used it in real life scenario?

Ans.

Yes, I am familiar with VPN, Task Manager, and Control Panel. I have used them in various real-life scenarios.

  • VPN stands for Virtual Private Network and is used to securely connect to a private network over the internet.

  • Task Manager is a system monitor and task manager utility that provides information about the processes and applications running on a computer.

  • Control Panel is a centralized hub in Windows operating systems where users can view and adjust system settings.

  • I hav...read more

Add your answer

Q21. How to prevent sql injection?

Ans.

Prevent SQL injection by using parameterized queries and input validation.

  • Use parameterized queries instead of concatenating user input with SQL statements

  • Sanitize and validate user input before using it in a query

  • Limit database privileges for the user account used by the application

  • Use prepared statements and stored procedures

  • Avoid displaying database error messages to users

Add your answer

Q22. How to register dependency Injection in asp.net core??

Ans.

Dependency Injection in ASP.NET Core is registered in ConfigureServices method of Startup class.

  • Add services.AddSingleton(); for singleton lifetime

  • Add services.AddScoped(); for scoped lifetime

  • Add services.AddTransient(); for transient lifetime

Add your answer

Q23. what is indexing

Ans.

Indexing is a technique used to optimize the performance of databases by allowing faster retrieval of data.

  • Indexing creates a data structure that improves the speed of data retrieval operations in a database.

  • It works by creating an index on one or more columns in a table, allowing the database to quickly locate the rows that match a certain condition.

  • Examples of indexing include creating indexes on primary keys, foreign keys, and frequently queried columns.

Add your answer

Q24. What is CopyOnWriteArrayList?

Ans.

CopyOnWriteArrayList is a thread-safe variant of ArrayList where all mutative operations (add, set, remove, etc) are implemented by making a fresh copy of the underlying array.

  • CopyOnWriteArrayList is part of the java.util.concurrent package in Java.

  • It is used in scenarios where reads are far more common than writes, as it allows for high read concurrency without the need for synchronization.

  • It is particularly useful in situations where you have a large number of reads and onl...read more

Add your answer

Q25. How to improve performance of an Stored procedure

Ans.

To improve performance of a Stored procedure, optimize query, use indexes, minimize data retrieval, and avoid cursors.

  • Optimize query by using proper indexing

  • Minimize data retrieval by fetching only required columns

  • Avoid using cursors for looping through data

  • Use SET NOCOUNT ON to stop the message indicating the number of rows affected by a Transact-SQL statement

Add your answer

Q26. What is the content-type for attaching file in post request?

Ans.

The content-type for attaching a file in a post request is 'multipart/form-data'.

  • The content-type 'multipart/form-data' is used when submitting forms that contain files.

  • It allows multiple parts to be combined into a single body, each part representing a different form field or file.

  • The 'Content-Disposition' header is used to specify the name of the file being uploaded.

Add your answer

Q27. How to navigate between different windows selenium code?

Ans.

To navigate between different windows in Selenium code, use getWindowHandles() to get all window handles and switchTo() to switch between them.

  • Use getWindowHandles() to get all window handles

  • Use switchTo() to switch between windows

  • Example: Set windowHandles = driver.getWindowHandles(); driver.switchTo().window(windowHandles.toArray()[1]);

Add your answer

Q28. Public subnet vs Private subnet in AWS

Ans.

Public subnet allows internet access, while private subnet does not.

  • Public subnet has a route to the internet gateway, while private subnet does not.

  • Instances in public subnet can have public IP addresses, while instances in private subnet cannot.

  • Public subnet is typically used for resources that need to be accessed from the internet, while private subnet is used for resources that should not be directly accessible from the internet.

Add your answer

Q29. What is JVM?

Ans.

JVM stands for Java Virtual Machine. It is a virtual machine that executes Java bytecode.

  • JVM is a part of the Java Runtime Environment (JRE).

  • It provides a platform-independent execution environment for Java programs.

  • JVM interprets Java bytecode and translates it into machine-specific instructions.

  • It manages memory, handles garbage collection, and provides runtime environment for Java applications.

  • JVM supports Just-In-Time (JIT) compilation for performance optimization.

  • Example...read more

View 1 answer

Q30. Budgets about the programas and how you manage clients

Ans.

I manage program budgets by closely monitoring expenses and ensuring they align with client expectations.

  • Regularly review and update budgets to track expenses and ensure they are within scope

  • Communicate with clients to understand their budget constraints and priorities

  • Negotiate with vendors to secure competitive pricing and maximize budget efficiency

Add your answer

Q31. Difference between read-only and const with an example

Ans.

Read-only variables can be modified by the program, while const variables cannot be changed.

  • Read-only variables can be modified by the program during runtime, while const variables cannot be changed at all.

  • Using 'const' keyword ensures that the value of the variable remains constant throughout the program.

  • Read-only variables are typically used when the value needs to be initialized at runtime, while const variables are used for values that should not change.

  • Example: int readO...read more

Add your answer

Q32. Agile methodologies - advantage, but down, burnup charts.

Ans.

Agile methodologies offer advantages such as flexibility and adaptability, but require careful management of burnup charts.

  • Agile methodologies prioritize collaboration and adaptability over rigid planning and documentation.

  • This approach can lead to faster development and more responsive teams.

  • However, it also requires careful management of burnup charts to ensure that progress is being made and goals are being met.

  • Burnup charts can help teams track progress and identify poten...read more

Add your answer

Q33. SQL query to return all the employees who are earning more than their Manager

Add your answer

Q34. Is JVM platform independent?

Ans.

Yes, JVM is platform independent.

  • JVM stands for Java Virtual Machine.

  • It provides a runtime environment for executing Java bytecode.

  • JVM abstracts the underlying hardware and operating system, making Java programs portable.

  • Java programs can run on any platform that has a compatible JVM installed.

  • JVM implementations exist for various operating systems, such as Windows, macOS, Linux, etc.

Add your answer

Q35. What is software testing?

Ans.

Software testing is the process of evaluating a software application or system to ensure it meets the specified requirements.

  • Software testing is done to identify defects or errors in the software.

  • It involves executing the software with test cases and comparing the actual results with expected results.

  • Testing can be performed at different levels such as unit testing, integration testing, system testing, and acceptance testing.

  • Various techniques and tools are used for software ...read more

Add your answer

Q36. Write code on abstract class and interface?

Ans.

Abstract classes and interfaces are used in object-oriented programming to define common behavior and structure for classes.

  • Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.

  • Classes can implement multiple interfaces but can only inherit from one abstract class.

  • Abstract classes can have constructors, while interfaces cannot.

  • Example: abstract class Animal { abstract void makeSound(); } interface Flyable { void fly(); ...read more

Add your answer

Q37. what is active directory and where do you use it?

Ans.

Active Directory is a directory service developed by Microsoft for Windows domain networks.

  • Centralized database for managing network resources

  • Stores information about users, computers, and other network objects

  • Used for authentication, authorization, and configuration

  • Enables single sign-on for users across multiple applications and services

Add your answer

Q38. Fundamentals and life cycle of US mortgage

Ans.

US mortgage life cycle involves origination, underwriting, servicing, and foreclosure.

  • Origination involves the borrower applying for a loan and the lender assessing their creditworthiness.

  • Underwriting involves verifying the borrower's information and determining the loan amount and terms.

  • Servicing involves collecting payments, managing escrow accounts, and handling delinquencies.

  • Foreclosure is the legal process of repossessing the property if the borrower defaults on the loan...read more

Add your answer

Q39. What is Inheritence in Java

Ans.

Inheritance in Java allows a class to inherit properties and methods from another class.

  • Inheritance is a fundamental concept in object-oriented programming.

  • It promotes code reusability and allows for the creation of hierarchical relationships between classes.

  • The class that is being inherited from is called the superclass or parent class, while the class that inherits is called the subclass or child class.

  • The subclass can access the public and protected members of the supercla...read more

Add your answer

Q40. Data structure and how to apply them

Ans.

Data structures are used to organize and store data efficiently in computer memory.

  • Data structures like arrays, linked lists, trees, graphs, and hash tables are commonly used in software engineering.

  • Arrays are used to store elements of the same data type in contiguous memory locations.

  • Linked lists consist of nodes where each node contains data and a reference to the next node.

  • Trees are hierarchical data structures with a root node and child nodes.

  • Graphs are used to represent ...read more

Add your answer

Q41. What is recruitment cycle? What is work life balance?

Ans.

Recruitment cycle is the process of identifying, attracting, interviewing, selecting, and hiring employees.

  • Identifying the need for a new employee

  • Creating a job description and posting it on job boards

  • Reviewing resumes and conducting interviews

  • Selecting the best candidate and making a job offer

  • Onboarding the new employee

  • Monitoring and evaluating the new hire's performance

Add your answer

Q42. How to fix crash in your application

Ans.

To fix a crash in an application, identify the root cause, analyze crash logs, use debugging tools, and test the fix thoroughly.

  • Identify the root cause of the crash by analyzing crash logs and user reports.

  • Use debugging tools like Xcode's debugger or third-party tools like Crashlytics.

  • Implement defensive coding practices to handle edge cases and prevent crashes.

  • Test the fix thoroughly on different devices and iOS versions to ensure stability.

  • Consider using automated testing t...read more

Add your answer

Q43. 1. write a programme for protocol extension.

Ans.

A protocol extension allows adding functionality to existing types without modifying their original implementation.

  • Define a protocol with required methods

  • Create an extension for the protocol

  • Implement the methods in the extension

View 1 answer

Q44. What is Polymorphism ?

Ans.

Polymorphism is the ability of a single function or method to operate on different types of data.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).

  • Example of compile-time polymorphism: function overloading where multiple functions have the same name but different parameters.

  • Example of runtime polymorphism: method overriding wher...read more

Add your answer

Q45. What is inceptor in angular?

Ans.

Inceptor in Angular is a service that allows intercepting HTTP requests and responses.

  • Inceptor is used for modifying requests or responses before they are sent or received.

  • It can be used for adding headers, logging, error handling, etc.

  • Example: intercepting requests to add authentication token.

Add your answer

Q46. What are the Security Features of Snowflake

Add your answer

Q47. Difference between abstract class and interface

Ans.

Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.

  • Abstract class can have constructors, fields, and methods, while interface cannot have any implementation.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Abstract classes are used to define a common behavior for subclasses, while interfaces are used to define a contract for classes to implement.

  • Example: Abstract class 'Animal' w...read more

Add your answer

Q48. What is dependency Injection

Ans.

Dependency Injection is a design pattern in which components are given their dependencies rather than creating them internally.

  • Allows for easier testing by providing mock dependencies

  • Promotes loose coupling between components

  • Improves code reusability and maintainability

  • Commonly used in frameworks like Spring in Java

Add your answer

Q49. Tell about abstraction and encapsulation

Ans.

Abstraction focuses on hiding the implementation details while encapsulation bundles the data and methods into a single unit.

  • Abstraction allows us to focus on the essential features of an object while hiding the irrelevant details.

  • Encapsulation helps in bundling the data and methods that operate on the data into a single unit.

  • Abstraction is achieved through abstract classes and interfaces in object-oriented programming.

  • Encapsulation helps in achieving data hiding and access c...read more

Add your answer

Q50. How to adopt new iOS version

Ans.

Adopting new iOS versions involves staying updated, testing compatibility, updating codebase, and utilizing new features.

  • Stay updated on new iOS versions and features released by Apple.

  • Test compatibility of existing apps with the new iOS version.

  • Update the codebase to ensure compatibility and take advantage of new features.

  • Utilize new features introduced in the latest iOS version to enhance app functionality.

  • Consider redesigning UI/UX to align with the latest iOS design guide...read more

Add your answer

Q51. what is button hierarchy in objective

Ans.

Button hierarchy in Objective-C refers to the order in which buttons are arranged and displayed on the user interface.

  • Button hierarchy determines the visual layout and organization of buttons on a screen.

  • Buttons can be arranged in a linear or hierarchical manner.

  • The hierarchy can be defined using constraints or by using a layout manager.

  • Example: A login screen may have a primary button at the bottom and secondary buttons above it.

Add your answer

Q52. Basic concept of Swift, Primary label of DS

Ans.

Swift is a programming language used for iOS, macOS, watchOS, and tvOS development. Primary label of DS is data structure.

  • Swift is a statically typed language developed by Apple.

  • It is used for developing applications for Apple's platforms.

  • Data structure is a way of organizing and storing data in a computer so that it can be accessed and used efficiently.

  • Examples of data structures include arrays, linked lists, and trees.

Add your answer

Q53. What is timetravel in Snowflake?

Add your answer

Q54. Write the Syntax for Creating External Stage

Add your answer

Q55. what is SOLID principle?

Ans.

SOLID is a set of five design principles to make software designs more understandable, flexible, and maintainable.

  • S - Single Responsibility Principle: A class should have only one reason to change.

  • O - Open/Closed Principle: Software entities should be open for extension but closed for modification.

  • L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality.

  • I - Interface Segregation Princip...read more

Add your answer

Q56. what is Multitenancy?

Ans.

Multitenancy is a software architecture where a single instance of the software serves multiple customers, known as tenants.

  • Allows multiple users (tenants) to access the same application while keeping their data isolated

  • Reduces costs by sharing resources among multiple users

  • Customization options for each tenant to meet their specific needs

Add your answer

Q57. Explain abt JWT

Ans.

JWT stands for JSON Web Token, a compact and self-contained way for securely transmitting information between parties as a JSON object.

  • JWT is commonly used for authentication and information exchange in web development.

  • It consists of three parts: header, payload, and signature.

  • The header typically consists of the type of token and the signing algorithm being used.

  • The payload contains the claims, which are statements about an entity and additional data.

  • The signature is used to...read more

Add your answer

Q58. Oops concept for java

Ans.

Object-oriented programming (OOP) is a programming paradigm that uses objects to represent and manipulate data.

  • OOP allows for modular and reusable code.

  • It emphasizes encapsulation, inheritance, and polymorphism.

  • Java supports OOP through classes, objects, and interfaces.

  • Example: Creating a class 'Car' with properties like 'color' and 'speed', and methods like 'start' and 'stop'.

Add your answer

Q59. xml top-down approach

Ans.

XML top-down approach is a methodology where the structure of an XML document is designed first and then the data is filled in.

  • Design the XML structure before populating it with data

  • Start with the root element and define child elements and their attributes

  • Use XML Schema Definition (XSD) to define the structure and data types

  • Create the XML document based on the defined structure

  • Populate the XML document with data

Add your answer

Q60. finacial of projects

Ans.

Financial aspects of projects involve budgeting, cost estimation, financial tracking, and resource allocation.

  • Budgeting is crucial to ensure that the project stays within financial constraints.

  • Cost estimation helps in predicting the expenses involved in the project.

  • Financial tracking involves monitoring expenses and revenues throughout the project.

  • Resource allocation ensures that funds are distributed efficiently to meet project requirements.

Add your answer

Q61. write an lwc component

Ans.

An LWC component for displaying a list of contacts

  • Create a new LWC component with the necessary HTML, CSS, and JavaScript files

  • Use the @wire decorator to fetch a list of contacts from Salesforce

  • Display the list of contacts using HTML template and iterate over the data

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Nippon Koei India

based on 33 interviews in the last 1 year
Interview experience
3.9
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.1
 • 1.2k Interview Questions
3.8
 • 399 Interview Questions
3.7
 • 367 Interview Questions
3.8
 • 265 Interview Questions
4.0
 • 236 Interview Questions
3.8
 • 133 Interview Questions
View all
Top Tavant Technologies Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter