i
Tavant Technologies
Filter interviews by
I applied via Referral and was interviewed in Jan 2022. There were 3 interview rounds.
I have experience using containerization tools like Docker and Kubernetes for microservices deployment.
I have used Docker to create container images for each microservice.
I have used Kubernetes to manage the deployment, scaling, and load balancing of the microservices.
I have also used Helm charts to package and deploy the microservices as a group.
I have implemented CI/CD pipelines using tools like Jenkins or GitLab to ...
I have used various design patterns such as Singleton, Factory, Observer, and Decorator.
Singleton pattern was used to ensure only one instance of a class is created.
Factory pattern was used to create objects without exposing the instantiation logic to the client.
Observer pattern was used to notify the dependent objects when there is a change in the state of an object.
Decorator pattern was used to add new functionality ...
A singleton class is a class that can only be instantiated once. It is important to secure it in a multi-threading environment.
Create a private constructor to prevent external instantiation
Create a private static instance of the class
Create a public static method to return the instance
Use synchronized keyword to ensure thread safety
Consider using double-checked locking to improve performance
String is immutable to ensure thread safety and security. Yes, we can write our own immutable class.
String is immutable to prevent accidental modification of data.
Immutable classes ensure thread safety and security.
We can write our own immutable class by making all fields final and not providing any setters.
Examples of immutable classes are String, Integer, and LocalDate.
Code to find repeated characters in string with count using Java 8
Convert string to char array
Use streams to group by character and count
Filter out characters with count less than 2
Print the repeated characters with their count
Get third highest salary in given employee list using Java 8
Sort the employee list in descending order of salary using Comparator
Use distinct() to remove duplicates
Skip the first two highest salaries using skip()
Use findFirst() to get the third highest salary
Functional programming focuses on functions while object oriented programming focuses on objects and their interactions.
Functional programming emphasizes immutability and avoids side effects.
Object oriented programming uses classes and objects to encapsulate data and behavior.
Functional programming languages include Haskell and Lisp while object oriented programming languages include Java and C++.
Functional programming...
Yes, I have configured saga design pattern in my project.
I have used saga design pattern to manage complex workflows and transactions.
I have implemented sagas using libraries like Redux-Saga and NServiceBus.
I have used sagas to handle scenarios like order processing, payment processing, and inventory management.
I have also used sagas to handle compensating transactions in case of failures.
We secure our microservices using a combination of authentication, authorization, encryption, and monitoring.
We use OAuth2 for authentication and authorization.
We encrypt sensitive data using AES-256 encryption.
We use SSL/TLS for secure communication between microservices.
We implement rate limiting to prevent DDoS attacks.
We monitor our microservices using tools like Prometheus and Grafana.
We perform regular security a
Yes, I have extensive experience in implementing CI/CD pipelines.
I have worked with tools like Jenkins, GitLab CI/CD, and Travis CI.
I have automated build, test, and deployment processes for multiple projects.
I have integrated code quality checks and security scans into the pipeline.
I have also implemented blue-green and canary deployment strategies.
Overall, I understand the importance of continuous integration and del
Circuit breaker is used to prevent cascading failures in distributed systems.
Circuit breaker is used to handle faults in microservices architecture.
It is used to prevent overloading of a service by temporarily stopping requests to it.
It helps in improving the resilience of the system by handling failures gracefully.
Example: If a service is down, circuit breaker will stop sending requests to it and will try again after ...
Orchestration and choreography are design patterns used in distributed systems.
Orchestration involves a central controller that coordinates the interactions between services.
Choreography involves services communicating with each other directly without a central controller.
Orchestration is more suitable for complex workflows while choreography is more flexible.
Examples of orchestration tools include Kubernetes and Apach...
JWT tokens are implemented and validated using a combination of server-side and client-side code.
The server generates a JWT token and sends it to the client upon successful authentication.
The client stores the token in local storage or a cookie.
For each subsequent request, the client sends the token in the Authorization header.
The server verifies the token's signature and expiration time before processing the request.
I...
Constructor injection is preferred over Setter injection.
Constructor injection ensures that all required dependencies are provided at the time of object creation.
Setter injection allows for optional dependencies and can be used for dynamic changes.
Constructor injection is more secure as the object is fully initialized before use.
Setter injection can lead to inconsistent object states if not used carefully.
Constructor i...
Autowire simplifies dependency injection in Spring by automatically wiring beans together.
Autowire eliminates the need for manual bean wiring in XML configuration files.
It reduces the amount of boilerplate code needed to configure dependencies.
Autowire can be used with different types of injection, such as constructor, setter, and field injection.
Example: @Autowired private MyService myService; will automatically injec...
Difference between @Configuration and @Component annotations
The @Configuration annotation is used to define a configuration class that provides bean definitions
The @Component annotation is used to mark a class as a Spring component
Configuration classes can be imported into other configuration classes using @Import annotation
Components can be scanned and automatically registered as beans using @ComponentScan annotation
I have worked with various design patterns including MVC, Singleton, Factory, and Observer.
MVC pattern for separating concerns in web applications
Singleton pattern for ensuring only one instance of a class is created
Factory pattern for creating objects without exposing the instantiation logic
Observer pattern for implementing event-driven architectures
I was interviewed before Aug 2022.
The content-type for attaching a file in a post request is 'multipart/form-data'.
The content-type 'multipart/form-data' is used when submitting forms that contain files.
It allows multiple parts to be combined into a single body, each part representing a different form field or file.
The 'Content-Disposition' header is used to specify the name of the file being uploaded.
To navigate between different windows in Selenium code, use getWindowHandles() to get all window handles and switchTo() to switch between them.
Use getWindowHandles() to get all window handles
Use switchTo() to switch between windows
Example: Set
I applied via Recruitment Consulltant and was interviewed in Nov 2024. There were 3 interview rounds.
Tavant Technologies interview questions for popular designations
I was interviewed in Jun 2024.
Polymorphism is the ability of a single function or method to operate on different types of data.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).
Example of compile-time polymorphism: function overloading where multiple functions have the same name but different paramete...
Abstract classes and interfaces are used in object-oriented programming to define common behavior and structure for classes.
Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
Classes can implement multiple interfaces but can only inherit from one abstract class.
Abstract classes can have constructors, while interfaces cannot.
Example: abstract class Animal { abs...
To improve performance of a Stored procedure, optimize query, use indexes, minimize data retrieval, and avoid cursors.
Optimize query by using proper indexing
Minimize data retrieval by fetching only required columns
Avoid using cursors for looping through data
Use SET NOCOUNT ON to stop the message indicating the number of rows affected by a Transact-SQL statement
JWT stands for JSON Web Token, a compact and self-contained way for securely transmitting information between parties as a JSON object.
JWT is commonly used for authentication and information exchange in web development.
It consists of three parts: header, payload, and signature.
The header typically consists of the type of token and the signing algorithm being used.
The payload contains the claims, which are statements ab...
Dependency Injection is a design pattern in which components are given their dependencies rather than creating them internally.
Allows for easier testing by providing mock dependencies
Promotes loose coupling between components
Improves code reusability and maintainability
Commonly used in frameworks like Spring in Java
Dependency Injection in ASP.NET Core is registered in ConfigureServices method of Startup class.
Add services.AddSingleton
Add services.AddScoped
Add services.AddTransient
Inceptor in Angular is a service that allows intercepting HTTP requests and responses.
Inceptor is used for modifying requests or responses before they are sent or received.
It can be used for adding headers, logging, error handling, etc.
Example: intercepting requests to add authentication token.
Read-only variables can be modified by the program, while const variables cannot be changed.
Read-only variables can be modified by the program during runtime, while const variables cannot be changed at all.
Using 'const' keyword ensures that the value of the variable remains constant throughout the program.
Read-only variables are typically used when the value needs to be initialized at runtime, while const variables are...
Get interview-ready with Top Tavant Technologies Interview Questions
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
SOLID is a set of five design principles to make software designs more understandable, flexible, and maintainable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without aff...
Multitenancy is a software architecture where a single instance of the software serves multiple customers, known as tenants.
Allows multiple users (tenants) to access the same application while keeping their data isolated
Reduces costs by sharing resources among multiple users
Customization options for each tenant to meet their specific needs
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
CopyOnWriteArrayList is a thread-safe variant of ArrayList where all mutative operations (add, set, remove, etc) are implemented by making a fresh copy of the underlying array.
CopyOnWriteArrayList is part of the java.util.concurrent package in Java.
It is used in scenarios where reads are far more common than writes, as it allows for high read concurrency without the need for synchronization.
It is particularly useful in...
Java8 Stream provides a functional approach to processing collections of objects.
Allows for functional-style operations on collections like map, filter, reduce
Supports parallel processing for improved performance
Lazy evaluation allows for efficient processing of large datasets
Reduces boilerplate code and promotes cleaner, more concise code
Example: List
Public subnet allows internet access, while private subnet does not.
Public subnet has a route to the internet gateway, while private subnet does not.
Instances in public subnet can have public IP addresses, while instances in private subnet cannot.
Public subnet is typically used for resources that need to be accessed from the internet, while private subnet is used for resources that should not be directly accessible fro
I applied via Naukri.com and was interviewed in May 2024. There were 2 interview rounds.
Indexing is a technique used to optimize the performance of databases by allowing faster retrieval of data.
Indexing creates a data structure that improves the speed of data retrieval operations in a database.
It works by creating an index on one or more columns in a table, allowing the database to quickly locate the rows that match a certain condition.
Examples of indexing include creating indexes on primary keys, foreig
An LWC component for displaying a list of contacts
Create a new LWC component with the necessary HTML, CSS, and JavaScript files
Use the @wire decorator to fetch a list of contacts from Salesforce
Display the list of contacts using HTML template and iterate over the data
I applied via Naukri.com and was interviewed in Mar 2024. There were 2 interview rounds.
Active Directory is a directory service developed by Microsoft for Windows domain networks.
Centralized database for managing network resources
Stores information about users, computers, and other network objects
Used for authentication, authorization, and configuration
Enables single sign-on for users across multiple applications and services
Yes, I am familiar with VPN, Task Manager, and Control Panel. I have used them in various real-life scenarios.
VPN stands for Virtual Private Network and is used to securely connect to a private network over the internet.
Task Manager is a system monitor and task manager utility that provides information about the processes and applications running on a computer.
Control Panel is a centralized hub in Windows operating sys...
Technical support involves providing assistance and troubleshooting for technical issues related to software, hardware, or other technology.
Providing assistance to users experiencing technical issues
Troubleshooting software, hardware, and network problems
Installing and configuring software and hardware
Maintaining documentation of technical issues and solutions
Communicating effectively with users to resolve issues
I am a dedicated Technical Support Analyst with 5 years of experience in troubleshooting hardware and software issues.
5 years of experience in technical support
Proficient in troubleshooting hardware and software issues
Strong communication and problem-solving skills
I pursued the course to enhance my technical skills and am interested in this role for the opportunity to apply my knowledge in a practical setting.
To enhance my technical skills and knowledge
Interest in applying knowledge in a practical setting
Passion for troubleshooting and problem-solving
Desire to work in a dynamic and challenging environment
I applied via Campus Placement
Generic aptitude test questions from campus recruitment
Engaging GD and good moderators
Top trending discussions
Some of the top questions asked at the Tavant Technologies interview -
The duration of Tavant Technologies interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 58 interviews
Interview experience
based on 603 reviews
Rating in categories
Noida,
Hyderabad / Secunderabad
+114-20 Yrs
Not Disclosed
Senior Software Engineer
807
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
580
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
519
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Technical Architect
263
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Quality Engineer
247
salaries
| ₹0 L/yr - ₹0 L/yr |
Infosys
Wipro
Tech Mahindra
HCLTech