Filter interviews by
Be the first one to contribute and help others!
posted on 20 Oct 2023
I applied via Naukri.com and was interviewed in Sep 2023. There were 2 interview rounds.
JDK is a development kit that includes JRE and tools for developing Java applications. JRE is a runtime environment for executing Java programs. JVM is a virtual machine that runs Java bytecode.
JDK (Java Development Kit) includes JRE (Java Runtime Environment) and development tools like compiler and debugger.
JRE (Java Runtime Environment) is a software package that provides the libraries and components necessary for ru...
Static variables are shared among all instances of a class, while volatile variables are used to indicate that a variable's value will be modified by different threads.
Static variables are initialized only once at the start of the program and retain their value throughout the program's execution.
Volatile variables are used to ensure visibility of changes to variables across multiple threads.
Static variables are accesse...
Final keyword is used in Java to declare constants, prevent method overriding, and prevent class inheritance.
Used to declare constants - value cannot be changed once assigned
Prevents method overriding - method cannot be overridden in child classes
Prevents class inheritance - class cannot be extended
Parallel stream allows processing elements concurrently, while stream processes elements sequentially.
Parallel stream can improve performance by utilizing multiple threads for processing.
Stream processes elements one by one in a sequential manner.
Example: stream().parallel() vs stream().sequential()
Streams are used in Java to process collections of objects in a functional style.
Streams allow for concise and readable code when working with collections.
They support operations like filter, map, reduce, and collect.
Streams can be sequential or parallel, depending on the processing requirements.
Example: List
posted on 13 Dec 2023
I applied via Approached by Company and was interviewed in Jun 2023. There were 3 interview rounds.
General Math assessment
I applied via Approached by Company and was interviewed before Nov 2020. There was 1 interview round.
I applied via campus placement at Vellore Institute of Technology (VIT) and was interviewed in Oct 2022. There were 5 interview rounds.
It was a combination of coding and aptitude test. The test had four section and each section had it's time limit.
Polymorphism is the ability of an object to take on many forms.
Polymorphism allows objects of different classes to be treated as if they are of the same class.
It can be achieved through method overloading or method overriding.
For example, a parent class Animal can have child classes like Dog, Cat, and Bird, each with their own unique implementation of the method 'makeSound'.
SQL is a relational database management system, while NoSQL is a non-relational database management system.
SQL databases use structured query language for defining and manipulating the data.
NoSQL databases are schema-less and use various data models like key-value, document, columnar, or graph.
SQL databases are suitable for complex queries and transactions.
NoSQL databases are horizontally scalable and provide high perf...
I applied via Campus Placement and was interviewed in Jul 2022. There were 3 interview rounds.
There will be some mcq and coding questions.
posted on 20 Apr 2022
I applied via Naukri.com and was interviewed in Mar 2022. There were 2 interview rounds.
Router and filter transformations are used in Informatica for data filtering, but they have different functionalities.
Router transformation is used to route data based on specified conditions to multiple output groups.
Filter transformation is used to filter rows based on specified conditions and pass only the matching rows to the output.
Router transformation can have multiple output groups, each with its own condition.
...
Duplicates in mappings can be handled using various techniques in Informatica.
Use the Sorter transformation to sort the data and then use the Aggregator transformation to eliminate duplicates.
Use the Expression transformation with the DISTINCT keyword to remove duplicates.
Use the Rank transformation to rank the data and then filter out the duplicates based on the rank.
Use the Lookup transformation to check for duplicat...
To select the last 10 lines from a file in Informatica mapping, use the Source Qualifier transformation with a SQL override.
Add a Source Qualifier transformation to the mapping.
In the Source Qualifier transformation, specify the file as the source and set the appropriate file properties.
Write a SQL override in the Source Qualifier transformation to select the last 10 lines from the file.
Use the ROWNUM pseudocolumn or t...
Lookups in Informatica are used to retrieve data from a reference table based on a matching condition.
Lookups are used to perform data transformations and enrich the data in a mapping.
There are three types of lookups in Informatica: Connected, Unconnected, and Static.
Connected lookup returns multiple rows and can be used in any transformation.
Unconnected lookup returns a single value and is used in expressions or trans...
I have extensive experience in performance optimization of Informatica workflows and mappings.
Identifying and resolving performance bottlenecks
Tuning SQL queries and optimizing database connections
Optimizing transformations and reducing data processing time
Using partitioning and parallel processing for improved performance
Monitoring and analyzing session logs and performance statistics
Implementing caching and lookup op...
Push down optimization is a technique used in Informatica to improve performance by pushing data transformation operations to the source or target database.
Push down optimization reduces the amount of data transferred between the source and target systems.
It allows the database engine to perform transformations, aggregations, and filtering, leveraging its processing power.
By pushing down operations, Informatica minimiz...
Display the 10th line from a file in Unix.
Use the 'head' command to display the first 10 lines of the file.
Then use the 'tail' command to display the last line from the first 10 lines.
Combine both commands using a pipe ('|') to display the 10th line directly.
Display duplicate lines from a file in Unix.
Use the 'sort' command to sort the lines in the file.
Use the 'uniq' command with the '-d' option to display only the duplicate lines.
Redirect the output to a new file or display it on the console.
The Python code to check if a string starts with 'a' and has 4-8 'd' after that.
Use the startswith() method to check if the string starts with 'a'.
Use the count() method to count the occurrences of 'd' in the string.
Check if the count of 'd' is between 4 and 8 (inclusive).
To find disk usage of a specific directory in Unix, use the 'du' command.
Open the terminal and navigate to the desired directory
Run the 'du' command followed by the directory path
The command will display the disk usage in bytes for each file and subdirectory within the specified directory
To get the disk usage in human-readable format, use the '-h' option with 'du'
To sort the output by disk usage, use the '-s' option wi
In a left join, all the rows from the left table are included in the result set, along with matching rows from the right table.
Left join returns all rows from the left table and the matching rows from the right table
If there is no match, NULL values are returned for the columns of the right table
Left join is used to retrieve data from multiple tables based on a related column
I would address the issue by identifying the root cause, communicating with the client, and implementing necessary changes.
Identify the reasons for not meeting client expectations
Communicate with the client to understand their concerns and expectations
Evaluate the development process and identify areas for improvement
Implement necessary changes to meet client expectations
Ensure effective communication and collaboration...
I would handle the scenario by following a structured approach and effectively communicating with the team.
Assess the impact of the change on team workings
Identify the key challenges and areas of concern
Develop a structured plan to address the issues
Communicate the plan to the team and seek their input
Implement the plan while providing necessary support and guidance
Monitor the progress and make adjustments as needed
Reg...
I would handle the scenario by following a structured approach and effective communication.
Identify all the teams and stakeholders involved
Establish clear communication channels
Schedule regular meetings to discuss progress and address any issues
Document and track all interactions and decisions
Ensure everyone is aligned on goals and expectations
Provide regular updates and status reports
Resolve conflicts or disagreements...
Cloud computing offers scalability, cost-effectiveness, flexibility, and improved security compared to on-premise datacenters.
Scalability: Cloud allows easy scaling up or down of resources based on demand.
Cost-effectiveness: Cloud eliminates the need for upfront hardware and infrastructure investments.
Flexibility: Cloud enables easy access to data and applications from anywhere, anytime.
Improved security: Cloud provide...
I have extensive experience in performance optimization in SQL.
Identifying and optimizing slow queries
Creating and maintaining appropriate indexes
Using query execution plans to identify bottlenecks
Optimizing database schema and table design
Using appropriate data types and constraints
Caching and data caching techniques
Partitioning large tables
Optimizing query parameters and joins
Using stored procedures and views for per
posted on 16 Mar 2021
I applied via Approached by Company and was interviewed in Dec 2021. There were 2 interview rounds.
I applied via Referral
I applied via Naukri.com and was interviewed in Sep 2021. There was 1 interview round.
BWP part concept refers to the concept of breaking down a software system into smaller, more manageable parts.
BWP stands for Break-When-Problematic
It helps in identifying and isolating issues in the system
Each part should have a clear responsibility and interface with other parts
Corset is a tight-fitting undergarment worn to shape and support the torso.
Corsets were popular in the Victorian era.
They were worn by women to achieve an hourglass figure.
Modern corsets are often used as fashion statements or for waist training.
Corsets can be made of various materials such as satin, leather, or lace.
They can be fastened with laces, hooks, or zippers.
UE attach procedure is a process in LTE network where a UE establishes a connection with the network.
UE sends RRC Connection Request message to eNodeB
eNodeB sends RRC Connection Setup message to UE
UE sends RRC Connection Setup Complete message to eNodeB
eNodeB sends RRC Connection Reconfiguration message to UE
UE sends RRC Connection Reconfiguration Complete message to eNodeB
UE is now attached to the network
I am not using any numerology in my work as a Senior Software Engineer.
I do not believe in numerology and do not use it in my work.
My focus is on writing efficient and effective code.
Numerology has no place in software engineering.
RB's bandwidth usage depends on the specific product and its features.
RB's have different bandwidth usage depending on the product
The bandwidth usage also depends on the features of the product
Examples of RB's with different bandwidth usage are RB750Gr3 and RB4011iGS+RM
CCE stands for Continuous and Comprehensive Evaluation.
CCE is a system of evaluation in education that assesses students' progress continuously throughout the year.
It is a comprehensive approach that takes into account various aspects of a student's development, including academic, social, and emotional.
CCE aims to reduce the emphasis on rote learning and promote a more holistic approach to education.
It was introduced ...
To find a loop in a linked list, use Floyd's cycle-finding algorithm.
Use two pointers, one moving at a rate of one node per iteration and the other moving at a rate of two nodes per iteration.
If there is a loop, the two pointers will eventually meet at the same node.
If there is no loop, the faster pointer will reach the end of the list.
Time complexity: O(n), Space complexity: O(1)
WAP set bit or reset bit is a programming concept used to manipulate individual bits in a binary number.
Setting a bit involves changing its value from 0 to 1.
Resetting a bit involves changing its value from 1 to 0.
This concept is commonly used in low-level programming and hardware manipulation.
Example: Setting the 3rd bit of a binary number 1010 would result in 1110.
Example: Resetting the 2nd bit of a binary number 110
Semaphore is a synchronization object used to control access to a shared resource.
Semaphore is a signaling mechanism used to control access to a shared resource
It maintains a count of available resources and blocks the thread if the count is zero
Semaphore can be used to implement critical sections, mutexes, and barriers
Examples include controlling access to a database or limiting the number of concurrent connections
Arrays are faster for random access, while linked lists are better for frequent insertions and deletions.
Arrays have a fixed size, while linked lists can grow dynamically.
Arrays are stored in contiguous memory, while linked lists use pointers to connect nodes.
Accessing an element in an array is O(1), while in a linked list it is O(n).
Inserting or deleting an element in an array is O(n), while in a linked list it is O(1...
The command used for taking Wireshark logs is 'tcpdump'.
Wireshark is a network protocol analyzer tool
Tcpdump is a command-line tool used to capture network traffic
Tcpdump can be used to capture packets and save them as a file for analysis in Wireshark
Example command: tcpdump -i eth0 -w capture.pcap
Use command line tools like 'ps' or 'top' to find the number of running processes on a server.
Use 'ps aux' command to list all running processes and count the number of lines
Use 'top' command and look for the 'Tasks' section which shows the number of running processes
Use 'htop' command which provides a more interactive and detailed view of running processes
Ericsson
Nokia
Huawei Technologies
ACT Fibernet