i
UST
Filter interviews by
I applied via Naukri.com and was interviewed before Apr 2023. There were 2 interview rounds.
Virtual DOM is a lightweight copy of the actual DOM in React, used for efficient updates.
Virtual DOM is a concept where a lightweight copy of the actual DOM is created in memory.
When changes are made to the virtual DOM, React compares it with the actual DOM to identify the minimal number of updates needed.
This process helps in optimizing performance by reducing the number of actual DOM manipulations.
Example: When a use...
Implementing passwordless system involves using alternative authentication methods.
Use email or SMS verification codes
Implement biometric authentication
Utilize hardware security keys
Implement OAuth or OpenID Connect for single sign-on
Leverage FIDO2 standards for passwordless authentication
To create a cookieless system, use alternative methods like local storage or URL parameters for tracking user data.
Use local storage to store user data on the client side
Utilize URL parameters to pass data between pages
Implement server-side session management for user authentication
Consider using JSON Web Tokens (JWT) for secure data transmission
S.O.L.I.D principles are a set of five design principles in object-oriented programming to make software designs more understandable, flexible, and maintainable.
Single Responsibility Principle (SRP) - A class should have only one reason to change.
Open/Closed Principle (OCP) - Software entities should be open for extension but closed for modification.
Liskov Substitution Principle (LSP) - Objects of a superclass should b...
I applied via Naukri.com and was interviewed before Aug 2020. There was 1 interview round.
Container orchestration involves managing and automating the deployment, scaling, and operation of containers.
Use a container orchestration tool like Kubernetes, Docker Swarm, or Apache Mesos
Define the desired state of your containers in a configuration file
Monitor and manage container health and resource usage
Automate scaling and load balancing
Ensure high availability and fault tolerance
Implement security measures
Use ...
I applied via Naukri.com and was interviewed before Dec 2020. There was 1 interview round.
I applied via Naukri.com and was interviewed before May 2020. There was 1 interview round.
I applied via Recruitment Consultant and was interviewed before Jun 2020. There were 3 interview rounds.
Migrating DB2 to other RDBMS involves selecting target RDBMS, exporting data, converting schema, and importing data.
Select the target RDBMS and ensure compatibility with DB2 data types and features
Export data from DB2 using tools like IBM Data Movement Tool or IBM InfoSphere Data Replication
Convert schema to target RDBMS using tools like IBM SQL Compatibility Tool or manual scripting
Import data into target RDBMS using ...
There are various ways to convert files depending on the file type and desired output format.
Use online file converters such as Zamzar or CloudConvert
Use software specific to the file type such as Adobe Acrobat for PDFs
Use command line tools such as ffmpeg for media files
Use programming languages such as Python to write custom conversion scripts
CICS is a transaction processing system that enables communication between applications in a distributed environment.
CICS acts as a middleware between applications and the underlying operating system.
It provides a runtime environment for executing transactions.
CICS supports various programming languages and communication protocols.
It can run on different platforms such as z/OS, Linux, and Windows.
CICS can communicate w...
To access security on CICS screen on distributed system, use CICS Transaction Server Security.
Use CICS Transaction Server Security to control access to CICS resources.
Define security policies and profiles to control access to CICS resources.
Use the CICS Security API to check security status and perform security-related tasks.
Examples of CICS security features include RACF, ACF2, and Top Secret.
Ensure that all users hav...
Migrating Mainframe security to Distributed system requires careful planning and execution.
Identify the security requirements of the Mainframe system
Evaluate the security features of the Distributed system
Develop a migration plan that addresses any gaps in security features
Test the security of the Distributed system thoroughly before deployment
Train users on the new security features and best practices
Steps performed when a migration requirement comes
Assess the current system and identify the scope of migration
Determine the target system and its requirements
Plan the migration process and create a timeline
Test the migration process in a non-production environment
Execute the migration process and monitor for any issues
Validate the migrated system to ensure it meets the requirements
Provide post-migration support and ma
I applied via Naukri.com and was interviewed in Apr 2021. There was 1 interview round.
posted on 20 Apr 2021
I applied via Naukri.com and was interviewed in Nov 2020. There were 3 interview rounds.
posted on 11 Aug 2023
posted on 27 Oct 2022
I applied via Recruitment Consulltant and was interviewed in Apr 2022. There were 2 interview rounds.
Static methods are bound to a class and not an instance, while class methods are bound to a class and can access class-level variables.
Static methods are defined using the @staticmethod decorator and do not take any special parameters.
Class methods are defined using the @classmethod decorator and take the class itself as the first parameter.
Static methods are often used for utility functions that do not require access ...
HTTP methods are the actions that can be performed on a resource using HTTP protocol.
HTTP methods include GET, POST, PUT, DELETE, HEAD, OPTIONS, CONNECT, and TRACE.
GET is used to retrieve a resource, POST is used to create a new resource, PUT is used to update an existing resource, and DELETE is used to delete a resource.
HEAD is used to retrieve the headers of a resource without the body, OPTIONS is used to retrieve th...
HTTP request components include method, URL, headers, and body.
Method: GET, POST, PUT, DELETE, etc.
URL: Uniform Resource Locator
Headers: contain additional information about the request
Body: optional data sent with the request
Example: GET http://example.com HTTP/1.1
Example header: Accept-Language: en-US
Example body: {"name": "John", "age": 30}
Class decorators are a way to modify the behavior of a class or its methods at runtime.
Class decorators are functions that take a class as input and return a modified class.
They can be used to add new methods or attributes to a class, or to modify existing ones.
They are applied using the @decorator syntax before the class definition.
Examples include @staticmethod, @classmethod, and @property.
Class decorators can also b...
posted on 29 Jun 2021
I applied via Recruitment Consultant and was interviewed in Jun 2021. There were 5 interview rounds.
based on 1 interview
Interview experience
based on 6 reviews
Rating in categories
Software Developer
2.1k
salaries
| ₹2.5 L/yr - ₹12.1 L/yr |
Senior Software Engineer
1.7k
salaries
| ₹7.2 L/yr - ₹28.3 L/yr |
Software Engineer
1.3k
salaries
| ₹3.7 L/yr - ₹15.5 L/yr |
System Analyst
1.1k
salaries
| ₹6.3 L/yr - ₹21 L/yr |
Validation Engineer
939
salaries
| ₹2 L/yr - ₹7.2 L/yr |
TCS
Infosys
Wipro
HCLTech