Filter interviews by
Proxies act as intermediaries between clients and servers, providing additional security, privacy, and performance benefits.
Proxies can hide the client's IP address, providing anonymity and privacy.
Proxies can cache data to improve performance by serving cached content instead of fetching it from the server every time.
Proxies can filter and block malicious content, improving security.
Proxies can bypass geo-restrictions...
Decorators are functions that modify the behavior of other functions or methods.
Decorators are used to add functionality to existing functions without modifying their code.
They are defined using the @decorator syntax in Python.
Decorators can be used for logging, authentication, caching, etc.
Example: @staticmethod decorator in Python marks a method as a static method.
I applied via Referral and was interviewed in Jan 2024. There were 2 interview rounds.
I applied via Referral and was interviewed before Feb 2023. There were 2 interview rounds.
Object-oriented programming (OOP) is a programming paradigm that uses objects to represent and manipulate data.
OOP focuses on creating reusable code by organizing data and behavior into objects.
Encapsulation, inheritance, and polymorphism are key principles of OOP.
Real-time example: A car can be represented as an object with properties like color, model, and methods like start, stop, and accelerate.
I applied via Naukri.com and was interviewed before Jun 2023. There were 2 interview rounds.
Basic questions of python string and list
Vertexplus Technologies interview questions for popular designations
I applied via Approached by Company and was interviewed before Sep 2022. There were 3 interview rounds.
General Aptitude test
I applied via Naukri.com and was interviewed in Aug 2021. There were 3 interview rounds.
Headless services in Kubernetes are used for stateful applications that require stable network identities.
Headless services do not have a cluster IP address
They are used for stateful applications that require stable network identities
They return the IP addresses of the pods directly
They are defined by setting the cluster IP to None in the service definition
Yes, we can create a new keypair in AWS.
Go to the EC2 dashboard in AWS console
Select the instance for which the keypair needs to be replaced
Stop the instance
Detach the root volume
Launch a new instance and create a new keypair
Attach the root volume to the new instance
Start the new instance with the new keypair
Top trending discussions
I applied via Recruitment Consultant and was interviewed before Oct 2020. There were 3 interview rounds.
I applied via Walk-in and was interviewed before Sep 2021. There were 5 interview rounds.
General Aptitude and logical reasoning
About programming and basic programs with advanced program
Test scenarios to test ATM machine
Test card insertion and ejection
Test PIN entry and validation
Test cash withdrawal and balance update
Test receipt printing
Test network connectivity and error handling
SQL joins are used to combine data from two or more tables based on a related column between them.
There are four types of SQL joins: inner join, left join, right join, and full outer join.
Inner join returns only the matching rows from both tables.
Left join returns all the rows from the left table and matching rows from the right table.
Right join returns all the rows from the right table and matching rows from the left ...
I applied via Naukri.com and was interviewed in Mar 2021. There was 1 interview round.
based on 7 interviews
Interview experience
based on 83 reviews
Rating in categories
Power BI Developer
43
salaries
| ₹1 L/yr - ₹9.5 L/yr |
Software Developer
27
salaries
| ₹1 L/yr - ₹7.9 L/yr |
Python Developer
19
salaries
| ₹2.3 L/yr - ₹4.6 L/yr |
Business Analyst
14
salaries
| ₹4 L/yr - ₹7.2 L/yr |
Network Engineer
10
salaries
| ₹2.9 L/yr - ₹5.9 L/yr |
Accel Frontline
Pitney Bowes
Apmosys Technologies
DynPro