Filter interviews by
I applied via Job Portal
PL/SQL is a procedural extension of SQL used for writing stored procedures, functions, triggers, and packages in Oracle databases.
PL/SQL stands for Procedural Language/Structured Query Language
It is used to write procedural code like stored procedures, functions, triggers, and packages in Oracle databases
SQL (Structured Query Language) is a standard language for accessing and manipulating databases
SQL is used to query,...
Questions on plsql and sql in general
I applied via Naukri.com and was interviewed in Jun 2023. There were 4 interview rounds.
3omins of coding knowledge testing
I applied via Monster
Use SQL query with ORDER BY clause to get result based on highest salary
Use SELECT statement to retrieve data from the table
Use ORDER BY clause with DESC keyword to sort salaries in descending order
Use LIMIT or FETCH FIRST clause to limit the result to only one row
Bulk collect is used to fetch multiple rows into collections at once, while bulk binding is used to bind collections to SQL statements for improved performance.
Bulk collect fetches multiple rows into collections in a single operation, reducing context switches and improving performance.
Bulk binding binds collections to SQL statements, reducing the number of context switches between the PL/SQL engine and SQL engine.
Bulk...
Delete removes rows from a table, drop removes the entire table, and truncate removes all rows from a table.
Delete is a DML operation and can be rolled back, but it is slower than truncate.
Drop is a DDL operation and cannot be rolled back. It removes the table and all associated objects.
Truncate is a DDL operation and cannot be rolled back. It removes all rows from the table but keeps the table structure.
Delete and tru...
Table stores data in a structured format while view is a virtual table created from a query.
Table is a physical object while view is a logical object.
Table can be modified while view cannot be modified directly.
Table can have indexes while view cannot have indexes.
Table can have constraints while view cannot have constraints.
View can be used to simplify complex queries by joining multiple tables.
View can be used to res...
I have used both implicit and explicit cursors in PL/SQL development.
Implicit cursors are used for single-row queries while explicit cursors are used for multi-row queries.
I have used explicit cursors with parameters to make the query more dynamic.
I have also used cursor variables to pass cursors as parameters to procedures and functions.
Examples of cursor types I have used include FOR LOOP, FETCH, and UPDATE cursors.
Primary key uniquely identifies a record in a table, while unique key ensures uniqueness of a column or set of columns.
Primary key is a column or set of columns that uniquely identifies each record in a table
Unique key ensures that a column or set of columns have unique values
Primary key cannot have null values, while unique key can have null values
A table can have only one primary key, but multiple unique keys
posted on 16 Aug 2015
Network layers are a hierarchical way of organizing communication protocols.
Network layers provide a modular approach to networking.
Each layer has a specific function and communicates with adjacent layers.
The OSI model has 7 layers, while the TCP/IP model has 4 layers.
Examples of layers include the physical layer, data link layer, network layer, transport layer, and application layer.
Deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.
Occurs in multi-threaded/multi-process environments
Can lead to system freeze or crash
Prevention techniques include resource ordering and timeouts
Example: Process A holds resource X and waits for resource Y, while Process B holds resource Y and waits for resource X
Paging and Segmentation are memory management techniques used by operating systems.
Paging divides memory into fixed-size pages and stores them in physical memory.
Segmentation divides memory into logical segments and stores them in physical memory.
Paging allows for efficient use of physical memory and reduces fragmentation.
Segmentation allows for protection and sharing of memory between processes.
Examples of operating s...
Reverse a linked list using iterative and recursive methods.
Iterative method involves traversing the list and changing the pointers to reverse the order.
Recursive method involves calling the function recursively on the next node and changing the pointers.
Both methods have O(n) time complexity and O(1) space complexity.
Example: 1->2->3->4->5 becomes 5->4->3->2->1.
Clone a linked list with a random pointer.
Create a new node for each node in the original list.
Use a hash table to map the original nodes to their clones.
Iterate through the original list again and update the random pointers of the clone nodes.
based on 2 interviews
Interview experience
based on 11 reviews
Rating in categories
Senior Consultant
3.8k
salaries
| ₹8 L/yr - ₹30 L/yr |
Lead Consultant
3.5k
salaries
| ₹10.5 L/yr - ₹34.6 L/yr |
Software Engineer
3.3k
salaries
| ₹3.5 L/yr - ₹13.3 L/yr |
Consultant
3.3k
salaries
| ₹6 L/yr - ₹20 L/yr |
Associate Consultant
2.7k
salaries
| ₹4.6 L/yr - ₹15.2 L/yr |
Cognizant
TCS
Infosys
Accenture