Filter interviews by
Normal logical questions from indiaBix
Application development life cycle involves planning, designing, coding, testing, and deployment.
Planning: Define project scope, requirements, and timeline.
Designing: Create wireframes, mockups, and user interface.
Coding: Write code based on design and requirements.
Testing: Test the application for bugs and performance issues.
Deployment: Release the application to users and maintain it.
Iterative process: Often involves
Print a triangle pattern using loops
Use nested loops to print each row of the triangle
Increment the number of stars printed in each row
Start with 1 star in the first row and increase by 1 in each subsequent row
Basic programming concepts like loops, if-else statements, and functions are essential for iOS development.
Loops are used to iterate over a collection of items, such as an array or dictionary.
If-else statements are used to make decisions based on certain conditions.
Functions are reusable blocks of code that perform a specific task.
Example: Using a for loop to iterate over an array of numbers and checking if each number
I applied via Company Website
Top trending discussions
I was interviewed in Jan 2025.
The exam consists of seven sections, and the cutoff score is quite high; it is essential to complete the exam thoroughly.
I was interviewed in Jan 2025.
Case and decode are conditional expressions in PL/SQL used for data manipulation.
CASE is used for conditional logic in SQL statements, while DECODE is used for conditional logic in SELECT statements.
CASE is more flexible and can handle multiple conditions, while DECODE is limited to one condition.
CASE can be used in both SQL and PL/SQL, while DECODE is specific to SQL.
Example of CASE: SELECT CASE WHEN condition1 THEN r...
Primary key uniquely identifies each record in a table, while foreign key establishes a link between two tables.
Primary key ensures uniqueness and cannot have null values
Foreign key establishes a relationship between tables based on the primary key of another table
Example of primary key: EmployeeID in an Employee table
Example of foreign key: DepartmentID in an Employee table linking to DepartmentID in a Department tabl
Rank assigns unique ranks to each distinct row, while Dense Rank assigns consecutive ranks without gaps.
Rank may have gaps in the ranking sequence, while Dense Rank does not.
Rank assigns the same rank to rows with the same values, while Dense Rank assigns different ranks.
Rank function is non-consecutive, while Dense Rank function is consecutive.
Procedures are used to perform an action, while functions return a value.
Procedures do not return a value, while functions do.
Functions can be called from SQL queries, while procedures cannot.
Functions must return a value, while procedures do not necessarily have to.
No, a package body cannot be used without a package specification.
A package body must always be associated with a package specification.
The package specification defines the public interface of the package, while the package body contains the implementation details.
Attempting to use a package body without a corresponding package specification will result in compilation errors.
Use a SQL query with GROUP BY and HAVING clause to find duplicate values in a database.
Use GROUP BY clause to group the values that are duplicated.
Use HAVING clause to filter out the groups that have more than one occurrence.
Example: SELECT column_name, COUNT(*) FROM table_name GROUP BY column_name HAVING COUNT(*) > 1;
Group by and having clause are used together to filter groups based on specified conditions.
Group by clause is used to group rows that have the same values into summary rows.
Having clause is used to filter groups based on specified conditions.
Example: SELECT department, AVG(salary) FROM employees GROUP BY department HAVING AVG(salary) > 5000;
Substr function extracts a substring from a string, while Instr function returns the position of a substring within a string.
Substr function syntax: SUBSTR(string, start_position, length)
Example: SUBSTR('Hello World', 7, 5) will return 'World'
Instr function syntax: INSTR(string, substring)
Example: INSTR('Hello World', 'World') will return 7
Writing a SQL query with a subquery involves nesting one query inside another to retrieve specific data.
Start by writing the main query that will retrieve the primary data
Identify the criteria for the subquery to filter the results
Enclose the subquery within parentheses and use it in the WHERE or FROM clause of the main query
Ensure that the subquery returns a single value or a single column result
Char is fixed length, varchar is variable length with max 4000 bytes, varchar2 is variable length with max 32767 bytes.
Char is fixed length and always right-padded with spaces, while varchar and varchar2 are variable length.
Varchar can store up to 4000 bytes of data, while varchar2 can store up to 32767 bytes.
Char is less efficient in terms of storage compared to varchar and varchar2.
No, it is not possible to combine two tables with differing data and columns without utilizing joins.
Joins are necessary to combine tables based on a common column or key.
Different data and columns require a join to match and merge the data properly.
Examples of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
Yes, it is possible to update data in a view using INSTEAD OF triggers.
Views are virtual tables that display data from one or more tables.
By using INSTEAD OF triggers, you can update data in a view by specifying the logic to handle the update operation.
The trigger intercepts the update operation on the view and executes the specified logic to update the underlying tables.
For example, you can create an INSTEAD OF trigge...
TCS is a global IT services company known for its innovative solutions and commitment to employee growth.
TCS has a strong reputation in the IT industry for delivering high-quality services.
TCS offers opportunities for professional growth and development through training programs and career advancement.
TCS has a diverse and inclusive work culture that values teamwork and collaboration.
A dynamic cursor in database management allows for the execution of different SQL queries at runtime.
Dynamic cursors are used when the SQL query to be executed is not known until runtime.
They allow for flexibility in querying the database based on user input or other conditions.
Dynamic cursors can be used to handle varying result sets or conditions in a more efficient manner.
Example: Using a dynamic cursor to search fo...
Yes, I have performed performance tuning by identifying bottlenecks and optimizing queries.
Identified slow queries using tools like SQL Trace, Explain Plan, and AWR reports.
Optimized queries by adding indexes, rewriting SQL statements, and reducing unnecessary data retrieval.
Tuned PL/SQL code by using bulk processing, minimizing context switches, and optimizing loops.
Utilized database features like partitioning and mat
A package in PL/SQL is a collection of related procedures, functions, variables, and other constructs.
A package consists of two parts: package specification and package body.
The package specification defines the public interface of the package, including declarations of variables, constants, cursors, procedures, and functions.
The package body contains the actual implementation of the procedures and functions declared i...
I am excited about the opportunity to work with a global leader like TCS and contribute to innovative projects.
TCS is a renowned global company with a strong reputation in the IT industry
I am impressed by TCS's commitment to innovation and cutting-edge technology
I believe TCS offers great opportunities for professional growth and development
I am excited about the chance to work on diverse and challenging projects at TC
I prefer to discuss my salary expectations based on the responsibilities and requirements of the position.
Focus on discussing salary expectations based on the job responsibilities and requirements.
Avoid disclosing specific current salary package.
Emphasize the importance of fair compensation based on market rates and skills.
Provide examples of successful projects or achievements that demonstrate your value.
Discuss oppor...
I am looking for a competitive salary package based on my experience and skills.
I am open to discussing salary based on the responsibilities and requirements of the role.
I have researched the average salary range for Plsql Developers in this location.
I am looking for a package that includes benefits such as healthcare, retirement plans, and professional development opportunities.
Yes, I am comfortable with shift work and have experience working various shifts.
I have previous experience working different shifts in my current/previous roles.
I am flexible with my schedule and can easily adapt to changing shift patterns.
I understand the importance of shift work in ensuring 24/7 coverage for critical systems.
Yes, I am open to any location for the Plsql Developer position.
I am willing to relocate for the right opportunity
I am open to working in different cities or countries
I am flexible with travel requirements for the job
I was interviewed in Jan 2025.
SCD Type 2 implementation involves tracking historical changes in data by creating new records for each change.
Identify the columns that need to be tracked for changes
Add effective start and end dates to track the validity of each record
Insert new records for changes and update end dates for previous records
Maintain a surrogate key to uniquely identify each version of the record
I can join the team within 2 weeks.
I can start within 2 weeks of receiving the offer.
I need to give notice to my current employer.
I may need to relocate, which could affect my start date.
For example, a โน10 LPA CTC could mean an in-hand salary of โน70,000โโน75,000 per month, depending on deductions and benefits.
โจ ๐ฃ๐ฟ๐ผ ๐ง๐ถ๐ฝ: Always request a detailed salary structure during negotiationsโitโs your roadmap to making informed decisions
๐๐ง๐ ๐๐ ๐๐ป-๐๐ฎ๐ป๐ฑ ๐ฆ๐ฎ๐น๐ฎ๐ฟ๐: ๐ง๐ต๐ฒ ๐ฅ๐ฒ๐ฎ๐น๐ถ๐๐ ๐๐ต๐ฒ๐ฐ๐ธ ๐๐๐ฒ๐ฟ๐ ๐ฃ๐ฟ๐ผ๐ณ๐ฒ๐๐๐ถ๐ผ๐ป๐ฎ๐น ๐ก๐ฒ๐ฒ๐ฑ๐!
Weโve all been thereโexcitedly discussing job offers and hearing about the impressive CTC (Cost to Company). But when payday arrives, you wonder
I was interviewed in Jan 2025.
Semantic tags in HTML are specific tags that provide meaning to the content they enclose.
Semantic tags help search engines and screen readers understand the structure of a webpage.
Examples of semantic tags include <header>, <footer>, <nav>, <article>, <section>, <aside>, <main>, <figure>, <figcaption>.
Using semantic tags improves SEO and accessibility of a website.
Currying is a technique in functional programming where a function with multiple arguments is transformed into a sequence of nested functions, each taking a single argument.
Currying helps in creating reusable functions and partial application.
It allows you to create new functions by fixing some parameters of an existing function.
Example: const add = (a) => (b) => a + b; add(2)(3) will return 5.
Map is used to transform each element of an array, while Filter is used to select elements based on a condition.
Map returns a new array with the same length as the original array, but with each element transformed based on a provided function.
Filter returns a new array with only the elements that pass a provided condition function.
Example for Map: [1, 2, 3].map(num => num * 2) will result in [2, 4, 6].
Example for Fi...
Map creates a new array with the results of calling a provided function on every element, while forEach executes a provided function once for each array element.
Map returns a new array with the same length as the original array, while forEach does not return anything.
Map does not mutate the original array, while forEach can mutate the original array.
Map is more suitable for transforming data and creating a new array, w...
Authentication verifies the identity of a user, while authorization determines the user's access rights.
Authentication confirms the user's identity through credentials like username and password.
Authorization determines what actions the authenticated user is allowed to perform.
Authentication precedes authorization in the security process.
Example: Logging into a website (authentication) and then accessing specific pages
Local storage persists even after the browser is closed, while session storage is cleared when the browser is closed.
Local storage has no expiration date, while session storage expires when the browser is closed.
Local storage stores data with no limit, while session storage has a limit of around 5MB.
Local storage data is available across all windows/tabs for that domain, while session storage data is only available wit...
I applied via Approached by Company and was interviewed in Dec 2024.ย There were 3 interview rounds.
I was interviewed in Jan 2025.
The Java Virtual Machine (JVM) is an abstract computing machine that enables a computer to run Java programs.
JVM is platform-independent and converts Java bytecode into machine code.
It consists of class loader, runtime data areas, execution engine, and native method interface.
JVM memory is divided into method area, heap, stack, and PC register.
Examples of JVM implementations include Oracle HotSpot, OpenJ9, and GraalVM.
The default connection pooling in Spring Boot is HikariCP, which can be customized through properties in the application.properties file.
HikariCP is the default connection pooling library in Spring Boot, known for its high performance and low overhead.
To customize the connection pooling, you can modify properties like 'spring.datasource.hikari.*' in the application.properties file.
For example, you can set maximum pool ...
Best practices for optimizing a Spring Boot application
Use Spring Boot Actuator to monitor and manage application performance
Implement caching mechanisms like Spring Cache to reduce database calls
Optimize database queries and indexes for better performance
Use asynchronous processing with Spring's @Async annotation for non-blocking operations
Profile and analyze application performance using tools like VisualVM or JProfi
A heap dump is a snapshot of the memory usage of a Java application at a specific point in time.
Heap dumps can be generated using tools like jmap or VisualVM.
They provide detailed information about objects in memory, their sizes, and references.
Analyzing a heap dump can help identify memory leaks by pinpointing objects that are consuming excessive memory.
Common signs of memory leaks in a heap dump include a large numbe...
Diagonally iterate through and print elements of a 2D array of strings.
Use nested loops to iterate through rows and columns of the 2D array.
Calculate the diagonal elements by incrementing row and column indices together.
Print the elements as you iterate through the diagonal of the array.
based on 6 interviews
Interview experience
based on 144 reviews
Rating in categories
3-5 Yrs
Not Disclosed
2-3 Yrs
Not Disclosed
6-8 Yrs
Not Disclosed
IOS Developer
7
salaries
| โน3.4 L/yr - โน6.5 L/yr |
HR Manager
5
salaries
| โน6 L/yr - โน9 L/yr |
UI/UX Designer
5
salaries
| โน1.9 L/yr - โน4 L/yr |
Android Developer
5
salaries
| โน2.2 L/yr - โน5 L/yr |
Shopify Developer
4
salaries
| โน5 L/yr - โน5.2 L/yr |
TCS
Wipro
Infosys
LTIMindtree