Filter interviews by
I applied via campus placement at Anjalai Ammal Mahalingam Engineering College, Thanjavur and was interviewed before Sep 2022. There were 5 interview rounds.
1st round consists of logical, verbal, quantitative aptitude and essay written and 2 programming questions.
Remove duplicates from array of strings
Create a Set to store unique strings
Iterate through the array and add each string to the Set
Convert the Set back to an array to get the unique strings
Reverse a string while keeping special characters in the same position.
Iterate through the string and store special characters in a separate array.
Reverse the string excluding special characters.
Combine the reversed string with the special characters in their original positions.
Use bitwise operations to perform multiplication of two numbers.
Use bitwise operations like left shift and bitwise AND to perform multiplication.
For example, to multiply 3 and 5, you can do: (3 << 2) + (3 << 0) = 12 + 3 = 15.
Understand how binary multiplication works to implement the solution.
I applied via Campus Placement and was interviewed before Jun 2022. There were 4 interview rounds.
It was an aptitude round. We were also asked to write a logic for a problem.
I applied via Naukri.com and was interviewed before Nov 2020. There were 3 interview rounds.
I applied via LinkedIn and was interviewed in Sep 2024. There were 3 interview rounds.
CICD stands for Continuous Integration and Continuous Deployment. It is a software development practice where code changes are automatically built, tested, and deployed.
Automates the process of integrating code changes into a shared repository
Automatically builds and tests the code to ensure it is functional
Automatically deploys the code to production or staging environments
Helps in detecting and fixing integration err
To create an image out of a running container, you can use the 'docker commit' command.
Use 'docker commit' command to create an image from a running container
Syntax: docker commit [OPTIONS] CONTAINER [REPOSITORY[:TAG]]
Example: docker commit container_id repository_name:tag
Docker add command can fetch a file from a URL and add it to the image, while copy command copies files from the host machine to the image.
Docker add command can fetch files from URLs and add them to the image
Copy command copies files from the host machine to the image
Add command can also automatically extract compressed files during the build process
Copy command is more commonly used for copying local files
A freestyle project is a type of project in Jenkins that allows users to configure the build process in any way they want. A pipeline is a set of automated steps that define the process for building, testing, and deploying code.
Freestyle project in Jenkins allows users to configure build process manually
Pipeline in Jenkins is a set of automated steps for building, testing, and deploying code
Freestyle projects are more ...
Docker Swarm is used for orchestrating multiple Docker containers across multiple hosts, while Docker Compose is used for defining and running multi-container Docker applications.
Docker Swarm is a container orchestration tool that allows you to manage a cluster of Docker hosts.
Docker Compose is a tool for defining and running multi-container Docker applications.
Docker Swarm is used for scaling and managing a cluster of...
VPC stands for Virtual Private Cloud, a virtual network dedicated to a single organization's resources in the cloud.
Allows organizations to have control over their virtual network environment
Enables customization of network configuration
Provides security by allowing isolation of resources
Can connect to on-premises data centers or other VPCs using VPN or Direct Connect
CICD pipeline is a process that automates the building, testing, and deployment of software.
Continuous Integration (CI) - code changes are integrated into a shared repository multiple times a day.
Continuous Testing - automated tests are run to ensure code quality.
Continuous Deployment - code changes are automatically deployed to production.
Stages include: build, test, deploy, and monitor.
Tools like Jenkins, GitLab, and
VPC peering allows connecting two VPCs to communicate using private IP addresses.
VPC peering enables instances in different VPCs to communicate as if they are within the same network.
Traffic between peered VPCs stays within the private IP space and does not traverse the internet.
VPC peering does not involve a gateway, VPN, or direct connection.
Both VPCs must have non-overlapping IP ranges for successful peering.
Example...
VPC is a virtual private cloud that allows you to create isolated networks within the cloud environment. Subnets are subdivisions of a VPC, route tables define how traffic is directed within the VPC, and NAT gateway allows instances in a private subnet to access the internet.
VPC is a virtual private cloud that provides a logically isolated section of the AWS Cloud where you can launch resources.
Subnets are subdivisions...
I applied via Naukri.com and was interviewed in Aug 2024. There were 3 interview rounds.
Spring injects dependencies through inversion of control and dependency injection.
Spring uses inversion of control to manage objects and their dependencies.
Dependencies are injected into a class through constructor injection, setter injection, or field injection.
Spring container is responsible for creating and managing objects and their dependencies.
Example: @Autowired annotation is used for dependency injection in Spr
Hibernate connects to the database using JDBC (Java Database Connectivity) API.
Hibernate uses JDBC API to establish a connection to the database.
It uses JDBC drivers to communicate with the database.
Hibernate configuration file contains database connection details.
SessionFactory in Hibernate is responsible for creating sessions and managing connections.
Securing APIs involves using authentication, authorization, encryption, and monitoring.
Implement authentication mechanisms such as OAuth, JWT, or API keys
Use authorization to control access to APIs based on roles and permissions
Encrypt data transmission using HTTPS/TLS to prevent eavesdropping
Implement rate limiting and throttling to prevent abuse and DDoS attacks
Regularly monitor API traffic and logs for suspicious ac
Multiple DBs can be configured in an application by using database connection pooling, configuring multiple data sources, and managing transactions across databases.
Use database connection pooling to efficiently manage connections to multiple databases
Configure multiple data sources in the application to connect to different databases
Implement transaction management to ensure data consistency across multiple databases
I applied via Approached by Company and was interviewed in Apr 2024. There was 1 interview round.
I applied via Campus Placement
General discussion on profile and work experience
I applied via Referral and was interviewed before Aug 2023. There were 4 interview rounds.
posted on 3 Aug 2023
Basic aptitude which is based on computer science skills
Some of the top questions asked at the Vuram Associate Technical Consultant interview -
based on 12 reviews
Rating in categories
Technical Consultant
54
salaries
| ₹5 L/yr - ₹11.6 L/yr |
Senior Technical Consultant
41
salaries
| ₹8.1 L/yr - ₹24.1 L/yr |
Quality Engineer
24
salaries
| ₹5.5 L/yr - ₹9.4 L/yr |
Associate Technical Consultant
24
salaries
| ₹5 L/yr - ₹7.4 L/yr |
Associate Consultant
13
salaries
| ₹3.7 L/yr - ₹6.4 L/yr |
Infosys
TCS
Wipro
HCLTech