i
W Energy
Software
Filter interviews by
Constraints are rules applied to a database table to enforce data integrity and ensure accuracy.
Constraints define limits or conditions on the data that can be inserted, updated, or deleted in a table.
They help maintain data consistency and prevent invalid or inconsistent data from being stored.
Common types of constraints include primary key, foreign key, unique, not null, and check constraints.
Examples: A primary...
Primary Key is a unique identifier for each record in a database table.
Primary Key ensures data integrity by enforcing uniqueness and preventing duplicate records.
It is used to establish relationships between tables in a database.
Primary Key can be a single column or a combination of multiple columns.
It is often used as a reference in foreign key constraints.
Examples of Primary Keys include social security numbers...
SQL Injection is a code injection technique where an attacker inserts malicious SQL statements into a query to manipulate the database.
SQL Injection is a common web application vulnerability.
It occurs when user-supplied input is not properly validated or sanitized.
Attackers can exploit SQL Injection to bypass authentication, retrieve sensitive data, modify or delete data, or even execute arbitrary commands.
Prevent...
SQL constraints are rules that are applied to a table's columns to ensure data integrity.
Constraints are used to enforce rules and restrictions on data in SQL tables.
They help maintain data integrity by preventing invalid or inconsistent data from being inserted or updated.
Common types of constraints include primary key, foreign key, unique, and check constraints.
For example, a primary key constraint ensures that ...
The NVL() function is used to replace NULL values with a specified value.
NVL() is commonly used in SQL queries to handle NULL values.
It takes two arguments: the value to be checked and the replacement value.
If the value is NULL, the function returns the replacement value.
If the value is not NULL, the function returns the original value.
Example: SELECT NVL(column_name, 'N/A') FROM table_name;
SQL is a programming language used for managing and manipulating relational databases.
SQL stands for Structured Query Language.
It is used to communicate with and manage databases.
SQL allows users to create, modify, and retrieve data from databases.
It is a standard language for relational database management systems (RDBMS).
SQL is used for tasks like data insertion, deletion, updating, and querying.
Examples of popu...
I applied via Company Website and was interviewed in Nov 2023. There were 6 interview rounds.
30 mins duration. Reasoning
SQL is a programming language used for managing and manipulating relational databases.
SQL stands for Structured Query Language.
It is used to communicate with and manage databases.
SQL allows users to create, modify, and retrieve data from databases.
It is a standard language for relational database management systems (RDBMS).
SQL is used for tasks like data insertion, deletion, updating, and querying.
Examples of popular R...
Constraints are rules applied to a database table to enforce data integrity and ensure accuracy.
Constraints define limits or conditions on the data that can be inserted, updated, or deleted in a table.
They help maintain data consistency and prevent invalid or inconsistent data from being stored.
Common types of constraints include primary key, foreign key, unique, not null, and check constraints.
Examples: A primary key ...
Primary Key is a unique identifier for each record in a database table.
Primary Key ensures data integrity by enforcing uniqueness and preventing duplicate records.
It is used to establish relationships between tables in a database.
Primary Key can be a single column or a combination of multiple columns.
It is often used as a reference in foreign key constraints.
Examples of Primary Keys include social security numbers, ema...
SQL Injection is a code injection technique where an attacker inserts malicious SQL statements into a query to manipulate the database.
SQL Injection is a common web application vulnerability.
It occurs when user-supplied input is not properly validated or sanitized.
Attackers can exploit SQL Injection to bypass authentication, retrieve sensitive data, modify or delete data, or even execute arbitrary commands.
Preventing S...
I applied via Company Website and was interviewed in Jul 2023. There were 5 interview rounds.
30 mins duration - Reasoning
SQL constraints are rules that are applied to a table's columns to ensure data integrity.
Constraints are used to enforce rules and restrictions on data in SQL tables.
They help maintain data integrity by preventing invalid or inconsistent data from being inserted or updated.
Common types of constraints include primary key, foreign key, unique, and check constraints.
For example, a primary key constraint ensures that each ...
I applied via Naukri.com and was interviewed in Nov 2023. There were 3 interview rounds.
30 mins duration - verbal ability
The NVL() function is used to replace NULL values with a specified value.
NVL() is commonly used in SQL queries to handle NULL values.
It takes two arguments: the value to be checked and the replacement value.
If the value is NULL, the function returns the replacement value.
If the value is not NULL, the function returns the original value.
Example: SELECT NVL(column_name, 'N/A') FROM table_name;
Top trending discussions
I applied via Naukri.com and was interviewed in Sep 2020. There was 1 interview round.
I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.
I applied via Referral and was interviewed before Aug 2021. There was 1 interview round.
Use SELECT DISTINCT statement to find unique values in a table.
Use SELECT DISTINCT column_name FROM table_name
DISTINCT keyword returns only unique values
Can be used with multiple columns
Can be combined with other SQL statements like WHERE and ORDER BY
To troubleshoot a stored procedure, check for syntax errors, run the procedure with test data, and use debugging tools.
Check for syntax errors in the stored procedure code
Run the procedure with test data to identify any logical errors
Use debugging tools like SQL Server Profiler or Visual Studio Debugger to step through the code and identify issues
Check for any database connectivity issues or permission errors
Review the...
I applied via Campus Placement and was interviewed before Sep 2021. There were 4 interview rounds.
I attended off campus recruitment .wrote exam at tcs ion center
I attended for off campus recruitment and wrote the test
A primary key is a unique identifier for a record in a database table.
A primary key must be unique and not null.
It ensures the uniqueness and integrity of data in a table.
Primary keys are used to establish relationships between tables.
Examples of primary keys include social security numbers, email addresses, or auto-incremented IDs.
To delete records in a table, use the DELETE statement with the WHERE clause to specify the condition for deletion.
Use the DELETE statement followed by the table name
Add the WHERE clause to specify the condition for deletion
Execute the query to delete the records
Code to generate Fibonacci series
Start with 0 and 1 as the first two numbers
Add the previous two numbers to get the next number in the series
Repeat until desired number of terms is reached
A unique key is a column or a set of columns in a database table that uniquely identifies each row.
A unique key ensures that no two rows in a table have the same values for the specified column(s).
It is used to enforce data integrity and prevent duplicate entries.
A table can have multiple unique keys, but each unique key can only have one row with a specific set of values.
Unique keys can be used as a reference for rela...
I applied via Naukri.com and was interviewed in Aug 2022. There were 2 interview rounds.
Data normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
It involves breaking down a table into smaller tables and defining relationships between them.
Normalization helps to eliminate data inconsistencies and anomalies.
There are different levels of normalization, with each level having specific rules to follow.
For example, first normal form (1NF) requires that e...
I applied via Naukri.com and was interviewed in Oct 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Dec 2022. There were 3 interview rounds.
Creating, delete, SQL intention, query.
based on 3 interview experiences
Difficulty level
Duration
Senior Software Engineer
6
salaries
| ₹27.7 L/yr - ₹40.7 L/yr |
UI/UX Designer
4
salaries
| ₹12 L/yr - ₹18 L/yr |
Engineering Manager
4
salaries
| ₹45 L/yr - ₹73.7 L/yr |
Senior QA Engineer
4
salaries
| ₹13.3 L/yr - ₹20 L/yr |
TCS
Accenture
Wipro
Cognizant