Filter interviews by
HashMap is a data structure in Java that stores key-value pairs and allows fast retrieval of values based on keys.
HashMap is part of the Java Collections framework.
It uses hashing to store key-value pairs, making retrieval fast.
Keys in a HashMap must be unique, but values can be duplicated.
Example: HashMap
Square area and perimeter of rectangle
I applied via Naukri.com and was interviewed before Feb 2022. There were 4 interview rounds.
A list of questions fron the QA background
Questions related to QA
Explain the difference between verification and validation
Describe a scenario where you found a critical bug
How do you prioritize test cases?
Top trending discussions
I applied via Referral and was interviewed in Nov 2023. There were 5 interview rounds.
Written with multiple question both aptitude and technical
Regression testing is retesting of previously tested functionality to ensure that changes or fixes have not introduced new defects. Smoke testing is a subset of regression testing that focuses on testing the critical functionalities of an application.
Regression testing is performed to verify that changes or fixes in software have not introduced new defects or caused existing functionalities to fail.
It involves retestin...
The first round was a group discussion about online shopping.
I applied via Company Website and was interviewed in Nov 2024. There were 4 interview rounds.
Directions: Each of the following question has a question and two statements labelled as (i) and (ii). Use the data/information given in (i) and (ii) to decide whether the data are sufficient to answer the question record your answer as
A) If you can get the answer from (1)alone but not from (2)
B) If you can get the answer from (2)alone but not from (1)
C) If can get the answer from (1)and (2)together ,although neither statement by itself suffice
D) If statement (1)alone suffices and statement (2) alone also suffice.
E) If can\'t get the answer from statements (1) and (2) together and you need more data.
Copyright protection is given for a work having originality,i.e. it should be from the author and must have minimum degree of creativity. So it is the author who is the real creator of the work thereby first owner of the copyright and Indian law recognizes author as the firstowner of the copyright .But by the term ‘ownership it means it includes not only theauthor ,but also assignee and can even a legal entity even though not defined in the !ct. InBern convention the term !uthor is not defined, instead it says that the person under whose name the work is disclosed, which implies that it is not necessary that always theauthor should be the owner. "owever Indian copyright !ct defines the tern ‘!uthor withrespect to various works, but still leaves some problems. It becomes more comple# in theconte#t of changing technologies, i.e. cinematographic works, sound recording, broadcasting etc which is a combination of different works, also when author does thework in the course of employment. $hen new technologies emerge, different mode of communication simultaneously arise and the e#ploitation of the copyright by wayof assignment %licensing will add economic benefits to the copyright owner and the provisions of assignment and licensing becomes crucial. By amendments Indian Copyright!ct has taken care of such provisions, but still leaving lacunae % the role of &udiciary becomes crucial in interpreting such provisions for effectively protecting the rights of the authors.
What are the constraints and give example that's include all constraints? 2. Basic SQL queries were asked but I don't remember 3. Then asked questions from my college projects
Public, private, and protected are access modifiers used in object-oriented programming to control the visibility of class members.
Public: allows access to the member from outside the class
Private: restricts access to the member only within the class
Protected: allows access to the member within the class and its subclasses
SQL joins are used to combine rows from two or more tables based on a related column between them.
INNER JOIN: Returns rows when there is at least one match in both tables.
LEFT JOIN: Returns all rows from the left table, and the matched rows from the right table.
RIGHT JOIN: Returns all rows from the right table, and the matched rows from the left table.
FULL JOIN: Returns rows when there is a match in one of the tables.
C...
posted on 3 Dec 2024
30min duration simple questions
Basic array 2 coding questions
posted on 9 Dec 2024
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
Handling difficult situations by staying calm, analyzing the problem, and finding a solution.
Remaining calm under pressure
Identifying the root cause of the problem
Collaborating with team members to brainstorm solutions
Prioritizing tasks to address the issue efficiently
posted on 3 Mar 2025
I was interviewed before Mar 2024.
Moderate level of questions comprising of basic apti topics.
Good level of theoritical as well as practical knowledge.
posted on 5 Oct 2024
Inheritance is a mechanism in object-oriented programming where a class inherits properties and behaviors from another class.
Allows a class to inherit attributes and methods from another class
Promotes code reusability and reduces redundancy
Creates a parent-child relationship between classes
Derived class can override or extend the functionality of the base class
Types of joins in MySQL include inner join, left join, right join, and full join.
Inner join: Returns rows when there is a match in both tables.
Left join: Returns all rows from the left table and the matched rows from the right table.
Right join: Returns all rows from the right table and the matched rows from the left table.
Full join: Returns rows when there is a match in one of the tables.
Use a centralized API gateway to manage and route requests to multiple APIs efficiently.
Implement a centralized API gateway to handle incoming requests and route them to the appropriate API based on the endpoint.
Utilize API management tools like Apigee, Kong, or AWS API Gateway to manage and monitor multiple APIs.
Consider implementing a caching layer to improve performance and reduce the number of requests to external
strstr function searches for a substring within a string and returns a pointer to the first occurrence of the substring.
Used in C programming language
Syntax: char *strstr(const char *haystack, const char *needle)
Example: char *str = strstr("hello world", "world")
based on 3 interviews
Interview experience
based on 5 reviews
Rating in categories
Software Engineer
308
salaries
| ₹4.1 L/yr - ₹8.5 L/yr |
Software Analyst
272
salaries
| ₹5 L/yr - ₹11.3 L/yr |
Senior Software Analyst
151
salaries
| ₹6.2 L/yr - ₹15.5 L/yr |
Compliance Auditor
76
salaries
| ₹2.9 L/yr - ₹5.5 L/yr |
Audit Specialist
53
salaries
| ₹2.1 L/yr - ₹4.9 L/yr |
RealPage
MRI Software
Buildium
Entrata