i
YASH Technologies
Filter interviews by
I applied via Naukri.com and was interviewed in Dec 2023. There were 3 interview rounds.
I applied via Approached by Company and was interviewed before Jun 2023. There were 2 interview rounds.
Different types of API response include JSON, XML, HTML, and plain text.
JSON: Lightweight data interchange format commonly used in APIs.
XML: Markup language for encoding documents in a format that is both human-readable and machine-readable.
HTML: Standard markup language for creating web pages.
Plain text: Simple text format without any formatting or structure.
Design patterns are reusable solutions to common problems in software design.
Singleton Pattern: Ensures a class has only one instance and provides a global point of access to it.
Factory Pattern: Creates objects without specifying the exact class of object that will be created.
Observer Pattern: Defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and upd
Debugging SQL procedures involves using print statements, logging, and step-by-step execution.
Use print statements to output variable values at different stages of the procedure.
Enable logging to track the flow of the procedure and identify any errors.
Execute the procedure step-by-step to pinpoint the exact location of the issue.
Use tools like SQL Server Management Studio to debug stored procedures.
Check for syntax err...
I applied via Naukri.com and was interviewed before Aug 2021. There were 3 interview rounds.
Top trending discussions
posted on 15 May 2021
I applied via Naukri.com and was interviewed in Apr 2021. There was 1 interview round.
I applied via Naukri.com and was interviewed before Dec 2022. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Mar 2024. There were 4 interview rounds.
I applied via Approached by Company and was interviewed before May 2021. There were 3 interview rounds.
Short basic algorithms test
posted on 15 Oct 2024
I am a seasoned Technical Lead with experience in leading teams, solving complex technical challenges, and driving project success.
Led a team of developers in implementing a new software system for a client
Resolved a critical production issue by quickly identifying the root cause and implementing a fix
Collaborated with cross-functional teams to deliver projects on time and within budget
I applied via Naukri.com and was interviewed in May 2023. There were 3 interview rounds.
I applied via Job Portal and was interviewed in Oct 2023. There was 1 interview round.
Yes
LiveData is lifecycle aware and can be used to observe changes in data.
ViewModel provides a way to store and manage UI-related data across configuration changes.
ViewModel can hold LiveData objects to provide data to the UI.
LiveData and ViewModel work together to ensure data consistency and prevent memory leaks.
The ViewModel survives configuration changes by being retained by the system.
ViewModels are designed to survive configuration changes like screen rotations or language changes.
When an activity is destroyed and recreated, the ViewModel is not destroyed and retains its data.
The ViewModel is associated with the activity's lifecycle and is retained until the activity is finished.
The retained ViewModel instance can be acces...
MVP offers better separation of concerns and easier unit testing compared to MVC.
MVP separates the presentation layer from the business logic, making it easier to maintain and modify the codebase.
MVP allows for easier unit testing as the presenter can be tested independently from the view.
MVP provides better decoupling between components, enabling easier code reuse and scalability.
MVP promotes a clear separation of con...
SSL pinning is a security technique that ensures a client only communicates with a server using a pre-defined public key.
SSL pinning involves hardcoding the server's public key in the client's code or configuration.
During the SSL handshake, the client checks if the server's public key matches the pinned key.
If the keys match, the connection is established; otherwise, it is rejected.
Pinning prevents man-in-the-middle at
Data security can be achieved through encryption, access controls, backups, and regular security audits.
Encrypt sensitive data using strong encryption algorithms.
Implement access controls to restrict unauthorized access to the data.
Regularly backup the data to prevent data loss.
Conduct regular security audits to identify and fix vulnerabilities.
Use secure protocols and communication channels for data transfer.
Implement...
Encryption keys should be securely stored in a separate key management system.
Encryption keys should not be stored alongside the encrypted data.
Use a dedicated key management system (KMS) to store and manage encryption keys.
Implement strong access controls and authentication mechanisms for the KMS.
Consider using hardware security modules (HSMs) for added security.
Regularly rotate encryption keys to minimize the impact
based on 2 interviews
2 Interview rounds
based on 32 reviews
Rating in categories
Senior Software Engineer
1.4k
salaries
| ₹6.2 L/yr - ₹24 L/yr |
Software Engineer
1.2k
salaries
| ₹2.4 L/yr - ₹10.5 L/yr |
Associate Consultant
745
salaries
| ₹2.2 L/yr - ₹10.2 L/yr |
Consultant
739
salaries
| ₹4.9 L/yr - ₹20.3 L/yr |
Module Lead
522
salaries
| ₹9.3 L/yr - ₹32 L/yr |
DXC Technology
Sutherland Global Services
Optum Global Solutions
FIS