i
YASH Technologies
Filter interviews by
I applied via Naukri.com and was interviewed in Apr 2024. There were 3 interview rounds.
Streams in Java 8 provide a way to process collections of objects in a functional style.
Streams allow for functional-style operations on collections, such as map, filter, and reduce.
Streams can be sequential or parallel, allowing for efficient processing of large datasets.
Streams do not store elements, they are processed on-demand as needed.
Example: List<String> names = Arrays.asList("Alice", "Bob", "Charlie"); S
Authentication verifies the identity of a user, while authorization determines what a user can access.
Authentication confirms the user's identity through credentials like passwords or biometrics.
Authorization determines the user's permissions and access levels to resources.
Example: Logging into a system with a username and password is authentication. Being able to view certain files based on your role is authorization.
Hashmap is a data structure that stores key-value pairs and allows for quick retrieval of values based on keys.
Hashmap uses a hash function to map keys to indices in an array.
Collisions can occur when multiple keys hash to the same index, which can be resolved using techniques like chaining or open addressing.
Hashmap provides constant time complexity O(1) for insertion, deletion, and retrieval operations.
Example: HashM...
Use a hash set to keep track of seen elements and identify duplicates in an unsorted array of strings.
Iterate through the array and add each element to a hash set.
If an element is already in the hash set, it is a duplicate.
Example: ['apple', 'banana', 'apple', 'orange'] => 'apple' is a duplicate.
Handling http requests in Spring Boot involves creating controller classes, mapping endpoints, and using annotations like @RestController and @RequestMapping.
Create a controller class with @RestController annotation
Map endpoints using @RequestMapping annotation
Use @GetMapping, @PostMapping, @PutMapping, @DeleteMapping annotations for specific HTTP methods
Inject dependencies using @Autowired annotation
Microservices communicate with each other through APIs, message queues, or event-driven architecture.
APIs: Microservices can communicate with each other through RESTful APIs or GraphQL.
Message queues: Services can use message brokers like RabbitMQ or Kafka to send and receive messages.
Event-driven architecture: Services can publish events to a message broker and subscribe to events they are interested in.
Service discov...
Exception handling in Spring Boot involves using @ControllerAdvice, @ExceptionHandler, and ResponseEntity.
Use @ControllerAdvice to define global exception handling for all controllers
Use @ExceptionHandler to handle specific exceptions in individual controllers
Return ResponseEntity with appropriate status codes and error messages
Microservices can be deployed in AWS using services like ECS, EKS, Lambda, or Fargate.
Microservices can be deployed on AWS Elastic Container Service (ECS) for containerized applications.
AWS Elastic Kubernetes Service (EKS) can be used for deploying microservices using Kubernetes.
Serverless microservices can be deployed using AWS Lambda.
AWS Fargate provides serverless compute for containers, allowing for easy deployment
I applied via Campus Placement and was interviewed in Dec 2024. There were 4 interview rounds.
Mcq questions on python aws database and networks ans os
8 members in a panel and they gave a topic generally a social issue or a general topic you can a lot about
Yash Technologies does not have any ongoing cybersecurity projects.
Yash Technologies currently does not have any cybersecurity projects in progress.
It is possible that Yash Technologies may focus on other areas of expertise besides cybersecurity.
The company may prioritize different types of projects over cybersecurity initiatives.
Bad leadership with zero cybersecurity skills can lead to serious security vulnerabilities and risks for the organization.
Lack of understanding of cybersecurity threats and best practices can result in poor decision-making regarding security measures.
Failure to prioritize cybersecurity can leave the organization vulnerable to cyber attacks and data breaches.
Ineffective communication and guidance from leadership can hin...
I applied via LinkedIn
YASH Technologies interview questions for popular designations
Get interview-ready with Top YASH Technologies Interview Questions
I applied via Company Website and was interviewed in Oct 2024. There were 3 interview rounds.
Sort a list without using inbuilt keyword
Iterate through the list and compare each element with the rest to find the smallest element
Swap the smallest element with the first element
Repeat the process for the remaining elements until the list is sorted
Yes, tuples are fully immutable in Python.
Tuples cannot be modified once created.
Elements of a tuple cannot be changed, added, or removed.
Attempting to modify a tuple will result in a TypeError.
Example: tuple1 = (1, 2, 3) - tuple1[0] = 4 will raise a TypeError.
Docker is a platform used to develop, ship, and run applications in containers.
Docker allows developers to package their applications and dependencies into a container, which can then be easily shared and run on any system.
Containers created with Docker are lightweight, portable, and isolated from the host system, making them ideal for microservices architecture.
Docker simplifies the process of deploying and scaling ap...
Use a loop to calculate the cube of each number in the given range and print the result.
Use a for loop to iterate through the range of numbers
Calculate the cube of each number using the formula cube = number * number * number
Print the cube of each number
Seeking new challenges and opportunities for growth in a dynamic work environment.
Looking to expand my skill set and knowledge in Python development.
Interested in working on more complex projects and collaborating with a diverse team.
Seeking a company that values innovation and encourages professional development.
Components of VPC include subnets, route tables, internet gateways, security groups, network access control lists, and VPN connections.
Subnets
Route tables
Internet gateways
Security groups
Network access control lists
VPN connections
Jenkins pipeline is a set of automated steps to build, test, and deploy code.
Jenkins pipeline is defined using a Jenkinsfile, which can be written in either Declarative or Scripted syntax.
It allows for defining multiple stages, each containing one or more steps to be executed sequentially.
Pipeline can be triggered manually or automatically based on events like code commits or scheduled builds.
Pipeline can integrate wit...
Terraform code for creating EC2 instance and VPC
Use Terraform resources 'aws_instance' for EC2 and 'aws_vpc' for VPC
Specify necessary parameters like instance type, AMI, subnet ID, security group ID, etc.
Use Terraform modules for better organization and reusability
Leverage Terraform state file to track infrastructure changes
Typing test in computer
Data entry in system can be done manually or through automated processes like scanning or importing files.
Data can be entered manually by typing information into the system.
Data can also be entered through automated processes like scanning documents or importing files.
Some systems may have specific data entry forms or templates to ensure accuracy and consistency.
Data entry methods can vary depending on the type of info
Page break in smart form allows for better organization and layout of content.
Use the command 'NEW-PAGE' in the smart form to insert a page break.
Page breaks can be triggered based on conditions or manually inserted.
Page breaks help in separating content logically and improving readability.
TMG stands for Transport Management Guide. TMG events are used in SAP to control the flow of data during transport requests.
TMG is used in SAP to manage the transport of data between systems.
TMG events are used to trigger actions before and after the data is transported.
Examples of TMG events include BEFORE_IMPORT, AFTER_IMPORT, BEFORE_EXPORT, and AFTER_EXPORT.
I applied via Campus Placement and was interviewed in Sep 2024. There were 3 interview rounds.
It is based on java fundamentals and some pseudo code questions
HR gave us topic on human
I am a recent graduate with a degree in Business Administration, passionate about marketing and eager to learn and grow in a professional setting.
Recent graduate with a degree in Business Administration
Passionate about marketing
Eager to learn and grow in a professional setting
I have worked on various projects including market research, data analysis, and social media campaigns.
Market research project for a new product launch
Data analysis project to optimize sales strategies
Social media campaign to increase brand awareness
Inheritance is the process by which genetic information is passed from parent to offspring, determining traits and characteristics.
Inheritance involves the transmission of genes from one generation to the next
Traits and characteristics of offspring are determined by the combination of genes inherited from both parents
Inheritance can lead to the expression of dominant or recessive traits
Examples include eye color, blood
Top trending discussions
The duration of YASH Technologies interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 139 interviews
Interview experience
based on 1.7k reviews
Rating in categories
Hyderabad / Secunderabad,
Pune
+15-10 Yrs
Not Disclosed
Hyderabad / Secunderabad,
Pune
+115-24 Yrs
Not Disclosed
Senior Software Engineer
1.4k
salaries
| ₹6.3 L/yr - ₹21.4 L/yr |
Software Engineer
1.2k
salaries
| ₹2.4 L/yr - ₹10.4 L/yr |
Consultant
747
salaries
| ₹4.9 L/yr - ₹20.3 L/yr |
Associate Consultant
745
salaries
| ₹2.2 L/yr - ₹10.3 L/yr |
Module Lead
529
salaries
| ₹9.4 L/yr - ₹32 L/yr |
DXC Technology
Sutherland Global Services
Optum Global Solutions
FIS