Backend Developer Intern
60+ Backend Developer Intern Interview Questions and Answers

Asked in Netcore Cloud Private Limited

Q. An user expects a response from the server in 30 seconds, but your server is responding in 35 seconds. How do you tackle that?
Addressing user expectations when server response time exceeds their limit requires effective communication and optimization strategies.
1. Communicate with the user: Inform them about the delay and provide an estimated time for resolution.
2. Optimize server performance: Analyze the server's performance to identify bottlenecks and improve response time.
3. Implement asynchronous processing: Use background jobs for long-running tasks to free up the server for quicker responses.
4...read more
Asked in Educase

Q. 1. Differences between GET and POST 2. What is MVC? 3. I was asked if I knew any PHP framework. 4. SESSION, COOKIE functionalities 5. Some SQL queries.
Backend Developer Intern interview questions on HTTP methods, MVC, PHP framework, SESSION, COOKIE, and SQL queries.
GET is used to retrieve data from a server while POST is used to submit data to a server
MVC stands for Model-View-Controller and is a software design pattern used for separating concerns in an application
PHP frameworks include Laravel, CodeIgniter, and Symfony
SESSION and COOKIE are used for storing data on the client-side
SQL queries are used for interacting with ...read more
Backend Developer Intern Interview Questions and Answers for Freshers

Asked in Jar

Q. What happens when a primitive data type is passed in a method call versus when a non-primitive data type is passed? When would there be a change in value after a downstream operation, and when would there not?
Primitive data types are passed by value, while non-primitive data types are passed by reference. Changes in value can occur after downstream operations for non-primitive data types.
Primitive data types (int, float, char, etc.) are passed by value, meaning a copy of the value is passed to the method. Changes made to the parameter inside the method do not affect the original value.
Non-primitive data types (objects, arrays, etc.) are passed by reference, meaning the memory addr...read more

Asked in FastJobs.io

Q. What is the use of express.json middleware?
express.json middleware is used to parse JSON data in the request body.
It is used to parse JSON data in the request body.
It is a built-in middleware function in Express.
It sets the Content-Type header to application/json.
It parses the JSON data and populates the req.body object with the parsed data.
It is used in conjunction with the bodyParser middleware.

Asked in Sekel Technologies

Q. What is the process for writing Django ORM queries to retrieve user details?
Django ORM allows easy retrieval of user details using model queries and filters.
Define a User model if not using Django's built-in User model.
Use the 'objects' manager to query the database, e.g., User.objects.all() to retrieve all users.
Filter users using 'filter()' method, e.g., User.objects.filter(username='john').
Retrieve a single user with 'get()' method, e.g., User.objects.get(id=1).
Use 'exclude()' to get users not matching certain criteria, e.g., User.objects.exclude(...read more

Asked in MedCords

Q. How do you print the diagonal elements of an array from the top right corner to the bottom left corner?
Printing diagonal elements of an array from right top corner to left bottom corner.
Iterate through the rows and columns of the array
Print the diagonal elements using row and column indices
Start from the right top corner and move towards the left bottom corner
Backend Developer Intern Jobs



Asked in Praeclarum Tech

Q. How would you implement authentication and authorization in a Node.js application?
Implement authentication using JWT and authorization with role-based access control in a Node.js application.
Use libraries like 'jsonwebtoken' for creating and verifying JWTs.
Implement user registration and login endpoints to handle credentials.
Store user passwords securely using hashing algorithms like bcrypt.
Create middleware functions to check for valid tokens and user roles.
Use environment variables to manage sensitive information like secret keys.

Asked in Jar

Q. What are the common annotations used in Spring Boot?
Common annotations used in Spring Boot for backend development
1. @RestController - used to define a controller and to indicate that the return value of the methods should be directly written to the HTTP response body
2. @RequestMapping - used to map web requests to specific handler methods
3. @Autowired - used for automatic dependency injection
4. @Service - used to indicate that a class is a service
5. @Repository - used to indicate that a class is a repository
6. @Component - us...read more
Share interview questions and help millions of jobseekers 🌟

Asked in Convin

Q. In which scenarios is each sorting method most beneficial?
Different sorting methods are beneficial in different scenarios based on factors like time complexity, space complexity, and input size.
Quick Sort: Best for large datasets due to its average time complexity of O(n log n)
Bubble Sort: Simple and easy to implement, but inefficient for large datasets with its time complexity of O(n^2)
Merge Sort: Stable and efficient for large datasets with its time complexity of O(n log n)
Insertion Sort: Efficient for small datasets or nearly sor...read more
Asked in FinBox

Q. There are three unlabeled candy jars: one with chocolate candies, one with vanilla candies, and one with mixed candies. What is the minimum number of candies you need to taste to correctly label all the jars?
Use process of elimination by tasting from jars to identify contents.
Taste from the jar labeled 'Mixed'. If it tastes like chocolate, then it must be the mixed jar. If it tastes like vanilla, then it must be the vanilla jar. The remaining jar is chocolate.
If the 'Mixed' jar tastes like vanilla, then the 'Vanilla' jar is the one labeled 'Mixed'. The remaining jar is chocolate.
This method requires only 1 taste to identify each jar correctly.
Asked in AlignMyCareer

Q. (1)-> Difference between Spring and Spring Boot (2)-> What is Cloud (3)-> Explain AWS (4)-> Explain Spring Security (5)-> How We raised PR
Spring is a framework for building Java applications, while Spring Boot is an extension that simplifies the setup and configuration process.
Spring is a comprehensive framework for building Java applications, providing features like dependency injection, aspect-oriented programming, and more.
Spring Boot is an extension of the Spring framework that aims to simplify the setup and configuration process by providing defaults for common configurations.
Cloud computing refers to the ...read more
Asked in AI Innovation World

Q. What is the difference between == and .equals()?
The difference between == and .equal() is that == is used to compare values for equality, while .equal() is a method used to compare objects for equality.
The == operator is used to compare primitive data types like integers, strings, etc. for equality.
The .equal() method is used to compare objects in Java for equality. It is typically overridden in classes to define custom equality logic.
Example: int a = 5; int b = 5; System.out.println(a == b); // true
Example: String str1 = ...read more

Asked in MedCords

Q. Explain TCP/IP layers in computer networks and how it works
TCP/IP is a protocol suite that defines how data is transmitted over the internet.
TCP/IP has four layers: application, transport, internet, and network access.
The application layer is responsible for user interaction, while the network access layer deals with hardware.
The transport layer ensures reliable data transfer, while the internet layer handles routing.
Examples of protocols in TCP/IP include HTTP, FTP, TCP, and IP.
TCP/IP is the foundation of the internet and is used fo...read more
Asked in Praeclarum Tech

Q. How do you handle high traffic in a Node.js backend?
To handle high traffic in a Node.js backend, implement strategies like clustering, load balancing, and caching.
Use Node.js clustering to utilize multiple CPU cores, e.g., 'cluster' module to fork worker processes.
Implement load balancing with tools like Nginx or HAProxy to distribute traffic evenly across servers.
Utilize caching mechanisms such as Redis or Memcached to store frequently accessed data and reduce database load.
Optimize database queries and use indexing to improv...read more

Asked in Convin

Q. Describe the protocol behind Web Sockets.
Web Sockets is a communication protocol that provides full-duplex communication channels over a single TCP connection.
Web Sockets allow for real-time, bi-directional communication between a client and a server.
They are commonly used in chat applications, online gaming, and live data streaming.
Web Sockets use the ws:// or wss:// protocol scheme in URLs.
The protocol is initiated with a handshake between the client and server.
Once the connection is established, data can be sent ...read more

Asked in Spinny

Q. What is your understanding of REST APIs?
REST APIs enable communication between client and server using standard HTTP methods for data exchange.
REST stands for Representational State Transfer, a set of architectural principles.
Uses standard HTTP methods: GET (retrieve), POST (create), PUT (update), DELETE (remove).
Resources are identified by URIs (e.g., /users/1 for user with ID 1).
Responses are typically in JSON or XML format, making it easy to parse.
Stateless interactions mean each request from client to server mu...read more

Asked in Jar

Q. Is JavaScript multithreaded or single-threaded?
Javascript is single threaded.
Javascript is single threaded, meaning it can only execute one piece of code at a time.
This is because of the event loop in Javascript, which manages the execution of code.
Asynchronous operations in Javascript, like setTimeout or AJAX requests, are handled by the event loop.
Web Workers can be used to achieve multithreading in Javascript for CPU-intensive tasks.

Asked in Convin

Q. Examples and description of asymmetric encryption alogorithms
Asymmetric encryption algorithms use a pair of keys to encrypt and decrypt data, providing secure communication.
RSA (Rivest-Shamir-Adleman) is a popular asymmetric encryption algorithm.
Elliptic Curve Cryptography (ECC) is another commonly used asymmetric encryption algorithm.
Asymmetric encryption is slower than symmetric encryption but provides better security.
Public key is used for encryption and private key is used for decryption in asymmetric encryption.

Asked in Convin

Q. What is the underlying data structure used in indexing, and what is its time complexity?
Indexing typically uses data structures like B-trees or hash tables for efficient retrieval, with time complexity of O(log n) or O(1) respectively.
Common data structures for indexing include B-trees and hash tables
B-trees are typically used for indexing in databases due to their balanced nature and efficient search operations
Hash tables are used for indexing in scenarios where constant time lookup is desired, but may have collisions requiring additional handling

Asked in A K Enterprise

Q. Tell me what you know about JavaScript.
JavaScript is a high-level, interpreted programming language used for creating interactive websites and web applications.
JavaScript is primarily used for client-side web development.
It can also be used for server-side development with Node.js.
JavaScript is versatile and can be used for creating animations, games, and mobile apps.
It supports object-oriented, imperative, and functional programming styles.
Common JavaScript frameworks/libraries include React, Angular, and Vue.

Asked in Milliman

Q. What are ACID properties in DBMS?
ACID properties are a set of properties that guarantee reliability and consistency in database transactions.
Atomicity: Ensures that either all operations in a transaction are completed successfully or none at all.
Consistency: Ensures that the database remains in a consistent state before and after the transaction.
Isolation: Ensures that the execution of multiple transactions concurrently does not interfere with each other.
Durability: Ensures that once a transaction is committ...read more

Asked in Beyondriffs

Q. What frameworks are used for MERN stack development?
MERN stack uses MongoDB, Express, React, and Node.js frameworks.
MongoDB - NoSQL database used for storing data
Express - Web application framework for Node.js
React - JavaScript library for building user interfaces
Node.js - JavaScript runtime environment for server-side development

Asked in Convin

Q. What is the time complexity of a recursive Fibonacci code implementation?
Time complexity of recursive fibonacci code is O(2^n)
The time complexity of a recursive fibonacci code is exponential, O(2^n)
This is because each call branches into two recursive calls, leading to exponential growth
For example, calculating fibonacci(5) would result in 15 function calls
Asked in Bytelearn Edtech

Q. Given a binary matrix, find the number of islands.
Count the number of islands in a binary matrix.
Traverse the matrix and for each 1 encountered, perform DFS to mark all connected 1s as visited.
Increment the island count for each new DFS traversal.
Use a visited matrix to keep track of visited cells.
Consider diagonal cells as connected if required.
Optimize by using Union-Find data structure.

Asked in Sekel Technologies

Q. What is the MVT architecture in Django?
MVT architecture in Django separates data, business logic, and presentation for efficient web application development.
MVT stands for Model-View-Template, a variation of MVC architecture.
Model: Represents the data structure and handles database interactions. Example: A 'User' model for user data.
View: Contains the business logic and processes user requests. Example: A view function that retrieves user data.
Template: Manages the presentation layer, rendering HTML. Example: A te...read more

Asked in Amazon

Q. Given a binary tree, find the lowest common ancestor (LCA) of two given nodes in the tree. According to the definition of LCA on Wikipedia: “The lowest common ancestor is defined between two nodes p and q as th...
read moreLCA of a binary tree is the lowest common ancestor of two nodes in the tree.
Traverse the tree from the root node to find the paths from root to the two given nodes.
Compare the paths to find the last common node, which is the LCA.
Use recursion to solve the problem efficiently.
Handle edge cases like if one of the nodes is the ancestor of the other.

Asked in HackerRank

Q. Why do you want to join HackerRank?
I want to join HackerRank to enhance my skills, contribute to innovative projects, and be part of a dynamic tech community.
HackerRank's focus on coding challenges aligns with my passion for problem-solving and continuous learning.
The opportunity to work with experienced developers will help me grow and refine my backend development skills.
I admire HackerRank's commitment to improving the hiring process through technology, and I want to contribute to that mission.
Being part of...read more

Asked in Sharedpro

Q. How do you handle exceptions in a Spring Boot microservice?
Exception handling in Spring Boot microservices involves using @ControllerAdvice and @ExceptionHandler annotations.
Use @ControllerAdvice to define global exception handling for all controllers
Use @ExceptionHandler to handle specific exceptions within a controller
Return appropriate HTTP status codes and error messages in the response

Asked in Amazon

Q. Given n non-negative integers representing an elevation map where the width of each bar is 1, compute how much water it can trap after raining.
Calculate the amount of rainwater trapped between elevation bars after rainfall.
Use two-pointer technique to traverse the elevation array from both ends.
Calculate the left and right maximum heights at each index.
Water trapped at each index is determined by the minimum of left and right max minus the height at that index.
Example: For heights [0,1,0,2,1,0,1,3,2,1,2,1], the trapped water is 6 units.

Asked in Dots & Coms

Q. Tell me everything you know about ASP.NET.
ASP.NET is a web application framework developed by Microsoft for building dynamic web sites, web applications, and web services.
Developed by Microsoft
Used for building dynamic web sites, web applications, and web services
Supports multiple programming languages such as C# and VB.NET
Includes features like authentication, authorization, and caching
Consists of ASP.NET Web Forms, ASP.NET MVC, and ASP.NET Web API
Interview Questions of Similar Designations
Interview Experiences of Popular Companies





Top Interview Questions for Backend Developer Intern Related Skills

Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary


Reviews
Interviews
Salaries
Users

