Full Stack Software Developer

300+ Full Stack Software Developer Interview Questions and Answers

Updated 6 Jul 2025
search-icon

Asked in Synergy

4d ago

Q. Oops in Java Patterns in Java JDK,JRE,JVM MVC Array questions strings in Java This,super keywords Java problems like palindrome, prime number,and so many problems and logics Why java is platform independent Why...

read more
Ans.

Questions asked in a Full Stack Software Developer interview

  • Questions on OOPs concepts, design patterns, and MVC architecture

  • Array and string manipulation in Java

  • Understanding of JDK, JRE, and JVM

  • Usage of 'this' and 'super' keywords

  • Solving Java problems like palindrome, prime number, etc.

  • Explanation of Java's platform independence

  • SQL queries and commands

Asked in UST

4d ago

Q. If an application is running slowly, what process would you follow to find the root cause? Specify for the database, backend API, and frontend.

Ans.

Process to find root cause of slow application for database, backend api and frontend side.

  • Check server logs for errors and warnings

  • Use profiling tools to identify bottlenecks

  • Optimize database queries and indexes

  • Minimize network requests and optimize API responses

  • Reduce image and file sizes for faster loading

  • Use caching to reduce server load

  • Check for memory leaks and optimize memory usage

Full Stack Software Developer Interview Questions and Answers for Freshers

illustration image

Asked in Cognizant

5d ago

Q. Briefly explain the method you would use to implement an array-based linked list.

Ans.

An array linked list can be executed using a loop to traverse through the array and access the linked nodes.

  • Create an array to store the linked nodes

  • Assign the first node to the first element of the array

  • Use a loop to traverse through the array and access the linked nodes

  • To access the next node, use the index of the current node as the index of the next node in the array

  • Stop the loop when the last node is reached

Asked in Cognizant

5d ago

Q. What is the difference between a primary key, foreign key, candidate key, and super key?

Ans.

Primary key uniquely identifies a record, foreign key links tables, candidate key can be primary key, super key is a set of attributes.

  • Primary key: Unique identifier for a record in a table

  • Foreign key: Links tables together by referencing the primary key of another table

  • Candidate key: A set of attributes that can be used as a primary key

  • Super key: A set of attributes that can uniquely identify a record

Are these interview questions helpful?

Asked in Cognizant

2d ago

Q. What are streams in C++? What are predefined streams in C++?

Ans.

Streams in C++ are used for input and output operations. Predefined streams in C++ include cin, cout, cerr, and clog.

  • Streams in C++ are objects that allow reading from or writing to external sources or destinations.

  • cin is the standard input stream used for reading input from the user.

  • cout is the standard output stream used for printing output to the console.

  • cerr is the standard error stream used for printing error messages to the console.

  • clog is an alternative to cerr for pri...read more

Asked in Keyideas

1d ago

Q. What is the best approach to find the missing number from a set of consecutive n numbers?

Ans.

One approach is to calculate the sum of all numbers in the set and then subtract the sum of the given numbers to find the missing number.

  • Calculate the sum of all numbers in the set using the formula n*(n+1)/2, where n is the total number of elements in the set.

  • Calculate the sum of the given numbers in the set.

  • Subtract the sum of the given numbers from the sum of all numbers to find the missing number.

Full Stack Software Developer Jobs

Oracle logo
Fullstack Software Developer 3-6 years
Oracle
3.7
Mumbai
Rolls-royce India logo
Fullstack Software Developer 4-9 years
Rolls-royce India
3.9
Bangalore / Bengaluru
Jaquar Group logo
Deputy Manager _Full stack software developer 6-10 years
Jaquar Group
4.1
Manesar

Asked in Cognizant

6d ago

Q. What are reference variables and how are they defined in C++?

Ans.

Reference variables in C++ are aliases for other variables, allowing direct access and manipulation of the original data.

  • Reference variables are declared using an ampersand (&) symbol.

  • They must be initialized when declared and cannot be reassigned to refer to a different variable.

  • Changes made to a reference variable affect the original variable it refers to.

  • They are commonly used to pass variables by reference to functions.

  • Reference variables can be used to create multiple na...read more

Asked in Hoping Minds

4d ago

Q. How do we link our stylesheet with the HTML?

Ans.

Linking a stylesheet with HTML involves using the <link> tag in the <head> section of the HTML document.

  • Use the <link> tag in the <head> section of the HTML document.

  • Specify the path to the stylesheet file in the href attribute of the <link> tag.

  • Set the rel attribute of the <link> tag to 'stylesheet'.

  • Example: <link rel='stylesheet' type='text/css' href='styles.css'>

Share interview questions and help millions of jobseekers 🌟

man-with-laptop
1d ago

Q. React and react-router-dom's latest versions have been released. What are the latest features?

Ans.

React and React Router DOM's latest versions introduce exciting features for improved performance and developer experience.

  • React 18 introduced Concurrent Rendering, allowing React to work on multiple tasks simultaneously for smoother user experiences.

  • Automatic Batching in React 18 enables batching of state updates, reducing the number of renders and improving performance.

  • React Router v6 features a simplified API, making it easier to define routes and nested routes with less b...read more

Asked in Cognizant

2d ago

Q. Can you tell us something about scope rules in C++?

Ans.

Scope rules in C++ determine the visibility and accessibility of variables and functions within a program.

  • Variables declared within a block have local scope and are only accessible within that block.

  • Global variables have file scope and can be accessed from any function within the file.

  • Function parameters have function scope and are only accessible within that function.

  • Nested blocks can have their own scope, and variables declared within them are only accessible within that bl...read more

Asked in Cognizant

5d ago

Q. What is the difference between a "semaphore" and a "monitor"?

Ans.

Semaphore and monitor are synchronization tools used in concurrent programming.

  • Semaphore is a signaling mechanism that allows multiple threads to access a shared resource simultaneously.

  • Monitor is a synchronization construct that allows threads to have both mutual exclusion and the ability to wait (block) for a certain condition to become true.

  • Semaphore is a lower-level primitive, while monitor is a higher-level abstraction.

  • Semaphore can be used to implement a monitor.

  • Example...read more

2d ago

Q. Can a service file have more than one instance? If yes, how?

Ans.

Yes, a service file can have more than one instance by creating multiple instances of the service class.

  • Multiple instances of a service class can be created by instantiating the class multiple times.

  • Each instance will have its own state and can be used independently.

  • This can be useful for scenarios where multiple instances of the same service are needed to handle different tasks.

Asked in Cognizant

3d ago

Q. Do you think BCNF is better than 2NF and 3NF? Why?

Ans.

BCNF is not necessarily better than 2NF & 3NF, it depends on the specific requirements of the database.

  • BCNF is the highest normal form and ensures that there are no non-trivial functional dependencies between any subset of candidate keys.

  • 2NF and 3NF are also important and should be used when appropriate.

  • For example, if a database has a composite primary key and non-key attributes that depend on only one part of the key, 2NF should be used.

  • If a database has transitive dependen...read more

Asked in Cognizant

4d ago

Q. What are the various forms of normalization?

Ans.

Normalization is a process of organizing data in a database to eliminate redundancy and improve data integrity.

  • First Normal Form (1NF) - Eliminate duplicate data by separating them into multiple tables.

  • Second Normal Form (2NF) - Remove partial dependencies by creating separate tables for sets of attributes.

  • Third Normal Form (3NF) - Eliminate transitive dependencies by creating separate tables for related attributes.

  • Boyce-Codd Normal Form (BCNF) - Remove anomalies by ensuring ...read more

Asked in Hoping Minds

4d ago

Q. What are the capabilities of JavaScript?

Ans.

JavaScript is a versatile programming language that can be used for both front-end and back-end development.

  • JavaScript is primarily used for client-side scripting, allowing dynamic content and interactivity on websites.

  • It can also be used for server-side development with frameworks like Node.js.

  • JavaScript has a wide range of capabilities, including manipulating HTML and CSS, handling events, creating animations, and making HTTP requests.

  • It supports object-oriented programming...read more

Asked in Cognizant

2d ago

Q. What is the difference between rand() and srand()?

Ans.

rand() generates a random number, srand() seeds the random number generator.

  • rand() generates a pseudo-random number between 0 and RAND_MAX

  • srand() sets the seed for the random number generator used by rand()

  • srand() should be called before rand() to ensure different sequences of random numbers

  • Example: srand(time(NULL)) sets the seed to the current time, ensuring a different sequence each time the program is run

Asked in Oracle

1d ago

Q. Given a directory name, write a program to return a list of all .tst files present in the directory and its subdirectories.

Ans.

Program to return list of .tst files in given directory and subdirectories

  • Use recursion to traverse through all directories and subdirectories

  • Check if each file has .tst extension and add to list if true

  • Use built-in functions like os.listdir() and os.path.splitext() in Python

6d ago

Q. Explain class-based and function-based React components, including their differences.

Ans.

Class based vs function based React components with differences explained.

  • Class based components are ES6 classes that extend React.Component and have lifecycle methods.

  • Function based components are simple functions that return JSX.

  • Class based components have state and lifecycle methods, while function based components use hooks for state and lifecycle management.

  • Class based components have a render method, while function based components directly return JSX.

  • Class based compon...read more

Asked in LTIMindtree

6d ago

Q. If I add two objects with the same attribute values to a set, will the set contain two objects? If so, what changes would you make to the code to ensure only unique objects are inserted into the set?

Ans.

No, you will not see 2 objects in the set. To insert unique objects to a set, you can override the equals() and hashCode() methods in the object class.

  • In a set, each element must be unique based on the equals() method. If you add 2 objects with the same attribute values, only one will be stored in the set.

  • To ensure uniqueness, override the equals() and hashCode() methods in the object class. This will define how objects are compared and stored in the set.

  • For example, if you h...read more

Asked in Cognizant

1d ago

Q. What is "top-n analysis" in DBMS?

Ans.

Top-n analysis is a technique used in DBMS to retrieve the top n records based on a specific criteria.

  • Used to retrieve top n records

  • Based on specific criteria

  • Commonly used in data analysis and reporting

Asked in Typeface

3d ago

Q. What we can achieve more in DropBox assignment, like authentication, authoriation, any other better way

Ans.

In the DropBox assignment, we can enhance security by implementing two-factor authentication, role-based access control, and encryption.

  • Implement two-factor authentication to add an extra layer of security

  • Utilize role-based access control to restrict access based on user roles

  • Implement encryption to protect data both in transit and at rest

Asked in Cognizant

1d ago

Q. What are character constants in C++?

Ans.

Character constants are fixed values represented by a single character in C++.

  • They are enclosed in single quotes (' ')

  • Examples include 'a', 'B', '5', '$'

  • They are also known as character literals

Asked in Cognizant

1d ago

Q. What do you mean by normalization?

Ans.

Normalisation is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • It involves breaking down a table into smaller tables and defining relationships between them.

  • Normalization helps to eliminate data inconsistencies and anomalies.

  • There are different levels of normalization, with each level having specific rules to follow.

  • Examples of normalization include converting repeating groups into separate tables and creating a junction table fo...read more

6d ago

Q. Explain the new Angular feature that doesn't use @NgModule.

Ans.

The new Angular feature that doesn't use @NgModule is called Ivy.

  • Ivy is the new rendering engine in Angular that doesn't rely on @NgModule for compilation.

  • It allows for faster compilation times and smaller bundle sizes.

  • Ivy enables features like improved tree shaking and better debugging capabilities.

  • Example: Angular 9 introduced Ivy as the default rendering engine.

Asked in GormalOne

5d ago

Q. Create a Web API project in .Net Core for an EmployeeApp, which contains id, name, salary, etc., and supports CRUD operations.

Ans.

Create a .NET Core Web API for managing employee data with CRUD operations.

  • 1. Set up a new .NET Core Web API project using 'dotnet new webapi -n EmployeeApp'.

  • 2. Define an Employee model class with properties: Id, Name, Salary.

  • 3. Create an EmployeeController with methods for Create, Read, Update, and Delete operations.

  • 4. Use Entity Framework Core for data access and create a DbContext for the Employee model.

  • 5. Implement dependency injection for the DbContext in Startup.cs.

  • 6. T...read more

Asked in Cognizant

2d ago

Q. Where are indexes generally created?

Ans.

INDEX is generally created on columns that are frequently used in WHERE, JOIN, and ORDER BY clauses.

  • INDEX improves the performance of SELECT queries.

  • INDEX should be created on columns with high selectivity.

  • INDEX should not be created on columns with low selectivity.

  • Examples of columns to create INDEX on are primary keys, foreign keys, and columns used in search queries.

Asked in GitLab

2d ago

Q. What is the process for signing legal documents?

Ans.

The process to sign legal documents involves reviewing the document, signing in the presence of a witness if required, and storing the signed document securely.

  • Review the legal document thoroughly to ensure understanding of its contents and implications

  • Sign the document in the designated signature area using your legal name

  • If required, have a witness present during the signing process

  • Store the signed document in a secure location for future reference

3d ago

Q. How would the application work without @NgModule?

Ans.

The application would not work properly without @NgModule as it is required to bootstrap the application and configure dependencies.

  • Without @NgModule, the application would not be able to bootstrap and start properly.

  • NgModule is used to configure dependencies, such as components, directives, and services.

  • NgModule also helps in organizing the application into modules for better maintainability and reusability.

1d ago

Q. What are you looking for in a job?

Ans.

When looking for a job, I seek growth opportunities, a positive work culture, and alignment with my skills and values.

  • Career Growth: Opportunities for advancement, like mentorship programs or training.

  • Work-Life Balance: Flexible hours or remote work options that support personal life.

  • Company Culture: A collaborative environment where teamwork is encouraged.

  • Skill Utilization: A role that allows me to use my full stack skills effectively.

  • Impact: A chance to work on projects tha...read more

1d ago

Q. How do you make an application scalable?

Ans.

To make an application scalable, consider using cloud services, optimizing database queries, caching frequently accessed data, and using microservices architecture.

  • Utilize cloud services like AWS or Azure for scalability on demand

  • Optimize database queries to improve performance

  • Implement caching mechanisms for frequently accessed data to reduce load on servers

  • Use microservices architecture to break down the application into smaller, independent services that can be scaled indi...read more

1
2
3
4
5
6
7
Next

Interview Experiences of Popular Companies

TCS Logo
3.6
 • 11.1k Interviews
Accenture Logo
3.7
 • 8.7k Interviews
Infosys Logo
3.6
 • 7.9k Interviews
Cognizant Logo
3.7
 • 5.9k Interviews
LTIMindtree Logo
3.7
 • 3k Interviews
View all
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Full Stack Software Developer Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Trusted by over 1.5 Crore job seekers to find their right fit company
80 L+

Reviews

10L+

Interviews

4 Cr+

Salaries

1.5 Cr+

Users

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2025 Info Edge (India) Ltd.

Follow Us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter
Profile Image
Hello, Guest
AmbitionBox Employee Choice Awards 2025
Winners announced!
awards-icon
Contribute to help millions!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos
Add office benefits
Add office benefits