Filter interviews by
State in React is a JavaScript object that stores data and determines how a component renders and behaves.
State is mutable and can be updated using the setState() method
State should be used for data that will change over time and affect the component's rendering
State should not be modified directly, use setState() instead
Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.
Dependency injection helps in achieving loose coupling between classes.
It allows for easier testing by providing mock dependencies.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Solid concepts are fundamental principles or ideas that are well-established and widely accepted in a particular field.
Solid concepts provide a strong foundation for further learning and development.
They are essential for understanding complex topics and solving problems effectively.
Examples of solid concepts in software engineering include object-oriented programming, design patterns, and data structures.
Code to check if a string is a palindrome or not.
Iterate through the string from both ends and compare characters.
Use two pointers, one starting from the beginning and one from the end.
If characters at both pointers are equal, move both pointers towards the center.
If characters at any point are not equal, return false.
If both pointers meet in the middle, return true as the string is a palindrome.
OOPS concepts refer to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation d...
Text data can be loaded into DB systems using various methods such as SQL INSERT statements, bulk loading, or ETL processes.
Use SQL INSERT statements to insert text data into the database one record at a time.
For large datasets, consider using bulk loading techniques like BULK INSERT or LOAD DATA INFILE.
ETL (Extract, Transform, Load) processes can be used to extract text data from different sources, transform it a...
Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.
Dependency injection helps in achieving loose coupling between classes.
It allows for easier testing by providing mock dependencies.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
State in React is a JavaScript object that stores data and determines how a component renders and behaves.
State is mutable and can be updated using the setState() method
State should be used for data that will change over time and affect the component's rendering
State should not be modified directly, use setState() instead
OOPS concepts refer to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation detail...
Solid concepts are fundamental principles or ideas that are well-established and widely accepted in a particular field.
Solid concepts provide a strong foundation for further learning and development.
They are essential for understanding complex topics and solving problems effectively.
Examples of solid concepts in software engineering include object-oriented programming, design patterns, and data structures.
Code to check if a string is a palindrome or not.
Iterate through the string from both ends and compare characters.
Use two pointers, one starting from the beginning and one from the end.
If characters at both pointers are equal, move both pointers towards the center.
If characters at any point are not equal, return false.
If both pointers meet in the middle, return true as the string is a palindrome.
Yes, I've encountered OutOfMemoryError and resolved it through various strategies like optimizing memory usage and increasing heap size.
Identified memory leaks using profiling tools like VisualVM or YourKit.
Optimized data structures, e.g., using ArrayList instead of LinkedList for better memory efficiency.
Increased JVM heap size with -Xmx option based on application needs.
Implemented caching strategies to reduce memory...
Text data can be loaded into DB systems using various methods such as SQL INSERT statements, bulk loading, or ETL processes.
Use SQL INSERT statements to insert text data into the database one record at a time.
For large datasets, consider using bulk loading techniques like BULK INSERT or LOAD DATA INFILE.
ETL (Extract, Transform, Load) processes can be used to extract text data from different sources, transform it as per...
Top trending discussions
posted on 23 Oct 2021
I applied via Naukri.com and was interviewed before Oct 2020. There were 3 interview rounds.
Few basics of java
Dsa question
The question is asking about how to find the frequency of each character in a given string.
Iterate through the string and count the occurrences of each character
Store the counts in a data structure like a hashmap or array
Return the counts for each character
Reverse a given string
Create a new empty string to store the reversed string
Iterate through the original string from end to start and append each character to the new string
Return the reversed string
I applied via Company Website and was interviewed in Apr 2024. There were 2 interview rounds.
Find the length of the longest increasing subsequence in an array.
Use dynamic programming to solve this problem efficiently.
Iterate through the array and keep track of the longest increasing subsequence ending at each index.
Example: For array [10, 22, 9, 33, 21, 50, 41, 60, 80], the longest increasing subsequence is [10, 22, 33, 50, 60, 80] with length 6.
A polyfill for useEffect mimics React's useEffect behavior in non-React environments.
useEffect is a React Hook that allows you to perform side effects in function components.
A polyfill can be created using JavaScript closures to mimic the behavior of useEffect.
Example: A simple polyfill could store effects in an array and execute them after rendering.
You can use setTimeout to simulate the component lifecycle for cleanu...
I applied via Recruitment Consulltant and was interviewed before May 2023. There were 2 interview rounds.
Primary is used to define a primary bean when multiple beans of the same type are present, while Qualifier is used to specify which bean to autowire when multiple beans of the same type are present.
Primary annotation is used to give a higher preference to a bean when multiple beans of the same type are present in the Spring application context.
Qualifier annotation is used to specify which bean to autowire when multiple...
Fault tolerance in Microservices can be achieved through redundancy, graceful degradation, and circuit breakers.
Implementing redundancy by having multiple instances of each microservice running to handle failures.
Using graceful degradation to ensure that the system can still function even if certain microservices are unavailable.
Utilizing circuit breakers to prevent cascading failures by temporarily stopping requests t...
Implementing Spring Security involves configuring security settings in the Spring application.
Add Spring Security dependency in pom.xml
Configure security settings in SecurityConfig class
Define user roles and permissions
Use annotations like @EnableWebSecurity and @Secured
OAuth 2 is an authorization framework that allows a third-party application to obtain limited access to an HTTP service.
OAuth 2 is used for delegated access, allowing a user to grant a third-party application access to their resources without sharing their credentials.
It involves the use of access tokens, which are issued by the authorization server after the user authenticates and authorizes the application.
OAuth 2 su...
Java uses automatic memory management through garbage collection to allocate and deallocate memory.
Java uses garbage collection to automatically manage memory by deallocating objects that are no longer needed.
The JVM has a heap where objects are allocated and garbage collection is performed to reclaim memory.
Java provides the 'finalize()' method for objects to perform cleanup before they are garbage collected.
Memory le...
Different types of garbage collection algorithms in software development.
Mark and Sweep: Identifies and removes unreachable objects.
Generational: Divides objects into different generations based on age.
Parallel: Uses multiple threads to perform garbage collection concurrently.
Incremental: Spreads garbage collection work over multiple cycles to reduce pause times.
Executors are a class that provides factory and utility methods for Executor, ExecutorService is an interface that represents an asynchronous execution service.
Executors class provides factory and utility methods for Executor interface
ExecutorService is an interface that represents an asynchronous execution service
ExecutorService extends Executor interface
ExecutorService provides methods to manage termination and produ...
Find duplicates in an ArrayList of strings.
Iterate through the ArrayList and use a HashSet to keep track of seen elements.
If an element is already in the HashSet, it is a duplicate.
Store the duplicates in a separate ArrayList or print them directly.
based on 4 interview experiences
based on 2 reviews
Rating in categories
Data Researcher
104
salaries
| ₹3.8 L/yr - ₹6 L/yr |
Reference Data Analyst
61
salaries
| ₹4.1 L/yr - ₹11.4 L/yr |
Data Researcher II
29
salaries
| ₹4.5 L/yr - ₹5.8 L/yr |
Data Research Analyst
28
salaries
| ₹3.7 L/yr - ₹7 L/yr |
Data Analyst
26
salaries
| ₹4 L/yr - ₹10 L/yr |
Wells Fargo
Morningstar
Synchrony
Ocwen Financial Solutions