Filter interviews by
I was asked to write SQL queries for data retrieval, aggregation, and manipulation during the interview.
Write a query to select all columns from a table: `SELECT * FROM employees;`
Create a query to count the number of records: `SELECT COUNT(*) FROM orders;`
Join two tables to retrieve related data: `SELECT a.name, b.order_date FROM customers a JOIN orders b ON a.id = b.customer_id;`
Use a WHERE clause to filter resu...
Tree traversal methods: inorder, preorder, and postorder are essential for accessing nodes in a binary tree.
Inorder Traversal: Visit left subtree, root, then right subtree. Example: For tree 1,2,3, output is 2,1,3.
Preorder Traversal: Visit root, left subtree, then right subtree. Example: For tree 1,2,3, output is 1,2,3.
Postorder Traversal: Visit left subtree, right subtree, then root. Example: For tree 1,2,3, outp...
Spring Sleuth is a distributed tracing system for microservices built on top of Spring Cloud.
Spring Sleuth helps in tracking and monitoring requests as they travel through different microservices.
It generates unique trace and span IDs for each request to help in correlating logs and metrics.
Spring Sleuth integrates with Zipkin, a distributed tracing system, to provide visualization of request flows.
It is commonly ...
Redux is a predictable state container for JavaScript apps.
Redux is a state management library commonly used with React.
It helps in managing the state of an application in a predictable way.
Redux follows a unidirectional data flow architecture.
Actions are dispatched to update the state through reducers.
State is stored in a single immutable state tree.
Primary constraints are used to uniquely identify a record while secondary constraints are used to enforce business rules.
Primary constraints are used to create a unique identifier for a record in a table
Primary constraints can be used to enforce referential integrity
Secondary constraints are used to enforce business rules
Secondary constraints can be used to limit the values that can be entered into a column
I applied via Campus Placement
HashMaps and String-based questions
I applied via Referral
I appeared for an interview before May 2024, where I was asked the following questions.
I applied via Campus Placement
Questions were asked on trees and graphs
I applied via Referral and was interviewed before Aug 2023. There were 2 interview rounds.
Regarding Data structures and algorithms.
I appeared for an interview before Mar 2024, where I was asked the following questions.
I was asked to write SQL queries for data retrieval, aggregation, and manipulation during the interview.
Write a query to select all columns from a table: `SELECT * FROM employees;`
Create a query to count the number of records: `SELECT COUNT(*) FROM orders;`
Join two tables to retrieve related data: `SELECT a.name, b.order_date FROM customers a JOIN orders b ON a.id = b.customer_id;`
Use a WHERE clause to filter results: ...
Primary constraints are used to uniquely identify a record while secondary constraints are used to enforce business rules.
Primary constraints are used to create a unique identifier for a record in a table
Primary constraints can be used to enforce referential integrity
Secondary constraints are used to enforce business rules
Secondary constraints can be used to limit the values that can be entered into a column
Top trending discussions
Some of the top questions asked at the NCR Corporation Software Engineer interview -
based on 11 interview experiences
Difficulty level
Duration
based on 86 reviews
Rating in categories
Software Engineer
384
salaries
| ₹10.1 L/yr - ₹18 L/yr |
Senior Software Engineer
255
salaries
| ₹17.7 L/yr - ₹32 L/yr |
Software Engineer2
201
salaries
| ₹12.8 L/yr - ₹22.5 L/yr |
Software Engineer III
193
salaries
| ₹21.6 L/yr - ₹35 L/yr |
Devops Engineer
163
salaries
| ₹9.7 L/yr - ₹17 L/yr |
DXC Technology
Optum Global Solutions
Virtusa Consulting Services
CGI Group