Filter interviews by
Dependency injection is a design pattern used to remove hard-coded dependencies and make code more modular and testable.
Dependency injection involves injecting dependencies into a class rather than having the class create them itself.
This allows for easier testing and swapping out of dependencies.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Example...
Virtual keyword is used to declare a method in a base class that can be overridden in a derived class. Override keyword is used in the derived class to override the implementation of the virtual method.
Virtual keyword is used in the base class to declare a method that can be overridden in the derived class
Override keyword is used in the derived class to override the implementation of the virtual method
Virtual meth...
Indexes in SQL are used to improve the performance of queries by allowing faster data retrieval.
Indexes are created on one or more columns of a table.
They work like a book index, allowing the database to quickly find the data.
Indexes can be clustered or non-clustered.
Clustered indexes determine the physical order of data in a table.
Non-clustered indexes create a separate structure to store the index data.
Indexes s...
Extension methods are static methods that allow adding new functionality to existing types without modifying the original type.
Extension methods are defined in a static class.
They must be declared with the 'this' keyword before the first parameter.
They can be called as if they were instance methods of the extended type.
Extension methods can be used to add functionality to built-in types or custom types.
Example: ad...
Routing in MVC is done through the use of routes, which map URLs to controller actions.
Routes are defined in the RouteConfig.cs file in the App_Start folder
Routes consist of a URL pattern and a corresponding controller action
Routes can also include optional parameters and constraints
Routing is done through the use of the ASP.NET routing engine
Routing can be customized by creating custom route handlers
Filters in MVC are used to intercept and modify HTTP requests and responses.
Filters can be used to implement authentication and authorization.
They can also be used for caching and logging.
Examples of filters include AuthorizationFilter, ActionFilter, and ExceptionFilter.
Singleton design pattern restricts the instantiation of a class to a single instance and provides a global point of access to it.
Used when only one instance of a class is required throughout the system
Provides a global point of access to the instance
Implemented using a private constructor, static method, and static variable
Example: Logger class, Database connection class
Program to find the second largest element from a 4-digit number
Convert the number to a string and split it into an array of characters
Sort the array in descending order
Return the second element of the array
Understanding pointer manipulation in C/C++ can lead to unexpected outputs, especially with arrays and dereferencing.
Pointers hold memory addresses, allowing direct access to variables.
Dereferencing a pointer gives the value at the address it points to.
Modifying a value through a pointer affects the original variable.
Example: int a = 5; int *p = &a; *p = 10; // a is now 10.
Pointer arithmetic can lead to access...
I would follow the standard protocol for handling a dead machine.
I would first confirm that the machine is indeed dead and not just malfunctioning.
I would then follow the standard protocol for handling dead machines, which may include checking for any visible damage or signs of wear and tear.
If necessary, I would consult with other engineers or technical experts to determine the best course of action for repairing...
Solid Principles are a set of five design principles for writing clean, maintainable, and scalable code.
Single Responsibility Principle (SRP) - A class should have only one reason to change.
Open/Closed Principle (OCP) - Software entities should be open for extension but closed for modification.
Liskov Substitution Principle (LSP) - Objects of a superclass should be replaceable with objects of its subclasses without affe...
Design patterns are reusable solutions to common problems encountered in software design and development.
Design patterns provide a way to communicate solutions to common design problems
They help in making code more maintainable, scalable, and reusable
Examples include Singleton, Factory, Observer, and Strategy patterns
Our current project architecture follows a microservices design pattern with Docker containers and Kubernetes for orchestration.
Microservices architecture
Docker containers
Kubernetes for orchestration
I am interested in NCR because of its reputation for innovation and cutting-edge technology in the software industry.
NCR has a strong reputation for innovation and cutting-edge technology
I am excited about the opportunity to work on challenging projects at NCR
I believe NCR offers a great platform for career growth and development
All aptitude coding and mcqs
Oops in Java refers to Object-Oriented Programming concepts like inheritance, polymorphism, encapsulation, and abstraction.
Oops stands for Object-Oriented Programming
Key concepts include inheritance, polymorphism, encapsulation, and abstraction
Example: Inheritance allows a class to inherit attributes and methods from another class
I applied via Approached by Company and was interviewed in Oct 2024. There were 2 interview rounds.
Write a program to print first and last letters of words alternatively from am list
OOPs stands for Object-Oriented Programming. It is based on four main pillars: Inheritance, Encapsulation, Abstraction, and Polymorphism.
Inheritance: Allows a class to inherit properties and behavior from another class. Example: class B extends class A.
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: using private access modifiers to restrict access to certain data.
Abstract...
I appeared for an interview in May 2025, where I was asked the following questions.
Loop in a linked list refers to a situation where a node in the list points to a previous node, creating a cycle.
Check for a loop using Floyd's cycle detection algorithm
Use two pointers, one moving at twice the speed of the other
If the two pointers meet at some point, there is a loop
To delete a node in a linked list with a given pointer, update the node's value and next pointer to the next node's value and next pointer.
Set the value of the node to the value of the next node
Set the next pointer of the node to the next node's next pointer
I applied via Approached by Company and was interviewed in Dec 2024. There was 1 interview round.
I appeared for an interview before Jun 2024, where I was asked the following questions.
I appeared for an interview in Apr 2025, where I was asked the following questions.
Top trending discussions
Some of the top questions asked at the NCR Corporation interview -
The duration of NCR Corporation interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 125 interview experiences
Difficulty level
Duration
based on 1.7k reviews
Rating in categories
Software Engineer
397
salaries
| ₹6.1 L/yr - ₹20 L/yr |
Senior Software Engineer
284
salaries
| ₹9.5 L/yr - ₹36 L/yr |
Software Engineer2
193
salaries
| ₹9.8 L/yr - ₹21.3 L/yr |
Software Engineer III
185
salaries
| ₹13 L/yr - ₹35 L/yr |
Software Engineer II
153
salaries
| ₹9.2 L/yr - ₹23 L/yr |
DXC Technology
Sutherland Global Services
Optum Global Solutions
Virtusa Consulting Services