i
Netcore Cloud Private
Limited
Filter interviews by
I appeared for an interview in Feb 2025, where I was asked the following questions.
Top trending discussions
posted on 29 Jan 2021
I applied via Naukri.com and was interviewed in Jul 2020. There were 5 interview rounds.
JUnit test cases for different scenarios
Identify different scenarios to be tested
Write test cases for each scenario
Ensure test cases cover all possible outcomes
Use assertions to verify expected results
Mock dependencies if necessary
posted on 2 Apr 2022
I applied via Approached by Company and was interviewed before Apr 2021. There were 4 interview rounds.
posted on 3 May 2022
I applied via Company Website and was interviewed before May 2021. There were 3 interview rounds.
I have X years of experience in ____.
Worked with ____ for X years on various projects
Proficient in ____ with experience in developing complex applications
Have completed multiple courses and certifications in ____
Contributed to open-source projects in ____
posted on 6 Feb 2023
posted on 30 Apr 2024
I applied via Recruitment Consulltant and was interviewed in Mar 2024. There were 2 interview rounds.
posted on 27 Jun 2024
Angular is a popular open-source web application framework developed by Google for building dynamic single-page applications.
Angular is based on TypeScript, a superset of JavaScript.
It follows the MVC (Model-View-Controller) architecture.
Angular provides features like data binding, dependency injection, and routing.
It has a powerful CLI (Command Line Interface) for scaffolding and building projects.
Angular has a large ...
Directives and pipes are features in Angular that allow developers to extend HTML functionality and transform data in templates.
Directives are markers on a DOM element that tell Angular to attach a specified behavior to that DOM element or transform the DOM element and its children.
Pipes are used to format data in a template. They take in data as input and transform it into the desired output for display.
Examples of di...
posted on 21 May 2025
I appeared for an interview before May 2024, where I was asked the following questions.
posted on 28 Mar 2025
I appeared for an interview in Sep 2024, where I was asked the following questions.
Balancing work and life involves setting boundaries, prioritizing tasks, and ensuring time for personal interests and family.
Set clear boundaries: Define work hours and stick to them to avoid burnout. For example, no emails after 6 PM.
Prioritize tasks: Use tools like the Eisenhower Matrix to distinguish between urgent and important tasks.
Schedule personal time: Block out time in your calendar for hobbies or family acti...
posted on 24 May 2021
Entity Framework is an Object-Relational Mapping (ORM) framework that enables developers to work with relational databases using .NET objects.
EF is a tool for creating data access layer in .NET applications
It allows developers to work with databases using C# or VB.NET code instead of SQL
EF supports LINQ queries and provides automatic change tracking
EF can generate database schema from code-first approach
EF can also gen...
Dependency injection is a design pattern used to remove hard-coded dependencies and make code more modular and testable.
Dependencies are injected into a class rather than being hard-coded
This allows for easier testing and swapping of dependencies
Commonly used in frameworks like Spring and Angular
Generics and collections are fundamental concepts in Java programming.
Generics allow for type safety and reusability of code.
Collections are data structures that store and manipulate groups of objects.
Examples of collections include ArrayList, LinkedList, and HashMap.
Generics can be used with collections to ensure type safety.
Collections provide methods for adding, removing, and accessing elements.
SQL injection is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate the database.
SQL injection attacks exploit vulnerabilities in web applications that do not properly validate user input.
Attackers can use SQL injection to steal sensitive data, modify or delete data, or even take control of the entire database.
Preventing SQL injection involves using parameterized querie...
Security in REST API can be handled by implementing authentication, authorization, encryption, and input validation.
Implement authentication using tokens or OAuth2
Implement authorization by defining roles and permissions
Encrypt sensitive data using SSL/TLS
Validate input data to prevent injection attacks
Implement rate limiting to prevent DDoS attacks
SOAP is a protocol for exchanging structured information in the implementation of web services. REST is an architectural style for building web services.
SOAP stands for Simple Object Access Protocol
SOAP uses XML for message exchange
SOAP requires more bandwidth and processing power than REST
REST uses HTTP for communication
REST is more flexible and scalable than SOAP
RESTful APIs are easier to implement and maintain than ...
Table data can be retrieved in store procedures using SELECT statement.
Use SELECT statement to retrieve data from table in store procedures.
Specify the table name and columns to retrieve data from.
Use WHERE clause to filter data based on conditions.
Use ORDER BY clause to sort data based on column values.
An index in a table is a data structure that improves the speed of data retrieval operations.
Indexes are created on one or more columns of a table.
They allow for faster searching and sorting of data.
Indexes can be unique or non-unique.
Examples of indexes include primary keys, foreign keys, and clustered indexes.
Adding index on all columns in a table can slow down write operations and increase storage space.
Adding index on all columns can increase the storage space required for the table.
It can also slow down write operations as the index needs to be updated for every write operation.
It may improve read performance for queries that use all columns in the table.
It is generally not recommended to add index on all columns in a ta...
A trigger is a piece of code that automatically executes in response to a specific event or change in a system.
Triggers are commonly used in databases to automatically perform actions when certain data is inserted, updated, or deleted.
Triggers can be used to enforce business rules, validate data, or perform complex calculations.
Examples of triggers include sending an email notification when a new record is added to a d...
Stored procedures are precompiled and can return multiple result sets, while functions are not precompiled and can only return a single value.
Stored procedures are used to perform a set of operations and can return multiple result sets.
Functions are used to perform a single operation and can only return a single value.
Stored procedures are precompiled and stored in the database, while functions are compiled at runtime.
...
Action filter is a feature in ASP.NET MVC that allows you to execute code before or after an action method is executed.
Action filters are attributes that can be applied to controller actions or globally to all actions in the application.
They can be used for authentication, caching, logging, exception handling, and more.
Examples of action filters include AuthorizeAttribute, OutputCacheAttribute, HandleErrorAttribute, an...
Sequence of filters in software development
Define the problem and requirements
Choose appropriate filters based on the problem
Implement and test the filters in sequence
Refine and optimize the filters as needed
based on 1 interview experience
Difficulty level
Duration
based on 10 reviews
Rating in categories
Software Engineer
70
salaries
| ₹4 L/yr - ₹13.2 L/yr |
Senior Software Engineer
68
salaries
| ₹6 L/yr - ₹22.5 L/yr |
Assistant Manager
61
salaries
| ₹11.7 L/yr - ₹21.9 L/yr |
Customer Success Manager
41
salaries
| ₹6 L/yr - ₹21 L/yr |
Software Developer
22
salaries
| ₹2.7 L/yr - ₹10 L/yr |
Softenger
Capital Numbers Infotech
JK Tech
DesignTech Systems