i
ValueMomentum
Filter interviews by
Considerations for moving an application to Azure
Assess application compatibility with Azure
Evaluate cost and pricing options
Determine data storage and security requirements
Plan for migration and downtime
Consider scalability and performance needs
As an Architect, I will follow these steps to move an application to Azure.
Assess the application's compatibility with Azure
Choose the appropriate Azure services for the application
Migrate the application data to Azure
Re-architect the application if necessary
Test the application thoroughly after migration
Dependency injection is a design pattern that allows objects to receive dependencies rather than creating them internally.
Dependency injection separates the creation of an object from its dependencies.
It makes code more modular and testable.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Example: Instead of creating a database connection object inside...
Microservices are small, independent services that work together to form a larger application. They can use the same database.
Microservices are a way of breaking down a large application into smaller, more manageable pieces.
Each microservice is responsible for a specific task or function.
Microservices communicate with each other through APIs.
They can use the same database, but it's generally recommended to use sep...
Authentication in Web API involves using endpoints and HTTP verbs to verify user identity.
Authentication is the process of verifying user identity before granting access to resources
Web API uses endpoints such as /login and /register to handle authentication requests
HTTP verbs such as POST and GET are used to send and receive authentication data
Authentication can be implemented using various methods such as OAuth,...
I applied via Naukri.com and was interviewed in Jan 2022. There were 2 interview rounds.
Microservices are small, independent services that work together to form a larger application. They can use the same database.
Microservices are a way of breaking down a large application into smaller, more manageable pieces.
Each microservice is responsible for a specific task or function.
Microservices communicate with each other through APIs.
They can use the same database, but it's generally recommended to use separate...
Authentication in Web API involves using endpoints and HTTP verbs to verify user identity.
Authentication is the process of verifying user identity before granting access to resources
Web API uses endpoints such as /login and /register to handle authentication requests
HTTP verbs such as POST and GET are used to send and receive authentication data
Authentication can be implemented using various methods such as OAuth, JWT,...
As an Architect, I will follow these steps to move an application to Azure.
Assess the application's compatibility with Azure
Choose the appropriate Azure services for the application
Migrate the application data to Azure
Re-architect the application if necessary
Test the application thoroughly after migration
Considerations for moving an application to Azure
Assess application compatibility with Azure
Evaluate cost and pricing options
Determine data storage and security requirements
Plan for migration and downtime
Consider scalability and performance needs
Top trending discussions
I appeared for an interview in Apr 2025, where I was asked the following questions.
I have successfully identified and resolved various performance issues in my previous projects, enhancing system efficiency.
Optimized database queries, reducing response time by 40% in a web application.
Implemented caching strategies that improved load times for frequently accessed data.
Refactored code to eliminate bottlenecks, resulting in a smoother user experience.
Conducted performance testing and monitoring, leadin...
Securing microservices involves implementing best practices like authentication, encryption, and network security to protect data and services.
Implement strong authentication mechanisms (e.g., OAuth2, JWT) to ensure only authorized users can access services.
Use HTTPS for all communications to encrypt data in transit and prevent eavesdropping.
Employ API gateways to manage traffic, enforce security policies, and provide ...
A system for searching products and placing orders efficiently with user-friendly interfaces and robust backend architecture.
User Interface: Design a clean UI for product search with filters (e.g., category, price range).
Search Functionality: Implement a search algorithm (e.g., Elasticsearch) for fast and relevant results.
Product Details: Each product should have a detailed page with images, descriptions, and reviews.
S...
A negative product quantity indicates a logical error, typically requiring a 400 Bad Request response.
HTTP 400 Bad Request: Indicates the server cannot process the request due to client error.
Example: If a user tries to purchase a product with a negative quantity, the server should respond with 400.
This status code informs the client that their request is invalid and needs correction.
Designing an API that processes XML requests and returns JSON responses involves several key steps and considerations.
Define API endpoints and methods (e.g., GET, POST).
Implement XML parsing to handle incoming requests.
Convert parsed XML data into a suitable internal data structure.
Process the request and generate the appropriate response.
Convert the response data into JSON format.
Set appropriate HTTP headers for conte...
Java 17 introduced several features like sealed classes, pattern matching, and enhanced switch statements that improve code efficiency.
Sealed Classes: Allow control over which classes can extend them. Example: `sealed class Shape permits Circle, Square {}`.
Pattern Matching for instanceof: Simplifies type checks and casting. Example: `if (obj instanceof String s) { ... }`.
Enhanced Switch Statements: Supports multiple ca...
I applied via Naukri.com and was interviewed in Mar 2024. There was 1 interview round.
posted on 11 Mar 2022
I appeared for an interview before Mar 2021.
Round duration - 60 minutes
Round difficulty - Medium
21 students were shortlisted from the 1st MCQ round and in this round we were asked to write the codes (function only) of 3 questions in 1 hour time.
You are given a grid containing oranges where each cell of the grid can contain one of the three integer values:
Find the minimum time required to rot all fresh oranges in a grid.
Use Breadth First Search (BFS) to simulate the rotting process
Track the time taken to rot all oranges and return -1 if any fresh oranges remain
Handle edge cases like no fresh oranges or all oranges already rotten
Consider using a queue to efficiently process adjacent oranges
Given an array/list 'ARR' consisting of 'N' integers, your task is to find the majority element in the array. If there is no majority element present, return -1.
Find the majority element in an array, return -1 if no majority element exists.
Iterate through the array and keep track of the count of each element using a hashmap.
Check if any element's count is greater than floor(N/2) to determine the majority element.
Return the majority element or -1 if no majority element exists.
You are provided with a non-empty binary tree in which each node contains a non-negative integer value. Your task is to find and return the maximum ...
Find the maximum path sum between two leaf nodes in a binary tree.
Traverse the tree to find the maximum path sum between two leaf nodes.
Keep track of the maximum sum found so far.
Consider all possible paths between leaf nodes.
Handle cases where the tree has only a single leaf node.
Implement a recursive function to calculate the maximum path sum.
Round duration - 60 minutes
Round difficulty - Medium
This was a technical round with DSA based questions.
You are given a Singly Linked List of integers. The task is to find the N-th node from the end of the list.
If the given list is (1 -> -2 -&g...
Find the N-th node from the end of a Singly Linked List of integers.
Traverse the list to find the length L of the list.
Calculate the position of the N-th node from the beginning as L - N + 1.
Traverse the list again to reach the calculated position and return the node's value.
You are given a binary tree consisting of distinct integers and two nodes, X
and Y
. Your task is to find and return the Lowest Common Ancestor (LCA) of these two nodes...
Find the Lowest Common Ancestor (LCA) of two nodes in a binary tree.
Traverse the binary tree to find the paths from the root to nodes X and Y.
Compare the paths to find the last common node, which is the LCA.
Handle cases where one node is an ancestor of the other or when one node is the LCA itself.
You are given a string of length N
. Your task is to reverse the string word by word. The input may contain multiple spaces between words and may have leading o...
Reverse words in a string while handling leading/trailing spaces and multiple spaces between words.
Split the input string by spaces to get individual words
Reverse the list of words
Join the reversed words with a single space in between
Handle leading/trailing spaces by stripping them before and after reversing
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions based on DSA
Given 'N' subjects, each containing a certain number of problems, and 'K' friends, assign subjects to friends such that each subject goes to exactly one friend, maintain...
Assign subjects to friends to minimize maximum workload, find minimum time for most loaded friend.
Sort subjects in descending order
Assign subjects to friends one by one until all subjects are assigned
The maximum workload will be the sum of problems assigned to the friend with the most problems
Return the maximum workload as the minimum time required
Grammar in compiler design defines the syntax and structure of a programming language.
Grammar specifies the rules for forming valid statements in a programming language.
It consists of a set of production rules that define how valid programs can be constructed.
There are different types of grammars such as context-free grammar, regular grammar, etc.
Example: In C programming language, the grammar specifies that a for loop...
A token in compiler design is a basic unit of syntax that the compiler can understand and process.
Tokens are the smallest units of a program that are meaningful to the compiler.
Examples of tokens include keywords, identifiers, operators, and punctuation symbols.
Tokens are generated by the lexical analysis phase of the compiler.
Tokens are used by the parser to build the abstract syntax tree of the program.
Round duration - 60 minutes
Round difficulty - Easy
Technical round with questions on DSA and Compiler Design mainly. He told me that you’ll be having your final HR round in some time. I knew that I was going well because he seemed to be quite satisfied with my answers.
You are given an arbitrary binary tree consisting of N nodes, each associated with an integer value from 1 to 9. Each root-to-leaf path can be considered a number formed by concat...
Find the total sum of all root to leaf paths in a binary tree formed by concatenating node values.
Traverse the binary tree from root to leaf nodes, keeping track of the current path sum
Add the current path sum to the total sum when reaching a leaf node
Use modulo (10^9 + 7) to handle large outputs
A regular language is a language that can be recognized by a finite automaton.
Regular languages can be described by regular expressions.
Regular languages are closed under union, concatenation, and Kleene star operations.
Examples of regular languages include the set of all strings over an alphabet that contain an even number of 'a's.
NP problems are decision problems that can be verified in polynomial time, while NP-Hard problems are at least as hard as the hardest problems in NP.
NP problems can be verified in polynomial time but not necessarily solved in polynomial time.
NP-Hard problems are at least as hard as the hardest problems in NP, but may not be in NP themselves.
Examples of NP problems include the subset sum problem and the traveling salesm...
Round duration - 30 minutes
Round difficulty - Easy
That was the round for which I’ve been waiting for hours
She was very friendly and nice to talk to. It didn’t seem that I was talking to the HR. It was more like talking to a friend. Finally we discussed about the pay-scale and work culture in Accolite.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
posted on 14 Mar 2015
Java is an object-oriented language while C is a procedural language.
Java is platform-independent while C is platform-dependent.
Java has automatic garbage collection while C requires manual memory management.
Java has built-in support for multithreading while C requires external libraries.
Java has a larger standard library compared to C.
Java is more secure than C due to its strong type checking and exception handling.
C ...
Aggregation functions are used to perform calculations on groups of data in a database.
Aggregation functions include COUNT, SUM, AVG, MAX, and MIN.
They are used with the GROUP BY clause to group data based on a specific column.
COUNT function returns the number of rows in a table or the number of non-null values in a column.
SUM function returns the sum of values in a column.
AVG function returns the average of values in ...
Two ways to write a sentence in mirror image form in Java: reverse string function and array conversion.
Use the reverse() method of the String class to reverse the sentence
Convert the sentence to a character array, then swap the first and last characters, second and second-to-last characters, and so on until the middle is reached
Example: 'Hello World' becomes 'dlroW olleH'
Static is used in public static void main to allow the method to be called without creating an instance of the class.
Static methods belong to the class and not to any instance of the class.
The main method is the entry point of a Java program and needs to be called without creating an object of the class.
The static keyword allows the main method to be called directly from the class, without creating an instance of the c...
Abstract classes, interfaces, and enums provide abstraction and modularity in Java.
Abstract classes provide a partial implementation of a class and cannot be instantiated.
Interfaces define a set of methods that a class must implement and can be used for multiple inheritance.
Enums provide a set of named constants.
All three are used for abstraction and modularity in Java.
Abstract classes and interfaces are used for polym...
Object-oriented software engineering is a framework for designing and developing software using objects.
Object-oriented software engineering is a methodology for designing and developing software using objects.
It involves creating classes and objects that encapsulate data and behavior.
Frameworks are pre-built structures that provide a foundation for building software applications.
Frameworks can include libraries, APIs,...
Java is an object-oriented language with features like inheritance, encapsulation, and polymorphism.
Inheritance allows classes to inherit properties and methods from other classes.
Encapsulation hides the implementation details of a class from other classes.
Polymorphism allows objects to take on multiple forms or behaviors.
Java also supports abstraction, interfaces, and exception handling.
Example: class Car extends Vehi...
Normalization is a process of organizing data in a database to reduce redundancy and dependency.
Normalization is used to eliminate data redundancy and improve data integrity.
It involves dividing a database into two or more tables and defining relationships between them.
There are different levels of normalization, such as first normal form (1NF), second normal form (2NF), and so on.
Normalization helps in efficient data ...
ADBMS stands for Advanced Database Management System which is an extension of DBMS with additional features.
ADBMS has advanced features like data mining, data warehousing, and online analytical processing.
ADBMS is used for handling large and complex data sets.
DBMS is a basic system for managing data and is used for small and simple data sets.
DBMS does not have advanced features like ADBMS.
Examples of ADBMS are Oracle, ...
I am a software engineer with 5 years of experience in developing web applications.
Proficient in programming languages such as Java, Python, and JavaScript
Experience in developing RESTful APIs and microservices
Familiarity with front-end technologies such as HTML, CSS, and React
Strong understanding of database management systems like MySQL and MongoDB
Experience in Agile development methodologies
I want to gain practical experience and contribute to the industry while also learning on the job.
I believe that hands-on experience is invaluable in the software engineering field
I am eager to apply my skills and knowledge to real-world projects
I am excited to work with a team and learn from experienced professionals
I am not currently pursuing post-graduation as I feel that gaining industry experience is more importan...
I would leverage my Java skills to quickly learn .NET and demonstrate my adaptability and problem-solving abilities.
Identify transferable skills: Both Java and .NET share object-oriented principles, making it easier to adapt.
Engage in self-study: Utilize online resources like Microsoft Learn or Pluralsight to gain .NET knowledge.
Build a small project: Create a simple application using .NET to showcase my ability to lea...
I appeared for an interview in Sep 2017.
I applied via Naukri.com and was interviewed before May 2018. There were 5 interview rounds.
I applied via Recruitment Consultant and was interviewed in May 2019. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed before Jan 2020. There were 5 interview rounds.
I am proficient in Java, Python, and C++. I have 2 years of experience in software development. I have excellent communication skills for client interaction.
Proficient in Java, Python, and C++
2 years of software development experience
Excellent communication skills for client interaction
I applied via Naukri.com and was interviewed before Apr 2021. There was 1 interview round.
Some of the top questions asked at the ValueMomentum Architect interview -
based on 2 reviews
Rating in categories
Software Engineer
1.5k
salaries
| ₹3 L/yr - ₹10.1 L/yr |
Senior Software Engineer
1.4k
salaries
| ₹9.3 L/yr - ₹19 L/yr |
Technical Lead
401
salaries
| ₹18.2 L/yr - ₹33 L/yr |
Softwaretest Engineer
338
salaries
| ₹4.3 L/yr - ₹9.3 L/yr |
Test Lead
247
salaries
| ₹14 L/yr - ₹25 L/yr |
ITC Infotech
CMS IT Services
KocharTech
Xoriant