Interview Questions and Answers for 'At' | Search Interview Question - javasearch.buggybread.com
Javasearch.buggybread.com

Search Interview Questions


 More than 3000 questions in repository.
 There are more than 900 unanswered questions.
Click here and help us by providing the answer.
 Have a video suggestion.
Click Correct / Improve and please let us know.
Label / Company      Label / Company / Text

   



Interview Questions and Answers for 'At' - 1132 question(s) found - Order By Rating

next 30
 Q1. Do you ever merge changes from one feature branch to another ? Why ?SCM
 This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     SCM  Source Code Management  Configuration Control  Git  Svn


 Q2. Can we do a thread specific heap allocation ?Memory Management
 This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     memory management  heap memory   heap allocation      expert


 Q3. Can you share some of the best practices while designing authentication and authorization system ?Authentication
 This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     best practices


 Q4. What are system integrators in Cloud Computing?Cloud Computing
 This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     Amazon Web Services (AWS)   Google Cloud Platform (GCP)


 Q5. What is Google BigQuery? What are the benefits of BigQuery for the data warehouse practitioners ?Google Cloud Platform (GCP)
 This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     


 Q6. What are the different methods for the authentication of Google Compute Engine API ?Google Cloud Platform (GCP)
Ans. MS active directory concept and in GCP its Cloud Identity

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     Google Compute Engine API  GCP Authentication


 Q7. How does the pricing model work in GCP cloud ?Google Cloud Platform (GCP)
 This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     GCP Pricing Model


 Q8. How are the Google Compute Engine and Google App Engine related ?Google Cloud Platform (GCP)
 This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     Google Compute Engine  Google App Engine


 Q9. What do you know about Google Compute Engine ?Google Cloud Platform (GCP)
 This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     Google Compute Engine


 Q10. What are the libraries and tools for cloud storage on GCP ?Google Cloud Platform (GCP)
Ans. Console - GUI Interface
gsutil - Command Line Interface
Rest API - Using JSON or XML API

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     GCP Storage


 Q11. What are the limitations with using interpolation ? Why do we need property binding ?
Ans. Interpolation can only work with String types and hence we need property binding while working with other data types.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     interpolation  property binding


 Q12. Can we use interpolation with all data types ?
 This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     interpolation


 Q13. What is interpolation in Angular ?Angular
 This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     interpolation


 Q14. What are the different conditions that triggers view update in case of push ChangeDetectionStrategy ?Angular
Ans. 1. Any change in Input
2. Any even originating from the component or it's child components
3. Explicit trigger

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     ChangeDetectionStrategy


 Q15. Which change detection strategy do you use in your application and Why ?Angular
Ans. We use ChangeDetectionStrategy.Push

As the application grows bigger , The default change detection strategy could become a performance overhead and hence should be avoided.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     ChangeDetectionStrategy     Asked in 1 Companies


 Q16. What is the main difference between unique key and primary key ?Database
Ans. Primary key will not accept NULL values whereas Unique key can accept one NULL value.

A table can have only primary key whereas there can be multiple unique key on a table.

A Clustered index automatically created when a primary key is defined whereas Unique key generates the non-clustered index.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     Unique Key  Primary Key     Asked in 1 Companies


 Q17. What is concurrent interface ?Core Java
Ans. ConcurrentMap is an interface and it is a member of the Java Collections Framework. It represents a Map that is capable of handling concurrent access to it without affecting the consistency of entries in a map. ConcurrentMap interface present in java.util.concurrent package.

HashMap operations are not synchronized, while Hashtable provides synchronization. Though Hashtable is thread-safe, it is not very efficient. To solve this issue, the Java Collections Framework introduced ConcurrentMap in Java 1.5.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     Concurrent Interface   java.util.concurrent   Java 8 Concurrency   java concurrency   java 8     Asked in 1 Companies


 Q18. Design pattern used in struts.Struts
Ans. Struts controller uses the Command design pattern and the action classes use the Adapter design pattern. The process() method of the RequestProcessor uses the Template method design pattern.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     Struts Design patterns     Asked in 1 Companies


 Q19. How to debug multi server deployed application ?Debugging
Ans. Choose the server from the list of defined servers under J2EE Server.
Choose the project to debug.
Click Apply to save changes.
Click Debug to start the server and run the application.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     debugging  debugging multi server application     Asked in 1 Companies


 Q20. Interface vs AbstractionCore Java
 This question was recently asked at 'Oracle financial services'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     interface vs abstraction  interfacing vs abstraction  relation between interface and abstraction  How interface provide abstraction     Asked in 1 Companies


 Q21. How do you evaluate a product while migrating to open source ?
 This question was recently asked at 'Royal Bank of Scotland (RBS),RBS India'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     open source  open source migration     Asked in 2 Companies


 Q22. What is SameSite cookie attribute ?Security
Ans. SameSite cookie attribute is used by browsers to identify how first- and third-party cookies should be handled.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     samesite attribute  cookie


 Q23. Difference between XSS and CSRF ?Security
Ans. SRF attack requires an authenticated session, whereas an XSS attack doesn’t.
XSS doesn’t require any user interaction.CSRF is restricted to the actions the victim can perform.
XSS requires a vulnerability to happen, whereas CSRF relies on tricking the user to click a link or access a page.
CSRF can only send an HTTP request but cannot view the response. XSS can send and receive HTTP requests and responses to extract the required data.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     xss attack  csrf attack  security vulnerabilities  security attack  web security     Asked in 3 Companies


 Q24. Do you think a csrf token should only be generated after authentication ?Security
Ans. No, they should be created before authentication too

https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#login-csrf

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     csrf token  csrf attack


 Q25. What is a csrf token ? What is it used for ?Security
Ans. A CSRF token is a unique, secret, unpredictable value that is generated by the server-side application and transmitted to the client in such a way that it is included in a subsequent HTTP request made by the client. When the later request is made, the server-side application validates that the request includes the expected token and rejects the request if the token is missing or invalid.

CSRF tokens can prevent CSRF attacks by making it impossible for an attacker to construct a fully valid HTTP request suitable for feeding to a victim user. Since the attacker cannot determine or predict the value of a user's CSRF token, they cannot construct a request with all the parameters that are necessary for the application to honor the request.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     csrf token.csrf attack


 Q26. Have you ever heard about csrf attacks ?Security
Ans. Yes, Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     csrf attack  Cross-Site Request Forgery (CSRF)     Asked in 16 Companies


 Q27. Can the value of a static variable be changed ? Core Java
Ans. Yes the value of a static variable can be changed. It's the final keyword that restrict the modification of value not static.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     static variables


 Q28. Give an example of a time when someone provided critical feedback on your workGeneral
 This question was recently asked at 'State Farm'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q29. How would you design the database schema for an event?Database
Ans. Broad question, but if the company need velocity, think about use a NO SQL instead of regular SQL databases.

Also prefers materialized views instead of joins to fetch data quickly.

Regarding the database design, there are very good design tools for professional database (to develop proper indexes and good database design) one of the best is QuickDBD

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     database design  database schema     Asked in 1 Companies


 Q30. Design Texas Hold Em poker gameDesign
 This question was recently asked at 'Alcatel Lucent'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


next 30

Help us and Others Improve. Please let us know the questions asked in any of your previous interview.

Any input from you will be highly appreciated and It will unlock the application for 10 more requests.

Company Name:
Questions Asked: