Design and Agile Interview Questions

 1. what are the key design considerations when designing a form say a mortgage form   2. What are the traits you would like to see in your manager team mates      3. Every company has its own way to implement agile, elaborate your experience     -- in retrospective - we do the Sail boat analogy 4. How would you improve the performance of an application. 5. How would you make an existing application more scalabe 6. Give a big story, how would you approach it 7. if a Design team gives  say a complex diaog, but you are not in a position to implement it, how would you approach 8. How do you measure the success of your implementation any KPIs 9. How would you approach Tech debt; 10. What would you prefer, Product centric approach or Customer-centric approach

Java J2EE Security Considerations

Java Application Security Considerations   1. Authentication Insecure Coding Practices Secure Coding Practices Concatenated SQL queries for login validation. In most cases it is seen that user credentials, as retrieved from the request is used to form concatenated login queries. Such instances result in injection flaws in the login page. In case of concatenated SQL query, it leads to SQL Injection vulnerability. String  username =request.getParameter(“username”); String  password =request.getParameter(“password”); String query = “SELECT * FROM users WHERE username = “+ username +” AND password=”+ password ; Statement st = con. createStatement(); Results res = st.executeQuery(query); Use Parameterized or pre-compiled queries. String username=request.getParameter(“username”); String password=request.getParameter(“password”); String query = “SELECT * FROM users WHERE  username =?  AND  password=? “; PreparedStatement  ps = con.prepareStatement(query); ps.setString(1, username); ps.setStri

Hibernate Interview Questions

1. What are the main classes of  Hibernate Session SessionFactory Criteria Query Transaction 2. Lazy loading vs Eager Loading 3. Why is second-level caching not enabled by default? The second Level cache is disabled by default because the configuration and choice of which entities are cacheable is application-specific. In JPA, you can turn on cache for a particular domain with annotation @Cacheable

Java Spring Interview Questions

Java Spring Interview Questions 1. Have you used any Docker? 2. Suppose there is a requirement that for every call we need to create a new instance, how can that be done in Spring Boog Answer - using Spring bean with Scope as Prototype and then every time you need a bean, get the SpringApplicationContext and call ctx.getBean() 3. When a REST API POST call is made, how is that converted to Java objects to work in your controller or service layer Answer - Spring offers ViewResolvers, you can use JSONResolver to convert the JSON inputs to a Java Bean which then can be consumed by Controllers 4. How can you achieve Auto Scaling in kubernetes 5. Have you worked in Hibernate JPA or Spring JDBC in your projects? Answer - both , while Hibernate JPA is good for queries, there are some queries where its not efficient enough and you need to have SQLs itself, like if you want to do a bulk update 6. Explain the process of having your Spring WAR deployed on Kubernetes Cluster? 7. Explain how JWT Aut

Design Patterns

Design Patterns are nothing but proven solutions to recurring problems. 1. Some favorite design patterns      Creational Patterns         - Prototype              - used to create objects by cloning other objects                             - Factory         - Singleton      Structural Design Patterns       They show how the objects are composed, is there an inheritance between them, or is one object composed in another object, interfaces present Proxy Pattern                        e.g credit card is the proxy of the Bank Account Decorator Adds more functionality without opening the object Wraps the decorator another class, it is a component and has a component Advantage - allows you to have multiple combinations among classes Adapter Making two interfaces which are incompatible compatible Facade Simplify the interactions with  too many working complex objects and complex interactions, something you want to call Hides complex behavior

NodeJs Interview Questions

Node.js has over 450K modules as of this writing, and is one of the popular frameworks for fast and robust frameworks. Typically they are implemented with microservices. Below are some NodeJs interview questions, you need to prepare 1. Have you incurred any memory leak issues in Node.js memory leaks occur where there are short lived objects assoicated with a long term object e.g  const req = new Map() app.get("/", (req,res_ => {   request.set(, req)   res.send(200).send("hello world") }             Identify it using Sample Heap Profiler.           For more info refer 2. Explain what is Exception Handling you used in Node.js     Node.js exception handling is different than traditional Java based exception handling, there are multiple ways exception can be handled based on the need.     Overall there are two types of Exception System Exceptions Logical Exceptions      There are multiple ways to handle the ex