Filter interviews by
The hierarchy of documents in a contract determines the order of precedence in case of conflicts among contract provisions.
1. Master Agreement: The primary document outlining the overall terms (e.g., a partnership agreement).
2. Schedules and Exhibits: Detailed attachments that provide specific information (e.g., pricing schedules).
3. Amendments: Changes made to the original contract, which may supersede earlier te...
Designing a configuration store involves defining requirements, selecting storage, ensuring security, and implementing access controls.
Define requirements: Identify what configurations need to be stored, e.g., application settings, user preferences.
Choose storage solution: Decide between databases (e.g., SQL, NoSQL) or file-based systems (e.g., JSON, XML).
Ensure security: Implement encryption for sensitive data an...
Use a max heap to efficiently track the largest number in a stream of bytes.
Initialize a max heap to store the bytes as they are received.
For each byte received, insert it into the max heap.
The largest number can be accessed in O(1) time from the root of the max heap.
To maintain the heap property, the insertion operation takes O(log n) time.
Example: If the stream is [3, 1, 4, 1, 5], the max heap will be structured...
A stack is a linear data structure that follows Last In First Out (LIFO) principle for adding and removing elements.
Elements are added and removed from the top of the stack.
Common operations include push (adding) and pop (removing).
Example: In a stack of plates, you can only add or remove the top plate.
Stacks are used in function call management in programming languages.
They are also used in undo mechanisms in app...
What people are saying about Adobe
Key variables for forecasting models include historical data, market trends, seasonality, and external factors.
Historical Data: Analyze past performance to identify trends (e.g., sales data from previous years).
Market Trends: Consider industry growth rates and economic indicators (e.g., GDP growth, inflation rates).
Seasonality: Account for seasonal fluctuations in demand (e.g., holiday sales spikes).
External Facto...
I utilize data-driven insights and strategic planning for effective budgeting and forecasting in a SaaS environment.
Understand key metrics: Focus on MRR (Monthly Recurring Revenue) and ARR (Annual Recurring Revenue) to gauge financial health.
Customer acquisition costs: Analyze CAC to ensure sustainable growth and profitability.
Churn rate analysis: Monitor and forecast churn to adjust budgets and strategies accordi...
I prioritize incidents based on impact, urgency, and SLA requirements.
Assess the impact of each incident on business operations
Determine the urgency of resolving each incident
Consider any SLA requirements for specific incidents
Use a ticketing system to track and prioritize incidents
Communicate with stakeholders to understand priorities
I approach Root Cause Analysis by gathering data, identifying contributing factors, analyzing trends, and implementing preventive measures.
Gather all relevant data related to the incident
Identify contributing factors through interviews, documentation review, and analysis
Analyze trends to determine common themes or patterns
Implement preventive measures to address root causes and prevent future incidents
Modified unbounded knapsack problem involves maximizing the value of items with unlimited quantities and weight constraints.
Consider items with values and weights, along with a weight constraint
Dynamic programming can be used to solve this problem efficiently
Examples: Given items with values [60, 100, 120] and weights [10, 20, 30], and a weight constraint of 50, maximize the value
Java's substring method extracts a portion of a string based on specified indices.
The method signature is: String substring(int beginIndex, int endIndex).
Example: 'Hello'.substring(1, 4) returns 'ell'.
If only one parameter is provided, like 'Hello'.substring(2), it returns 'llo'.
Indices are zero-based, meaning the first character is at index 0.
If beginIndex is greater than endIndex, it throws StringIndexOutOfBound...
An optimal algorithm to find the second minimum in an array requires careful comparisons to minimize the total count.
1. Initialize two variables, min1 and min2, to infinity.
2. Traverse the array once, updating min1 and min2 as needed.
3. For each element, compare it with min1 and min2 to find the second minimum.
4. In the worst case, the number of comparisons is 3n - 2, where n is the number of elements in the array.
5. E...
To determine if a point is inside a polygon, use the ray casting algorithm.
Create a line from the point to a point outside the polygon
Count the number of times the line intersects with the polygon edges
If the count is odd, the point is inside the polygon; otherwise, it is outside
Canny's algorithm is a multi-stage edge detection technique used in image processing to identify edges in images.
1. Gaussian Blur: Reduces noise and detail in the image using a Gaussian filter.
2. Gradient Calculation: Computes the intensity gradient of the image to find potential edges.
3. Non-Maximum Suppression: Thin out the edges by keeping only the local maxima in the gradient direction.
4. Double Thresholding: Class...
Use image processing and OCR techniques to locate text and photos in an image.
1. Preprocess the image: Convert to grayscale and apply thresholding to enhance text visibility.
2. Use Optical Character Recognition (OCR): Libraries like Tesseract can extract text and provide bounding boxes.
3. Analyze image regions: Use contour detection to identify areas with photos and separate them from text regions.
4. Combine results: O...
The four storage classes in C are auto, register, static, and extern.
Auto: default storage class for all local variables
Register: used to define local variables that should be stored in a register instead of RAM
Static: used to define local variables that retain their value between function calls
Extern: used to declare a global variable that is defined in another file
i is stored in global data segment, j is stored in stack, k is stored in heap.
i is a global variable and is stored in the global data segment
j is a local variable and is stored in the stack
k is a pointer variable and is stored in the stack, while the memory it points to is allocated on the heap using malloc()
Use a hash table to store the words and check for existence in constant time.
Create a hash table with the words as keys and a boolean value as the value.
For each new word, check if it exists in the hash table. If it does, it has appeared before. If not, add it to the hash table.
Alternatively, use a set data structure to store only the unique words and check for existence in the set.
Discussion on General Topics
General Aptitude test
Troubleshooting shooting on different scenarios involves identifying the root cause and implementing solutions.
Identify the specific issue or problem
Gather relevant information and data
Analyze possible causes
Implement solutions and test them
Document the troubleshooting process and outcome
I applied via Company Website and was interviewed in Oct 2024. There were 4 interview rounds.
Basic Python, SQL, and Bash questions
Data pipeline design involves creating a system to efficiently collect, process, and analyze data.
Understand the data sources and requirements before designing the pipeline.
Use tools like Apache Kafka, Apache NiFi, or AWS Glue for data ingestion and processing.
Implement data validation and error handling mechanisms to ensure data quality.
Consider scalability and performance optimization while designing the pipeline.
Doc...
I appeared for an interview in Jan 2025.
Social media impact on younger generations.
Social media usag in impacting businesses
I prioritize incidents based on impact, urgency, and SLA requirements.
Assess the impact of each incident on business operations
Determine the urgency of resolving each incident
Consider any SLA requirements for specific incidents
Use a ticketing system to track and prioritize incidents
Communicate with stakeholders to understand priorities
I approach Root Cause Analysis by gathering data, identifying contributing factors, analyzing trends, and implementing preventive measures.
Gather all relevant data related to the incident
Identify contributing factors through interviews, documentation review, and analysis
Analyze trends to determine common themes or patterns
Implement preventive measures to address root causes and prevent future incidents
I applied via Campus Placement
Patterns, quiz, game questions.
Modified unbounded knapsack problem involves maximizing the value of items with unlimited quantities and weight constraints.
Consider items with values and weights, along with a weight constraint
Dynamic programming can be used to solve this problem efficiently
Examples: Given items with values [60, 100, 120] and weights [10, 20, 30], and a weight constraint of 50, maximize the value
I applied via Referral and was interviewed in Sep 2024. There were 2 interview rounds.
Find number of triplets in array whose sum is less than or equal to target.
Sort the array in ascending order.
Use three pointers to iterate through the array and find triplets.
Update pointers based on sum of triplets and target value.
I applied via Referral and was interviewed in Aug 2024. There were 3 interview rounds.
Project management drilling on processes involves closely monitoring and improving project workflows.
Regularly review and analyze project processes to identify bottlenecks and inefficiencies
Implement process improvements based on data-driven insights
Ensure team members are following established processes and provide training as needed
I appeared for an interview in Sep 2024.
I utilize data-driven insights and strategic planning for effective budgeting and forecasting in a SaaS environment.
Understand key metrics: Focus on MRR (Monthly Recurring Revenue) and ARR (Annual Recurring Revenue) to gauge financial health.
Customer acquisition costs: Analyze CAC to ensure sustainable growth and profitability.
Churn rate analysis: Monitor and forecast churn to adjust budgets and strategies accordingly.
...
Key variables for forecasting models include historical data, market trends, seasonality, and external factors.
Historical Data: Analyze past performance to identify trends (e.g., sales data from previous years).
Market Trends: Consider industry growth rates and economic indicators (e.g., GDP growth, inflation rates).
Seasonality: Account for seasonal fluctuations in demand (e.g., holiday sales spikes).
External Factors: E...
I applied via Referral and was interviewed in Sep 2024. There were 2 interview rounds.
2medium level questions
I applied via Company Website and was interviewed in Aug 2024. There was 1 interview round.
The right view of a binary tree shows the nodes that are visible when looking at the tree from the right side.
The right view of a binary tree can be obtained by performing a level order traversal and keeping track of the rightmost node at each level.
Nodes that are visible from the right side are the ones that are the rightmost at their level.
Example: For the binary tree [1, 2, 3, null, 5, null, 4], the right view would...
Encode and decode a string without using any delimiter.
Use a unique character to represent the start and end of each string in the array.
Keep track of the length of each string to properly decode it.
Example: ['hello', 'world'] can be encoded as '#hello#world#' without using delimiters.
It was really good, having required tech questions for my position
Some of the top questions asked at the Adobe interview -
The duration of Adobe interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 168 interview experiences
Difficulty level
Duration
based on 1.2k reviews
Rating in categories
Computer Scientist
493
salaries
| ₹35 L/yr - ₹60.5 L/yr |
Technical Consultant
316
salaries
| ₹12.8 L/yr - ₹24 L/yr |
Computer Scientist 2
298
salaries
| ₹47.7 L/yr - ₹80 L/yr |
Software Engineer
283
salaries
| ₹13.4 L/yr - ₹25 L/yr |
Senior Software Engineer
244
salaries
| ₹22.9 L/yr - ₹42.8 L/yr |
Salesforce
Oracle
Microsoft Corporation
Amazon