Filter interviews by
Designing a configuration store involves defining requirements, selecting storage, ensuring security, and implementing access controls.
Define requirements: Identify what configurations need to be stored, e.g., application settings, user preferences.
Choose storage solution: Decide between databases (e.g., SQL, NoSQL) or file-based systems (e.g., JSON, XML).
Ensure security: Implement encryption for sensitive data an...
Use a max heap to efficiently track the largest number in a stream of bytes.
Initialize a max heap to store the bytes as they are received.
For each byte received, insert it into the max heap.
The largest number can be accessed in O(1) time from the root of the max heap.
To maintain the heap property, the insertion operation takes O(log n) time.
Example: If the stream is [3, 1, 4, 1, 5], the max heap will be structured...
A stack is a linear data structure that follows Last In First Out (LIFO) principle for adding and removing elements.
Elements are added and removed from the top of the stack.
Common operations include push (adding) and pop (removing).
Example: In a stack of plates, you can only add or remove the top plate.
Stacks are used in function call management in programming languages.
They are also used in undo mechanisms in app...
Key variables for forecasting models include historical data, market trends, seasonality, and external factors.
Historical Data: Analyze past performance to identify trends (e.g., sales data from previous years).
Market Trends: Consider industry growth rates and economic indicators (e.g., GDP growth, inflation rates).
Seasonality: Account for seasonal fluctuations in demand (e.g., holiday sales spikes).
External Facto...
I utilize data-driven insights and strategic planning for effective budgeting and forecasting in a SaaS environment.
Understand key metrics: Focus on MRR (Monthly Recurring Revenue) and ARR (Annual Recurring Revenue) to gauge financial health.
Customer acquisition costs: Analyze CAC to ensure sustainable growth and profitability.
Churn rate analysis: Monitor and forecast churn to adjust budgets and strategies accordi...
I prioritize incidents based on impact, urgency, and SLA requirements.
Assess the impact of each incident on business operations
Determine the urgency of resolving each incident
Consider any SLA requirements for specific incidents
Use a ticketing system to track and prioritize incidents
Communicate with stakeholders to understand priorities
Modified unbounded knapsack problem involves maximizing the value of items with unlimited quantities and weight constraints.
Consider items with values and weights, along with a weight constraint
Dynamic programming can be used to solve this problem efficiently
Examples: Given items with values [60, 100, 120] and weights [10, 20, 30], and a weight constraint of 50, maximize the value
Java's substring method extracts a portion of a string based on specified indices.
The method signature is: String substring(int beginIndex, int endIndex).
Example: 'Hello'.substring(1, 4) returns 'ell'.
If only one parameter is provided, like 'Hello'.substring(2), it returns 'llo'.
Indices are zero-based, meaning the first character is at index 0.
If beginIndex is greater than endIndex, it throws StringIndexOutOfBound...
Debugging a bug process involves identifying, isolating, and fixing issues in software code.
Identify the bug by reproducing the issue and analyzing error messages.
Isolate the bug by narrowing down the code where the issue occurs.
Fix the bug by making necessary code changes and testing the solution.
Verify the fix by retesting the software to ensure the bug is resolved.
The best pen in the market should have a comfortable grip, smooth writing experience, long-lasting ink, and a stylish design.
Comfortable grip for extended use
Smooth writing experience for effortless writing
Long-lasting ink to avoid frequent refills
Stylish design to appeal to customers
C++ memory management involves allocating and deallocating memory for variables, while pointers store memory addresses.
Pointers are variables that store memory addresses.
They are used to access and manipulate data stored in memory.
Example: int* ptr = new int; *ptr = 10; delete ptr;
Discussion on General Topics
General Aptitude test
Troubleshooting shooting on different scenarios involves identifying the root cause and implementing solutions.
Identify the specific issue or problem
Gather relevant information and data
Analyze possible causes
Implement solutions and test them
Document the troubleshooting process and outcome
I applied via Company Website and was interviewed in Oct 2024. There were 4 interview rounds.
Basic Python, SQL, and Bash questions
Data pipeline design involves creating a system to efficiently collect, process, and analyze data.
Understand the data sources and requirements before designing the pipeline.
Use tools like Apache Kafka, Apache NiFi, or AWS Glue for data ingestion and processing.
Implement data validation and error handling mechanisms to ensure data quality.
Consider scalability and performance optimization while designing the pipeline.
Doc...
I appeared for an interview in Jan 2025.
Social media impact on younger generations.
Social media usag in impacting businesses
I prioritize incidents based on impact, urgency, and SLA requirements.
Assess the impact of each incident on business operations
Determine the urgency of resolving each incident
Consider any SLA requirements for specific incidents
Use a ticketing system to track and prioritize incidents
Communicate with stakeholders to understand priorities
I approach Root Cause Analysis by gathering data, identifying contributing factors, analyzing trends, and implementing preventive measures.
Gather all relevant data related to the incident
Identify contributing factors through interviews, documentation review, and analysis
Analyze trends to determine common themes or patterns
Implement preventive measures to address root causes and prevent future incidents
I applied via Campus Placement
Patterns, quiz, game questions.
Modified unbounded knapsack problem involves maximizing the value of items with unlimited quantities and weight constraints.
Consider items with values and weights, along with a weight constraint
Dynamic programming can be used to solve this problem efficiently
Examples: Given items with values [60, 100, 120] and weights [10, 20, 30], and a weight constraint of 50, maximize the value
I applied via Referral and was interviewed in Sep 2024. There were 2 interview rounds.
Find number of triplets in array whose sum is less than or equal to target.
Sort the array in ascending order.
Use three pointers to iterate through the array and find triplets.
Update pointers based on sum of triplets and target value.
I applied via Referral and was interviewed in Aug 2024. There were 3 interview rounds.
Project management drilling on processes involves closely monitoring and improving project workflows.
Regularly review and analyze project processes to identify bottlenecks and inefficiencies
Implement process improvements based on data-driven insights
Ensure team members are following established processes and provide training as needed
I appeared for an interview in Sep 2024.
I utilize data-driven insights and strategic planning for effective budgeting and forecasting in a SaaS environment.
Understand key metrics: Focus on MRR (Monthly Recurring Revenue) and ARR (Annual Recurring Revenue) to gauge financial health.
Customer acquisition costs: Analyze CAC to ensure sustainable growth and profitability.
Churn rate analysis: Monitor and forecast churn to adjust budgets and strategies accordingly.
...
Key variables for forecasting models include historical data, market trends, seasonality, and external factors.
Historical Data: Analyze past performance to identify trends (e.g., sales data from previous years).
Market Trends: Consider industry growth rates and economic indicators (e.g., GDP growth, inflation rates).
Seasonality: Account for seasonal fluctuations in demand (e.g., holiday sales spikes).
External Factors: E...
I applied via Referral and was interviewed in Sep 2024. There were 2 interview rounds.
2medium level questions
I applied via Company Website and was interviewed in Aug 2024. There was 1 interview round.
The right view of a binary tree shows the nodes that are visible when looking at the tree from the right side.
The right view of a binary tree can be obtained by performing a level order traversal and keeping track of the rightmost node at each level.
Nodes that are visible from the right side are the ones that are the rightmost at their level.
Example: For the binary tree [1, 2, 3, null, 5, null, 4], the right view would...
Encode and decode a string without using any delimiter.
Use a unique character to represent the start and end of each string in the array.
Keep track of the length of each string to properly decode it.
Example: ['hello', 'world'] can be encoded as '#hello#world#' without using delimiters.
It was really good, having required tech questions for my position
Top trending discussions
Some of the top questions asked at the Adobe interview -
The duration of Adobe interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 168 interview experiences
Difficulty level
Duration
based on 1.2k reviews
Rating in categories
Computer Scientist
490
salaries
| ₹22.7 L/yr - ₹70 L/yr |
Technical Consultant
311
salaries
| ₹7.5 L/yr - ₹28.5 L/yr |
Computer Scientist 2
293
salaries
| ₹28 L/yr - ₹102 L/yr |
Software Engineer
277
salaries
| ₹8.1 L/yr - ₹30 L/yr |
Senior Software Engineer
248
salaries
| ₹12 L/yr - ₹44.1 L/yr |
Salesforce
Oracle
Microsoft Corporation
Amazon