i
Akamai
Technologies
Filter interviews by
Find odd weight ball among 12 identical balls using a balance in minimum weighings.
Divide balls into 3 groups of 4 each
Weigh any 2 groups against each other
If both groups weigh the same, the odd ball is in the third group
If one group is heavier, weigh any 2 balls from that group against each other
If they weigh the same, the odd ball is the remaining one
If one ball is heavier, it is the odd ball
Repeat the process w...
Representing date of a month using two cubes with numbers 0-9 on each face
Assign numbers 0-9 on each face of both cubes
Use one cube to represent tens digit and other for ones digit
Rotate cubes to display desired date
Example: Cube 1 - 0, 1, 2, 3, 4, 5; Cube 2 - 0, 1, 2, 6, 7, 8; To represent 23, Cube 1 shows 2 and Cube 2 shows 3
Find the character repeated most number of times in an array of strings.
Create a dictionary to store character count
Iterate through each string and character
Return the character with highest count
Answering a question on tracing output of C/C++ code snippet with pointers and references
Understand the code and identify all pointers and references
Trace the values of each pointer and reference at each step
Follow the flow of the code to determine the final output
Segmentation fault is a type of error that occurs when a program tries to access a memory location that it is not allowed to access.
Segmentation fault is also known as a segfault.
It is a common error in C and C++ programming languages.
It occurs when a program tries to read or write to a memory location that it does not have permission to access.
This can happen when a program tries to access an uninitialized pointe...
BFS and DFS are graph traversal algorithms used to search for nodes in a graph.
BFS stands for Breadth First Search and explores all the nodes at the current depth before moving to the next level.
DFS stands for Depth First Search and explores as far as possible along each branch before backtracking.
BFS uses a queue data structure while DFS uses a stack or recursion.
BFS is useful for finding the shortest path in an ...
Design data structure for Excel sheet
Use a 2D array to represent rows and columns
Each cell can contain a string or a formula
Include metadata such as cell formatting and data validation rules
Monitors are implemented in OS to synchronize access to shared resources.
Monitors are used to ensure mutual exclusion and synchronization of shared resources.
They are implemented using locks and condition variables.
Monitors provide a higher level of abstraction than locks and semaphores.
Examples of monitors in OS include Java's synchronized keyword and C#'s lock statement.
Creating a pointer for an abstract class and pointing it to a derived class object with a function name conflict.
Use virtual keyword for the function in the abstract class.
Use override keyword for the function in the derived class.
Access the function using the pointer with the derived class object.
To delete nth node in a linked list, we need to traverse to the (n-1)th node and change its next pointer to (n+1)th node.
Traverse to (n-1)th node and change its next pointer to (n+1)th node
Handle edge cases like deleting the first node or deleting the last node
Free the memory of the deleted node
I applied via Approached by Company and was interviewed in Jun 2024. There were 2 interview rounds.
To deal with difficult stakeholders, it is important to communicate effectively, build trust, manage expectations, and find common ground.
Communicate openly and regularly with stakeholders to address concerns and keep them informed
Build trust by delivering on promises and being transparent in your actions
Manage expectations by setting clear goals and timelines, and being realistic about what can be achieved
Find common ...
I faced challenges with team communication and resource allocation, but resolved them through regular meetings and adjusting timelines.
Team communication breakdowns led to misunderstandings and delays
Resource allocation issues caused bottlenecks in project progress
Held regular team meetings to address communication issues and clarify tasks
Adjusted project timelines to accommodate resource constraints and meet deadlines
I manage risks by identifying potential risks, assessing their impact, developing mitigation strategies, and monitoring them throughout the project.
Identify potential risks by conducting risk assessments
Assess the impact of each risk on the project's objectives
Develop mitigation strategies to address high-priority risks
Monitor risks throughout the project lifecycle and adjust strategies as needed
I proactively identify delays, assess impact, communicate with stakeholders, and collaborate on solutions.
Identify the cause of the delay and assess its impact on the project timeline and deliverables
Communicate the delay to stakeholders promptly and transparently, providing clear reasons and potential solutions
Collaborate with stakeholders to develop a plan to mitigate the delay and adjust project timelines accordingl...
I applied via Campus Placement and was interviewed in May 2024. There were 4 interview rounds.
Every round was held in banglore office . The round consisted of some mathematics and paragraphed based questions and some video baed ques related to akamai
Actually due to time costraint and less no of candidates they didnt conduct the gd
SQL query, Linux, OS fundamentals
When you enter a URL, your browser sends a request to the server hosting the website, which then responds by sending back the requested webpage.
1. Browser sends a request to the server hosting the website
2. Server processes the request and sends back the requested webpage
3. The webpage is displayed in the browser for the user to interact with
I applied via Company Website and was interviewed in Apr 2024. There were 4 interview rounds.
All aptitude questions like percentage,permutation and combination ,english sentences etc ,normal aptitude questions.
Normal GD topics ,current affairs etc.
DNS stands for Domain Name System, which translates domain names to IP addresses.
DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).
It helps users access websites and other online services by resolving domain names to their corresponding IP addresses.
DNS also helps in load balancing, security, and email delivery by providing various ...
I applied via LinkedIn and was interviewed in Feb 2024. There was 1 interview round.
I appeared for an interview in Mar 2025, where I was asked the following questions.
Identifying pain points and creating use cases for a given business scenario.
Identify user frustrations, such as slow response times in a system.
Analyze workflow inefficiencies, like redundant data entry.
Consider stakeholder needs, such as reporting requirements for management.
Evaluate system integration issues, for example, lack of communication between platforms.
Assess user experience challenges, like a confusing int...
I applied via Campus Placement and was interviewed in Jun 2024. There were 2 interview rounds.
Easiest test in my life
Opening a website involves DNS resolution, server requests, and rendering content in the browser.
1. DNS Resolution: The browser queries a DNS server to translate the domain name (e.g., www.example.com) into an IP address.
2. TCP Connection: A TCP connection is established between the browser and the web server using the IP address.
3. HTTP Request: The browser sends an HTTP request to the server for the desired resource ...
The OSI model is a conceptual framework used to understand network communication in seven layers.
Layer 1: Physical - Deals with the physical connection (e.g., cables, switches).
Layer 2: Data Link - Manages node-to-node data transfer (e.g., Ethernet).
Layer 3: Network - Handles routing of data (e.g., IP addresses).
Layer 4: Transport - Ensures complete data transfer (e.g., TCP, UDP).
Layer 5: Session - Manages sessions bet...
Understanding BGP route manipulation is crucial for network security and performance optimization.
BGP (Border Gateway Protocol) is used to exchange routing information between autonomous systems.
Route manipulation can involve techniques like route filtering, route aggregation, and route redistribution.
Example: Using prefix lists to filter out unwanted routes from being advertised.
BGP attributes like AS_PATH, NEXT_HOP, ...
I applied via Company Website and was interviewed in May 2024. There were 2 interview rounds.
I worked on various projects focusing on web applications, cloud services, and data analytics to enhance user experience and efficiency.
Developed a web application for inventory management that reduced processing time by 30%.
Implemented a cloud-based solution for data storage, improving accessibility and security for sensitive information.
Led a team to create a data analytics tool that provided real-time insights, help...
Top trending discussions
Some of the top questions asked at the Akamai Technologies interview -
The duration of Akamai Technologies interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 53 interview experiences
Difficulty level
Duration
based on 405 reviews
Rating in categories
Cloud Support Engineer
135
salaries
| ₹14.7 L/yr - ₹25.9 L/yr |
Senior Software Engineer
134
salaries
| ₹29.6 L/yr - ₹45 L/yr |
Software Engineer2
101
salaries
| ₹13.4 L/yr - ₹26 L/yr |
Software Engineer
95
salaries
| ₹12.5 L/yr - ₹22.5 L/yr |
Platform Operations Engineer
72
salaries
| ₹5.5 L/yr - ₹14.1 L/yr |
24/7 Customer
Thomson Reuters
Oracle Cerner
Adobe