Akamai Technologies
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Referral
Swap kth and kth to last element of a singly linked list in one pass without knowing the length of the list.
Traverse the linked list using two pointers, one starting from the head and the other starting from kth node.
When the second pointer reaches the end of the list, the first pointer will be pointing to the kth to last node.
Swap the values of kth and kth to last node.
Handle edge cases such as k being out of bounds o...
Program to reverse the ordering of words in a sentence
Split the sentence into an array of words
Reverse the array
Join the array into a sentence
Program to find intersection point of two singly linked lists in O(n)
Traverse both lists and find their lengths
Move the head of the longer list by the difference in lengths
Traverse both lists in parallel until intersection point is found
Return the intersection point
Program to reverse a singly linked list both recursively and iteratively
Iteratively: Use three pointers to reverse the links between nodes
Recursively: Use a recursive function to reverse the links between nodes
In both approaches, update the head and tail pointers accordingly
Find odd weight ball among 12 identical balls using a balance in minimum weighings.
Divide balls into 3 groups of 4 each
Weigh any 2 groups against each other
If both groups weigh the same, the odd ball is in the third group
If one group is heavier, weigh any 2 balls from that group against each other
If they weigh the same, the odd ball is the remaining one
If one ball is heavier, it is the odd ball
Repeat the process with t
A program to reverse a singly linked list in groups of k using recursion.
Create a recursive function that takes the head of the linked list and the group size as parameters.
If the remaining list has less than k nodes, return the head as it is.
Reverse the first k nodes by recursively calling the function for the next group.
Connect the reversed group to the remaining list.
Return the new head of the reversed list.
Program to find length of longest substring without repeating characters in a string.
Use a sliding window approach to traverse the string
Use a hash set to keep track of unique characters in the current substring
Update the length of longest substring without repeating characters as you traverse the string
Representing date of a month using two cubes with numbers 0-9 on each face
Assign numbers 0-9 on each face of both cubes
Use one cube to represent tens digit and other for ones digit
Rotate cubes to display desired date
Example: Cube 1 - 0, 1, 2, 3, 4, 5; Cube 2 - 0, 1, 2, 6, 7, 8; To represent 23, Cube 1 shows 2 and Cube 2 shows 3
Find the character repeated most number of times in an array of strings.
Create a dictionary to store character count
Iterate through each string and character
Return the character with highest count
Answering a question on tracing output of C/C++ code snippet with pointers and references
Understand the code and identify all pointers and references
Trace the values of each pointer and reference at each step
Follow the flow of the code to determine the final output
Segmentation fault is a type of error that occurs when a program tries to access a memory location that it is not allowed to access.
Segmentation fault is also known as a segfault.
It is a common error in C and C++ programming languages.
It occurs when a program tries to read or write to a memory location that it does not have permission to access.
This can happen when a program tries to access an uninitialized pointer or ...
BFS and DFS are graph traversal algorithms used to search for nodes in a graph.
BFS stands for Breadth First Search and explores all the nodes at the current depth before moving to the next level.
DFS stands for Depth First Search and explores as far as possible along each branch before backtracking.
BFS uses a queue data structure while DFS uses a stack or recursion.
BFS is useful for finding the shortest path in an unwei...
I would prefer Depth First Search (DFS) traversal for finding a cycle in a graph.
DFS is better suited for finding cycles in a graph as it explores deeper into the graph before backtracking.
DFS can detect a cycle in a graph in O(V+E) time complexity.
DFS can be implemented using recursion or a stack.
Breadth First Search (BFS) can also be used to find cycles but it is less efficient than DFS.
In DFS, we can keep track of v
Hashmap has constant time complexity for insertion, deletion, and retrieval, but requires additional space.
Hashmap provides constant time complexity O(1) for insertion, deletion, and retrieval operations on average.
The space complexity of a hashmap is proportional to the number of elements stored in it.
Hashmap uses a hash function to map keys to indices in an underlying array, which allows for efficient lookup.
In case ...
The data structure behind a login page should store user credentials securely.
Use a database to store user information
Hash and salt passwords for security
Include fields for username, email, password, and possibly additional information
Consider implementing two-factor authentication
I applied via Approached by Company and was interviewed in Jun 2024. There were 2 interview rounds.
To deal with difficult stakeholders, it is important to communicate effectively, build trust, manage expectations, and find common ground.
Communicate openly and regularly with stakeholders to address concerns and keep them informed
Build trust by delivering on promises and being transparent in your actions
Manage expectations by setting clear goals and timelines, and being realistic about what can be achieved
Find common ...
I faced challenges with team communication and resource allocation, but resolved them through regular meetings and adjusting timelines.
Team communication breakdowns led to misunderstandings and delays
Resource allocation issues caused bottlenecks in project progress
Held regular team meetings to address communication issues and clarify tasks
Adjusted project timelines to accommodate resource constraints and meet deadlines
I manage risks by identifying potential risks, assessing their impact, developing mitigation strategies, and monitoring them throughout the project.
Identify potential risks by conducting risk assessments
Assess the impact of each risk on the project's objectives
Develop mitigation strategies to address high-priority risks
Monitor risks throughout the project lifecycle and adjust strategies as needed
I proactively identify delays, assess impact, communicate with stakeholders, and collaborate on solutions.
Identify the cause of the delay and assess its impact on the project timeline and deliverables
Communicate the delay to stakeholders promptly and transparently, providing clear reasons and potential solutions
Collaborate with stakeholders to develop a plan to mitigate the delay and adjust project timelines accordingl...
I applied via Campus Placement and was interviewed in May 2024. There were 4 interview rounds.
Every round was held in banglore office . The round consisted of some mathematics and paragraphed based questions and some video baed ques related to akamai
Actually due to time costraint and less no of candidates they didnt conduct the gd
SQL query, Linux, OS fundamentals
When you enter a URL, your browser sends a request to the server hosting the website, which then responds by sending back the requested webpage.
1. Browser sends a request to the server hosting the website
2. Server processes the request and sends back the requested webpage
3. The webpage is displayed in the browser for the user to interact with
Akamai Technologies interview questions for popular designations
I applied via Company Website and was interviewed in Apr 2024. There were 4 interview rounds.
All aptitude questions like percentage,permutation and combination ,english sentences etc ,normal aptitude questions.
Normal GD topics ,current affairs etc.
DNS stands for Domain Name System, which translates domain names to IP addresses.
DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).
It helps users access websites and other online services by resolving domain names to their corresponding IP addresses.
DNS also helps in load balancing, security, and email delivery by providing various
Get interview-ready with Top Akamai Technologies Interview Questions
I applied via LinkedIn and was interviewed in Feb 2024. There was 1 interview round.
I applied via Campus Placement and was interviewed in Jun 2024. There were 2 interview rounds.
Easiest test in my life
I applied via Company Website and was interviewed in May 2024. There were 2 interview rounds.
I applied via Company Website and was interviewed in Apr 2024. There were 4 interview rounds.
Few Technical bits too apart from aptitude
No feedback but good
Top trending discussions
Some of the top questions asked at the Akamai Technologies interview -
The duration of Akamai Technologies interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 50 interviews
Interview experience
based on 382 reviews
Rating in categories
Software Engineer
117
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
109
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer2
94
salaries
| ₹0 L/yr - ₹0 L/yr |
Platform Operations Engineer
68
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Solutions Engineer
63
salaries
| ₹0 L/yr - ₹0 L/yr |
Limelight Networks
Cloudflare
F5 Networks
Level 3 Communications