i
SHL
Work with us
Filter interviews by
I prioritize requirements based on business impact, customer needs, technical feasibility, and resource availability.
Evaluate each requirement based on its impact on business goals
Consider customer needs and feedback to prioritize features
Assess technical feasibility and resource availability for implementation
Use frameworks like MoSCoW method or Kano model for prioritization
Regularly review and adjust priorities ...
Yes, I have good knowledge in troubleshooting both hardware and software issues as well as computer and networking.
I have experience in diagnosing and resolving hardware issues such as faulty RAM, hard drives, and power supplies.
I am proficient in troubleshooting software problems including operating system errors, driver issues, and software conflicts.
I have a strong understanding of networking concepts such as T...
Program to create a copy of a doubly linked list with an arbit pointer.
Traverse the original list and create a new node for each node in the list.
Store the mapping of original node to the new node in a hash table.
Traverse the original list again and set the next and arbit pointers of the new nodes.
Return the head of the new list.
A recursive function to check if a number is prime or not.
Create a function that takes a number as input.
Check if the number is less than 2, return false.
Check if the number is 2, return true.
Check if the number is divisible by any number less than it, return false.
If none of the above conditions are met, call the function recursively with the number minus 1.
It is not possible to stop man in the middle attack over an insecure communication line without using any kind of encryption.
Without encryption, the communication line is inherently insecure and vulnerable to man-in-the-middle attacks.
One possible solution is to use a secure communication line, such as a VPN or a dedicated private network.
Another solution is to use digital signatures to verify the authenticity of ...
Implement functionality for online test with timer and handle power failure scenarios
Create a timer function to track the time
Store the start time and end time of the test
Implement a backup system to save progress in case of power failure
Use a database to store test data and progress
Handle edge cases like internet connectivity issues
To reverse a linked list, we need to traverse the list and change the direction of the pointers.
Create three pointers: prev, curr, and next
Initialize prev to null, curr to head of the linked list, and next to null
Traverse the list and change the direction of the pointers: next = curr.next; curr.next = prev; prev = curr; curr = next;
Set the new head of the linked list to prev
HTTP is unsecured while HTTPS is secured with SSL/TLS encryption.
HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure.
HTTP operates on port 80 while HTTPS operates on port 443.
HTTP is unencrypted while HTTPS is encrypted with SSL/TLS.
HTTPS provides authentication and data integrity while HTTP does not.
HTTPS is used for secure online transactions such as online banki...
It is not possible to stop man-in-the-middle attacks over an insecure communication line without encryption.
Encryption is the most effective way to prevent man-in-the-middle attacks.
Without encryption, an attacker can intercept and modify the communication.
Using encryption ensures that the data remains confidential and tamper-proof.
Other security measures like authentication and secure protocols can complement enc...
Heap and stack memory are two types of memory allocation in a program. Local variables are stored in stack memory. Memory tables are used to track memory allocation.
Heap memory is used for dynamic memory allocation, while stack memory is used for static memory allocation.
Local variables are stored in stack memory and are only accessible within the scope of the function they are declared in.
Memory tables are used t...
Program to create a copy of a doubly linked list with an arbit pointer.
Traverse the original list and create a new node for each node in the list.
Store the mapping of original node to the new node in a hash table.
Traverse the original list again and set the next and arbit pointers of the new nodes.
Return the head of the new list.
Implement functionality for online test with timer and handle power failure scenarios
Create a timer function to track the time
Store the start time and end time of the test
Implement a backup system to save progress in case of power failure
Use a database to store test data and progress
Handle edge cases like internet connectivity issues
A recursive function to check if a number is prime or not.
Create a function that takes a number as input.
Check if the number is less than 2, return false.
Check if the number is 2, return true.
Check if the number is divisible by any number less than it, return false.
If none of the above conditions are met, call the function recursively with the number minus 1.
To reverse a linked list, we need to traverse the list and change the direction of the pointers.
Create three pointers: prev, curr, and next
Initialize prev to null, curr to head of the linked list, and next to null
Traverse the list and change the direction of the pointers: next = curr.next; curr.next = prev; prev = curr; curr = next;
Set the new head of the linked list to prev
It is not possible to stop man in the middle attack over an insecure communication line without using any kind of encryption.
Without encryption, the communication line is inherently insecure and vulnerable to man-in-the-middle attacks.
One possible solution is to use a secure communication line, such as a VPN or a dedicated private network.
Another solution is to use digital signatures to verify the authenticity of the c...
HTTP is unsecured while HTTPS is secured with SSL/TLS encryption.
HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure.
HTTP operates on port 80 while HTTPS operates on port 443.
HTTP is unencrypted while HTTPS is encrypted with SSL/TLS.
HTTPS provides authentication and data integrity while HTTP does not.
HTTPS is used for secure online transactions such as online banking, e...
Heap and stack memory are two types of memory allocation in a program. Local variables are stored in stack memory. Memory tables are used to track memory allocation.
Heap memory is used for dynamic memory allocation, while stack memory is used for static memory allocation.
Local variables are stored in stack memory and are only accessible within the scope of the function they are declared in.
Memory tables are used to kee...
Aptitude test was online test
I prioritize requirements based on business impact, customer needs, technical feasibility, and resource availability.
Evaluate each requirement based on its impact on business goals
Consider customer needs and feedback to prioritize features
Assess technical feasibility and resource availability for implementation
Use frameworks like MoSCoW method or Kano model for prioritization
Regularly review and adjust priorities based...
The best product experience I've had was with the Apple iPhone, which seamlessly integrates hardware and software for user satisfaction.
Intuitive user interface: The iPhone's design allows for easy navigation, making it accessible for all age groups.
Ecosystem integration: The seamless connection with other Apple products, like the Apple Watch and MacBook, enhances usability.
Regular updates: Consistent software updates ...
Behavioral question will be asked mostly scenario based
Behavioral question asked basically scenerio based
As an Assistant Manager, my current job responsibilities include overseeing daily operations, managing staff, ensuring customer satisfaction, and implementing company policies.
Overseeing daily operations of the department or team
Managing and supervising staff members
Ensuring customer satisfaction and resolving any issues or complaints
Implementing company policies and procedures
Monitoring and analyzing performance metri...
I am a highly motivated and experienced professional with strong leadership skills and a proven track record of success.
I have a solid background in management, with X years of experience in a similar role.
I have a strong ability to motivate and inspire a team, leading to increased productivity and customer satisfaction.
I am skilled in problem-solving and decision-making, always finding effective solutions to challenge...
As an Assistant Manager, my current job responsibilities include overseeing daily operations, managing staff, ensuring customer satisfaction, and implementing company policies.
Oversee daily operations of the department or team
Manage and supervise staff, including hiring, training, and performance evaluations
Ensure customer satisfaction by addressing complaints and resolving issues
Implement company policies and procedur...
Experienced and motivated Assistant Manager with a proven track record of success in driving team performance and achieving business goals.
Strong leadership skills and ability to motivate and inspire team members
Excellent problem-solving and decision-making abilities
Proven track record of achieving sales targets and improving customer satisfaction
Effective communication and interpersonal skills
Ability to adapt to chang...
I applied via Campus Placement
Moderate , easy and basic questions
Debugging problem , language is your choice
I applied via Naukri.com and was interviewed in Oct 2022. There were 3 interview rounds.
Yes, I have good knowledge in troubleshooting both hardware and software issues as well as computer and networking.
I have experience in diagnosing and resolving hardware issues such as faulty RAM, hard drives, and power supplies.
I am proficient in troubleshooting software problems including operating system errors, driver issues, and software conflicts.
I have a strong understanding of networking concepts such as TCP/IP...
I applied via Indeed and was interviewed in Mar 2022. There were 5 interview rounds.
Appeared in one pschyomentric test varifying scientifically how good am i in various aspects of job
I applied via Approached by company and was interviewed in Aug 2021. There were 3 interview rounds.
Normal easy leetcode question you want i can share u all the possible question they can ask or for other companies also
Every company focus on DS algo. Prepare array, string, and dynamic programming question
That will be on technology specific like angular, react
Top trending discussions
Some of the top questions asked at the SHL interview -
based on 9 interview experiences
Difficulty level
Duration
Software Engineer
95
salaries
| ₹6 L/yr - ₹22 L/yr |
Associate Software Engineer
58
salaries
| ₹6.7 L/yr - ₹13 L/yr |
QA Engineer
44
salaries
| ₹9.3 L/yr - ₹15.5 L/yr |
Senior Software Engineer
44
salaries
| ₹10.5 L/yr - ₹34.5 L/yr |
Manager
34
salaries
| ₹5.7 L/yr - ₹19.5 L/yr |
Financial Software & Systems
Ramco Systems
IBS Software Services
Nucleus Software Exports