i
Bluestock ™
Filter interviews by
I applied via LinkedIn and was interviewed in Jul 2024. There was 1 interview round.
Computer Science engineering subject only
Top trending discussions
posted on 26 Dec 2024
I applied via Campus Placement
Three fundamental questions related to Data Structures and Algorithms.
I applied via Job Portal and was interviewed before Mar 2023. There was 1 interview round.
Technical round 2 questions
React is a modern JavaScript library for building user interfaces, while jQuery is a fast and concise JavaScript library for DOM manipulation.
React is component-based, promoting reusability and modularity.
React uses a virtual DOM for efficient updates, while jQuery directly manipulates the DOM.
React is declarative, making it easier to reason about the UI, while jQuery is imperative.
React is typically used for single-pa...
I applied via Referral and was interviewed in Jul 2024. There were 3 interview rounds.
3 dsa questions medium level
posted on 14 Apr 2024
I applied via Naukri.com and was interviewed in Mar 2024. There were 3 interview rounds.
Technical Aptitude on singalton pattern
A man-in-the-middle attack is a cyber security attack where the attacker secretly intercepts and possibly alters the communication between two parties.
Attacker intercepts communication between two parties
Attacker may alter the communication
Commonly occurs in public Wi-Fi networks
Can lead to data theft or unauthorized access
Protecting API involves using authentication, authorization, encryption, rate limiting, and monitoring.
Implement authentication mechanisms such as OAuth, JWT, or API keys
Use authorization to control access to different parts of the API
Encrypt sensitive data using SSL/TLS
Implement rate limiting to prevent abuse and protect against DDoS attacks
Monitor API traffic for unusual activity and potential security threats
CSRF stands for Cross-Site Request Forgery, a type of attack where a malicious website tricks a user into performing actions on another website without their knowledge.
CSRF attacks exploit the trust that a site has in a user's browser, by sending unauthorized requests using the user's session.
Prevent CSRF attacks by using tokens in forms, checking the origin of requests, and implementing proper authentication and autho...
I was interviewed in Jan 2025.
Test was based on arrays and some dsa concepts.
I applied via Company Website and was interviewed in May 2024. There was 1 interview round.
LRU cache is a data structure that maintains the least recently used items in memory for efficient access.
Use a combination of a doubly linked list and a hashmap to store and access the cache items.
When a new item is accessed, move it to the front of the linked list to mark it as the most recently used.
If the cache is full, remove the least recently used item from the end of the linked list and the hashmap.
based on 6 interviews
Interview experience
based on 23 reviews
Rating in categories
Software Developer
4
salaries
| ₹1 L/yr - ₹2 L/yr |
Software Development Engineer
4
salaries
| ₹0.6 L/yr - ₹2 L/yr |
SDE
4
salaries
| ₹1 L/yr - ₹4 L/yr |
SDE Intern
4
salaries
| ₹1 L/yr - ₹3 L/yr |
Software Developer Intern
3
salaries
| ₹1 L/yr - ₹1 L/yr |
Stashfin
OneCard
Datasigns Technologies
PolicyX.com