i
Bluestock ™
Filter interviews by
I applied via Naukri.com and was interviewed in Jun 2024. There were 2 interview rounds.
Got Aptitude python and SQL related questions. Was medium level toughness
Maximum python and SQL questions
React is a modern JavaScript library for building user interfaces, while jQuery is a fast and concise JavaScript library for DOM manipulation.
React is component-based, promoting reusability and modularity.
React uses a virtual DOM for efficient updates, while jQuery directly manipulates the DOM.
React is declarative, making it easier to reason about the UI, while jQuery is imperative.
React is typically used for single-pa...
I applied via Referral and was interviewed in Jul 2024. There were 3 interview rounds.
3 dsa questions medium level
posted on 14 Apr 2024
I applied via Naukri.com and was interviewed in Mar 2024. There were 3 interview rounds.
Technical Aptitude on singalton pattern
A man-in-the-middle attack is a cyber security attack where the attacker secretly intercepts and possibly alters the communication between two parties.
Attacker intercepts communication between two parties
Attacker may alter the communication
Commonly occurs in public Wi-Fi networks
Can lead to data theft or unauthorized access
Protecting API involves using authentication, authorization, encryption, rate limiting, and monitoring.
Implement authentication mechanisms such as OAuth, JWT, or API keys
Use authorization to control access to different parts of the API
Encrypt sensitive data using SSL/TLS
Implement rate limiting to prevent abuse and protect against DDoS attacks
Monitor API traffic for unusual activity and potential security threats
CSRF stands for Cross-Site Request Forgery, a type of attack where a malicious website tricks a user into performing actions on another website without their knowledge.
CSRF attacks exploit the trust that a site has in a user's browser, by sending unauthorized requests using the user's session.
Prevent CSRF attacks by using tokens in forms, checking the origin of requests, and implementing proper authentication and autho...
posted on 13 Nov 2024
I applied via Naukri.com and was interviewed before Nov 2023. There were 3 interview rounds.
2Sum problem involves finding two numbers in an array that add up to a specific target.
Use a hashmap to store the difference between the target and each element in the array.
Iterate through the array and check if the current element's complement exists in the hashmap.
Return the indices of the two numbers that add up to the target.
Spiral traversal of a Binary tree involves visiting nodes level by level alternating between left to right and right to left.
Start by pushing the root node into a queue.
While the queue is not empty, pop a node, print its value, and push its children into the queue.
Alternate between popping nodes from the queue and printing their values in a spiral manner.
The aggressive cows problem involves finding the maximum distance between cows in a field while ensuring they are not too close to each other.
Use binary search to find the maximum distance between cows.
Sort the cows' positions and check if a certain distance is feasible.
Consider the constraints of the problem such as the number of cows and the size of the field.
I applied via Company Website and was interviewed in May 2024. There was 1 interview round.
LRU cache is a data structure that maintains the least recently used items in memory for efficient access.
Use a combination of a doubly linked list and a hashmap to store and access the cache items.
When a new item is accessed, move it to the front of the linked list to mark it as the most recently used.
If the cache is full, remove the least recently used item from the end of the linked list and the hashmap.
Coding and aptitude round
posted on 15 May 2024
I applied via LinkedIn and was interviewed in Apr 2024. There was 1 interview round.
HashMap is implemented using an array of linked lists to handle collisions.
HashMap stores key-value pairs in an array of linked lists
Hash function is used to determine the index of the array where the key-value pair will be stored
Collision handling is done by chaining, where multiple key-value pairs with the same hash value are stored in the same linked list
HashMap allows null keys and values
HashMap is not synchronized...
I applied via Referral and was interviewed before May 2023. There were 4 interview rounds.
posted on 11 Oct 2021
I applied via Naukri.com and was interviewed in Sep 2021. There were 3 interview rounds.
Create a Rest API for coding assessment
Choose a programming language and framework
Define endpoints and HTTP methods
Implement CRUD operations
Use authentication and authorization
Test API using tools like Postman
Pagination can be achieved by limiting the number of records displayed per page and using page numbers.
Limit the number of records displayed per page to improve performance
Use page numbers to navigate through the records
Implement caching to reduce database queries
Consider using lazy loading to improve performance
Use a server-side framework that supports pagination
Consider using a search feature to filter records
HAVING is used to filter results after grouping, WHERE is used to filter results before grouping.
HAVING is used with GROUP BY clause, WHERE is used with SELECT clause
HAVING filters groups based on aggregate functions, WHERE filters rows based on column values
HAVING is slower than WHERE as it operates on grouped data
Example: SELECT department, COUNT(*) FROM employees GROUP BY department HAVING COUNT(*) > 5;
Example: SELE
based on 13 reviews
Rating in categories
SDE
4
salaries
| ₹1 L/yr - ₹4 L/yr |
SDE Intern
4
salaries
| ₹1 L/yr - ₹3 L/yr |
Software Development Engineer
3
salaries
| ₹0.6 L/yr - ₹2 L/yr |
Software Developer Intern
3
salaries
| ₹1 L/yr - ₹1 L/yr |
OneCard
Stashfin
Namaste Credit
PolicyX.com