i
Bread Financial
Filter interviews by
Top trending discussions
I applied via Campus Placement and was interviewed before Jun 2023. There were 3 interview rounds.
1 hr medium level DSA questions
DFS (Depth First Search) is a traversal algorithm used in tree data structures to explore as far as possible along each branch before backtracking.
DFS starts at the root node and explores as far as possible along each branch before backtracking.
It uses a stack to keep track of nodes to visit next.
DFS can be implemented recursively or iteratively.
Example: In a binary tree, DFS would visit the left child of a node before
SQL normalisation types include 1NF, 2NF, 3NF, BCNF, and 4NF, each with specific rules for eliminating data redundancy.
1NF (First Normal Form) - Each column in a table must contain atomic values, and there should be no repeating groups.
2NF (Second Normal Form) - Table should be in 1NF and all non-key attributes should be fully functionally dependent on the primary key.
3NF (Third Normal Form) - Table should be in 2NF an...
I am open to opportunities in various locations, depending on the job offer and company culture.
Open to relocation for the right opportunity
Prefer locations with good work-life balance
Interested in cities with strong tech communities
I applied via Naukri.com and was interviewed before Mar 2023. There were 4 interview rounds.
Hackerrank test with medium level DSA and SQL questions
Big data optimisation techniques involve strategies to improve the performance and efficiency of processing large volumes of data.
Use of distributed computing frameworks like Hadoop and Spark to process data in parallel
Implementing data compression techniques to reduce storage requirements
Utilizing indexing and partitioning to optimize query performance
Applying data pruning and filtering to reduce unnecessary data proc...
Questions related to Spark internals, Tungsten project, and SQL problem for retail transactions.
Spark's internal mechanism includes components like Spark Core, Spark SQL, Spark Streaming, and MLlib.
Tungsten project in Spark aims to improve the performance of Spark by optimizing memory usage and CPU utilization.
To solve the SQL problem, we can use a query to filter transactions for a particular retail and then use the '...
Leetcode questions easy to medium level
To find the 2nd highest salary in SQL or PySpark, use the ORDER BY and LIMIT clauses.
Use ORDER BY clause to sort the salaries in descending order
Use LIMIT 1,1 to get the second highest salary
I want to join Visa because of its reputation as a global leader in payment technology and innovation.
Visa's reputation as a global leader in payment technology and innovation aligns with my career goals.
I am excited about the opportunity to work on cutting-edge data engineering projects at Visa.
I believe that joining Visa will provide me with the chance to collaborate with talented professionals in the industry.
Visa's...
It was fine . medium level difficulty.
I appeared for an interview in Jun 2017.
Ajax calls allow for asynchronous communication between client and server without reloading the page.
Ajax stands for Asynchronous JavaScript and XML
Uses XMLHttpRequest object to send and receive data
Allows for partial page updates without reloading the entire page
Can handle data in various formats such as JSON, XML, HTML, and plain text
Example: $.ajax({url: 'example.com', success: function(data){console.log(data)}});
REST is lightweight and uses HTTP while SOAP is XML-based and has more features.
REST uses HTTP methods like GET, POST, PUT, DELETE while SOAP uses XML messaging.
REST is stateless while SOAP can maintain state.
REST is faster and easier to use while SOAP is more secure and reliable.
REST is used for web services while SOAP is used for enterprise-level services.
Example of REST: Twitter API. Example of SOAP: Amazon Web Serv
GET and POST are HTTP methods used for sending data to a server.
GET is used to retrieve data from a server
POST is used to submit data to a server
GET requests can be cached and bookmarked
POST requests are not cached and cannot be bookmarked
GET requests have length restrictions
POST requests have no length restrictions
GET requests are less secure than POST requests
Observer pattern is a design pattern in which an object maintains a list of its dependents and notifies them automatically of any state changes.
Also known as publish-subscribe pattern
Used in event-driven systems
Allows loose coupling between objects
Example: A weather station broadcasts weather updates to multiple displays
Example: A stock market ticker notifies multiple investors of stock price changes
Singleton is a design pattern that restricts the instantiation of a class to a single object.
Singleton ensures that only one instance of a class exists in the entire application.
It provides a global point of access to the instance.
Commonly used in scenarios where a single instance needs to coordinate actions across the system.
Example: Database connection manager, logger, configuration manager.
Immutable in Java refers to objects whose state cannot be changed after creation.
String, Integer, and other wrapper classes are immutable in Java.
Immutable objects are thread-safe and can be shared without synchronization.
To create an immutable class, make all fields final and private, and don't provide setters.
Examples of immutable classes in Java include LocalDate, LocalTime, and LocalDateTime.
Creating immutable in Java
Use final keyword to make variables immutable
Use private constructor to prevent object modification
Use defensive copying to prevent modification of mutable objects
Use enum to create immutable objects
Use String class to create immutable strings
Dependency injection is a design pattern that allows objects to receive dependencies rather than creating them internally.
It helps to decouple the code and makes it more testable and maintainable.
It allows for easier swapping of dependencies without changing the code.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Example: Instead of creating a database co...
CORS stands for Cross-Origin Resource Sharing. It is a security feature implemented in web browsers to restrict access to resources from different origins.
CORS allows web servers to specify which origins are allowed to access its resources
It is implemented using HTTP headers
CORS prevents malicious websites from accessing sensitive data from other websites
Examples of resources that may be restricted by CORS include cook
CORS can be overcome by configuring the server to allow cross-origin requests.
Configure the server to include the Access-Control-Allow-Origin header
Use JSONP (JSON with Padding) to bypass CORS restrictions
Use a proxy server to make the request on behalf of the client
Use a browser extension to disable CORS restrictions during development
Use a server-side proxy to forward requests to the target server
based on 1 interview
Interview experience
Process Analyst
157
salaries
| ₹3.5 L/yr - ₹8 L/yr |
Process Associate
149
salaries
| ₹3 L/yr - ₹6 L/yr |
Senior Analyst
43
salaries
| ₹7.4 L/yr - ₹23.1 L/yr |
AML Analyst
36
salaries
| ₹4 L/yr - ₹7.8 L/yr |
Analyst
25
salaries
| ₹4 L/yr - ₹9.6 L/yr |
Paytm
Angel One
Truhome Finance
Unimoni