Filter interviews by
Be the first one to contribute and help others!
I applied via Recruitment Consulltant and was interviewed in May 2024. There was 1 interview round.
I am fluent in three languages: English, Spanish, and French.
Fluent in English, Spanish, and French
Can communicate effectively in all three languages
Have experience working in multilingual environments
I was interviewed in Oct 2024.
Sql queries and other python coding
Data pipeline design
Sql queries and python stuff
posted on 22 Jul 2024
I applied via Naukri.com and was interviewed in Jan 2024. There were 5 interview rounds.
Maths, English grammer question
Phone pay application
posted on 13 Nov 2024
I applied via Naukri.com and was interviewed before Nov 2023. There were 3 interview rounds.
2Sum problem involves finding two numbers in an array that add up to a specific target.
Use a hashmap to store the difference between the target and each element in the array.
Iterate through the array and check if the current element's complement exists in the hashmap.
Return the indices of the two numbers that add up to the target.
Spiral traversal of a Binary tree involves visiting nodes level by level alternating between left to right and right to left.
Start by pushing the root node into a queue.
While the queue is not empty, pop a node, print its value, and push its children into the queue.
Alternate between popping nodes from the queue and printing their values in a spiral manner.
The aggressive cows problem involves finding the maximum distance between cows in a field while ensuring they are not too close to each other.
Use binary search to find the maximum distance between cows.
Sort the cows' positions and check if a certain distance is feasible.
Consider the constraints of the problem such as the number of cows and the size of the field.
posted on 23 Aug 2023
I applied via LinkedIn and was interviewed in Jul 2023. There were 4 interview rounds.
Aptitude contain 40questions in 20mins
Suspicious transactions can be identified through various factors such as unusual amount, frequency, location, or behavior.
Look for transactions that are significantly larger or smaller than usual for the customer
Check for transactions that are out of the ordinary in terms of frequency or timing
Consider transactions from high-risk locations or countries
Review transactions that deviate from the customer's typical spendi...
I applied via Referral and was interviewed in Sep 2021. There were 3 interview rounds.
I applied via Company Website and was interviewed in May 2021. There were 3 interview rounds.
Exceptions are errors that occur during program execution and can be handled using try-catch blocks.
Checked exceptions: must be handled or declared in the method signature
Unchecked exceptions: occur at runtime and do not need to be declared
Error: serious problems that cannot be handled, such as OutOfMemoryError
Examples: NullPointerException, ArrayIndexOutOfBoundsException
Exceptions should be handled gracefully to prevent application crashes.
Use try-catch blocks to catch exceptions.
Handle exceptions at the appropriate level of abstraction.
Log exceptions to aid in debugging.
Provide meaningful error messages to the user.
Avoid catching generic exceptions.
Use finally blocks to release resources.
Consider using custom exceptions for specific error conditions.
To create a custom read-only list, use the ReadOnlyCollection class in C#.
Create a List
Use the AsReadOnly() method to create a read-only wrapper around the list.
Use the ReadOnlyCollection
Example: List
Example: var readOnlyList = myList.AsReadOnly();
Example: var trulyReadOnlyList = new ReadOnlyCollect
Collections are data structures that store and manipulate groups of related objects.
Collections are used to store and manipulate groups of related objects
They can be classified into three main categories: Lists, Sets, and Maps
Lists maintain the order of elements and allow duplicates (e.g. ArrayList, LinkedList)
Sets do not allow duplicates and do not maintain order (e.g. HashSet, TreeSet)
Maps store key-value pairs and d...
Binary search is a search algorithm that finds the position of a target value within a sorted array.
The array must be sorted before applying binary search
Compare the target value with the middle element of the array
If the target value is smaller, search the left half of the array
If the target value is larger, search the right half of the array
Repeat until the target value is found or the search space is exhausted
posted on 21 Jul 2021
Spring Security is a framework that provides authentication, authorization, and other security features for Java applications.
OAuth2 is an authorization framework that allows third-party applications to access a user's resources without sharing their credentials.
JWT (JSON Web Token) is a compact, URL-safe means of representing claims to be transferred between two parties.
SAML (Security Assertion Markup Language) is an ...
I applied via Recruitment Consultant and was interviewed in Feb 2021. There were 3 interview rounds.
Paytm
FIS
Fiserv
PhonePe