Filter interviews by
Use a combination of hash table and linked list to achieve O(1) operations for a Hash Map.
Use a hash table to store key-value pairs and a linked list to handle collisions.
Implement a hash function to map keys to indices in the hash table.
For each key, calculate the hash value and store the corresponding value in the hash table at that index.
To handle collisions, use separate chaining with linked lists at each index of ...
posted on 13 Jan 2024
Object-oriented programming concepts in Java
Encapsulation: bundling data and methods together
Inheritance: creating new classes from existing ones
Polymorphism: using a single interface to represent different types
Abstraction: hiding implementation details and providing a simplified view
Encapsulation example: using private variables and public methods
Inheritance example: creating a subclass that inherits properties and m...
posted on 15 May 2024
The flow of end to end order in BSS involves customer placing an order, order processing, billing, and fulfillment.
Customer places an order through the BSS system.
Order is processed by validating customer information, checking inventory, and generating a purchase order.
Billing is done by generating an invoice and processing payment.
Fulfillment involves picking, packing, and shipping the order to the customer.
Order stat...
posted on 3 Dec 2024
30min duration simple questions
Basic array 2 coding questions
posted on 9 Dec 2024
I applied via Approached by Company and was interviewed in Nov 2024. There were 2 interview rounds.
Handling difficult situations by staying calm, analyzing the problem, and finding a solution.
Remaining calm under pressure
Identifying the root cause of the problem
Collaborating with team members to brainstorm solutions
Prioritizing tasks to address the issue efficiently
I applied via Walk-in and was interviewed in Nov 2024. There were 2 interview rounds.
1st round is aptitude and pesudocode
I applied via Referral and was interviewed in Oct 2024. There were 2 interview rounds.
2 coding question for 60 mins. One array based question and one string based question.
Oops 2 pillars are Abstraction and Encapsulation.
Abstraction: Hiding unnecessary details and showing only relevant information. Example: Car dashboard displaying speed without showing internal engine details.
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: Class in object-oriented programming encapsulates data and methods.
Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.
Types of inheritance: single inheritance, multiple inheritance, multilevel inheritance, hierarchical inheritance
Single inheritance: a class inherits from only one parent class. Example: class Dog inherits from class Animal
Multiple inheritance: a class inherits from multiple parent classes. Example:...
posted on 5 Oct 2024
Inheritance is a mechanism in object-oriented programming where a class inherits properties and behaviors from another class.
Allows a class to inherit attributes and methods from another class
Promotes code reusability and reduces redundancy
Creates a parent-child relationship between classes
Derived class can override or extend the functionality of the base class
Types of joins in MySQL include inner join, left join, right join, and full join.
Inner join: Returns rows when there is a match in both tables.
Left join: Returns all rows from the left table and the matched rows from the right table.
Right join: Returns all rows from the right table and the matched rows from the left table.
Full join: Returns rows when there is a match in one of the tables.
Use a centralized API gateway to manage and route requests to multiple APIs efficiently.
Implement a centralized API gateway to handle incoming requests and route them to the appropriate API based on the endpoint.
Utilize API management tools like Apigee, Kong, or AWS API Gateway to manage and monitor multiple APIs.
Consider implementing a caching layer to improve performance and reduce the number of requests to external
strstr function searches for a substring within a string and returns a pointer to the first occurrence of the substring.
Used in C programming language
Syntax: char *strstr(const char *haystack, const char *needle)
Example: char *str = strstr("hello world", "world")
I was interviewed in Aug 2024.
Concurrency is the ability of a system to run multiple tasks simultaneously. Performance of applications can be checked using profiling tools. Concurrency can be handled using synchronization techniques like mutexes and channels.
Concurrency allows multiple tasks to run concurrently, improving performance and responsiveness.
Performance of applications can be checked using profiling tools like Go's built-in 'pprof' packa...
To ensure no vulnerabilities, follow secure coding practices, conduct regular security audits, use encryption, and stay updated on security threats.
Follow secure coding practices such as input validation, output encoding, and parameterized queries.
Conduct regular security audits to identify and address vulnerabilities in the code.
Use encryption to protect sensitive data in transit and at rest.
Stay updated on security t...
based on 1 interview
Interview experience
Analyst
165
salaries
| ₹12 L/yr - ₹30 L/yr |
Senior Analyst
142
salaries
| ₹12.3 L/yr - ₹41 L/yr |
Manager
69
salaries
| ₹14 L/yr - ₹60 L/yr |
Project Lead
53
salaries
| ₹25 L/yr - ₹94 L/yr |
Member Technical Staff
47
salaries
| ₹11.5 L/yr - ₹42.5 L/yr |
Goldman Sachs
Morgan Stanley
Citadel
Blackrock