Filter interviews by
OOP concepts in Java
Encapsulation - hiding implementation details
Inheritance - creating new classes from existing ones
Polymorphism - ability of objects to take on multiple forms
Abstraction - focusing on essential features and ignoring the rest
Example: A Car class can inherit from a Vehicle class
Example: A Dog class can have a bark() method that overrides the Animal class's makeSound() method
Example: A Shape class can h...
Answering OOP Java design problems
Identify the problem domain and create a class hierarchy
Use encapsulation to hide implementation details
Apply inheritance to reuse code and create subtypes
Implement polymorphism to allow objects to take on multiple forms
Avoid tight coupling and favor composition over inheritance
Use design patterns to solve common problems
Consider SOLID principles for maintainable code
C++ is an extension of C with object-oriented programming features.
C++ supports classes and objects while C does not.
C++ has better support for polymorphism and inheritance.
C++ has a standard template library (STL) which C does not have.
C++ allows function overloading while C does not.
C++ has exception handling while C does not.
Inheritance is a mechanism in object-oriented programming where a new class is created by inheriting properties of an existing class.
Inheritance allows code reusability and saves time and effort in programming.
The existing class is called the superclass or parent class, and the new class is called the subclass or child class.
The subclass inherits all the properties and methods of the superclass and can also add its own...
Default constructor is provided by the compiler if no constructor is defined. Copy constructor creates a new object by copying an existing object.
Default constructor initializes member variables to default values.
Copy constructor creates a new object with the same values as an existing object.
Default constructor is called automatically by the compiler if no constructor is defined.
Copy constructor is called when an obje...
Access specifiers are keywords in object-oriented programming languages that determine the visibility and accessibility of class members.
Access specifiers are used to restrict access to class members.
There are three types of access specifiers: public, private, and protected.
Public members can be accessed from anywhere in the program.
Private members can only be accessed within the class.
Protected members can be accessed...
Library functions are pre-written code that can be reused to perform common tasks.
Library functions save time and effort by providing pre-written code.
They are often included in programming languages or external libraries.
Examples include functions for string manipulation, mathematical calculations, and file input/output.
Library functions can be called from within a program to perform specific tasks.
They can also be cu
DML is Data Manipulation Language used to manipulate data in a database. DLL is Data Definition Language used to define database schema.
DML is used to insert, update, delete data in a database.
DLL is used to create, alter, drop database objects like tables, views, indexes.
DML statements include INSERT, UPDATE, DELETE.
DLL statements include CREATE, ALTER, DROP.
DML affects data in a database, DLL affects the structure of
Primary key uniquely identifies a record in a table, while unique key ensures that all values in a column are distinct.
Primary key can't have null values, while unique key can have one null value.
A table can have only one primary key, but multiple unique keys.
Primary key is used as a foreign key in other tables, while unique key is not.
Example: Primary key - employee ID, Unique key - email address.
A stack is a data structure that follows the Last-In-First-Out (LIFO) principle.
Elements are added to the top of the stack and removed from the top.
Common operations include push (add element) and pop (remove element).
Stacks can be implemented using arrays or linked lists.
Examples include the call stack in programming and the undo/redo feature in text editors.
Assembly is a low-level programming language that is used to write programs that can directly interact with computer hardware.
Assembly language is specific to a particular computer architecture.
It is a low-level language that is difficult to read and write.
Assembly language programs are faster and more efficient than programs written in high-level languages.
Examples of assembly language include x86, ARM, and MIPS.
Assem...
Class access modifiers are keywords used to control the visibility and accessibility of class members.
There are four access modifiers in Java: public, private, protected, and default
Public members can be accessed from anywhere
Private members can only be accessed within the same class
Protected members can be accessed within the same class, subclasses, and same package
Default members can be accessed within the same packa
Serialization is the process of converting an object into a format that can be stored or transmitted.
Serialization is used to save the state of an object and recreate it later.
It is commonly used in network communication to transmit data between different systems.
Examples of serialization formats include JSON, XML, and binary formats like Protocol Buffers.
Deserialization is the opposite process of converting serialized
Normalisation is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalisation helps to eliminate data redundancy and inconsistencies
It ensures that each piece of data is stored in only one place
It helps to improve data integrity and accuracy
It makes it easier to maintain and update the database
There are different levels of normalisation, each with its own set of rules and g
Truncate removes all data from a table while Delete removes specific data from a table.
Truncate is faster than Delete as it doesn't log individual row deletions.
Truncate resets the identity of the table while Delete doesn't.
Truncate can't be rolled back while Delete can be.
Truncate doesn't fire triggers while Delete does.
DBMS is a software system to manage databases while RDBMS is a type of DBMS that uses a relational model.
DBMS stands for Database Management System while RDBMS stands for Relational Database Management System.
DBMS can manage any type of database while RDBMS uses a relational model to manage data.
DBMS does not enforce any specific data model while RDBMS enforces a relational data model.
Examples of DBMS include MongoDB, ...
Recursion function is a function that calls itself until a base condition is met.
Recursion is a technique used to solve problems by breaking them down into smaller sub-problems.
It involves a function calling itself with a modified input until a base case is reached.
Recursion can be used to solve problems such as factorial, Fibonacci series, and binary search.
Recursion can be implemented using loops as well, but it may ...
I am a dedicated and experienced professional with a strong background in project management and team leadership.
Over 10 years of experience in project management
Proven track record of successfully leading cross-functional teams
Strong communication and interpersonal skills
Certified in project management (PMP)
Previously managed a project with a budget of $1 million
TDS stands for Tax Deducted at Source, a system where tax is deducted by the payer at the time of making payment.
TDS is a system introduced by the Income Tax Department of India to collect tax at the source from where an individual's income is generated.
It is applicable to various payments such as salary, interest, commission, rent, etc.
The deducted TDS amount is then deposited to the government by the deductor.
TDS rat...
GST on reverse charge is a mechanism where the recipient of the goods/services is liable to pay the tax instead of the supplier.
Under reverse charge mechanism, the recipient of the goods/services is responsible for paying the GST instead of the supplier.
It is applicable in certain cases like import of services, specified goods/services, etc.
The recipient needs to self-assess and pay the tax directly to the government.
I...
Documents required for foreign remittance include identification proof, proof of address, and purpose of remittance.
Identification proof such as passport or driver's license
Proof of address like utility bill or bank statement
Purpose of remittance document like invoice or agreement
I appeared for an interview in Aug 2024.
I applied via Campus Placement and was interviewed in Sep 2024. There were 3 interview rounds.
2 Coding questions - medium to hard
Implement LFU cache using OOPs concepts
Create a class for LFU cache with methods like get, put, and remove
Use a hashmap to store key-value pairs and a hashmap to store frequency of each key
Implement a doubly linked list to store keys with the same frequency
DE Shaw interview questions for popular designations
Group list of strings as anagrams and return the list.
Create a hashmap to store sorted strings as keys and list of anagrams as values
Iterate through the list of strings, sort each string and add it to the corresponding list in the hashmap
Return the values of the hashmap as the grouped anagrams
Get interview-ready with Top DE Shaw Interview Questions
I applied via Company Website and was interviewed in Nov 2024. There was 1 interview round.
I applied via LinkedIn and was interviewed in Sep 2024. There were 3 interview rounds.
2hour test comprising of quant, reasoning and behavioral question.
Design a zepto delivery system for efficient and fast delivery of small packages.
Utilize drones for quick and efficient delivery
Implement a centralized hub for package sorting and distribution
Use GPS tracking for real-time package monitoring
Optimize routes for faster delivery times
Ensure secure and reliable delivery process
I applied via Campus Placement and was interviewed in Jul 2024. There were 2 interview rounds.
Binary Search & Dynamic Programming
Projects and queries involve understanding and working on various software projects and related inquiries.
Projects involve developing, testing, and maintaining software applications.
Queries may include troubleshooting issues, optimizing performance, and implementing new features.
Examples of queries include debugging a software bug, improving code efficiency, and integrating a new API.
How and when will India become a 5 trillion dollar economy?
Ensure scalability in system design by using horizontal scaling, load balancing, caching, and microservices architecture.
Implement horizontal scaling to add more servers to handle increased load.
Use load balancing to distribute incoming traffic across multiple servers.
Utilize caching to store frequently accessed data and reduce database load.
Adopt microservices architecture to break down the system into smaller, indepe
Design a distributed trading system platform
Utilize microservices architecture for scalability and fault tolerance
Implement message queues for asynchronous communication between components
Use distributed databases for data storage and retrieval
Implement load balancing and auto-scaling for handling varying loads
Ensure security measures such as encryption and authentication are in place
Top trending discussions
Some of the top questions asked at the DE Shaw interview -
The duration of DE Shaw interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 77 interviews
Interview experience
based on 154 reviews
Rating in categories
Analyst
165
salaries
| ₹13 L/yr - ₹32 L/yr |
Senior Analyst
127
salaries
| ₹10.1 L/yr - ₹38 L/yr |
Manager
70
salaries
| ₹14 L/yr - ₹60 L/yr |
Associate
56
salaries
| ₹8 L/yr - ₹28.8 L/yr |
Project Lead
53
salaries
| ₹25 L/yr - ₹94 L/yr |
Morgan Stanley
Citadel
Blackrock
AQR Capital Management