Filter interviews by
DDL and DML are SQL commands for defining and manipulating database structures and data.
DDL (Data Definition Language) commands define database structures. Examples: CREATE, ALTER, DROP.
DML (Data Manipulation Language) commands manage data within those structures. Examples: SELECT, INSERT, UPDATE, DELETE.
DDL commands affect the schema, while DML commands affect the data stored in the schema.
Example of DDL: CREATE ...
Program to print odd and even numbers using multithreading
Create two separate threads for printing odd and even numbers
Use synchronization mechanisms like mutex or semaphore to ensure proper ordering of output
Example: Thread 1 prints odd numbers (1, 3, 5, ...) and Thread 2 prints even numbers (2, 4, 6, ...)
Rate limit design involves setting limits on the number of requests a user can make within a certain time frame to prevent abuse or overload.
Consider the type of requests being made and the impact of rate limiting on user experience.
Implement rate limiting at different levels such as API endpoints, user accounts, or IP addresses.
Use tokens or tokens buckets to track and enforce rate limits.
Provide clear error mess...
SQL queries of Strings
Use the LIKE operator to search for a specified pattern in a column
Use the CONCAT function to concatenate strings
Use the SUBSTRING function to extract a substring from a string
My interest areas include data analysis, market research, and digital marketing.
Data analysis
Market research
Digital marketing
Use a subquery to find the 2nd largest number in a database table.
Use a subquery to select all distinct numbers from the table
Order the numbers in descending order
Use LIMIT 1,1 to select the second row which will be the 2nd largest number
Program to check if a string can be rearranged to form a palindrome
Create a frequency map of characters in the string
Count the number of characters with odd frequencies
If there is at most one character with odd frequency, the string can be rearranged to form a palindrome
Diamond problem in Java occurs when a class inherits from two classes that have a common ancestor, resulting in ambiguity.
Occurs in multiple inheritance when a class inherits from two classes that have a common ancestor
Results in ambiguity as the compiler cannot determine which method to call
Can be resolved using interfaces or by explicitly overriding methods
Python supports various data types including integers, floats, strings, lists, tuples, dictionaries, and more.
Integers: whole numbers without decimal points (e.g. 5, -3)
Floats: numbers with decimal points (e.g. 3.14, -0.5)
Strings: sequences of characters enclosed in quotes (e.g. 'hello', '123')
Lists: ordered collections of items (e.g. [1, 'apple', True])
Tuples: ordered, immutable collections of items (e.g. (1, 'ba...
Java is statically typed, object-oriented language with a focus on performance and scalability. Python is dynamically typed, high-level language known for its simplicity and readability.
Java is statically typed, meaning variable types are explicitly declared at compile time. Python is dynamically typed, allowing for more flexibility but potentially leading to runtime errors.
Java is more verbose and requires more b...
I appeared for an interview in Aug 2022.
Routing is the process of selecting a path for network traffic to travel from one network to another.
Routing is done by routers in a network.
Types of routing include static routing, dynamic routing, and default routing.
Static routing involves manually configuring the routes.
Dynamic routing uses protocols to automatically update the routing table.
Default routing is used when there is no specific route for a packet.
Examp...
Factory design pattern is a creational pattern that provides an interface for creating objects in a superclass, but allows subclasses to alter the type of objects that will be created.
Factory pattern is used when we have a superclass with multiple subclasses and based on input, we need to return one of the subclass.
It provides a way to delegate the instantiation logic to child classes.
Example: java.util.Calendar, java....
The current project is a web-based e-commerce platform with a microservices architecture.
The project uses a combination of front-end technologies like React and back-end technologies like Node.js and Java.
It follows a microservices architecture where different services handle specific functionalities like user management, product catalog, and order processing.
The services communicate with each other through APIs and me...
Dependency injection is a design pattern that allows objects to receive dependencies rather than creating them internally.
Dependency injection helps to decouple components and make them more modular.
It allows for easier testing and maintenance of code.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Example: Instead of creating a database connection object ...
Caching is the process of storing frequently accessed data in a temporary storage area for faster access.
Caching reduces the time and resources required to access data.
Types of caching include browser caching, server caching, and database caching.
Browser caching stores web page resources like images, stylesheets, and scripts on the user's device.
Server caching stores frequently accessed data on the server to reduce dat...
Web application is a complete software program accessed through a web browser, while web API application is a set of programming instructions that allow communication between different software systems.
Web application is a complete software program accessed through a web browser
Web API application is a set of programming instructions that allow communication between different software systems
Web application provides a ...
Interfaces are contracts that define a set of methods that a class must implement. They help achieve abstraction and loose coupling.
Interfaces provide a way to achieve abstraction and loose coupling in code.
They define a set of methods that a class must implement, but not how they are implemented.
Classes can implement multiple interfaces, allowing for greater flexibility and reusability.
Interfaces are commonly used in ...
Load balancing is the process of distributing network traffic across multiple servers to avoid overloading a single server.
Load balancing helps to improve the performance, availability, and scalability of applications.
It can be achieved through hardware or software solutions.
Examples of load balancing algorithms include round-robin, least connections, and IP hash.
Load balancing can also be combined with other technique...
SSL is a security protocol used to establish an encrypted link between a web server and a browser.
SSL stands for Secure Sockets Layer.
It is used to protect sensitive information such as login credentials, credit card details, etc.
SSL uses encryption to ensure that data transmitted between the server and browser cannot be intercepted by third parties.
It is essential for e-commerce websites, online banking, and any websi...
Encryption is the process of converting plain text into a coded message to prevent unauthorized access.
Encryption uses an algorithm and a key to convert plain text into ciphertext.
Decryption uses the same algorithm and key to convert ciphertext back into plain text.
Common encryption algorithms include AES, RSA, and Blowfish.
Encryption is used to protect sensitive data such as passwords, credit card numbers, and persona...
CORS (Cross-Origin Resource Sharing) is a security feature that restricts web pages from making requests to a different domain.
CORS issue occurs when a web page tries to access resources from a different domain
It is a security feature implemented by web browsers to prevent cross-site scripting attacks
CORS issue can be resolved by configuring the server to allow cross-origin requests or by using JSONP
It can occur in AJA...
Indexes can slow down insert performance due to the overhead of maintaining the index.
Inserting data into the table without indexes will be faster than inserting into the table with indexes.
The more indexes a table has, the slower the insert performance will be.
However, indexes can improve query performance by allowing the database to quickly find the data being searched for.
Ajax calls are asynchronous HTTP requests made by JavaScript to a server without reloading the page.
Ajax stands for Asynchronous JavaScript and XML
Used to update parts of a web page without reloading the entire page
Can be used to fetch data from a server and display it on a web page
Examples: Google Maps, Facebook News Feed
Angular is a popular front-end web application framework that uses TypeScript as its primary language.
Angular is developed and maintained by Google.
It is used for building dynamic, single-page web applications.
It uses TypeScript, a superset of JavaScript, which adds features like static typing and class-based object-oriented programming.
Angular provides a range of features like data binding, dependency injection, and c...
Lazy loading is a technique used to defer the loading of non-critical resources until they are actually needed.
It improves page load time and performance.
It reduces the initial load time of a web page.
It is commonly used for images, videos, and other media files.
It can be implemented using JavaScript or server-side scripting.
Example: Images below the fold on a webpage are loaded only when the user scrolls down to them.
I applied via Referral and was interviewed in Jun 2024. There were 2 interview rounds.
Tree traversals are methods to visit all nodes in a binary tree in different orders: inorder, preorder, and postorder.
Inorder Traversal: Visit left subtree, root, then right subtree. Example: For tree 1,2,3, result is 2,1,3.
Preorder Traversal: Visit root, left subtree, then right subtree. Example: For tree 1,2,3, result is 1,2,3.
Postorder Traversal: Visit left subtree, right subtree, then root. Example: For tree 1,2,3,...
Rate limit design involves setting limits on the number of requests a user can make within a certain time frame to prevent abuse or overload.
Consider the type of requests being made and the impact of rate limiting on user experience.
Implement rate limiting at different levels such as API endpoints, user accounts, or IP addresses.
Use tokens or tokens buckets to track and enforce rate limits.
Provide clear error messages ...
I applied via Campus Placement and was interviewed in Aug 2024. There were 2 interview rounds.
On mettle platform was easy
I am a passionate Senior SDET Engineer with a strong interest in automation, quality assurance, and continuous improvement.
Experienced in designing and implementing automated testing frameworks
Skilled in identifying and resolving software defects
Passionate about staying up-to-date with the latest technologies and tools in the QA field
I have worked on various projects including test automation, performance testing, and CI/CD implementation.
Test automation project using Selenium and Java to automate regression tests for web applications
Performance testing project using JMeter to simulate load on a web application and identify bottlenecks
CI/CD implementation project using Jenkins to automate build, test, and deployment processes
In 5 years, I see myself as a senior business analyst leading a team and contributing to strategic decision-making.
Leading a team of analysts
Contributing to strategic decision-making
Continuing professional development and certifications
Possibly pursuing a management role
Enhancing industry knowledge and expertise
I am interested in Epsilon's innovative approach to data analytics and leaving my current organization for career growth opportunities.
Epsilon's reputation for cutting-edge data analytics solutions
Opportunity for career growth and development at Epsilon
Excited about working with a new team and learning new skills
posted on 23 Aug 2024
SQL is a programming language used for managing and querying relational databases.
SQL stands for Structured Query Language
It is used to retrieve, insert, update, and delete data in databases
Common SQL commands include SELECT, INSERT, UPDATE, DELETE
SQL is used in various database management systems like MySQL, Oracle, SQL Server
Example: SELECT * FROM customers WHERE city = 'New York';
I appeared for an interview in Mar 2025, where I was asked the following questions.
DDL and DML are SQL commands for defining and manipulating database structures and data.
DDL (Data Definition Language) commands define database structures. Examples: CREATE, ALTER, DROP.
DML (Data Manipulation Language) commands manage data within those structures. Examples: SELECT, INSERT, UPDATE, DELETE.
DDL commands affect the schema, while DML commands affect the data stored in the schema.
Example of DDL: CREATE TABLE...
I have extensive experience in technical support, troubleshooting, and customer service across various industries.
Provided technical support for software applications, resolving issues for over 100 users daily.
Implemented a ticketing system that improved response time by 30%.
Conducted training sessions for new employees on troubleshooting techniques.
Collaborated with development teams to identify and resolve recurring ...
I appeared for an interview in Mar 2025, where I was asked the following questions.
Top trending discussions
Some of the top questions asked at the Epsilon interview -
The duration of Epsilon interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 71 interview experiences
Difficulty level
Duration
based on 760 reviews
Rating in categories
Senior Software Engineer
410
salaries
| ₹16.6 L/yr - ₹28 L/yr |
Software Engineer2
190
salaries
| ₹10.2 L/yr - ₹17 L/yr |
Software Engineer
173
salaries
| ₹5.7 L/yr - ₹14 L/yr |
Senior Developer
160
salaries
| ₹11.9 L/yr - ₹21.4 L/yr |
Campaign Analyst
145
salaries
| ₹4.9 L/yr - ₹10 L/yr |
R.R. Donnelley
Smollan Group
ChannelPlay
Affinity Express