Filter interviews by
I applied via Company Website and was interviewed in May 2024. There was 1 interview round.
LRU cache is a data structure that maintains the least recently used items in memory for efficient access.
Use a combination of a doubly linked list and a hashmap to store and access the cache items.
When a new item is accessed, move it to the front of the linked list to mark it as the most recently used.
If the cache is full, remove the least recently used item from the end of the linked list and the hashmap.
Top trending discussions
React is a modern JavaScript library for building user interfaces, while jQuery is a fast and concise JavaScript library for DOM manipulation.
React is component-based, promoting reusability and modularity.
React uses a virtual DOM for efficient updates, while jQuery directly manipulates the DOM.
React is declarative, making it easier to reason about the UI, while jQuery is imperative.
React is typically used for single-pa...
I applied via Referral and was interviewed in Jul 2024. There were 3 interview rounds.
3 dsa questions medium level
I was interviewed in Jan 2025.
Test was based on arrays and some dsa concepts.
Coding and aptitude round
I applied via Referral and was interviewed before May 2023. There were 4 interview rounds.
posted on 26 Dec 2024
I applied via Campus Placement
Three fundamental questions related to Data Structures and Algorithms.
posted on 13 Nov 2024
I applied via Naukri.com and was interviewed before Nov 2023. There were 3 interview rounds.
2Sum problem involves finding two numbers in an array that add up to a specific target.
Use a hashmap to store the difference between the target and each element in the array.
Iterate through the array and check if the current element's complement exists in the hashmap.
Return the indices of the two numbers that add up to the target.
Spiral traversal of a Binary tree involves visiting nodes level by level alternating between left to right and right to left.
Start by pushing the root node into a queue.
While the queue is not empty, pop a node, print its value, and push its children into the queue.
Alternate between popping nodes from the queue and printing their values in a spiral manner.
The aggressive cows problem involves finding the maximum distance between cows in a field while ensuring they are not too close to each other.
Use binary search to find the maximum distance between cows.
Sort the cows' positions and check if a certain distance is feasible.
Consider the constraints of the problem such as the number of cows and the size of the field.
posted on 9 Feb 2023
JMeter is a load testing tool used to measure the performance of web applications.
JMeter can simulate heavy loads on a server, allowing testers to identify performance bottlenecks.
It can be used to test the performance of web applications, FTP servers, databases, and more.
JMeter can generate reports and graphs to help analyze test results.
It supports various protocols including HTTP, FTP, JDBC, SOAP, and more.
JMeter ca...
Defect life cycle is the process of identifying, reporting, prioritizing, fixing, and verifying defects in software.
Defect is identified by testers during testing or reported by users
Defect is logged in a defect tracking tool with details like severity, priority, etc.
Defect is assigned to a developer for fixing
Developer fixes the defect and marks it as resolved
Tester verifies the fix and either closes the defect or reo...
Integration of Excel in JMeter can be done using the Apache POI library.
Download and add the Apache POI library to JMeter's classpath.
Create a Test Plan and add a Thread Group.
Add a Sampler and choose the appropriate request type.
Add a Listener and choose the appropriate output format.
Use the POI classes to read or write data to Excel files.
Use JMeter variables to pass data between requests.
Xpath locator is a way to locate elements in HTML/XML documents using path expressions.
Xpath is a language used to navigate through elements and attributes in an XML document
It uses path expressions to select nodes or sets of nodes in an XML document
Xpath locators can be used in automated testing to locate elements on a web page
Example: //input[@id='username'] selects the input element with id='username'
To generate 5000 data in Excel and import in Jmeter, then fetch the data from excel and apply in post Api's request body.
Postman is a tool for testing APIs. An API is a set of protocols that allows communication between different software applications.
Postman allows developers to test APIs by sending requests and receiving responses.
API stands for Application Programming Interface and is a set of rules that allows different software applications to communicate with each other.
APIs can be used to retrieve data from a server, update data o...
No, different methods are required for different operations in API.
Different methods are required for different HTTP verbs like GET, POST, PUT, DELETE.
Methods should be designed to perform specific actions like fetching data, updating data, etc.
Using a single method for all operations can lead to confusion and errors.
For example, using GET method for updating data can cause security issues.
UI automation can be done using tools like Selenium, Appium, and TestComplete.
Identify the elements to be automated
Choose the appropriate tool for the technology stack
Write test scripts using the tool's API
Execute the scripts and analyze the results
Maintain the scripts as the UI changes
Database testing is the process of verifying the data stored in the database and ensuring its accuracy, completeness, and security.
It involves testing the database schema, data integrity, data validation, and performance.
Testers use SQL queries to retrieve and manipulate data for testing purposes.
Database testing can be automated using tools like Selenium, JMeter, and TestComplete.
Examples of database testing include t...
Security testing is the process of identifying vulnerabilities and weaknesses in a software system to prevent unauthorized access.
It involves testing the system for confidentiality, integrity, authentication, authorization, and availability.
Common security testing techniques include penetration testing, vulnerability scanning, and risk assessment.
Examples of security testing tools include Burp Suite, OWASP ZAP, and Nes...
posted on 23 Mar 2024
I applied via LinkedIn and was interviewed before Mar 2023. There were 4 interview rounds.
Javascript,html, CSS and MySQL
An event loop is a programming construct that waits for and dispatches events or messages in a program.
Event loop is commonly used in asynchronous programming to handle tasks like I/O operations without blocking the main thread.
It continuously checks for events in a queue and processes them one by one.
Examples of event loops include Node.js event loop for handling asynchronous operations in JavaScript.
Event loop helps ...
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Product Manager
5
salaries
| ₹18 L/yr - ₹30 L/yr |
Brand Manager
5
salaries
| ₹16 L/yr - ₹20.5 L/yr |
Software Engineer
4
salaries
| ₹7 L/yr - ₹40 L/yr |
Backend Developer
4
salaries
| ₹15 L/yr - ₹20 L/yr |
Data Analyst
3
salaries
| ₹6 L/yr - ₹18 L/yr |
Paytm
Razorpay
Mobikwik
Freecharge