i
Finastra
Filter interviews by
Performance engineering is the process of designing, implementing, and optimizing systems to meet performance requirements.
Performance engineering involves analyzing and understanding performance requirements
It includes designing and implementing systems to meet those requirements
Optimizing systems through load testing, stress testing, and performance tuning
Performance engineering also involves monitoring and anal...
JVM is a virtual machine that executes Java bytecode. It manages memory, provides runtime environment, and enables platform independence.
JVM stands for Java Virtual Machine.
It is responsible for interpreting and executing Java bytecode.
JVM manages memory allocation and garbage collection.
It provides a runtime environment for Java applications.
JVM enables platform independence by abstracting the underlying hardware...
Performance testing focuses on evaluating the speed, responsiveness, and stability of a system, while performance engineering involves designing and optimizing the system for optimal performance.
Performance testing is the process of testing the performance characteristics of a system under specific conditions.
Performance engineering is the proactive approach of designing, building, and optimizing a system for opti...
Yes
During load testing of a web application, memory usage gradually increased over time
Identified the memory leak by monitoring memory consumption using performance testing tools
Investigated the code and found a section where objects were not being properly released
Fixed the memory leak by implementing proper object disposal and memory management techniques
CPU bottleneck can be handled by optimizing code, upgrading hardware, and load balancing.
Identify the root cause of the CPU bottleneck through performance monitoring tools.
Optimize the code by identifying and fixing inefficient algorithms or resource-intensive operations.
Upgrade hardware by adding more powerful CPUs or increasing the number of cores.
Implement load balancing techniques to distribute the workload ac...
Performance bottleneck can occur in various areas of an application.
Database queries and indexing
Network latency and bandwidth
CPU and memory usage
Code inefficiencies and poor algorithms
Third-party integrations
Hardware limitations
User load and concurrency
Application architecture
Caching and session management
Security measures
External factors such as weather or power outages
Deadlock is a situation where two or more processes are unable to proceed because each is waiting for the other to release a resource.
Deadlock occurs when two or more processes are stuck in a circular dependency, where each process is waiting for a resource held by another process.
It can happen in multi-threaded or multi-process environments.
Deadlock can be caused by resource contention, improper synchronization, ...
Load balancing is the process of distributing network traffic across multiple servers to optimize performance and prevent overload.
Load balancing improves scalability and availability of applications.
It ensures that no single server is overwhelmed with traffic.
Load balancers can use various algorithms to distribute traffic, such as round-robin, least connections, or IP hash.
Examples of load balancing technologies ...
My expected CTC is negotiable based on the job responsibilities, company size, and industry standards.
My expected CTC is based on my experience, skills, and qualifications.
I have researched the market rates for Performance Testers in similar roles and industries.
I am open to discussing the compensation package and benefits offered by the company.
I believe in a fair and competitive salary that aligns with my expert...
Memory leak is a software issue where allocated memory is not released, leading to memory consumption and performance degradation.
Memory leak occurs when a program fails to deallocate memory that is no longer needed.
It can happen due to programming errors like not freeing allocated memory or losing references to it.
Memory leaks can cause the program to consume excessive memory, leading to performance issues and cr...
I appeared for an interview before Jun 2016.
Deadlock is a situation where two or more processes are unable to proceed because each is waiting for the other to release a resource.
Deadlock occurs when two or more processes are stuck in a circular dependency, where each process is waiting for a resource held by another process.
It can happen in multi-threaded or multi-process environments.
Deadlock can be caused by resource contention, improper synchronization, or pr...
Performance testing focuses on evaluating the speed, responsiveness, and stability of a system, while performance engineering involves designing and optimizing the system for optimal performance.
Performance testing is the process of testing the performance characteristics of a system under specific conditions.
Performance engineering is the proactive approach of designing, building, and optimizing a system for optimal p...
Memory leak is a software issue where allocated memory is not released, leading to memory consumption and performance degradation.
Memory leak occurs when a program fails to deallocate memory that is no longer needed.
It can happen due to programming errors like not freeing allocated memory or losing references to it.
Memory leaks can cause the program to consume excessive memory, leading to performance issues and crashes...
Performance bottleneck can occur in various areas of an application.
Database queries and indexing
Network latency and bandwidth
CPU and memory usage
Code inefficiencies and poor algorithms
Third-party integrations
Hardware limitations
User load and concurrency
Application architecture
Caching and session management
Security measures
External factors such as weather or power outages
CPU bottleneck can be handled by optimizing code, upgrading hardware, and load balancing.
Identify the root cause of the CPU bottleneck through performance monitoring tools.
Optimize the code by identifying and fixing inefficient algorithms or resource-intensive operations.
Upgrade hardware by adding more powerful CPUs or increasing the number of cores.
Implement load balancing techniques to distribute the workload across ...
JVM is a virtual machine that executes Java bytecode. It manages memory, provides runtime environment, and enables platform independence.
JVM stands for Java Virtual Machine.
It is responsible for interpreting and executing Java bytecode.
JVM manages memory allocation and garbage collection.
It provides a runtime environment for Java applications.
JVM enables platform independence by abstracting the underlying hardware and ...
Load balancing is the process of distributing network traffic across multiple servers to optimize performance and prevent overload.
Load balancing improves scalability and availability of applications.
It ensures that no single server is overwhelmed with traffic.
Load balancers can use various algorithms to distribute traffic, such as round-robin, least connections, or IP hash.
Examples of load balancing technologies inclu...
Performance engineering is the process of designing, implementing, and optimizing systems to meet performance requirements.
Performance engineering involves analyzing and understanding performance requirements
It includes designing and implementing systems to meet those requirements
Optimizing systems through load testing, stress testing, and performance tuning
Performance engineering also involves monitoring and analyzing...
Yes
During load testing of a web application, memory usage gradually increased over time
Identified the memory leak by monitoring memory consumption using performance testing tools
Investigated the code and found a section where objects were not being properly released
Fixed the memory leak by implementing proper object disposal and memory management techniques
One innovation idea I came up with is implementing AI-driven performance testing tools.
Developing machine learning algorithms to predict performance bottlenecks
Utilizing natural language processing for test script generation
Implementing self-learning capabilities to optimize test scenarios
I can join within 2 weeks of receiving an offer.
I can start within 2 weeks of receiving an offer.
I need to give notice to my current employer.
I may need time to relocate if necessary.
My expected CTC is negotiable based on the job responsibilities, company size, and industry standards.
My expected CTC is based on my experience, skills, and qualifications.
I have researched the market rates for Performance Testers in similar roles and industries.
I am open to discussing the compensation package and benefits offered by the company.
I believe in a fair and competitive salary that aligns with my expertise a...
I want to join Misys because of their reputation for innovation and their commitment to excellence in the field of performance testing.
Misys is known for their cutting-edge technology and solutions in the financial services industry
I am impressed by Misys' track record of delivering high-quality products and services to their clients
I believe that Misys offers a great opportunity for professional growth and development...
I can join within 2 weeks of receiving an offer.
I can start within 2 weeks of receiving an offer.
My current notice period is 2 weeks.
I am available to start immediately.
Top trending discussions
I applied via Naukri.com and was interviewed before Mar 2023. There were 3 interview rounds.
Create immutable Arraylist.
I'm seeking a change to pursue new challenges, enhance my skills, and contribute to innovative projects in a dynamic environment.
Career Growth: I'm looking for opportunities that offer a clear path for advancement, such as leading projects or mentoring junior engineers.
Skill Development: I want to work with new technologies and methodologies, like cloud computing or DevOps practices, to broaden my expertise.
Cultural Fi...
I applied via Approached by Company
Sort the arr, fetch element from array
Searching a linked list involves traversing nodes to find a specific value or element efficiently.
A linked list consists of nodes, each containing data and a reference to the next node.
To search, start from the head node and traverse until the desired value is found or the end is reached.
Example: In a list 1 -> 2 -> 3, searching for '2' involves checking each node sequentially.
Time complexity for searching in a l...
Sorting in a linked list involves rearranging the elements in ascending or descending order based on a certain criteria.
Use a sorting algorithm like bubble sort, selection sort, or merge sort to rearrange the elements in the linked list.
Traverse the linked list and compare each element with the next one to determine the order in which they should be sorted.
Update the pointers of the nodes in the linked list to reflect ...
I appeared for an interview in Sep 2024.
C programming and java
Advanced coding on c
I chose this company because of its innovative projects, strong company culture, and opportunities for growth.
Innovative projects that challenge me and allow me to learn new skills
Strong company culture that values teamwork and collaboration
Opportunities for growth and advancement within the company
My aim is to continuously improve my technical skills, contribute to innovative projects, and eventually become a technical leader in the field.
Continuous learning and skill development
Contribution to innovative projects
Becoming a technical leader in the field
I applied via Approached by Company and was interviewed before Jun 2021. There were 2 interview rounds.
Frameworks provide structure and pre-built components for software development, but can also limit flexibility and require learning curve.
Advantage: Provides structure and pre-built components for faster development
Advantage: Can improve code quality and maintainability
Disadvantage: Can limit flexibility and customization
Disadvantage: Requires learning curve and potential dependency issues
Example: ReactJS provides a fr...
Oops stands for Object-Oriented Programming. It is a programming paradigm that uses objects to represent real-world entities.
Advantages: code reusability, modularity, encapsulation, inheritance, polymorphism
Disadvantages: complexity, steep learning curve, performance overhead
Example: creating a class 'Car' with properties like 'make', 'model', and 'year', and methods like 'start_engine' and 'stop_engine'
posted on 16 Sep 2021
I appeared for an interview before Sep 2020.
Round duration - 50 minutes
Round difficulty - Easy
This was a Data Structural round.
Given a two-dimensional array/list consisting of integers 0s and 1s, where 1 represents land and 0 represents water, determine the number of distinct islands. A group of...
Count the number of distinct islands in a 2D array of 0s and 1s.
Identify islands by performing depth-first search (DFS) on the grid
Use a set to store the shape of each island and check for duplicates
Consider translations to determine distinct islands
Round duration - 50 minutes
Round difficulty - Easy
This was a Data Structural round.
You are tasked with arranging 'N' words of varying lengths such that each line contains at most 'M' characters, with each word separated by a space. The challenge is to minimiz...
The goal is to minimize the total cost of arranging 'N' words on each line with a maximum character limit 'M'.
Calculate the cost of each line as the cube of extra space characters needed to reach 'M'.
Minimize the total cost by arranging words to fit within the character limit on each line.
Ensure each word appears fully on one line without breaking across lines.
Round duration - 60 minutes
Round difficulty - Easy
This was a System Design round.
Design a system similar to Red Bus for handling bookings and onboarding vendors and customers.
Implement a user-friendly interface for customers to search and book tickets
Create a vendor portal for vendors to manage their offerings and availability
Include payment gateway integration for secure transactions
Develop a robust backend system for managing bookings, cancellations, and refunds
Utilize a database to store user in...
Round duration - 50 minutes
Round difficulty - Easy
This was a System Design round
Round duration - 50 minutes
Round difficulty - Easy
This was an HR round.
Tip 1 : Practice as much as you can.
Tip 2 : Prepare for company, not in general.
Tip 3 : Your past work should be objective and your contribution should be very clear
Tip 1 : Keep only relevant things for the job you are applying.
Tip 2 : Minimal data with measurable contribution and effect.
A generic swap function swaps two values of any data type.
The function should take two parameters of any data type.
Use a temporary variable to store the value of one parameter.
Assign the value of the second parameter to the first parameter.
Assign the value of the temporary variable to the second parameter.
Search for an element in a rotated sorted linked list.
Find the pivot point where the list is rotated.
Divide the list into two sublists based on the pivot point.
Perform binary search on the appropriate sublist.
Handle edge cases such as empty list and list with only one element.
Search an element in a rotated sorted array
Find the pivot point where the array is rotated
Divide the array into two sub-arrays based on pivot point
Perform binary search on the appropriate sub-array
Repeat until element is found or sub-array size is 1
Given a Sudoku board, find possible numbers for an empty cell.
Iterate through empty cells and check possible numbers using row, column, and box constraints.
Use a set to keep track of possible numbers for each empty cell.
Return the set of possible numbers for the given empty cell.
Find integer average of 4 unsigned integers without typecasting
Add all the integers and divide by 4
Use bit shifting to divide by 4
Handle overflow by using long long data type
Use unsigned int data type for input
Code to identify 32 bit or 64 bit architecture of a processor
Check if the operating system is 32 bit or 64 bit
If OS is 32 bit, processor is 32 bit
If OS is 64 bit, check if processor supports 64 bit architecture
Use CPUID instruction to check if processor supports 64 bit architecture
Convert binary number to base 64 integer
Divide the binary number into groups of 6 bits
Convert each group of 6 bits to decimal
Map the decimal value to the corresponding base 64 character
Concatenate the base 64 characters to form the final integer
Creating test cases for random scenarios ensures software reliability and robustness through diverse input validation.
Identify edge cases: Test with minimum and maximum input values, e.g., an empty array vs. a large array.
Use random data: Generate random inputs to simulate real-world usage, e.g., random user names or passwords.
Test invalid inputs: Ensure the system handles unexpected inputs gracefully, e.g., negative n...
I appeared for an interview before Mar 2021.
Round duration - 45 minutes
Round difficulty - Medium
Technical Interview round with questions on DSA.
You are given a string of length N
. Your task is to reverse the string word by word. The input may contain multiple spaces between words and may have leading o...
Reverse words in a string while handling leading, trailing, and multiple spaces.
Split the input string by spaces to get individual words
Reverse the order of the words
Join the reversed words with a single space in between
Handle leading, trailing, and multiple spaces appropriately
You are given a stack of integers. Your task is to reverse the stack using recursion without using any extra space other than the internal stack space used due to recursion...
Reverse a stack using recursion without using any extra space other than the internal stack space.
Use recursion to pop all elements from the original stack and store them in function call stack.
Once the stack is empty, push the elements back in reverse order.
Base case of recursion should be when the original stack is empty.
Round duration - 45 minutes
Round difficulty - Medium
Technical Interview round with questions on DSA.
Given a binary tree, convert this binary tree into its mirror tree. A binary tree is a tree in which each parent node has at most two children. The mirror of a bin...
Convert a binary tree to its mirror tree by interchanging left and right children of all non-leaf nodes.
Traverse the binary tree in a recursive manner.
Swap the left and right children of each non-leaf node.
Continue this process until all nodes have been processed.
You are given a singly linked list with 'N' nodes, each containing integer data, and an integer 'K'. Your goal is to remove the 'K'th node counting from the end of ...
Remove the Kth node from the end of a singly linked list.
Use two pointers approach to find the Kth node from the end.
Handle edge cases like removing the head node or removing the last node.
Update the pointers to remove the Kth node and reconnect the list.
Round duration - 30 minutes
Round difficulty - Easy
Typical Managerial round.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
Software Engineer
338
salaries
| ₹9.2 L/yr - ₹15.9 L/yr |
Senior Software Engineer
337
salaries
| ₹16.6 L/yr - ₹29 L/yr |
Associate Software Engineer
167
salaries
| ₹6 L/yr - ₹10 L/yr |
Expert Software Engineer
94
salaries
| ₹24 L/yr - ₹40.3 L/yr |
QA Engineer
84
salaries
| ₹5.9 L/yr - ₹14.5 L/yr |
24/7 Customer
Microsoft Corporation
SAP
Thomson Reuters