i
HighRadius
Filter interviews by
I applied via LinkedIn and was interviewed in Feb 2024. There were 4 interview rounds.
Revenue recognition in project implementation is crucial for financial reporting. Key KPIs include project profitability, revenue growth, and cash flow.
Revenue recognition is the process of recording revenue in the financial statements when it is earned, regardless of when the cash is received.
Key KPIs for project implementation include project profitability, which measures the financial success of a project, revenue g...
posted on 9 Jan 2021
I applied via Approached by Company and was interviewed in May 2024. There were 2 interview rounds.
A case study was given which was very confusing, i came up with the solution but seemed that I misinterpreted the scenario.
Some risks identified include budget overruns, scope creep, resource constraints, and stakeholder conflicts.
Budget overruns: Potential for unexpected expenses exceeding the allocated budget.
Scope creep: Risk of project scope expanding beyond initial requirements.
Resource constraints: Possibility of not having enough resources (time, money, personnel) to complete the project.
Stakeholder conflicts: Risks associated with ...
I applied via Recruitment Consultant and was interviewed in Mar 2021. There was 1 interview round.
I have added 50 features through user stories in Agile framework.
I have been working on Agile framework for 2 years.
I have added features like user login, payment gateway integration, and search functionality.
I prioritize user stories based on business value and impact.
I collaborate with the development team to ensure the features are implemented correctly.
I continuously gather feedback from users to improve the applic
posted on 3 Dec 2024
I applied via Referral and was interviewed in Jun 2024. There were 2 interview rounds.
posted on 11 Oct 2020
I applied via Naukri.com and was interviewed in Sep 2020. There were 5 interview rounds.
I applied via Campus Placement and was interviewed before Feb 2022. There were 3 interview rounds.
Market entry case of an airline cobrand card
Estimate the size of tea market in india
I applied via Company Website and was interviewed before Jan 2021. There were 3 interview rounds.
Routing through a proxy involves configuring the proxy server to forward requests to the destination server.
Configure the proxy server to listen for incoming requests
Configure the proxy server to forward requests to the destination server
Configure the client to use the proxy server for outgoing requests
Use a proxy server to bypass network restrictions or improve performance
Examples: Nginx, Apache, Squid
I applied via Naukri.com and was interviewed before Jun 2021. There were 2 interview rounds.
Hacker rank long coding questions with questions for python,c++,javascript , data bast related questions
I appeared for an interview in Jun 2017.
Ajax calls allow for asynchronous communication between client and server without reloading the page.
Ajax stands for Asynchronous JavaScript and XML
Uses XMLHttpRequest object to send and receive data
Allows for partial page updates without reloading the entire page
Can handle data in various formats such as JSON, XML, HTML, and plain text
Example: $.ajax({url: 'example.com', success: function(data){console.log(data)}});
REST is lightweight and uses HTTP while SOAP is XML-based and has more features.
REST uses HTTP methods like GET, POST, PUT, DELETE while SOAP uses XML messaging.
REST is stateless while SOAP can maintain state.
REST is faster and easier to use while SOAP is more secure and reliable.
REST is used for web services while SOAP is used for enterprise-level services.
Example of REST: Twitter API. Example of SOAP: Amazon Web Serv
GET and POST are HTTP methods used for sending data to a server.
GET is used to retrieve data from a server
POST is used to submit data to a server
GET requests can be cached and bookmarked
POST requests are not cached and cannot be bookmarked
GET requests have length restrictions
POST requests have no length restrictions
GET requests are less secure than POST requests
Observer pattern is a design pattern in which an object maintains a list of its dependents and notifies them automatically of any state changes.
Also known as publish-subscribe pattern
Used in event-driven systems
Allows loose coupling between objects
Example: A weather station broadcasts weather updates to multiple displays
Example: A stock market ticker notifies multiple investors of stock price changes
Singleton is a design pattern that restricts the instantiation of a class to a single object.
Singleton ensures that only one instance of a class exists in the entire application.
It provides a global point of access to the instance.
Commonly used in scenarios where a single instance needs to coordinate actions across the system.
Example: Database connection manager, logger, configuration manager.
Immutable in Java refers to objects whose state cannot be changed after creation.
String, Integer, and other wrapper classes are immutable in Java.
Immutable objects are thread-safe and can be shared without synchronization.
To create an immutable class, make all fields final and private, and don't provide setters.
Examples of immutable classes in Java include LocalDate, LocalTime, and LocalDateTime.
Creating immutable in Java
Use final keyword to make variables immutable
Use private constructor to prevent object modification
Use defensive copying to prevent modification of mutable objects
Use enum to create immutable objects
Use String class to create immutable strings
Dependency injection is a design pattern that allows objects to receive dependencies rather than creating them internally.
It helps to decouple the code and makes it more testable and maintainable.
It allows for easier swapping of dependencies without changing the code.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Example: Instead of creating a database co...
CORS stands for Cross-Origin Resource Sharing. It is a security feature implemented in web browsers to restrict access to resources from different origins.
CORS allows web servers to specify which origins are allowed to access its resources
It is implemented using HTTP headers
CORS prevents malicious websites from accessing sensitive data from other websites
Examples of resources that may be restricted by CORS include cook
CORS can be overcome by configuring the server to allow cross-origin requests.
Configure the server to include the Access-Control-Allow-Origin header
Use JSONP (JSON with Padding) to bypass CORS restrictions
Use a proxy server to make the request on behalf of the client
Use a browser extension to disable CORS restrictions during development
Use a server-side proxy to forward requests to the target server
based on 1 interview
Interview experience
Associate Software Engineer
412
salaries
| ₹5.5 L/yr - ₹10.8 L/yr |
Associate Consultant
348
salaries
| ₹6.9 L/yr - ₹11.2 L/yr |
Associate Software Engineer 2
202
salaries
| ₹6.3 L/yr - ₹12.9 L/yr |
Techno Functional Consultant
193
salaries
| ₹6 L/yr - ₹11.5 L/yr |
Consultant
165
salaries
| ₹6 L/yr - ₹19.2 L/yr |
Angel One
Broadridge Financial Solutions
AGS Transact Technologies
PayPal