i
IBM
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
Hacker Rank test hacker Rank test reports
A technical interview is a job interview for positions in the technology industry where candidates are assessed on their technical skills and knowledge.
Technical interviews typically involve coding challenges, algorithm questions, and system design problems.
Candidates may be asked to solve problems on a whiteboard, on a computer, or verbally.
Interviewers may also ask about past projects, technical experience, and probl...
I applied via LinkedIn and was interviewed before Jan 2024. There were 2 interview rounds.
Asked to write leetcode easy level questions
I applied via Job Portal and was interviewed before Jun 2023. There were 3 interview rounds.
A decent set of questions
What people are saying about IBM
I applied via Referral and was interviewed before May 2023. There were 2 interview rounds.
Protocols are rules for communication between devices, while WLM stands for Workload Management.
Types of protocols include HTTP, TCP/IP, FTP, SMTP, etc.
WLM involves managing the distribution of workloads across resources efficiently.
Examples of WLM tools include IBM Workload Scheduler, Oracle Enterprise Manager, etc.
PTLC stands for Project Time and Cost Management. It involves phases like initiation, planning, execution, monitoring/control, and closure.
Initiation phase involves defining the project at a broad level.
Planning phase involves creating a detailed project plan.
Execution phase involves carrying out the project plan.
Monitoring/control phase involves tracking, reviewing, and regulating the progress and performance of the p...
IBM interview questions for designations
I applied via Recruitment Consulltant and was interviewed before Apr 2022. There was 1 interview round.
To restrict URL access in Angular, use Angular Router Guards.
Angular Router Guards can be used to restrict access to certain routes based on user authentication or authorization.
There are three types of guards: CanActivate, CanActivateChild, and CanLoad.
CanActivate is used to prevent access to a route, CanActivateChild is used to prevent access to child routes, and CanLoad is used to prevent lazy-loaded modules from be...
Interceptors are functions that can intercept and modify requests or responses in an application. Closures are functions that have access to variables in their outer scope.
Interceptors can be used for logging, authentication, caching, and more.
Closures are commonly used in JavaScript to create private variables and functions.
An example of an interceptor in AngularJS is the $httpInterceptor service.
An example of a closu...
Import and export are used in JavaScript to share code between files and modules.
Import is used to bring in code from other modules or files.
Export is used to make code available for use in other modules or files.
Import and export are commonly used in modern JavaScript development with tools like Webpack and Babel.
Examples of import and export syntax include: import { functionName } from './module'; and export default
Get interview-ready with Top IBM Interview Questions
I applied via Job Portal and was interviewed before May 2023. There was 1 interview round.
I applied via Referral and was interviewed before Apr 2023. There were 2 interview rounds.
I applied via Referral and was interviewed before Mar 2023. There were 2 interview rounds.
Deployment table is created by designing a database schema with necessary fields to track deployment information.
Design a database schema with fields like deployment_id, environment, version, date_deployed, deployed_by, etc.
Use SQL queries to create the deployment table in the database.
Consider adding indexes on commonly queried fields for performance optimization.
Implement proper data validation and constraints to ens...
Primary keys (pk) are created to uniquely identify each record in a database table.
PKs can be created using a single column or a combination of columns.
PKs must be unique and not null.
PKs can be automatically generated (e.g. using auto-increment) or manually assigned.
PKs are essential for data integrity and efficient data retrieval.
OAuth is an open standard for access delegation, commonly used for enabling secure authorization between applications.
Understand OAuth roles: resource owner, client, authorization server, resource server
OAuth flow involves obtaining authorization grant, exchanging it for access token, and accessing protected resources
Implement OAuth 2.0 protocol with libraries like OAuth2Client
Use OAuth scopes to define permissions for
The duration of IBM Senior Software Engineer interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 25 interviews
3 Interview rounds
based on 357 reviews
Rating in categories
Application Developer
11.7k
salaries
| ₹5.9 L/yr - ₹26.5 L/yr |
Software Engineer
5.5k
salaries
| ₹5.4 L/yr - ₹22.6 L/yr |
Advisory System Analyst
5.2k
salaries
| ₹9.4 L/yr - ₹26 L/yr |
Senior Software Engineer
4.8k
salaries
| ₹8 L/yr - ₹30 L/yr |
Senior Systems Engineer
4.5k
salaries
| ₹5.6 L/yr - ₹20 L/yr |
Oracle
TCS
Cognizant
Accenture