i
Filter interviews by
XPath is a query language used to select nodes from an XML document, essential for locating web elements in automation testing.
Understanding the DOM: Familiarize yourself with the Document Object Model (DOM) structure of the web page to identify the hierarchy of elements.
Using Absolute XPath: Start with a full path from the root to the target element, e.g., '/html/body/div[1]/h1'.
Using Relative XPath: Create a pat...
Managing conflict involves effective communication, understanding perspectives, and finding common ground to resolve issues amicably.
Active Listening: I ensure that all parties feel heard by summarizing their points and asking clarifying questions. For example, during a team disagreement, I listened to both sides before suggesting a compromise.
Empathy: I try to understand the emotions and motivations behind the co...
A Singleton class ensures a class has only one instance and provides a global point of access to it.
Singleton pattern restricts instantiation of a class to one object.
It is commonly used for logging, driver objects, caching, and thread pools.
Example: Using a private constructor and a static method to get the instance.
Thread-safe Singleton can be implemented using synchronized methods or double-checked locking.
Implementing a stack using two queues to achieve LIFO behavior.
Use two queues: queue1 and queue2.
For push operation, enqueue the element to queue1.
For pop operation, dequeue all elements from queue1 to queue2 except the last one, then dequeue the last element from queue1.
Swap the names of queue1 and queue2 after the pop operation.
Example: Push(1), Push(2), Pop() returns 2.
TPM (Trusted Platform Module) in Intune is a security feature that helps protect data by encrypting information stored on a device.
TPM in Intune is a hardware-based security feature that stores encryption keys and other sensitive data.
It helps ensure that only authorized users can access the data on a device.
TPM in Intune can be used to enforce BitLocker encryption on Windows devices.
It provides an additional laye...
Diff string string builder compares two strings and returns the differences.
Use a loop to iterate through each character of the strings
Compare characters at the same index in both strings
Build a new string with the differing characters
Interface defines a contract for classes to implement, while abstract class can have both abstract and concrete methods.
Interfaces can only have abstract methods and constants, while abstract classes can have both abstract and concrete methods.
A class can implement multiple interfaces but can only inherit from one abstract class.
Interfaces are used to achieve multiple inheritance in Java, while abstract classes ar...
Arrays are fixed in size, while ArrayLists can dynamically resize.
Arrays have a fixed size determined at initialization, while ArrayLists can dynamically resize.
Arrays are faster for accessing elements, while ArrayLists are better for adding or removing elements.
Arrays use [] syntax for accessing elements, while ArrayLists use get() and set() methods.
Arrays can only store primitive types, while ArrayLists can stor...
Use a set to remove duplicates from a string array.
Create a set to store unique strings.
Iterate through the array and add each string to the set.
Convert the set back to an array to get the unique strings.
Diff method compares values of two objects while equal method compares references of two objects.
Diff method compares values of two objects, while equal method compares references.
Diff method is used to check if two objects are different, while equal method is used to check if two objects are the same.
Example: obj1.diff(obj2) vs obj1.equal(obj2)
I applied via LinkedIn and was interviewed in Nov 2024. There was 1 interview round.
Diff string string builder compares two strings and returns the differences.
Use a loop to iterate through each character of the strings
Compare characters at the same index in both strings
Build a new string with the differing characters
Encapsulation, Inheritance, Polymorphism, Abstraction
Encapsulation: Bundling data and methods that operate on the data into a single unit
Inheritance: Ability of a class to inherit properties and behavior from another class
Polymorphism: Ability to present the same interface for different data types
Abstraction: Hiding the complex implementation details and showing only the necessary features
Delegating tasks effectively enhances team productivity and fosters growth in a software engineering environment.
Identify team strengths: Assign tasks based on individual skills, e.g., a developer with strong front-end skills handles UI design.
Set clear expectations: Provide detailed requirements and deadlines to avoid confusion, e.g., using project management tools.
Encourage autonomy: Allow team members to make decisi...
Interface defines a contract for classes to implement, while abstract class can have both abstract and concrete methods.
Interfaces can only have abstract methods and constants, while abstract classes can have both abstract and concrete methods.
A class can implement multiple interfaces but can only inherit from one abstract class.
Interfaces are used to achieve multiple inheritance in Java, while abstract classes are use...
Arrays are fixed in size, while ArrayLists can dynamically resize.
Arrays have a fixed size determined at initialization, while ArrayLists can dynamically resize.
Arrays are faster for accessing elements, while ArrayLists are better for adding or removing elements.
Arrays use [] syntax for accessing elements, while ArrayLists use get() and set() methods.
Arrays can only store primitive types, while ArrayLists can store obj...
Use a set to remove duplicates from a string array.
Create a set to store unique strings.
Iterate through the array and add each string to the set.
Convert the set back to an array to get the unique strings.
Diff method compares values of two objects while equal method compares references of two objects.
Diff method compares values of two objects, while equal method compares references.
Diff method is used to check if two objects are different, while equal method is used to check if two objects are the same.
Example: obj1.diff(obj2) vs obj1.equal(obj2)
Sealed virtual static new keywords are used in C# to control inheritance and method hiding.
Sealed keyword prevents a class from being inherited.
Virtual keyword allows a method to be overridden in derived classes.
Static keyword makes a member of a class accessible without creating an instance of the class.
New keyword hides a method from the base class in the derived class.
Overloading with different return type is not allowed in Java.
Overloading is based on method signature, not return type
Methods with same name and different return type will result in compile-time error
Example: int add(int a, int b) and double add(int a, int b) is not allowed
Authentication in web API is achieved by using tokens or API keys to verify the identity of users.
Use tokens (such as JWT) to authenticate users
Implement OAuth for secure authentication
Utilize API keys for authentication purposes
I appeared for an interview in Aug 2024.
Generate all valid permutations of parentheses for a given number n using recursion.
Use backtracking to explore all combinations of '(' and ')'.
Maintain a count of open and close parentheses used.
Only add ')' if it doesn't exceed the number of '(' used.
Example for n=3: valid combinations are '((()))', '(()())', '(())()', '()(())', '()()()'.
Find and print the occurrence of each repeated character in sequence in a given string.
Iterate through the string and keep track of the count of each character.
Print the character and its count whenever a character is repeated in sequence.
Keyvault is a secure storage service provided by cloud providers to manage and safeguard cryptographic keys, secrets, and certificates.
Keyvault helps in securely storing and managing sensitive information such as passwords, API keys, and encryption keys.
It provides centralized management of keys, secrets, and certificates, allowing for easier access control and auditing.
Keyvault integrates with other services and appli...
AKS stands for Azure Kubernetes Service, a managed Kubernetes service provided by Microsoft Azure. Deployment strategy refers to the approach used to deploy applications or updates.
AKS is a managed Kubernetes service offered by Microsoft Azure
It simplifies the process of deploying, managing, and scaling containerized applications using Kubernetes
Deployment strategy refers to the method used to deploy applications or up...
I appeared for an interview in Mar 2025, where I was asked the following questions.
XPath is a query language used to select nodes from an XML document, essential for locating web elements in automation testing.
Understanding the DOM: Familiarize yourself with the Document Object Model (DOM) structure of the web page to identify the hierarchy of elements.
Using Absolute XPath: Start with a full path from the root to the target element, e.g., '/html/body/div[1]/h1'.
Using Relative XPath: Create a path tha...
Managing conflict involves effective communication, understanding perspectives, and finding common ground to resolve issues amicably.
Active Listening: I ensure that all parties feel heard by summarizing their points and asking clarifying questions. For example, during a team disagreement, I listened to both sides before suggesting a compromise.
Empathy: I try to understand the emotions and motivations behind the conflic...
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
Developed a data pipeline to ingest, process, and analyze customer feedback data
Designed and implemented ETL processes to extract data from various sources
Used tools like Apache Spark and Kafka for real-time data processing
Built data models and visualizations to identify trends and insights
Collaborated with cross-functional teams to improve data quality and accuracy
Aks upgrade process involves upgrading the Kubernetes version of Azure Kubernetes Service clusters.
AKS upgrade can be performed using Azure Portal, Azure CLI, or Azure PowerShell.
Before upgrading, it is recommended to check for any compatibility issues with the new Kubernetes version.
During the upgrade process, AKS nodes are drained and replaced with nodes running the new Kubernetes version.
AKS supports both minor and ...
Network plugin in AKS is used to enable communication between pods in a Kubernetes cluster.
Network plugin in AKS is responsible for setting up networking rules and policies within the cluster.
Popular network plugins for AKS include Azure CNI, Kubenet, and Calico.
Azure CNI is recommended for production workloads as it provides better performance and scalability.
Network plugins help in enabling communication between pods...
I have extensive experience working with various Azure services such as Azure DevOps, Azure Functions, Azure SQL Database, and Azure Virtual Machines.
Experience with Azure DevOps for CI/CD pipelines
Knowledge of Azure Functions for serverless computing
Hands-on experience with Azure SQL Database for data storage
Proficiency in managing Azure Virtual Machines for hosting applications
Coupling refers to the degree of interdependence between software modules or components.
Coupling measures how closely connected two modules are in a system.
There are different types of coupling such as tight coupling and loose coupling.
Tight coupling means high interdependence between modules, while loose coupling means low interdependence.
Reducing coupling in a system can improve maintainability and flexibility.
Exampl...
Different types of performance testing include load testing, stress testing, and scalability testing.
Load testing: Evaluates system performance under normal and peak load conditions.
Stress testing: Tests system performance beyond its normal capacity to identify breaking points.
Scalability testing: Measures system's ability to handle increased workload by adding resources.
Endurance testing: Checks system performance ove...
I appeared for an interview in Sep 2024, where I was asked the following questions.
Demonstrates Python wrapper class, generator for primes, PySpark explode, window functions, and cache vs persist.
Wrapper Class: A class that encapsulates a primitive data type to provide additional functionality. Example: int, float wrappers.
Generator: A function that yields values one at a time, allowing iteration without storing all values in memory. Example: def prime_gen():
Optimized Prime Number Solution: Use Sieve...
What people are saying about Impetus Technologies
Some of the top questions asked at the Impetus Technologies interview for experienced candidates -
The duration of Impetus Technologies interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 25 interview experiences
Difficulty level
Duration
based on 533 reviews
Rating in categories
Senior Software Engineer
829
salaries
| ₹7.5 L/yr - ₹25.7 L/yr |
Software Engineer
589
salaries
| ₹5 L/yr - ₹18 L/yr |
Module Lead Software Engineer
257
salaries
| ₹10.3 L/yr - ₹35.7 L/yr |
Module Lead
252
salaries
| ₹11 L/yr - ₹35 L/yr |
Lead Software Engineer
211
salaries
| ₹15.2 L/yr - ₹44 L/yr |
ITC Infotech
CMS IT Services
KocharTech
Xoriant