Filter interviews by
Cred app in php which having user login and registration
I applied via Naukri.com and was interviewed in Dec 2020. There was 1 interview round.
I appeared for an interview before Sep 2020.
Round duration - 60 Minutes
Round difficulty - Easy
A thief is planning to rob a store and can carry a maximum weight of 'W' in his knapsack. The store contains 'N' items where the ith item has a weight of 'wi' and a value of...
Yes, the 0/1 Knapsack problem can be solved using dynamic programming with a space complexity of not more than O(W).
Use a 1D array to store the maximum value that can be stolen for each weight capacity from 0 to W.
Iterate through each item and update the array based on whether including the item would increase the total value.
The final value in the array at index W will be the maximum value that can be stolen.
Given an array or list of integers 'ARR', identify the second largest element in 'ARR'.
If a second largest element does not exist, return -1.
ARR = [2,...
Find the second largest element in an array of integers.
Iterate through the array to find the largest and second largest elements.
Handle cases where all elements are identical.
Return -1 if a second largest element does not exist.
Round duration - 60 Minutes
Round difficulty - Easy
System Design Round
Design a scalable system for Twitter with key components and architecture.
Use microservices architecture for scalability and fault isolation.
Key components include user service, tweet service, timeline service, and notification service.
Use a distributed database like Cassandra for storing tweets and user data.
Implement a message queue like Kafka for handling real-time updates and notifications.
Use a caching layer like ...
Round duration - 30 Minutes
Round difficulty - Easy
It is just a formality
Tip 1 : System Design
Tip 2 : Practice questions from leetcode
Tip 3 : Have some projects.
Tip 1 : Mention what you know
Tip 2 : Good previous work to showcase
Procedures, Packages and Functions are all subprograms in PL/SQL with different characteristics.
Procedures are subprograms that perform a specific task and may or may not return a value.
Functions are subprograms that always return a value and can be used in SQL statements.
Packages are a collection of related procedures, functions, variables, and other program constructs that can be used as a single unit.
Packages provid...
It means that the table or view does not exist in the database.
The query will fail and return an error message.
The application may crash or behave unexpectedly.
The table or view may have been deleted or renamed.
Check the spelling and syntax of the query.
Make sure the database connection is established and valid.
Views are virtual tables while Materialized Views are physical tables.
Views are created using SELECT statement while Materialized Views are created using CREATE MATERIALIZED VIEW statement.
Views do not store data while Materialized Views store data.
Views are updated dynamically while Materialized Views are updated manually or automatically based on refresh settings.
Materialized Views are faster for read-heavy workloads...
Dependency injection is a design pattern where dependencies are injected into a class rather than created within the class itself.
Dependency injection helps in achieving loose coupling between classes.
It allows for easier testing and maintenance of code.
Example: Constructor injection, setter injection, and interface injection are common types of dependency injection.
Indexes in SQL are used to improve the performance of...
I applied via Recruitment Consulltant and was interviewed in Apr 2022. There were 2 interview rounds.
SQL injection is a type of attack where malicious SQL statements are inserted into an entry field for execution.
Use parameterized queries or prepared statements
Sanitize user input by validating and escaping special characters
Limit database user privileges
Use a web application firewall
Regularly update and patch software
Optimizing websites involves improving speed, user experience, and search engine ranking.
Minimize HTTP requests
Optimize images and videos
Use caching and compression
Reduce server response time
Implement lazy loading
Use a content delivery network (CDN)
Optimize code and scripts
Ensure mobile responsiveness
Improve website security
Use structured data for SEO
An interceptor is a software component that intercepts and modifies the behavior of a program or system.
Interceptors are commonly used in software frameworks to add additional functionality to an application.
They can be used to intercept and modify incoming or outgoing requests, such as adding authentication or logging.
Interceptors can also be used to intercept method calls and perform actions before or after the metho...
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
What is model binding
Design pattern is a reusable solution to a commonly occurring problem in software design.
Design patterns help in creating maintainable, scalable, and reusable code.
They provide a common language for developers to communicate about solutions.
Examples include Singleton, Factory, Observer, and Strategy patterns.
I applied via LinkedIn and was interviewed in Apr 2024. There were 2 interview rounds.
I was asked with writing the code and algorithms. Also lots of MySQL queries
based on 1 interview
Interview experience
System Engineer
11
salaries
| ₹3.6 L/yr - ₹4.8 L/yr |
Consultant
7
salaries
| ₹8.5 L/yr - ₹16.6 L/yr |
Software Engineer
6
salaries
| ₹3.2 L/yr - ₹7 L/yr |
Senior Software Engineer
6
salaries
| ₹4 L/yr - ₹10.1 L/yr |
Team Lead
5
salaries
| ₹2 L/yr - ₹18.9 L/yr |
Ekart Logistics
Udaan
Home Credit Finance
Swiggy