Filter interviews by
I applied via Approached by Company and was interviewed in Sep 2024. There was 1 interview round.
Maintaining security in Microservices involves implementing authentication, authorization, encryption, and monitoring.
Implement authentication and authorization mechanisms to control access to microservices.
Use encryption to secure communication between microservices.
Implement monitoring and logging to detect and respond to security incidents.
Regularly update dependencies and patches to address security vulnerabilities...
Kafka is a distributed streaming platform while RabbitMQ is a message broker.
Kafka is designed for high-throughput, fault-tolerant, real-time data streaming.
RabbitMQ is a traditional message broker that follows the AMQP protocol.
Kafka uses a publish-subscribe model while RabbitMQ uses a message queuing model.
Kafka is horizontally scalable and provides strong durability guarantees.
RabbitMQ supports multiple messaging pr...
CQRS pattern can be used in scenarios where read and write operations need to be separated for better scalability and performance.
CQRS can be used in applications with complex domain models that require different models for reading and writing data.
It can be beneficial in scenarios where read operations heavily outnumber write operations.
CQRS is useful when there is a need to optimize read and write operations independ...
Implementing eventual consistency in a relational DB involves careful design and use of techniques like conflict resolution and versioning.
Use timestamp-based conflict resolution to handle conflicting updates.
Implement versioning to track changes and resolve conflicts.
Consider using distributed transactions or distributed consensus algorithms like Paxos or Raft.
Use compensating transactions to rollback changes in case ...
I have led multiple software projects in various industries, focusing on team collaboration and delivering high-quality products.
Led cross-functional teams to develop a new mobile application for a retail company
Managed a project to upgrade a legacy system for a financial institution
Implemented agile methodologies to improve project efficiency and communication
Collaborated with stakeholders to define project requiremen
I have the necessary skills, experience, and qualifications to meet the requirements outlined in the job description.
I have a strong background in software engineering with X years of experience in leading teams and delivering successful projects.
I possess the technical skills and knowledge required for the role, including proficiency in programming languages, software development methodologies, and project management.
...
I applied via Recruitment Consulltant and was interviewed in Aug 2022. There were 5 interview rounds.
What people are saying about MasterCard
I applied via Company Website
2 DSA medium questions was asked.
2 DSA coding questions and CS fundamentals
posted on 25 Sep 2024
1. medium dp question on busrst ballon
2. graph quetion on flood fill
Design a file search feature for a software application.
Implement a search bar where users can input keywords or phrases to search for files.
Include filters for file type, date modified, and other relevant criteria.
Display search results in a user-friendly format with relevant file details.
Allow users to preview files before opening or downloading them.
Consider implementing search suggestions or autocomplete functional...
TrieNode common prefix
Graph dkistra algo find least time to fill
I applied via Company Website and was interviewed in Oct 2024. There was 1 interview round.
Asked to write a bank application - which includes adding,removing,transferring of money
posted on 31 Jul 2024
Lazy loading defers the initialization of an object until it is actually needed, while eager loading initializes the object immediately.
Lazy loading is commonly used in Singleton pattern to delay the creation of the instance until it is requested.
Eager loading initializes the Singleton instance at the time of class loading.
Lazy loading can help improve performance by only creating the instance when needed, while eager ...
Use Spring Boot configuration to connect master and slave instances of a DB
Configure multiple data sources in application.properties or application.yml file
Use @Primary annotation for the master data source and @Qualifier annotation for the slave data source
Define separate DataSource, JdbcTemplate, and EntityManager beans for each data source
Use @Transactional annotation with the appropriate data source to specify whic
Global exception handler in Spring Boot handles all exceptions thrown by the application.
Global exception handler can be implemented using @ControllerAdvice annotation in Spring Boot.
It allows centralized exception handling for all controllers in the application.
You can define methods annotated with @ExceptionHandler to handle specific exceptions.
Global exception handler can return custom error responses or redirect to
The topic was -> "One nation one election"
String pool in Java is a pool of unique strings stored in memory to optimize memory usage.
String pool is a part of Java's memory where unique string literals are stored.
When a new string is created, Java checks if it already exists in the pool to save memory.
Strings created using double quotes are added to the pool, while those created using 'new' keyword are not.
Example: String str1 = "hello"; String str2 = "hello"; /...
Java has checked and unchecked exceptions. Checked exceptions must be handled at compile time, while unchecked exceptions do not need to be handled explicitly.
Checked exceptions: Must be caught or declared in the method signature. Example: IOException, SQLException
Unchecked exceptions: Do not need to be caught or declared. Example: NullPointerException, ArrayIndexOutOfBoundsException
I applied via Walk-in and was interviewed in May 2024. There was 1 interview round.
LRU cache with multi level caching involves implementing a cache with multiple levels of storage, where the least recently used items are evicted first.
Implement a two-level cache system with a primary cache (e.g. in-memory) and a secondary cache (e.g. disk-based).
Use a data structure like a doubly linked list and a hash map to efficiently manage the cache and track the least recently used items.
When an item is accesse...
based on 7 reviews
Rating in categories
Senior Software Engineer
709
salaries
| ₹13 L/yr - ₹44 L/yr |
Software Engineer2
228
salaries
| ₹9.6 L/yr - ₹31 L/yr |
Software Engineer
210
salaries
| ₹6.2 L/yr - ₹22 L/yr |
Consultant
179
salaries
| ₹13.5 L/yr - ₹40 L/yr |
Lead Software Engineer
138
salaries
| ₹24 L/yr - ₹60 L/yr |
PayPal
Visa
American Express
Discover Financial Services