i
Oracle
Filter interviews by
ArrayList is implemented as a resizable array, LinkedList is implemented as a doubly linked list.
ArrayList provides fast random access, LinkedList provides fast insertion and deletion.
ArrayList uses more memory as it needs to allocate a fixed size array, LinkedList uses more memory for storing references to next and previous elements.
Example: ArrayList is suitable for scenarios where random access is required, Lin...
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
To retrieve a value, the key is has...
String is immutable in Java to ensure security, thread safety, and optimization.
Immutable strings are thread-safe as they cannot be modified concurrently by multiple threads.
Immutable strings prevent security vulnerabilities like SQL injection attacks.
Immutable strings allow for string interning, reducing memory usage and improving performance.
Integration of BPM human task with SOA involves connecting business processes with service-oriented architecture.
BPM human task defines the steps and actions required for a specific task in a business process.
SOA is an architectural style that enables the creation of loosely coupled, reusable services.
Integration involves connecting the human tasks defined in BPM with the services in SOA to automate and streamline...
What people are saying about Oracle
To use JAVA code in Oracle BPEL, you can create a Java Embedding activity within a BPEL process.
Create a Java Embedding activity within the BPEL process
Write the Java code within the Java Embedding activity
Compile the Java code and deploy the BPEL process
Design a vending machine that efficiently dispenses products and handles user interactions.
User Interface: Touchscreen for easy navigation and product selection.
Payment System: Accepts cash, credit/debit cards, and mobile payments.
Product Inventory: Real-time tracking of stock levels to prevent out-of-stock situations.
User Feedback: Option for users to rate products and provide feedback.
Maintenance Alerts: Notific...
Find the longest subarray with sum k in an array.
Use a hashmap to store the prefix sum and its index.
Iterate through the array and check if the current prefix sum - k exists in the hashmap.
If it exists, update the maximum length of subarray.
Return the maximum length of subarray.
HashMap is a key-value data structure. Stream operations are used for processing collections of objects.
HashMap uses hashing to store and retrieve key-value pairs. It has constant time complexity for basic operations like get and put.
Stream operations are used for filtering, mapping, and reducing collections of objects. They are lazy and can be parallelized for better performance.
Examples of stream operations incl...
String is immutable in Java to ensure security, thread safety, and optimization.
Immutable strings are thread-safe as they cannot be modified concurrently by multiple threads.
Immutable strings prevent security vulnerabilities like SQL injection attacks.
Immutable strings allow for string interning, reducing memory usage and improving performance.
ArrayList is implemented as a resizable array, LinkedList is implemented as a doubly linked list.
ArrayList provides fast random access, LinkedList provides fast insertion and deletion.
ArrayList uses more memory as it needs to allocate a fixed size array, LinkedList uses more memory for storing references to next and previous elements.
Example: ArrayList is suitable for scenarios where random access is required, LinkedLi...
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
To retrieve a value, the key is hashed a...
I appeared for an interview before Feb 2024.
Array element count-
I applied via Referral and was interviewed before Mar 2023. There were 2 interview rounds.
To use JAVA code in Oracle BPEL, you can create a Java Embedding activity within a BPEL process.
Create a Java Embedding activity within the BPEL process
Write the Java code within the Java Embedding activity
Compile the Java code and deploy the BPEL process
Integration of BPM human task with SOA involves connecting business processes with service-oriented architecture.
BPM human task defines the steps and actions required for a specific task in a business process.
SOA is an architectural style that enables the creation of loosely coupled, reusable services.
Integration involves connecting the human tasks defined in BPM with the services in SOA to automate and streamline busi...
I applied via Referral and was interviewed before Jan 2022. There were 3 interview rounds.
Design a vending machine that efficiently dispenses products and handles user interactions.
User Interface: Touchscreen for easy navigation and product selection.
Payment System: Accepts cash, credit/debit cards, and mobile payments.
Product Inventory: Real-time tracking of stock levels to prevent out-of-stock situations.
User Feedback: Option for users to rate products and provide feedback.
Maintenance Alerts: Notification...
I applied via Naukri.com and was interviewed before Aug 2022. There were 5 interview rounds.
Apitutude test on premise
Basics of Binary Tree and some puzzle based question
Asked a question on matrix and asked to design Snake game.
I applied via Recruitment Consulltant and was interviewed before Oct 2021. There were 3 interview rounds.
HashMap is a key-value data structure. Stream operations are used for processing collections of objects.
HashMap uses hashing to store and retrieve key-value pairs. It has constant time complexity for basic operations like get and put.
Stream operations are used for filtering, mapping, and reducing collections of objects. They are lazy and can be parallelized for better performance.
Examples of stream operations include f...
Find the longest subarray with sum k in an array.
Use a hashmap to store the prefix sum and its index.
Iterate through the array and check if the current prefix sum - k exists in the hashmap.
If it exists, update the maximum length of subarray.
Return the maximum length of subarray.
DSA problem for longest palindromic substring .
I applied via Approached by Company and was interviewed before Jun 2021. There were 2 interview rounds.
Frameworks provide structure and pre-built components for software development, but can also limit flexibility and require learning curve.
Advantage: Provides structure and pre-built components for faster development
Advantage: Can improve code quality and maintainability
Disadvantage: Can limit flexibility and customization
Disadvantage: Requires learning curve and potential dependency issues
Example: ReactJS provides a fr...
Oops stands for Object-Oriented Programming. It is a programming paradigm that uses objects to represent real-world entities.
Advantages: code reusability, modularity, encapsulation, inheritance, polymorphism
Disadvantages: complexity, steep learning curve, performance overhead
Example: creating a class 'Car' with properties like 'make', 'model', and 'year', and methods like 'start_engine' and 'stop_engine'
posted on 16 Sep 2021
I appeared for an interview before Sep 2020.
Round duration - 50 minutes
Round difficulty - Easy
This was a Data Structural round.
Given a two-dimensional array/list consisting of integers 0s and 1s, where 1 represents land and 0 represents water, determine the number of distinct islands. A group of...
Count the number of distinct islands in a 2D array of 0s and 1s.
Identify islands by performing depth-first search (DFS) on the grid
Use a set to store the shape of each island and check for duplicates
Consider translations to determine distinct islands
Round duration - 50 minutes
Round difficulty - Easy
This was a Data Structural round.
You are tasked with arranging 'N' words of varying lengths such that each line contains at most 'M' characters, with each word separated by a space. The challenge is to minimiz...
The goal is to minimize the total cost of arranging 'N' words on each line with a maximum character limit 'M'.
Calculate the cost of each line as the cube of extra space characters needed to reach 'M'.
Minimize the total cost by arranging words to fit within the character limit on each line.
Ensure each word appears fully on one line without breaking across lines.
Round duration - 60 minutes
Round difficulty - Easy
This was a System Design round.
Design a system similar to Red Bus for handling bookings and onboarding vendors and customers.
Implement a user-friendly interface for customers to search and book tickets
Create a vendor portal for vendors to manage their offerings and availability
Include payment gateway integration for secure transactions
Develop a robust backend system for managing bookings, cancellations, and refunds
Utilize a database to store user in...
Round duration - 50 minutes
Round difficulty - Easy
This was a System Design round
Round duration - 50 minutes
Round difficulty - Easy
This was an HR round.
Tip 1 : Practice as much as you can.
Tip 2 : Prepare for company, not in general.
Tip 3 : Your past work should be objective and your contribution should be very clear
Tip 1 : Keep only relevant things for the job you are applying.
Tip 2 : Minimal data with measurable contribution and effect.
A generic swap function swaps two values of any data type.
The function should take two parameters of any data type.
Use a temporary variable to store the value of one parameter.
Assign the value of the second parameter to the first parameter.
Assign the value of the temporary variable to the second parameter.
Search for an element in a rotated sorted linked list.
Find the pivot point where the list is rotated.
Divide the list into two sublists based on the pivot point.
Perform binary search on the appropriate sublist.
Handle edge cases such as empty list and list with only one element.
Search an element in a rotated sorted array
Find the pivot point where the array is rotated
Divide the array into two sub-arrays based on pivot point
Perform binary search on the appropriate sub-array
Repeat until element is found or sub-array size is 1
Given a Sudoku board, find possible numbers for an empty cell.
Iterate through empty cells and check possible numbers using row, column, and box constraints.
Use a set to keep track of possible numbers for each empty cell.
Return the set of possible numbers for the given empty cell.
Find integer average of 4 unsigned integers without typecasting
Add all the integers and divide by 4
Use bit shifting to divide by 4
Handle overflow by using long long data type
Use unsigned int data type for input
Code to identify 32 bit or 64 bit architecture of a processor
Check if the operating system is 32 bit or 64 bit
If OS is 32 bit, processor is 32 bit
If OS is 64 bit, check if processor supports 64 bit architecture
Use CPUID instruction to check if processor supports 64 bit architecture
Convert binary number to base 64 integer
Divide the binary number into groups of 6 bits
Convert each group of 6 bits to decimal
Map the decimal value to the corresponding base 64 character
Concatenate the base 64 characters to form the final integer
Creating test cases for random scenarios ensures software reliability and robustness through diverse input validation.
Identify edge cases: Test with minimum and maximum input values, e.g., an empty array vs. a large array.
Use random data: Generate random inputs to simulate real-world usage, e.g., random user names or passwords.
Test invalid inputs: Ensure the system handles unexpected inputs gracefully, e.g., negative n...
based on 6 interview experiences
Difficulty level
Duration
based on 127 reviews
Rating in categories
Senior Software Engineer
2.5k
salaries
| ₹19.7 L/yr - ₹36 L/yr |
Principal Consultant
2.2k
salaries
| ₹20 L/yr - ₹34.2 L/yr |
Senior Consultant
2.2k
salaries
| ₹12.8 L/yr - ₹23.5 L/yr |
Senior Member of Technical Staff
1.9k
salaries
| ₹23.8 L/yr - ₹41 L/yr |
Software Developer
1.5k
salaries
| ₹15.3 L/yr - ₹27.4 L/yr |
SAP
MongoDB
Salesforce
IBM