Add office photos
Employer?
Claim Account for FREE

PayPal

3.9
based on 919 Reviews
Video summary
Filter interviews by

100+ Kellogg Brown and Root Interview Questions and Answers

Updated 2 Mar 2025
Popular Designations

Q101. What are OOPS concepts like inheritance,polymorphism etc

Add your answer

Q102. What was my work and explain how did I work with data

Ans.

I worked as a data analyst, collecting, cleaning, and analyzing data to identify trends and make recommendations.

  • Collected data from various sources such as databases, spreadsheets, and APIs

  • Cleaned and organized data to ensure accuracy and consistency

  • Performed statistical analysis to identify patterns and trends

  • Created visualizations and reports to communicate findings to stakeholders

Add your answer

Q103. What are the metrics that you are working on

Ans.

I am currently working on metrics such as first call resolution, average handling time, and customer satisfaction.

  • First call resolution - ensuring that customer issues are resolved on the first call

  • Average handling time - tracking the time it takes to resolve customer issues

  • Customer satisfaction - measuring how satisfied customers are with the service provided

Add your answer

Q104. What is chargeback and its process ?

Ans.

Chargeback is a process where a customer disputes a transaction and requests a refund from their bank.

  • Chargeback occurs when a customer disputes a transaction and requests a refund from their bank.

  • The bank then investigates the claim and may issue a chargeback to the merchant.

  • The merchant can dispute the chargeback and provide evidence to support their case.

  • If the chargeback is successful, the customer receives a refund and the merchant loses the sale and may incur additional...read more

Add your answer
Discover Kellogg Brown and Root interview dos and don'ts from real experiences

Q105. What are virtual function. why it is used, its mechanism and everything related to that

Ans.

Virtual functions are functions that can be overridden by derived classes. They are used for polymorphism and dynamic binding.

  • Virtual functions are declared in a base class and can be overridden in derived classes

  • They allow for polymorphism, where a pointer to a base class can call a function in a derived class

  • Virtual functions use dynamic binding, where the function called is determined at runtime based on the object's type

  • Virtual functions are used to implement abstract cla...read more

Add your answer

Q106. What are the common troubleshooting steps for Virtual Private Networks (VPN)? Printer configuration? RAS Server? Networking basic? MDM Enrollment? Difference between cloud and standard OS? How will you prioriti...

read more
Ans.

Common troubleshooting steps for VPN include checking network connectivity, verifying credentials, restarting VPN service, and updating software.

  • Check network connectivity to ensure the VPN server is reachable

  • Verify credentials to ensure correct username and password are being used

  • Restart the VPN service on the client device or server

  • Update VPN software to the latest version to fix any known issues

Add your answer
Are these interview questions helpful?

Q107. How is MongoDB scalable?

Ans.

MongoDB is scalable due to its ability to horizontally partition data across multiple servers.

  • MongoDB uses sharding to distribute data across multiple servers.

  • Sharding allows for horizontal scaling by adding more servers to the cluster.

  • MongoDB also supports replica sets for high availability and fault tolerance.

  • Indexes can be created on any field in a MongoDB document, allowing for efficient querying of large datasets.

Add your answer

Q108. Create and implement product management system with APIs and test case

Ans.

Design and implement a product management system with APIs and test cases

  • Create a database schema to store product information

  • Develop RESTful APIs for CRUD operations on products

  • Implement authentication and authorization for API access

  • Write unit tests and integration tests for APIs

  • Use tools like Postman for API testing

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. You are given two sand clocks one of 7 mins and other is of 11 mins to drain all sand particles. With that thing you have to calculate 15 mins...

read more
Ans.

Use 7 and 11 minute sand clocks to measure 15 minutes.

  • Start both sand clocks simultaneously

  • When the 7 minute clock runs out, flip it over

  • When the 11 minute clock runs out, there will be 4 minutes left on the 7 minute clock

  • When the 7 minute clock runs out again, a total of 15 minutes will have passed

Add your answer

Q110. How do you promoter from a detractor

Ans.

To promote from a detractor, listen to their concerns, empathize with them, offer solutions, and follow up to ensure satisfaction.

  • Listen actively to their complaints and concerns

  • Empathize with their situation and show understanding

  • Offer solutions to address their issues

  • Follow up to ensure their satisfaction and resolve any remaining concerns

  • Provide exceptional customer service to create a positive experience

Add your answer

Q111. How do you handle frustrated customer? With an example

Add your answer
Q112. Write an SQL query to find the nth highest salary.
Ans.

SQL query to find the nth highest salary

  • Use the ORDER BY clause to sort salaries in descending order

  • Use the LIMIT and OFFSET clauses to skip the first n-1 highest salaries

  • Combine the above steps in a single query to find the nth highest salary

Add your answer
Q113. Design a Cinema Ticket Reservation System.
Ans.

Design a Cinema Ticket Reservation System

  • Use a database to store movie information, showtimes, and seat availability

  • Allow users to search for movies, select showtimes, and choose seats

  • Implement a payment system for ticket purchases

  • Send confirmation emails with QR codes for ticket validation

Add your answer

Q114. What are the documents required while onboarding a merchant

Ans.

Documents required for onboarding a merchant include business registration documents, proof of identity, financial statements, and payment processing history.

  • Business registration documents (e.g. business license, articles of incorporation)

  • Proof of identity for the merchant (e.g. government-issued ID)

  • Financial statements (e.g. bank statements, tax returns)

  • Payment processing history (e.g. previous merchant account statements)

Add your answer

Q115. What does PayPal do?

Ans.

PayPal is an online payment system that allows individuals and businesses to transfer funds electronically.

  • Allows users to make payments and money transfers online

  • Offers a secure and convenient way to pay for goods and services

  • Provides a platform for businesses to accept payments online

  • Offers buyer and seller protection for eligible transactions

  • Can be used to send and receive money internationally

Add your answer

Q116. What is joins? What are the various dml commands!

Ans.

Joins are used to combine rows from two or more tables based on a related column between them. DML commands are used to manipulate data in a database.

  • Joins are used in SQL to retrieve data from multiple tables based on a related column.

  • Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.

  • DML commands include INSERT, UPDATE, DELETE, and SELECT.

  • INSERT is used to add new rows of data into a table.

  • UPDATE is used to modify existing data in a table.

  • DELETE ...read more

Add your answer

Q117. Write code for encryption of the code

Ans.

Encryption of code involves converting plaintext into ciphertext to secure data.

  • Choose a strong encryption algorithm like AES or RSA

  • Generate a key for encryption

  • Encrypt the plaintext using the key and algorithm

  • Store or transmit the ciphertext securely

Add your answer

Q118. Optimal way to find the nth maximum element using a DS

Ans.

Use a max heap to efficiently find the nth maximum element in a data structure.

  • Create a max heap from the given data structure.

  • Pop the root element (maximum element) n times to find the nth maximum element.

  • Time complexity is O(nlogn) for building the max heap and O(nlogn) for finding the nth maximum element.

Add your answer

Q119. detecting loop in linked list

Ans.

Detecting loop in a linked list

  • Use two pointers, one moving one node at a time and the other moving two nodes at a time

  • If there is a loop, the two pointers will eventually meet

  • If any of the pointers reach the end of the list, there is no loop

Add your answer

Q120. What's KYC and what's enhanced due diligence

Ans.

KYC stands for Know Your Customer and is a process of verifying the identity of clients. Enhanced Due Diligence is a more thorough investigation of high-risk clients.

  • KYC is a regulatory requirement for financial institutions to prevent money laundering and terrorist financing

  • It involves collecting and verifying customer information such as name, address, and identification documents

  • EDD is a more in-depth investigation of high-risk clients, such as politically exposed persons ...read more

Add your answer

Q121. What is the difference between c and c++

Ans.

C++ is an extension of C with object-oriented programming features.

  • C++ supports object-oriented programming while C does not.

  • C++ has a richer set of libraries compared to C.

  • C++ allows function overloading while C does not.

  • C++ supports exception handling while C does not.

  • C++ has a more complex syntax compared to C.

  • C++ is backward compatible with C.

  • C++ has a built-in string class while C does not.

Add your answer

Q122. Write a way to handle a situation in SQL without putting join condition

Ans.

Use subqueries to handle a situation in SQL without putting join condition

  • Use subqueries to retrieve data from another table without explicitly joining them

  • Subqueries can be used in SELECT, WHERE, or FROM clauses

  • Example: SELECT * FROM table1 WHERE column1 IN (SELECT column2 FROM table2)

Add your answer

Q123. Explain how bfs works?

Ans.

BFS (Breadth-First Search) is a graph traversal algorithm that explores all the vertices of a graph in breadth-first order.

  • BFS starts at a given vertex and explores all its neighbors before moving to the next level of vertices.

  • It uses a queue data structure to keep track of the vertices to be visited.

  • BFS guarantees that it visits all the vertices of a connected graph.

  • It can be used to find the shortest path between two vertices in an unweighted graph.

Add your answer

Q124. Identifying similar characters in a string

Ans.

Use a hashmap to identify similar characters in a string.

  • Create a hashmap to store character frequencies.

  • Iterate through the string and update the frequencies in the hashmap.

  • Identify characters with the same frequency as similar.

Add your answer
Q125. What are virtual functions?
Ans.

Virtual functions are functions in a base class that are overridden in derived classes to achieve runtime polymorphism.

  • Virtual functions are declared in a base class with the 'virtual' keyword.

  • They are overridden in derived classes using the 'override' keyword.

  • They allow a function to be called based on the runtime type of an object.

  • Virtual functions enable dynamic binding and late binding in C++.

  • Example: virtual void display() = 0; in base class and void display() override {...read more

Add your answer

Q126. Explain the concept or internal working of hash map

Ans.

A hash map is a data structure that stores key-value pairs and uses a hash function to map keys to their corresponding values.

  • Hash map uses a hash function to convert keys into array indices.

  • Collisions can occur when two keys map to the same index, which can be resolved using techniques like chaining or open addressing.

  • Hash maps have constant time complexity for insertion, deletion, and retrieval of key-value pairs.

  • Examples of hash maps include Python's dict, Java's HashMap, ...read more

Add your answer

Q127. How do you make promoter from a detractor?

Add your answer

Q128. How memory allocation is done in c

Ans.

Memory allocation in C is done using functions like malloc, calloc, realloc and free.

  • malloc function is used to allocate a block of memory of specified size

  • calloc function is used to allocate a block of memory and initialize it to zero

  • realloc function is used to change the size of previously allocated memory block

  • free function is used to deallocate the memory previously allocated using malloc, calloc or realloc

  • Memory allocation can also be done statically using arrays or dyna...read more

Add your answer
Q129. What is a virtual function?
Ans.

A virtual function is a function in a base class that is declared using the keyword 'virtual' and can be overridden by a function with the same signature in a derived class.

  • Virtual functions allow for dynamic polymorphism in C++

  • They are used in inheritance to achieve runtime polymorphism

  • Example: virtual void display() = 0; in a base class and void display() override in a derived class

Add your answer

Q130. What is NPS? And what's your current score?

Add your answer

Q131. Any suggestions for Paypal or Ebay website?

Add your answer

Q132. Explain Merge sort

Ans.

Merge sort is a divide-and-conquer algorithm that recursively divides an array into two halves, sorts them, and then merges them.

  • Divide the array into two halves

  • Recursively sort each half

  • Merge the sorted halves back together

  • Repeat until the entire array is sorted

Add your answer

Q133. What is the best complement you got ftom customer

Ans.

The best complement I received from a customer was for my exceptional problem-solving skills and dedication to providing excellent service.

  • Customer praised my quick response and resolution to their issue

  • Customer appreciated my friendly and helpful attitude

  • Customer mentioned my attention to detail and going above and beyond to assist them

Add your answer

Q134. What you know about Paypal products

Ans.

PayPal offers a range of products including payment processing, money transfers, and online shopping tools.

  • PayPal Checkout - allows customers to pay with PayPal, credit card, or debit card

  • PayPal Credit - offers financing options for purchases

  • Venmo - a mobile payment service owned by PayPal

  • PayPal Here - a mobile card reader for in-person payments

  • Xoom - a service for international money transfers

Add your answer

Q135. What is Repeat Rate ?

Ans.

Repeat rate is the percentage of customers who return to make a purchase again.

  • Repeat rate is a metric used to measure customer loyalty.

  • It is calculated by dividing the number of repeat customers by the total number of customers.

  • A high repeat rate indicates that customers are satisfied with the product or service.

  • Repeat rate can be improved by providing excellent customer service and offering incentives for repeat purchases.

Add your answer

Q136. Write a sql query to find nth maximum element

Ans.

SQL query to find nth maximum element

  • Use ORDER BY clause to sort the elements in descending order

  • Use LIMIT to select the nth element

  • Use subquery to exclude the first n-1 elements

Add your answer

Q137. write code for dfs

Ans.

DFS (Depth-First Search) is a graph traversal algorithm that explores as far as possible along each branch before backtracking.

  • DFS uses a stack to keep track of visited nodes and explore adjacent nodes.

  • It can be implemented recursively or iteratively.

  • DFS is useful for solving problems like finding connected components, detecting cycles, and solving mazes.

Add your answer

Q138. LLD and class diagram for Minesweeper game

Ans.

LLD and class diagram for Minesweeper game

  • Create classes for Board, Cell, Game, Player

  • Use composition to represent relationships between classes

  • Implement methods for revealing cells, flagging cells, checking for game over

  • Consider using enums for cell states (covered, uncovered, flagged)

  • Use UML notation to draw class diagram

Add your answer

Q139. How will you manage an argument with TL?

Add your answer

Q140. Design round to design coffee machine

Ans.

Design a coffee machine with various functionalities like brewing different types of coffee, adding milk, and adjusting temperature.

  • Include options for different types of coffee (espresso, latte, cappuccino)

  • Allow users to add milk or cream to their coffee

  • Provide options to adjust the temperature of the coffee

  • Include a water reservoir for brewing coffee

  • Add a display screen for user interaction

Add your answer

Q141. What is customer Service

Ans.

Customer service is the support and assistance provided to customers before, during, and after a purchase.

  • Customer service involves addressing customer needs and concerns

  • It includes providing information about products or services

  • It also involves resolving customer complaints and issues

  • Good customer service can lead to customer loyalty and repeat business

Add your answer

Q142. What do you mean by customer service

Ans.

Customer service refers to the support and assistance provided to customers before, during, and after a purchase.

  • Customer service involves addressing customer inquiries, concerns, and complaints in a timely and professional manner.

  • It includes providing product information, troubleshooting issues, and ensuring customer satisfaction.

  • Examples of customer service activities include answering phone calls, responding to emails, and resolving billing disputes.

  • Customer service also i...read more

Add your answer

Q143. AML process and steps involved in money laundering

Ans.

AML process involves identifying, assessing, and monitoring risks associated with money laundering.

  • Customer Due Diligence (CDD) to verify customer identity and assess risk

  • Transaction Monitoring to detect suspicious activity

  • Reporting suspicious activity to authorities

  • Ongoing monitoring of customer activity

  • Risk-based approach to determine level of due diligence required

  • Training employees on AML policies and procedures

Add your answer

Q144. reverse a linked list in k sizes

Ans.

Reverse a linked list in k sizes

  • Break the linked list into groups of size k

  • Reverse each group individually

  • Connect the reversed groups back together

Add your answer

Q145. Sql query on finding the nth maximum

Ans.

Use a SQL query to find the nth maximum value in a table.

  • Use the ORDER BY clause to sort the values in descending order.

  • Use the LIMIT clause to specify the nth maximum value.

  • For example, to find the 3rd maximum value in a 'numbers' table: SELECT DISTINCT number FROM numbers ORDER BY number DESC LIMIT 2, 1;

Add your answer

Q146. why paypal and why customer support

Ans.

I chose PayPal for its innovative technology and global reach, and customer support because I enjoy helping people and solving problems.

  • PayPal offers cutting-edge technology and has a global presence, making it an exciting company to work for.

  • I am passionate about providing excellent customer service and enjoy helping people resolve their issues.

  • Customer support allows me to use my problem-solving skills and communication abilities to assist customers in a fast-paced environm...read more

Add your answer

Q147. Low level design for Car rental system

Ans.

Design a car rental system at a low level

  • Use object-oriented programming to model cars, customers, rentals, etc.

  • Implement a database to store information about available cars, customer bookings, etc.

  • Include features like booking, returning, and searching for cars

  • Consider implementing a pricing system based on factors like car type, duration of rental, etc.

Add your answer

Q148. Difference between malloc and new

Ans.

malloc is a C function while new is a C++ operator for dynamic memory allocation.

  • malloc allocates memory without initializing it while new initializes memory to zero

  • malloc returns a void pointer while new returns a pointer to the object type

  • malloc can only allocate memory while new can allocate memory and call the constructor

  • malloc can be used in C and C++ while new can only be used in C++

Add your answer

Q149. Insert characters in between string

Ans.

The task is to insert characters in between a given string.

  • Create a function that takes a string and characters to insert

  • Use string concatenation to insert characters at specified positions

  • Return the modified string as an array of strings

Add your answer

Q150. Code for deletion in linked lists

Ans.

Code for deleting a node in a linked list

  • Create a temporary pointer to the node to be deleted

  • Update the next pointer of the previous node to skip the node to be deleted

  • Free the memory allocated to the node to be deleted

Add your answer

Q151. sql qn to get daily count of transactions

Ans.

Use SQL query to get daily count of transactions

  • Use GROUP BY clause with the date column to group transactions by day

  • Use COUNT function to count the number of transactions for each day

  • Order the results by date to get a daily count of transactions

Add your answer

Q152. Projects in CS

Ans.

Projects in computer science involve developing software applications, algorithms, databases, and systems to solve various problems.

  • Developing software applications for specific purposes

  • Creating algorithms to optimize processes or solve complex problems

  • Designing databases to store and manage large amounts of data

  • Building systems to automate tasks or improve efficiency

Add your answer

Q153. Write a pseudo code for Bubble sort

Ans.

Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements, and swaps them if they are in the wrong order.

  • Start with the first element and compare it with the next element, swapping if necessary

  • Repeat this process for each pair of adjacent elements in the array until the entire array is sorted

  • Continue this process for each element in the array until no more swaps are needed

Add your answer

Q154. LRU cache with multi level caching

Ans.

LRU cache with multi level caching involves implementing a cache with multiple levels of storage, where the least recently used items are evicted first.

  • Implement a two-level cache system with a primary cache (e.g. in-memory) and a secondary cache (e.g. disk-based).

  • Use a data structure like a doubly linked list and a hash map to efficiently manage the cache and track the least recently used items.

  • When an item is accessed, move it to the front of the cache to mark it as the mos...read more

Add your answer

Q155. Find loop in linked list

Ans.

To find a loop in a linked list, we use Floyd's cycle-finding algorithm.

  • Floyd's cycle-finding algorithm uses two pointers, one moving at a rate of one node per iteration and the other moving at a rate of two nodes per iteration.

  • If there is a loop in the linked list, the two pointers will eventually meet at some node.

  • To find the starting point of the loop, we reset one of the pointers to the head of the linked list and move both pointers at a rate of one node per iteration unt...read more

Add your answer

Q156. Rotten oranges problem - DS

Ans.

Rotten oranges problem involves finding the minimum time required to rot all oranges in a grid.

  • Use Breadth First Search (BFS) to traverse the grid and update the ripening time of neighboring oranges.

  • Keep track of the fresh oranges and the time taken to rot them all.

  • Handle edge cases like no fresh oranges or unreachable oranges.

Add your answer

Q157. system design for parking lot

Ans.

Design a system for managing a parking lot efficiently.

  • Use a database to store information about available parking spots, vehicles, and payments.

  • Implement a system for tracking entry and exit of vehicles.

  • Include features like online booking, payment options, and real-time availability updates.

  • Consider implementing a ticketing system for managing parking duration and fees.

Add your answer

Q158. react code writing in hacker rank

Ans.

The question involves writing React code in HackerRank.

  • Understand the requirements of the task before starting to write the code.

  • Use React components to create a user interface.

  • Handle state management and user interactions using React hooks.

  • Write clean and efficient code to solve the problem.

  • Test the code thoroughly before submitting.

Add your answer

Q159. Find the expected value of fraud

Ans.

The expected value of fraud can be calculated by multiplying the probability of fraud occurrence with the potential loss from fraud.

  • Calculate the probability of fraud occurrence based on historical data and industry trends

  • Determine the potential loss from fraud by analyzing the impact on revenue, reputation, and legal costs

  • Multiply the probability of fraud occurrence with the potential loss from fraud to get the expected value of fraud

Add your answer

Q160. reverse the LL in k groups

Ans.

Reverse the linked list in groups of k

  • Iterate through the linked list in groups of k

  • Reverse each group of k nodes

  • Connect the reversed groups to form the final linked list

Add your answer

Q161. Design Parking lot with working code.

Ans.

Design a parking lot system with working code.

  • Create classes for ParkingLot, ParkingSpot, Vehicle, etc.

  • Implement methods for parking, unparking, checking availability, etc.

  • Use data structures like arrays, lists, or maps to manage parking spots.

  • Consider different types of vehicles and parking spot sizes.

  • Handle edge cases like full parking lot, invalid inputs, etc.

Add your answer

Q162. Define stack and heap

Ans.

Stack and heap are memory management techniques used in computer programming.

  • Stack is a region of memory where variables are stored and managed in a LIFO (Last-In-First-Out) order.

  • Heap is a region of memory where dynamic memory allocation takes place.

  • Stack memory is limited and fixed in size, while heap memory is larger and can grow dynamically.

  • Stack memory is faster to access than heap memory.

  • Examples of stack variables include function parameters and local variables, while ...read more

Add your answer

Q163. Calculate a/b and c/d then sum

Ans.

Calculate (a/b) + (c/d)

  • Find the values of a, b, c, and d

  • Divide a by b and c by d

  • Add the results of the two divisions

Add your answer

Q164. System design of circuit breaker

Ans.

The system design of a circuit breaker involves determining the appropriate rating, type, and coordination with other protective devices.

  • Consider the voltage and current ratings to select the appropriate circuit breaker

  • Choose between thermal-magnetic, magnetic, or electronic trip units based on the application

  • Ensure proper coordination with upstream and downstream protective devices to prevent nuisance tripping

  • Factor in environmental conditions and maintenance requirements wh...read more

Add your answer

Q165. What is an API

Ans.

An API (Application Programming Interface) is a set of rules and protocols that allows different software applications to communicate with each other.

  • APIs define the methods for requesting and receiving data between software applications

  • APIs can be used to access data from external sources, such as social media platforms or weather services

  • Examples of APIs include the Twitter API, Google Maps API, and Spotify API

Add your answer

Q166. Java program on all data structures

Ans.

Java program on all data structures

  • Start by implementing basic data structures like arrays, linked lists, stacks, queues, trees, and graphs

  • Use Java built-in classes like ArrayList, LinkedList, Stack, Queue, TreeMap, and HashMap

  • Practice implementing algorithms like sorting, searching, and traversal on these data structures

Add your answer

Q167. What is Money laundering

Ans.

Money laundering is the illegal process of making large amounts of money generated by a criminal activity, such as drug trafficking or terrorist funding, appear to have come from a legitimate source.

  • Money laundering involves disguising the origins of illegally obtained money.

  • It typically involves a series of transactions to make the money appear legitimate.

  • Money launderers often use complex financial transactions and shell companies to hide the source of the funds.

  • Examples of...read more

Add your answer

Q168. Explain GC collector in Java

Ans.

GC collector in Java is responsible for managing memory by reclaiming unused objects and freeing up memory space.

  • GC stands for Garbage Collector

  • Automatically manages memory by reclaiming unused objects

  • Prevents memory leaks and optimizes memory usage

  • Different types of GC algorithms like Serial, Parallel, CMS, G1

  • Example: System.gc() can be used to suggest garbage collection

Add your answer

Q169. Knn algorithm using python

Ans.

KNN algorithm is a simple and effective machine learning algorithm for classification and regression tasks.

  • KNN stands for K-Nearest Neighbors.

  • It is a non-parametric, lazy learning algorithm.

  • Works by finding the K closest training examples in feature space to a given input data point.

  • Classification: Assign the most common class among the K nearest neighbors.

  • Regression: Take the average of the K nearest neighbors' target values.

  • Python libraries like scikit-learn provide impleme...read more

Add your answer

Q170. Design google search

Ans.

Design a search engine similar to Google

  • Use web crawling to index websites

  • Implement a ranking algorithm like PageRank

  • Include features like autocomplete, spell check, and search suggestions

  • Utilize machine learning for personalized search results

Add your answer

Q171. HLD for rental property website

Ans.

High-level design for a rental property website

  • Use case analysis to identify key functionalities such as property listing, search, booking, payment

  • Design a user-friendly interface with filters, maps, and photos for property listings

  • Implement a secure payment gateway for online transactions

  • Utilize a database to store property details, user information, and booking history

Add your answer

Q172. System design problems

Ans.

System design problems involve designing scalable and efficient software systems.

  • Identify the requirements and constraints of the system

  • Break down the system into smaller components

  • Consider scalability, reliability, and performance

  • Use appropriate data structures and algorithms

  • Design for fault tolerance and load balancing

Add your answer

Q173. what are the metrics

Add your answer

Q174. design notification service.

Ans.

Design a notification service for sending alerts to users.

  • Use a scalable messaging system like Kafka or RabbitMQ for handling notifications.

  • Implement different types of notifications such as email, SMS, push notifications.

  • Allow users to customize their notification preferences and frequency.

  • Include features like scheduling notifications and tracking delivery status.

  • Ensure security measures are in place to protect user data and prevent spamming.

Add your answer

Q175. Implement array list

Ans.

Implementing an array list of strings

  • Create a class to represent the array list

  • Include methods to add, remove, and access elements in the array list

  • Use an underlying array to store the elements

  • Ensure the array list dynamically resizes when needed

Add your answer

Q176. PMBOK definitions

Add your answer

Q177. Sorting algorithm

Ans.

Sorting algorithms are used to arrange elements in a specific order.

  • Sorting algorithms can be categorized as comparison-based or non-comparison-based.

  • Examples of sorting algorithms include Bubble Sort, Merge Sort, and Quick Sort.

  • Efficiency of sorting algorithms is measured in terms of time complexity and space complexity.

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Kellogg Brown and Root

based on 139 interviews
Interview experience
4.2
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.1
 • 278 Interview Questions
4.2
 • 239 Interview Questions
3.7
 • 214 Interview Questions
3.1
 • 173 Interview Questions
4.2
 • 142 Interview Questions
4.3
 • 138 Interview Questions
View all
Top PayPal Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter