Filter interviews by
Maths,quant for 1 hour duration
Arrays, strings, linked list, palindrome
I applied via Approached by company and was interviewed in Dec 2021. There were 4 interview rounds.
2 questions. 1 was basic level. 2 was of medium level.
Find first missing positive number in an array in O(n) time and O(1) space.
Traverse the array and mark the presence of each positive integer by changing the sign of the corresponding index.
Traverse the array again and return the index of the first positive integer.
If all integers are present, return the length of the array + 1.
Example: [3, 4, -1, 1] => mark 3rd and 4th index as negative => return 2.
Example: [1, 2, 0] =...
Given an integer, print the relevant column name in an excel sheet.
Create a string array of alphabets from A to Z
Use modulo operator to get remainder and divide by 26 to get quotient
Append the corresponding alphabet to the result string
Reverse the result string
I applied via Naukri.com and was interviewed before Jun 2021. There were 2 interview rounds.
Hacker rank long coding questions with questions for python,c++,javascript , data bast related questions
I applied via Company Website
Exam to test reasoning and aptitude, and speed to answer them
Dsa question easy to medium level
Print pyramid from Fibonacci sequence
Generate Fibonacci sequence up to a certain number
Use the Fibonacci numbers to create the pyramid structure
Print each row of the pyramid with appropriate spacing
Design SQL tables for library management system
Create tables for books, authors, members, transactions, etc.
Use primary and foreign keys to establish relationships between tables
Include columns like book title, author name, member ID, due date, etc.
I applied via Campus Placement and was interviewed before Jun 2023. There were 2 interview rounds.
Java , Spring, SQL questions asked without one data structure basic live coding question
It consist of 4 DSA ques and few quiz and opps concept based ques
1st was string based Medium level ques.
2nd was a ques based on 2 pointer
And other 2 was from Vector and Linked list easy ques
Print natural numbers in spiral form using a 2D array.
Create a 2D array with dimensions n x n.
Initialize variables for row and column boundaries.
Iterate through the array in a spiral pattern, filling in natural numbers.
I applied via LinkedIn and was interviewed in Apr 2023. There were 3 interview rounds.
Use Depth First Search (DFS) to find connected components in a graph
Start by initializing all vertices as unvisited
Iterate through each vertex and perform DFS to find connected components
Keep track of visited vertices to avoid revisiting
Example: For a graph with vertices {A, B, C} and edges {(A, B), (B, C)}, the connected components are {A, B, C}
Design a chess game with proper board setup, piece movements, and win conditions.
Create a 8x8 grid to represent the chess board
Assign initial positions to each type of chess piece (pawn, rook, knight, bishop, queen, king)
Implement rules for each piece's movement (e.g. pawn moves forward, rook moves horizontally/vertically)
Check for valid moves and capture opponent's pieces
Implement win conditions (checkmate, stalemate)
...
I appeared for an interview in Jun 2017.
Ajax calls allow for asynchronous communication between client and server without reloading the page.
Ajax stands for Asynchronous JavaScript and XML
Uses XMLHttpRequest object to send and receive data
Allows for partial page updates without reloading the entire page
Can handle data in various formats such as JSON, XML, HTML, and plain text
Example: $.ajax({url: 'example.com', success: function(data){console.log(data)}});
REST is lightweight and uses HTTP while SOAP is XML-based and has more features.
REST uses HTTP methods like GET, POST, PUT, DELETE while SOAP uses XML messaging.
REST is stateless while SOAP can maintain state.
REST is faster and easier to use while SOAP is more secure and reliable.
REST is used for web services while SOAP is used for enterprise-level services.
Example of REST: Twitter API. Example of SOAP: Amazon Web Serv
GET and POST are HTTP methods used for sending data to a server.
GET is used to retrieve data from a server
POST is used to submit data to a server
GET requests can be cached and bookmarked
POST requests are not cached and cannot be bookmarked
GET requests have length restrictions
POST requests have no length restrictions
GET requests are less secure than POST requests
Observer pattern is a design pattern in which an object maintains a list of its dependents and notifies them automatically of any state changes.
Also known as publish-subscribe pattern
Used in event-driven systems
Allows loose coupling between objects
Example: A weather station broadcasts weather updates to multiple displays
Example: A stock market ticker notifies multiple investors of stock price changes
Singleton is a design pattern that restricts the instantiation of a class to a single object.
Singleton ensures that only one instance of a class exists in the entire application.
It provides a global point of access to the instance.
Commonly used in scenarios where a single instance needs to coordinate actions across the system.
Example: Database connection manager, logger, configuration manager.
Immutable in Java refers to objects whose state cannot be changed after creation.
String, Integer, and other wrapper classes are immutable in Java.
Immutable objects are thread-safe and can be shared without synchronization.
To create an immutable class, make all fields final and private, and don't provide setters.
Examples of immutable classes in Java include LocalDate, LocalTime, and LocalDateTime.
Creating immutable in Java
Use final keyword to make variables immutable
Use private constructor to prevent object modification
Use defensive copying to prevent modification of mutable objects
Use enum to create immutable objects
Use String class to create immutable strings
Dependency injection is a design pattern that allows objects to receive dependencies rather than creating them internally.
It helps to decouple the code and makes it more testable and maintainable.
It allows for easier swapping of dependencies without changing the code.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Example: Instead of creating a database co...
CORS stands for Cross-Origin Resource Sharing. It is a security feature implemented in web browsers to restrict access to resources from different origins.
CORS allows web servers to specify which origins are allowed to access its resources
It is implemented using HTTP headers
CORS prevents malicious websites from accessing sensitive data from other websites
Examples of resources that may be restricted by CORS include cook
CORS can be overcome by configuring the server to allow cross-origin requests.
Configure the server to include the Access-Control-Allow-Origin header
Use JSONP (JSON with Padding) to bypass CORS restrictions
Use a proxy server to make the request on behalf of the client
Use a browser extension to disable CORS restrictions during development
Use a server-side proxy to forward requests to the target server
Some of the top questions asked at the Paytm Money Software Engineer interview -
based on 1 interview
Interview experience
based on 9 reviews
Rating in categories
Senior Associate
68
salaries
| ₹3 L/yr - ₹7 L/yr |
Senior Software Engineer
67
salaries
| ₹11 L/yr - ₹33 L/yr |
Software Engineer
54
salaries
| ₹8.4 L/yr - ₹18 L/yr |
Team Lead
46
salaries
| ₹2.5 L/yr - ₹10 L/yr |
Associate
30
salaries
| ₹1 L/yr - ₹5 L/yr |
HighRadius
Angel One
AGS Transact Technologies
Rupeek