i
PubMatic
Filter interviews by
Clear (1)
I applied via LinkedIn and was interviewed in Feb 2024. There were 2 interview rounds.
The longest path from one node to another in a tree is the maximum number of edges that must be traversed to reach from one node to another.
The longest path in a tree is also known as the diameter of the tree.
The diameter of a tree can be found by first finding the farthest leaf node from any arbitrary node, and then finding the farthest leaf node from that leaf node.
The sum of the distances from the root to the farthe...
Top trending discussions
Leetcode easy-medium
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Cyber security involves implementing measures to prevent unauthorized access, data breaches, and other cyber threats.
It includes technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
Examples of cyber security measures include firewalls, ant...
Types of encryption include symmetric encryption, asymmetric encryption, and hashing.
Symmetric encryption: Uses the same key for both encryption and decryption, examples include AES and DES.
Asymmetric encryption: Uses a pair of public and private keys for encryption and decryption, examples include RSA and ECC.
Hashing: Converts data into a fixed-size string of bytes, examples include MD5 and SHA.
I applied via Campus Placement
posted on 11 Jan 2024
Test was quiet easy and got selected after making 1 question wrong
posted on 16 Apr 2024
I applied via Naukri.com and was interviewed before Apr 2023. There were 2 interview rounds.
Manual testing is the process of manually testing software for defects, errors, and bugs.
Manual testing involves testers executing test cases without the use of automation tools.
Testers follow predefined test cases to ensure the software functions correctly.
Manual testing is time-consuming but allows for human intuition and creativity in finding bugs.
Examples of manual testing include exploratory testing, ad-hoc testin
Black box testing focuses on testing the functionality of a software without knowing its internal code, while white box testing involves testing the internal code structure.
Black box testing is based on external expectations and specifications
White box testing is based on internal code structure and logic
Black box testing is also known as functional testing
White box testing is also known as structural testing
Example: I...
Severity and priority are used to classify the importance and urgency of issues in software development.
Severity refers to the impact of an issue on the system or business.
Priority refers to the urgency of fixing an issue.
Severity is usually categorized as low, medium, or high.
Priority is usually categorized as low, medium, or high.
For example, a critical bug that causes the system to crash would have high severity and
Writing test cases for software engineer position
Test case for login functionality: verify valid credentials login successfully, verify invalid credentials show error message
Test case for search functionality: verify search results display correctly, verify no results message shown for invalid search
Test case for checkout process: verify items added to cart correctly, verify payment process completes successfully
QA stands for Quality Assurance and involves the process of ensuring quality in software development. QC stands for Quality Control and involves the process of verifying quality in the final product.
QA focuses on preventing defects in the software development process
QC focuses on identifying defects in the final product
QA involves processes like code reviews, unit testing, and continuous integration
QC involves processe...
Defect cascading is when a defect in one part of the software causes defects in other parts.
Occurs when a defect in one module goes undetected and affects other modules
Can lead to a chain reaction of defects throughout the software
Often results from poor testing practices or lack of communication among team members
Defect seeding is the intentional introduction of defects into a software system to evaluate the effectiveness of testing processes.
Defect seeding helps in identifying weaknesses in the testing process
Common techniques include adding bugs to the codebase or injecting faults into the system
It is used to measure the thoroughness and efficiency of testing
Defect life cycle is the process of identifying, reporting, fixing, retesting, and closing software bugs.
Defect identification: Bugs are found during testing or by users.
Defect reporting: Bugs are documented in a bug tracking system.
Defect fixing: Developers address and resolve the reported bugs.
Defect retesting: Testers verify that the bug is fixed.
Defect closing: Once verified, the bug is marked as closed.
posted on 31 Aug 2024
I applied via Campus Placement
Networking,Operating system,Dsa,DBMS
posted on 24 Dec 2023
I applied via Referral and was interviewed in Nov 2023. There were 4 interview rounds.
posted on 27 Jan 2025
Easy interview and designs pattern
Use a sorting algorithm to find the kth element in a string array.
Sort the array of strings using a sorting algorithm like quicksort or mergesort.
Return the kth element from the sorted array.
I applied via LinkedIn
Some of the top questions asked at the PubMatic Principal Engineer interview -
based on 1 interview
Interview experience
Softwaretest Engineer
102
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
80
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
72
salaries
| ₹0 L/yr - ₹0 L/yr |
Principal Software Engineer
47
salaries
| ₹0 L/yr - ₹0 L/yr |
QA Engineer
27
salaries
| ₹0 L/yr - ₹0 L/yr |
InMobi
Komli Media
Adcolony
Affle