i
PubMatic
Filter interviews by
Clear (1)
I applied via Naukri.com and was interviewed in Oct 2024. There were 2 interview rounds.
Fluent wait in Selenium is used for handling dynamic elements and synchronization issues.
Fluent wait is used to wait for a condition to be true before proceeding with the next steps in Selenium automation scripts.
It provides more flexibility in defining wait conditions compared to implicit or explicit waits.
Fluent wait can be used to wait for a specific element to be visible, clickable, or any other custom condition.
It...
To get all the links available on a page, you can use web scraping techniques.
Use a web scraping tool like BeautifulSoup in Python or Selenium to extract all the links from the page
Identify the HTML elements that contain the links, such as tags with href attributes
Iterate through the elements to extract the URLs and store them in a list
Top trending discussions
I applied via Campus Placement and was interviewed in Apr 2024. There were 3 interview rounds.
Two coding questions along with the mcqs related to Computer networks, database management systems and aptitude was asked.
Code for nested dictionary
Use curly braces to define the outer dictionary
Use square brackets to define the inner dictionaries
Access values using keys
Code to check if a string meets password requirements using built-in Java functions.
Use String class methods like length(), contains(), matches() to check for password requirements.
Use regular expressions to validate password requirements such as minimum length, uppercase, lowercase, digits, special characters.
Example: String password = "Pass123!"; boolean isValid = password.length() >= 8 && password.matches(".*[A-Z].*...
Leetcode easy-medium
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Cyber security involves implementing measures to prevent unauthorized access, data breaches, and other cyber threats.
It includes technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
Examples of cyber security measures include firewalls, ant...
Types of encryption include symmetric encryption, asymmetric encryption, and hashing.
Symmetric encryption: Uses the same key for both encryption and decryption, examples include AES and DES.
Asymmetric encryption: Uses a pair of public and private keys for encryption and decryption, examples include RSA and ECC.
Hashing: Converts data into a fixed-size string of bytes, examples include MD5 and SHA.
I applied via Campus Placement
posted on 11 Jan 2024
Test was quiet easy and got selected after making 1 question wrong
posted on 16 Apr 2024
I applied via Naukri.com and was interviewed before Apr 2023. There were 2 interview rounds.
Manual testing is the process of manually testing software for defects, errors, and bugs.
Manual testing involves testers executing test cases without the use of automation tools.
Testers follow predefined test cases to ensure the software functions correctly.
Manual testing is time-consuming but allows for human intuition and creativity in finding bugs.
Examples of manual testing include exploratory testing, ad-hoc testin
Black box testing focuses on testing the functionality of a software without knowing its internal code, while white box testing involves testing the internal code structure.
Black box testing is based on external expectations and specifications
White box testing is based on internal code structure and logic
Black box testing is also known as functional testing
White box testing is also known as structural testing
Example: I...
Severity and priority are used to classify the importance and urgency of issues in software development.
Severity refers to the impact of an issue on the system or business.
Priority refers to the urgency of fixing an issue.
Severity is usually categorized as low, medium, or high.
Priority is usually categorized as low, medium, or high.
For example, a critical bug that causes the system to crash would have high severity and
Writing test cases for software engineer position
Test case for login functionality: verify valid credentials login successfully, verify invalid credentials show error message
Test case for search functionality: verify search results display correctly, verify no results message shown for invalid search
Test case for checkout process: verify items added to cart correctly, verify payment process completes successfully
QA stands for Quality Assurance and involves the process of ensuring quality in software development. QC stands for Quality Control and involves the process of verifying quality in the final product.
QA focuses on preventing defects in the software development process
QC focuses on identifying defects in the final product
QA involves processes like code reviews, unit testing, and continuous integration
QC involves processe...
Defect cascading is when a defect in one part of the software causes defects in other parts.
Occurs when a defect in one module goes undetected and affects other modules
Can lead to a chain reaction of defects throughout the software
Often results from poor testing practices or lack of communication among team members
Defect seeding is the intentional introduction of defects into a software system to evaluate the effectiveness of testing processes.
Defect seeding helps in identifying weaknesses in the testing process
Common techniques include adding bugs to the codebase or injecting faults into the system
It is used to measure the thoroughness and efficiency of testing
Defect life cycle is the process of identifying, reporting, fixing, retesting, and closing software bugs.
Defect identification: Bugs are found during testing or by users.
Defect reporting: Bugs are documented in a bug tracking system.
Defect fixing: Developers address and resolve the reported bugs.
Defect retesting: Testers verify that the bug is fixed.
Defect closing: Once verified, the bug is marked as closed.
posted on 31 Aug 2024
I applied via Campus Placement
Networking,Operating system,Dsa,DBMS
posted on 24 Dec 2023
I applied via Referral and was interviewed in Nov 2023. There were 4 interview rounds.
posted on 27 Jan 2025
Easy interview and designs pattern
Use a sorting algorithm to find the kth element in a string array.
Sort the array of strings using a sorting algorithm like quicksort or mergesort.
Return the kth element from the sorted array.
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Softwaretest Engineer
102
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
80
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
72
salaries
| ₹0 L/yr - ₹0 L/yr |
Principal Software Engineer
47
salaries
| ₹0 L/yr - ₹0 L/yr |
QA Engineer
27
salaries
| ₹0 L/yr - ₹0 L/yr |
InMobi
Komli Media
Adcolony
Affle