Filter interviews by
posted on 22 Feb 2022
Top trending discussions
The first round was a coding test, which was outsourced to an external vendor. I was asked 2 basic DSA questions, and there was discussions around the time and space complexity, and scope of optimizing the solutions. Post that there were a few questions around Spring Boot features and basic system design. The interviewer was professional throughout the interview, and the interview process felt more like a discussion, as compared to the standard interview process.
There was another round of coding - this time conducted by the organization itself. It consisted of a medium level DSA question on stacks. I wrote the code on my personal IDE and executed it there itself. The interviewer discussed about the possible edge cases and how I would deal with them. Post solving the question I was asked about my previous projects.
This was the final round where the discussion was largely around system design and HLD. It started off with questions are system design patterns and concepts. Then I was asked to design a booking design, with discussions around concurrency control and transaction management.
React is a modern JavaScript library for building user interfaces, while jQuery is a fast and concise JavaScript library for DOM manipulation.
React is component-based, promoting reusability and modularity.
React uses a virtual DOM for efficient updates, while jQuery directly manipulates the DOM.
React is declarative, making it easier to reason about the UI, while jQuery is imperative.
React is typically used for single-pa...
I applied via Company Website and was interviewed in Oct 2024. There was 1 interview round.
Asked to write a bank application - which includes adding,removing,transferring of money
posted on 19 Dec 2024
posted on 14 Apr 2024
I applied via Naukri.com and was interviewed in Mar 2024. There were 3 interview rounds.
Technical Aptitude on singalton pattern
A man-in-the-middle attack is a cyber security attack where the attacker secretly intercepts and possibly alters the communication between two parties.
Attacker intercepts communication between two parties
Attacker may alter the communication
Commonly occurs in public Wi-Fi networks
Can lead to data theft or unauthorized access
Protecting API involves using authentication, authorization, encryption, rate limiting, and monitoring.
Implement authentication mechanisms such as OAuth, JWT, or API keys
Use authorization to control access to different parts of the API
Encrypt sensitive data using SSL/TLS
Implement rate limiting to prevent abuse and protect against DDoS attacks
Monitor API traffic for unusual activity and potential security threats
CSRF stands for Cross-Site Request Forgery, a type of attack where a malicious website tricks a user into performing actions on another website without their knowledge.
CSRF attacks exploit the trust that a site has in a user's browser, by sending unauthorized requests using the user's session.
Prevent CSRF attacks by using tokens in forms, checking the origin of requests, and implementing proper authentication and autho...
I applied via Company Website and was interviewed in Sep 2024. There were 2 interview rounds.
First round is apti when in placement
Too hard all are dsa questions
posted on 26 Mar 2024
I applied via Referral and was interviewed in Feb 2024. There were 2 interview rounds.
Coding and aptitude round
I applied via Campus Placement
Asked about data interpretation and all these.
Coding test is based on DSA mainly.
Software Developer
63
salaries
| ₹2 L/yr - ₹10 L/yr |
Software Engineer
11
salaries
| ₹3.2 L/yr - ₹8.2 L/yr |
Senior Associate
11
salaries
| ₹4.1 L/yr - ₹9 L/yr |
Associate Software Engineer
10
salaries
| ₹3.5 L/yr - ₹5.8 L/yr |
Software Tester
10
salaries
| ₹2.2 L/yr - ₹5.3 L/yr |
Sequoia Capital
Nexus Venture Partners
Matrix Partners
Kalaari Capital