Filter interviews by
Be the first one to contribute and help others!
posted on 2 Feb 2025
I applied via Company Website and was interviewed in Nov 2024. There were 13 interview rounds.
The Entity-Relationship (ER) model is a data model used to describe the relationships between entities in a database.
Entities are objects or concepts in the real world that can be distinguished from each other.
Relationships describe how entities are related to each other.
Attributes are properties that describe entities and relationships.
ER diagrams visually represent the ER model, showing entities, relationships, and a...
Threads are lighter weight than processes, share memory space, and are more efficient for multitasking.
Threads share the same memory space, making communication between them faster and more efficient.
Threads are lighter weight than processes, as they share resources such as memory and file descriptors.
Threads are more efficient for multitasking, as they can run concurrently within the same process.
Threads are easier to...
Google primarily focuses on pure data structures and algorithms-based questions during coding interviews. Other computer science core topics are typically not covered in Google's interviews. Therefore, it is essential to be proficient in data structures and algorithms to succeed in the Google coding interview.
An aptitude test is a tool used to evaluate a person's skills, abilities, and potential for success in a specific role or activity.
Group discussion is a process of exchanging ideas and opinions among individuals on a specific topic. It is a structured form of communication in which participants have the opportunity to express their views while also listening to others' perspectives on the same subject.
My strengths include problem-solving skills and attention to detail. My weaknesses include time management and public speaking.
Strengths: problem-solving skills
Strengths: attention to detail
Weaknesses: time management
Weaknesses: public speaking
I have a strong foundation in web development, a passion for learning, and a proven track record of delivering high-quality projects.
I have a solid understanding of HTML, CSS, and JavaScript
I am proficient in using various web development tools and frameworks such as React and Node.js
I have successfully completed several web development projects, including a responsive e-commerce website for a local business
An assignment is a task or piece of work that you are given to complete, particularly as part of your job or studies. The assignment for the course includes written assignments and practical tests, similar to tasks, work, jobs, or charges.
A case study is a detailed description and assessment of a specific situation in the real world, created for the purpose of deriving generalized insights and understanding. It can focus on an individual, a group of people, an organization, or an event, among other subjects.
My greatest accomplishment was successfully leading a team to launch a new website for a major client ahead of schedule.
Successfully led a team to launch a new website
Completed the project ahead of schedule
Received positive feedback from the client
I am motivated by challenges, learning opportunities, and the ability to make a positive impact.
Challenges push me to grow and improve my skills.
Learning opportunities allow me to stay updated with the latest technologies and trends.
Making a positive impact through my work gives me a sense of fulfillment and purpose.
My ideal work environment is a collaborative space with supportive colleagues, opportunities for growth, and a healthy work-life balance.
Collaborative team environment where ideas are shared and valued
Supportive colleagues who are willing to help and provide feedback
Opportunities for growth and learning new technologies
Healthy work-life balance with flexible hours and remote work options
By creating a positive work environment, offering growth opportunities, and implementing employee recognition programs.
Creating a positive work environment through open communication and support
Offering growth opportunities such as training programs and career advancement
Implementing employee recognition programs to acknowledge and reward hard work
Providing competitive salaries and benefits to attract and retain top ta
Real-time operating systems are designed to provide predictable response times and prioritize tasks based on timing constraints.
Real-time operating systems prioritize tasks based on timing constraints
They are designed to provide predictable response times
Examples include VxWorks, QNX, and FreeRTOS
Yes, I am comfortable working night shifts to support international clients.
I have previous experience working night shifts in a customer service role.
I am a night owl and tend to be more productive during late hours.
I understand the importance of supporting international clients and am willing to adjust my schedule accordingly.
Operational tasks for maintaining efficiency and quality include regular testing, monitoring performance, updating software, and implementing best practices.
Regularly test website functionality to ensure it is working properly
Monitor website performance metrics such as load times and user experience
Update software and plugins to the latest versions to prevent security vulnerabilities
Implement best practices for coding,
Prepare examples showcasing leadership, conflict resolution, and prioritization skills for a managerial round interview.
Leadership: Discuss a project where you led a team to success, highlighting your ability to motivate and guide others.
Conflict Resolution: Share a situation where you successfully resolved a conflict within a team or project, emphasizing your communication and problem-solving skills.
Prioritization: Ta...
I demonstrate adaptability, leadership, and commitment by actively seeking feedback, taking on new challenges, and fostering collaboration within the team.
Seek feedback from colleagues and supervisors to continuously improve
Volunteer for new projects or tasks to expand skills and knowledge
Encourage open communication and teamwork among team members
Lead by example by showing a positive attitude and willingness to help o...
For example, a ₹10 LPA CTC could mean an in-hand salary of ₹70,000–₹75,000 per month, depending on deductions and benefits.
✨ 𝗣𝗿𝗼 𝗧𝗶𝗽: Always request a detailed salary structure during negotiations—it’s your roadmap to making informed decisions
𝗖𝗧𝗖 𝘃𝘀 𝗜𝗻-𝗛𝗮𝗻𝗱 𝗦𝗮𝗹𝗮𝗿𝘆: 𝗧𝗵𝗲 𝗥𝗲𝗮𝗹𝗶𝘁𝘆 𝗖𝗵𝗲𝗰𝗸 𝗘𝘃𝗲𝗿𝘆 𝗣𝗿𝗼𝗳𝗲𝘀𝘀𝗶𝗼𝗻𝗮𝗹 𝗡𝗲𝗲𝗱𝘀!
We’ve all been there—excitedly discussing job offers and hearing about the impressive CTC (Cost to Company). But when payday arrives, you wonder
posted on 23 Jan 2025
I was interviewed in Dec 2024.
I was interviewed in Dec 2024.
API Gateway implementation is a centralized service that routes, manages, and secures API calls.
API Gateway acts as a single entry point for all API calls
It can handle authentication, rate limiting, caching, and request/response transformations
Examples include AWS API Gateway, Apigee, Kong
Circuit breaker is a design pattern used to prevent system overload by temporarily stopping requests to a failing service.
Circuit breaker monitors requests to a service and opens when the service fails repeatedly.
It helps prevent cascading failures and allows the system to gracefully degrade.
Once the circuit breaker is open, it can periodically check if the service has recovered before allowing requests again.
Deadlock is a situation in which two or more processes are unable to proceed because each is waiting for the other to release a resource.
Avoid circular wait by ensuring processes request resources in the same order.
Prevent hold and wait by requiring processes to request all needed resources at once.
Implement a timeout mechanism to break potential deadlocks.
Use resource allocation graphs to detect and prevent deadlocks.
...
The equals() method is used to compare the contents of two objects for equality.
The equals() method is a method of the Object class in Java.
It is used to compare the contents of two objects for equality.
The default implementation of equals() in the Object class compares memory addresses, so it is often overridden in custom classes to compare content.
Example: String class overrides equals() method to compare the content
MongoDB was integrated in the application by using the official Java driver and configuring connection settings.
Used the official MongoDB Java driver to interact with the database
Configured connection settings such as host, port, database name, and authentication credentials
Implemented CRUD operations using MongoDB Java driver methods
Utilized MongoDB aggregation framework for complex queries
Hibernate is an open-source Java framework that simplifies the development of database interactions in Java applications.
Hibernate is an Object-Relational Mapping (ORM) tool that maps Java objects to database tables.
It provides a way to perform database operations using Java objects instead of writing SQL queries.
Hibernate handles the mapping of Java classes to database tables and vice versa, as well as the generation ...
Runnable is a functional interface with a single run() method, while Callable is a functional interface with a single call() method.
Runnable is used for tasks that do not return a result, while Callable is used for tasks that return a result.
Callable can throw checked exceptions, while Runnable cannot.
Callable returns a Future object, which can be used to retrieve the result of the computation.
Example: Runnable - execu...
The Callable interface in Java returns a Future object.
Callable interface returns a Future object which represents the result of a computation that may not be available yet.
The Future object can be used to retrieve the result of the computation, check if it is done, or cancel the computation.
Example: Callable<Integer> task = () -> { return 42; }
Monitor application health using metrics, logs, alerts, and performance monitoring tools.
Use monitoring tools like Prometheus, Grafana, or New Relic to track key metrics such as CPU usage, memory usage, response times, and error rates.
Implement logging to record important events and errors in your application. Use tools like ELK stack (Elasticsearch, Logstash, Kibana) for log analysis.
Set up alerts to notify you of any...
To call an API in a Microservice architecture, use HTTP requests or messaging protocols like gRPC.
Use HTTP requests to communicate between microservices
Implement RESTful APIs for easy integration
Leverage messaging protocols like gRPC for efficient communication
Consider using service discovery mechanisms for dynamic API calls
Profiles in Java are configurations that define the capabilities of a Java platform.
Profiles allow developers to target specific types of devices or applications.
They help in reducing the size of the Java runtime environment by including only the necessary APIs.
Examples include Java SE Embedded Profile for embedded devices and Java SE Compact Profile for resource-constrained environments.
OpenFeign is a declarative web service client used to simplify the process of making HTTP requests in microservices architecture.
OpenFeign allows developers to define RESTful web services as interfaces and automatically generate the necessary implementation code.
It integrates seamlessly with Spring Cloud and other microservices frameworks to facilitate communication between services.
OpenFeign supports features like loa...
Service registry and discovery involves registering services and allowing clients to discover and connect to them.
Implement a service registry where services can register themselves with metadata
Use a service discovery mechanism for clients to find and connect to services
Implement health checks to ensure services are available and healthy
Use a load balancer to distribute traffic among multiple instances of a service
Spring Boot Actuators are built-in tools that provide insight into the running application.
Actuators expose various endpoints to monitor and manage the application.
They can be used to check health, metrics, environment details, and more.
Examples include /actuator/health, /actuator/metrics, and /actuator/env.
Synchronous communication is blocking, while asynchronous communication is non-blocking.
Synchronous communication waits for a response before continuing, while asynchronous communication does not wait.
Examples of synchronous communication include traditional function calls, while examples of asynchronous communication include callbacks and promises.
Synchronous communication can lead to performance issues if there are d...
Synchronized keyword is used in Java to control access to shared resources by multiple threads.
Synchronized keyword can be applied to methods or code blocks to ensure only one thread can access the synchronized code at a time.
It prevents race conditions and ensures thread safety by creating a lock on the object or class.
Example: synchronized void myMethod() { // synchronized code block }
Excessive use of synchronized blocks and methods in Java can lead to performance issues and potential deadlocks.
Decreased performance due to increased contention for locks
Potential deadlocks if multiple threads are waiting for each other to release locks
Increased complexity and difficulty in debugging and maintaining code
Use synchronized sparingly and consider alternatives like ConcurrentHashMap or Lock interface
The number of threads needed for an application can be determined based on factors like the type of tasks, hardware resources, and performance requirements.
Consider the type of tasks your application needs to perform - CPU-bound tasks may benefit from more threads, while I/O-bound tasks may not.
Take into account the hardware resources available - more threads may be beneficial on a multi-core processor compared to a si...
Executor framework is a framework in Java that provides a way to manage and execute tasks asynchronously.
Allows for managing thread execution in a more efficient way
Provides a way to decouple task submission from task execution
Supports various types of executors like ThreadPoolExecutor and ScheduledExecutorService
Helps in handling tasks concurrently and asynchronously
BlockingQueue is an interface in Java that represents a queue which supports operations that wait for the queue to become non-empty when retrieving an element and wait for space to become available in the queue when adding an element.
BlockingQueue is part of the java.util.concurrent package.
It is used for implementing producer-consumer scenarios where multiple threads are involved.
Methods like put() and take() are used...
Seeking new challenges and opportunities for growth.
Desire for career advancement
Looking for new challenges
Seeking better work-life balance
Company restructuring or downsizing
Relocation to a new area
posted on 18 Dec 2024
I applied via Naukri.com and was interviewed in Dec 2024. There were 2 interview rounds.
Split horizon is a technique used in computer networking to prevent routing loops by not advertising routes back to the same interface they were learned from.
Split horizon is used in distance-vector routing protocols like RIP to prevent routing loops.
It works by not advertising routes back to the same interface they were learned from.
Split horizon with poison reverse takes this a step further by advertising the route w...
BGP stands for Border Gateway Protocol, used to exchange routing information between different networks.
BGP is an exterior gateway protocol used to make routing decisions on the internet.
It operates by exchanging routing information between different autonomous systems (AS).
BGP uses TCP port 179 for communication.
BGP routers maintain a table of IP prefixes and their paths to reach them.
BGP can be configured to influenc...
There are two types of BGP: eBGP and iBGP. eBGP has an AD value of 20, while iBGP has an AD value of 200.
eBGP (External BGP) - AD value: 20
iBGP (Internal BGP) - AD value: 200
Routing protocol is a set of rules used by routers to determine the best path for data packets to travel.
Routing protocols help routers communicate with each other to dynamically update routing tables.
Types of routing protocols include distance-vector (e.g. RIP), link-state (e.g. OSPF), and hybrid (e.g. EIGRP).
Distance-vector protocols determine the best path based on hop count.
Link-state protocols use a more complex a...
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs) to build a topology map
It supports VLSM (Variable Length Subnet Masking) and CIDR (Classless Inter-Domain Routing)
OSPF divides the network into areas to re
Preventing loop avoidance in BGP involves using loop prevention mechanisms like AS Path and Route Reflectors.
Use AS Path attribute to prevent loops by tracking the path a route has taken through AS numbers.
Implement Route Reflectors to avoid loops in BGP by controlling the route propagation within a cluster.
Utilize BGP Confederations to divide the network into smaller autonomous systems to prevent loops.
Regularly monit...
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how data is transferred from one computer to another over a network.
The seven layers of OSI model are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has speci...
Traceroute is a network diagnostic tool used to track the path packets take from one networked device to another.
Traceroute sends packets with increasing TTL values to determine the path to a destination.
Each router along the path sends back an ICMP Time Exceeded message, allowing traceroute to map the route.
The final destination sends an ICMP Port Unreachable message, indicating the end of the route.
Traceroute helps i...
The presence of '*****' in a traceroute indicates that the router is blocking the ICMP packets used by traceroute.
The '*****' indicates that the router is not responding to the ICMP packets sent by the traceroute tool.
This could be due to the router being configured to block ICMP traffic for security reasons.
It can also be caused by a firewall or network filtering rules blocking the ICMP packets.
In some cases, the '***...
BGP states include Idle, Connect, Active, OpenSent, OpenConfirm, Established.
Idle - Initial state when BGP is not yet established
Connect - Attempting to establish a TCP connection
Active - Waiting for a TCP connection to be completed
OpenSent - Sent an Open message to peer
OpenConfirm - Received an Open message and waiting for confirmation
Established - BGP peers are fully established and can exchange routing information
The new router can be configured remotely using a laptop or mobile device with access to the network.
Access the router's web interface by entering its IP address in a web browser
Login using default credentials or credentials provided by the company
Configure basic settings such as SSID, password, and security settings
Update firmware if necessary
Test the connection to ensure it is working properly
CE and PE routers are types of routers used in MPLS networks. CE routers connect to customer networks while PE routers connect to provider networks.
CE routers (Customer Edge) connect to customer networks and are responsible for exchanging routes with customer devices.
PE routers (Provider Edge) connect to provider networks and are responsible for exchanging routes with other PE routers in the MPLS network.
CE routers are...
The command to assign an IP address on a Juniper router interface is 'set interface <interface_name> unit <unit_number> family inet address <ip_address/mask>'
Use the 'set' command to configure the interface
Specify the interface name and unit number
Use the 'family inet' statement to configure an IPv4 address
Specify the IP address and subnet mask
Parameters for BGP neighbourship include AS number, IP address, subnet mask, and BGP version.
AS number must match on both neighbors
IP address must be reachable between neighbors
Subnet mask should be the same on both neighbors
BGP version should be compatible between neighbors
tftp stands for Trivial File Transfer Protocol, a simple protocol used for transferring files over a network.
tftp is a lightweight protocol used for transferring files between devices on a network.
It operates on UDP port 69.
tftp does not require user authentication, making it less secure compared to FTP.
It is commonly used for booting devices over a network, such as in diskless workstations or routers.
An example of tft...
Loop avoidance mechanism in BGP prevents routing loops by using loop prevention mechanisms like AS path attribute and route reflectors.
BGP uses AS path attribute to prevent routing loops by not accepting routes with its own AS number in the path.
Route reflectors are used in BGP to avoid loops in route propagation within a cluster of routers.
BGP Confederations can also be used to prevent loops by dividing the AS into sm
Traceroute is a network diagnostic tool used to track the path packets take from source to destination IP.
Traceroute sends packets with increasing TTL values to elicit ICMP Time Exceeded responses from routers along the path.
The source IP is the IP address of the device initiating the traceroute, while the destination IP is the IP address of the target device.
Traceroute displays the IP addresses of the routers in the p...
Public IP is the address assigned to a device that is directly accessible over the internet, while private IP is used within a private network.
Public IP is unique and can be accessed from anywhere on the internet
Private IP is used within a local network and is not directly accessible from the internet
Public IP is assigned by the Internet Service Provider (ISP)
Private IP addresses are typically in the ranges of 192.168.
To configure a router with support of a non tech guy onsite, provide step-by-step instructions and visual aids.
Create a simple, easy-to-follow guide with step-by-step instructions.
Use visual aids such as diagrams or videos to demonstrate the process.
Provide clear explanations of each step and troubleshoot common issues.
Offer remote support or a helpline for additional assistance if needed.
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters network traffic based on rules set by the administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and Windows Firewall
Routers connect multiple networks together while switches connect devices within a single network.
Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).
Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.
Routers can determine the best path for data to travel between networks, while...
MPLS stands for Multiprotocol Label Switching, a technique used in telecommunications networks to direct data packets along predefined paths.
MPLS is used to improve network performance and efficiency by quickly routing data packets based on labels instead of IP addresses.
It allows for traffic engineering, quality of service (QoS) prioritization, and virtual private network (VPN) services.
MPLS operates at layer 2.5 of t...
FTP and TFTP are protocols used for transferring files over a network.
FTP (File Transfer Protocol) is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet.
TFTP (Trivial File Transfer Protocol) is a simpler version of FTP that uses UDP instead of TCP for file transfer.
FTP requires authentication (username and password) for access, while TFTP does not ...
I was interviewed in Dec 2024.
I applied via Referral
Pyspark, Hive, Yarn, Python
I applied via Company Website and was interviewed in Nov 2024. There was 1 interview round.
Experienced technical writer with a background in software development and a passion for clear and concise communication.
Over 5 years of experience in technical writing for software products
Proficient in creating user guides, API documentation, and release notes
Strong background in software development, allowing for effective collaboration with engineers
Skilled in translating complex technical concepts into easy-to-und...
DITA XML is a structured content standard used for creating technical documentation.
DITA XML is a structured content standard for technical documentation
Commonly used tags include <topic>, <title>, <body>, <section>
Keywords are used to categorize content for easy retrieval
DITA mapping is the process of linking topics together in a hierarchy
Graphics and illustrations can be created and included i...
Agile Methodology and Scrum are popular project management frameworks used in software development.
Agile Methodology is a flexible approach to software development that emphasizes incremental delivery, collaboration, and continuous improvement.
Scrum is a specific Agile framework that divides work into sprints, with daily stand-up meetings and regular reviews.
Scrum roles include Product Owner, Scrum Master, and Developm...
In case of conflict with SMEs, I prioritize clear communication and collaboration. I have experience working with global audiences, creating various types of documents, and estimating time needed for each project.
In case of conflict with SMEs, I prioritize clear communication and collaboration to find a resolution that meets both our needs.
I have worked with global audiences by adapting my writing style to suit differe...
I receive input through meetings and emails, DDLC is Document Development Life Cycle, SDLC is Software Development Life Cycle, I use APA and Chicago style guides, I ensure accuracy through thorough research and review.
Receive input through meetings with subject matter experts and stakeholders
DDLC (Document Development Life Cycle) is the process of creating, editing, and publishing documents
SDLC (Software Development Li...
Design thinking is a problem-solving approach that focuses on understanding the user's needs and creating innovative solutions.
Design thinking involves empathizing with users, defining the problem, ideating solutions, prototyping, and testing.
Yes, I have communicated with developers to understand technical aspects and constraints of the project.
When lacking information near a deadline, I prioritize the most critical as...
Yes, I have experience working with version control systems.
I have used Git for version control in my previous roles.
I am familiar with branching, merging, and resolving conflicts in Git.
I have also worked with SVN (Subversion) in the past.
I was interviewed in Jul 2024.
Reasoning, logical, and mathematical skills.
based on 2 reviews
Rating in categories
Assistant Manager
3
salaries
| ₹2.7 L/yr - ₹3.4 L/yr |
Insurance Executive
3
salaries
| ₹1.1 L/yr - ₹3 L/yr |
TCS
Wipro
HDFC Bank
ICICI Bank