Filter interviews by
Debounce is a technique to limit the rate at which a function is executed, especially during events like scrolling or resizing.
Debounce ensures a function is only called after a specified delay, preventing excessive calls during rapid events.
Commonly used in scenarios like search input, where you want to wait for the user to stop typing before making an API call.
Example implementation: function debounce(func, dela...
CSS pseudo-classes are special states of elements used to style them based on their state or position in the document.
Used to apply styles based on user interaction, e.g., :hover changes the style when a user hovers over an element.
Can target specific elements based on their position, e.g., :first-child applies styles to the first child of a parent.
Allows for styling based on form states, e.g., :checked styles a c...
React Context is for simpler state management, while Redux is a more robust solution for complex state management.
React Context is built into React and is ideal for passing data through the component tree without props drilling.
Redux is a standalone library that provides a predictable state container, making it easier to manage complex state logic.
Context is simpler and easier to set up for small applications, whi...
Garbage collectors manage memory by reclaiming unused objects, crucial in high-load scenarios to maintain performance.
Garbage collectors use algorithms like Mark-and-Sweep to identify and reclaim unused memory.
In a heavily loaded environment, they may operate in concurrent or parallel modes to minimize pause times.
Generational garbage collection optimizes performance by segregating objects by their lifespan, reduc...
A state machine is a computational model that transitions between states based on inputs and conditions.
Consists of states, transitions, and events.
Example: A turnstile that can be locked or unlocked based on user input.
Used in software design for managing complex behaviors.
Example: A traffic light system with states like 'Red', 'Green', and 'Yellow'.
Can be implemented in various programming languages using state ...
Implement a custom HashMap to efficiently search for a key value pair of a composite object.
Create a custom HashMap class with methods for adding key value pairs and searching for a specific key.
Implement a hash function to calculate the index of the key in the HashMap array.
For composite objects, override the hashCode and equals methods to ensure proper comparison and retrieval.
Generating all permutations of a given string using recursion and backtracking techniques.
Use recursion to generate permutations. Example: for 'abc', start with 'a', then permute 'bc'.
Backtrack by swapping characters to explore all possibilities. Example: swap 'a' with 'b' to get 'bac'.
Store results in a list or set to avoid duplicates. Example: for 'aab', store 'aab', 'aba', 'baa'.
Base case: when the current perm...
Convert a counter code from class component to functional component
Use useState hook to manage state in functional component
Remove 'this' keyword and constructor from the code
Update event handlers to use arrow functions or useCallback hook
Call stack stores function calls and local variables, while heap stores dynamic memory allocation.
Call stack is used for function calls and local variables
Heap is used for dynamic memory allocation
Call stack is limited in size and has a fixed memory allocation, while heap is larger and can grow dynamically
Example: Call stack is used to keep track of function calls in a recursive function, while heap is used to all...
CORS stands for Cross-Origin Resource Sharing and is a security feature implemented by browsers to prevent unauthorized access to resources on a different domain.
CORS allows servers to specify who can access their resources by adding specific HTTP headers to their responses.
It is used to protect against cross-site request forgery (CSRF) attacks.
For example, if a frontend application on domain A tries to make a req...
I applied via Campus Placement and was interviewed in Oct 2024. There were 3 interview rounds.
There are two questions, one Javascript and the other one a Java coding question. its medium level question
Find the length of the longest increasing subsequence in an array.
Use dynamic programming to keep track of the longest increasing subsequence ending at each index.
Iterate through the array and update the longest increasing subsequence length for each index.
Return the maximum length found in the dynamic programming array.
Linux commands commonly used in DevOps for automation and system management.
1. ls - List directory contents
2. cd - Change directory
3. pwd - Print working directory
4. mkdir - Make directory
5. rm - Remove files or directories
6. cp - Copy files or directories
7. mv - Move files or directories
8. grep - Search text patterns
9. ps - Display process information
10. top - Display and update sorted information about processes
11. c...
I applied via LinkedIn and was interviewed in Sep 2024. There were 2 interview rounds.
Convert a counter code from class component to functional component
Use useState hook to manage state in functional component
Remove 'this' keyword and constructor from the code
Update event handlers to use arrow functions or useCallback hook
Code snippet to post data to a public URL in React
Use the fetch API to make a POST request to the public URL
Convert the data to JSON before sending it in the request body
Handle the response from the server accordingly
Arrow functions are more concise and have lexical scoping, while normal functions have their own 'this' value.
Arrow functions do not have their own 'this' value, they inherit it from the parent scope.
Arrow functions are more concise and have implicit return.
Normal functions are more flexible and can be used as constructors.
Arrow functions cannot be used as constructors.
Arrow functions do not have 'arguments' object.
Call stack stores function calls and local variables, while heap stores dynamic memory allocation.
Call stack is used for function calls and local variables
Heap is used for dynamic memory allocation
Call stack is limited in size and has a fixed memory allocation, while heap is larger and can grow dynamically
Example: Call stack is used to keep track of function calls in a recursive function, while heap is used to allocate...
CORS stands for Cross-Origin Resource Sharing and is a security feature implemented by browsers to prevent unauthorized access to resources on a different domain.
CORS allows servers to specify who can access their resources by adding specific HTTP headers to their responses.
It is used to protect against cross-site request forgery (CSRF) attacks.
For example, if a frontend application on domain A tries to make a request ...
Map two arrays of objects and display results in lists using React
Use the map function to iterate over each array of objects
Render the results in separate lists using JSX
Example: array1.map(item =>
Yes, I have experience in Identity Governance and Administration (IGA).
Implemented IGA solutions to manage user access and permissions
Performed role-based access control (RBAC) configurations
Integrated IGA tools with HR systems for automated user provisioning
Conducted access reviews and audits to ensure compliance
I have 2 years of experience integrating OKTA with various applications.
Implemented SSO using OKTA for multiple web applications
Configured user provisioning and deprovisioning with OKTA APIs
Integrated OKTA with Active Directory for user authentication
I applied via Naukri.com and was interviewed in Apr 2024. There was 1 interview round.
I applied via LinkedIn and was interviewed before Jan 2024. There were 4 interview rounds.
There was some Technical Questions along with one or two Coding Questions to code.
Generating all permutations of a given string using recursion and backtracking techniques.
Use recursion to generate permutations. Example: for 'abc', start with 'a', then permute 'bc'.
Backtrack by swapping characters to explore all possibilities. Example: swap 'a' with 'b' to get 'bac'.
Store results in a list or set to avoid duplicates. Example: for 'aab', store 'aab', 'aba', 'baa'.
Base case: when the current permutati...
Implement a custom HashMap to efficiently search for a key value pair of a composite object.
Create a custom HashMap class with methods for adding key value pairs and searching for a specific key.
Implement a hash function to calculate the index of the key in the HashMap array.
For composite objects, override the hashCode and equals methods to ensure proper comparison and retrieval.
I applied via Naukri.com and was interviewed in Mar 2024. There were 3 interview rounds.
A Binary Search Tree (BST) is a data structure that maintains sorted order for efficient searching, insertion, and deletion.
A BST is a binary tree where each node has at most two children.
For any given node, values in the left subtree are less, and values in the right subtree are greater.
Example: Inserting 10, 5, 15 into a BST results in a root node 10, left child 5, and right child 15.
BST operations like search, inser...
Garbage collectors manage memory by reclaiming unused objects, crucial in high-load scenarios to maintain performance.
Garbage collectors use algorithms like Mark-and-Sweep to identify and reclaim unused memory.
In a heavily loaded environment, they may operate in concurrent or parallel modes to minimize pause times.
Generational garbage collection optimizes performance by segregating objects by their lifespan, reducing o...
A state machine is a computational model that transitions between states based on inputs and conditions.
Consists of states, transitions, and events.
Example: A turnstile that can be locked or unlocked based on user input.
Used in software design for managing complex behaviors.
Example: A traffic light system with states like 'Red', 'Green', and 'Yellow'.
Can be implemented in various programming languages using state desig...
I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.
1st round they asked both on Manual testing question and Coding on java reverse string program
Top trending discussions
Some of the top questions asked at the Saviynt interview -
The duration of Saviynt interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 16 interview experiences
Difficulty level
Duration
Consultant
48
salaries
| ₹10.5 L/yr - ₹28.5 L/yr |
Senior Software Engineer
39
salaries
| ₹14 L/yr - ₹44 L/yr |
Senior Engineer
34
salaries
| ₹13.5 L/yr - ₹32.2 L/yr |
Technical Lead
30
salaries
| ₹18 L/yr - ₹40.5 L/yr |
Software Engineer
27
salaries
| ₹5.5 L/yr - ₹21 L/yr |
Yodlee
Fingent
Bravura Solutions
CloudMoyo