Filter interviews by
I applied via Approached by Company and was interviewed in Sep 2024. There were 2 interview rounds.
Excel Assignment on building a dashboard
posted on 24 Jan 2024
Intercompany refers to transactions between two entities within the same company or corporate group.
Intercompany transactions are common in multinational corporations to transfer goods or services between subsidiaries.
These transactions must be recorded accurately to ensure proper financial reporting.
Intercompany accounts are used to track these transactions and eliminate any double counting in consolidated financial s
I applied via Approached by Company and was interviewed before Oct 2023. There were 2 interview rounds.
Signant Health interview questions for popular designations
I applied via Referral and was interviewed before Apr 2023. There was 1 interview round.
The main HTTPS requests in API testing are GET, POST, PUT, DELETE.
GET request is used to retrieve data from the server
POST request is used to submit data to the server
PUT request is used to update existing data on the server
DELETE request is used to remove data from the server
Boundary value analysis is a software testing technique used to test boundary conditions of input variables.
It involves testing the minimum and maximum boundaries of input ranges.
Helps in identifying errors at the boundaries of input values.
Example: Testing a login form with password length of 6 characters (boundary) and 20 characters (boundary).
Black box testing is a software testing method where the internal structure/design of the system being tested is not known to the tester.
Tests are conducted based on the system's specifications and requirements.
Focus is on the functionality of the system rather than its internal code.
Testers are not required to have knowledge of the code or logic behind the software.
Examples include user acceptance testing, system test
Some testing types include functional testing, performance testing, and security testing.
Functional testing: Testing the functionality of the software to ensure it meets requirements.
Performance testing: Testing the performance of the software under different conditions.
Security testing: Testing the software for vulnerabilities and ensuring data protection.
Usability testing: Testing the user-friendliness of the softwar...
I applied via Naukri.com and was interviewed before Oct 2022. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Nov 2021. There were 2 interview rounds.
Java code on strings, to count the number of vowels in a string
Top trending discussions
posted on 19 May 2021
I applied via Campus Placement and was interviewed in Nov 2020. There were 5 interview rounds.
Developed a web-based project management tool for small businesses
Used PHP and MySQL for backend development
Implemented a responsive UI using HTML, CSS, and JavaScript
Included features such as task assignment, progress tracking, and file sharing
Conducted user testing and incorporated feedback for improvements
posted on 22 Sep 2021
I applied via Company Website and was interviewed in Mar 2021. There were 5 interview rounds.
I applied via Campus Placement and was interviewed before Mar 2021. There were 4 interview rounds.
90 minute test on hacker rank consisting of 3 coding questions all of medium difficulty. Most candidates are required to solve more than 1 question.
Find the lowest common ancestor of a binary tree.
Traverse the tree recursively from the root node.
If the current node is null or matches either of the given nodes, return the current node.
Recursively search for the nodes in the left and right subtrees.
If both nodes are found in different subtrees, return the current node.
If both nodes are found in the same subtree, continue the search in that subtree.
Find first missing positive integer from an array of non-negative integers.
Create a hash set to store all positive integers in the array
Loop through the array and add all positive integers to the hash set
Loop through positive integers starting from 1 and return the first missing integer not in the hash set
Design a parking lot
Consider the size and capacity of the parking lot
Decide on the layout and organization of parking spaces
Implement a system to manage parking availability and reservations
Include features like ticketing, payment, and security
Consider scalability and future expansion
Group list of strings into distinct anagrams.
Create a hash table with sorted string as key and list of anagrams as value.
Iterate through the list of strings and add each string to its corresponding anagram list in the hash table.
Return the values of the hash table as a list of lists.
based on 7 interviews
Interview experience
based on 61 reviews
Rating in categories
Software Test Engineer II
19
salaries
| ₹5 L/yr - ₹9.5 L/yr |
Softwaretest Engineer
18
salaries
| ₹3.6 L/yr - ₹8.6 L/yr |
Software Developer
16
salaries
| ₹3.6 L/yr - ₹8.8 L/yr |
Automation Test Engineer
15
salaries
| ₹8 L/yr - ₹12.3 L/yr |
Cloud Operations Engineer
12
salaries
| ₹9.5 L/yr - ₹17 L/yr |
Mobile Programming
Diverse Lynx
Arcesium
Solartis Technology Services