i
Six Sigma Soft Solutions
Filter interviews by
STLC stands for Software Testing Life Cycle. Agile principles include iterative development, customer collaboration, and continuous improvement.
STLC is a process followed by software testers to ensure quality of the software product.
It includes phases like requirement analysis, test planning, test design, test execution, and test closure.
Agile principles prioritize customer satisfaction, working software, and respondin...
Software testing is the process of evaluating a software application or system to find defects and ensure it meets the specified requirements.
Software testing involves executing a program or application with the intent of finding errors.
It ensures that the software meets the functional and non-functional requirements.
It helps in identifying defects early in the development cycle, reducing the cost of fixing them later.
...
Smoke testing is a subset of regression testing, while sanity testing is a subset of acceptance testing.
Smoke testing is done to check if the critical functionalities of the software are working fine after a build.
Sanity testing is done to check if the new changes or fixes in the software are working fine and not breaking the existing functionalities.
Smoke testing is done before the actual testing process begins, while...
HTTP methods differ in manual and automation testing in terms of execution speed, accuracy, and coverage.
Manual testing involves human intervention and is time-consuming.
Automation testing is faster and more accurate.
Automation testing can cover a larger number of test cases.
Manual testing is better for exploratory testing and usability testing.
Automation testing is better for regression testing and load testing.
Both m...
Top trending discussions
posted on 12 Dec 2024
I applied via Job Fair and was interviewed in Nov 2024. There was 1 interview round.
Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.
Allows for easier testing by injecting mock dependencies
Promotes loose coupling between components
Improves code reusability and maintainability
Examples: Constructor injection, Setter injection, Interface injection
Middleware is software that acts as a bridge between different applications, allowing them to communicate and share data.
Middleware facilitates communication between different software applications
It can handle tasks such as message queuing, data transformation, and security
Examples of middleware include message brokers like RabbitMQ, ESBs like MuleSoft, and API gateways like Kong
posted on 3 Jul 2024
I applied via Walk-in
Bug lifecycle refers to the stages a bug goes through from discovery to resolution.
Bug is identified by tester
Bug is reported in bug tracking system
Bug is assigned to developer for fixing
Developer fixes the bug
Bug is retested by tester
Bug is closed if fixed or reopened if issue persists
API testing is a type of software testing that involves testing APIs directly to ensure they meet functionality, reliability, performance, and security requirements.
API testing involves testing the functionality of APIs by sending requests and verifying responses.
It also includes testing for reliability, performance, and security of APIs.
API testing can be done manually or using automated tools like Postman or SoapUI.
E...
Regression testing is the process of retesting a software application to ensure that new code changes have not adversely affected existing functionality.
Performed after code changes to ensure that existing functionality still works
Helps in identifying any new bugs introduced by the changes
Automated tools like Selenium can be used for regression testing
Regression test suites are often created to streamline the process
A high severity low priority bug is a software issue that has a significant impact on the system but can be deferred for fixing.
High severity means the bug has a major impact on the system functionality or performance.
Low priority indicates that the bug can be fixed at a later stage as it does not hinder the basic functionality.
Examples: A spelling mistake in a less frequently used feature, a cosmetic issue in the user
Java code , oops, sql , spring bbot
The maximum area of a stack is determined by the size of the stack and the items it can hold.
The maximum area of a stack is calculated by multiplying the height of the stack by the width of the stack.
For example, if a stack has a height of 10 units and a width of 5 units, the maximum area would be 50 square units.
Find the length of the longest substring without repeating characters.
Iterate through the string and keep track of the characters seen so far in a set.
Use two pointers to mark the start and end of the current substring.
Update the maximum length of the substring as you iterate through the string.
I applied via Job Portal and was interviewed in Apr 2024. There were 2 interview rounds.
Java string manipulation questions and reactjs
I applied via Campus Placement and was interviewed in Apr 2024. There were 3 interview rounds.
It was simple basic level questions
I was interviewed in Apr 2024.
Python code for array
Computerized test based on simpel math questions
posted on 18 Nov 2023
I applied via Campus Placement and was interviewed in Oct 2023. There were 3 interview rounds.
Moderate Level questions were asked.
Medium level questions were asked.
posted on 19 Jun 2023
I applied via Approached by Company and was interviewed in Dec 2022. There were 3 interview rounds.
Split an array of strings into specified size chunks
Use a loop to iterate through the array and slice it into chunks of specified size
Check if the array length is divisible by the specified size, if not handle the remaining elements separately
Example: ['apple', 'banana', 'cherry', 'date'] split into chunks of size 2 would result in [['apple', 'banana'], ['cherry', 'date']]
A hash map is a data structure that stores key-value pairs, using a hash function to map keys to indexes in an array.
Hash map uses a hash function to determine the index of the key in the underlying array.
Collision resolution techniques like chaining or open addressing are used to handle cases where multiple keys hash to the same index.
Custom objects used as keys must override the hashCode() and equals() methods for pr
SQL query to find the highest salary from a specific department
Use the MAX() function to find the highest salary
Filter the results based on the specific department using WHERE clause
Join the employee table with the department table if necessary
A hash set stores unique elements using a hash function for efficient retrieval.
Hash set stores unique elements based on their hash code
Employee object must have proper hashCode() and equals() methods implemented
Example: HashSet
Convert a string from camel case to snake case.
Split the camel case string into words based on uppercase letters.
Convert each word to lowercase and separate them with underscores.
Join the words back together with underscores to form the snake case string.
based on 3 reviews
Rating in categories
HR Executive
34
salaries
| ₹1.8 L/yr - ₹3.2 L/yr |
Desktop Support Engineer
33
salaries
| ₹2.8 L/yr - ₹4.9 L/yr |
Software Developer
32
salaries
| ₹4 L/yr - ₹7.1 L/yr |
Resource Coordinator
31
salaries
| ₹1.5 L/yr - ₹4.5 L/yr |
System Engineer
28
salaries
| ₹2.5 L/yr - ₹5.8 L/yr |
TCS
Infosys
Wipro
HCLTech