Filter interviews by
Be the first one to contribute and help others!
posted on 22 Nov 2024
SDLC stands for Software Development Life Cycle, which is a process used by software development teams to design, develop, and test high-quality software products. STLC stands for Software Testing Life Cycle, which is a subset of SDLC focused on testing activities.
SDLC involves planning, designing, coding, testing, and deployment stages.
STLC involves test planning, test design, test execution, and test closure stages.
S...
Bug life cycle is the process of a bug from identification to resolution in software testing.
Bug is identified by tester
Bug is logged in bug tracking tool
Bug is assigned to developer
Developer fixes the bug
Bug is retested by tester
If bug is fixed, it is closed. If not, it is reopened
Bug is verified in subsequent releases
React is a modern JavaScript library for building user interfaces, while jQuery is a fast and concise JavaScript library for DOM manipulation.
React is component-based, promoting reusability and modularity.
React uses a virtual DOM for efficient updates, while jQuery directly manipulates the DOM.
React is declarative, making it easier to reason about the UI, while jQuery is imperative.
React is typically used for single-pa...
I applied via Recruitment Consulltant and was interviewed in May 2024. There was 1 interview round.
I am fluent in three languages: English, Spanish, and French.
Fluent in English, Spanish, and French
Can communicate effectively in all three languages
Have experience working in multilingual environments
posted on 25 Aug 2024
I applied via Company Website and was interviewed in Jul 2024. There were 2 interview rounds.
1 Hours, Computer Science, Bluestock.in
I am a software engineer with a passion for problem-solving and creating innovative solutions.
Experienced in programming languages such as Java, Python, and C++
Strong background in data structures and algorithms
Worked on projects involving web development and mobile app development
Excellent communication and teamwork skills from collaborating with cross-functional teams
I come from a close-knit family of four - my parents, my younger sister, and myself.
My parents have always been supportive of my career choices and have encouraged me to pursue my passion for software development.
My younger sister is currently studying computer science and we often collaborate on coding projects together.
Family gatherings are important to us and we enjoy spending quality time together, whether it's cel
posted on 26 Dec 2024
I applied via Campus Placement
Three fundamental questions related to Data Structures and Algorithms.
posted on 14 Apr 2024
I applied via Naukri.com and was interviewed in Mar 2024. There were 3 interview rounds.
Technical Aptitude on singalton pattern
A man-in-the-middle attack is a cyber security attack where the attacker secretly intercepts and possibly alters the communication between two parties.
Attacker intercepts communication between two parties
Attacker may alter the communication
Commonly occurs in public Wi-Fi networks
Can lead to data theft or unauthorized access
Protecting API involves using authentication, authorization, encryption, rate limiting, and monitoring.
Implement authentication mechanisms such as OAuth, JWT, or API keys
Use authorization to control access to different parts of the API
Encrypt sensitive data using SSL/TLS
Implement rate limiting to prevent abuse and protect against DDoS attacks
Monitor API traffic for unusual activity and potential security threats
CSRF stands for Cross-Site Request Forgery, a type of attack where a malicious website tricks a user into performing actions on another website without their knowledge.
CSRF attacks exploit the trust that a site has in a user's browser, by sending unauthorized requests using the user's session.
Prevent CSRF attacks by using tokens in forms, checking the origin of requests, and implementing proper authentication and autho...
Aptitude test of 4 level
posted on 20 Jul 2024
My method of working is organized, efficient, and detail-oriented.
I prioritize tasks based on deadlines and importance
I create detailed to-do lists and schedules to stay on track
I regularly communicate with team members to ensure everyone is on the same page
The payment being demanded depends on the outstanding balance and payment terms.
The payment being demanded should be based on the outstanding balance owed by the debtor.
Consider the payment terms agreed upon by both parties when determining the payment to be demanded.
It is important to communicate clearly and professionally with the debtor regarding the payment being demanded.
Provide options for payment plans or negoti...
I applied via LinkedIn and was interviewed in Nov 2023. There were 4 interview rounds.
Hackerearth Coding Test
posted on 13 Nov 2024
I applied via Naukri.com and was interviewed before Nov 2023. There were 3 interview rounds.
2Sum problem involves finding two numbers in an array that add up to a specific target.
Use a hashmap to store the difference between the target and each element in the array.
Iterate through the array and check if the current element's complement exists in the hashmap.
Return the indices of the two numbers that add up to the target.
Spiral traversal of a Binary tree involves visiting nodes level by level alternating between left to right and right to left.
Start by pushing the root node into a queue.
While the queue is not empty, pop a node, print its value, and push its children into the queue.
Alternate between popping nodes from the queue and printing their values in a spiral manner.
The aggressive cows problem involves finding the maximum distance between cows in a field while ensuring they are not too close to each other.
Use binary search to find the maximum distance between cows.
Sort the cows' positions and check if a certain distance is feasible.
Consider the constraints of the problem such as the number of cows and the size of the field.
Stashfin
Bluestock ™
OneCard
PolicyX.com