Filter interviews by
Be the first one to contribute and help others!
I applied via Company Website and was interviewed in Dec 2024. There were 4 interview rounds.
Given Python coding challenge related to string processing and second question was matrix processing using python
I applied via Approached by Company and was interviewed in Oct 2024. There were 4 interview rounds.
Codility Test General C# and SQL
Create a class Employees with fields FirstName LastName, DoB, and Gender. Return avg age of employees and avg age by genders.
Create a class Employees with fields FirstName, LastName, DoB, and Gender
Calculate the average age of all employees
Calculate the average age by genders
I am familiar with design patterns such as Singleton, Factory, Observer, and MVC.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Factory pattern creates objects without specifying the exact class of object that will be created.
Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and up...
Optimizing SQL queries involves using indexes, minimizing data retrieval, avoiding unnecessary joins, and optimizing query structure.
Use indexes on columns frequently used in WHERE clauses
Minimize data retrieval by selecting only necessary columns
Avoid unnecessary joins by using EXISTS or IN clauses instead
Optimize query structure by using appropriate joins and subqueries
Types of indexes include clustered, non-clustered, unique, composite, and filtered indexes.
Clustered index: Physically reorders the data in the table based on the index key.
Non-clustered index: Contains a sorted list of references to the table data rows.
Unique index: Ensures that no two rows have the same values in the indexed columns.
Composite index: Index that is created on multiple columns.
Filtered index: Index that...
Yes, I have read SQL Execution Plans to optimize query performance.
I have analyzed SQL Execution Plans to identify bottlenecks in queries.
I have used SQL Execution Plans to optimize query performance by understanding how the database engine executes queries.
I have made query optimization recommendations based on SQL Execution Plans.
I have experience with tools like SQL Server Management Studio to view and analyze Execu
posted on 12 Dec 2024
I applied via Campus Placement and was interviewed in Nov 2024. There were 2 interview rounds.
Soo easy aptitude exam asked questions
OOPs in Java refers to Object-Oriented Programming concepts, fibo likely refers to Fibonacci sequence, and sorting refers to arranging elements in a specific order.
OOPs in Java includes concepts like classes, objects, inheritance, polymorphism, and encapsulation.
Fibo likely refers to the Fibonacci sequence, where each number is the sum of the two preceding ones (e.g. 0, 1, 1, 2, 3, 5, ...).
Sorting involves arranging el...
Yes, main can be overloaded but not overridden in C++.
Main can be overloaded by defining multiple functions with different parameters.
Example: int main() and int main(int argc, char* argv[])
Main cannot be overridden as it is a static function of the program.
posted on 15 Nov 2024
I applied via Referral and was interviewed in Oct 2024. There were 2 interview rounds.
Merge two sorted linked lists into a single sorted linked list
Create a new linked list to store the merged result
Iterate through both input linked lists and compare nodes to determine the order in which they should be added to the result list
Handle cases where one list is longer than the other
To check if parentheses are balanced, use a stack data structure to keep track of opening and closing parentheses.
Use a stack to push opening parentheses and pop when encountering a closing parenthesis
If stack is empty when encountering a closing parenthesis, return false
After iterating through all parentheses, if stack is empty, return true
The right view of a Binary Search Tree shows the nodes that are visible when viewing the tree from the right side.
The right view of a Binary Search Tree includes the rightmost node at each level.
Nodes at each level that are not visible from the right side are not included in the right view.
Example: For the Binary Search Tree with values 1, 2, 3, 4, 5, the right view would be 1, 3, 5.
posted on 14 Nov 2024
I applied via Company Website and was interviewed in Oct 2024. There were 2 interview rounds.
KNN algorithm is a simple and effective machine learning algorithm for classification and regression tasks.
KNN stands for K-Nearest Neighbors.
It is a non-parametric, lazy learning algorithm.
Works by finding the K closest training examples in feature space to a given input data point.
Classification: Assign the most common class among the K nearest neighbors.
Regression: Take the average of the K nearest neighbors' target...
I applied via LinkedIn and was interviewed in Jul 2024. There were 3 interview rounds.
Supporting application for SSO enablement involves configuring authentication settings, integrating with identity providers, and testing functionality.
Configure authentication settings within the application to enable SSO
Integrate the application with identity providers such as Okta, Azure AD, or PingFederate
Test the SSO functionality to ensure seamless user experience
Provide documentation and training for users on how
I handle outages by following established procedures and prioritize tasks based on impact.
Immediately assess the situation to determine the root cause of the outage
Communicate with stakeholders to keep them informed of the issue and expected resolution time
Work with cross-functional teams to troubleshoot and resolve the outage as quickly as possible
Document the outage incident and steps taken for future reference and i...
I handle change management by implementing structured processes, communication, and stakeholder involvement.
Implementing a change management process to track and document changes
Communicating changes effectively to all stakeholders
Involving key stakeholders in decision-making and planning
Ensuring proper testing and validation of changes before implementation
Enable SSO for SaaS applications by integrating with identity providers and configuring authentication protocols.
Integrate with identity providers such as Okta, Azure AD, or Google Workspace
Configure authentication protocols like SAML, OAuth, or OpenID Connect
Implement single sign-on functionality in the application code
Ensure secure communication between the application and the identity provider
RTO stands for Recovery Time Objective in disaster recovery, representing the targeted duration of time within which a business process must be restored after a disaster.
RTO is a crucial metric in disaster recovery planning, indicating the maximum acceptable downtime for a system or process.
It helps organizations determine the resources and strategies needed to recover from a disaster within a specific timeframe.
For ex...
I primarily use SSH (Secure Shell) to connect servers.
SSH (Secure Shell) is a widely used application for securely connecting to servers
Other applications like PuTTY, OpenSSH, and WinSCP can also be used for server connections
Yes, I am experienced in vulnerability management.
I have experience in identifying, prioritizing, and mitigating vulnerabilities in systems and networks.
I am proficient in using vulnerability scanning tools such as Nessus, Qualys, and OpenVAS.
I have implemented patch management processes to address vulnerabilities in a timely manner.
I have conducted vulnerability assessments and penetration testing to identify weakness...
I have experience working with both connected and disconnected applications.
I have experience developing applications that can function both online and offline.
I have worked on projects where data synchronization is crucial for seamless user experience.
Examples include mobile apps that can work offline and sync data when connected to the internet.
Yes, I have experience in taking care of the Authorization part in various projects.
Implemented role-based access control (RBAC) to manage user permissions
Configured and managed authentication protocols such as OAuth and SAML
Worked on setting up access control lists (ACLs) for network security
Experience with managing user roles and permissions in Active Directory
Utilized single sign-on (SSO) solutions for seamless user
I applied via Naukri.com and was interviewed in Dec 2024. There was 1 interview round.
posted on 3 Jan 2025
I applied via Campus Placement
A test that covers all fundamental topics, including networking, object-oriented programming (OOP), and data structures and algorithms (DSA).
posted on 28 Dec 2024
I applied via LinkedIn and was interviewed in Jun 2024. There were 5 interview rounds.
Java coding questions, basic Java questions.
based on 13 reviews
Rating in categories
Assistant Manager
5
salaries
| ₹4.5 L/yr - ₹6.8 L/yr |
Deputy Manager
5
salaries
| ₹5.8 L/yr - ₹7.2 L/yr |
Senior Executive
4
salaries
| ₹3.8 L/yr - ₹7 L/yr |
Regional Sales Manager
3
salaries
| ₹10 L/yr - ₹15 L/yr |
Assistant General Manager
3
salaries
| ₹17 L/yr - ₹27 L/yr |
FIS
HighRadius
Broadridge Financial Solutions
PayPal