i
Trellix
Filter interviews by
Top trending discussions
I applied via Referral and was interviewed in Nov 2023. There were 5 interview rounds.
Written with multiple question both aptitude and technical
Regression testing is retesting of previously tested functionality to ensure that changes or fixes have not introduced new defects. Smoke testing is a subset of regression testing that focuses on testing the critical functionalities of an application.
Regression testing is performed to verify that changes or fixes in software have not introduced new defects or caused existing functionalities to fail.
It involves retestin...
STLC, bug severity priority, waits in Selenium, Java OOPs
STLC stands for Software Testing Life Cycle and includes phases like requirement analysis, test planning, test design, test execution, and test closure
Bug severity is the impact of a bug on the system, while bug priority is the order in which bugs should be fixed
Waits in Selenium are used to make the test script wait for a certain condition to be met before proce...
posted on 29 Aug 2024
I applied via Referral and was interviewed in Jul 2024. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
Oops concept stands for Object-Oriented Programming concepts which include principles like inheritance, encapsulation, polymorphism, and abstraction.
Oops concept is a programming paradigm that focuses on objects and classes.
It includes principles like inheritance, where a class can inherit properties and behaviors from another class.
Encapsulation is another principle where data is wrapped within a class and can only be...
I was interviewed in Feb 2024.
GRE and IPSEC are both protocols used for secure communication over networks, but they have different purposes and implementations.
GRE (Generic Routing Encapsulation) is a tunneling protocol used to encapsulate a wide variety of network layer protocols inside virtual point-to-point links. It does not provide encryption or authentication.
IPSEC (Internet Protocol Security) is a suite of protocols used to secure Internet ...
I applied via Referral and was interviewed in Jan 2024. There were 2 interview rounds.
Karet Interview :
5 back to back System design question, we don't need to explain each component but more like list as many as points. Need to finish all the question in 15min
1-2 problem solving question : It's not fency algorithm round with tough question. But true problem solving round using basic knowledge such as hashmap, heap
Design a file system to calculate total size and find top k collections in size.
Create a file system class with methods to add files and calculate total size.
Maintain a data structure to store the collections and their sizes.
Implement a method to find the top k collections based on size.
Consider using a priority queue or sorting the collections based on size.
Handle edge cases like empty collections or invalid input siz
Calculate the total size of an array of strings.
Iterate through the array and sum the length of each string.
Use the `length` property of each string to get its size.
Handle edge cases such as empty strings or null values.
The question is asking to find the top k collections.
Use a sorting algorithm to sort the collections in descending order based on a specific criteria.
Select the top k collections from the sorted list.
Return the selected collections as an array of strings.
posted on 3 May 2024
I applied via LinkedIn and was interviewed in Nov 2023. There was 1 interview round.
One critical problem statement automated was testing the login functionality for multiple user roles
Automated testing of login functionality for different user roles
Used Selenium WebDriver to automate login process
Created test scripts to simulate login scenarios for admin, user, and guest roles
Oops concept in Java refers to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance allows a class to inherit properties and behavior from another class.
Encapsulation involves bundling data and methods that operate on the data into a single unit.
Polymorphism allows objects to be treated as instances of their parent class.
Abstraction hides the implementation d...
posted on 11 Dec 2023
I was interviewed in Jun 2023.
I have 5 years of experience in SQL and Node JS.
I have worked extensively with SQL databases, writing complex queries and optimizing performance.
I am proficient in using Node JS for server-side development, building RESTful APIs and handling database operations.
I have experience in integrating SQL databases with Node JS applications using libraries like Sequelize or Knex.
I have successfully delivered projects that invo...
Indexes in SQL are data structures that improve the speed of data retrieval operations on database tables.
Indexes are created on one or more columns of a table to allow faster searching and sorting of data.
They work similar to the index of a book, allowing the database engine to quickly locate the data.
Indexes can be created on primary keys, foreign keys, or any other frequently searched columns.
They reduce the amount ...
Normalization is a process in DBMS that eliminates data redundancy and ensures data integrity.
Normalization is used to organize data in a database efficiently.
There are different normal forms, such as 1NF, 2NF, 3NF, BCNF, and 4NF.
Each normal form has specific rules and dependencies to achieve data normalization.
Normalization helps in reducing data duplication, improving data consistency, and simplifying database mainte...
Views in mySQL are virtual tables that are based on the result of a query. They can be used to simplify complex queries and provide a layer of abstraction.
Views are created using the CREATE VIEW statement.
They are stored in the database and can be accessed like regular tables.
Views can be used to hide complexity by encapsulating complex queries into a single view.
They can also be used to restrict access to certain colu...
Stored Procedures are precompiled database objects that contain a set of SQL statements and can be executed with a single call.
Stored Procedures are used to encapsulate and execute frequently used SQL statements.
They improve performance by reducing network traffic and optimizing query execution.
They can accept input parameters and return output values.
Stored Procedures can be used for data manipulation, data retrieval,...
Internet of Things (IoT) refers to the network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and connectivity.
IoT enables devices to collect and exchange data over the internet.
It allows for remote monitoring and control of devices and systems.
IoT has applications in various industries such as healthcare, transportation, agriculture, and smart homes.
Examples of IoT device...
JWT stands for JSON Web Token. It is a compact, URL-safe means of representing claims between two parties.
JWT is used for authentication and authorization purposes in web applications.
It consists of three parts: header, payload, and signature.
The header contains the algorithm used to sign the token.
The payload contains the claims or information about the user.
The signature is used to verify the integrity of the token.
J...
Webtokens and APIs are both used in web development, but they serve different purposes.
Webtokens are used for authentication and authorization, providing a secure way to transmit user information between client and server.
APIs (Application Programming Interfaces) are sets of rules and protocols that allow different software applications to communicate and interact with each other.
Webtokens are often used within APIs to...
oAuth is an open standard for authorization. In my project, I used the oAuth 2.0 protocol for authentication and authorization.
oAuth is a protocol that allows users to grant limited access to their resources on one website to another website without sharing their credentials.
It provides a secure way for users to authenticate and authorize third-party applications to access their data.
oAuth 2.0 is the most widely used v...
Further optimization of normalized data can be achieved through indexing, denormalization, and caching.
Create appropriate indexes on frequently queried columns to improve query performance.
Consider denormalizing the data by combining related tables to reduce the number of joins required.
Implement caching mechanisms to store frequently accessed data in memory for faster retrieval.
Use materialized views or summary tables...
Indexing in a database improves query performance by creating a data structure that allows for faster data retrieval.
Indexing involves creating an index on one or more columns of a database table.
The column used for indexing should be chosen based on the frequency of data retrieval and the cardinality of the column.
Columns with high selectivity and frequent data retrieval are good candidates for indexing.
Examples of co...
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Software Development Engineer
71
salaries
| ₹9 L/yr - ₹34.1 L/yr |
Software Engineer
57
salaries
| ₹10 L/yr - ₹27.5 L/yr |
Senior Software Engineer
36
salaries
| ₹15 L/yr - ₹46 L/yr |
Technical Support Engineer
26
salaries
| ₹5.6 L/yr - ₹23 L/yr |
Customer Success Engineer
18
salaries
| ₹12.5 L/yr - ₹18.1 L/yr |
TCS
Infosys
Wipro
HCLTech