i
UST
Filter interviews by
posted on 18 Dec 2021
ConcurrentHashMap is a thread-safe implementation of Map interface in Java.
ConcurrentHashMap allows multiple threads to read and write concurrently without blocking each other.
It internally divides the map into segments and locks each segment separately to allow concurrent access.
Other synchronized structures like Hashtable and synchronizedMap lock the entire map, causing performance issues.
ConcurrentHashMap is preferr...
Immutable class with List/Date Type property
Create a final class with private final fields
Use unmodifiableList() to create immutable List
Use defensive copying for Date property
No setters, only getters
Override equals() and hashCode() methods
To make a singleton class thread safe, use synchronized keyword or double-checked locking. Volatile keyword ensures visibility of changes across threads.
Use synchronized keyword to ensure only one thread can access the instance at a time
Use double-checked locking to avoid unnecessary synchronization
Declare the instance variable as volatile to ensure visibility of changes across threads
Example: public static synchronize...
Stream, Lambda and Functional interface can be combined to write functional programming in Java
Streams provide a functional way to process collections of data
Lambda expressions allow for functional programming by providing a way to pass behavior as an argument
Functional interfaces define the contract for a lambda expression
Example: using a stream to filter a list of integers and then using a lambda expression to map ea
To access rest endpoint in asynchronous manner, use AJAX or fetch API with async/await or promises.
Use AJAX or fetch API to make asynchronous requests to the REST endpoint
Use async/await or promises to handle the asynchronous response
Ensure that the endpoint supports asynchronous requests
Static methods are useful for utility functions but can't access instance variables.
Advantage: Can be called without creating an instance of the class
Advantage: Useful for utility functions that don't require access to instance variables
Disadvantage: Can't access instance variables
Disadvantage: Can't be overridden in subclasses
Helm is a package manager for Kubernetes while Kubernetes is an open-source container orchestration platform.
Helm is used to manage Kubernetes applications and their dependencies
Helm charts are used to define, install, and upgrade Kubernetes applications
Kubernetes is used to automate deployment, scaling, and management of containerized applications
Kubernetes uses declarative configuration to manage applications and the
NoSql is sufficient when data is unstructured and requires high scalability and performance.
Consider the type of data and its structure
Evaluate the scalability and performance requirements
Assess the need for complex queries and transactions
Examples: social media data, IoT data, real-time analytics
To manage multiple insertions of the same file in S3, use versioning and object locking.
Enable versioning on the S3 bucket to keep track of changes to the file.
Use object locking to prevent multiple insertions of the same file at the same time.
Implement a notification system to alert users when a file has been updated.
Consider using a unique identifier for each file to avoid confusion.
Implement a backup and recovery pl
In Cassandra, leaders are responsible for handling read and write requests while followers replicate data.
Leaders are chosen based on their proximity to the client and their ability to handle requests efficiently.
Followers replicate data from the leader and can take over as leader if the current leader fails.
Cassandra uses a gossip protocol to ensure that all nodes are aware of the current leader and follower status.
Le...
AWS CLI commands used as Senior Systems Analyst and Technical Lead
aws s3 ls - List all S3 buckets
aws ec2 describe-instances - Describe all EC2 instances
aws rds describe-db-instances - Describe all RDS instances
aws lambda list-functions - List all Lambda functions
aws cloudformation describe-stacks - Describe all CloudFormation stacks
To make a db entity unmodifiable, use constraints or triggers to prevent updates or deletes.
Use a constraint to prevent updates or deletes on the entity
Create a trigger to roll back any update or delete operation on the entity
Grant read-only access to the entity to prevent modifications
Use database permissions to restrict modification access to the entity
Consider using a separate read-only database for the entity
Spring Data supports various repositories for different data sources
Spring Data JPA for relational databases
Spring Data MongoDB for NoSQL databases
Spring Data Redis for key-value stores
Spring Data Cassandra for column-family stores
Spring Data Neo4j for graph databases
The current version of Microsoft Windows Server is Windows Server 2019. Hyper-V is a virtualization platform. Active Directory is a directory service. DNS is a system that translates domain names to IP addresses. DHCP is a network protocol that assigns IP addresses to devices. WSUS is Windows Server Update Services. The current version of client Windows operating system is Windows 10.
Windows Server 2019 is the latest v...
VMware vSphere is a virtualization platform that provides virtualization, management, resource optimization, and more.
DRS (Distributed Resource Scheduler) in VMware is a feature that automatically balances computing workloads across a cluster of ESXi hosts.
High availability in VMware ensures that virtual machines are restarted on another host in case of a host failure.
Fault Tolerance in VMware provides continuous avail...
Microsoft Azure Cloud is a cloud computing service provided by Microsoft, offering a variety of services and resources for building, deploying, and managing applications.
Provides infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS) offerings
Offers services such as virtual machines, databases, AI and machine learning tools, and more
Allows for scalability, flexibility, and co...
FSMO stands for Flexible Single Master Operations. They are specialized roles in Active Directory that handle specific tasks.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
Each FSMO role is responsible for a specific aspect of the Active Directory environment.
For example, the PDC Emulator role handles password changes and time synchronization within a do
I applied via Recruitment Consulltant and was interviewed in Aug 2024. There were 4 interview rounds.
Its moderate and nit that much difficult to attempt
Coding also moderate its not that much deep
Assignment is based on verbal communication
Family should be the 1st priority as they provide emotional support and love.
Family provides emotional support during tough times
Family offers unconditional love and care
Job can always be replaced, but family is irreplaceable
Java is a high-level programming language known for its portability, security, and versatility.
Java is an object-oriented language
It is platform-independent, meaning code can run on any device with a Java Virtual Machine (JVM)
Java is used for developing web applications, mobile apps, desktop applications, and more
I am a dedicated and experienced System Analyst with a strong background in IT and problem-solving skills.
Experienced in analyzing and designing software systems
Proficient in programming languages such as Java, C++, and SQL
Strong communication and teamwork skills
Detail-oriented and able to prioritize tasks effectively
I applied via Company Website and was interviewed in Dec 2024. There were 2 interview rounds.
One coding question and communication test
I applied via Campus Placement
I dont remember it exactly now
ITIL (Information Technology Infrastructure Library) is a set of best practices for IT service management.
ITIL is a framework that outlines best practices for IT service management.
It focuses on aligning IT services with the needs of the business.
ITIL processes include incident management, change management, problem management, and more.
ITIL helps organizations improve efficiency, reduce costs, and provide better servi...
posted on 30 Jan 2024
I applied via Referral and was interviewed in Dec 2023. There were 2 interview rounds.
posted on 4 Dec 2024
I applied via Campus Placement and was interviewed before Dec 2023. There were 2 interview rounds.
Medium level question where asked in this round.
1 medium 1 hard question and had a good structured question.
I applied via Referral and was interviewed in Apr 2023. There were 2 interview rounds.
posted on 5 Sep 2023
Product development process involves designing, creating, and testing a product before it is launched in the market.
Market research to identify customer needs and preferences
Concept development and brainstorming ideas
Designing and prototyping the product
Testing and refining the product based on feedback
Manufacturing and production
Launching and marketing the product
Continuous improvement and updates based on customer fe
SPES stands for System Performance Evaluation System, a tool used to analyze and optimize the performance of computer systems.
SPES is a software tool used by system engineers to evaluate the performance of computer systems.
It helps in identifying bottlenecks and optimizing system performance.
SPES can be used to analyze CPU usage, memory usage, disk I/O, and network performance.
By using SPES, system engineers can make i...
Software Developer
2.1k
salaries
| ₹2.5 L/yr - ₹12.4 L/yr |
Senior Software Engineer
1.7k
salaries
| ₹6.5 L/yr - ₹26 L/yr |
Software Engineer
1.3k
salaries
| ₹3.6 L/yr - ₹14.8 L/yr |
System Analyst
1.2k
salaries
| ₹6.5 L/yr - ₹22.6 L/yr |
Senior Software Developer
1.1k
salaries
| ₹5.5 L/yr - ₹20 L/yr |
TCS
Infosys
Wipro
HCLTech