i
UST
Filter interviews by
ConcurrentHashMap is a thread-safe implementation of Map interface in Java.
ConcurrentHashMap allows multiple threads to read and write concurrently without blocking each other.
It internally divides the map into segments and locks each segment separately to allow concurrent access.
Other synchronized structures like Hashtable and synchronizedMap lock the entire map, causing performance issues.
ConcurrentHashMap is preferr...
Immutable class with List/Date Type property
Create a final class with private final fields
Use unmodifiableList() to create immutable List
Use defensive copying for Date property
No setters, only getters
Override equals() and hashCode() methods
To make a singleton class thread safe, use synchronized keyword or double-checked locking. Volatile keyword ensures visibility of changes across threads.
Use synchronized keyword to ensure only one thread can access the instance at a time
Use double-checked locking to avoid unnecessary synchronization
Declare the instance variable as volatile to ensure visibility of changes across threads
Example: public static synchronize...
Stream, Lambda and Functional interface can be combined to write functional programming in Java
Streams provide a functional way to process collections of data
Lambda expressions allow for functional programming by providing a way to pass behavior as an argument
Functional interfaces define the contract for a lambda expression
Example: using a stream to filter a list of integers and then using a lambda expression to map ea
To access rest endpoint in asynchronous manner, use AJAX or fetch API with async/await or promises.
Use AJAX or fetch API to make asynchronous requests to the REST endpoint
Use async/await or promises to handle the asynchronous response
Ensure that the endpoint supports asynchronous requests
Static methods are useful for utility functions but can't access instance variables.
Advantage: Can be called without creating an instance of the class
Advantage: Useful for utility functions that don't require access to instance variables
Disadvantage: Can't access instance variables
Disadvantage: Can't be overridden in subclasses
Helm is a package manager for Kubernetes while Kubernetes is an open-source container orchestration platform.
Helm is used to manage Kubernetes applications and their dependencies
Helm charts are used to define, install, and upgrade Kubernetes applications
Kubernetes is used to automate deployment, scaling, and management of containerized applications
Kubernetes uses declarative configuration to manage applications and the
NoSql is sufficient when data is unstructured and requires high scalability and performance.
Consider the type of data and its structure
Evaluate the scalability and performance requirements
Assess the need for complex queries and transactions
Examples: social media data, IoT data, real-time analytics
To manage multiple insertions of the same file in S3, use versioning and object locking.
Enable versioning on the S3 bucket to keep track of changes to the file.
Use object locking to prevent multiple insertions of the same file at the same time.
Implement a notification system to alert users when a file has been updated.
Consider using a unique identifier for each file to avoid confusion.
Implement a backup and recovery pl
In Cassandra, leaders are responsible for handling read and write requests while followers replicate data.
Leaders are chosen based on their proximity to the client and their ability to handle requests efficiently.
Followers replicate data from the leader and can take over as leader if the current leader fails.
Cassandra uses a gossip protocol to ensure that all nodes are aware of the current leader and follower status.
Le...
AWS CLI commands used as Senior Systems Analyst and Technical Lead
aws s3 ls - List all S3 buckets
aws ec2 describe-instances - Describe all EC2 instances
aws rds describe-db-instances - Describe all RDS instances
aws lambda list-functions - List all Lambda functions
aws cloudformation describe-stacks - Describe all CloudFormation stacks
To make a db entity unmodifiable, use constraints or triggers to prevent updates or deletes.
Use a constraint to prevent updates or deletes on the entity
Create a trigger to roll back any update or delete operation on the entity
Grant read-only access to the entity to prevent modifications
Use database permissions to restrict modification access to the entity
Consider using a separate read-only database for the entity
Spring Data supports various repositories for different data sources
Spring Data JPA for relational databases
Spring Data MongoDB for NoSQL databases
Spring Data Redis for key-value stores
Spring Data Cassandra for column-family stores
Spring Data Neo4j for graph databases
I applied via Naukri.com and was interviewed before Jan 2021. There were 3 interview rounds.
I appeared for an interview before Jun 2021.
Python is a high-level, interpreted programming language used for web development, data analysis, and artificial intelligence.
Python is easy to learn and has a simple syntax.
It supports multiple programming paradigms like object-oriented, functional, and procedural.
Python interpreter is a program that executes Python code.
It converts the code into bytecode and then runs it on the machine.
Python interpreter can be used ...
I applied via Company Website and was interviewed in Aug 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Apr 2021. There were 2 interview rounds.
I applied via Approached by Company and was interviewed before Sep 2021. There were 2 interview rounds.
Technical and output based round
I applied via Campus Placement and was interviewed in Aug 2020. There were 6 interview rounds.
I applied via Referral and was interviewed before Oct 2020. There were 3 interview rounds.
I applied via Referral and was interviewed before Sep 2021. There was 1 interview round.
SGA stands for System Global Area, a shared memory area in Oracle database that stores data and control information.
SGA is a crucial component of Oracle database architecture
It is allocated when the database instance starts up
SGA contains information about database buffers, shared pool, redo log buffer, etc.
SGA size can be configured using initialization parameters
Examples of SGA initialization parameters are DB_CACHE_
Some of the top questions asked at the UST Senior Systems Analyst and Technical Lead interview -
Software Developer
2.1k
salaries
| ₹3.8 L/yr - ₹15.2 L/yr |
Senior Software Engineer
1.6k
salaries
| ₹6.7 L/yr - ₹26 L/yr |
Software Engineer
1.3k
salaries
| ₹3.8 L/yr - ₹15.3 L/yr |
System Analyst
1.1k
salaries
| ₹6.1 L/yr - ₹18.2 L/yr |
Validation Engineer
923
salaries
| ₹2 L/yr - ₹7 L/yr |
Accenture
Wipro
Cognizant
Capgemini