i
UST
Work with us
Filter interviews by
Microservice architecture is a design approach where applications are built as a collection of loosely coupled services.
Each microservice is responsible for a specific business capability, e.g., user authentication service.
Microservices communicate over lightweight protocols, typically HTTP/REST or messaging queues.
They can be developed, deployed, and scaled independently, allowing for greater flexibility.
Microser...
Yes, we can explicitly create a string in the string pool using string literals.
String literals are stored in the string pool by default. Example: String str = "Hello";
Using the 'new' keyword creates a string object in the heap, not in the pool. Example: String str2 = new String("Hello");
To explicitly add a string to the pool, use the intern() method. Example: String str3 = str2.intern();
Estimating the number of EV charging stations in India involves analyzing population, vehicle ownership, and infrastructure needs.
India has a population of approximately 1.4 billion, with a growing number of electric vehicles (EVs).
Assuming 1 EV per 10 households, with 300 million households, we estimate 30 million EVs.
A typical EV charging station can serve about 10-15 EVs per day.
To meet demand, India may need a...
IIM A offers a rigorous curriculum, diverse peer group, and extensive networking opportunities compared to my college.
IIM A has a globally recognized faculty with industry experience, while my college may have a more localized faculty.
The curriculum at IIM A is designed to be more challenging and case-study oriented, enhancing practical learning.
IIM A attracts a diverse cohort from various backgrounds, providing a...
Testing methodologies ensure software quality through structured approaches like unit, integration, and system testing.
Unit Testing: Tests individual components for correctness (e.g., testing a function in isolation).
Integration Testing: Validates the interaction between integrated components (e.g., testing APIs between services).
System Testing: Evaluates the complete system's compliance with requirements (e.g., e...
Regression testing ensures that new code changes do not adversely affect existing functionalities.
Verifies that recent changes haven't introduced new bugs.
Can be automated to save time and increase efficiency.
Example: After a software update, testing login functionality to ensure it still works.
Involves re-running previously completed tests to confirm unchanged behavior.
Critical in maintaining software quality dur...
Adjustment refers to modifying an entry, while duplicate indicates a repeated or copied entry.
Adjustment involves correcting or modifying an existing record, e.g., changing a billing amount due to a discount.
Duplicate refers to an entry that is repeated, e.g., entering the same invoice twice in a system.
Adjustments can be made to rectify errors, while duplicates often require deletion or merging.
In accounting, an ...
Assessing the validity of a claim involves critical evaluation of evidence, sources, and context.
Evaluate the source: Check the credibility of the person or organization making the claim. For example, a claim from a peer-reviewed journal is more reliable than one from a blog.
Examine the evidence: Look for data, studies, or statistics that support the claim. For instance, if a health claim is made, verify if there ...
OOP is a programming paradigm based on objects that encapsulate data and behavior, promoting modularity and reusability.
Encapsulation: Bundling data and methods that operate on the data within one unit (e.g., a class).
Inheritance: Mechanism to create a new class from an existing class, inheriting attributes and methods (e.g., a 'Dog' class inheriting from an 'Animal' class).
Polymorphism: Ability to present the sam...
Security in an IT firm encompasses protecting data, systems, and networks from threats and vulnerabilities.
Data Protection: Ensuring sensitive information is encrypted and access is restricted. For example, using AES encryption for databases.
Network Security: Implementing firewalls and intrusion detection systems to monitor and protect network traffic.
Application Security: Regularly updating software and conductin...
I appeared for an interview in Jan 2025.
Method overloading is having multiple methods in the same class with the same name but different parameters. Method overriding is having a method in a subclass with the same name and parameters as a method in its superclass.
Method overloading is achieved by having multiple methods in the same class with the same name but different parameters.
Method overriding is achieved by having a method in a subclass with the same n...
I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.
Create a k8s deployment ymal with rolling update for a given docker image
Define a Deployment object in the YAML file
Specify the container image in the spec section
Set the update strategy to RollingUpdate
Define the number of replicas for the deployment
A method to read a JSON file and recursively retrieve values associated with a specified key.
Use a programming language like Python or JavaScript to read the JSON file.
Implement a recursive function that traverses the JSON structure.
Check if the current element is a dictionary or a list to continue recursion.
Example in Python: def get_value(data, key): if isinstance(data, dict): for k, v in data.items(): if k == key: y...
Java program to perform validations on input data.
Use regular expressions to validate input data.
Implement custom validation logic for specific requirements.
Utilize Java libraries like Apache Commons Validator for common validation tasks.
The cred operations refer to the actions related to credentials in a software system.
Cred operations typically involve tasks such as creating, updating, deleting, and verifying user credentials.
Examples of cred operations include user registration, password reset, and authentication processes.
These operations are crucial for ensuring secure access to the software system and protecting user data.
I applied via Approached by Company and was interviewed in Sep 2024. There were 2 interview rounds.
Using stream and lambda to find numbers starting with 1 from list of Integers.
Use stream to filter the list of Integers based on the condition that the number starts with 1.
Use lambda expression to define the condition for filtering.
Convert the filtered numbers to strings and store them in an array.
Merge two lists of integers and remove duplicates in the result list.
Create a new list to store the merged result.
Iterate through each element in both lists and add them to the result list if they are not already present.
Use a set to keep track of duplicates and avoid adding them to the result list.
I applied via Job Fair and was interviewed in Nov 2024. There were 2 interview rounds.
I applied via Company Website and was interviewed in Nov 2024. There were 3 interview rounds.
A standard online test conducted through one of the testing platforms.
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
I appeared for an interview in Apr 2025, where I was asked the following questions.
What people are saying about UST
Some of the top questions asked at the UST interview -
The duration of UST interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 438 interview experiences
Difficulty level
Duration
Thiruvananthapuram
12-15 Yrs
Not Disclosed
Software Developer
2.2k
salaries
| ₹4.1 L/yr - ₹20.7 L/yr |
Senior Software Engineer
1.7k
salaries
| ₹12.7 L/yr - ₹23.8 L/yr |
Software Engineer
1.4k
salaries
| ₹3.2 L/yr - ₹15.6 L/yr |
System Analyst
1.1k
salaries
| ₹6.3 L/yr - ₹22.6 L/yr |
Senior Software Developer
948
salaries
| ₹10.4 L/yr - ₹17.3 L/yr |
Accenture
Wipro
Cognizant
Capgemini