i
UST
Work with us
Filter interviews by
Estimating the number of EV charging stations in India involves analyzing population, vehicle ownership, and infrastructure needs.
India has a population of approximately 1.4 billion, with a growing number of electric vehicles (EVs).
Assuming 1 EV per 10 households, with 300 million households, we estimate 30 million EVs.
A typical EV charging station can serve about 10-15 EVs per day.
To meet demand, India may need a...
Testing methodologies ensure software quality through structured approaches like unit, integration, and system testing.
Unit Testing: Tests individual components for correctness (e.g., testing a function in isolation).
Integration Testing: Validates the interaction between integrated components (e.g., testing APIs between services).
System Testing: Evaluates the complete system's compliance with requirements (e.g., e...
Adjustment refers to modifying an entry, while duplicate indicates a repeated or copied entry.
Adjustment involves correcting or modifying an existing record, e.g., changing a billing amount due to a discount.
Duplicate refers to an entry that is repeated, e.g., entering the same invoice twice in a system.
Adjustments can be made to rectify errors, while duplicates often require deletion or merging.
In accounting, an ...
Assessing the validity of a claim involves critical evaluation of evidence, sources, and context.
Evaluate the source: Check the credibility of the person or organization making the claim. For example, a claim from a peer-reviewed journal is more reliable than one from a blog.
Examine the evidence: Look for data, studies, or statistics that support the claim. For instance, if a health claim is made, verify if there ...
OOP is a programming paradigm based on objects that encapsulate data and behavior, promoting modularity and reusability.
Encapsulation: Bundling data and methods that operate on the data within one unit (e.g., a class).
Inheritance: Mechanism to create a new class from an existing class, inheriting attributes and methods (e.g., a 'Dog' class inheriting from an 'Animal' class).
Polymorphism: Ability to present the sam...
Security in an IT firm encompasses protecting data, systems, and networks from threats and vulnerabilities.
Data Protection: Ensuring sensitive information is encrypted and access is restricted. For example, using AES encryption for databases.
Network Security: Implementing firewalls and intrusion detection systems to monitor and protect network traffic.
Application Security: Regularly updating software and conductin...
Active Directory is a directory service by Microsoft for managing users, computers, and resources in a networked environment.
Centralized management of user accounts and permissions.
Supports Group Policy for enforcing security settings across devices.
Facilitates single sign-on (SSO) for users accessing multiple services.
Organizes resources in a hierarchical structure using domains, trees, and forests.
Integrates wit...
The OSI model is a conceptual framework used to understand network communication in seven layers.
Layer 1: Physical - Deals with the physical connection (e.g., cables, switches).
Layer 2: Data Link - Manages node-to-node data transfer (e.g., Ethernet).
Layer 3: Network - Handles routing of data (e.g., IP addresses).
Layer 4: Transport - Ensures complete data transfer (e.g., TCP, UDP).
Layer 5: Session - Manages session...
A Web API is an interface that allows different software applications to communicate over the internet using standard protocols.
Web APIs use HTTP requests to access and manipulate data.
Common formats for data exchange include JSON and XML.
Examples include RESTful APIs (like Twitter API) and SOAP APIs (like some banking services).
Web APIs enable integration between different systems, such as mobile apps and web ser...
React hooks are functions that let you use state and other React features without writing a class.
Hooks allow functional components to manage state and lifecycle events.
Common hooks include useState for state management and useEffect for side effects.
Example of useState: const [count, setCount] = useState(0);
Example of useEffect: useEffect(() => { document.title = `Count: ${count}`; }, [count]);
Custom hooks can...
I appeared for an interview in Jan 2025.
Perform a full outer join without using the join keyword
Use UNION to combine the results of a LEFT JOIN and a RIGHT JOIN
Include a WHERE clause to filter out rows that are present in both tables
Use COALESCE function to handle NULL values
I appeared for an interview in Jan 2025.
Method overloading is having multiple methods in the same class with the same name but different parameters. Method overriding is having a method in a subclass with the same name and parameters as a method in its superclass.
Method overloading is achieved by having multiple methods in the same class with the same name but different parameters.
Method overriding is achieved by having a method in a subclass with the same n...
I appeared for an interview in Dec 2024, where I was asked the following questions.
Yes, we can explicitly create a string in the string pool using string literals.
String literals are stored in the string pool by default. Example: String str = "Hello";
Using the 'new' keyword creates a string object in the heap, not in the pool. Example: String str2 = new String("Hello");
To explicitly add a string to the pool, use the intern() method. Example: String str3 = str2.intern();
Microservice architecture is a design approach where applications are built as a collection of loosely coupled services.
Each microservice is responsible for a specific business capability, e.g., user authentication service.
Microservices communicate over lightweight protocols, typically HTTP/REST or messaging queues.
They can be developed, deployed, and scaled independently, allowing for greater flexibility.
Microservices...
I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.
Create a k8s deployment ymal with rolling update for a given docker image
Define a Deployment object in the YAML file
Specify the container image in the spec section
Set the update strategy to RollingUpdate
Define the number of replicas for the deployment
A method to read a JSON file and recursively retrieve values associated with a specified key.
Use a programming language like Python or JavaScript to read the JSON file.
Implement a recursive function that traverses the JSON structure.
Check if the current element is a dictionary or a list to continue recursion.
Example in Python: def get_value(data, key): if isinstance(data, dict): for k, v in data.items(): if k == key: y...
Java program to perform validations on input data.
Use regular expressions to validate input data.
Implement custom validation logic for specific requirements.
Utilize Java libraries like Apache Commons Validator for common validation tasks.
The cred operations refer to the actions related to credentials in a software system.
Cred operations typically involve tasks such as creating, updating, deleting, and verifying user credentials.
Examples of cred operations include user registration, password reset, and authentication processes.
These operations are crucial for ensuring secure access to the software system and protecting user data.
I applied via Approached by Company and was interviewed in Sep 2024. There were 2 interview rounds.
Using stream and lambda to find numbers starting with 1 from list of Integers.
Use stream to filter the list of Integers based on the condition that the number starts with 1.
Use lambda expression to define the condition for filtering.
Convert the filtered numbers to strings and store them in an array.
Merge two lists of integers and remove duplicates in the result list.
Create a new list to store the merged result.
Iterate through each element in both lists and add them to the result list if they are not already present.
Use a set to keep track of duplicates and avoid adding them to the result list.
I applied via Job Fair and was interviewed in Nov 2024. There were 2 interview rounds.
I applied via Company Website and was interviewed in Nov 2024. There were 3 interview rounds.
A standard online test conducted through one of the testing platforms.
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
What people are saying about UST
Some of the top questions asked at the UST interview -
The duration of UST interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 438 interview experiences
Difficulty level
Duration
Software Developer
2.2k
salaries
| ₹4.1 L/yr - ₹19.5 L/yr |
Senior Software Engineer
1.7k
salaries
| ₹7 L/yr - ₹28.5 L/yr |
Software Engineer
1.5k
salaries
| ₹3.8 L/yr - ₹15 L/yr |
System Analyst
1.1k
salaries
| ₹6.3 L/yr - ₹22.6 L/yr |
Senior Software Developer
957
salaries
| ₹5.5 L/yr - ₹20.5 L/yr |
Accenture
Wipro
Cognizant
Capgemini