Filter interviews by
Test cases writing and matrix preparation
Top trending discussions
I applied via Approached by Company and was interviewed in Sep 2024. There was 1 interview round.
I worked on a project to develop a mobile application for tracking fitness goals and workouts.
Tested user authentication and registration processes
Performed functional testing on workout tracking features
Conducted regression testing after each new feature implementation
Regression testing is retesting of software to ensure that recent changes have not adversely affected existing features. Regression defects are bugs that reappear after changes.
Regression testing is performed to make sure that new code changes have not introduced any new bugs or caused existing functionalities to break.
It involves re-executing test cases that cover the impacted areas of the software.
Regression defects ...
Verification ensures the product is built right, while validation ensures the right product is built.
Verification focuses on process, validation focuses on product
Verification answers 'Are we building the product right?'
Validation answers 'Are we building the right product?'
Verification is done before validation
Regression tests are run after every significant code change or new feature implementation.
Regression tests are typically run after every significant code change or new feature implementation to ensure that existing functionalities are not affected.
The frequency of running regression tests may vary depending on the project timeline and release cycle.
In Agile development, regression tests are often run as part of the co...
To select the 5th dropdown option, locate the dropdown element and choose the 5th option.
Locate the dropdown element using its unique identifier or class name
Use a method like 'selectByIndex' or 'selectByVisibleText' to choose the 5th option
Verify that the correct option has been selected
Use xpath to locate Google Search tab and Voice search button on the webpage.
For Google Search tab: //input[@name='btnK']
For Voice search button: //div[@aria-label='Search by voice']
Java program to reverse a string without using predefined methods.
Create a char array from the input string.
Use two pointers, one at the start and one at the end, to swap characters.
Continue swapping characters until the pointers meet in the middle.
Some common libraries used for verifying test cases are JUnit, TestNG, Selenium, and RestAssured.
JUnit is a popular Java testing framework for unit testing.
TestNG is another Java testing framework that supports parameterized and data-driven testing.
Selenium is a widely used tool for automating web browsers for testing purposes.
RestAssured is a Java library for testing RESTful APIs.
I applied via campus placement at University of Petroleum and Energy Studies (UPES), Dehradun and was interviewed in Oct 2024. There were 4 interview rounds.
Was easy, basic fundamentals
posted on 8 Nov 2024
I was interviewed in Oct 2024.
I applied via Referral and was interviewed in Aug 2024. There were 2 interview rounds.
SIP call flow involves signaling and media exchange between SIP devices with headers containing important information.
SIP INVITE message is sent to initiate a call
SIP 1xx responses indicate call progress
SIP 2xx response confirms call establishment
SIP ACK message acknowledges call setup
SIP BYE message terminates the call
K8's Deployment refers to the deployment of applications on Kubernetes clusters.
Kubernetes (K8s) is an open-source container orchestration platform used for automating deployment, scaling, and management of containerized applications.
K8s Deployment involves defining the desired state of the application, creating deployment configurations, and managing the deployment process.
Deployment resources in K8s include Pods, Rep...
I applied via Referral and was interviewed in Apr 2024. There were 4 interview rounds.
posted on 18 Nov 2024
Setting up a Linux environment involves installing the operating system, configuring network settings, and installing necessary software.
Install Linux distribution (e.g. Ubuntu, CentOS)
Configure network settings (IP address, DNS, etc.)
Install necessary software (e.g. development tools, testing frameworks)
Set up user accounts and permissions
Linux commands are used to interact with the Linux operating system through the command line interface.
ls - list directory contents
cd - change directory
pwd - print working directory
mkdir - make a new directory
rm - remove files or directories
cp - copy files or directories
mv - move files or directories
grep - search for patterns in files
chmod - change file permissions
sudo - execute a command as the superuser
Find and print the missing number in a given array of strings.
Convert the array of strings to an array of integers for easier manipulation.
Iterate through the array to find the missing number by comparing consecutive elements.
Print the missing number once found.
Reverse a string in an array of strings
Iterate through each string in the array
Use a loop to reverse each string character by character
Store the reversed strings in a new array
To test a faulty ATM, simulate various scenarios like card reader failure, cash dispenser malfunction, network connectivity issues, etc.
Simulate card reader failure by inserting a damaged card or a card with a magnetic strip issue.
Test cash dispenser malfunction by requesting cash withdrawal and observing if the correct amount is dispensed.
Check for network connectivity issues by trying to access online banking service...
The question pertains to a non-disclosure agreement (NDA) and cannot be shared publicly.
Explain that the question is related to a confidential agreement that prohibits sharing certain information.
Mention the importance of respecting NDAs in professional settings.
Provide examples of how NDAs are commonly used in the industry.
Discuss the consequences of violating an NDA.
The candidate was asked a question related to NDA which cannot be shared.
Explain the importance of NDA in protecting confidential information
Discuss the consequences of violating an NDA
Provide examples of how you have handled sensitive information under NDA in previous roles
The question pertains to a non-disclosure agreement (NDA) and cannot be shared.
Explain the importance of NDAs in protecting sensitive information
Discuss the consequences of violating an NDA
Provide examples of how NDAs are commonly used in the tech industry
The question pertains to a non-disclosure agreement (NDA) which cannot be shared.
Explain the importance of NDAs in protecting sensitive information
Discuss the consequences of violating an NDA
Provide examples of how NDAs are commonly used in the tech industry
based on 1 interview
Interview experience
Senior QA Specialist
23
salaries
| ₹11 L/yr - ₹19.5 L/yr |
Project Manager
13
salaries
| ₹16 L/yr - ₹25.5 L/yr |
Senior Business Analyst
10
salaries
| ₹16.7 L/yr - ₹28.9 L/yr |
Senior Software Engineer
9
salaries
| ₹12 L/yr - ₹24.9 L/yr |
Software Developer
8
salaries
| ₹8.1 L/yr - ₹16 L/yr |
TCS
Infosys
Wipro
HCLTech