Filter interviews by
IP address is a unique numerical label assigned to each device connected to a computer network, while MAC address is a unique identifier assigned to network interfaces for communications at the data link layer.
IP address stands for Internet Protocol address and is used for identifying devices on a network.
MAC address stands for Media Access Control address and is a unique identifier assigned to network interfaces.
IP ad...
I applied via Approached by Company and was interviewed in Jul 2022. There was 1 interview round.
Count the number of ways to reach target from source in a grid with 0s and 1s.
Use dynamic programming to solve the problem efficiently.
Traverse the grid using DFS or BFS to count the number of ways.
Consider edge cases like when source and target are the same or when there is no path.
Example: Given grid = [[0,0,0],[0,1,0],[0,0,0]], source = (0,0), target = (2,2), answer is 2.
Example: Given grid = [[0,1],[0,0]], source =
Tech stack for designing a scalable Uber-like service.
Use microservices architecture for scalability and fault tolerance.
Choose a cloud provider with auto-scaling capabilities.
Use a load balancer to distribute traffic across multiple instances.
Use a NoSQL database for high availability and scalability.
Use message queues for asynchronous communication between services.
Use containerization for easy deployment and managem...
Design a service to aggregate multiple sources of data/documentation centrally.
Identify sources of data/documentation
Determine data aggregation method
Design a centralized database to store aggregated data
Develop a user-friendly interface to access the data
Ensure data security and privacy
I took on additional responsibilities to help a colleague with a tight deadline.
Assisted a colleague with a project that had a tight deadline
Took on additional tasks outside of my regular responsibilities
Worked extra hours to ensure the project was completed on time
Provided guidance and support to the colleague throughout the project
I applied via Referral and was interviewed in Jun 2022. There were 4 interview rounds.
Talking end to end of a product you have designed and managed
I applied via LinkedIn and was interviewed in Aug 2022. There were 3 interview rounds.
Visa interview questions for popular designations
I applied via Job Portal and was interviewed before Nov 2023. There was 1 interview round.
HackerRank test which includes find continuos array of target sum
I was interviewed before Apr 2022.
Asked to create unix shell scripts for deployment in weblogic
I applied via Referral and was interviewed before Jun 2022. There were 5 interview rounds.
Hacker rank test based on string manipulation questions
I applied via LinkedIn and was interviewed in Feb 2021. There were 4 interview rounds.
I was interviewed in Jun 2017.
Ajax calls allow for asynchronous communication between client and server without reloading the page.
Ajax stands for Asynchronous JavaScript and XML
Uses XMLHttpRequest object to send and receive data
Allows for partial page updates without reloading the entire page
Can handle data in various formats such as JSON, XML, HTML, and plain text
Example: $.ajax({url: 'example.com', success: function(data){console.log(data)}});
REST is lightweight and uses HTTP while SOAP is XML-based and has more features.
REST uses HTTP methods like GET, POST, PUT, DELETE while SOAP uses XML messaging.
REST is stateless while SOAP can maintain state.
REST is faster and easier to use while SOAP is more secure and reliable.
REST is used for web services while SOAP is used for enterprise-level services.
Example of REST: Twitter API. Example of SOAP: Amazon Web Serv
GET and POST are HTTP methods used for sending data to a server.
GET is used to retrieve data from a server
POST is used to submit data to a server
GET requests can be cached and bookmarked
POST requests are not cached and cannot be bookmarked
GET requests have length restrictions
POST requests have no length restrictions
GET requests are less secure than POST requests
Observer pattern is a design pattern in which an object maintains a list of its dependents and notifies them automatically of any state changes.
Also known as publish-subscribe pattern
Used in event-driven systems
Allows loose coupling between objects
Example: A weather station broadcasts weather updates to multiple displays
Example: A stock market ticker notifies multiple investors of stock price changes
Singleton is a design pattern that restricts the instantiation of a class to a single object.
Singleton ensures that only one instance of a class exists in the entire application.
It provides a global point of access to the instance.
Commonly used in scenarios where a single instance needs to coordinate actions across the system.
Example: Database connection manager, logger, configuration manager.
Immutable in Java refers to objects whose state cannot be changed after creation.
String, Integer, and other wrapper classes are immutable in Java.
Immutable objects are thread-safe and can be shared without synchronization.
To create an immutable class, make all fields final and private, and don't provide setters.
Examples of immutable classes in Java include LocalDate, LocalTime, and LocalDateTime.
Creating immutable in Java
Use final keyword to make variables immutable
Use private constructor to prevent object modification
Use defensive copying to prevent modification of mutable objects
Use enum to create immutable objects
Use String class to create immutable strings
Dependency injection is a design pattern that allows objects to receive dependencies rather than creating them internally.
It helps to decouple the code and makes it more testable and maintainable.
It allows for easier swapping of dependencies without changing the code.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Example: Instead of creating a database co...
CORS stands for Cross-Origin Resource Sharing. It is a security feature implemented in web browsers to restrict access to resources from different origins.
CORS allows web servers to specify which origins are allowed to access its resources
It is implemented using HTTP headers
CORS prevents malicious websites from accessing sensitive data from other websites
Examples of resources that may be restricted by CORS include cook
CORS can be overcome by configuring the server to allow cross-origin requests.
Configure the server to include the Access-Control-Allow-Origin header
Use JSONP (JSON with Padding) to bypass CORS restrictions
Use a proxy server to make the request on behalf of the client
Use a browser extension to disable CORS restrictions during development
Use a server-side proxy to forward requests to the target server
Some of the top questions asked at the Visa interview for experienced candidates -
The duration of Visa interview process can vary, but typically it takes about less than 2 weeks to complete.
Interview experience
Senior Software Engineer
601
salaries
| ₹12.3 L/yr - ₹44 L/yr |
Software Engineer
175
salaries
| ₹11 L/yr - ₹34.6 L/yr |
Staff Software Engineer
140
salaries
| ₹24.8 L/yr - ₹60 L/yr |
Senior Software Test Engineer
84
salaries
| ₹18 L/yr - ₹40 L/yr |
Senior Data Engineer
83
salaries
| ₹20 L/yr - ₹42 L/yr |
MasterCard
American Express
PayPal
State Bank of India