Add office photos
Employer?
Claim Account for FREE

Visa

3.7
based on 328 Reviews
Filter interviews by

100+ Interview Questions and Answers

Updated 24 Nov 2024
Popular Designations
Q1. Maximum equal elements after K operations

You are given an arbitrary array/list of integers 'ARR' of size ‘N’ and an integer ‘K’. You need to find the maximum number of elements which can be made equal to each o...read more

View 3 more answers
Q2. Stock Buy and Sell

You have been given an array 'PRICES' consisting of 'N' integers where PRICES[i] denotes the price of a given stock on the i-th day. You are also given an integer 'K' denoting the number of po...read more

View 4 more answers
Q3. Ninja And The Dance Competetion

Ninja has been asked to organize a dance competition. Ninja decided that he will take individual entries and then will divide them into pairs. As part of the entry, he asked the p...read more

View 3 more answers

Q4. Given a grid containing 0s and 1s and source row and column, in how many ways, could we reach form source to target. ( 1's represents a blockade and 0's represent accessable points)

Ans.

Count the number of ways to reach target from source in a grid with 0s and 1s.

  • Use dynamic programming to solve the problem efficiently.

  • Traverse the grid using DFS or BFS to count the number of ways.

  • Consider edge cases like when source and target are the same or when there is no path.

  • Example: Given grid = [[0,0,0],[0,1,0],[0,0,0]], source = (0,0), target = (2,2), answer is 2.

  • Example: Given grid = [[0,1],[0,0]], source = (0,0), target = (1,1), answer is 1.

View 1 answer
Discover null interview dos and don'ts from real experiences
Q5. Maximum length sub-array having absolute difference of adjacent elements either 0 or 1.

Given an array ‘A’ of ‘N’ integers, you need to find the maximum length of the sub-array such that the absolute difference ...read more

View 3 more answers

Q6. Given 2 game scenarios for basketball, and given p as the probability of making a basket in an attempt, I have to understand the condition where game1 would be preferable over game2. In first game, I have one t...

read more
Ans.

Comparing 2 basketball game scenarios with different number of trials and baskets required to win

  • Calculate the probability of winning in each game scenario using binomial distribution formula

  • Compare the probabilities to determine which game scenario is preferable

  • In game1, the probability of winning is p. In game2, the probability of winning is the sum of probabilities of making 2 or 3 baskets

  • If p is high, game1 is preferable. If p is low, game2 is preferable

  • For example, if p ...read more

Add your answer
Are these interview questions helpful?
Q7. Sorted order printing of a given array that represents a BST

You have been given a Binary Tree of 'N' nodes, where the nodes have integer values. Your task is to find the In-Order traversal of the given binary t...read more

View 4 more answers
Q8. LRU Cache Implementation

Design and implement a data structure for Least Recently Used (LRU) cache to support the following operations:

1. get(key) - Return the value of the key if the key exists in the cache, o...read more
View 3 more answers
Share interview questions and help millions of jobseekers 🌟
Q9. Valid String

You have been given a string 'S' containing only three types of characters, i.e. '(', ')' and '*'.

A Valid String is defined as follows:

1. Any left parenthesis '(' must have a corresponding right ...read more
View 3 more answers
Q10. Number of Pairs with Given Sum

You have been given an integer array/list(arr) and a number 'Sum'. Find and return the total number of pairs in the array/list which when added, results equal to the 'Sum'.

Note:
G...read more
View 4 more answers
Q11. Longest Common Subsequence

You have been given two Strings “STR1” and “STR2” of characters. Your task is to find the length of the longest common subsequence.

A String ‘a’ is a subsequence of a String ‘b’ if ‘a’...read more

View 4 more answers
Q12. System Design problem

What to do if there are too many requests to a web server? Don’t know if they’re correct. I feel it was a more test to see your critical thinking and acquired knowledge.

Add your answer
Q13. Minimum Cost to Reach End

You are given an array “ARR” of 'N' integers and an integer 'K'. You can move from any index 'i' to index 'j' if j ≤ i + K. The cost of moving from one index 'i' to the other index 'j' ...read more

Add your answer

Q14. 1. High Level System Design -> Design Uber like Service. Follow up -> What would be your tech stack for designing such a service to make sure it could scale when needed.

Ans.

Tech stack for designing a scalable Uber-like service.

  • Use microservices architecture for scalability and fault tolerance.

  • Choose a cloud provider with auto-scaling capabilities.

  • Use a load balancer to distribute traffic across multiple instances.

  • Use a NoSQL database for high availability and scalability.

  • Use message queues for asynchronous communication between services.

  • Use containerization for easy deployment and management.

  • Use caching to improve performance.

  • Use monitoring and ...read more

View 1 answer
Q15. Four Keys Keyboard

Imagine you have a special keyboard with the following four keys:

Key 1: (A): Print one ‘A’ on screen. Key 2: (Ctrl-A): Select the whole screen. Key 3: (Ctrl-C): Copy selection to buffer. Key ...read more
View 4 more answers
Q16. Second Most Repeated Word

You are given an array of strings ‘ARR’. You have to find out the second most repeated word in the array ‘ARR’. It is guaranteed every string occurs a unique number of times in the arra...read more

Add your answer
Q17. Graph Connectivity Queries.

You have been given a graph consisting of ‘N’ nodes and a threshold value ‘THRESHOLDVALUE’. Two different nodes ‘X’ and ‘Y’ are directly connected to each other if and only if there e...read more

View 2 more answers
Q18. N Queens

You are given an integer 'N'. For a given 'N' x 'N' chessboard, find a way to place 'N' queens such that no queen can attack any other queen on the chessboard.

A queen can be killed when it lies in the ...read more

View 2 more answers

Q19. (HLD) -> Design a service which combines multiple sources of data/documentation and aggregates it such that all info is available centrally.

Ans.

Design a service to aggregate multiple sources of data/documentation centrally.

  • Identify sources of data/documentation

  • Determine data aggregation method

  • Design a centralized database to store aggregated data

  • Develop a user-friendly interface to access the data

  • Ensure data security and privacy

Add your answer
Q20. Basic HR Questions

Q1. What are the three problems Chennai faces?
Q2. Which one would you solve and how and why?
Q3. What is the most interesting thing about Visa?

Add your answer
Q21. Snake and Ladder

You have been given a Snake and Ladder Board with 'N' rows and 'N' columns with the numbers written from 1 to (N*N) starting from the bottom left of the board, and alternating direction each row...read more

Add your answer
Q22. Design Pattern Question

What is Observer Pattern?

Add your answer
Q23. Java Question

How to create an immutable class in java?

Add your answer

Q24. What is most interesting thing about Visa?

Ans.

Visa is a global payments technology company that connects consumers, businesses, banks and governments in more than 200 countries and territories.

  • Visa operates the world's largest retail electronic payments network.

  • VisaNet, the company's global processing system, handles more than 65,000 transaction messages a second.

  • Visa is constantly innovating to improve payment security and convenience, with initiatives such as Visa Checkout and tokenization.

  • Visa is committed to financia...read more

Add your answer

Q25. What is race condition and how can it be eliminated

Ans.

Race condition is a situation where multiple threads/processes access and manipulate shared data simultaneously.

  • It can be eliminated by using synchronization techniques like locks, semaphores, and mutexes.

  • Another way is to use atomic operations that ensure the data is accessed and modified atomically.

  • Using thread-safe data structures can also prevent race conditions.

  • Example: Two threads trying to increment a shared variable simultaneously can cause a race condition.

  • Example: U...read more

Add your answer

Q26. Given a monolith architecture, how would you scale it to handle 3x the traffic and also improve response time on API's during peak hours by using cache

Ans.

To scale a monolith architecture and improve response time, use horizontal scaling and implement caching.

  • Implement horizontal scaling by adding more instances of the monolith application behind a load balancer

  • Use a distributed cache to store frequently accessed data and reduce database queries

  • Implement caching at different levels such as application-level caching, database query caching, and HTTP response caching

  • Use a caching strategy based on the data access patterns and exp...read more

Add your answer
Q27. Software Engineering Question

What is dependency injection?

Add your answer

Q28. Which one would you solve and how and why?

Ans.

Need more context on the question to provide an answer.

  • Please provide more information on the problem to be solved.

  • Without context, it is difficult to provide a solution.

  • Can you please provide more details on the problem statement?

Add your answer

Q29. Analytic que- Two trains start from equator and start running in different direction and they will never collide…so which train will have more wear n tear first…9use concept of rotation,relative motion and air ...

read more
Ans.

Two trains starting from equator in opposite directions will not collide. Which train will have more wear and tear first?

  • The train moving towards the east will have more wear and tear due to the rotation of the earth

  • The train moving towards the west will have less wear and tear due to the rotation of the earth

  • Air resistance will also affect the wear and tear of the trains

  • The train moving towards the east will face more air resistance than the train moving towards the west

Add your answer
Q30. Java Question

What is immutable in java?

Add your answer

Q31. Given two sorted arrays, a (m elements, size m+n) and b (n elements, size n) merge both the arrays into the first array a.

Ans.

Merge two sorted arrays into the first array

  • Start from the end of both arrays and compare elements

  • Place the larger element at the end of the first array

  • Continue this process until all elements are merged

Add your answer

Q32. Given the above Binary search tree, print in ascending order

Ans.

Print the given Binary search tree in ascending order

  • Traverse the left subtree recursively

  • Print the root node

  • Traverse the right subtree recursively

Add your answer

Q33. What are three problems Chennai faces?

Ans.

Chennai faces problems related to water scarcity, traffic congestion, and pollution.

  • Water scarcity due to inadequate rainfall and poor management of water resources.

  • Traffic congestion due to the increasing number of vehicles and poor road infrastructure.

  • Pollution caused by industries, vehicular emissions, and improper waste disposal.

Add your answer

Q34. Given an array, Implement Binary search tree

Ans.

Implement Binary Search Tree using given array of strings.

  • Sort the array in ascending order

  • Find the middle element and make it the root of the tree

  • Recursively create left and right subtrees using the left and right halves of the array

  • Repeat until all elements are added to the tree

Add your answer
Q35. OOPS Question

What is singleton class?

Add your answer

Q36. how does ajax call work

Ans.

Ajax calls allow for asynchronous communication between client and server without reloading the page.

  • Ajax stands for Asynchronous JavaScript and XML

  • Uses XMLHttpRequest object to send and receive data

  • Allows for partial page updates without reloading the entire page

  • Can handle data in various formats such as JSON, XML, HTML, and plain text

  • Example: $.ajax({url: 'example.com', success: function(data){console.log(data)}});

View 1 answer

Q37. how do you create immutable in java

Ans.

Creating immutable in Java

  • Use final keyword to make variables immutable

  • Use private constructor to prevent object modification

  • Use defensive copying to prevent modification of mutable objects

  • Use enum to create immutable objects

  • Use String class to create immutable strings

Add your answer
Q38. API Question

Difference between SOAP and REST

Add your answer

Q39. Class design for a cache implementation, implement get(), put(), initialization methods

Ans.

Design a cache class with get(), put(), and initialization methods.

  • Define a class with a data structure to store key-value pairs.

  • Implement a get() method to retrieve a value from the cache based on a given key.

  • Implement a put() method to add or update a key-value pair in the cache.

  • Implement an initialization method to set the initial capacity and eviction policy of the cache.

  • Consider using a hash map or a linked list to store the key-value pairs efficiently.

  • Handle cache size ...read more

Add your answer
Q40. AJAX Question

How does AJAX work?

Add your answer

Q41. where have you used immutable in java

Ans.

Immutable is used in Java to create objects whose state cannot be changed after creation.

  • Immutable objects are thread-safe and can be shared without the risk of data corruption.

  • Examples of immutable classes in Java include String, Integer, and LocalDate.

  • Immutable objects can be created using the final keyword, constructor initialization, and static factory methods.

Add your answer

Q42. explain the react lifecycle functions and how they work

Ans.

React lifecycle functions are methods that are automatically called at specific points in a component's life cycle.

  • Mounting: constructor, render, componentDidMount

  • Updating: render, componentDidUpdate

  • Unmounting: componentWillUnmount

Add your answer

Q43. How Visa works Can you design a scalable file access system like dropbox or google drive?

Ans.

Visa is a payment processing company that facilitates electronic funds transfers globally.

  • Visa operates a network that connects financial institutions, merchants, and consumers worldwide.

  • The company provides payment products and services, including credit and debit cards, prepaid cards, and digital wallets.

  • Visa's payment processing system involves authorization, clearing, and settlement of transactions.

  • To design a scalable file access system like Dropbox or Google Drive, one ...read more

Add your answer
Q44. API Question

Difference between GET and POST

Add your answer

Q45. What is your project? If you are going to deploy this for commercial use, what additional aspects to be taken care of?

Ans.

My project is a mobile app that helps users track their daily exercise and nutrition.

  • Ensure the app is user-friendly and intuitive

  • Implement a secure login and authentication system

  • Integrate with fitness trackers and nutrition databases

  • Perform thorough testing and bug fixing

  • Consider scalability and performance optimization

  • Implement a monetization strategy for commercial use

Add your answer

Q46. Where should u prefer BUS topology instead of ring topology and vice verse

Ans.

BUS topology is preferred for small networks while ring topology is preferred for larger networks.

  • BUS topology is easier to install and maintain than ring topology.

  • Ring topology is more fault-tolerant than BUS topology.

  • BUS topology is suitable for small networks with few devices while ring topology is suitable for larger networks with many devices.

  • Ring topology is more expensive than BUS topology.

  • Examples of BUS topology include Ethernet and USB while examples of ring topolog...read more

Add your answer

Q47. Explain the Concepts of OOPS , abstraction inheritance polymorphism and encapsulation.

Ans.

OOPS concepts include abstraction, inheritance, polymorphism, and encapsulation.

  • Abstraction: Hiding implementation details and showing only necessary information.

  • Inheritance: Creating new classes from existing ones, inheriting properties and methods.

  • Polymorphism: Using a single method to perform different actions based on the object type.

  • Encapsulation: Binding data and methods together, protecting data from outside interference.

Add your answer

Q48. Calculate the time taken by kth person to collect n number of tickets

Ans.

The time taken by the kth person to collect n number of tickets can be calculated using a formula.

  • Use the formula: time = (n - 1) * k

  • Subtract 1 from n because the first person doesn't need to wait for anyone

  • Multiply the result by k to get the time taken by the kth person

  • Example: If n = 5 and k = 3, the time taken by the 3rd person would be (5 - 1) * 3 = 12

Add your answer

Q49. What all things do you find on a cerdit/debit card?

Ans.

A credit/debit card typically contains the cardholder's name, card number, expiration date, and security code.

  • Cardholder's name

  • Card number

  • Expiration date

  • Security code/CVV

  • Card issuer logo

  • Magnetic stripe

  • Chip

  • Contactless payment symbol

Add your answer

Q50. what is observer pattern

Ans.

Observer pattern is a design pattern in which an object maintains a list of its dependents and notifies them automatically of any state changes.

  • Also known as publish-subscribe pattern

  • Used in event-driven systems

  • Allows loose coupling between objects

  • Example: A weather station broadcasts weather updates to multiple displays

  • Example: A stock market ticker notifies multiple investors of stock price changes

Add your answer

Q51. Unit Testing (Code a given problem and generate test cases for unit testing)

Ans.

Unit testing involves testing individual units of code to ensure they function as expected.

  • Identify the individual units of code to be tested

  • Create test cases for each unit, covering all possible scenarios

  • Execute the tests and analyze the results

  • Refactor the code as necessary based on the test results

Add your answer

Q52. Which application you are using to connect servers?

Ans.

I primarily use SSH (Secure Shell) to connect servers.

  • SSH (Secure Shell) is a widely used application for securely connecting to servers

  • Other applications like PuTTY, OpenSSH, and WinSCP can also be used for server connections

Add your answer

Q53. Explain Testing principles and Design principles

Ans.

Testing principles ensure software quality, while design principles guide software development.

  • Testing principles include unit testing, integration testing, and acceptance testing.

  • Design principles include SOLID, DRY, and KISS.

  • Testing principles ensure that software meets requirements and is free of defects.

  • Design principles guide software development to be modular, maintainable, and scalable.

Add your answer

Q54. difference between REST and SOAP

Ans.

REST is lightweight and uses HTTP while SOAP is XML-based and has more features.

  • REST uses HTTP methods like GET, POST, PUT, DELETE while SOAP uses XML messaging.

  • REST is stateless while SOAP can maintain state.

  • REST is faster and easier to use while SOAP is more secure and reliable.

  • REST is used for web services while SOAP is used for enterprise-level services.

  • Example of REST: Twitter API. Example of SOAP: Amazon Web Services.

Add your answer

Q55. how would you propose a solution to DoS , network attacks

Ans.

A multi-layered approach is needed to prevent DoS and network attacks.

  • Implement firewalls and intrusion detection systems

  • Use load balancers to distribute traffic

  • Regularly update software and security patches

  • Limit access to sensitive data and systems

  • Educate employees on safe browsing habits and phishing scams

Add your answer

Q56. Design a custom data structure based on requirement

Ans.

Custom data structure for array of strings

  • Use a trie data structure to efficiently store and search for strings

  • Implement methods for adding, removing, and searching for strings in the trie

  • Consider optimizing the trie for memory usage and performance

Add your answer

Q57. internal working - of DB structures and indices etc

Ans.

Understanding internal workings of DB structures and indices is crucial for optimizing database performance.

  • DB structures refer to how data is organized within a database, such as tables, columns, and relationships.

  • Indices are data structures that improve the speed of data retrieval operations by providing quick access to specific data values.

  • Understanding how indices work can help in optimizing query performance by reducing the number of rows that need to be scanned.

  • Common t...read more

Add your answer

Q58. css box model, difference between padding and margin

Ans.

Padding is the space inside the border of an element, while margin is the space outside the border.

  • Padding is used to create space between the content and the border of an element.

  • Margin is used to create space between the border of an element and other elements.

  • Padding affects the size of the content area, while margin affects the positioning of the element.

  • Example: padding: 10px will create 10 pixels of space inside the border of an element.

  • Example: margin: 20px will create...read more

Add your answer

Q59. What kind of data mining can be done on VISA data? What are the uses?

Ans.

Data mining on VISA data can provide insights on consumer spending patterns and fraud detection.

  • Identifying consumer spending habits and preferences

  • Detecting fraudulent transactions and patterns

  • Analyzing purchasing trends and market behavior

  • Predicting customer churn and loyalty

  • Optimizing marketing campaigns and personalized offers

Add your answer

Q60. what is immutable in java

Ans.

Immutable in Java refers to objects whose state cannot be changed after creation.

  • String, Integer, and other wrapper classes are immutable in Java.

  • Immutable objects are thread-safe and can be shared without synchronization.

  • To create an immutable class, make all fields final and private, and don't provide setters.

  • Examples of immutable classes in Java include LocalDate, LocalTime, and LocalDateTime.

Add your answer

Q61. what is dependency injection

Ans.

Dependency injection is a design pattern that allows objects to receive dependencies rather than creating them internally.

  • It helps to decouple the code and makes it more testable and maintainable.

  • It allows for easier swapping of dependencies without changing the code.

  • There are three types of dependency injection: constructor injection, setter injection, and interface injection.

  • Example: Instead of creating a database connection object inside a class, the object is passed as a ...read more

Add your answer

Q62. N-Queens, Snake and Ladder Problem, Second Most repeated word in a sequence

Ans.

These are three different programming problems that require different approaches to solve.

  • N-Queens: placing N queens on an NxN chessboard so that no two queens threaten each other

  • Snake and Ladder Problem: finding the minimum number of dice rolls to reach the end of a board with snakes and ladders

  • Second Most Repeated Word in a Sequence: finding the second most frequently occurring word in a given sequence of words

Add your answer

Q63. write code in python using pandas to perform certain tasks

Ans.

Using pandas in Python to perform tasks for a Software Engineer interview question

  • Import pandas library

  • Read data from a CSV file using pandas

  • Perform data manipulation and analysis using pandas functions

  • Write the processed data back to a new CSV file

Add your answer

Q64. How would modify a gmail notifier ?

Ans.

To modify a Gmail notifier, you can customize its appearance, add additional features, or integrate it with other applications.

  • Customize the notifier's appearance by changing its color, font, or notification sound.

  • Add additional features such as the ability to mark emails as read or reply directly from the notifier.

  • Integrate the notifier with other applications like a task manager or calendar to display reminders or deadlines.

  • Implement filters to only receive notifications fo...read more

View 1 answer

Q65. What is regression testing?

Ans.

Regression testing is the process of testing changes made to a software application to ensure that existing functionality still works.

  • It is performed after making changes to the software

  • It ensures that existing functionality is not affected by the changes

  • It helps to catch any defects or bugs that may have been introduced

  • It can be automated using testing tools

  • Examples include retesting after bug fixes, testing after new features are added

Add your answer

Q66. what is GET and POST

Ans.

GET and POST are HTTP methods used for sending data to a server.

  • GET is used to retrieve data from a server

  • POST is used to submit data to a server

  • GET requests can be cached and bookmarked

  • POST requests are not cached and cannot be bookmarked

  • GET requests have length restrictions

  • POST requests have no length restrictions

  • GET requests are less secure than POST requests

Add your answer

Q67. Design autocomplete in IDEs

Ans.

Autocomplete in IDEs helps developers write code faster by suggesting code snippets and completing code as they type.

  • Autocomplete should suggest code snippets based on the context of the code being written

  • Autocomplete should prioritize suggestions based on frequency of use

  • Autocomplete should also suggest variable and function names

  • Autocomplete should be customizable to allow for user-defined snippets and suggestions

  • Examples of IDEs with autocomplete include Visual Studio Code...read more

Add your answer

Q68. what is CORS

Ans.

CORS stands for Cross-Origin Resource Sharing. It is a security feature implemented in web browsers to restrict access to resources from different origins.

  • CORS allows web servers to specify which origins are allowed to access its resources

  • It is implemented using HTTP headers

  • CORS prevents malicious websites from accessing sensitive data from other websites

  • Examples of resources that may be restricted by CORS include cookies, scripts, and APIs

Add your answer

Q69. How do you support application for sso enablement?

Ans.

Supporting application for SSO enablement involves configuring authentication settings, integrating with identity providers, and testing functionality.

  • Configure authentication settings within the application to enable SSO

  • Integrate the application with identity providers such as Okta, Azure AD, or PingFederate

  • Test the SSO functionality to ensure seamless user experience

  • Provide documentation and training for users on how to use SSO with the application

Add your answer

Q70. How do you enable sso for applications for saas?

Ans.

Enable SSO for SaaS applications by integrating with identity providers and configuring authentication protocols.

  • Integrate with identity providers such as Okta, Azure AD, or Google Workspace

  • Configure authentication protocols like SAML, OAuth, or OpenID Connect

  • Implement single sign-on functionality in the application code

  • Ensure secure communication between the application and the identity provider

Add your answer

Q71. Have you taken care of Authorization part?

Ans.

Yes, I have experience in taking care of the Authorization part in various projects.

  • Implemented role-based access control (RBAC) to manage user permissions

  • Configured and managed authentication protocols such as OAuth and SAML

  • Worked on setting up access control lists (ACLs) for network security

  • Experience with managing user roles and permissions in Active Directory

  • Utilized single sign-on (SSO) solutions for seamless user authentication

Add your answer

Q72. SDLC and different type of model and steps in different model

Ans.

SDLC refers to the process of software development. Different models include Waterfall, Agile, Spiral, and V-Model.

  • Waterfall model follows a linear sequential approach with distinct phases like planning, design, development, testing, and maintenance.

  • Agile model emphasizes on iterative and incremental development with continuous feedback and collaboration between cross-functional teams.

  • Spiral model combines the elements of both Waterfall and Agile models with risk analysis and...read more

Add your answer

Q73. Replace every element with the greatest element on the right side

Ans.

Replace each element with the greatest element on its right side in the array

  • Loop through the array from right to left

  • Keep track of the maximum element seen so far

  • Replace the current element with the maximum element seen so far

  • Return the modified array

Add your answer

Q74. What kind of bugs were fixed in project? How were they fixed?

Add your answer

Q75. what is singleton

Ans.

Singleton is a design pattern that restricts the instantiation of a class to a single object.

  • Singleton ensures that only one instance of a class exists in the entire application.

  • It provides a global point of access to the instance.

  • Commonly used in scenarios where a single instance needs to coordinate actions across the system.

  • Example: Database connection manager, logger, configuration manager.

Add your answer

Q76. Tell me your expected monthly income?

Ans.

I am expecting a competitive salary based on my experience and the responsibilities of the role.

  • I am open to negotiation based on the company's budget and benefits package.

  • I have researched the average salary range for this position in the industry and location.

  • I am confident in my skills and experience and believe I can bring value to the company.

  • I am looking for a fair and reasonable compensation package that reflects my contributions to the company's success.

Add your answer

Q77. How much depth you will go into understanding the system design?

Ans.

I will go into great depth to understand the system design, including analyzing all components and interactions.

  • I will thoroughly review the system architecture, including all components and their interactions.

  • I will analyze the data flow within the system to understand how information is processed and shared.

  • I will consider scalability and performance requirements to ensure the system can handle future growth.

  • I will collaborate with stakeholders and technical experts to gain...read more

Add your answer

Q78. What is JCube?

Ans.

JCube is a Java library for creating and manipulating Rubik's Cube puzzles.

  • JCube provides classes for representing Rubik's Cube puzzles and algorithms for solving them.

  • It supports various cube sizes and can generate random scrambles.

  • JCube can be used in Java applications or as a standalone command-line tool.

  • It is open source and available on GitHub.

Add your answer

Q79. You worked applications were connected or disconnected one?

Ans.

I have experience working with both connected and disconnected applications.

  • I have experience developing applications that can function both online and offline.

  • I have worked on projects where data synchronization is crucial for seamless user experience.

  • Examples include mobile apps that can work offline and sync data when connected to the internet.

Add your answer

Q80. Two Sum of numbers with given target value

Ans.

Given an array of integers, find two numbers that add up to a given target value.

  • Use a hash map to store the difference between the target value and each element in the array.

  • Iterate through the array and check if the current element exists in the hash map.

  • If it does, return the indices of the two numbers.

  • If no solution is found, return an empty array.

Add your answer

Q81. How you deal with change management?

Ans.

I handle change management by implementing structured processes, communication, and stakeholder involvement.

  • Implementing a change management process to track and document changes

  • Communicating changes effectively to all stakeholders

  • Involving key stakeholders in decision-making and planning

  • Ensuring proper testing and validation of changes before implementation

Add your answer

Q82. What is RTO in disaster recovery?

Ans.

RTO stands for Recovery Time Objective in disaster recovery, representing the targeted duration of time within which a business process must be restored after a disaster.

  • RTO is a crucial metric in disaster recovery planning, indicating the maximum acceptable downtime for a system or process.

  • It helps organizations determine the resources and strategies needed to recover from a disaster within a specific timeframe.

  • For example, if a company sets an RTO of 4 hours for its critica...read more

Add your answer

Q83. What is Concurrent programming (Based on course taken)

Add your answer

Q84. What is class in java

Ans.

A class in Java is a blueprint or template for creating objects that encapsulate data and behavior.

  • A class can contain fields, methods, constructors, and nested classes

  • Objects are instances of a class

  • Inheritance allows a class to inherit properties and methods from another class

  • Polymorphism allows objects of different classes to be treated as if they are of the same class

  • Example: class Car { String make; int year; void start() { ... } }

  • Example: Car myCar = new Car(); myCar.ma...read more

Add your answer

Q85. Software engineering principles

Ans.

Software engineering principles are the best practices and guidelines for developing high-quality software.

  • Software should be designed with modularity and scalability in mind.

  • Code should be well-documented and easy to read.

  • Testing and debugging should be an integral part of the development process.

  • Version control should be used to manage code changes.

  • Security and privacy should be considered throughout the development lifecycle.

Add your answer

Q86. Code a circular linked list

Ans.

A circular linked list is a data structure where the last node points back to the first node, forming a loop.

  • Create a Node class with data and next pointer

  • Initialize the head node and set its next pointer to itself

  • To add a node, create a new node and set its next pointer to the head node's next pointer, then update the head node's next pointer to the new node

  • To traverse the circular linked list, start from the head node and continue until reaching the head node again

Add your answer

Q87. Spring boot API endpoint description

Ans.

Spring Boot API endpoint is a URL that exposes the functionality of a web service.

  • API endpoints are the entry points for the client to access the server's resources.

  • Spring Boot provides a simple and easy way to create RESTful APIs.

  • Endpoints can be secured using Spring Security.

  • Endpoints can be documented using Swagger or Spring REST Docs.

  • Examples: /users, /products, /orders

Add your answer

Q88. Define Singleton class

Ans.

A Singleton class is a class that can only have one instance at a time.

  • It restricts the instantiation of a class to a single object.

  • It provides a global point of access to that instance.

  • It is often used in situations where a single object is required to coordinate actions across a system.

  • Example: Database connection manager, Configuration manager, Logger manager.

Add your answer

Q89. What programming language used for project?

Add your answer

Q90. Code a basic linked list

Ans.

Code a basic linked list

  • Create a Node class with data and next pointer

  • Create a LinkedList class with head pointer

  • Implement methods to add, delete, and search nodes in the linked list

Add your answer

Q91. Code a basic binary tree

Ans.

A binary tree is a data structure in which each node has at most two children.

  • Start with a root node

  • Each node has a left and right child

  • Nodes can be added or removed

  • Traversal can be done in-order, pre-order, or post-order

Add your answer

Q92. how do you reconcile mismatch between Gl and subledger

Ans.

Reconciling GL and subledger involves identifying and resolving discrepancies between the two accounts.

  • Compare transactions in GL and subledger to identify discrepancies

  • Investigate any differences in balances or transactions

  • Adjust entries in GL or subledger to reconcile the accounts

  • Ensure proper documentation of reconciliation process

  • Communicate with relevant stakeholders to resolve discrepancies

Add your answer

Q93. Seperation of even and odd numbers

Ans.

Separate even and odd numbers in an array

  • Iterate through the array and check if each number is even or odd

  • Create two separate arrays for even and odd numbers

  • Add the even numbers to the even array and odd numbers to the odd array

  • Return both arrays as the result

Add your answer

Q94. Concepts behind Digital Signature and Digital Certificates

Add your answer

Q95. how to implement timer

Ans.

A timer can be implemented using a combination of system time and a loop that checks for elapsed time.

  • Get the current system time at the start of the timer

  • Enter a loop that continuously checks the difference between the current system time and the start time

  • When the desired time has elapsed, perform the desired action or trigger an event

Add your answer

Q96. how to implement useEffect

Ans.

useEffect is a hook in React that allows you to perform side effects in functional components.

  • useEffect is used to handle side effects in React components.

  • It takes two arguments: a function and an optional array of dependencies.

  • The function inside useEffect is executed after the component renders.

  • The optional array of dependencies determines when the effect should run.

  • If the array of dependencies is empty, the effect runs only once after the initial render.

  • If the array of dep...read more

Add your answer

Q97. Have you worked in an agile environment before?

Ans.

Yes, I have worked in an agile environment before.

  • I have experience working in Scrum and Kanban methodologies

  • I have participated in daily stand-up meetings, sprint planning, and retrospectives

  • I have collaborated closely with developers, product owners, and other team members to deliver high-quality software

Add your answer

Q98. Do you vulnerability management?

Ans.

Yes, I am experienced in vulnerability management.

  • I have experience in identifying, prioritizing, and mitigating vulnerabilities in systems and networks.

  • I am proficient in using vulnerability scanning tools such as Nessus, Qualys, and OpenVAS.

  • I have implemented patch management processes to address vulnerabilities in a timely manner.

  • I have conducted vulnerability assessments and penetration testing to identify weaknesses in systems.

  • I have worked on creating and implementing s...read more

Add your answer

Q99. What types of testing used in project?

Ans.

Various types of testing are used in projects to ensure quality and functionality.

  • Unit testing: Testing individual components or units of code.

  • Integration testing: Testing the interaction between different components or modules.

  • System testing: Testing the entire system to ensure it meets the requirements.

  • Performance testing: Testing the system's performance under different loads.

  • Security testing: Testing the system's vulnerability to security threats.

  • User acceptance testing: ...read more

Add your answer

Q100. What to do with failed IT DR test or findings

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 69 interviews in the last 1 year
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.1
 • 2.2k Interview Questions
3.6
 • 2k Interview Questions
3.9
 • 185 Interview Questions
3.9
 • 174 Interview Questions
4.2
 • 129 Interview Questions
3.9
 • 128 Interview Questions
View all
Top Visa Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter