Filter interviews by
Concurrent programming allows multiple processes to run simultaneously, improving efficiency and resource utilization.
Enables multitasking by allowing multiple threads or processes to execute at the same time.
Examples include web servers handling multiple requests concurrently.
Utilizes synchronization mechanisms like locks and semaphores to manage shared resources.
Common in applications like databases, real-time s...
Agile methodology is an iterative approach to project management and software development that emphasizes flexibility and customer collaboration.
Focuses on delivering small, incremental updates to products, allowing for quick adjustments based on feedback.
Utilizes cross-functional teams that collaborate closely, enhancing communication and efficiency.
Incorporates regular meetings, such as daily stand-ups, to discu...
Two trains starting from equator in opposite directions will not collide. Which train will have more wear and tear first?
The train moving towards the east will have more wear and tear due to the rotation of the earth
The train moving towards the west will have less wear and tear due to the rotation of the earth
Air resistance will also affect the wear and tear of the trains
The train moving towards the east will face...
Microkernel is a minimalistic approach where only essential services are kept in kernel space while macrokernel has more services in kernel space.
Microkernel has a small kernel with minimal services while macrokernel has a large kernel with many services.
In microkernel, most services run in user space while in macrokernel, most services run in kernel space.
Microkernel is more secure and reliable while macrokernel ...
What people are saying about Visa
BUS topology is preferred for small networks while ring topology is preferred for larger networks.
BUS topology is easier to install and maintain than ring topology.
Ring topology is more fault-tolerant than BUS topology.
BUS topology is suitable for small networks with few devices while ring topology is suitable for larger networks with many devices.
Ring topology is more expensive than BUS topology.
Examples of BUS t...
Interface is a blueprint of a class while Abstract class is a partially implemented class.
An interface can only have abstract methods while an abstract class can have both abstract and non-abstract methods.
A class can implement multiple interfaces but can only inherit from one abstract class.
Interfaces are used to achieve multiple inheritance while abstract classes are used to provide a common base for related cla...
IDS and IPS are security systems that monitor network traffic for malicious activity and prevent attacks.
IDS (Intrusion Detection System) detects and alerts about potential attacks by analyzing network traffic and comparing it to known attack patterns.
IPS (Intrusion Prevention System) goes a step further by actively blocking malicious traffic and preventing attacks from happening.
Both systems use a combination of ...
Argument is the actual value passed to a function, while parameter is a variable used to define a function.
Parameter is a variable in the function declaration, while argument is the actual value passed to the function.
Parameter is used to initialize the function's variables, while argument is used to pass values to the function.
Example: function add(a, b) { return a + b; } add(2, 3); Here, a and b are parameters, ...
ITAC refers to Information Technology Application Controls, ensuring data integrity in financial processes.
ITACs are controls within IT systems that ensure the accuracy and reliability of financial data.
They are scoped in by identifying critical processes and assessing risks associated with data integrity.
Example of a three-way match: verifying that the purchase order, invoice, and receiving report all match befor...
Key reports are essential financial documents that provide insights for decision-making and performance evaluation.
Key reports include financial statements, variance analysis, and budget forecasts.
Scoping involves identifying the report's purpose, audience, and key metrics to be included.
Testing key reports includes validating data accuracy, ensuring calculations are correct, and confirming that the report meets u...
I applied via LinkedIn and was interviewed in Jul 2024. There were 3 interview rounds.
Vulnerability management involves identifying, assessing, and mitigating security weaknesses in systems and applications.
Conduct regular vulnerability assessments using tools like Nessus or Qualys.
Prioritize vulnerabilities based on risk and impact, such as CVSS scores.
Implement patch management processes to address identified vulnerabilities promptly.
Utilize threat intelligence to stay informed about emerging vulnerab...
Supporting application for SSO enablement involves configuring authentication settings, integrating with identity providers, and testing functionality.
Configure authentication settings within the application to enable SSO
Integrate the application with identity providers such as Okta, Azure AD, or PingFederate
Test the SSO functionality to ensure seamless user experience
Provide documentation and training for users on how...
I handle outages by following established procedures and prioritize tasks based on impact.
Immediately assess the situation to determine the root cause of the outage
Communicate with stakeholders to keep them informed of the issue and expected resolution time
Work with cross-functional teams to troubleshoot and resolve the outage as quickly as possible
Document the outage incident and steps taken for future reference and i...
I handle change management by implementing structured processes, communication, and stakeholder involvement.
Implementing a change management process to track and document changes
Communicating changes effectively to all stakeholders
Involving key stakeholders in decision-making and planning
Ensuring proper testing and validation of changes before implementation
Enable SSO for SaaS applications by integrating with identity providers and configuring authentication protocols.
Integrate with identity providers such as Okta, Azure AD, or Google Workspace
Configure authentication protocols like SAML, OAuth, or OpenID Connect
Implement single sign-on functionality in the application code
Ensure secure communication between the application and the identity provider
RTO stands for Recovery Time Objective in disaster recovery, representing the targeted duration of time within which a business process must be restored after a disaster.
RTO is a crucial metric in disaster recovery planning, indicating the maximum acceptable downtime for a system or process.
It helps organizations determine the resources and strategies needed to recover from a disaster within a specific timeframe.
For ex...
I primarily use SSH (Secure Shell) to connect servers.
SSH (Secure Shell) is a widely used application for securely connecting to servers
Other applications like PuTTY, OpenSSH, and WinSCP can also be used for server connections
Yes, I am experienced in vulnerability management.
I have experience in identifying, prioritizing, and mitigating vulnerabilities in systems and networks.
I am proficient in using vulnerability scanning tools such as Nessus, Qualys, and OpenVAS.
I have implemented patch management processes to address vulnerabilities in a timely manner.
I have conducted vulnerability assessments and penetration testing to identify weakness...
I have experience working with both connected and disconnected applications.
I have experience developing applications that can function both online and offline.
I have worked on projects where data synchronization is crucial for seamless user experience.
Examples include mobile apps that can work offline and sync data when connected to the internet.
Yes, I have experience in taking care of the Authorization part in various projects.
Implemented role-based access control (RBAC) to manage user permissions
Configured and managed authentication protocols such as OAuth and SAML
Worked on setting up access control lists (ACLs) for network security
Experience with managing user roles and permissions in Active Directory
Utilized single sign-on (SSO) solutions for seamless user...
I applied via Job Portal
React lifecycle functions are methods that are automatically called at specific points in a component's life cycle.
Mounting: constructor, render, componentDidMount
Updating: render, componentDidUpdate
Unmounting: componentWillUnmount
Padding is the space inside the border of an element, while margin is the space outside the border.
Padding is used to create space between the content and the border of an element.
Margin is used to create space between the border of an element and other elements.
Padding affects the size of the content area, while margin affects the positioning of the element.
Example: padding: 10px will create 10 pixels of space inside ...
Yes, I am open to relocating for the right opportunity, as it can enhance my career and personal growth.
Relocation can provide exposure to new technologies and methodologies.
Living in a different city can broaden my professional network.
I am adaptable and enjoy new experiences, which relocation offers.
For example, moving to a tech hub can lead to better career prospects.
I appeared for an interview in Apr 2025, where I was asked the following questions.
SOX ensures financial transparency and compliance, while internal audit evaluates risk management and operational efficiency.
SOX (Sarbanes-Oxley Act) focuses on financial reporting and accountability for public companies.
Internal audit assesses the effectiveness of internal controls and risk management processes.
SOX compliance requires external audits to verify financial statements, while internal audits are conducted ...
ITAC refers to Information Technology Application Controls, ensuring data integrity in financial processes.
ITACs are controls within IT systems that ensure the accuracy and reliability of financial data.
They are scoped in by identifying critical processes and assessing risks associated with data integrity.
Example of a three-way match: verifying that the purchase order, invoice, and receiving report all match before pro...
Key reports are essential financial documents that provide insights for decision-making and performance evaluation.
Key reports include financial statements, variance analysis, and budget forecasts.
Scoping involves identifying the report's purpose, audience, and key metrics to be included.
Testing key reports includes validating data accuracy, ensuring calculations are correct, and confirming that the report meets user r...
IT General Controls (ITGC) ensure the integrity and security of IT systems, categorized into preventive, detective, and corrective controls.
Preventive Controls: Aim to prevent errors or fraud. Example: Access controls that restrict unauthorized users.
Detective Controls: Identify and alert on errors or irregularities. Example: Audit logs that track user activities.
Corrective Controls: Address and rectify issues after th...
Create a function to generate a transaction bin column based on transaction amounts.
Create bins based on transaction amounts (e.g. $0-$100, $101-$200, etc.)
Use pandas cut() function in Python to create bins
Assign bin labels to the transactions based on the bin ranges
I applied via Referral and was interviewed in Sep 2024. There was 1 interview round.
To center a div in CSS3, use the 'margin: auto;' property along with a set width.
Set the width of the div
Use 'margin: auto;' to center the div horizontally
Make sure the parent container has a defined width
call, bind, and apply are methods used to manipulate the context of a function in JavaScript.
call() is used to invoke a function with a specified 'this' value and arguments provided individually.
bind() is used to create a new function with a specified 'this' value and initial arguments.
apply() is used to invoke a function with a specified 'this' value and arguments provided as an array.
Impairment refers to a reduction in the value of an asset on the balance sheet.
Impairment occurs when the carrying amount of an asset exceeds its recoverable amount.
It is typically recorded as a non-cash charge on the income statement.
Common examples include impairment of goodwill, intangible assets, and property, plant, and equipment.
Reconciling GL and subledger involves identifying and resolving discrepancies between the two accounts.
Compare transactions in GL and subledger to identify discrepancies
Investigate any differences in balances or transactions
Adjust entries in GL or subledger to reconcile the accounts
Ensure proper documentation of reconciliation process
Communicate with relevant stakeholders to resolve discrepancies
Develop a product strategy to enable mass migration in the market.
Conduct market research to identify target segments and their needs
Create a roadmap for product development and deployment
Implement marketing campaigns to educate and attract customers
Provide training and support for users transitioning to the new product
Monitor and analyze feedback to make continuous improvements
Create a Project Plan and Presentation on a Market Migration Case Study
posted on 25 Sep 2024
1. medium dp question on busrst ballon
2. graph quetion on flood fill
Design a file search feature for a software application.
Implement a search bar where users can input keywords or phrases to search for files.
Include filters for file type, date modified, and other relevant criteria.
Display search results in a user-friendly format with relevant file details.
Allow users to preview files before opening or downloading them.
Consider implementing search suggestions or autocomplete functional...
Design a ticket booking platform for movies, events, and shows with user-friendly features and robust backend architecture.
User Registration: Allow users to create accounts using email or social media.
Search Functionality: Implement a search bar for users to find movies or events by name, genre, or location.
Event Listings: Display a list of available movies/events with details like time, venue, and ticket prices.
Seat S...
TrieNode common prefix
Graph dkistra algo find least time to fill
I am a dedicated and experienced Product Support Engineer with a strong background in troubleshooting and customer service.
Experienced in providing technical support for software and hardware products
Skilled in diagnosing and resolving customer issues in a timely manner
Strong communication skills to effectively communicate with customers and internal teams
Familiar with various troubleshooting tools and techniques
Passio...
SQL stands for Structured Query Language.
SQL is a standard language for accessing and manipulating databases.
It is used to communicate with databases to perform tasks such as querying data, updating data, and creating tables.
Examples of SQL commands include SELECT, INSERT, UPDATE, DELETE, and CREATE.
Some of the top questions asked at the Visa interview -
The duration of Visa interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 110 interview experiences
Difficulty level
Duration
Senior Software Engineer
705
salaries
| ₹24 L/yr - ₹40 L/yr |
Software Engineer
443
salaries
| ₹14 L/yr - ₹25 L/yr |
Staff Software Engineer
214
salaries
| ₹35 L/yr - ₹61.2 L/yr |
Senior Data Engineer
110
salaries
| ₹25 L/yr - ₹45 L/yr |
Senior Software Test Engineer
95
salaries
| ₹18 L/yr - ₹41.2 L/yr |
MasterCard
American Express
Paytm
FIS