Filter interviews by
RDBMD stands for Relational Database Management System. It is a software system used for managing relational databases.
RDBMD is used to store, retrieve, and manage data in a structured format.
It allows users to define, create, and manipulate tables, indexes, and relationships between data.
Examples of RDBMD include MySQL, Oracle Database, and Microsoft SQL Server.
Microservices are a software development technique where applications are composed of small, independent services that communicate over well-defined APIs. Kubernetes is an open-source platform for automating deployment, scaling, and managing containerized applications.
Microservices break down applications into smaller, loosely coupled services that can be developed, deployed, and scaled independently.
Kubernetes is...
Padding is the space inside the border of an element, while margin is the space outside the border.
Padding is used to create space between the content and the border of an element.
Margin is used to create space between the border of an element and other elements.
Padding affects the size of the content area, while margin affects the positioning of the element.
Example: padding: 10px will create 10 pixels of space in...
Visa is a payment processing company that facilitates electronic funds transfers globally.
Visa operates a network that connects financial institutions, merchants, and consumers worldwide.
The company provides payment products and services, including credit and debit cards, prepaid cards, and digital wallets.
Visa's payment processing system involves authorization, clearing, and settlement of transactions.
To design a...
What people are saying about Visa
Tech stack for designing a scalable Uber-like service.
Use microservices architecture for scalability and fault tolerance.
Choose a cloud provider with auto-scaling capabilities.
Use a load balancer to distribute traffic across multiple instances.
Use a NoSQL database for high availability and scalability.
Use message queues for asynchronous communication between services.
Use containerization for easy deployment and ma...
These are three different programming problems that require different approaches to solve.
N-Queens: placing N queens on an NxN chessboard so that no two queens threaten each other
Snake and Ladder Problem: finding the minimum number of dice rolls to reach the end of a board with snakes and ladders
Second Most Repeated Word in a Sequence: finding the second most frequently occurring word in a given sequence of words
GET and POST are HTTP methods used for sending data to a server.
GET is used to retrieve data from a server
POST is used to submit data to a server
GET requests can be cached and bookmarked
POST requests are not cached and cannot be bookmarked
GET requests have length restrictions
POST requests have no length restrictions
GET requests are less secure than POST requests
malloc and calloc are memory allocation functions in C programming language.
malloc() allocates memory block of given size and returns a pointer to the first byte of allocated memory.
calloc() allocates memory block of given size and initializes all bits to zero.
malloc() does not initialize the allocated memory, which may contain garbage values.
calloc() is slower than malloc() as it initializes all bits to zero.
mall...
Testing principles ensure software quality, while design principles guide software development.
Testing principles include unit testing, integration testing, and acceptance testing.
Design principles include SOLID, DRY, and KISS.
Testing principles ensure that software meets requirements and is free of defects.
Design principles guide software development to be modular, maintainable, and scalable.
Unit testing involves testing individual units of code to ensure they function as expected.
Identify the individual units of code to be tested
Create test cases for each unit, covering all possible scenarios
Execute the tests and analyze the results
Refactor the code as necessary based on the test results
I applied via LinkedIn and was interviewed in Jul 2024. There were 3 interview rounds.
Vulnerability management involves identifying, assessing, and mitigating security weaknesses in systems and applications.
Conduct regular vulnerability assessments using tools like Nessus or Qualys.
Prioritize vulnerabilities based on risk and impact, such as CVSS scores.
Implement patch management processes to address identified vulnerabilities promptly.
Utilize threat intelligence to stay informed about emerging vulnerab...
Supporting application for SSO enablement involves configuring authentication settings, integrating with identity providers, and testing functionality.
Configure authentication settings within the application to enable SSO
Integrate the application with identity providers such as Okta, Azure AD, or PingFederate
Test the SSO functionality to ensure seamless user experience
Provide documentation and training for users on how...
I handle outages by following established procedures and prioritize tasks based on impact.
Immediately assess the situation to determine the root cause of the outage
Communicate with stakeholders to keep them informed of the issue and expected resolution time
Work with cross-functional teams to troubleshoot and resolve the outage as quickly as possible
Document the outage incident and steps taken for future reference and i...
I handle change management by implementing structured processes, communication, and stakeholder involvement.
Implementing a change management process to track and document changes
Communicating changes effectively to all stakeholders
Involving key stakeholders in decision-making and planning
Ensuring proper testing and validation of changes before implementation
Enable SSO for SaaS applications by integrating with identity providers and configuring authentication protocols.
Integrate with identity providers such as Okta, Azure AD, or Google Workspace
Configure authentication protocols like SAML, OAuth, or OpenID Connect
Implement single sign-on functionality in the application code
Ensure secure communication between the application and the identity provider
RTO stands for Recovery Time Objective in disaster recovery, representing the targeted duration of time within which a business process must be restored after a disaster.
RTO is a crucial metric in disaster recovery planning, indicating the maximum acceptable downtime for a system or process.
It helps organizations determine the resources and strategies needed to recover from a disaster within a specific timeframe.
For ex...
I primarily use SSH (Secure Shell) to connect servers.
SSH (Secure Shell) is a widely used application for securely connecting to servers
Other applications like PuTTY, OpenSSH, and WinSCP can also be used for server connections
Yes, I am experienced in vulnerability management.
I have experience in identifying, prioritizing, and mitigating vulnerabilities in systems and networks.
I am proficient in using vulnerability scanning tools such as Nessus, Qualys, and OpenVAS.
I have implemented patch management processes to address vulnerabilities in a timely manner.
I have conducted vulnerability assessments and penetration testing to identify weakness...
I have experience working with both connected and disconnected applications.
I have experience developing applications that can function both online and offline.
I have worked on projects where data synchronization is crucial for seamless user experience.
Examples include mobile apps that can work offline and sync data when connected to the internet.
Yes, I have experience in taking care of the Authorization part in various projects.
Implemented role-based access control (RBAC) to manage user permissions
Configured and managed authentication protocols such as OAuth and SAML
Worked on setting up access control lists (ACLs) for network security
Experience with managing user roles and permissions in Active Directory
Utilized single sign-on (SSO) solutions for seamless user...
I applied via Job Portal
React lifecycle functions are methods that are automatically called at specific points in a component's life cycle.
Mounting: constructor, render, componentDidMount
Updating: render, componentDidUpdate
Unmounting: componentWillUnmount
Padding is the space inside the border of an element, while margin is the space outside the border.
Padding is used to create space between the content and the border of an element.
Margin is used to create space between the border of an element and other elements.
Padding affects the size of the content area, while margin affects the positioning of the element.
Example: padding: 10px will create 10 pixels of space inside ...
Yes, I am open to relocating for the right opportunity, as it can enhance my career and personal growth.
Relocation can provide exposure to new technologies and methodologies.
Living in a different city can broaden my professional network.
I am adaptable and enjoy new experiences, which relocation offers.
For example, moving to a tech hub can lead to better career prospects.
I appeared for an interview in Apr 2025, where I was asked the following questions.
SOX ensures financial transparency and compliance, while internal audit evaluates risk management and operational efficiency.
SOX (Sarbanes-Oxley Act) focuses on financial reporting and accountability for public companies.
Internal audit assesses the effectiveness of internal controls and risk management processes.
SOX compliance requires external audits to verify financial statements, while internal audits are conducted ...
ITAC refers to Information Technology Application Controls, ensuring data integrity in financial processes.
ITACs are controls within IT systems that ensure the accuracy and reliability of financial data.
They are scoped in by identifying critical processes and assessing risks associated with data integrity.
Example of a three-way match: verifying that the purchase order, invoice, and receiving report all match before pro...
Key reports are essential financial documents that provide insights for decision-making and performance evaluation.
Key reports include financial statements, variance analysis, and budget forecasts.
Scoping involves identifying the report's purpose, audience, and key metrics to be included.
Testing key reports includes validating data accuracy, ensuring calculations are correct, and confirming that the report meets user r...
IT General Controls (ITGC) ensure the integrity and security of IT systems, categorized into preventive, detective, and corrective controls.
Preventive Controls: Aim to prevent errors or fraud. Example: Access controls that restrict unauthorized users.
Detective Controls: Identify and alert on errors or irregularities. Example: Audit logs that track user activities.
Corrective Controls: Address and rectify issues after th...
Create a function to generate a transaction bin column based on transaction amounts.
Create bins based on transaction amounts (e.g. $0-$100, $101-$200, etc.)
Use pandas cut() function in Python to create bins
Assign bin labels to the transactions based on the bin ranges
I applied via Referral and was interviewed in Sep 2024. There was 1 interview round.
To center a div in CSS3, use the 'margin: auto;' property along with a set width.
Set the width of the div
Use 'margin: auto;' to center the div horizontally
Make sure the parent container has a defined width
call, bind, and apply are methods used to manipulate the context of a function in JavaScript.
call() is used to invoke a function with a specified 'this' value and arguments provided individually.
bind() is used to create a new function with a specified 'this' value and initial arguments.
apply() is used to invoke a function with a specified 'this' value and arguments provided as an array.
Impairment refers to a reduction in the value of an asset on the balance sheet.
Impairment occurs when the carrying amount of an asset exceeds its recoverable amount.
It is typically recorded as a non-cash charge on the income statement.
Common examples include impairment of goodwill, intangible assets, and property, plant, and equipment.
Reconciling GL and subledger involves identifying and resolving discrepancies between the two accounts.
Compare transactions in GL and subledger to identify discrepancies
Investigate any differences in balances or transactions
Adjust entries in GL or subledger to reconcile the accounts
Ensure proper documentation of reconciliation process
Communicate with relevant stakeholders to resolve discrepancies
Develop a product strategy to enable mass migration in the market.
Conduct market research to identify target segments and their needs
Create a roadmap for product development and deployment
Implement marketing campaigns to educate and attract customers
Provide training and support for users transitioning to the new product
Monitor and analyze feedback to make continuous improvements
Create a Project Plan and Presentation on a Market Migration Case Study
posted on 25 Sep 2024
1. medium dp question on busrst ballon
2. graph quetion on flood fill
Design a file search feature for a software application.
Implement a search bar where users can input keywords or phrases to search for files.
Include filters for file type, date modified, and other relevant criteria.
Display search results in a user-friendly format with relevant file details.
Allow users to preview files before opening or downloading them.
Consider implementing search suggestions or autocomplete functional...
Design a ticket booking platform for movies, events, and shows with user-friendly features and robust backend architecture.
User Registration: Allow users to create accounts using email or social media.
Search Functionality: Implement a search bar for users to find movies or events by name, genre, or location.
Event Listings: Display a list of available movies/events with details like time, venue, and ticket prices.
Seat S...
TrieNode common prefix
Graph dkistra algo find least time to fill
I am a dedicated and experienced Product Support Engineer with a strong background in troubleshooting and customer service.
Experienced in providing technical support for software and hardware products
Skilled in diagnosing and resolving customer issues in a timely manner
Strong communication skills to effectively communicate with customers and internal teams
Familiar with various troubleshooting tools and techniques
Passio...
SQL stands for Structured Query Language.
SQL is a standard language for accessing and manipulating databases.
It is used to communicate with databases to perform tasks such as querying data, updating data, and creating tables.
Examples of SQL commands include SELECT, INSERT, UPDATE, DELETE, and CREATE.
Some of the top questions asked at the Visa interview -
The duration of Visa interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 110 interview experiences
Difficulty level
Duration
Senior Software Engineer
705
salaries
| ₹24 L/yr - ₹40 L/yr |
Software Engineer
446
salaries
| ₹14 L/yr - ₹25.3 L/yr |
Staff Software Engineer
214
salaries
| ₹35 L/yr - ₹61.2 L/yr |
Senior Data Engineer
108
salaries
| ₹25 L/yr - ₹45 L/yr |
Senior Software Test Engineer
95
salaries
| ₹18 L/yr - ₹41.2 L/yr |
MasterCard
American Express
Paytm
FIS