Filter interviews by
A circular linked list is a data structure where the last node points back to the first node, forming a loop.
Create a Node class with data and next pointer
Initialize the head node and set its next pointer to itself
To add a node, create a new node and set its next pointer to the head node's next pointer, then update the head node's next pointer to the new node
To traverse the circular linked list, start from the hea...
A binary tree is a data structure in which each node has at most two children.
Start with a root node
Each node has a left and right child
Nodes can be added or removed
Traversal can be done in-order, pre-order, or post-order
Code a basic linked list
Create a Node class with data and next pointer
Create a LinkedList class with head pointer
Implement methods to add, delete, and search nodes in the linked list
Implement Binary Search Tree using given array of strings.
Sort the array in ascending order
Find the middle element and make it the root of the tree
Recursively create left and right subtrees using the left and right halves of the array
Repeat until all elements are added to the tree
What people are saying about Visa
Print the given Binary search tree in ascending order
Traverse the left subtree recursively
Print the root node
Traverse the right subtree recursively
Find buy and sell points for maximum profit in an array of stock prices in O(n)
Iterate through the array and keep track of the minimum price seen so far
Calculate the profit at each index by subtracting the minimum price from the current price
Update the maximum profit and buy/sell points accordingly
Return the buy and sell points for maximum profit
Chennai faces problems related to water scarcity, traffic congestion, and pollution.
Water scarcity due to inadequate rainfall and poor management of water resources.
Traffic congestion due to the increasing number of vehicles and poor road infrastructure.
Pollution caused by industries, vehicular emissions, and improper waste disposal.
Need more context on the question to provide an answer.
Please provide more information on the problem to be solved.
Without context, it is difficult to provide a solution.
Can you please provide more details on the problem statement?
Visa is a global payments technology company that connects consumers, businesses, banks and governments in more than 200 countries and territories.
Visa operates the world's largest retail electronic payments network.
VisaNet, the company's global processing system, handles more than 65,000 transaction messages a second.
Visa is constantly innovating to improve payment security and convenience, with initiatives such ...
To modify a Gmail notifier, you can customize its appearance, add additional features, or integrate it with other applications.
Customize the notifier's appearance by changing its color, font, or notification sound.
Add additional features such as the ability to mark emails as read or reply directly from the notifier.
Integrate the notifier with other applications like a task manager or calendar to display reminders ...
I applied via LinkedIn and was interviewed in Jul 2024. There were 3 interview rounds.
Vulnerability management involves identifying, assessing, and mitigating security weaknesses in systems and applications.
Conduct regular vulnerability assessments using tools like Nessus or Qualys.
Prioritize vulnerabilities based on risk and impact, such as CVSS scores.
Implement patch management processes to address identified vulnerabilities promptly.
Utilize threat intelligence to stay informed about emerging vulnerab...
Supporting application for SSO enablement involves configuring authentication settings, integrating with identity providers, and testing functionality.
Configure authentication settings within the application to enable SSO
Integrate the application with identity providers such as Okta, Azure AD, or PingFederate
Test the SSO functionality to ensure seamless user experience
Provide documentation and training for users on how...
I handle outages by following established procedures and prioritize tasks based on impact.
Immediately assess the situation to determine the root cause of the outage
Communicate with stakeholders to keep them informed of the issue and expected resolution time
Work with cross-functional teams to troubleshoot and resolve the outage as quickly as possible
Document the outage incident and steps taken for future reference and i...
I handle change management by implementing structured processes, communication, and stakeholder involvement.
Implementing a change management process to track and document changes
Communicating changes effectively to all stakeholders
Involving key stakeholders in decision-making and planning
Ensuring proper testing and validation of changes before implementation
Enable SSO for SaaS applications by integrating with identity providers and configuring authentication protocols.
Integrate with identity providers such as Okta, Azure AD, or Google Workspace
Configure authentication protocols like SAML, OAuth, or OpenID Connect
Implement single sign-on functionality in the application code
Ensure secure communication between the application and the identity provider
RTO stands for Recovery Time Objective in disaster recovery, representing the targeted duration of time within which a business process must be restored after a disaster.
RTO is a crucial metric in disaster recovery planning, indicating the maximum acceptable downtime for a system or process.
It helps organizations determine the resources and strategies needed to recover from a disaster within a specific timeframe.
For ex...
I primarily use SSH (Secure Shell) to connect servers.
SSH (Secure Shell) is a widely used application for securely connecting to servers
Other applications like PuTTY, OpenSSH, and WinSCP can also be used for server connections
Yes, I am experienced in vulnerability management.
I have experience in identifying, prioritizing, and mitigating vulnerabilities in systems and networks.
I am proficient in using vulnerability scanning tools such as Nessus, Qualys, and OpenVAS.
I have implemented patch management processes to address vulnerabilities in a timely manner.
I have conducted vulnerability assessments and penetration testing to identify weakness...
I have experience working with both connected and disconnected applications.
I have experience developing applications that can function both online and offline.
I have worked on projects where data synchronization is crucial for seamless user experience.
Examples include mobile apps that can work offline and sync data when connected to the internet.
Yes, I have experience in taking care of the Authorization part in various projects.
Implemented role-based access control (RBAC) to manage user permissions
Configured and managed authentication protocols such as OAuth and SAML
Worked on setting up access control lists (ACLs) for network security
Experience with managing user roles and permissions in Active Directory
Utilized single sign-on (SSO) solutions for seamless user...
I applied via Job Portal
React lifecycle functions are methods that are automatically called at specific points in a component's life cycle.
Mounting: constructor, render, componentDidMount
Updating: render, componentDidUpdate
Unmounting: componentWillUnmount
Padding is the space inside the border of an element, while margin is the space outside the border.
Padding is used to create space between the content and the border of an element.
Margin is used to create space between the border of an element and other elements.
Padding affects the size of the content area, while margin affects the positioning of the element.
Example: padding: 10px will create 10 pixels of space inside ...
I expect a competitive salary based on industry standards and my experience, including base pay and performance bonuses.
Research industry standards: For example, software engineers in my region typically earn between $80,000 and $120,000.
Consider my experience: With 5 years in the field, I would expect to be on the higher end of that range.
Include variables: I am open to discussing performance bonuses, stock options, a...
Yes, I am open to relocating for the right opportunity, as it can enhance my career and personal growth.
Relocation can provide exposure to new technologies and methodologies.
Living in a different city can broaden my professional network.
I am adaptable and enjoy new experiences, which relocation offers.
For example, moving to a tech hub can lead to better career prospects.
I appeared for an interview in Apr 2025, where I was asked the following questions.
SOX ensures financial transparency and compliance, while internal audit evaluates risk management and operational efficiency.
SOX (Sarbanes-Oxley Act) focuses on financial reporting and accountability for public companies.
Internal audit assesses the effectiveness of internal controls and risk management processes.
SOX compliance requires external audits to verify financial statements, while internal audits are conducted ...
ITAC refers to Information Technology Application Controls, ensuring data integrity in financial processes.
ITACs are controls within IT systems that ensure the accuracy and reliability of financial data.
They are scoped in by identifying critical processes and assessing risks associated with data integrity.
Example of a three-way match: verifying that the purchase order, invoice, and receiving report all match before pro...
Key reports are essential financial documents that provide insights for decision-making and performance evaluation.
Key reports include financial statements, variance analysis, and budget forecasts.
Scoping involves identifying the report's purpose, audience, and key metrics to be included.
Testing key reports includes validating data accuracy, ensuring calculations are correct, and confirming that the report meets user r...
IT General Controls (ITGC) ensure the integrity and security of IT systems, categorized into preventive, detective, and corrective controls.
Preventive Controls: Aim to prevent errors or fraud. Example: Access controls that restrict unauthorized users.
Detective Controls: Identify and alert on errors or irregularities. Example: Audit logs that track user activities.
Corrective Controls: Address and rectify issues after th...
Create a function to generate a transaction bin column based on transaction amounts.
Create bins based on transaction amounts (e.g. $0-$100, $101-$200, etc.)
Use pandas cut() function in Python to create bins
Assign bin labels to the transactions based on the bin ranges
I applied via Referral and was interviewed in Sep 2024. There was 1 interview round.
To center a div in CSS3, use the 'margin: auto;' property along with a set width.
Set the width of the div
Use 'margin: auto;' to center the div horizontally
Make sure the parent container has a defined width
call, bind, and apply are methods used to manipulate the context of a function in JavaScript.
call() is used to invoke a function with a specified 'this' value and arguments provided individually.
bind() is used to create a new function with a specified 'this' value and initial arguments.
apply() is used to invoke a function with a specified 'this' value and arguments provided as an array.
Impairment refers to a reduction in the value of an asset on the balance sheet.
Impairment occurs when the carrying amount of an asset exceeds its recoverable amount.
It is typically recorded as a non-cash charge on the income statement.
Common examples include impairment of goodwill, intangible assets, and property, plant, and equipment.
Reconciling GL and subledger involves identifying and resolving discrepancies between the two accounts.
Compare transactions in GL and subledger to identify discrepancies
Investigate any differences in balances or transactions
Adjust entries in GL or subledger to reconcile the accounts
Ensure proper documentation of reconciliation process
Communicate with relevant stakeholders to resolve discrepancies
Develop a product strategy to enable mass migration in the market.
Conduct market research to identify target segments and their needs
Create a roadmap for product development and deployment
Implement marketing campaigns to educate and attract customers
Provide training and support for users transitioning to the new product
Monitor and analyze feedback to make continuous improvements
Create a Project Plan and Presentation on a Market Migration Case Study
posted on 25 Sep 2024
1. medium dp question on busrst ballon
2. graph quetion on flood fill
Design a file search feature for a software application.
Implement a search bar where users can input keywords or phrases to search for files.
Include filters for file type, date modified, and other relevant criteria.
Display search results in a user-friendly format with relevant file details.
Allow users to preview files before opening or downloading them.
Consider implementing search suggestions or autocomplete functional...
Design a ticket booking platform for movies, events, and shows with user-friendly features and robust backend architecture.
User Registration: Allow users to create accounts using email or social media.
Search Functionality: Implement a search bar for users to find movies or events by name, genre, or location.
Event Listings: Display a list of available movies/events with details like time, venue, and ticket prices.
Seat S...
TrieNode common prefix
Graph dkistra algo find least time to fill
I am a dedicated and experienced Product Support Engineer with a strong background in troubleshooting and customer service.
Experienced in providing technical support for software and hardware products
Skilled in diagnosing and resolving customer issues in a timely manner
Strong communication skills to effectively communicate with customers and internal teams
Familiar with various troubleshooting tools and techniques
Passio...
SQL stands for Structured Query Language.
SQL is a standard language for accessing and manipulating databases.
It is used to communicate with databases to perform tasks such as querying data, updating data, and creating tables.
Examples of SQL commands include SELECT, INSERT, UPDATE, DELETE, and CREATE.
Some of the top questions asked at the Visa interview -
The duration of Visa interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 110 interview experiences
Difficulty level
Duration
Senior Software Engineer
706
salaries
| ₹24 L/yr - ₹41.4 L/yr |
Software Engineer
464
salaries
| ₹14 L/yr - ₹25 L/yr |
Staff Software Engineer
235
salaries
| ₹36 L/yr - ₹65 L/yr |
Senior Data Engineer
115
salaries
| ₹25 L/yr - ₹45 L/yr |
Staff Engineer
96
salaries
| ₹40 L/yr - ₹64 L/yr |
MasterCard
American Express
Paytm
FIS