Filter interviews by
To check logs, analyze log files for errors, warnings, and relevant information to troubleshoot issues effectively.
Identify the log file location, e.g., /var/log/syslog for system logs.
Use tools like grep to filter logs for specific keywords, e.g., 'grep error /var/log/syslog'.
Check timestamps to correlate events, e.g., 'tail -n 100 /var/log/syslog' for the latest entries.
Look for patterns or repeated errors that ...
Jenkins pipelines automate the process of building, testing, and deploying applications in a continuous integration/continuous delivery environment.
Declarative vs. Scripted: Declarative pipelines use a simpler syntax, while scripted pipelines offer more flexibility.
Stages: Pipelines are divided into stages, such as 'Build', 'Test', and 'Deploy', to organize the workflow.
Parallel Execution: Jenkins allows stages to...
Key components of frontend system design include user interface, data management, state management, and performance optimization.
User Interface: Designing the layout, navigation, and visual elements of the frontend.
Data Management: Handling data fetching, storage, and manipulation within the frontend.
State Management: Managing the state of the application to ensure data consistency and reactivity.
Performance Optim...
JavaScript is a popular programming language used for web development. ES6 modules are a way to organize and reuse code in JavaScript.
JavaScript is a high-level, interpreted programming language commonly used for client-side web development.
ES6 modules allow developers to split their code into separate files and import/export functions, variables, and classes between them.
ES6 introduced 'import' and 'export' keywo...
Reversing a linked list involves changing the direction of its nodes to point backward instead of forward.
Iterative approach: Use three pointers (prev, current, next) to reverse the links.
Example: For list 1 -> 2 -> 3, after reversal it becomes 3 -> 2 -> 1.
Recursive approach: Reverse the rest of the list and adjust the pointers accordingly.
Example: Base case when current is null, then set head to prev.
HashMap is implemented using an array of linked lists to store key-value pairs.
HashMap consists of an array of buckets, each containing a linked list of key-value pairs.
Hashing function is used to determine the index of the bucket where a key-value pair will be stored.
Collision resolution techniques like chaining or open addressing are used to handle collisions.
HashMap allows null keys and values, but only one nul...
A date picker in JavaScript allows users to select a date from a calendar interface.
Use HTML input element with type 'date' for modern browsers
For older browsers, use a JavaScript library like jQuery UI Datepicker
Implement validation to ensure selected date is within acceptable range
Use two threads to print numbers 1 to 10, with Thread A printing odd numbers and Thread B printing even numbers.
Create two threads, one for odd numbers and one for even numbers
Use a shared variable to keep track of the current number being printed
Use synchronization mechanisms like mutex or semaphore to ensure proper sequencing of numbers
Zookeeper uses odd number of nodes to ensure a majority quorum for leader election and data consistency.
Odd number of nodes helps in avoiding split-brain scenarios where multiple nodes claim to be the leader
With an odd number of nodes, a majority quorum can be established to elect a leader and maintain data consistency
In case of network partitions, having an odd number of nodes ensures that there is always a major...
Planning for an ERP migration involves thorough assessment, stakeholder engagement, detailed project plan, testing, and training.
Conduct a thorough assessment of current ERP system, data, processes, and requirements for the new system.
Engage stakeholders from various departments to gather input, address concerns, and ensure buy-in.
Develop a detailed project plan outlining tasks, timelines, resources, and dependenc...
A graph data structure can be used to solve a Rubix cube.
Each cubelet can be represented as a node in the graph.
Edges can be added between nodes to represent possible moves.
A search algorithm like BFS or DFS can be used to find the solution.
Dynamic programming solution to find if a given weight can be formed using an array of weights
Create a boolean array of size (given weight + 1) to store if a weight can be formed or not
Initialize the first element of the boolean array to true
Iterate through the array of weights and for each weight, iterate through the boolean array and mark true for all weights that can be formed using the current weight
Return the valu...
Stack data structure is suitable for implementing Redo and Undo operations.
Stack follows Last-In-First-Out (LIFO) order, which is ideal for undoing and redoing operations.
When an operation is performed, it can be pushed onto the stack for undoing later.
To redo an operation, the previously undone operations can be popped from the stack.
Stack provides efficient insertion and deletion at one end, making it suitable for un...
A router is a networking device that forwards data packets between computer networks.
Routers operate at the network layer of the OSI model.
They use routing tables to determine the best path for data packets to travel.
Routers can connect multiple networks together, such as a home network to the internet.
They can also provide security by blocking unauthorized access to a network.
Examples of routers include Cisco, Netgear...
Developed a web-based project management tool for a client
Used React.js for the frontend and Node.js for the backend
Implemented user authentication and authorization using JWT
Integrated with third-party APIs such as Google Drive and Trello
Implemented real-time notifications using WebSockets
Deployed the application on AWS EC2 instance
The internet is a global network of interconnected devices that communicate with each other using standardized protocols.
The internet is made up of millions of interconnected devices such as computers, servers, routers, and switches.
Data is transmitted across the internet using standardized protocols such as TCP/IP.
The internet is accessed through Internet Service Providers (ISPs) who provide users with a connection to...
Finding number of paths in tree with sum of node values equal to count using recursion.
Use recursion to traverse the tree and keep track of the sum of node values.
At each node, check if the current sum equals the desired count.
If yes, increment the path count.
Recursively traverse the left and right subtrees.
Return the total path count.
Example: Given a tree with values [10, 5, -3, 3, 2, null, 11], count the number of pa...
The interview consisted of five rounds, with each round serving as an elimination stage. There were questions regarding the development of a product using a niche market.
There were many questions regarding the Coca-Cola case study.
I applied via LinkedIn and was interviewed in Sep 2024. There were 2 interview rounds.
1 Hour Leetcode style medium difficulty question. Test was taken on hacker rank.
I applied via Naukri.com and was interviewed in Dec 2024. There was 1 interview round.
I am a software engineer with 5 years of experience in developing web applications using various technologies.
5 years of experience in software development
Proficient in developing web applications
Skilled in using various technologies
HashMap is implemented using an array of linked lists to store key-value pairs.
HashMap consists of an array of buckets, each containing a linked list of key-value pairs.
Hashing function is used to determine the index of the bucket where a key-value pair will be stored.
Collision resolution techniques like chaining or open addressing are used to handle collisions.
HashMap allows null keys and values, but only one null key...
A date picker in JavaScript allows users to select a date from a calendar interface.
Use HTML input element with type 'date' for modern browsers
For older browsers, use a JavaScript library like jQuery UI Datepicker
Implement validation to ensure selected date is within acceptable range
I applied via Referral and was interviewed in Dec 2024. There was 1 interview round.
10 random qs on software things, and 2 qs leetcode style one easy and one easy medium
I appeared for an interview in Mar 2025, where I was asked the following questions.
To check logs, analyze log files for errors, warnings, and relevant information to troubleshoot issues effectively.
Identify the log file location, e.g., /var/log/syslog for system logs.
Use tools like grep to filter logs for specific keywords, e.g., 'grep error /var/log/syslog'.
Check timestamps to correlate events, e.g., 'tail -n 100 /var/log/syslog' for the latest entries.
Look for patterns or repeated errors that may i...
Jenkins pipelines automate the process of building, testing, and deploying applications in a continuous integration/continuous delivery environment.
Declarative vs. Scripted: Declarative pipelines use a simpler syntax, while scripted pipelines offer more flexibility.
Stages: Pipelines are divided into stages, such as 'Build', 'Test', and 'Deploy', to organize the workflow.
Parallel Execution: Jenkins allows stages to run ...
I applied via Recruitment Consulltant and was interviewed in Nov 2024. There was 1 interview round.
Leetcode Medium - Arrays, HashMaps
Reversing a linked list involves changing the direction of its nodes to point backward instead of forward.
Iterative approach: Use three pointers (prev, current, next) to reverse the links.
Example: For list 1 -> 2 -> 3, after reversal it becomes 3 -> 2 -> 1.
Recursive approach: Reverse the rest of the list and adjust the pointers accordingly.
Example: Base case when current is null, then set head to prev.
Implement a stack using a queue data structure.
Use two queues to simulate a stack.
Push operation: Enqueue the element to queue 1.
Pop operation: Dequeue all elements from queue 1 to queue 2, dequeue the last element from queue 2.
Top operation: Return the front element of queue 1.
Empty operation: Check if both queues are empty.
Use two threads to print numbers 1 to 10, with Thread A printing odd numbers and Thread B printing even numbers.
Create two threads, one for odd numbers and one for even numbers
Use a shared variable to keep track of the current number being printed
Use synchronization mechanisms like mutex or semaphore to ensure proper sequencing of numbers
I applied via Referral and was interviewed in Mar 2024. There were 3 interview rounds.
Find subarray with given sum in an array of integers.
Use a sliding window approach to find subarray with sum equal to given sum.
Keep track of current sum and adjust window size accordingly.
Return the indices of the subarray if found, else return an empty array.
Top trending discussions
Some of the top questions asked at the Walmart Labs interview -
The duration of Walmart Labs interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 36 interview experiences
Difficulty level
Duration
based on 105 reviews
Rating in categories
Senior Software Engineer
45
salaries
| ₹17.2 L/yr - ₹60 L/yr |
Software Developer
20
salaries
| ₹10 L/yr - ₹35 L/yr |
Software Engineer III
19
salaries
| ₹15 L/yr - ₹60 L/yr |
Principal Engineer
19
salaries
| ₹34.5 L/yr - ₹70 L/yr |
Software Development Engineer 3
17
salaries
| ₹16 L/yr - ₹40 L/yr |
TCS
Accenture
Wipro
Cognizant