Filter interviews by
Implement a circular list
Use a linked list where the last node points back to the first node
Keep track of the current node for easy traversal
Ensure proper handling of edge cases like empty list or single node
Use load balancing, caching, and scaling techniques to handle millions of requests from clients.
Implement load balancing to distribute requests evenly across servers.
Utilize caching mechanisms to store frequently accessed data and reduce load on servers.
Scale horizontally by adding more servers to handle increased traffic.
Optimize code and database queries to improve performance and reduce response times.
The best time to buy and sell stock is when the price is low to buy and high to sell, maximizing profit.
Buy when the stock price is low and sell when it is high
Consider market trends and analysis to predict the best time to buy and sell
Avoid emotional decision-making and stick to a well-thought-out strategy
Creating a bar graph using array of strings
Create an array of strings representing the data points for the bar graph
Each string should indicate the value of the bar and its corresponding label
Use a visualization tool or library to plot the bar graph based on the array of strings
ConcurrentHashMap allows multiple threads to access and modify the map concurrently, while SynchronizedHashMap ensures thread-safety by allowing only one thread to access the map at a time.
ConcurrentHashMap is more efficient in scenarios with high concurrency as it allows concurrent read and write operations.
SynchronizedHashMap is simpler to use and provides thread-safety, but can lead to performance degradation in hig...
Semaphores in Java are used for controlling access to a shared resource. They can be implemented using the java.util.concurrent package.
Use the Semaphore class from the java.util.concurrent package
Create a Semaphore object with an initial number of permits
Use the acquire() method to acquire a permit before accessing the shared resource
Use the release() method to release a permit after accessing the shared resource
Bitmask in Postgresql is used to store and manipulate multiple boolean values within a single integer column.
Bitmask is a technique to represent a set of boolean flags using binary digits.
In Postgresql, the bitwise operators (&, |, ^, ~) can be used to perform operations on bitmasks.
To set a specific flag in a bitmask, use the bitwise OR operator (|).
To check if a flag is set in a bitmask, use the bitwise AND operator ...
Swap characters from uppercase to lowercase and lowercase to uppercase in a given string.
Iterate through each character in the string
Check if the character is uppercase or lowercase
Swap the case of the character using bitwise XOR operation
Build the resulting string with the swapped characters
To create a singleton ensuring reflection does not mess up the implementation, use an enum or a private constructor with a static field.
Use an enum to create a singleton as enums are inherently singletons and cannot be instantiated multiple times.
Alternatively, use a private constructor with a static field to create a singleton.
To prevent reflection from creating multiple instances, throw an exception in the constructo
I applied via Approached by Company and was interviewed in Nov 2022. There were 4 interview rounds.
Zscaler Softech interview questions for designations
Top trending discussions
I applied via Walk-in and was interviewed in Nov 2024. There were 5 interview rounds.
Normal online code / frontend test
Designing and building a platform similar to BookMyShow involves creating a user-friendly interface for booking tickets for various events.
Develop a user-friendly website and mobile app for users to browse and book tickets for movies, concerts, plays, etc.
Implement a secure payment gateway for users to make online transactions.
Integrate a database to store information about events, venues, tickets, and user bookings.
In...
To build a tinyurl-like service, design a system with a URL shortening algorithm, a database to store mappings, and a redirect service.
Use a hashing algorithm to generate short URLs from long URLs (e.g. MD5, SHA-256).
Store the mappings of short URLs to long URLs in a database (e.g. MySQL, Redis).
Implement a redirect service that takes a short URL, looks up the corresponding long URL in the database, and redirects the u...
posted on 27 Nov 2024
Karat Interview for next filtering the candidate
Design a classic Snake game based on Nokia phones.
Use a 2D array to represent the game board.
Implement logic for snake movement and growth.
Include collision detection with walls and itself.
Add food items for the snake to eat and grow.
Display the game on a grid-based interface.
posted on 29 Aug 2024
I applied via LinkedIn and was interviewed in Jul 2024. There was 1 interview round.
posted on 22 Feb 2024
I applied via Recruitment Consulltant and was interviewed in Jan 2024. There were 6 interview rounds.
posted on 30 Nov 2024
I was interviewed in Nov 2023.
based on 12 reviews
Rating in categories
Technical Account Manager
111
salaries
| ₹11 L/yr - ₹35 L/yr |
Senior Software Engineer
85
salaries
| ₹13.1 L/yr - ₹49.2 L/yr |
Associate Software Engineer
70
salaries
| ₹6.2 L/yr - ₹22.1 L/yr |
Software Engineer
66
salaries
| ₹6 L/yr - ₹25.4 L/yr |
Customer Success Manager
46
salaries
| ₹8.2 L/yr - ₹25.5 L/yr |
Palo Alto Networks
NortonLifeLock's
FireEye
Check Point Software Technologies