Filter interviews by
Clear (1)
Implement a circular list
Use a linked list where the last node points back to the first node
Keep track of the current node for easy traversal
Ensure proper handling of edge cases like empty list or single node
Use load balancing, caching, and scaling techniques to handle millions of requests from clients.
Implement load balancing to distribute requests evenly across servers.
Utilize caching mechanisms to store frequently accessed data and reduce load on servers.
Scale horizontally by adding more servers to handle increased traffic.
Optimize code and database queries to improve performance and reduce response times.
The best time to buy and sell stock is when the price is low to buy and high to sell, maximizing profit.
Buy when the stock price is low and sell when it is high
Consider market trends and analysis to predict the best time to buy and sell
Avoid emotional decision-making and stick to a well-thought-out strategy
Creating a bar graph using array of strings
Create an array of strings representing the data points for the bar graph
Each string should indicate the value of the bar and its corresponding label
Use a visualization tool or library to plot the bar graph based on the array of strings
ConcurrentHashMap allows multiple threads to access and modify the map concurrently, while SynchronizedHashMap ensures thread-safety by allowing only one thread to access the map at a time.
ConcurrentHashMap is more efficient in scenarios with high concurrency as it allows concurrent read and write operations.
SynchronizedHashMap is simpler to use and provides thread-safety, but can lead to performance degradation in hig...
Semaphores in Java are used for controlling access to a shared resource. They can be implemented using the java.util.concurrent package.
Use the Semaphore class from the java.util.concurrent package
Create a Semaphore object with an initial number of permits
Use the acquire() method to acquire a permit before accessing the shared resource
Use the release() method to release a permit after accessing the shared resource
Bitmask in Postgresql is used to store and manipulate multiple boolean values within a single integer column.
Bitmask is a technique to represent a set of boolean flags using binary digits.
In Postgresql, the bitwise operators (&, |, ^, ~) can be used to perform operations on bitmasks.
To set a specific flag in a bitmask, use the bitwise OR operator (|).
To check if a flag is set in a bitmask, use the bitwise AND operator ...
Swap characters from uppercase to lowercase and lowercase to uppercase in a given string.
Iterate through each character in the string
Check if the character is uppercase or lowercase
Swap the case of the character using bitwise XOR operation
Build the resulting string with the swapped characters
To create a singleton ensuring reflection does not mess up the implementation, use an enum or a private constructor with a static field.
Use an enum to create a singleton as enums are inherently singletons and cannot be instantiated multiple times.
Alternatively, use a private constructor with a static field to create a singleton.
To prevent reflection from creating multiple instances, throw an exception in the constructo
I applied via Approached by Company and was interviewed in Nov 2022. There were 4 interview rounds.
Zscaler Softech interview questions for designations
Top trending discussions
I was interviewed before Mar 2021.
To check if a number is a power of 2, we can use bitwise operations.
A power of 2 has only one bit set to 1, so we can use the bitwise AND operator to check if the number is a power of 2.
If n is a power of 2, then n & (n-1) will be 0.
For example, 8 (1000 in binary) is a power of 2, and 8 & 7 (0111 in binary) is 0.
Sort a stack without using another data structure
Use recursion to pop the top element and insert it at the bottom of the remaining stack
Repeat until the stack is sorted in ascending order
Time complexity: O(n^2), space complexity: O(n) due to recursion
Check if array has continuous increasing and decreasing values
Loop through the array and check if each element is greater than the previous one
Once you find the maximum element, check if the remaining elements are in decreasing order
If yes, return true else false
Design a cricinfo (LLD)
Identify the entities: players, teams, matches, scorecards, tournaments, etc.
Define the relationships between entities
Create a database schema to store the data
Implement APIs to fetch and update data
Design a UI to display the information
Consider scalability and performance
Ensure data security and privacy
I applied via Referral and was interviewed in Jul 2022. There were 4 interview rounds.
posted on 6 Oct 2024
posted on 18 May 2023
I applied via Referral and was interviewed in Apr 2023. There were 6 interview rounds.
Hackerrank
1. write a program to check if a patient has fever, based on measurement, degree, time to take a temperature
Hackerrank
1. write a query to get total based on sector, but the column is varchar type, then order by
Hackerrank
write a program for pharmacy and display information
posted on 12 Apr 2024
I applied via Referral and was interviewed before Apr 2023. There were 2 interview rounds.
Some of the top questions asked at the Zscaler Softech Senior Software Engineer interview -
based on 3 interviews
Interview experience
based on 12 reviews
Rating in categories
Bangalore / Bengaluru
2-6 Yrs
₹ 23-40 LPA
Technical Account Manager
108
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
86
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
83
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Software Engineer
71
salaries
| ₹0 L/yr - ₹0 L/yr |
Customer Success Manager
46
salaries
| ₹0 L/yr - ₹0 L/yr |
Palo Alto Networks
Gen
FireEye
Check Point Software Technologies