Filter interviews by
Use load balancing, caching, and scaling techniques to handle millions of requests from clients.
Implement load balancing to distribute requests evenly across servers.
Utilize caching mechanisms to store frequently accessed data and reduce load on servers.
Scale horizontally by adding more servers to handle increased traffic.
Optimize code and database queries to improve performance and reduce response times.
Implement a circular list
Use a linked list where the last node points back to the first node
Keep track of the current node for easy traversal
Ensure proper handling of edge cases like empty list or single node
Creating a bar graph using array of strings
Create an array of strings representing the data points for the bar graph
Each string should indicate the value of the bar and its corresponding label
Use a visualization tool or library to plot the bar graph based on the array of strings
The best time to buy and sell stock is when the price is low to buy and high to sell, maximizing profit.
Buy when the stock price is low and sell when it is high
Consider market trends and analysis to predict the best time to buy and sell
Avoid emotional decision-making and stick to a well-thought-out strategy
Semaphores in Java are used for controlling access to a shared resource. They can be implemented using the java.util.concurrent package.
Use the Semaphore class from the java.util.concurrent package
Create a Semaphore object with an initial number of permits
Use the acquire() method to acquire a permit before accessing the shared resource
Use the release() method to release a permit after accessing the shared resource
Swap characters from uppercase to lowercase and lowercase to uppercase in a given string.
Iterate through each character in the string
Check if the character is uppercase or lowercase
Swap the case of the character using bitwise XOR operation
Build the resulting string with the swapped characters
Bitmask in Postgresql is used to store and manipulate multiple boolean values within a single integer column.
Bitmask is a technique to represent a set of boolean flags using binary digits.
In Postgresql, the bitwise operators (&, |, ^, ~) can be used to perform operations on bitmasks.
To set a specific flag in a bitmask, use the bitwise OR operator (|).
To check if a flag is set in a bitmask, use the bitwise AND oper...
To create a singleton ensuring reflection does not mess up the implementation, use an enum or a private constructor with a static field.
Use an enum to create a singleton as enums are inherently singletons and cannot be instantiated multiple times.
Alternatively, use a private constructor with a static field to create a singleton.
To prevent reflection from creating multiple instances, throw an exception in the const...
ConcurrentHashMap allows multiple threads to access and modify the map concurrently, while SynchronizedHashMap ensures thread-safety by allowing only one thread to access the map at a time.
ConcurrentHashMap is more efficient in scenarios with high concurrency as it allows concurrent read and write operations.
SynchronizedHashMap is simpler to use and provides thread-safety, but can lead to performance degradation i...
Implement a circular list
Use a linked list where the last node points back to the first node
Keep track of the current node for easy traversal
Ensure proper handling of edge cases like empty list or single node
Use load balancing, caching, and scaling techniques to handle millions of requests from clients.
Implement load balancing to distribute requests evenly across servers.
Utilize caching mechanisms to store frequently accessed data and reduce load on servers.
Scale horizontally by adding more servers to handle increased traffic.
Optimize code and database queries to improve performance and reduce response times.
The best time to buy and sell stock is when the price is low to buy and high to sell, maximizing profit.
Buy when the stock price is low and sell when it is high
Consider market trends and analysis to predict the best time to buy and sell
Avoid emotional decision-making and stick to a well-thought-out strategy
Creating a bar graph using array of strings
Create an array of strings representing the data points for the bar graph
Each string should indicate the value of the bar and its corresponding label
Use a visualization tool or library to plot the bar graph based on the array of strings
ConcurrentHashMap allows multiple threads to access and modify the map concurrently, while SynchronizedHashMap ensures thread-safety by allowing only one thread to access the map at a time.
ConcurrentHashMap is more efficient in scenarios with high concurrency as it allows concurrent read and write operations.
SynchronizedHashMap is simpler to use and provides thread-safety, but can lead to performance degradation in hig...
Semaphores in Java are used for controlling access to a shared resource. They can be implemented using the java.util.concurrent package.
Use the Semaphore class from the java.util.concurrent package
Create a Semaphore object with an initial number of permits
Use the acquire() method to acquire a permit before accessing the shared resource
Use the release() method to release a permit after accessing the shared resource
Bitmask in Postgresql is used to store and manipulate multiple boolean values within a single integer column.
Bitmask is a technique to represent a set of boolean flags using binary digits.
In Postgresql, the bitwise operators (&, |, ^, ~) can be used to perform operations on bitmasks.
To set a specific flag in a bitmask, use the bitwise OR operator (|).
To check if a flag is set in a bitmask, use the bitwise AND operator ...
Swap characters from uppercase to lowercase and lowercase to uppercase in a given string.
Iterate through each character in the string
Check if the character is uppercase or lowercase
Swap the case of the character using bitwise XOR operation
Build the resulting string with the swapped characters
To create a singleton ensuring reflection does not mess up the implementation, use an enum or a private constructor with a static field.
Use an enum to create a singleton as enums are inherently singletons and cannot be instantiated multiple times.
Alternatively, use a private constructor with a static field to create a singleton.
To prevent reflection from creating multiple instances, throw an exception in the constructo...
I applied via Approached by Company and was interviewed in Nov 2022. There were 4 interview rounds.
Top trending discussions
posted on 8 Apr 2022
I applied via Naukri.com and was interviewed before Apr 2021. There were 3 interview rounds.
Aptitude test will a hackerrank test where it might have technical MCQ and/or coding test.
I applied via Recruitment Consultant and was interviewed before Jun 2020. There were 4 interview rounds.
posted on 4 Oct 2021
I applied via Company Website and was interviewed in Apr 2021. There was 1 interview round.
Classloaders are responsible for loading classes into the JVM at runtime.
Java has three built-in classloaders: bootstrap, extension, and system.
Custom classloaders can be created to load classes from non-standard sources.
Classloaders follow a delegation model, where they first delegate to their parent classloader before attempting to load the class themselves.
Classloaders can be used for dynamic class loading and hot-s...
I applied via Referral and was interviewed in Jul 2020. There were 3 interview rounds.
The sliding window technique efficiently finds Pythagorean triplets in an array using two pointers.
Sort the array to facilitate the two-pointer approach. Example: [3, 1, 4, 6, 5] becomes [1, 3, 4, 5, 6].
Iterate through the array, fixing one element and using two pointers for the remaining elements.
For each fixed element, check if the sum of squares of the two pointers equals the square of the fixed element.
If a triplet...
Detect if two circular linked lists overlap
Traverse both lists and check if they have the same tail node
If they have different tail nodes, they do not overlap
If they have the same tail node, check if they intersect at any point
Use Floyd's cycle-finding algorithm to detect intersection point
posted on 6 Sep 2022
Spring is a framework while Spring Boot is an opinionated version of Spring.
Spring requires more configuration while Spring Boot has auto-configuration
Spring Boot has embedded servers while Spring does not
Spring Boot has a simpler setup process compared to Spring
Spring Boot has a built-in dependency management system
Spring Boot is more suitable for microservices architecture
posted on 16 Oct 2023
I applied via Approached by Company and was interviewed before Oct 2022. There were 2 interview rounds.
Distributed systems are a network of independent computers that work together to achieve a common goal. Security can be maintained through encryption, authentication, access control, and monitoring.
Distributed systems consist of multiple computers that communicate and coordinate actions to achieve a common goal.
Security in distributed systems can be maintained through encryption of data in transit and at rest.
Authentic...
Container orchestration tools are crucial for managing the deployment, scaling, and monitoring of large complex systems.
Container orchestration tools help automate the deployment and scaling of containerized applications, making it easier to manage large complex systems.
They provide features like service discovery, load balancing, health checks, and auto-scaling, which are essential for ensuring high availability and p...
Some of the top questions asked at the Zscaler Softech Senior Software Engineer interview -
based on 3 interview experiences
Difficulty level
based on 13 reviews
Rating in categories
Technical Account Manager
124
salaries
| ₹13 L/yr - ₹40 L/yr |
Software Engineer
103
salaries
| ₹7.5 L/yr - ₹26.2 L/yr |
Senior Software Engineer
99
salaries
| ₹12 L/yr - ₹46 L/yr |
Associate Software Engineer
68
salaries
| ₹6.8 L/yr - ₹21 L/yr |
Softwaretest Engineer
55
salaries
| ₹21.5 L/yr - ₹25.5 L/yr |
Thomson Reuters
Oracle Cerner
Chetu
R Systems International