Filter interviews by
Hadoop is a distributed computing framework for processing large datasets across clusters of computers using simple programming models.
Hadoop consists of two main components: Hadoop Distributed File System (HDFS) for storage and MapReduce for processing.
HDFS stores data across multiple machines, ensuring fault tolerance and high availability by replicating data blocks.
MapReduce is a programming model that processe...
The task is to compress a string by counting consecutive characters and representing them in a specific format.
Identify consecutive characters in the string.
Count how many times each character appears consecutively.
Construct a new string using the format: character followed by its count.
Example: 'aaa' becomes 'a3'.
Final output for 'aaaabbbaacc' is 'a4b3a2c2'.
Yes, I am very interested in the Customer Support Executive role as it aligns with my skills and passion for helping others.
I have a strong background in customer service, having worked in retail where I resolved customer issues effectively.
I enjoy problem-solving and find satisfaction in helping customers navigate challenges.
My communication skills allow me to convey information clearly and empathetically, ensuri...
Experience with Jenkins and Terraform for automation and infrastructure management.
Used Jenkins for continuous integration and continuous deployment pipelines
Utilized Terraform for infrastructure as code to provision and manage resources
Integrated Jenkins with Terraform for automated infrastructure deployment
Troubleshooted and optimized Jenkins and Terraform configurations
DHCP is a network protocol that automatically assigns IP addresses to devices on a network.
DHCP stands for Dynamic Host Configuration Protocol.
It allows devices to obtain IP addresses and other network configuration information from a DHCP server.
DHCP operates on the client-server model, where the client requests an IP address and the server assigns one.
DHCP uses a lease mechanism to control the amount of time a d...
Deadlock in OS is a situation where two or more processes are unable to proceed because each is waiting for the other to release a resource.
Occurs when processes are stuck in a circular wait for resources
Can be prevented by using proper resource allocation strategies like avoiding circular waits
Examples include two processes each holding a resource the other needs
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
Physical Layer: Deals with physical connections and transmission of raw data. Example: Ethernet cables.
Data Link Layer: Manages data transfer between devices on the same network. Example: MAC addresses.
Network Layer: Handles routing and forwarding of data packets. Example: ...
Use load balancing, caching, and scaling techniques to handle millions of requests from clients.
Implement load balancing to distribute requests evenly across servers.
Utilize caching mechanisms to store frequently accessed data and reduce load on servers.
Scale horizontally by adding more servers to handle increased traffic.
Optimize code and database queries to improve performance and reduce response times.
Implement a circular list
Use a linked list where the last node points back to the first node
Keep track of the current node for easy traversal
Ensure proper handling of edge cases like empty list or single node
Creating a bar graph using array of strings
Create an array of strings representing the data points for the bar graph
Each string should indicate the value of the bar and its corresponding label
Use a visualization tool or library to plot the bar graph based on the array of strings
ConcurrentHashMap allows multiple threads to access and modify the map concurrently, while SynchronizedHashMap ensures thread-safety by allowing only one thread to access the map at a time.
ConcurrentHashMap is more efficient in scenarios with high concurrency as it allows concurrent read and write operations.
SynchronizedHashMap is simpler to use and provides thread-safety, but can lead to performance degradation in hig...
Semaphores in Java are used for controlling access to a shared resource. They can be implemented using the java.util.concurrent package.
Use the Semaphore class from the java.util.concurrent package
Create a Semaphore object with an initial number of permits
Use the acquire() method to acquire a permit before accessing the shared resource
Use the release() method to release a permit after accessing the shared resource
Bitmask in Postgresql is used to store and manipulate multiple boolean values within a single integer column.
Bitmask is a technique to represent a set of boolean flags using binary digits.
In Postgresql, the bitwise operators (&, |, ^, ~) can be used to perform operations on bitmasks.
To set a specific flag in a bitmask, use the bitwise OR operator (|).
To check if a flag is set in a bitmask, use the bitwise AND operator ...
Swap characters from uppercase to lowercase and lowercase to uppercase in a given string.
Iterate through each character in the string
Check if the character is uppercase or lowercase
Swap the case of the character using bitwise XOR operation
Build the resulting string with the swapped characters
To create a singleton ensuring reflection does not mess up the implementation, use an enum or a private constructor with a static field.
Use an enum to create a singleton as enums are inherently singletons and cannot be instantiated multiple times.
Alternatively, use a private constructor with a static field to create a singleton.
To prevent reflection from creating multiple instances, throw an exception in the constructo...
I appeared for an interview in Mar 2025, where I was asked the following questions.
I applied via Naukri.com
I applied via Campus Placement and was interviewed in Nov 2024. There was 1 interview round.
DORA stands for DevOps Research and Assessment, a framework for measuring software delivery performance.
DORA is a research organization that focuses on improving software delivery performance.
They have developed a framework for measuring key metrics in DevOps practices.
DORA metrics include deployment frequency, lead time for changes, mean time to recover, and change failure rate.
DHCP is a network protocol that automatically assigns IP addresses to devices on a network.
DHCP stands for Dynamic Host Configuration Protocol.
It allows devices to obtain IP addresses and other network configuration information from a DHCP server.
DHCP operates on the client-server model, where the client requests an IP address and the server assigns one.
DHCP uses a lease mechanism to control the amount of time a device...
Implement a circular list
Use a linked list where the last node points back to the first node
Keep track of the current node for easy traversal
Ensure proper handling of edge cases like empty list or single node
Use load balancing, caching, and scaling techniques to handle millions of requests from clients.
Implement load balancing to distribute requests evenly across servers.
Utilize caching mechanisms to store frequently accessed data and reduce load on servers.
Scale horizontally by adding more servers to handle increased traffic.
Optimize code and database queries to improve performance and reduce response times.
I applied via Campus Placement
Implement a function to find minimum values in a sliding window of an array.
Use a deque to store indices of array elements.
Maintain the deque in increasing order of values.
Remove indices that are out of the current window.
The front of the deque always contains the index of the minimum element.
Implementation of ML concepts in projects involves identifying suitable algorithms, collecting and preprocessing data, training models, and evaluating performance.
Identify the problem to be solved and determine if ML is the appropriate solution
Collect and preprocess data to ensure it is clean and relevant for training
Select suitable algorithms based on the problem and data characteristics
Train the models using the data...
Data integration & pipeline involves combining data from multiple sources and processing it to make it usable for analysis.
Data integration is the process of combining data from different sources into a single, unified view.
Data pipeline refers to the series of steps that data goes through from collection to analysis.
Data integration ensures that data is clean, consistent, and accurate before being processed in the pip...
Quizes and mathematical aptitude
Two case studies were presented
I am drawn to this organization because of its innovative approach to data analysis and its commitment to making a positive impact in the industry.
The organization has a strong reputation for using cutting-edge technology and techniques in data analysis.
I admire the organization's focus on using data to drive decision-making and improve processes.
I am impressed by the organization's track record of success and growth i...
In 5 years, I see myself as a seasoned data analyst leading projects and mentoring junior analysts.
Leading data analysis projects
Mentoring junior analysts
Continuing to learn and grow in the field
Possibly pursuing advanced certifications or degrees
Contributing to the success of the organization
All answers available on internet
War or random topic with 20 folks
I applied via Campus Placement
Search for an element in a rotated sorted array
Use binary search to find the pivot point where the array is rotated
Divide the array into two subarrays and perform binary search on the appropriate subarray
Handle cases where the target element is on the left or right side of the pivot
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a collision occurs and the key-value pairs are stored in a linked list at that inde...
Top trending discussions
Some of the top questions asked at the Zscaler Softech interview -
The duration of Zscaler Softech interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 72 interview experiences
Difficulty level
Duration
based on 360 reviews
Rating in categories
Technical Account Manager
124
salaries
| ₹13 L/yr - ₹40 L/yr |
Software Engineer
103
salaries
| ₹7.5 L/yr - ₹26.2 L/yr |
Senior Software Engineer
101
salaries
| ₹21.2 L/yr - ₹38 L/yr |
Associate Software Engineer
68
salaries
| ₹10 L/yr - ₹16 L/yr |
Softwaretest Engineer
55
salaries
| ₹21.5 L/yr - ₹25.5 L/yr |
Thomson Reuters
Oracle Cerner
Chetu
R Systems International