Filter interviews by
I applied via Naukri.com and was interviewed in Jan 2023. There were 2 interview rounds.
Salary expectations depend on experience, market rates, and the specific responsibilities of the Senior Business Analyst role.
Market Research: I have researched the current market rates for Senior Business Analysts in this region, which typically range from $90,000 to $120,000.
Experience Level: Given my 7 years of experience in business analysis and successful project implementations, I believe a salary in the upper ra...
I applied via Referral and was interviewed in Oct 2020. There were 4 interview rounds.
Top trending discussions
I applied via LinkedIn and was interviewed before Sep 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Jan 2024. There were 2 interview rounds.
Got 2 medium level DSA questions in the coding test
I applied via Company Website and was interviewed in Jun 2024. There were 2 interview rounds.
2.5 Hours 2 Coding que and sql query and topin tech platform
Find k closest nodes to a given node in a BST.
Perform an inorder traversal of the BST to get a sorted list of nodes.
Use a priority queue to keep track of the k closest nodes based on their absolute difference with the target node.
Populate the priority queue with the first k nodes from the inorder traversal.
For each subsequent node, calculate its absolute difference with the target node and compare it with the top eleme...
I applied via Referral and was interviewed before Sep 2023. There were 4 interview rounds.
Two Medium DSA problem to solve
Design a scalable streaming pipeline for processing large volumes of data.
Use a distributed streaming framework like Apache Kafka or Apache Flink for real-time data processing.
Implement data partitioning and parallel processing to handle high data throughput.
Utilize cloud services like AWS Kinesis or Google Cloud Pub/Sub for scalability and reliability.
Include fault tolerance mechanisms like checkpointing and data repl...
Design classes for a simple library management system with methods for adding, borrowing, and returning books.
Class Book: Attributes include title, author, ISBN, and availability status.
Class User: Attributes include userID, name, and borrowedBooks (array of Book).
Class Library: Methods include addBook(Book), borrowBook(User, Book), returnBook(User, Book).
Example of addBook: library.addBook(new Book('1984', 'George Orw...
Object-oriented programming concepts that focus on classes and objects for better code organization and reusability.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class).
Inheritance: Ability of a class to inherit properties and behavior from another class.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation det...
Types of waits in Selenium include implicit, explicit, and fluent waits.
Implicit wait: Waits for a certain amount of time before throwing a NoSuchElementException.
Explicit wait: Waits for a certain condition to occur before proceeding further in the code.
Fluent wait: Waits for a condition to be true with a specified frequency of checking.
Example: driver.manage().timeouts().implicitlyWait(10, TimeUnit.SECONDS);
I applied via Referral and was interviewed in Nov 2023. There were 2 interview rounds.
They give a standard application to develop in mvvm or clean architecture, don't forget to write unit tests
Flutter is a UI toolkit for building natively compiled applications for mobile, web, and desktop from a single codebase.
Flutter is an open-source framework developed by Google.
It uses the Dart programming language.
Flutter allows for hot reload, which enables developers to see changes instantly.
It provides a rich set of pre-built widgets for building user interfaces.
Flutter can be used to create apps for iOS, Android, w...
Compose way of thinking involves breaking down complex problems into smaller, manageable parts and then combining them to create a solution.
Break down a problem into smaller components
Solve each component individually
Combine the solutions to create a complete solution
Example: Using functions to break down a complex task into smaller functions and then combining them to achieve the desired outcome
Lifecycle of view refers to the stages a view goes through from creation to destruction in an application.
Creation: View is initialized and loaded into memory.
Layout: View is positioned and sized on the screen.
Display: View is rendered and displayed to the user.
Interaction: User interacts with the view through input events.
Destruction: View is removed from memory when no longer needed.
I am excited about the opportunity to work on challenging projects and contribute to a talented team.
Passionate about software development and problem-solving
Interested in working on cutting-edge technologies
Excited about collaborating with a talented team to create innovative solutions
Linkedlist, tree, logical
I applied via Company Website and was interviewed before Mar 2020. There was 1 interview round.
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Start from the first element and compare it with the next element
If the first element is greater than the next element, swap them
Repeat this process for all elements in the list
Continue this process until no more swaps are needed
A Turing Machine is a theoretical device that can simulate any algorithmic computation.
It was proposed by Alan Turing in 1936 as a model for computation.
It consists of a tape, a head that can read and write symbols on the tape, and a set of rules for transitioning between states.
It can simulate any algorithmic computation, making it a powerful tool for theoretical computer science.
It is often used as a theoretical basi...
A hash function is a mathematical function that converts input data of arbitrary size into a fixed-size output.
Hash functions are used to index data in hash tables.
They are also used in cryptography to securely store passwords.
Examples of hash functions include MD5, SHA-1, and SHA-256.
based on 1 interview experience
Difficulty level
Duration
based on 7 reviews
Rating in categories
Senior Software Engineer
414
salaries
| ₹6 L/yr - ₹22 L/yr |
Technical Lead
170
salaries
| ₹8.1 L/yr - ₹26.4 L/yr |
Software Engineer
151
salaries
| ₹3.8 L/yr - ₹10 L/yr |
Senior Test Engineer
128
salaries
| ₹4 L/yr - ₹10.5 L/yr |
Test Engineer
97
salaries
| ₹3 L/yr - ₹8 L/yr |
BYJU'S
Whitehat jr
Unacademy
Extramarks Education