i
Filter interviews by
jQuery is a fast, small, and feature-rich JavaScript library that simplifies HTML document traversal and manipulation, event handling, and animation.
jQuery is a JavaScript library.
It simplifies HTML document traversal and manipulation.
It provides easy event handling and animation.
jQuery is fast, small, and feature-rich.
A program to sort an array of strings.
Use a sorting algorithm like bubble sort, insertion sort, or quicksort.
Compare strings using a comparison function.
Implement the sorting algorithm in a function that takes the array as input and modifies it in place.
CDN stands for Content Delivery Network. It is a distributed network of servers that deliver web content to users based on their geographic location.
CDN improves website performance by reducing latency and increasing page load speed.
CDN caches content in multiple locations, allowing users to access it from a server closest to them.
CDN can handle high traffic loads and distribute it across multiple servers.
Popular ...
A directive is a programming construct that provides instructions to a compiler or interpreter.
Directives are used to control the behavior of a program or to provide additional information to the compiler or interpreter.
They are typically written as special comments or statements in the code.
Examples of directives include #include in C/C++ to include header files, #pragma to control compiler-specific behavior, and...
Services are software components that perform specific tasks or provide functionality to other software applications.
Services are self-contained and independent modules that can be accessed by other software components.
They can be used to handle business logic, data processing, communication with external systems, etc.
Examples of services include web services, microservices, RESTful APIs, and cloud services.
Servic...
Strings are sequences of characters used in programming, while frameworks provide a structured environment for building applications.
Data Type: Strings are fundamental data types in programming, used to represent text. For example, 'Hello, World!' is a string.
String Manipulation: Frameworks often provide utilities for string manipulation, such as concatenation, slicing, and searching. For instance, in Python, you ...
Various methods exist to reverse a string, including built-in functions, loops, recursion, and using data structures.
Using Python slicing: `reversed_string = original_string[::-1]`
Using the built-in `reversed()` function: `reversed_string = ''.join(reversed(original_string))`
Using a loop: `reversed_string = '' for char in original_string: reversed_string = char + reversed_string`
Using recursion: `def reverse(s): r...
Program to find second max in a list and its time complexity
Sort the list in descending order and return the second element
Traverse the list and keep track of the maximum and second maximum elements
Time complexity: O(n)
BGP and OSPF are routing protocols used in computer networks to exchange routing information and determine the best path for data to travel.
BGP (Border Gateway Protocol) is used to exchange routing information between different autonomous systems (AS) in the internet.
OSPF (Open Shortest Path First) is used within a single autonomous system to determine the best path for data to travel.
BGP uses a path vector algori...
Machine learning can be leveraged in cyber-security to detect and prevent cyber threats.
Machine learning algorithms can analyze large amounts of data to identify patterns and anomalies that may indicate a cyber attack.
By training machine learning models on historical data, they can learn to recognize known attack patterns and predict future attacks.
Machine learning can be used to automate the detection and respons...
I appeared for an interview in Jun 2025, where I was asked the following questions.
I appeared for an interview in Jan 2025.
I have extensive experience in UX design, with my best project being a mobile app redesign for a major e-commerce company.
Redesigned mobile app interface to improve user experience and increase conversions
Conducted user research and usability testing to inform design decisions
Collaborated with cross-functional teams to implement design changes
Resulted in a 20% increase in user engagement and a 15% increase in conversio...
I evaluate the success of a project by analyzing user feedback, metrics, and meeting project goals.
Collect and analyze user feedback through surveys, interviews, and usability testing
Track key metrics such as user engagement, conversion rates, and task completion
Compare project outcomes to initial goals and objectives
Iterate on design based on feedback and data to improve user experience
My approach to a design task involves research, ideation, prototyping, testing, and iteration.
Conduct thorough research to understand user needs and goals
Generate ideas through brainstorming and sketching
Create prototypes to visualize concepts and gather feedback
Test prototypes with users to identify usability issues
Iterate on designs based on feedback and data
One of the most valuable design experiences I had recently was leading a redesign project for a mobile app.
Led a redesign project for a mobile app, involving user research, wireframing, prototyping, and usability testing
Collaborated closely with cross-functional teams to gather feedback and iterate on designs
Implemented user-centered design principles to improve overall user experience and increase user engagement
Design a test with a clearly outlined problem; you need to sketch your ideas and thoughts within one hour.
I designed a user-friendly mobile app for tracking daily water intake.
Focused on intuitive interface for easy input of water consumption
Incorporated visual reminders and progress tracking for motivation
Implemented a feature to set personalized water intake goals
Utilized color-coded visual cues for quick reference
Conducted user testing to gather feedback for improvements
Various scenarios to evaluate UX design skills
User research and persona creation
Wireframing and prototyping
Usability testing and feedback analysis
Accessibility considerations
Collaboration with cross-functional teams
Consider error cases in design to ensure user experience is not negatively impacted.
Input validation errors (e.g. incorrect format, missing required fields)
Network errors (e.g. slow or no internet connection)
System errors (e.g. server downtime, database errors)
User errors (e.g. accidental deletion, incorrect actions)
Security errors (e.g. unauthorized access, data breaches)
I possess strong communication skills, a user-centered approach, and a proven track record of delivering successful UX designs.
Strong communication skills demonstrated through effective collaboration with cross-functional teams
User-centered approach evident in my portfolio showcasing intuitive and user-friendly designs
Proven track record of delivering successful UX designs, as evidenced by positive user feedback and in...
A designer should understand various strategies to effectively solve design problems.
User research and testing
Information architecture
Wireframing and prototyping
Visual design principles
Collaboration with stakeholders
OpenText products are a suite of enterprise software solutions for content management, digital experience, and business process automation.
OpenText Content Suite for managing enterprise content
OpenText Experience Suite for creating personalized digital experiences
OpenText Process Suite for automating business processes
OpenText Documentum for managing documents and records
OpenText Media Management for digital asset mana...
I have extensive experience with designing and optimizing workflows to improve user experience.
Designed workflows for e-commerce platforms to streamline the checkout process and increase conversion rates
Optimized workflows for mobile applications to enhance user engagement and retention
Conducted user research to identify pain points in existing workflows and proposed solutions for improvement
I appeared for an interview in Jun 2025, where I was asked the following questions.
I appeared for an interview in Sep 2024.
Program in .NET to output characters appearing more than two times consecutively in a given string.
Iterate through the string and check if the current character is the same as the previous one.
Keep track of the count of consecutive characters and output those that appear more than two times.
Use a StringBuilder to efficiently build the output string.
Implement strategies to resolve backlog of requests from microservice two due to microservice three breaking.
Identify the root cause of the issue in microservice three and fix it.
Implement circuit breaker pattern to handle failures and prevent cascading failures.
Implement retries with exponential backoff for failed requests from microservice two to microservice three.
Scale up microservice three to handle increased load...
Abstract class is a class that cannot be instantiated and may contain abstract methods, while interfaces only define method signatures.
Abstract classes can have both abstract and non-abstract methods, providing a partial implementation for subclasses.
Interfaces can only have method signatures, requiring implementing classes to define the actual implementation.
Abstract classes can have constructors, member variables, an...
I have utilized design patterns such as Singleton, Factory, and Observer in my projects.
Singleton pattern for ensuring a class has only one instance
Factory pattern for creating objects without specifying the exact class
Observer pattern for defining a one-to-many dependency between objects
The application architecture follows a microservices design pattern with a front-end client communicating with multiple back-end services.
Front-end client communicates with back-end services via APIs
Back-end services are independent and handle specific functionalities
Data is stored in a distributed database for scalability
Use of containerization for deployment and scaling
Message queues for asynchronous communication be...
Use a hash set to efficiently find duplicate strings in a list.
Create a hash set to store unique strings.
Iterate through the list of strings, adding each string to the hash set.
If a string is already in the hash set, add it to the list of duplicates.
Return the list of duplicate strings.
Our application is a cloud-based project management tool that helps teams collaborate and track progress.
Utilizes React for front-end development
Uses Node.js for back-end development
Integrates with third-party APIs for additional functionality
MS SQL for structured data, NoSQL for unstructured data or high scalability
Use MS SQL for structured data with complex relationships and transactions
Use NoSQL for unstructured data or high scalability requirements
Consider using a combination of both for different parts of the application
Example: Use MS SQL for financial transactions and NoSQL for user profiles
MongoDB is a popular choice as an alternative to Elasticsearch due to its flexibility and scalability.
MongoDB is a document-oriented NoSQL database that allows for flexible schema design, making it a good fit for a wide range of use cases.
MongoDB also offers powerful indexing and querying capabilities, similar to Elasticsearch.
MongoDB's horizontal scalability and sharding capabilities make it suitable for handling larg...
MongoDB is a NoSQL database while PostgreSQL is a relational database management system.
MongoDB is schema-less, allowing for flexible data models, while PostgreSQL enforces a predefined schema.
MongoDB uses a document-based data model with JSON-like documents, while PostgreSQL uses tables with rows and columns.
MongoDB is better suited for applications with large amounts of unstructured data, while PostgreSQL is better f...
Conventional URLs use query parameters while attribute URLs use route parameters in .NET Core Web API.
Conventional URLs use query parameters to pass data in the URL, while attribute URLs use route parameters in the route template.
Conventional URLs are more flexible as they allow for optional parameters, while attribute URLs are more rigid in their structure.
Attribute URLs are more readable and provide a cleaner way to ...
OAuth authorization is a protocol that allows a user to grant limited access to their resources without sharing their credentials.
OAuth allows a user to grant access to their resources to a third-party application without sharing their credentials.
It involves the exchange of tokens between the user, the third-party application, and the resource server.
OAuth uses authorization codes, access tokens, and refresh tokens to...
To ensure maintainability, I follow coding best practices, use version control, write clean and modular code, document thoroughly, and conduct regular code reviews.
Follow coding best practices such as SOLID principles and design patterns
Use version control system like Git to track changes and collaborate with team members
Write clean and modular code to make it easier to understand and update
Thoroughly document code, in...
I have utilized design patterns such as Singleton, Factory, and Observer in my work.
Singleton pattern for ensuring a class has only one instance
Factory pattern for creating objects without specifying the exact class
Observer pattern for defining a one-to-many dependency between objects
Repository Pattern helps in separating data access logic from business logic, improving code maintainability.
Encapsulates the logic required to access data from the data source, providing a clean separation between data access and business logic.
Promotes code reusability by allowing different parts of the application to use the same data access logic without duplicating code.
Facilitates unit testing by enabling the moc...
I appeared for an interview in Jun 2025, where I was asked the following questions.
Use SQL JOIN to find common elements from two tables and return results from the first table.
Use INNER JOIN to find common records between two tables.
Example: SELECT a.* FROM TableA a INNER JOIN TableB b ON a.id = b.id;
This query returns all columns from TableA where there is a matching id in TableB.
Ensure that the join condition accurately reflects the common elements you want to compare.
To find the second highest salary, use SQL queries that leverage sorting and distinct values.
Use the 'DISTINCT' keyword to eliminate duplicate salaries.
Sort the salaries in descending order and limit the results.
A common query is: 'SELECT DISTINCT salary FROM employees ORDER BY salary DESC LIMIT 1 OFFSET 1;'
Alternatively, use a subquery: 'SELECT MAX(salary) FROM employees WHERE salary < (SELECT MAX(salary) FROM empl...
Creating an API function to update database info using JSON data involves defining endpoints, parsing data, and executing updates.
Define the API endpoint (e.g., POST /updateRecord).
Use a web framework (e.g., Flask, Express) to handle requests.
Parse the incoming JSON data using libraries (e.g., json in Python).
Validate the data to ensure it meets required formats and constraints.
Connect to the database using an ORM (e.g...
Two questions to solved (difficulty was easy to medium)
1) Based bit manipulaqtion
2) Based on recussion
Yes, I am willing to work in Bangalore.
I am open to relocating for the right opportunity.
I have heard great things about the tech industry in Bangalore.
I am excited about the prospect of working in a diverse and vibrant city like Bangalore.
I applied via LinkedIn and was interviewed in Nov 2024. There were 3 interview rounds.
Basic DSA from the hacker rank website
I applied via Naukri.com and was interviewed in Jul 2024. There were 3 interview rounds.
As an engineering manager, I oversee team performance, project delivery, and foster a collaborative environment.
Conduct daily stand-up meetings to track progress and address blockers.
Review project timelines and ensure alignment with business goals, e.g., adjusting deadlines based on team capacity.
Mentor and support team members in their professional development, such as providing feedback on code reviews.
Collaborate w...
I applied via Approached by Company and was interviewed in Sep 2024. There were 4 interview rounds.
It was medium, I was able to solve
It was a difficult one from leetcode and modified on the basis on the go, I was able to solve with some hints
It was a difficult one and from leetcode and modified during the begining. I was partially able to solve. But the the Interviewer was expecting some exact answer, which might not interest him.
Top trending discussions
Some of the top questions asked at the OpenText Technologies interview -
The duration of OpenText Technologies interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 156 interview experiences
Difficulty level
Duration
based on 1.1k reviews
Rating in categories
Software Engineer
1.1k
salaries
| ₹12.2 L/yr - ₹21 L/yr |
Senior Software Engineer
1k
salaries
| ₹22.2 L/yr - ₹40 L/yr |
Associate Software Engineer
415
salaries
| ₹8 L/yr - ₹13.3 L/yr |
Lead Software Engineer
391
salaries
| ₹29.4 L/yr - ₹52 L/yr |
Software Developer
261
salaries
| ₹10.9 L/yr - ₹20 L/yr |
Amdocs
Automatic Data Processing (ADP)
24/7 Customer