i
UST
Work with us
Filter interviews by
Estimating the number of EV charging stations in India involves analyzing population, vehicle ownership, and infrastructure needs.
India has a population of approximately 1.4 billion, with a growing number of electric vehicles (EVs).
Assuming 1 EV per 10 households, with 300 million households, we estimate 30 million EVs.
A typical EV charging station can serve about 10-15 EVs per day.
To meet demand, India may need a...
Testing methodologies ensure software quality through structured approaches like unit, integration, and system testing.
Unit Testing: Tests individual components for correctness (e.g., testing a function in isolation).
Integration Testing: Validates the interaction between integrated components (e.g., testing APIs between services).
System Testing: Evaluates the complete system's compliance with requirements (e.g., e...
Assessing the validity of a claim involves critical evaluation of evidence, sources, and context.
Evaluate the source: Check the credibility of the person or organization making the claim. For example, a claim from a peer-reviewed journal is more reliable than one from a blog.
Examine the evidence: Look for data, studies, or statistics that support the claim. For instance, if a health claim is made, verify if there ...
Adjustment refers to modifying an entry, while duplicate indicates a repeated or copied entry.
Adjustment involves correcting or modifying an existing record, e.g., changing a billing amount due to a discount.
Duplicate refers to an entry that is repeated, e.g., entering the same invoice twice in a system.
Adjustments can be made to rectify errors, while duplicates often require deletion or merging.
In accounting, an ...
OOP is a programming paradigm based on objects that encapsulate data and behavior, promoting modularity and reusability.
Encapsulation: Bundling data and methods that operate on the data within one unit (e.g., a class).
Inheritance: Mechanism to create a new class from an existing class, inheriting attributes and methods (e.g., a 'Dog' class inheriting from an 'Animal' class).
Polymorphism: Ability to present the sam...
Security in an IT firm encompasses protecting data, systems, and networks from threats and vulnerabilities.
Data Protection: Ensuring sensitive information is encrypted and access is restricted. For example, using AES encryption for databases.
Network Security: Implementing firewalls and intrusion detection systems to monitor and protect network traffic.
Application Security: Regularly updating software and conductin...
Active Directory is a directory service by Microsoft for managing users, computers, and resources in a networked environment.
Centralized management of user accounts and permissions.
Supports Group Policy for enforcing security settings across devices.
Facilitates single sign-on (SSO) for users accessing multiple services.
Organizes resources in a hierarchical structure using domains, trees, and forests.
Integrates wit...
The OSI model is a conceptual framework used to understand network communication in seven layers.
Layer 1: Physical - Deals with the physical connection (e.g., cables, switches).
Layer 2: Data Link - Manages node-to-node data transfer (e.g., Ethernet).
Layer 3: Network - Handles routing of data (e.g., IP addresses).
Layer 4: Transport - Ensures complete data transfer (e.g., TCP, UDP).
Layer 5: Session - Manages session...
A Web API is an interface that allows different software applications to communicate over the internet using standard protocols.
Web APIs use HTTP requests to access and manipulate data.
Common formats for data exchange include JSON and XML.
Examples include RESTful APIs (like Twitter API) and SOAP APIs (like some banking services).
Web APIs enable integration between different systems, such as mobile apps and web ser...
React hooks are functions that let you use state and other React features without writing a class.
Hooks allow functional components to manage state and lifecycle events.
Common hooks include useState for state management and useEffect for side effects.
Example of useState: const [count, setCount] = useState(0);
Example of useEffect: useEffect(() => { document.title = `Count: ${count}`; }, [count]);
Custom hooks can...
I applied via Naukri.com and was interviewed in Aug 2021. There was 1 interview round.
Swift is a modern programming language while Objective-C is an older language used for iOS development.
Swift is easier to read and write than Objective-C.
Swift is faster than Objective-C.
Objective-C is still used in legacy codebases.
Swift has a simpler syntax and is more concise.
Swift has better memory management than Objective-C.
Swift 5 introduces ABI stability, new language features, and improved performance.
ABI stability ensures compatibility between future Swift versions
Raw strings allow for easier handling of regular expressions and multi-line strings
Dynamic callable types enable objects to be called like functions
Improved performance with faster build times and reduced app size
New Result type for handling errors and success cases
Property ...
I appeared for an interview in Jan 2025.
Method overloading is having multiple methods in the same class with the same name but different parameters. Method overriding is having a method in a subclass with the same name and parameters as a method in its superclass.
Method overloading is achieved by having multiple methods in the same class with the same name but different parameters.
Method overriding is achieved by having a method in a subclass with the same n...
I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.
Create a k8s deployment ymal with rolling update for a given docker image
Define a Deployment object in the YAML file
Specify the container image in the spec section
Set the update strategy to RollingUpdate
Define the number of replicas for the deployment
A method to read a JSON file and recursively retrieve values associated with a specified key.
Use a programming language like Python or JavaScript to read the JSON file.
Implement a recursive function that traverses the JSON structure.
Check if the current element is a dictionary or a list to continue recursion.
Example in Python: def get_value(data, key): if isinstance(data, dict): for k, v in data.items(): if k == key: y...
Java program to perform validations on input data.
Use regular expressions to validate input data.
Implement custom validation logic for specific requirements.
Utilize Java libraries like Apache Commons Validator for common validation tasks.
The cred operations refer to the actions related to credentials in a software system.
Cred operations typically involve tasks such as creating, updating, deleting, and verifying user credentials.
Examples of cred operations include user registration, password reset, and authentication processes.
These operations are crucial for ensuring secure access to the software system and protecting user data.
I applied via Approached by Company and was interviewed in Sep 2024. There were 2 interview rounds.
Using stream and lambda to find numbers starting with 1 from list of Integers.
Use stream to filter the list of Integers based on the condition that the number starts with 1.
Use lambda expression to define the condition for filtering.
Convert the filtered numbers to strings and store them in an array.
Merge two lists of integers and remove duplicates in the result list.
Create a new list to store the merged result.
Iterate through each element in both lists and add them to the result list if they are not already present.
Use a set to keep track of duplicates and avoid adding them to the result list.
I applied via Job Fair and was interviewed in Nov 2024. There were 2 interview rounds.
I applied via Company Website and was interviewed in Nov 2024. There were 3 interview rounds.
A standard online test conducted through one of the testing platforms.
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
I appeared for an interview in Apr 2025, where I was asked the following questions.
What people are saying about UST
Some of the top questions asked at the UST interview -
The duration of UST interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 437 interview experiences
Difficulty level
Duration
Software Developer
2.1k
salaries
| ₹4.1 L/yr - ₹19.6 L/yr |
Senior Software Engineer
1.6k
salaries
| ₹7 L/yr - ₹28.5 L/yr |
Software Engineer
1.5k
salaries
| ₹3.8 L/yr - ₹15.7 L/yr |
System Analyst
1.1k
salaries
| ₹6.3 L/yr - ₹22.6 L/yr |
Senior Software Developer
957
salaries
| ₹5.5 L/yr - ₹20.5 L/yr |
Accenture
Wipro
Cognizant
Capgemini