Filter interviews by
The Special Keyboard DP Problem involves optimizing key presses for a specific output using dynamic programming.
Identify the target string and the available keys on the keyboard.
Use dynamic programming to calculate the minimum key presses needed.
Consider edge cases, such as repeated characters or missing keys.
Example: If the target is 'abc' and keys are 'a', 'b', 'c', the answer is 3.
Example: If the target is 'aaa...
I am expecting a competitive salary based on my experience and the responsibilities of the role.
I am open to negotiation based on the company's budget and benefits package.
I have researched the average salary range for this position in the industry and location.
I am confident in my skills and experience and believe I can bring value to the company.
I am looking for a fair and reasonable compensation package that re...
Key challenges faced and solutions as a Program Manager
One of the key challenges is managing stakeholder expectations
Solution is to establish clear communication channels and set realistic goals
Another challenge is managing project scope and changes
Solution is to have a change management process in place and regularly review project scope
Resource allocation and management can also be a challenge
Solution is to have...
Addressing failed IT DR tests involves analysis, remediation, and continuous improvement to ensure resilience.
Conduct a thorough post-test analysis to identify root causes of failure.
Update the disaster recovery plan based on findings; for example, if a backup system failed, consider alternative solutions.
Engage stakeholders to communicate results and gather feedback for improvement.
Implement corrective actions, s...
Singleton is a design pattern that restricts the instantiation of a class to a single object.
Singleton ensures that only one instance of a class exists in the entire application.
It provides a global point of access to the instance.
Commonly used in scenarios where a single instance needs to coordinate actions across the system.
Example: Database connection manager, logger, configuration manager.
Immutable in Java refers to objects whose state cannot be changed after creation.
String, Integer, and other wrapper classes are immutable in Java.
Immutable objects are thread-safe and can be shared without synchronization.
To create an immutable class, make all fields final and private, and don't provide setters.
Examples of immutable classes in Java include LocalDate, LocalTime, and LocalDateTime.
Ajax calls allow for asynchronous communication between client and server without reloading the page.
Ajax stands for Asynchronous JavaScript and XML
Uses XMLHttpRequest object to send and receive data
Allows for partial page updates without reloading the entire page
Can handle data in various formats such as JSON, XML, HTML, and plain text
Example: $.ajax({url: 'example.com', success: function(data){console.log(data)}...
REST is lightweight and uses HTTP while SOAP is XML-based and has more features.
REST uses HTTP methods like GET, POST, PUT, DELETE while SOAP uses XML messaging.
REST is stateless while SOAP can maintain state.
REST is faster and easier to use while SOAP is more secure and reliable.
REST is used for web services while SOAP is used for enterprise-level services.
Example of REST: Twitter API. Example of SOAP: Amazon Web...
Creating immutable in Java
Use final keyword to make variables immutable
Use private constructor to prevent object modification
Use defensive copying to prevent modification of mutable objects
Use enum to create immutable objects
Use String class to create immutable strings
CORS stands for Cross-Origin Resource Sharing. It is a security feature implemented in web browsers to restrict access to resources from different origins.
CORS allows web servers to specify which origins are allowed to access its resources
It is implemented using HTTP headers
CORS prevents malicious websites from accessing sensitive data from other websites
Examples of resources that may be restricted by CORS include...
I appeared for an interview in Dec 2024, where I was asked the following questions.
I applied via LinkedIn and was interviewed in Jul 2024. There were 3 interview rounds.
Vulnerability management involves identifying, assessing, and mitigating security weaknesses in systems and applications.
Conduct regular vulnerability assessments using tools like Nessus or Qualys.
Prioritize vulnerabilities based on risk and impact, such as CVSS scores.
Implement patch management processes to address identified vulnerabilities promptly.
Utilize threat intelligence to stay informed about emerging vulnerab...
Supporting application for SSO enablement involves configuring authentication settings, integrating with identity providers, and testing functionality.
Configure authentication settings within the application to enable SSO
Integrate the application with identity providers such as Okta, Azure AD, or PingFederate
Test the SSO functionality to ensure seamless user experience
Provide documentation and training for users on how...
I handle outages by following established procedures and prioritize tasks based on impact.
Immediately assess the situation to determine the root cause of the outage
Communicate with stakeholders to keep them informed of the issue and expected resolution time
Work with cross-functional teams to troubleshoot and resolve the outage as quickly as possible
Document the outage incident and steps taken for future reference and i...
I handle change management by implementing structured processes, communication, and stakeholder involvement.
Implementing a change management process to track and document changes
Communicating changes effectively to all stakeholders
Involving key stakeholders in decision-making and planning
Ensuring proper testing and validation of changes before implementation
Enable SSO for SaaS applications by integrating with identity providers and configuring authentication protocols.
Integrate with identity providers such as Okta, Azure AD, or Google Workspace
Configure authentication protocols like SAML, OAuth, or OpenID Connect
Implement single sign-on functionality in the application code
Ensure secure communication between the application and the identity provider
RTO stands for Recovery Time Objective in disaster recovery, representing the targeted duration of time within which a business process must be restored after a disaster.
RTO is a crucial metric in disaster recovery planning, indicating the maximum acceptable downtime for a system or process.
It helps organizations determine the resources and strategies needed to recover from a disaster within a specific timeframe.
For ex...
I primarily use SSH (Secure Shell) to connect servers.
SSH (Secure Shell) is a widely used application for securely connecting to servers
Other applications like PuTTY, OpenSSH, and WinSCP can also be used for server connections
Yes, I am experienced in vulnerability management.
I have experience in identifying, prioritizing, and mitigating vulnerabilities in systems and networks.
I am proficient in using vulnerability scanning tools such as Nessus, Qualys, and OpenVAS.
I have implemented patch management processes to address vulnerabilities in a timely manner.
I have conducted vulnerability assessments and penetration testing to identify weakness...
I have experience working with both connected and disconnected applications.
I have experience developing applications that can function both online and offline.
I have worked on projects where data synchronization is crucial for seamless user experience.
Examples include mobile apps that can work offline and sync data when connected to the internet.
Yes, I have experience in taking care of the Authorization part in various projects.
Implemented role-based access control (RBAC) to manage user permissions
Configured and managed authentication protocols such as OAuth and SAML
Worked on setting up access control lists (ACLs) for network security
Experience with managing user roles and permissions in Active Directory
Utilized single sign-on (SSO) solutions for seamless user...
I applied via Job Portal
React lifecycle functions are methods that are automatically called at specific points in a component's life cycle.
Mounting: constructor, render, componentDidMount
Updating: render, componentDidUpdate
Unmounting: componentWillUnmount
Padding is the space inside the border of an element, while margin is the space outside the border.
Padding is used to create space between the content and the border of an element.
Margin is used to create space between the border of an element and other elements.
Padding affects the size of the content area, while margin affects the positioning of the element.
Example: padding: 10px will create 10 pixels of space inside ...
Yes, I am open to relocating for the right opportunity, as it can enhance my career and personal growth.
Relocation can provide exposure to new technologies and methodologies.
Living in a different city can broaden my professional network.
I am adaptable and enjoy new experiences, which relocation offers.
For example, moving to a tech hub can lead to better career prospects.
I appeared for an interview in Apr 2025, where I was asked the following questions.
SOX ensures financial transparency and compliance, while internal audit evaluates risk management and operational efficiency.
SOX (Sarbanes-Oxley Act) focuses on financial reporting and accountability for public companies.
Internal audit assesses the effectiveness of internal controls and risk management processes.
SOX compliance requires external audits to verify financial statements, while internal audits are conducted ...
ITAC refers to Information Technology Application Controls, ensuring data integrity in financial processes.
ITACs are controls within IT systems that ensure the accuracy and reliability of financial data.
They are scoped in by identifying critical processes and assessing risks associated with data integrity.
Example of a three-way match: verifying that the purchase order, invoice, and receiving report all match before pro...
Key reports are essential financial documents that provide insights for decision-making and performance evaluation.
Key reports include financial statements, variance analysis, and budget forecasts.
Scoping involves identifying the report's purpose, audience, and key metrics to be included.
Testing key reports includes validating data accuracy, ensuring calculations are correct, and confirming that the report meets user r...
IT General Controls (ITGC) ensure the integrity and security of IT systems, categorized into preventive, detective, and corrective controls.
Preventive Controls: Aim to prevent errors or fraud. Example: Access controls that restrict unauthorized users.
Detective Controls: Identify and alert on errors or irregularities. Example: Audit logs that track user activities.
Corrective Controls: Address and rectify issues after th...
Create a function to generate a transaction bin column based on transaction amounts.
Create bins based on transaction amounts (e.g. $0-$100, $101-$200, etc.)
Use pandas cut() function in Python to create bins
Assign bin labels to the transactions based on the bin ranges
I applied via Referral and was interviewed in Sep 2024. There was 1 interview round.
To center a div in CSS3, use the 'margin: auto;' property along with a set width.
Set the width of the div
Use 'margin: auto;' to center the div horizontally
Make sure the parent container has a defined width
call, bind, and apply are methods used to manipulate the context of a function in JavaScript.
call() is used to invoke a function with a specified 'this' value and arguments provided individually.
bind() is used to create a new function with a specified 'this' value and initial arguments.
apply() is used to invoke a function with a specified 'this' value and arguments provided as an array.
Impairment refers to a reduction in the value of an asset on the balance sheet.
Impairment occurs when the carrying amount of an asset exceeds its recoverable amount.
It is typically recorded as a non-cash charge on the income statement.
Common examples include impairment of goodwill, intangible assets, and property, plant, and equipment.
Reconciling GL and subledger involves identifying and resolving discrepancies between the two accounts.
Compare transactions in GL and subledger to identify discrepancies
Investigate any differences in balances or transactions
Adjust entries in GL or subledger to reconcile the accounts
Ensure proper documentation of reconciliation process
Communicate with relevant stakeholders to resolve discrepancies
Develop a product strategy to enable mass migration in the market.
Conduct market research to identify target segments and their needs
Create a roadmap for product development and deployment
Implement marketing campaigns to educate and attract customers
Provide training and support for users transitioning to the new product
Monitor and analyze feedback to make continuous improvements
Create a Project Plan and Presentation on a Market Migration Case Study
posted on 25 Sep 2024
1. medium dp question on busrst ballon
2. graph quetion on flood fill
Design a file search feature for a software application.
Implement a search bar where users can input keywords or phrases to search for files.
Include filters for file type, date modified, and other relevant criteria.
Display search results in a user-friendly format with relevant file details.
Allow users to preview files before opening or downloading them.
Consider implementing search suggestions or autocomplete functional...
Design a ticket booking platform for movies, events, and shows with user-friendly features and robust backend architecture.
User Registration: Allow users to create accounts using email or social media.
Search Functionality: Implement a search bar for users to find movies or events by name, genre, or location.
Event Listings: Display a list of available movies/events with details like time, venue, and ticket prices.
Seat S...
TrieNode common prefix
Graph dkistra algo find least time to fill
Top trending discussions
Some of the top questions asked at the Visa interview -
The duration of Visa interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 110 interview experiences
Difficulty level
Duration
Senior Software Engineer
699
salaries
| ₹14 L/yr - ₹45 L/yr |
Software Engineer
444
salaries
| ₹9 L/yr - ₹30 L/yr |
Staff Software Engineer
213
salaries
| ₹24.7 L/yr - ₹65 L/yr |
Senior Data Engineer
108
salaries
| ₹20 L/yr - ₹45 L/yr |
Director
95
salaries
| ₹33.6 L/yr - ₹127 L/yr |
MasterCard
American Express
Paytm
FIS