Filter interviews by
Count the number of islands in a binary matrix, where 1s represent land and 0s represent water.
An island is surrounded by water and is formed by connecting adjacent lands horizontally or vertically.
Use Depth-First Search (DFS) or Breadth-First Search (BFS) to explore the matrix.
Example: In a 4x5 matrix, [[1,1,0,0,0],[0,1,0,0,1],[0,0,0,1,1],[0,0,0,0,0]], there are 3 islands.
Mark visited land cells to avoid counting...
The CSS box model defines the layout of elements, including margins, borders, padding, and content area.
Content: The innermost part where text and images appear.
Padding: Space between the content and the border, affecting the element's size.
Border: A line surrounding the padding (if any) and content, defining the element's outer edge.
Margin: The outermost space that separates the element from others, creating dist...
To find a cycle in a linked list, use Floyd's Tortoise and Hare algorithm for efficient detection.
Use two pointers: slow (tortoise) moves one step, fast (hare) moves two steps.
If there's a cycle, the fast pointer will eventually meet the slow pointer.
If the fast pointer reaches the end (null), there's no cycle.
Example: In a list 1 -> 2 -> 3 -> 4 -> 2 (cycle back to 2), slow and fast will meet at 2.
Java's working flow involves compilation, class loading, bytecode execution, and garbage collection.
1. Source Code: Java code is written in .java files.
2. Compilation: The Java compiler (javac) converts .java files into bytecode (.class files).
3. Class Loading: The Java Virtual Machine (JVM) loads the .class files into memory.
4. Execution: The JVM executes the bytecode using an interpreter or Just-In-Time (JIT) co...
This task involves mapping each letter of the alphabet to its corresponding position, where 'a' is 1 and 'z' is 26.
Alphabet Mapping: Each letter corresponds to its position in the alphabet, e.g., 'a' = 1, 'b' = 2, ..., 'z' = 26.
Example: For the letter 'c', the index is 3 since it is the third letter in the alphabet.
Case Insensitivity: The mapping is case insensitive, so 'A' also equals 1.
Using ASCII Values: The in...
Implementing a sorting algorithm for an array of strings without using built-in sorted functions.
Use Bubble Sort: Compare adjacent strings and swap if they are in the wrong order. Example: ['banana', 'apple'] becomes ['apple', 'banana'].
Implement Selection Sort: Find the smallest string and swap it with the first element, then repeat for the rest. Example: ['cat', 'bat', 'apple'] becomes ['apple', 'bat', 'cat'].
Ut...
AV Foundation is a framework in iOS that provides essential services for working with time-based audiovisual media.
AV Foundation allows developers to capture, play, edit, and distribute multimedia content.
It supports various media formats such as audio, video, and images.
Developers can use AV Foundation to create custom video players, record audio, apply filters, and more.
It provides classes like AVPlayer, AVAsset...
Cloud computing can be accessed as both software and hardware.
Cloud computing is primarily software-based, allowing users to access applications and services over the internet.
However, cloud computing can also be accessed as hardware through physical servers, storage devices, and networking equipment.
Examples of hardware-based cloud computing include on-premises private clouds and hybrid cloud environments.
Hardwar...
SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate a database.
SQL injection allows attackers to access, modify, or delete data in a database.
Attackers can also execute commands on the database server.
Preventing SQL injection involves using parameterized queries and input validation.
Example: Inputting ' OR 1=1 --' into a login form to bypass authentication.
Investing is essential for building wealth and achieving financial goals.
Investing allows for potential growth of wealth over time.
Diversification is key to managing risk in investments.
Understanding your risk tolerance and investment goals is crucial.
Regularly reviewing and adjusting your investment portfolio is important.
Examples: Stocks, bonds, real estate, mutual funds.
I appeared for an interview in May 2025, where I was asked the following questions.
I appeared for an interview in Jan 2025.
Zoho’s Hiring Process is Completely Biased
Zoho gives priority to Tamil-speaking candidates, and only if there are extra vacancies do they consider people from other states. I cleared all five coding problems, optimized them as requested, and explained my approach clearly. The technical live coding interviewer, Seethu Maria Johnson, even told me that HR would contact me. But instead, I got a rejection email without any explanation.
It feels like Zoho already decides who they want to hire based on regional preference rather than talent. If you're from outside Tamil Nadu, don’t waste your time here—chances are, you won’t even be considered seriously. They show clear partiality in hiring, which is unfair to skilled candidates from other states.
To make things worse, I asked for feedback, but HR (Carmila & Veena C S & Supriya M) simply said "we cannot share the feedback." So, not only is the hiring process biased, but there’s also zero transparency.
Even after Seethu Maria Johnson told me HR would contact me, they just ignored my performance and rejected me without reason.
Final Thought
Zoho might be a good company for Tamil people, but for others, it’s just disappointing and unfair. If you’re from another state, don’t waste your time here—your performance won’t matter, only your region and language will.
Arrays and strings - 90 mins
Create Modules, railway reservation system - 60 mins
HashMap and Hashtable are both data structures that store key-value pairs, but they differ in synchronization and performance.
HashMap is not synchronized, making it faster but not thread-safe. Example: HashMap<String, Integer> map = new HashMap<>();
Hashtable is synchronized, making it thread-safe but slower. Example: Hashtable<String, Integer> table = new Hashtable<>();
HashMap allows null keys a...
TypeScript enhances JavaScript with static typing, better tooling, and improved maintainability for large applications.
Static Typing: TypeScript allows developers to define types, reducing runtime errors. Example: `let num: number = 5;`
Enhanced Tooling: TypeScript provides better IDE support with features like autocompletion and refactoring tools.
Improved Readability: Type annotations make the code more understandable,...
Calculate the percentage increase in item quantity when its price is raised by 20%.
When the price increases, demand may decrease, affecting quantity sold.
If price rises by 20%, consumers may buy less, leading to a potential decrease in quantity.
Example: If an item costs $100 and is increased to $120, consumers may buy fewer units.
The actual percentage change in quantity depends on price elasticity of demand.
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Eliminates duplicate data by dividing large tables into smaller ones.
Ensures data dependencies make sense, reducing the chances of anomalies.
Common forms include 1NF (First Normal Form), 2NF (Second Normal Form), and 3NF (Third Normal Form).
Example: In a customer database, separating customer information from o...
Various APIs exist for handling date and time, including JavaScript's Date, Python's datetime, and Java's LocalDateTime.
JavaScript: Use the Date object for current date/time: `new Date()`.
Python: The datetime module allows for date manipulation: `from datetime import datetime`.
Java: LocalDateTime class in java.time package for date/time without timezone: `LocalDateTime.now()`.
REST APIs: Many web services provide endpoi...
I applied via Naukri.com and was interviewed in Dec 2024. There were 4 interview rounds.
25 questions on coding output and 5 questions on aptitude
DSA problems on arrays and strings easy to medium level
Develop a live streaming application for real-time video broadcasting
Use a reliable streaming protocol like RTMP or HLS
Implement a video encoder to compress and transmit video data
Set up a media server to handle incoming video streams
Develop a user interface for viewers to watch live streams
Incorporate features like chat, likes, and notifications for user engagement
The flag is typically a hidden piece of information within a file that needs to be found.
Look for hidden text within the file
Check for metadata or comments within the file
Use tools like strings, hex editors, or steganography tools to extract hidden information
I applied via Indeed and was interviewed in Dec 2024. There were 4 interview rounds.
It was a great session that taught me many overlapping concepts and helped upgrade my skills.
It was a great session; I discovered my potential skills as well as the areas where I need improvement.
It was a highly interactive session characterized by a friendly conversation, which greatly assisted me in progressing to subsequent rounds.
I applied via LinkedIn
They asked around 70 aptitude questions.
This coding test focus on fundamentals and critical thinking
An abstract class is a blueprint for other classes, containing abstract methods that must be implemented by derived classes.
An abstract class cannot be instantiated directly.
It can contain both abstract methods (without implementation) and concrete methods (with implementation).
Example: In a shape hierarchy, 'Shape' can be an abstract class with an abstract method 'draw()'.
Derived classes like 'Circle' and 'Square' mus...
I applied via Walk-in and was interviewed in Dec 2024. There were 2 interview rounds.
Nothing much gave some random IP and gave an email for analysis
SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate a database.
SQL injection allows attackers to access, modify, or delete data in a database.
Attackers can also execute commands on the database server.
Preventing SQL injection involves using parameterized queries and input validation.
Example: Inputting ' OR 1=1 --' into a login form to bypass authentication.
I applied via Company Website and was interviewed in Sep 2024. There were 7 interview rounds.
It's test is difficulty but I will gave answer
It was easy to done coding test
Difficulty question ask but have a few answer
Assignment do and show that
It was interesting to studying
Basic aptitude easy solvable
Five simple coding questions.
Implement a quiz application with constraints like time limits, scoring, and question types.
Define question types: multiple choice, true/false, short answer.
Implement a timer for each quiz session to enhance urgency.
Create a scoring system: e.g., +1 for correct answers, -0.5 for wrong.
Store questions in a database for easy retrieval and management.
Allow users to review answers after quiz completion.
Top trending discussions
The duration of Zoho interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 584 interview experiences
Difficulty level
Duration
based on 1.1k reviews
Rating in categories
Member Technical Staff
1.6k
salaries
| ₹5.6 L/yr - ₹21.9 L/yr |
Technical Support Engineer
648
salaries
| ₹2.5 L/yr - ₹12 L/yr |
Software Developer
534
salaries
| ₹5 L/yr - ₹20 L/yr |
Software Engineer
162
salaries
| ₹4.6 L/yr - ₹18 L/yr |
Web Developer
94
salaries
| ₹3.5 L/yr - ₹12 L/yr |
Freshworks
Salesforce
SAP
TCS