Filter interviews by
Zoho Books is an online accounting software designed for small businesses to manage their finances efficiently.
User-friendly interface for easy navigation.
Automates tasks like invoicing, expense tracking, and tax calculations.
Integrates with other Zoho applications and third-party tools.
Offers features like bank reconciliation and financial reporting.
Supports multi-currency transactions for global businesses.
The CSS box model defines the layout of elements, including margins, borders, padding, and content area.
Content: The innermost part where text and images appear.
Padding: Space between the content and the border, affecting the element's size.
Border: A line surrounding the padding (if any) and content, defining the element's outer edge.
Margin: The outermost space that separates the element from others, creating dist...
Identify and return duplicate strings from an array of strings efficiently.
Use a hash set to track seen strings. Example: ['apple', 'banana', 'apple'] returns ['apple'].
Sort the array and check adjacent elements. Example: ['apple', 'banana', 'apple'] becomes ['apple', 'apple', 'banana'].
Utilize a dictionary to count occurrences. Example: {'apple': 2, 'banana': 1} indicates 'apple' is a duplicate.
Java's working flow involves compilation, class loading, bytecode execution, and garbage collection.
1. Source Code: Java code is written in .java files.
2. Compilation: The Java compiler (javac) converts .java files into bytecode (.class files).
3. Class Loading: The Java Virtual Machine (JVM) loads the .class files into memory.
4. Execution: The JVM executes the bytecode using an interpreter or Just-In-Time (JIT) co...
Implementing a sorting algorithm for an array of strings without using built-in sorted functions.
Use Bubble Sort: Compare adjacent strings and swap if they are in the wrong order. Example: ['banana', 'apple'] becomes ['apple', 'banana'].
Implement Selection Sort: Find the smallest string and swap it with the first element, then repeat for the rest. Example: ['cat', 'bat', 'apple'] becomes ['apple', 'bat', 'cat'].
Ut...
AV Foundation is a framework in iOS that provides essential services for working with time-based audiovisual media.
AV Foundation allows developers to capture, play, edit, and distribute multimedia content.
It supports various media formats such as audio, video, and images.
Developers can use AV Foundation to create custom video players, record audio, apply filters, and more.
It provides classes like AVPlayer, AVAsset...
Cloud computing can be accessed as both software and hardware.
Cloud computing is primarily software-based, allowing users to access applications and services over the internet.
However, cloud computing can also be accessed as hardware through physical servers, storage devices, and networking equipment.
Examples of hardware-based cloud computing include on-premises private clouds and hybrid cloud environments.
Hardwar...
SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate a database.
SQL injection allows attackers to access, modify, or delete data in a database.
Attackers can also execute commands on the database server.
Preventing SQL injection involves using parameterized queries and input validation.
Example: Inputting ' OR 1=1 --' into a login form to bypass authentication.
Investing is essential for building wealth and achieving financial goals.
Investing allows for potential growth of wealth over time.
Diversification is key to managing risk in investments.
Understanding your risk tolerance and investment goals is crucial.
Regularly reviewing and adjusting your investment portfolio is important.
Examples: Stocks, bonds, real estate, mutual funds.
Map Dependency of CR refers to the relationship between change requests and their corresponding impact on various components of a system.
CRs are mapped to specific components or modules within a system to track the impact of changes.
This mapping helps in understanding the dependencies between different parts of the system.
By identifying map dependencies, engineers can assess the potential risks and plan for necess...
I appeared for an interview in May 2025, where I was asked the following questions.
I appeared for an interview in Jan 2025.
Zoho’s Hiring Process is Completely Biased
Zoho gives priority to Tamil-speaking candidates, and only if there are extra vacancies do they consider people from other states. I cleared all five coding problems, optimized them as requested, and explained my approach clearly. The technical live coding interviewer, Seethu Maria Johnson, even told me that HR would contact me. But instead, I got a rejection email without any explanation.
It feels like Zoho already decides who they want to hire based on regional preference rather than talent. If you're from outside Tamil Nadu, don’t waste your time here—chances are, you won’t even be considered seriously. They show clear partiality in hiring, which is unfair to skilled candidates from other states.
To make things worse, I asked for feedback, but HR (Carmila & Veena C S & Supriya M) simply said "we cannot share the feedback." So, not only is the hiring process biased, but there’s also zero transparency.
Even after Seethu Maria Johnson told me HR would contact me, they just ignored my performance and rejected me without reason.
Final Thought
Zoho might be a good company for Tamil people, but for others, it’s just disappointing and unfair. If you’re from another state, don’t waste your time here—your performance won’t matter, only your region and language will.
Arrays and strings - 90 mins
Create Modules, railway reservation system - 60 mins
HashMap and Hashtable are both data structures that store key-value pairs, but they differ in synchronization and performance.
HashMap is not synchronized, making it faster but not thread-safe. Example: HashMap<String, Integer> map = new HashMap<>();
Hashtable is synchronized, making it thread-safe but slower. Example: Hashtable<String, Integer> table = new Hashtable<>();
HashMap allows null keys a...
TypeScript enhances JavaScript with static typing, better tooling, and improved maintainability for large applications.
Static Typing: TypeScript allows developers to define types, reducing runtime errors. Example: `let num: number = 5;`
Enhanced Tooling: TypeScript provides better IDE support with features like autocompletion and refactoring tools.
Improved Readability: Type annotations make the code more understandable,...
Calculate the percentage increase in item quantity when its price is raised by 20%.
When the price increases, demand may decrease, affecting quantity sold.
If price rises by 20%, consumers may buy less, leading to a potential decrease in quantity.
Example: If an item costs $100 and is increased to $120, consumers may buy fewer units.
The actual percentage change in quantity depends on price elasticity of demand.
Various APIs exist for handling date and time, including JavaScript's Date, Python's datetime, and Java's LocalDateTime.
JavaScript: Use the Date object for current date/time: `new Date()`.
Python: The datetime module allows for date manipulation: `from datetime import datetime`.
Java: LocalDateTime class in java.time package for date/time without timezone: `LocalDateTime.now()`.
REST APIs: Many web services provide endpoi...
I applied via Naukri.com and was interviewed in Dec 2024. There were 4 interview rounds.
25 questions on coding output and 5 questions on aptitude
DSA problems on arrays and strings easy to medium level
Develop a live streaming application for real-time video broadcasting
Use a reliable streaming protocol like RTMP or HLS
Implement a video encoder to compress and transmit video data
Set up a media server to handle incoming video streams
Develop a user interface for viewers to watch live streams
Incorporate features like chat, likes, and notifications for user engagement
The flag is typically a hidden piece of information within a file that needs to be found.
Look for hidden text within the file
Check for metadata or comments within the file
Use tools like strings, hex editors, or steganography tools to extract hidden information
I applied via Indeed and was interviewed in Dec 2024. There were 4 interview rounds.
It was a great session that taught me many overlapping concepts and helped upgrade my skills.
It was a great session; I discovered my potential skills as well as the areas where I need improvement.
It was a highly interactive session characterized by a friendly conversation, which greatly assisted me in progressing to subsequent rounds.
I applied via LinkedIn
They asked around 70 aptitude questions.
This coding test focus on fundamentals and critical thinking
An abstract class is a blueprint for other classes, containing abstract methods that must be implemented by derived classes.
An abstract class cannot be instantiated directly.
It can contain both abstract methods (without implementation) and concrete methods (with implementation).
Example: In a shape hierarchy, 'Shape' can be an abstract class with an abstract method 'draw()'.
Derived classes like 'Circle' and 'Square' mus...
I appeared for an interview before Jun 2024, where I was asked the following questions.
Zoho Books is an online accounting software designed for small businesses to manage their finances efficiently.
User-friendly interface for easy navigation.
Automates tasks like invoicing, expense tracking, and tax calculations.
Integrates with other Zoho applications and third-party tools.
Offers features like bank reconciliation and financial reporting.
Supports multi-currency transactions for global businesses.
I applied via Walk-in and was interviewed in Dec 2024. There were 2 interview rounds.
Nothing much gave some random IP and gave an email for analysis
SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate a database.
SQL injection allows attackers to access, modify, or delete data in a database.
Attackers can also execute commands on the database server.
Preventing SQL injection involves using parameterized queries and input validation.
Example: Inputting ' OR 1=1 --' into a login form to bypass authentication.
I applied via Company Website and was interviewed in Sep 2024. There were 7 interview rounds.
It's test is difficulty but I will gave answer
It was easy to done coding test
Difficulty question ask but have a few answer
Assignment do and show that
It was interesting to studying
Top trending discussions
The duration of Zoho interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 586 interview experiences
Difficulty level
Duration
based on 1.1k reviews
Rating in categories
Member Technical Staff
1.6k
salaries
| ₹5.6 L/yr - ₹24 L/yr |
Technical Support Engineer
638
salaries
| ₹2.5 L/yr - ₹12 L/yr |
Software Developer
525
salaries
| ₹4.9 L/yr - ₹17 L/yr |
Software Engineer
168
salaries
| ₹5.4 L/yr - ₹18 L/yr |
Web Developer
94
salaries
| ₹3.5 L/yr - ₹12 L/yr |
Freshworks
Salesforce
SAP
TCS