i
Zuora
Work with us
Filter interviews by
I applied via LinkedIn and was interviewed in Mar 2024. There was 1 interview round.
Implement rolling updates and blue-green deployments to apply security patches with minimal downtime.
Utilize rolling updates to gradually apply security patches to different instances without taking the entire system offline.
Implement blue-green deployments to switch traffic from the old version (blue) to the new version (green) seamlessly.
Use automation tools like Ansible, Puppet, or Chef to streamline the patching pr...
To monitor intermittent high response, use monitoring tools like Prometheus or Datadog. Troubleshoot by analyzing logs, identifying bottlenecks, and optimizing code.
Set up monitoring tools like Prometheus or Datadog to track response times
Analyze logs to identify patterns of high response times
Use profiling tools to pinpoint bottlenecks in the code
Optimize code to improve response times
Use 'find' command to fetch larger files in specific directory
Use 'find' command with '-size' option to specify file size
Example: find /path/to/directory -type f -size +100M
Python program to remove whitespace, check if strings are anagram, and reverse a string.
Use the replace() function to remove whitespace from a string.
Use sorted() function to check if two strings are anagrams.
Use string slicing to reverse a string.
Top trending discussions
I appeared for an interview before Apr 2021.
Round duration - 90 minutes
Round difficulty - Easy
It was on online objective test consisting of 4 sections: Aptitude, Technical MCQs, Code snippet based MCQs and Coding part.
Given a string 'STR' consisting solely of the characters “{”, “}”, “(”, “)”, “[” and “]”, determine if the parentheses are balanced.
The first line contains an...
The task is to determine if a given string of parentheses is balanced or not.
Iterate through the characters of the string and use a stack to keep track of opening parentheses.
When encountering an opening parenthesis, push it onto the stack. When encountering a closing parenthesis, check if it matches the top of the stack.
If the stack is empty at the end or there are unmatched parentheses, the string is not balanced.
Exa...
Determine if a given singly linked list of integers is a palindrome. Return true
if it is a palindrome, otherwise return false
.
1 -> 2 -> ...
Check if a given singly linked list of integers is a palindrome.
Use two pointers to find the middle of the linked list.
Reverse the second half of the linked list.
Compare the first half with the reversed second half to determine if it is a palindrome.
Round duration - 60 minutes
Round difficulty - Easy
This was a technical and managerial round. The interviewer gave me a situation where I am in testing team and I found that customer requirement was drop down list at a place but developer has used bullet selection, and is not ready to change it. How will you manage? I gave some good replies and he was convinced.
A virtual function is a function in a base class that is declared using the keyword 'virtual' and can be overridden by a function with the same signature in a derived class.
Virtual functions allow for dynamic polymorphism in object-oriented programming.
They are used to achieve runtime polymorphism by enabling late binding.
Virtual functions are declared in a base class and can be overridden in derived classes.
Example: v...
Level order traversal of a binary tree in spiral form involves alternating between left and right while traversing each level.
Start by pushing the root node into a queue.
While the queue is not empty, pop a node, print its value, and push its children into the queue.
For each level, alternate between popping nodes from the queue and printing their values from left to right or right to left.
Continue this process until all...
Abstract classes in C++ are classes that cannot be instantiated and are designed to be base classes for other classes.
Abstract classes may contain pure virtual functions, making them incomplete and unable to be instantiated.
Derived classes must implement all pure virtual functions from the abstract class in order to be concrete classes.
Abstract classes can have non-virtual functions and member variables like regular cl...
Round duration - 60 minutes
Round difficulty - Easy
This was also a technical round. He asked to optimize the code I wrote in coding round. Then he asked me a few puzzles and questions on OOPS, OS and DBMS.
ACID properties are a set of properties that guarantee the reliability of transactions in database management systems.
ACID stands for Atomicity, Consistency, Isolation, and Durability.
Atomicity ensures that either all operations in a transaction are completed successfully or none of them are.
Consistency ensures that the database remains in a consistent state before and after the transaction.
Isolation ensures that the e...
Paging and segmentation are memory management techniques in operating systems.
Paging divides physical memory into fixed-size blocks called pages, while segmentation divides logical memory into variable-size segments.
Paging allows for efficient memory allocation and management, while segmentation provides protection and sharing of memory.
Paging is simpler to implement but can lead to internal fragmentation, while segmen...
Concurrency control is a technique used in databases to manage simultaneous access and modification of data by multiple users or processes.
Concurrency control ensures that transactions are executed in a way that maintains data consistency and integrity.
Techniques like locking, timestamp ordering, and optimistic concurrency control are used to implement concurrency control.
For example, in a banking system, concurrency c...
String Buffer is synchronized and thread-safe, while String Builder is not synchronized and faster.
String Buffer is synchronized, making it thread-safe for use in multi-threaded environments.
String Builder is not synchronized, resulting in faster performance but not thread-safe.
String Builder is preferred for single-threaded operations, while String Buffer is preferred for multi-threaded operations.
Smart pointers in C++ are objects that act like pointers but provide automatic memory management.
Smart pointers help prevent memory leaks by automatically managing memory allocation and deallocation.
Examples include unique_ptr, shared_ptr, and weak_ptr.
unique_ptr is used for exclusive ownership, shared_ptr for shared ownership, and weak_ptr to prevent circular references.
Mutex is used for exclusive access to a resource, while semaphore is used for controlling access to a resource by multiple threads.
Mutex is binary and allows only one thread to access the resource at a time.
Semaphore can have a count greater than one, allowing multiple threads to access the resource simultaneously.
Mutex is typically used for protecting critical sections of code, while semaphore is used for synchronizat...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I appeared for an interview in Jun 2017.
HTML, PHP, and CSS are programming languages used for creating and designing websites.
HTML (Hypertext Markup Language) is used for creating the structure and content of web pages.
PHP (Hypertext Preprocessor) is a server-side scripting language used for creating dynamic web pages.
CSS (Cascading Style Sheets) is used for styling and formatting the layout of web pages.
Example: HTML is used to create headings, paragraphs, ...
Replicating privacy pages involves understanding user data handling, consent, and security measures.
Analyze existing privacy policies of Twitter and Facebook for structure and content.
Identify key sections: data collection, user rights, and security measures.
Use clear language to explain complex legal terms for better user understanding.
Incorporate examples of data usage, like targeted advertising or third-party sharin...
Program for snake traversal of binary tree
Use a stack to keep track of nodes to be visited
Start with the root node and push it onto the stack
While the stack is not empty, pop a node and print its value
If the level is even, push the left child first and then the right child onto the stack
If the level is odd, push the right child first and then the left child onto the stack
I applied via Company Website and was interviewed before Aug 2022. There were 3 interview rounds.
I learned a new programming language to implement a critical feature in a project, enhancing my skills and the project's success.
Project Requirement: I was tasked with integrating a new feature that required knowledge of Python, which I had not used before.
Self-Study: I dedicated evenings to online courses and tutorials, focusing on Python's syntax and libraries relevant to the project.
Hands-On Practice: I built small ...
Reverse a given string using for loop
I applied via Company Website and was interviewed in May 2022. There were 2 interview rounds.
Logical reasoning And aptitude test
C++, python and Java programming
I applied via Recruitment Consulltant
A mutex is a synchronization primitive that ensures only one thread can access a resource at a time.
Create a mutex object using the appropriate library or language-specific function.
Lock the mutex before accessing the shared resource to prevent other threads from accessing it.
Unlock the mutex after finishing the operation on the shared resource to allow other threads to access it.
Example: pthread_mutex_t mutex; pthread...
Identify memory leak in code
Check for any dynamically allocated memory that is not being freed
Look for any infinite loops or recursive functions that consume memory
Use memory profiling tools like Valgrind to detect leaks
Check for any global variables that are not properly managed
I applied via Campus Placement
Coding round and level was good, one araay question and two dp questions
Hackerrank algorithms and ds test
I applied via Referral and was interviewed before Jan 2023. There were 3 interview rounds.
Logical Reasoning, Questions on distances, Questions on directions
1- Difference between array list and linked list.
2- Reverse the linked list
1-Difference between Arraylist and Linked list.
2-Check if strings are anagram.
Some of the top questions asked at the Zuora Site Reliability Engineer interview -
based on 1 interview experience
Difficulty level
Duration
based on 3 reviews
Rating in categories
Software Engineer
63
salaries
| ₹14.4 L/yr - ₹24.2 L/yr |
Software Engineer2
27
salaries
| ₹18.3 L/yr - ₹29.8 L/yr |
Technical Consultant
16
salaries
| ₹8.9 L/yr - ₹15.1 L/yr |
Software Developer
15
salaries
| ₹9 L/yr - ₹18 L/yr |
Senior Software Engineer
15
salaries
| ₹25.4 L/yr - ₹59.6 L/yr |
Duck Creek Technologies
Mobileum
OnProcess Technology
Yodlee