Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # **VISA**
- # My Rounds
- ## Online
- 1. Find the longest subarray in an unsorted array that has an abs diff b/w adj elem <= 1 after being sorted. **my approach:** sort and find sub array count of adj elems with abs diff <=1
- 1. could it be [this](https://leetcode.com/problems/longest-consecutive-sequence/discuss/41060/A-simple-C%2B%2Bsolution-using-unordered_set.And-simple-consideration-about-this-problem)?
- 2. [some variant of this](https://leetcode.com/problems/k-diff-pairs-in-an-array/)
- ## Tech1
- 1. [LRU cache](https://leetcode.com/problems/lru-cache/discuss/45911/Java-Hashtable-%2B-Double-linked-list-(with-a-touch-of-pseudo-nodes)). 0 TC Passed.
- 2. [what is 3NF](https://www.geeksforgeeks.org/third-normal-form-3nf/)
- ## Tech2
- 1. My introduction was stellar. Put serious thought into it. Mine was a sales pitch of myself.
- 2. [variant of this](https://leetcode.com/problems/uncommon-words-from-two-sentences/). delimiters were comma, period, ?, ! and spaces. hyphens to join words. words are made of only [a-z][A-Z]. 0 TC Passed. Complimented my logic and thought process.
- 3. [SQL subquery to find employees with max salary](https://www.w3resource.com/sql-exercises/employee-database-exercise/sql-subqueries-exercise-employee-database-19.php)
- 4. [NoSQL vs SQL](https://hackernoon.com/sql-vs-nosql-what-is-better-for-you-cc9b73ab1215)
- 5. [process vs thread](https://www.geeksforgeeks.org/difference-between-process-and-thread/)
- 6. What’s keeping you from leaving VISA?
- 7. Dropped some talking points from the pre-placement talk
- ## HR
- 1. Introduction
- 2. System Design problem. What to do if there are too many requests to a web server? Don’t know if they’re correct. I feel it was more a test to see you critical thinking and acquired knowledge.
- 1. Load balancing
- 2. Redundant Servers ready to deploy
- 3. Caching requests
- 3. What do you want to work in?
- 4. Why do you want to join VISA?
- 5. Asked what kept them at VISA? And what they’re objective in their career?
- 6. Got a compliment and an offer the next day.
- ## My Prep
- ~100 LC Mediums and g4g visa interview exps. Prepped core CS questions very well.
- ## Tips
- 1. For DSA, mention your **time and space complexity** before you start explaining your DSA problem. Write out a couple test cases that you want to test your logic on, and why you chose those specific test cases. Make sure the interview is following your explanation if they’re quiet, ask them if they’re following or where you lost them. Be very vocal about your problem solving logic.
- 2. For Core CS, explain the need for something, where it’s useful, and then define it. Pros and cons if you can too. Other alternatives. Where you used them.
- 3. For HR questions, give an example in your life where the questions are applicable. Use [STAR reply](https://www.thebalancecareers.com/what-is-the-star-interview-response-technique-2061629) for those scenarios.
- 4. Create an interview prep doc with hyperlinks and appropriate headings as a cheat sheet.
- # Core CS
- ## Algo
- 1. [heap sort](https://www.geeksforgeeks.org/heap-sort/)
- 2. [quick sort](https://www.youtube.com/watch?v=SLauY6PpjW4)
- 3. [merge sort](https://www.geeksforgeeks.org/merge-sort/)
- ## Crypto
- 1. [ tldr about encryption, hashing and salting](https://www.thesslstore.com/blog/difference-encryption-hashing-salting/)
- 2. [SQL Injection patches](https://www.hacksplaining.com/prevention/sql-injection)
- 1. regex check
- 2. give less privelege
- 3. salted hashes
- 4. 3rd party [OAuth](https://www.varonis.com/blog/what-is-oauth/#:~:text=OAuth%20doesn't%20share%20password,without%20giving%20away%20your%20password.) or [SSO](https://www.onelogin.com/learn/how-single-sign-on-works#:~:text=How%20does%20SSO%20work%3F,an%20identity%20provider%2C%20like%20OneLogin.&text=In%20SSO%2C%20this%20identity%20data,email%20address%20or%20a%20username.)
- 1. OAuth is an authorization protocol that allows a user to selectively decide **which services can do what with a user’s data.** OAuth’s primary purpose is to give users more control over their data, so you can **selectively grant access to various bits of functionality** for various applications that you may want to use.
- 2. SSO is an authentication / authorization flow through which a user can log into **multiple services using the same credentials**. only a single account and password to remember which gets them into all of their services.
- 5. parameterized statements
- 3. [Symetric vs Assymetric Encryption](https://sectigostore.com/blog/5-differences-between-symmetric-vs-asymmetric-encryption/)
- 6. [public key exchange](https://www.youtube.com/watch?v=GSIDS_lvRv4)
- 7. [diffie hellman key exchange ](https://www.youtube.com/watch?v=NmM9HA2MQGI)is how the keys are excahgned
- 3. man in the middle attack vuln
- 8. [problems with diffie hellman key exchange](https://www.youtube.com/watch?v=vsXMMT2CqqE)
- 4. signed with private key using a hash algo like RSA to avoid man in the middle
- 9. symm
- 5. 1 key. if found over
- 6. AES
- 7. faster
- 10. assym
- 8. 2 keys
- 9. diffie hellman
- 10. secure
- 4. Paper I wrote be through
- 11. Public Key Authority
- 11. grants certificates that verify your identity and says that your public belongs to you
- 12. Certificates etc
- 5. XSS attack
- 13. [tom scott](https://www.youtube.com/watch?v=L5l9lSnNMxg)
- 14. can steal csrf, cookies, read tags
- 15. DOMpurify
- 16. <
- 6. [digital signing](https://www.globalsign.com/en/blog/how-do-digital-signatures-work#:~:text=When%20you%20click%20%22sign%22%2C,created%20using%20a%20mathematical%20algorithm.&text=The%20hash%20is%20encrypted%20using,is%20appended%20to%20the%20document.)
- 1. Encryption vs hashing
- 1. Encryption is a two-way function. When you encrypt something, you’re doing so with the intention of decrypting it later. This is a key distinction between encryption and hashing (forgive me the pun).
- 2. hashing is used for digital signatures with a encryption
- 2. [salts](https://auth0.com/blog/adding-salt-to-hashing-a-better-way-to-store-passwords/#:~:text=A%20cryptographic%20salt%20is%20made,compute%20them%20using%20the%20salts.) | [how to compromise a salted hash password](https://security.stackexchange.com/questions/180535/how-does-the-attacker-know-what-algorithm-and-salt-to-use-in-a-dictionary-attack/180536#180536)
- 3. The salt is generally stored in the database right next to the hash. In fact, it needs to be. How else could the web server hash the incoming passwords when checking them? So if you have a database dump, you have the salts.
- ## DS
- 1. [ types of binary trees](https://www.upgrad.com/blog/5-types-of-binary-tree/)
- 1. FULL: 0 or 2 children
- 2. COMPLETE: all levels filled except lowest, and all leaf nodes fill left to right
- 3. PERFECT: all have 2 children
- 4. BALANCED: height of subtrees are off by at most 1
- 5. DEGENERATE: only 1 child
- 2. graph
- 6. [topo sort](https://www.codingame.com/start)
- 7. SCC
- 1. topo style stack build
- 2. transpose graph, i.e., invert parent-child relatioship
- 8. [shortest path](https://www.youtube.com/watch?v=GazC3A4OQTE) | [g4g](https://www.geeksforgeeks.org/dijkstras-shortest-path-algorithm-using-priority_queue-stl/)
- 3. priority_queue<int, vector<int>, greater<int>> pq // min heap PQ
- 4. priority_queue<int> // max heap PQ
- 9. min spanning trees
- 3. [heap](https://www.geeksforgeeks.org/binary-heap/)
- 10. data members
- 5. capacity
- 6. count
- 7. *heapArray
- 11. main
- 8. heap(capacity)
- 9. insert(key)
- 10. delete(key)
- 1. check
- 2. decreaseKey(key, val)
- 11. extractMin()
- 12. heapify(0)
- 12. utility
- 13. left
- 14. right
- 15. parent
- 16. swap
- 17. decreaseKey(key, val=INT_MIN)
- ## DBMS
- 1. [SQL interviewbit FAQs](https://www.interviewbit.com/sql-interview-questions/)
- 1. **FOREIGN KEY** comprises of single or collection of fields in a table that essentially refer to the PRIMARY KEY in another table
- 2. **Denormalization** is the inverse process of normalization, where the normalized schema is converted into a schema which has redundant information. The reason for performing denormalization is the overheads produced in the query processor by an over-normalized structure.
- 2. [SQL query FAQ 1](https://www.techbeamers.com/sql-query-questions-answers-for-practice/#sql-queries)
- 3. ^^TOP, LIMIT, OFFSET, UPPER, DISTINCT
- 4. Show only odd rows from a table
- 1. SELECT *
- 2. FROM Worker
- 3. WHERE MOD (WORKER_ID, 2) <> 0;
- 5. clone a new table from another table
- 4. CREATE TABLE WorkerClone LIKE Worker;
- 6. show the top n (say 10) records of a table.
- 5. SELECT *
- 6. FROM Worker
- 7. ORDER BY Salary DESC
- 8. LIMIT 10 OFFSET 0;
- 7. fetch the list of employees with the same salary
- 9. Select distinct W.WORKER_ID, W.FIRST_NAME, W.Salary
- 10. from Worker W, Worker W1
- 11. where W.Salary = W1.Salary
- 12. and W.WORKER_ID != W1.WORKER_ID;
- 8. 2nd highest salary | subquery used for NULL value case
- 13. select
- 14. (select distinct Salary
- 15. from Employee
- 16. order by Salary desc
- 17. limit 1 offset 1) as SecondHighestSalary;
- 9. intersection of 2 tables
- 18. (SELECT * FROM Worker)
- 19. INTERSECT
- 20. (SELECT * FROM WorkerClone);
- 10. half of all entries
- 21. mysql
- 1. SELECT TOP 50 PERCENT *
- 2. FROM Customers;
- 22. ORACLE
- 3. select *
- 4. from my_table
- 5. where rownum <= (select count(*)/2 from my_table)
- 11. to fetch the departments that have less than five people in it
- 23. SELECT DEPARTMENT, COUNT(WORKER_ID) as 'Number of Workers'
- 24. FROM Worker
- 25. GROUP BY DEPARTMENT
- 26. HAVING COUNT(WORKER_ID) < 5;
- 12. show the last record from a table.
- 27. SELECT **LAST** (CUSTOMER_NAME) AS LAST_CUSTOMER
- 28. FROM CUSTOMERS;
- 13. max sal in each dept
- 29. SELECT DeptID, MAX(Salary)
- 30. FROM EmpDetails
- 31. GROUP BY DeptID
- 14.
- 3. SQL query interview bit
- 15. rating is NULL NOT rating = NULL
- 16. ^^work on subqueries
- 4. Normal Forms w/ examples
- 17. **1NF **remove multi values columns into separate columns
- 18. **2NF **table into primary and foreign key
- 19. **3NF** remove transitive dependencies
- Example: table1 -> table2 -> table3 TO table1->table3
- 20. **[BCNF](https://www.quora.com/What-is-the-distinction-between-BCNF-and-3NF-Is-there-a-reason-to-prefer-one-over-the-other)** acts differently from 3NF only when there are multiple overlapping candidate keys.
- 5. [transactions and the need for ACID properties](https://www.geeksforgeeks.org/acid-properties-in-dbms/)
- 6. [What is indexing? ](https://www.geeksforgeeks.org/indexing-in-databases-set-1/#:~:text=Indexing%20is%20a%20way%20to,using%20a%20few%20database%20columns.)What are the advantages of indexing? What are the different types of indexing with example?
- 7. DBMS basics for efficiency :- Indexing viz. B+trees , Hashing
- 8. [star schema](https://www.geeksforgeeks.org/star-schema-in-data-warehouse-modeling/)
- It includes one or more fact tables indexing any number of dimensional tables. The star schema is a necessary case of the snowflake schema. It is also efficient for handling basic queries.
- 9. NoSQL vs SQL. RDB vs DBMS
- 21. SQL databases are primarily called as Relational Databases (RDBMS); whereas NoSQL databases are primarily called as non-relational or distributed databases.
- 22. SQL databases follow ACID properties (Atomicity, Consistency, Isolation and Durability) whereas the NoSQL database follows the Brewers CAP theorem (Consistency, Availability and Partition tolerance).
- 23. SQL databases are table-based on the other hand NoSQL databases are either key-value pairs, document-based, graph databases or wide-column stores.
- 10. SQL injections (crypto sub heading)
- 11. [Delete vs Truncate vs Drop](https://www.geeksforgeeks.org/difference-between-delete-drop-and-truncate/)
- 24. DELETE
- 32. to delete the one or more tuples of a table.
- 33. If we want to delete all the rows of the table:
- DELETE from ;
- 34. row as per using condition then use WHERE
- DELETE from WHERE ;
- 25. DROP
- 35. drop the whole table
- DROP table_name
- 36. TRUNCATE
- 6. delete all the rows of a relation
- TRUNCATE ;
- 12. [Where vs Having](https://www.geeksforgeeks.org/having-vs-where-clause-in-sql/)
- 26. The difference between the having and where clause in SQL is that the where clause cannot be used with aggregates, but the having clause can.
- 13. Stored Procedure
- 14. Views
- ## Language
- 1. [What is an interpreted language, what are the differences between Interpreted and compiled languages.](https://www.geeksforgeeks.org/difference-between-compiled-and-interpreted-language/)
- 1. compiled fast cause in machine code of target system compiled on
- 2. errors are shown during compile time and won’t build otherwise
- 2. [argument vs. parameter](https://www.geeksforgeeks.org/difference-between-argument-and-parameter-in-c-c-with-examples/)
- 3. argument: values that are passed within a function when the function is called
- 4. parameter: variables that are defined during a function declaration or definition
- 3. [Interface and Abstract class](https://www.javatpoint.com/difference-between-abstract-class-and-interface)
- 4. What is Concurrent programming?
- 5. [memory leak](https://www.geeksforgeeks.org/memory-leak-in-c-and-how-to-avoid-it/)
- Memory leakage occurs in C++ when programmers allocates memory by using new keyword and forgets to deallocate the memory by using delete() function or delete[] operator. One of the most memory leakage occurs in C++ by using wrong delete operator.
- 6. [smart pointers](https://www.geeksforgeeks.org/smart-pointers-cpp/)
- ## ML
- 1. [precision and recall](https://developers.google.com/machine-learning/crash-course/classification/precision-and-recall)
- 1. precision: What proportion of positive identifications was actually correct?
- 2. recall: What proportion of actual positives was identified correctly?
- ## Network
- 1. [TCP/IP model](https://practice.geeksforgeeks.org/problems/tcpip-model/)
- ### TCP / IP (Transmission Control Protocol / Internet Protocol)
- Four layered architecture which provides end to end communication, specifying how data should be formed in packets, addressed, transmitted, routed and received.
- The four layers are organized as :
- **Layer 4 Application Layer (Topmost Layer) **
- The application layer of the TCP/IP model is used to handle all process-to-process communication functions. The basic functions which are carried out by this layer are session establishment, maintenance and termination, data conversion, compression, encryption etc.Some of the common protocols used here are :
- * TELNET - a two-way communication protocol which allows connecting to a remote machine and run applications on it.
- * FTP(File Transfer Protocol) - allows file transfer among computer users connected over a network.
- * SMTP(Simple Mail Transport Protocol) - used to transport electronic mails between a source and destination.
- * DNS(Domain Name Server) - resolves an IP address into a textual address for hosts connected over a network.
- **Layer 3 Transport Layer **
- The purpose of transport layer is to permit devices on the source and destination hosts for conversation. It defines the level of status of the connection used when transporting data.The main protocols included at Transport layer are
- 1. Transmission Control Protocol (TCP) - TCP is a connection-oriented protocol that guarantees delivery of data and in the same order in which they were sent.
- 2. User Datagram Protocol (UDP) - UDP is connectionless sending packets in chunks.
- **Layer 2 Netowork Layer**
- This layer packs data into data packets known as datagrams, which contain source and destination address information that is used to forward the datagrams between hosts and across networks. This layer is also responsible for routing of these datagrams, along with functions like traffic routing, traffic control, fragmentation. The main protocols included at Transport layer are :
- 1. Internet Protocol (IP) - used for relaying datagrams across network boundaries.
- 2. Internet Control Message Protocol (ICMP) - used by network devices to send error messages and operational information indication
- 3. Internet Group Management Protocol (IGMP) - used to establish multi cast group membership
- **Layer 1 Link Layer / Network Access Layer (Lower most Layer) **
- The link layer combines the physical and data link layer functions into a single layer. This includes frame physical network functions like modulation, line coding and bit synchronization, frame synchronization and error detection. Common protocols include the following:
- 1. Address Resolution Protocol (ARP) - used to convert an IP address into a physical address
- 2. Neighbor Discovery Protocol (NDP) - protocol in the Internet protocol suite used with Internet Protocol Version 6 (IPv6)
- 3. [jitter](https://practice.geeksforgeeks.org/problems/what-is-jitter/)
- 1. It is variation in the time of delivery of packets at the receiver side.
- 2. There is uneven delay in the delivery of packets.
- 3. This uneven delay effects audio and video delivery, if packets will arrival uneven will lead to poor quality of the audio and video.
- 4. For example:- some packets arrive at rate of 3 ms and some 4 ms .This situation is known as jitter.
- 4. [different OSI layers and their functions.](https://www.imperva.com/learn/application-security/osi-model/)
- [Explain DOS, DDOS, differences between DOS and DDOS](https://www.geeksforgeeks.org/difference-between-dos-and-ddos-attack/)
- 5. How to prevent DOS attacks on servers?
- 5. cloudflare
- 6. [Intrusion Detection and Intrusion Prevention](https://www.varonis.com/blog/ids-vs-ips/#:~:text=IPS%3A%20What%20is%20the%20Difference%3F,-Jeff%20Petters&text=Intrusion%20Detection%20Systems%20(IDS)%20analyze,detects%20%E2%80%94%20helping%20stop%20the%20attack.)
- 5. [DNS](https://www.geeksforgeeks.org/domain-name-system-dns-in-application-layer/)
- 7. [DHCP](https://www.geeksforgeeks.org/dynamic-host-configuration-protocol-dhcp/)
- 7. A DHCP Server is a network server that automatically provides and assigns IP addresses, default gateways and other network parameters to client devices. It relies on the standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to broadcast queries by clients.
- 8. [What is the role of Load Balancer? What are the algorithms used in it? How does it handle server failures?](https://www.geeksforgeeks.org/load-balancer-system-design-interview-question/)
- 9. Linux command to get IP address of all the intermediate nodes in routing, IP address of our node.
- 8. ping
- 10. [HTTPS working](https://love2dev.com/blog/how-https-works/#:~:text=The%20HTTPS%20Stack,-HTTPS%20requires%20a&text=An%20SSL%20or%20TLS%20certificate,layer%20security%20it%20becomes%20encrypted.)
- 11. How to release and allocate new IP addresses to a system.
- 9. using DHCP
- 12. How does ping work?
- 10. The Ping program works much like a sonar echo-location. It sends a small packet of information containing an ICMP ECHO_REQUEST to a specified computer, which then sends an ECHO_REPLY packet in return. The IP address 127.0.0.1 is set by convention to always indicate your own computer. Therefore, a ping to that address will always ping yourself and the delay should be very short.
- 13. ^^ [traceroute](https://www.youtube.com/watch?v=75yKT3OuE44)
- 11. uses the time to live parameter in the packet to find the route
- CDN like akamai
- 14. 13. mirror sites
- 15. [How does routing work? ](https://www.youtube.com/watch?v=gQtgtKtvRdo)
- 14. static
- 1. breaks if a change happens it breaks
- 15. dynamic
- 16. link state algo
-
- 17. unique packets avoid flooding loops
- 16. __[Complete working of Router](https://www.youtube.com/watch?v=57U8tV_CTQk)
- 17. [TCP congestion control](https://www.geeksforgeeks.org/tcp-congestion-control/)
- 18. To avoid congestive collapse, TCP uses a multi-faceted congestion-control strategy. For each connection, TCP maintains a congestion window, limiting the total number of unacknowledged packets that may be in transit end-to-end. This is somewhat analogous to TCP's sliding window used for flow control.
- 18. digital signature
- 19. [Different topology in networking](https://www.geeksforgeeks.org/types-of-network-topology/)
- 19. BUS: if common bus dead, game over. collisions. easy to set up.
- 20. RING: easy to set up; hard to diagnose;
- 20. TCP handshake
- 21. UDP in querying the DNS server
- 22. SYN
- 23. SYN-ACK
- 24. ACK
- ## OOP
- 1. What are the classes?
- 2. Difference between function overloading and overriding
- 3. Some basics of inheritance
- 4. Virtual functions
- 5. design any example that covers all the OOPs concept
- 1. *inheritance
- 2. *polymorphism
- 3. abstraction
- 4. encaps
- ## OS
- 1. [race condition](https://practice.geeksforgeeks.org/problems/what-is-race-condition/)
- 2. Pros and cons. Different process scheduling algorithms (Round Robin, FCFS, SJF, etc.).
- 3. How to handle multiple requests at the same time?
- 1. Two or more processes executing in a system with an illusion of concurrency and accessing shared data, may try to change the shared data at the same time. Since the process scheduling algorithm can swap between processes at any time, we don't actually know the order in which the processes will access the data leading to inconsistencies in the system.This condition in the system is known as race condition.
- 4. How to handle requests when the server is being updated? (solution using semaphore implementation similar to the classical reader-writer problem and some of its variants)
- 5. [process vs. thread](https://www.geeksforgeeks.org/difference-between-process-and-thread/)
- 6. Special kinda problems
- 2. [Reader-Writer](https://www.youtube.com/watch?v=_vfZhdTgA5A)
- 3. [Banker’s Problem](https://www.youtube.com/watch?v=T0FXvTHcYi4)
- 4. [Dining Philosophers](https://www.youtube.com/watch?v=NbwbQQB7xNQ)
- 5. [Belady’s Anomaly](https://www.geeksforgeeks.org/beladys-anomaly-in-page-replacement-algorithms/)
- 1. Bélády’s anomaly is the name given to the phenomenon where increasing the number of page frames results in an increase in the number of page faults for a given memory access pattern.
- 2. This phenomenon is commonly experienced in following page replacement algorithms:
- 1. First in first out (FIFO)
- 2. Second chance algorithm
- 3. Random page replacement algorithm
- 7. [starvation vs aging](https://www.geeksforgeeks.org/starvation-and-aging-in-operating-systems/)
- 6. Starvation or indefinite blocking is phenomenon associated with the Priority scheduling algorithms, in which a process ready to run for CPU can wait indefinitely because of low priority. In heavily loaded computer system, a steady stream of higher-priority processes can prevent a low-priority process from ever getting the CPU.
- 7. Aging is a technique of gradually increasing the priority of processes that wait in the system for a long time.For example, if priority range from 127(low) to 0(high), we could increase the priority of a waiting process by 1 Every 15 minutes.
- 8. [micro kernel and macro kernel.](https://www.geeksforgeeks.org/monolithic-kernel-and-key-differences-from-microkernel/)
- 8. Kernel is the core part of an operating system; it manages the system resources. Kernel is like a bridge between application and hardware of the computer
- What if the different users have different priorities, one needs data quickly even if it’s not updated and another user can wait but needs to be updated data?
- 10. Differences between process and thread, attributes of process in detail, states of a process, different type of schedulers and their functions.
- 11. ^^ What type of scheduling algorithms that are curently used and differences between different operating systems like windows, linux, macOS, android
- 12. [dynamic and static memory](https://www.geeksforgeeks.org/difference-between-static-and-dynamic-memory-allocation-in-c/#:~:text=Static%20Memory%20Allocation%20is%20done,is%20done%20during%20program%20execution.&text=In%20static%20memory%20allocation%2C%20once,memory%20size%20can%20be%20changed.)
- 13. **[fork and exec](https://www.geeksforgeeks.org/difference-fork-exec/)
- 14. Single User system
- 15. Find a pattern in a file
- 9. > grep
- 16. cat command and how can we use it for input to a file
- 10. piping and redirection?
- 17. [raid structure](https://www.geeksforgeeks.org/raid-redundant-arrays-of-independent-disks/)
- 11. RAID, or “Redundant Arrays of Independent Disks” is a technique which makes use of a combination of multiple disks instead of using a single disk for increased performance, data redundancy or both.
- ## Puzzle
- 1. *[Ant Puzzle](https://practice.geeksforgeeks.org/problems/ant-puzzle/)
- 2. *[fake coin weigh](https://www.geeksforgeeks.org/decision-trees-fake-coin-puzzle/)
- 3. *[gold puzzle](http://www.mytechinterviews.com/gold-for-7-days-of-work)
- 4. [insect climb and fall](https://brainly.in/question/3346018)
- 5. [occurences of the digit 2 from 1 to n](https://www.geeksforgeeks.org/number-of-occurrences-of-2-as-a-digit-in-numbers-from-0-to-n/)
- 6. [hour and minute hand ](https://www.geeksforgeeks.org/find-time-hour-minute-hands-superimpose/)
- 7. [train equator](http://placementstudy.com/discuss/puzzles/famous-puzzles/74014126#:~:text=Around%20the%20Equator&text=Which%20train%20will%20wear%20out,is%20less%20on%20this%20train.)
- ## Software Engineering
- 1. [AGILE method](https://practice.geeksforgeeks.org/problems/what-is-agile-methodology/)
- 2. [FAQ software testing](https://www.guru99.com/qa-interview-questions-answers.html)
- 3. Given a scenario. Design a schema and it’s E-R diagram.
- 4. Run into SDE bug. What do?
- 4. 1. Setting up the **requirements criteria**, the requirements of a software should be complete, clear and agreed by all.
- 2. The next thing is the **realistic schedule** like time for planning , designing, testing, fixing bugs and re-testing
- 3. Adequate **testing**, start the testing immediately after one or more modules development.
- 4. Use** rapid prototype during design phase** so that it can be easy for customers to find what to expect
- 5. Use of** group communication tools**
- 5. **SE Design Patterns**
- 6. RESTful Services
- Web services based on REST Architecture are known as RESTful web services. These web services use HTTP methods to implement the concept of REST architecture. A RESTful web service usually defines a URI, Uniform Resource Identifier a service, provides resource representation such as JSON and a set of HTTP Methods.
- REST architecture treats every content as a resource. These resources can be text files, html pages, images, videos or dynamic business data. REST Server simply provides access to resources and REST client accesses and modifies the resources. Here each resource is identified by URIs/ global IDs.
- * PUT write
- * POST update
- * GET read
- * DELETE delete
- Main difference between POST and GET method is that GET carries request parameters appended in URL string while POST carries request parameters in the message body which makes it a more secure way of transferring data from client to server in http protocol.
- Caching. Always keep static contents like images, css, JavaScript cacheable, with expiration dates of 2 to 3 days. Never keep expiry dates too high. Dynamic contents should be cached for a few hours only.
- Remember user specific contents via **cookies**.
- 1. how do you know your good is code
- 1. documentation
- 1. docs
- 2. comments
- 2. good styling
- 3. variable names
- 4. spaces
- 5. follow style guide
- 3. fulfil requirements
- 4. maintainable
- 2. ^^What is an API with examples
- 5. An application programming interface, is a computing interface that defines interactions between multiple software intermediaries. It defines the kinds of calls or requests that can be made, how to make them, the data formats that should be used, the conventions to follow
- 3. How design iOS app
- 6. Swift
- 7. XCode
- 8. did not get into it due to paywall & personal android device. The Apple Developer Program annual fee is 99 USD.
- 4. Testing
- 9. [Black and white box](https://www.geeksforgeeks.org/differences-between-black-box-testing-vs-white-box-testing/#:~:text=Black%20Box%20Testing%20is%20a,is%20known%20to%20the%20tester.)
- 6. Black Box Testing is a software testing method in which the internal structure/ design/ implementation of the item being tested is not known to the tester
- 7. White Box Testing is a software testing method in which the internal structure/ design/ implementation of the item being tested is known to the tester.
- 5. SDLC from software engg
- 6. JSON
- 7. Design pattern
- ## System Design
- 1. [when you get a lot of requests or more customers USE A LOAD BALANCER](https://www.geeksforgeeks.org/load-balancer-system-design-interview-question/)
- 2. schematic to store multiple images in a single file.
- 1. zip
- 2. 2^8 bits for RGB images. uint have 2^32 bits. can store 4 images using bitwise
- 3. database indexing?
- 3. ^He then asked me if given transactional data from visa cards how will I detect frauds in the data and how will I handle the large volume of data?
- 4. feature engineering
- 1. location or IP addresses use
- 2. attempts tried
- 3. size of transactions
- 5. do i have training data, i.e., transactions labelled fraud?
- 4. if true can try fitting a model on it
- 1.
- 5. if false then unsupervised
- 4. You have been given unstructured data which is coming from facebook and twitter. Analyse these data according to “TCS stocks in market and people’s view on this”. Make a strategy to tell that your software will decide that any point of time you should “BUY” or “SELL” the stock.
- 5. data mining can be done on VISA data? What are the uses?
- 6. [LRU cache](https://leetcode.com/problems/lru-cache/discuss/45911/Java-Hashtable-%2B-Double-linked-list-(with-a-touch-of-pseudo-nodes))
- 6. constructor(capacity)
- 6. intialize capacity of map
- 7. initialize count to 0
- 8. create DLL head and tail
- 7. get(key)
- 9. if in map() return val;
- 10. else
- 2. create map entry
- 3. insert to front of DLL
- 4. check capacity
- 8. put(key, value)
- 11. see if exist
- 12. capacity check if node !found
- 9. helper methods
- 13. insert() // insert node at head
- 14. remove() // remove a node from any location in DLL
- 15. popTail() // used when exceeds capacity
- 5. m.erase(key) removes from hash and tail
- 16. moveToHead() // if a cache hit
- 6. remove Node
- 7. insert Node
- # References
- 1. [VISA interview prep](https://www.geeksforgeeks.org/visa-interview-preparation/) | [sorted by difficulty](https://www.geeksforgeeks.org/Visa-topics-interview-preparation/)
- 2. [VISA question archives](https://www.geeksforgeeks.org/tag/visa/)
- 3. ["subjective problems" VISA](https://practice.geeksforgeeks.org/explore/?company%5B%5D=Visa&page=1&company%5B%5D=Visa)
- 4. [VISA-dsa session buddy session](https://pastebin.pl/view/ba5c404b)
- 5. [g4g SDE theory](https://practice.geeksforgeeks.org/courses/SDE-theory?vC=1)
Advertisement
Advertisement
Advertisement
RAW Paste Data
Copied
Advertisement