Add office photos
Employer?
Claim Account for FREE

63 Moons Technologies

3.7
based on 292 Reviews
Video summary
Filter interviews by

10+ Megha Engineering & Infrastructures Interview Questions and Answers

Updated 11 Jun 2024

Q1. What is constructor and write it's code in C++

Ans.

Constructor is a special member function that initializes objects of a class.

  • Constructor has the same name as the class and no return type.

  • It is called automatically when an object is created.

  • It can be overloaded with different parameters.

  • Example: class Car { public: Car(string make, string model) { ... } };

  • Example: Car myCar("Toyota", "Corolla");

Add your answer

Q2. What is class and objects in c++?

Ans.

Class is a blueprint for creating objects. Objects are instances of a class with their own set of properties and methods.

  • Classes define the properties and methods that objects will have

  • Objects are created from a class using the 'new' keyword

  • Objects can interact with each other through their methods and properties

  • Example: class Car { int speed; void accelerate(); }; Car myCar; myCar.accelerate();

  • Example: class Person { string name; int age; void sayHello(); }; Person john; joh...read more

Add your answer

Q3. what is circular linklist ?

Ans.

A circular linked list is a linked list where the last node points to the first node.

  • It is a data structure where each node points to the next node and the last node points to the first node.

  • It can be used to implement a round-robin scheduling algorithm.

  • Traversal of a circular linked list requires a condition to stop the traversal, such as reaching the starting node again.

Add your answer

Q4. What is operation overloading

Ans.

Operation overloading is the ability to define multiple functions with the same name but different parameters.

  • Allows multiple functions with the same name to perform different tasks

  • Functions must have different parameters or different number of parameters

  • Used to simplify code and improve readability

  • Example: + operator can be overloaded to add integers, concatenate strings, or add complex numbers

Add your answer
Discover Megha Engineering & Infrastructures interview dos and don'ts from real experiences

Q5. What ia polymorphism Pointers etc.

Ans.

Polymorphism is the ability of a function or method to behave differently based on the object it is called with.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).

  • Example: Animal class with methods eat() and sleep(). Dog and Cat classes can inherit from Animal and override eat() method.

Add your answer

Q6. Memory management of variable and objects

Ans.

Memory management involves allocating and deallocating memory for variables and objects.

  • Variables can be allocated on the stack or heap depending on their scope and lifetime.

  • Objects can be created using new operator and must be deleted using delete operator to avoid memory leaks.

  • Smart pointers like unique_ptr and shared_ptr can be used to manage object memory automatically.

  • Memory leaks can be avoided by properly managing object ownership and using RAII.

  • Memory fragmentation ca...read more

Add your answer
Are these interview questions helpful?

Q7. Difference between stack memory and heap memory

Ans.

Stack memory is allocated automatically, while heap memory is allocated manually.

  • Stack memory is limited and has a fixed size, while heap memory is larger and can grow dynamically.

  • Stack memory is faster to access than heap memory.

  • Stack memory is used for local variables and function calls, while heap memory is used for dynamic memory allocation.

  • Examples of stack memory include function call stack and local variables, while examples of heap memory include dynamically allocated...read more

Add your answer

Q8. What is testing? What if there is no senior in office and release gir schedule.. How you will manage it?

Ans.

Testing is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not.

  • In the absence of a senior, I would refer to the project documentation and requirements to understand the scope of testing.

  • I would prioritize the testing based on criticality and risk analysis.

  • I would communicate with the development team to understand the changes made and the impact on testing.

  • I would use automated testing tools to ...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Spring MVC vs Spring Boot

Ans.

Spring MVC is a framework for building web applications using the Model-View-Controller design pattern, while Spring Boot is an opinionated framework for quickly building production-ready applications.

  • Spring MVC is more customizable and requires more configuration compared to Spring Boot.

  • Spring Boot provides a set of defaults and auto-configuration options to simplify development.

  • Spring Boot is ideal for microservices and standalone applications, while Spring MVC is better su...read more

Add your answer

Q10. Collection and it's benefits

Ans.

Collections are data structures that store and organize multiple elements.

  • Collections allow for efficient storage and retrieval of data

  • They provide various operations for manipulating the data, such as adding, removing, and searching for elements

  • Examples of collections include arrays, lists, sets, and maps

Add your answer

Q11. What is typescript

Ans.

TypeScript is a superset of JavaScript that adds static typing and other features to help developers write more robust code.

  • TypeScript is developed and maintained by Microsoft.

  • It compiles down to plain JavaScript.

  • It helps catch errors at compile time rather than runtime.

Add your answer

Q12. Types of attacks

Ans.

Types of attacks include malware, phishing, DDoS, ransomware, and social engineering.

  • Malware attacks involve malicious software that can harm a computer system.

  • Phishing attacks use deceptive emails or websites to trick individuals into revealing sensitive information.

  • DDoS attacks overwhelm a network or server with a flood of traffic, causing it to become unavailable.

  • Ransomware attacks encrypt a user's files and demand payment for their release.

  • Social engineering attacks manip...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Megha Engineering & Infrastructures

based on 27 interviews
Interview experience
3.7
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.6
 • 4.5k Interview Questions
3.8
 • 3k Interview Questions
3.4
 • 791 Interview Questions
3.7
 • 419 Interview Questions
4.0
 • 367 Interview Questions
4.0
 • 180 Interview Questions
View all
Top 63 Moons Technologies Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter