Accenture
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I was interviewed before May 2016.
I applied via Company Website and was interviewed in Nov 2021. There was 1 interview round.
VPN stands for Virtual Private Network. It is used to create a secure and private connection over a public network.
VPN encrypts internet traffic to protect data from hackers and cybercriminals
It allows users to access restricted content and websites
VPN can be used to bypass internet censorship and surveillance
It is commonly used by remote workers to access company resources securely
Examples of VPN services include Nord
posted on 4 Jun 2024
I applied via Naukri.com and was interviewed in Oct 2022. There were 2 interview rounds.
1 hr test with mcq and coding snippet
Pointers are variables that store memory addresses of other variables in C programming language.
Pointers are used to manipulate data structures like arrays, linked lists, and trees.
They can be used to pass values by reference to functions.
Pointers can also be used to allocate memory dynamically using functions like malloc() and calloc().
A linked list program is a data structure that stores a sequence of elements with pointers to the next element.
Create a Node class with a value and a next pointer
Create a LinkedList class with a head pointer and methods to add, remove, and traverse nodes
Example: LinkedList ll = new LinkedList(); ll.add(5); ll.add(10); ll.remove(5);
Data structures are used to organize and manipulate data efficiently in various applications.
Data structures are used in databases to store and retrieve data quickly.
In computer graphics, data structures are used to represent geometric objects.
Data structures are used in algorithms such as sorting and searching.
In networking, data structures are used to represent network packets and routing tables.
Data structures are u...
Merge sort is a divide and conquer algorithm that recursively divides the input array into two halves, sorts them and then merges them.
Divide the array into two halves
Recursively sort the two halves
Merge the sorted halves
Repeat until the entire array is sorted
Cloud computing is widely used in various industries for data storage, processing, and analysis.
Cloud computing allows for easy scalability and cost-effectiveness in managing large amounts of data.
Real-time collaboration and access to data from anywhere are some of the benefits of cloud computing.
Examples of cloud computing applications in real-world projects include Amazon Web Services (AWS), Microsoft Azure, and Goog...
I applied via campus placement at Rajalakshmi Engineering College, Chennai and was interviewed in Oct 2022. There were 4 interview rounds.
Basic Aptitude Questions on time and work, distance and speed
Logical Reasoning, Blood Relations
Grammar and Verbal
2 Questions based on simple DSA
I applied via Naukri.com and was interviewed in Nov 2021. There were 4 interview rounds.
I applied via Company Website and was interviewed in Aug 2021. There were 4 interview rounds.
posted on 13 Jan 2022
Explanation of concurrent hash map and compile time vs run time polymorphism
Concurrent hash map allows multiple threads to access and modify the map concurrently without any external synchronization
Method overloading is compile time polymorphism as the decision of which method to call is made by the compiler at compile time based on the number and types of arguments passed
Method overriding is run time polymorphism as t...
Analytical, reasoning, quantitative
based on 15 reviews
Rating in categories
Application Development Analyst
38.8k
salaries
| ₹3 L/yr - ₹12 L/yr |
Application Development - Senior Analyst
26.3k
salaries
| ₹6.8 L/yr - ₹20.2 L/yr |
Team Lead
24.1k
salaries
| ₹7 L/yr - ₹25.4 L/yr |
Senior Software Engineer
18.4k
salaries
| ₹6 L/yr - ₹19 L/yr |
Software Engineer
17.6k
salaries
| ₹3.6 L/yr - ₹12.8 L/yr |
TCS
Cognizant
Capgemini
Infosys