i
Bounteous x Accolite
Filter interviews by
Clear (1)
Java is a popular programming language known for its platform independence and object-oriented features.
Platform independence allows Java code to run on any platform without recompilation
Object-oriented features like encapsulation, inheritance, and polymorphism make code modular and reusable
Java has a vast standard library with built-in support for networking, I/O, and concurrency
Java is highly secure with features lik...
DBMS types include relational, NoSQL, object-oriented, and hierarchical. Each has unique features and use cases.
Relational DBMS: structured data, ACID compliance, SQL queries (e.g. MySQL, Oracle)
NoSQL DBMS: unstructured data, flexible schema, horizontal scaling (e.g. MongoDB, Cassandra)
Object-oriented DBMS: data stored as objects, supports inheritance and polymorphism (e.g. db4o)
Hierarchical DBMS: data organized in a t...
I applied via Campus Placement and was interviewed before Apr 2023. There were 2 interview rounds.
One coding question was asked to solve along with aptitude
Conditions for a deadlock in software engineering
Deadlock occurs when each process in a set is waiting for an event that only another process in the set can cause
Four conditions for a deadlock: mutual exclusion, hold and wait, no preemption, circular wait
Example: Process A holds resource X and waits for resource Y, while Process B holds resource Y and waits for resource X
I applied via Campus Placement and was interviewed in Jul 2022. There were 5 interview rounds.
There are two coading questions one easy and one medium
This round had only one question and the time given was 60 mins, it was a medium-level Question based on Arrays. The question was given in the form of a story just like we get on platforms like Codechef and we had to provide an optimized solution with given and hidden test cases getting the correct output.
Encapsulation is a mechanism of wrapping data and code together into a single unit.
Encapsulation helps in achieving data hiding and abstraction.
It provides better control over the data by making it private and accessible only through public methods.
Real-time examples of encapsulation include a car's engine, which is encapsulated and can only be accessed through the car's interface.
Another example is a mobile phone, whe...
Inheritance allows a subclass to inherit properties and methods from a superclass, but it has some disadvantages.
Inheritance can lead to tight coupling between classes, making it difficult to modify the superclass without affecting the subclass.
Inheritance can also lead to the creation of deep class hierarchies, which can be difficult to understand and maintain.
Inheritance can result in code duplication if multiple sub...
Runtime polymorphism is the ability of an object to take on multiple forms during runtime.
It is achieved through method overriding
It allows for more flexibility and extensibility in code
It is a key feature of object-oriented programming
Example: Animal class with different subclasses such as Dog, Cat, and Bird
The task is to find any number of elements in an array that add up to a given target.
Use a recursive approach to find all possible combinations of elements that add up to the target.
Start with the first element and recursively call the function with the remaining elements and the reduced target.
If the target becomes zero, add the current combination to the result.
If the target becomes negative or there are no more elem...
Find the maximum multiplication of 3 numbers in an array of strings.
Convert the array of strings to an array of integers.
Sort the array in descending order.
Check the product of first three elements and last two elements with the first element.
The Dutch national flag problem is a sorting problem that involves sorting an array of 3 distinct values.
The problem involves sorting an array of 3 distinct values: red, white, and blue.
The goal is to sort the array in-place, without using any additional data structures.
The solution involves using three pointers to keep track of the boundaries between the different values.
Segregate 0's and 1's in array using Dutch National Flag Algorithm
Use three pointers - low, mid, and high
low points to the first index of 1
mid points to the first index of unknown element
high points to the last index of 1
If arr[mid] is 0, swap arr[low] and arr[mid], increment low and mid
If arr[mid] is 1, increment mid
If arr[mid] is 2, swap arr[mid] and arr[high], decrement high
Diamond problem occurs in multiple inheritance when two base classes have a common method. It is solved using virtual inheritance.
Diamond problem occurs when a derived class inherits from two base classes that have a common method.
Virtual inheritance is used to solve the diamond problem.
Virtual inheritance ensures that only one instance of the common base class is created.
DLL is a library of executable functions and data that can be used by a Windows application.
DLLs are loaded at runtime and can be shared by multiple applications.
They allow for modular programming and reduce memory usage.
DLLs can be used for device drivers, system utilities, and application extensions.
Examples of DLLs include kernel32.dll, user32.dll, and msvcr100.dll.
Registers are small, fast memory locations in a CPU that store data for quick access.
Registers are used to store data that is frequently accessed by the CPU.
They are faster than accessing data from RAM.
Registers are limited in number and size.
Examples of registers include the program counter, stack pointer, and general-purpose registers.
Register usage can be optimized for performance in code.
Accessing registers can be ...
Yes, a constructor can be made private in C++ to restrict object creation outside the class.
Private constructors are used in Singleton design pattern to ensure only one instance of the class is created.
If a constructor is made private, it can only be accessed by the member functions of the class.
Attempting to create an object of a class with a private constructor outside the class will result in a compile-time error.
Function pointers are pointers that point to the memory address of a function. They can be passed as arguments or returned from a function.
Function pointers allow for dynamic function calls at runtime
Function pointers can be used to implement callbacks
Function pointers can be used to implement polymorphism
Normal functions are called directly, while function pointers are called indirectly
Function pointers can be assigne...
Ways to prevent instantiation of a class
Declare the class as abstract
Make the constructor private
Implement a static factory method
Throw an exception in the constructor
Use the Singleton pattern
To check for a loop in a linked list, we use the Floyd's cycle-finding algorithm.
Create two pointers, slow and fast, and initialize them to the head of the linked list.
Move slow pointer by one node and fast pointer by two nodes.
If there is a loop, the two pointers will eventually meet.
If there is no loop, the fast pointer will reach the end of the linked list.
Time complexity of this algorithm is O(n) and space complexi
Remove duplicates from Linked List. Both variants.
Variant 1: Using Hash Set to keep track of visited nodes and removing duplicates
Variant 2: Using two pointers to compare each node with all subsequent nodes and removing duplicates
Example: 1->2->3->2->4->3, Output: 1->2->3->4
Reverse a linked list in groups of k
Create a function to reverse a linked list
Iterate through the linked list in groups of k
Reverse each group using the function
Connect the reversed groups back together
Return the new head of the linked list
Equal Sum Partition problem with DP and matrix printing
The problem involves dividing an array into two subsets with equal sum
Dynamic programming can be used to solve this problem efficiently
A matrix can be used to keep track of the subsets
Printing the subsets can be done by backtracking through the matrix
Delete Kth node from end of linked list in single iteration
Use two pointers, one to traverse the list and another to keep track of Kth node from end
Move both pointers simultaneously until the first pointer reaches the end
Delete the Kth node from end using the second pointer
Merge two sorted linked lists
Create a new linked list
Compare the first nodes of both lists and add the smaller one to the new list
Move the pointer of the added node to the next node in the list
Repeat until one of the lists is empty
Add the remaining nodes of the non-empty list to the new list
To check if a linked list is circular, we can use Floyd's cycle-finding algorithm.
Create two pointers, slow and fast, and initialize them to the head of the linked list
Move slow pointer by one node and fast pointer by two nodes
If the linked list is circular, the fast pointer will eventually catch up to the slow pointer
If the linked list is not circular, the fast pointer will reach the end of the list
Time complexity: O(
Binary Tree is a tree data structure where each node has at most two children. Binary Search Tree is a binary tree with the property that the left subtree of a node contains only nodes with keys lesser than the node's key and the right subtree of a node contains only nodes with keys greater than the node's key.
Binary Tree can have any values in the nodes, while Binary Search Tree has a specific order of values.
Binary S...
Separate negative and positive numbers in a linked list.
Create two separate linked lists for positive and negative numbers
Traverse the original linked list and add nodes to respective lists
Join the two lists to get the final linked list with separated numbers
Calculating the depth of a tree
Depth of a tree is the maximum distance from the root node to any leaf node
Can be calculated recursively by finding the maximum depth of left and right subtrees
Base case is when the node is null, return 0
My strengths include problem-solving, adaptability, and teamwork. My weaknesses include impatience and perfectionism.
Strength: Problem-solving - I enjoy analyzing complex problems and finding efficient solutions.
Strength: Adaptability - I am quick to learn new technologies and adapt to changing environments.
Strength: Teamwork - I work well in collaborative settings, valuing open communication and cooperation.
Weakness: ...
I enjoy hiking, playing guitar, and reading science fiction novels.
Hiking: I love exploring nature and challenging myself physically.
Playing guitar: I find it relaxing and enjoy learning new songs.
Reading science fiction novels: It allows me to escape into imaginative worlds and stimulates my creativity.
I am passionate about solving complex problems and creating innovative software solutions.
I enjoy tackling challenging coding problems and finding efficient solutions.
I am constantly learning and staying up-to-date with the latest technologies and programming languages.
I love collaborating with a team to brainstorm ideas and develop creative software solutions.
I am passionate about creating user-friendly and intuitive ...
Hard work is putting in a lot of effort, while smart work is finding efficient ways to achieve the same result.
Hard work involves working long hours and putting in a lot of physical or mental effort.
Smart work involves finding innovative and efficient ways to accomplish tasks.
An example of hard work is studying for hours to prepare for an exam.
An example of smart work is using study techniques like spaced repetition to...
The problems faced by a person working in a team during an online internship and how to solve them as a team leader.
Communication issues due to lack of face-to-face interaction
Difficulties in coordinating tasks and deadlines
Challenges in building trust and rapport among team members
Technical difficulties and connectivity issues
Misalignment of goals and expectations
Lack of accountability and responsibility
I am a highly skilled software engineer with a strong background in programming and problem-solving. I have a passion for creating efficient and innovative solutions.
I have a Bachelor's degree in Computer Science and extensive experience in software development.
I am proficient in multiple programming languages such as Java, C++, and Python.
I have a proven track record of successfully delivering complex projects on time...
I would have pursued a career in music.
I have been playing the guitar for over 10 years.
I have performed at local gigs and events.
I enjoy writing and composing my own music.
Bounteous x Accolite interview questions for designations
Mcqs cs fundamentals
Medium level coding question
Get interview-ready with Top Bounteous x Accolite Interview Questions
I applied via Campus Placement and was interviewed before May 2022. There were 6 interview rounds.
Online aptitude test
One coding question given
Consists of OS,DBMS,OOPS,CN + 1 coding question
I applied via Great Learning and was interviewed in Feb 2022. There were 4 interview rounds.
20 MCQs were asked on eduthrill portal related to the technology I applied for.
2 coding questions were asked. You can have whatever language you want from the list of languages they offer.
Count the number of occurrences of each character in a given string.
Create a dictionary to store the count of each character.
Iterate through the string and update the count in the dictionary.
Return the dictionary with character count.
Merge Sort is a divide-and-conquer algorithm that recursively divides an array into two halves, sorts them, and then merges them.
Divide the array into two halves
Recursively sort each half
Merge the sorted halves
Basic of Programming and Aptitude
One program of Data Structures and Algorithm duration 1 hour
Top trending discussions
Some of the top questions asked at the Bounteous x Accolite Software Engineer interview -
The duration of Bounteous x Accolite Software Engineer interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 22 interviews
5 Interview rounds
based on 80 reviews
Rating in categories
Senior Software Engineer
1.5k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
564
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Technical Delivery Manager
431
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Test Engineer
211
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Delivery Manager
153
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Infosys
Wipro
HCLTech