Filter interviews by
I applied via Company Website and was interviewed in May 2024. There was 1 interview round.
Coding test that is from html,CSS, javascript
posted on 20 Jul 2022
I applied via Naukri.com and was interviewed in Jun 2022. There were 2 interview rounds.
I applied via Company Website and was interviewed in Sep 2023. There were 3 interview rounds.
Two problems in JavaScript to solve
You will need to create a working web app in vanilla JS.
need to implement the following things.
1. Fetch data from given REST api
2. Display data in List. add some css to show different type of items.
3. Implement text filter and other types of filter.
All needs to be implemented in vanilla JS
Designing HLD/LLD for a game like chess or Snakes and Ladders
Identify the game rules and mechanics
Determine the game board and pieces
Create a data model for the game state
Implement game logic and rules using algorithms
Design user interface and user experience
Consider scalability and performance
Test and debug the game thoroughly
Hackerrank, html, javascript, css
I appeared for an interview in Oct 2021.
Round duration - 60 Minutes
Round difficulty - Medium
This round consisted of some standard questions related to HTML , CSS , JS and basic Frontend develeoper practices .
HTML5 is the latest version of the HTML standard with new features for web development.
Support for multimedia elements like <video> and <audio>
Canvas and SVG for graphics and animations
Improved form controls and validation
Offline storage capabilities with Local Storage and IndexedDB
Geolocation API for location-based services
The CSS Box Model is a fundamental concept in CSS that defines the layout and spacing of elements on a webpage.
The Box Model consists of content, padding, border, and margin.
Content: The actual content of the box, such as text or images.
Padding: Space between the content and the border.
Border: The border surrounding the padding and content.
Margin: Space outside the border, separating the element from other elements.
Exa...
Prototype chaining in JavaScript is the mechanism by which objects inherit properties and methods from other objects.
In JavaScript, each object has a prototype property, which points to another object. When a property or method is accessed on an object, JavaScript will look for it in the object itself first, and then in its prototype chain.
If the property or method is not found in the object, JavaScript will continue t...
Media elements in HTML are used to embed audio and video content on a webpage.
Media elements include <audio> and <video> tags in HTML.
They allow for the playback of audio and video files directly on a webpage.
Attributes like src, controls, autoplay, and loop can be used to customize the behavior of media elements.
Example: <video src='video.mp4' controls></video>
Round duration - 70 Minutes
Round difficulty - Medium
This was a preety intense round revolving mainly around the core concepts of JavaScript and React . I was confident about my skills in JavaScript and React as I already had some projects in JS and React and I also completed the Guided Path of JS and React in CodeStudio which boosted my preparation and helped me crack these Frontend Interviews.
Given two integers a
and b
, your task is to swap these numbers and output the swapped values.
The first line contains a single integer 't', representing the num...
Swap two numbers 'a' and 'b' and output the swapped values.
Create a temporary variable to store one of the numbers before swapping
Assign the value of 'a' to 'b' and the temporary variable to 'a'
Output the swapped values as 'b' followed by 'a'
Given an array consisting of 'N' positive integers where each integer is either 0, 1, or 2, your task is to sort the given array in non-decreasing order.
Each input st...
Sort an array of 0s, 1s, and 2s in non-decreasing order.
Use a counting sort algorithm to count the occurrences of 0s, 1s, and 2s in the array.
Then reconstruct the array by placing the counted elements in order.
Time complexity of the counting sort algorithm is O(N).
Promises are objects representing the eventual completion or failure of an asynchronous operation.
Promises have three states: pending, fulfilled, and rejected.
Pending: initial state, neither fulfilled nor rejected.
Fulfilled: operation completed successfully.
Rejected: operation failed.
Promises can be chained using .then() to handle success and failure.
Example: const promise = new Promise((resolve, reject) => { ... })
Callbacks in JavaScript are functions passed as arguments to other functions, to be executed later.
Callbacks are commonly used in asynchronous operations, such as event handling or AJAX requests.
They allow for more flexible and dynamic programming, by defining behavior that should happen after a certain event or task is completed.
Example: setTimeout function in JavaScript takes a callback function as an argument to be
Same-origin policy is a security measure in web browsers that restricts how a document or script loaded from one origin can interact with a resource from another origin.
It prevents a web page from making requests to a different domain than the one it was loaded from.
It helps protect user data and prevent malicious attacks like cross-site scripting (XSS).
Cross-origin resource sharing (CORS) headers can be used to relax
Components in React go through various stages like mounting, updating, and unmounting.
Components are created and inserted into the DOM during the mounting phase.
During the updating phase, components can re-render due to changes in props or state.
Components are removed from the DOM during the unmounting phase.
Lifecycle methods like componentDidMount, componentDidUpdate, and componentWillUnmount are used to perform actio
Round duration - 30 Minutes
Round difficulty - Easy
This was a typical HR round with some standard Behavioral questions like my interests, weaknesses, strengths, family background, are you willing to relocate or travel , why Amdocs, CEO of Amdocs etc.
Tip 1 : Do at-least 2 good projects and you must know every bit of them.
Tip 2 : Understand the fundamentals of JavaScript as they are asked very often.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
Find the minimum and maximum values in an array in a single traversal.
Initialize min and max variables with the first element of the array
Iterate through the array and update min and max if a smaller or larger value is found
Return the min and max values
The maximum number of squares on a chessboard is 64.
The chessboard has 64 squares in total.
The number of squares on a chessboard can be calculated using the formula n^2, where n is the number of rows or columns.
In this case, n = 8 (8 rows and 8 columns), so the maximum number of squares is 8^2 = 64.
C++ is a programming language. Deep copy creates a new object and copies all values, while shallow copy creates a reference to the original object.
C++ is a general-purpose programming language
Deep copy creates a new object with its own copy of the data
Shallow copy creates a reference to the original object
Deep copy is safer but can be slower and consume more memory
Shallow copy is faster but can lead to unexpected behav
Pre initialization refers to the process of initializing variables or objects before they are used in a program.
Pre initialization helps avoid errors or unexpected behavior caused by using uninitialized variables.
It is a good practice to pre initialize variables with default values.
Pre initialization can be done using constructors, default values, or initialization blocks.
Example: int count = 0; initializes the variabl
Reverse a linked list with and without using Recursion
Iterative approach: Use three pointers to reverse the links between nodes
Recursive approach: Recursively reverse the rest of the list and then fix the links
Polymorphism refers to the ability of an object to take on many forms. The diamond problem occurs in multiple inheritance.
Polymorphism can be achieved through method overloading and method overriding.
Method overloading allows multiple methods with the same name but different parameters.
Method overriding occurs when a subclass provides a specific implementation of a method already defined in its superclass.
The diamond p...
The program should differentiate between integers and characters when using the assignment operator (=).
Check the data type of the variable before assigning a value.
Use conditional statements to perform different actions based on the data type.
For integers, assign the value directly. For characters, convert the character to its ASCII value and assign it.
Sort an array by moving all zeroes to the end.
Iterate through the array and move all non-zero elements to the front.
Count the number of zeroes encountered and append them at the end of the array.
Use two pointers to swap elements and maintain the order.
The number of VTables created in a class hierarchy depends on the number of virtual functions and the number of derived classes.
VTables are used in object-oriented programming languages to implement dynamic dispatch.
Each class with at least one virtual function has its own VTable.
Derived classes inherit the VTable of their base class and add their own entries for any additional virtual functions.
The total number of VTa...
List is preferred when frequent insertion and deletion is required. Vector is preferred when random access is required.
List is implemented as a doubly-linked list, allowing for efficient insertion and deletion at any position.
Vector is implemented as a dynamic array, allowing for efficient random access.
Use List when the number of elements is expected to change frequently and the order of elements matters less.
Use Vect...
The given string needs to be reversed and the words need to be rearranged.
Split the string into an array of words
Reverse the array
Join the array elements with a space in between
Design a parking lot with Logic Flow Diagram, E-R diagram, DB tables with relations, and commands for transactions.
Identify the types of vehicles that will use the parking lot
Determine the number of parking spaces needed for each vehicle type
Create a flow diagram to show the process of entering and exiting the parking lot
Design an E-R diagram to show the relationships between entities such as vehicles, parking spaces, ...
To find min and max of an array in one traversal, initialize min and max to first element and compare with rest.
Initialize min and max to first element of array
Traverse the array and compare each element with min and max
Update min and max accordingly
Return min and max
Given a chessboard, find the maximum number of squares present.
Start with the smallest square and count all possible squares
Use the formula n*(n+1)*(2n+1)/6 to find the total number of squares in an n x n chessboard
Add up the squares of all sizes from 1 to n to get the maximum number of squares
For example, an 8 x 8 chessboard has 204 squares
C++ is a high-level programming language used for developing system software, application software, device drivers, and video games.
C++ was developed by Bjarne Stroustrup in 1983.
It is an extension of the C programming language.
C++ supports object-oriented programming, generic programming, and low-level memory manipulation.
It is used in developing operating systems, browsers, databases, and more.
Examples of popular sof...
Deep copy creates a new object with a new memory address, while shallow copy creates a new reference to the same memory address.
Deep copy duplicates the object and all its nested objects, while shallow copy only duplicates the top-level object.
Deep copy is slower and more memory-intensive than shallow copy.
Shallow copy can lead to unexpected behavior if the original object is modified.
In Python, deep copy can be achiev...
Preinitialization is the process of initializing data or objects before they are actually needed.
Preinitialization can improve performance by reducing the time needed to initialize data or objects when they are actually needed.
It can also help to avoid delays or interruptions during runtime.
Examples of preinitialization include preloading data into memory, initializing objects in advance, and caching frequently used da
Polymorphism can be achieved through method overloading, method overriding, and interfaces. Multiple inheritance can be solved using interfaces.
Method overloading allows multiple methods with the same name but different parameters
Method overriding allows a subclass to provide its own implementation of a method already defined in its superclass
Interfaces provide a way to achieve multiple inheritance by allowing a class ...
WAP to generate a matrix from a given tree.
Create a 2D array to store the matrix
Traverse the tree and fill the matrix accordingly
Use BFS or DFS to traverse the tree
The matrix will be symmetric along the diagonal
Primary key is a column or set of columns that uniquely identifies each row in a table. Unique key is a constraint that ensures uniqueness of values in a column or set of columns.
Primary key is used to enforce data integrity and ensure that each row in a table can be uniquely identified.
Unique key is used to ensure that no two rows in a table have the same values in a column or set of columns.
Primary key can be a singl...
Yes, a unique key can be a primary key.
A primary key is a unique identifier for a record in a table.
A unique key is a constraint that ensures the values in a column are unique.
A unique key can be used as a primary key if it meets the requirements.
A primary key cannot have NULL values, while a unique key can have one NULL value.
Foreign key is a column in a table that refers to the primary key of another table.
It establishes a relationship between two tables.
It ensures referential integrity.
It can be null, but only if it is defined as nullable.
It helps in joining tables.
Example: Customer table has a foreign key to the Order table's primary key.
Example: Order table's foreign key can be null if the order has not been placed by any customer yet.
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a database into smaller, more manageable tables.
It helps to eliminate data redundancy and inconsistencies.
Normalization ensures that each table has a primary key and that data is stored in a logical and consistent manner.
It improves data integrity and reduces the likelihood ...
Normalized form is better for data consistency and scalability.
Normalized form reduces data redundancy and ensures data consistency.
Normalized form allows for easier scalability and maintenance.
Single table/2 tables may be appropriate for small, simple datasets.
Normalized form may require more complex queries to retrieve data.
Normalized form may require more storage space due to additional tables.
Example: Normalized fo...
Create a database for Indian Premier League (IPL)
Identify entities like teams, players, matches, venues, etc.
Create tables for each entity with relevant attributes
Establish relationships between tables using foreign keys
Add constraints like unique, not null, default values, etc.
Populate tables with data from reliable sources
Query to find player with maximum runs in a match on given date and venue
Use MAX() function to find maximum runs
Join tables for player name, match details and runs scored
Filter by given date and venue
Order by runs scored and limit to 1 result
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Computer Scientist
452
salaries
| ₹20 L/yr - ₹70 L/yr |
Technical Consultant
284
salaries
| ₹13.8 L/yr - ₹30 L/yr |
Computer Scientist 2
259
salaries
| ₹29.4 L/yr - ₹101 L/yr |
Software Engineer
257
salaries
| ₹8 L/yr - ₹30 L/yr |
Senior Software Engineer
207
salaries
| ₹10 L/yr - ₹42 L/yr |
Salesforce
Oracle
Microsoft Corporation
Amazon