Filter interviews by
Clear (1)
I was interviewed before Sep 2020.
Round duration - 120 minutes
Round difficulty - Easy
Type of Questions No. of Questions
Quantitative 20
Logical and Reasoning 20
Verbal 20
Section II: Coding Section
Number of Questions: 2
Time Duration: 60 min
Level of Difficulty: Easy-Medium
Type of Questions: String Manipulation and Tree based Question
Given a binary tree, your task is to convert it into its mirror tree.
A binary tree is a data structure where each parent node has at most two children.
The mirror ...
Convert a binary tree into its mirror tree by interchanging left and right children of non-leaf nodes.
Traverse the binary tree in a recursive manner.
Swap the left and right children of each non-leaf node.
Continue this process until all nodes are visited.
Output the inorder traversal of the mirror tree.
Given a string ‘str’, calculate the minimum number of partitions required to ensure every resulting substring is a palindrome.
The first line contains a...
The problem involves calculating the minimum number of partitions needed to ensure every resulting substring is a palindrome.
Iterate through the string and check for palindromes at each possible partition point.
Keep track of the minimum cuts needed to partition the string into palindromic substrings.
Consider edge cases such as when the string is already a palindrome or when all characters are unique.
Example: For input ...
Round duration - 30 minutes
Round difficulty - Medium
It was a non eliminatory round comprising of 3 sections with a total time of 30 minutes.
Section I: Technical MCQ’s
Number of Questions: 20
Level of Difficulty: Medium -High
Programming Output questions and questions from CN, DBMS, OS and DS were asked.
Section II: Aptitude and Logical Section
Number of Questions: 10
Level of Difficulty: Easy
Section III: Coding Section
Number of Questions: 2
Level of Difficulty: Easy-Medium
You are given a sequence of numbers. Your task is to find all leaders in this sequence. A leader is defined as an element that is strictly greater than all the elemen...
Find all leaders in a sequence - elements greater than all elements to their right.
Iterate from right to left, keep track of maximum element encountered so far
If current element is greater than maximum, it is a leader
Return the leaders in the same order as the input sequence
You are provided with a two-dimensional array named MATRIX
of size N x M, consisting of integers. Your task is to return the elements of the matrix following a spiral order.
Implement a function to return elements of a matrix in spiral order.
Iterate through the matrix in a spiral order by adjusting the boundaries of rows and columns.
Keep track of the direction of traversal (right, down, left, up) to properly move through the matrix.
Handle edge cases such as when the matrix is empty or has only one row or column.
Round duration - 80 minutes
Round difficulty - Medium
The interview went for about 75-80 minutes. I was not able to answer almost all the answers
correctly but gave almost 75% correct answers. The interviewer mainly focused on the problem
solving ability and the quality of conceptual knowledge.
1: Basic Introductory Questions
2: 2-3 Puzzle Questions
3: Some basic Questions on DSA- about stacks, queue, arrays, memory storage accessing,
Advantages and Dis of Linked list over arrays,
4: Operating System: In all the rounds , Operating System questions were asked in abundance.
Though the questions were basic, they focused more on our concepts like how easily we were
able to explain it to them.
Questions on Kernels, Types of Kernel, Why OS, memory allocation in OS were asked.
5: Test Cases Question: We have to think and answer the possible questions while testing the
cases.
i: Test cases for a login page window.
6: Heavy discussions on the projects I have done. Why we preferred to use a particular
technology. What was my role in the project and so on.
7: I was asked to code some questions.
Given an array or list of integers 'ARR', identify the second largest element in 'ARR'.
If a second largest element does not exist, return -1.
ARR = [2,...
Find the second largest element in an array of integers.
Iterate through the array to find the largest and second largest elements.
Handle cases where all elements are identical.
Return -1 if a second largest element does not exist.
Determine if a given Singly Linked List of integers forms a cycle.
A cycle exists in a linked list if a node's next pointer points back to a previous node, ...
Detect if a singly linked list forms a cycle by checking if a node's next pointer points back to a previous node.
Traverse the linked list using two pointers, one moving at double the speed of the other.
If the two pointers meet at any point, there is a cycle in the linked list.
Use Floyd's Cycle Detection Algorithm for efficient detection.
Example: Input: 3 2 0 -4 -1, 1 Output: true
Round duration - 90 minutes
Round difficulty - Hard
This round of interview was took by a senior person of the company. It was a bit lengthy as we
had more of a discussion rather than just a QnA round. The interview went for more than 90
minutes and was tougher than the first round.
1: There was a long discussion on what I written in my resume. The projects I had done,
Extracurricular and co-curricular activities I had written on the resume, the skills I have
mentioned. All of it. So be careful of whatever you mention in the resume.
2: Next he asked me a bunch of coding questions which were some very popular ones
I was asked to code in my preferred language. So there wasn’t any language barrier and for all the
questions the interviewer asked for the most optimized approach.
As I was able to answer all the questions, I wasn’t asked any more questions.
3: After the coding questions, I was asked a lot of questions of Operation System and OOPS.
i: Fragmentation- Internal and External
ii: Concepts of Kernel
iii: File Management
iv: Virtual functions and Friend Functions
v: Function Overloading And Overriding
vi: What is paging and Demand Paging?
4: Interview puzzles:
5: Testing Based Questions-
i: Five new inventions in a glass frame and the test cases to test the working a frame.
ii: Design test cases for a shopping application.
The interviewer was quite satisfied with the test cases I answered. As the main trick to solve
these kind of interview questions is to design the test cases with giving every small function an
eye and then forming all possible scenarios for the same
Your task is to determine if two given strings are anagrams of each other. Two strings are considered anagrams if you can rearrange the letters of one string to form the...
Check if two strings are anagrams of each other by comparing the sorted characters.
Sort the characters of both strings and compare them.
Use a dictionary to count the occurrences of characters in each string.
Ensure both strings have the same length before proceeding.
Handle edge cases like empty strings or strings with different lengths.
Example: str1 = 'listen', str2 = 'silent' should return True.
You are given an encrypted string where repeated substrings are represented by the substring followed by its count. Your task is to find the K'th character of the d...
Given an encrypted string with repeated substrings represented by counts, find the K'th character of the decrypted string.
Parse the encrypted string to extract substrings and their counts
Iterate through the decrypted string to find the K'th character
Handle cases where counts are more than one digit or in parts
Implement a queue data structure which adheres to the FIFO (First In First Out) principle, utilizing only stack data structures.
Complete predefined fun...
Implement a queue using only stack data structures, supporting FIFO principle.
Use two stacks to simulate a queue: one for enqueueing and one for dequeueing.
For enQueue operation, push elements onto the enqueue stack.
For deQueue operation, if dequeue stack is empty, transfer elements from enqueue stack.
For peek operation, return top element of dequeue stack.
For isEmpty operation, check if both stacks are empty.
Develop a Stack Data Structure to store integer values using two Queues internally.
Your stack implementation should provide these public functions:
Implement a stack using two queues to store integer values with specified functions.
Create a stack class with two queue data members.
Implement push, pop, top, size, and isEmpty functions.
Ensure proper handling of edge cases like empty stack.
Use queue operations like enqueue and dequeue to simulate stack behavior.
Maintain the size of the stack and check for emptiness.
Example: Push 42, pop to get 42, push 17, top to get
Round duration - 70 minutes
Round difficulty - Easy
This was also similar to the last two Technical Interviews and was also easier from them. The
interview went for about 70 minutes and it was tilted more towards managerial side and less
technical questions were asked.
1. Program to Count set nits in an integer. (I answered 4 possible solutions to him and he was
satisfied)
2: Working of Bubble Sort and Insertion Sort ( I was asked to dry run the solution mainly to
check the internal working of swapping and comparison)
3: Some Mathematical Puzzles
4: Design test cases for OLA Application
5: Design test cases for GMAIL Application
6: Situation based questions
Round duration - 15 minutes
Round difficulty - Easy
It was the last round and an eliminatory round as well. It was a 15 minutes long discussion round
about college life, interests, and hobbies. The HR also asked our preferred joining location
between Noida and Bangalore which gave us many hopes of our selection.
Three candidates from our college went till the HR Round.
Tip 1 : Have strong knowledge of the basic concepts of DS and Programming
Tip 2 : Be Confident and have faith in yourself
Tip 3 : Have a Strong Balanced Resume
Tip 1 : Good Projects
Tip 2 : Maintain a good balance in all the sections of the resume
Top trending discussions
I was interviewed before Mar 2021.
Round duration - 60 minutes
Round difficulty - Easy
Technical interview round with questions based on DSA and OOPS.
Use double pointer to dynamically allocate memory for array of strings in C.
Declare a double pointer to hold the 2D array of strings.
Allocate memory for the rows first using malloc.
Then allocate memory for each string in the row using malloc.
Assign values to the strings in the array.
Example: char **array = malloc(rows * sizeof(char *));
Example: array[i] = malloc(strlen(str) + 1); strcpy(array[i], str);
Virtual functions in C++ are functions that can be overridden in derived classes, allowing for polymorphic behavior.
Virtual functions are declared using the 'virtual' keyword in the base class.
They are used to achieve runtime polymorphism in C++.
Derived classes can override the virtual functions defined in the base class.
Example: class Base { public: virtual void display() { cout << 'Base class dis...
Virtual base classes are classes that are inherited virtually to avoid multiple instances of the same base class in a derived class hierarchy.
Virtual base classes are used in multiple inheritance to prevent the Diamond Problem.
They are declared with the 'virtual' keyword in the base class.
When a class inherits a virtual base class, the most derived class is responsible for initializing the virtual base class.
Example: c...
Round duration - 60 minutes
Round difficulty - Easy
Technical interview round with questions based on OS/Networking etc.
The system call that creates a separate connection is fork()
fork() is a system call in Unix-like operating systems that creates a new process by duplicating the existing process
The new process created by fork() is called the child process, while the original process is called the parent process
fork() is commonly used in network programming to create separate connections for handling multiple clients
epoll_wait() system call waits for events on an epoll instance
Used in Linux for I/O event notification
Blocks until one or more file descriptors become ready
Returns the number of file descriptors ready for I/O operations
Different protocols used in the transport layer include TCP, UDP, SCTP, and DCCP.
TCP (Transmission Control Protocol) - reliable, connection-oriented protocol used for most internet communication
UDP (User Datagram Protocol) - connectionless protocol used for applications where speed is more important than reliability
SCTP (Stream Control Transmission Protocol) - supports multiple streams of data, used for telecommunicati...
TCP is a connection-oriented protocol that ensures reliable data delivery, while UDP is a connectionless protocol that focuses on speed.
TCP is reliable and ensures data delivery by establishing a connection before sending data.
UDP is faster but less reliable as it does not establish a connection before sending data.
TCP is used for applications that require high reliability and error correction, such as web browsing and...
Round duration - 60 minutes
Round difficulty - Easy
Technical interview round with questions based on Networking etc.
ICMP is a protocol used for error reporting, diagnostics, and network management in IP networks.
ICMP is used to report errors in packet delivery
It is used for network diagnostics and troubleshooting
ICMP messages are encapsulated within IP packets
Examples include ping (echo request/reply) and traceroute
TCP supports four types of connection release: active close, passive close, simultaneous close, and abortive close.
Active close: Client initiates the connection release process by sending a FIN packet.
Passive close: Server initiates the connection release process by sending a FIN packet.
Simultaneous close: Both client and server send FIN packets to each other simultaneously.
Abortive close: Connection is terminated abru...
The MAC layer uses protocols like CSMA/CA, CSMA/CD, and TDMA to manage access to the network.
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is used in wireless networks to avoid collisions.
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is used in wired networks to detect and handle collisions.
TDMA (Time Division Multiple Access) is used in networks where devices are assigned specific
ARP (Address Resolution Protocol) is a protocol used to map an IP address to a MAC address in a local network.
ARP is used to resolve IP addresses to MAC addresses in a local network.
It operates at the data link layer of the OSI model.
ARP requests are broadcasted to all devices on the network.
Example: When a device wants to communicate with another device on the same network, it uses ARP to find the MAC address correspo
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I applied via Job Portal and was interviewed in Mar 2021. There was 1 interview round.
posted on 15 Nov 2015
I applied via Campus Placement
Print all downward paths from any node in a binary tree with sum of elements equal to N.
Traverse the binary tree and keep track of the sum of elements in the path from root to current node.
If the sum equals N, print the path from root to current node.
Recursively traverse the left and right subtrees with updated sum.
Use a stack to keep track of the current path being traversed.
Example: Binary tree with root 1, left chil...
Yes, it is possible to get the accurate result from the given data.
The coordinates (i,j,k) where metallic balls are present can be determined by finding the set elements in both matrix1 and matrix2.
Additional data is not required as the given data is sufficient to determine the coordinates.
The coordinates can be obtained by iterating through the elements of matrix1 and matrix2 and checking for set elements.
posted on 15 Nov 2015
Backend server code for a tic tac toe game
Create a RESTful API using a framework like Express.js
Implement game logic to check for winning conditions
Use a database to store game state and user information
Handle user authentication and authorization
Implement real-time updates using WebSockets
Program to store and reconstruct a tree from a file with efficient techniques.
Use a recursive approach to traverse the tree and write each node to the file
Include information about the node's parent and children in the file
Use a unique identifier for each node to reconstruct the tree from the file
Use a data structure like a hash table to store the nodes and their identifiers for efficient reconstruction
based on 3 reviews
Rating in categories
Computer Scientist
455
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Consultant
279
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
255
salaries
| ₹0 L/yr - ₹0 L/yr |
Computer Scientist 2
245
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Technical Consultant
213
salaries
| ₹0 L/yr - ₹0 L/yr |
Salesforce
Oracle
Microsoft Corporation
Amazon