Filter interviews by
I applied via Company Website and was interviewed before Oct 2022. There were 4 interview rounds.
Top trending discussions
I appeared for an interview before Apr 2021.
Round duration - 60 minutes
Round difficulty - Medium
This was a technical Interview round with questions on C#, .NET and DBMS.
Ref is used for passing arguments by reference, Out is used for returning multiple values.
Ref keyword is used for passing arguments by reference, allowing the method to modify the original value.
Out keyword is used for returning multiple values from a method, as it does not require the variable to be initialized before being passed.
ViewData, ViewBag, and TempData are ways to pass data between controllers and views in ASP.NET MVC.
ViewData is a dictionary object used to pass data from controller to view. It requires typecasting.
ViewBag is a dynamic property used to pass data from controller to view. No typecasting is required.
TempData is a dictionary object used to pass data from one controller to another or from one action to another.
Managed code is executed by the CLR with memory management, while unmanaged code is executed directly by the operating system without memory management.
Managed code is executed by the Common Language Runtime (CLR) in .NET framework.
Unmanaged code is executed directly by the operating system without CLR.
Managed code provides automatic memory management through garbage collection.
Unmanaged code requires manual memory man...
Triggers in SQL Server are special types of stored procedures that are automatically executed when certain events occur in a database.
Types of triggers include DML triggers (for INSERT, UPDATE, DELETE operations), DDL triggers (for CREATE, ALTER, DROP operations), and Logon triggers.
Triggers can be set to fire before or after the triggering event.
Examples of triggers include auditing changes to a table using an INSERT ...
Generic collections in C# allow for type-safe collections, while non-generic collections do not enforce type safety.
Generic collections use type parameters to specify the type of elements they can contain, ensuring type safety.
Non-generic collections do not specify the type of elements they can contain, leading to potential runtime errors if incorrect types are used.
Example of generic collection: List<string> nam...
Round duration - 30 minutes
Round difficulty - Easy
This was a typical managerial round.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
Spring Framework is a powerful, feature-rich framework for building Java applications, emphasizing dependency injection and aspect-oriented programming.
Spring uses Inversion of Control (IoC) to manage object creation and dependencies, allowing for loose coupling.
Dependency Injection (DI) can be done via constructor injection, setter injection, or method injection.
Spring's ApplicationContext is a central interface for p...
Stack using queues: push() - enqueue to queue1, pop() - dequeue from queue2 after transferring n-1 elements from queue1 to queue2
To push an element, enqueue it to queue1
To pop an element, transfer n-1 elements from queue1 to queue2, dequeue the last element from queue1 and swap the names of queue1 and queue2
Queue using stacks: enqueue() - push to stack1, dequeue() - pop from stack2 after transferring all elements from ...
Doubly linked list is a data structure where each node has a pointer to both previous and next nodes.
Create a Node class with data, prev and next pointers
Create a LinkedList class with head and tail pointers
Implement methods to add, remove and traverse nodes
Yes, I am a leader.
I have experience leading teams in previous projects.
I am able to communicate effectively and motivate team members.
I am proactive in identifying and solving problems.
I am able to delegate tasks and trust team members to complete them.
I am constantly seeking to improve my leadership skills through learning and feedback.
Formula to calculate number of squares that can fit inside a triangle
Calculate the area of the triangle and the area of the square
Divide the area of the triangle by the area of the square to get the number of squares that can fit inside the triangle
Formula: (h*b)/(a*a)
SVM is a machine learning algorithm used for classification and regression analysis.
SVM finds the best hyperplane that separates data into different classes.
It works by maximizing the margin between the hyperplane and the closest data points.
SVM can handle both linear and non-linear data using kernel functions.
It is widely used in image classification, text classification, and bioinformatics.
SVM has been shown to be ef...
Logistic regression is used for classification while linear regression is used for regression analysis.
Logistic regression predicts the probability of an event occurring, while linear regression predicts the value of a continuous variable.
Logistic regression uses a sigmoid function to map input values to a probability between 0 and 1.
Linear regression assumes a linear relationship between the independent and dependent ...
I appeared for an interview in Sep 2016.
A program to generate the Fibonacci series up to n terms provided by the user.
Fibonacci series starts with 0 and 1.
Each subsequent number is the sum of the previous two.
Example: For n=5, the series is 0, 1, 1, 2, 3.
A program to find factorial using recursion.
Define a function that takes an integer as input.
Check if the input is 0 or 1, return 1 in that case.
Otherwise, call the function recursively with input-1 and multiply it with the input.
Indexes are data structures that improve the speed of data retrieval operations in a database. Views are virtual tables created from queries.
Indexes are used to quickly locate data in a database by creating a sorted structure that allows for efficient searching.
Views are virtual tables that are created by executing a query and storing the result set as a named object.
Indexes can be created on one or more columns of a t...
Designing employee and department tables with primary and foreign keys for relational database management.
Employee Table Fields: EmployeeID (PK), FirstName, LastName, Email, Phone, DeptID (FK)
Dept Table Fields: DeptID (PK), DeptName, Location
Primary Key (PK) in Employee Table: EmployeeID uniquely identifies each employee.
Primary Key (PK) in Dept Table: DeptID uniquely identifies each department.
Foreign Key (FK) in Empl...
Indexes are implemented using B Trees and B+ Trees.
B Trees and B+ Trees are data structures used to organize and efficiently search data in databases.
B Trees are balanced search trees that store data in nodes with multiple children.
B+ Trees are similar to B Trees but have additional features like leaf nodes that form a linked list.
Indexes are created on specific columns of a database table to improve query performance.
...
Other than indexes and tables, a DBMS also includes views, stored procedures, triggers, and functions.
Views: Virtual tables that are based on the result of a query. They provide a way to simplify complex queries and restrict access to data.
Stored Procedures: Precompiled sets of SQL statements that can be executed with a single command. They enhance performance and allow for code reusability.
Triggers: Special types of s...
A database administrator manages and maintains databases, ensuring their security, performance, and availability.
Designing and implementing database structures
Installing and configuring database software
Monitoring and optimizing database performance
Ensuring data integrity and security
Backing up and restoring databases
Troubleshooting and resolving database issues
Collaborating with developers and system administrators
Pla...
Inorder traversal of a binary tree visits nodes in left-root-right order, yielding a sorted sequence for BSTs.
Inorder traversal visits the left subtree, then the root, and finally the right subtree.
For a binary tree: Given nodes A, B, C, where A is the root, B is left child, and C is right child, the order is B, A, C.
Example: For a BST with values 2, 1, 3, the inorder traversal results in [1, 2, 3].
Recursive implementa...
This task involves sorting numbers and using binary search to find a specific number in the sorted array.
1. Sort the array: Example - [5, 2, 9, 1] becomes [1, 2, 5, 9].
2. Implement binary search: Start with the middle element and compare it to the target.
3. If the middle element is equal to the target, return its index.
4. If the target is less than the middle element, search the left half.
5. If the target is greater, s...
Types of integrity in DBMS include foreign, referential, and domain.
Foreign integrity ensures that foreign key values in a table match primary key values in another table.
Referential integrity ensures that relationships between tables are maintained, preventing orphaned or invalid data.
Domain integrity ensures that data in a column adheres to specified data types, formats, or constraints.
For example, in a database for ...
Agile methodology is an iterative and incremental approach to software development.
Agile methodology emphasizes collaboration, flexibility, and customer satisfaction.
It involves breaking down the project into small, manageable tasks called user stories.
Teams work in short iterations called sprints, typically 1-4 weeks long.
Regular meetings like daily stand-ups and sprint reviews are held to track progress and gather fe...
In 3-5 years, I see myself as a senior software engineer leading a team of developers on innovative projects.
Advancing to a senior software engineer role
Leading a team of developers on projects
Working on innovative and challenging projects
Continuing to learn and grow in the field
I am a passionate software engineer with experience in developing web applications using various technologies.
Experienced in full-stack web development
Proficient in languages such as JavaScript, Python, and Java
Familiar with frameworks like React, Node.js, and Django
Strong problem-solving skills and ability to work in a team
Completed projects like e-commerce website using MERN stack
I want to learn how to play the piano.
I have always been fascinated by music and the piano in particular.
Learning to play an instrument can be a great way to relax and unwind.
Playing the piano can also improve cognitive skills and memory.
I believe learning to play the piano will bring me joy and fulfillment.
My strengths include problem-solving skills and attention to detail. My weaknesses include public speaking and time management.
Strengths: problem-solving skills, attention to detail
Weaknesses: public speaking, time management
I appeared for an interview in Nov 2016.
Activity flow diagrams for Ola cabs management system and washing machine.
Ola cabs management system: User books a cab -> Driver accepts the ride -> User gets picked up -> User reaches destination -> Payment is made.
Washing machine: User selects wash cycle -> Machine fills with water -> Detergent is added -> Machine agitates clothes -> Water drains -> Clothes are rinsed -> Machine spins clothes -> Cycle ends.
Developed a web-based project management tool for a software development company.
Used Agile methodology for development
Implemented user authentication and authorization using JWT
Integrated with GitHub for version control
Used React for front-end and Node.js for back-end
Implemented real-time chat feature using Socket.io
based on 1 interview experience
Difficulty level
Duration
Apollo Hospitals
UnitedHealth
Fortis Healthcare
Johnson & Johnson