Filter interviews by
Basic C programming questions and coding questions
More on the work done on previous project
Use XOR operation to find the missing number in an array of strings
Convert each string in the array to an integer using parseInt()
Use XOR operation on all the integers in the array and then XOR operation on all the numbers from 1 to n+1 (where n is the length of the array)
The result will be the missing number
Top trending discussions
I was interviewed in Jan 2025.
I was interviewed in Dec 2024.
The Longest Substring Without Repeating Characters problem involves finding the length of the longest substring without any repeating characters.
Best solution: Sliding Window approach with HashSet to track unique characters. Time complexity O(n), space complexity O(min(n, m)) where n is the length of the string and m is the size of the character set.
Worst solution: Brute force approach checking all substrings for uniqu...
posted on 22 Nov 2024
Design patterns are reusable solutions to common problems in software design.
Design patterns help in creating flexible, maintainable, and scalable software.
Some common design patterns include Singleton, Factory, Observer, Strategy, and Decorator.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Factory pattern creates objects without specifying the exact class of object...
Delegates are type-safe function pointers in C# used for implementing callbacks. async/await is used for asynchronous programming in C#.
Delegates in C# are similar to function pointers in C or C++. They allow methods to be passed as parameters to other methods.
Async/await in C# is used for asynchronous programming, allowing methods to run asynchronously without blocking the main thread.
Delegates can be used with async/
An interceptor is a design pattern commonly used in software development to capture and manipulate requests and responses.
Interceptors can be used for logging, authentication, authorization, caching, error handling, etc.
In Angular, interceptors can be used to modify HTTP requests before they are sent and responses before they are received.
In Spring framework, interceptors can be used to intercept client requests and se
Authentication is the process of verifying the identity of a user or system.
Authentication involves confirming the identity of a user through credentials such as passwords, biometrics, or security tokens.
Common methods of authentication include single-factor authentication (e.g. password) and multi-factor authentication (e.g. password + SMS code).
Authentication can be achieved through protocols like OAuth, OpenID, SAML...
posted on 21 Oct 2024
I applied via Recruitment Consulltant and was interviewed in Sep 2024. There were 4 interview rounds.
Basic hacker rank problem
posted on 19 Dec 2024
I applied via Approached by Company and was interviewed in Nov 2024. There was 1 interview round.
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
Dependency Injection in Spring is a design pattern where objects are passed their dependencies rather than creating them internally.
In Spring, dependencies are injected into a class through constructor injection, setter injection, or field injection.
This helps in achieving loose coupling between classes and makes the code more testable and maintainable.
Example: @Autowired annotation in Spring is used for dependency inj
I have over 8 years of experience in IT, specializing in software development and project management.
Developed web applications using Java, Spring, and AngularJS
Led a team of developers in implementing a new CRM system for a large client
Managed multiple projects simultaneously, ensuring on-time delivery and client satisfaction
posted on 17 Dec 2024
based on 1 interview
Interview experience
Technical Lead
5
salaries
| ₹15 L/yr - ₹24 L/yr |
Consultant
4
salaries
| ₹3.7 L/yr - ₹7.5 L/yr |
Network Engineer
4
salaries
| ₹2.2 L/yr - ₹5.5 L/yr |
TCS
Wipro
Infosys
HCLTech