Filter interviews by
Basic C programming questions and coding questions
More on the work done on previous project
Use XOR operation to find the missing number in an array of strings
Convert each string in the array to an integer using parseInt()
Use XOR operation on all the integers in the array and then XOR operation on all the numbers from 1 to n+1 (where n is the length of the array)
The result will be the missing number
Top trending discussions
I was interviewed in Dec 2024.
posted on 22 Nov 2024
Node.js event loop is a mechanism that allows Node.js to perform non-blocking I/O operations asynchronously.
Event loop is responsible for handling asynchronous operations in Node.js.
It allows Node.js to perform multiple operations simultaneously without blocking the execution.
Event loop continuously checks the event queue for new events and executes them in a non-blocking manner.
Callbacks are used to handle the complet
- Basic data structures questions.
- Node.js specific questions.
Design patterns are reusable solutions to common problems in software design.
Design patterns help in creating flexible, maintainable, and scalable software.
Some common design patterns include Singleton, Factory, Observer, Strategy, and Decorator.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Factory pattern creates objects without specifying the exact class of object...
Delegates are type-safe function pointers in C# used for implementing callbacks. async/await is used for asynchronous programming in C#.
Delegates in C# are similar to function pointers in C or C++. They allow methods to be passed as parameters to other methods.
Async/await in C# is used for asynchronous programming, allowing methods to run asynchronously without blocking the main thread.
Delegates can be used with async/
An interceptor is a design pattern commonly used in software development to capture and manipulate requests and responses.
Interceptors can be used for logging, authentication, authorization, caching, error handling, etc.
In Angular, interceptors can be used to modify HTTP requests before they are sent and responses before they are received.
In Spring framework, interceptors can be used to intercept client requests and se
Authentication is the process of verifying the identity of a user or system.
Authentication involves confirming the identity of a user through credentials such as passwords, biometrics, or security tokens.
Common methods of authentication include single-factor authentication (e.g. password) and multi-factor authentication (e.g. password + SMS code).
Authentication can be achieved through protocols like OAuth, OpenID, SAML...
posted on 21 Oct 2024
I applied via Recruitment Consulltant and was interviewed in Sep 2024. There were 4 interview rounds.
Basic hacker rank problem
posted on 19 Dec 2024
I applied via Approached by Company and was interviewed in Nov 2024. There was 1 interview round.
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
posted on 29 Aug 2024
Coding test was mainly based on some easy level leetcode questions
posted on 17 Dec 2024
Technical Lead
5
salaries
| ₹15 L/yr - ₹24 L/yr |
Consultant
4
salaries
| ₹3.7 L/yr - ₹7.5 L/yr |
Network Engineer
4
salaries
| ₹2.2 L/yr - ₹5.5 L/yr |
TCS
Wipro
Infosys
HCLTech