i
Aryaka Networks
Filter interviews by
I applied via Referral and was interviewed in Nov 2023. There were 3 interview rounds.
Basic coding questions were there related to string operations
TLS handshake is the process of establishing a secure connection between a client and a server.
TLS handshake is initiated by the client and involves a series of steps to negotiate encryption parameters and exchange cryptographic keys.
It ensures the authenticity, integrity, and confidentiality of data transmitted over the network.
The handshake includes the ClientHello, ServerHello, Certificate Exchange, Key Exchange, an...
When you hit a URL in a browser, a request is sent to the server and the server responds with the requested webpage.
Typically, the browser sends an HTTP GET request to the server.
The server processes the request and generates a response.
The response may include HTML, CSS, JavaScript, and other resources needed to render the webpage.
The browser receives the response and renders the webpage for the user to view and inter...
I have worked on various protocols including HTTP, TCP/IP, and MQTT.
HTTP (Hypertext Transfer Protocol) - used for communication between web browsers and servers
TCP/IP (Transmission Control Protocol/Internet Protocol) - the foundation of the internet
MQTT (Message Queuing Telemetry Transport) - a lightweight messaging protocol for IoT devices
Top trending discussions
posted on 9 Feb 2023
I applied via Recruitment Consulltant and was interviewed before Feb 2022. There were 2 interview rounds.
posted on 20 Feb 2024
I applied via Naukri.com and was interviewed in Aug 2023. There were 4 interview rounds.
Generic dotnet questions mcq
One problem is given need to make logic and your current project details
Managerial round was taken at the end
posted on 12 Feb 2024
I applied via Recruitment Consulltant and was interviewed in Jan 2024. There was 1 interview round.
The question asks to find the memory of a given structure by considering struct padding.
Struct padding refers to the unused bytes added to align the members of a structure.
To find the memory of a structure, we need to consider the size of each member and the padding added.
The total memory of a structure is the sum of the sizes of its members and the padding.
Code to find the position of a number in a BST
Implement a recursive function to traverse the BST
Compare the target number with the current node value
If the target is smaller, go to the left subtree; if larger, go to the right subtree
Repeat until the target is found or the subtree is null
A Trie is a tree-like data structure used for efficient retrieval of strings. It supports insertion and search operations.
A Trie is also known as a prefix tree.
Each node in the Trie represents a character.
The root node represents an empty string.
Each node can have multiple children, each representing a different character.
Insertion involves traversing the Trie and creating new nodes as needed.
Search involves traversing...
posted on 11 Sep 2024
Check if a string containing parenthesis, curly brackets, and square brackets is valid.
Use a stack to keep track of opening brackets
Pop from stack when encountering a closing bracket, ensuring it matches the corresponding opening bracket
Return false if stack is not empty at the end
posted on 26 Jul 2024
I applied via Naukri.com and was interviewed in Jun 2022. There were 9 interview rounds.
Data structures and algorithms
Problem were from leetcode and geek for geeks.
Coding round , questions from leetcode
Situation based questions and thought process
posted on 12 Jul 2022
posted on 23 Mar 2022
I applied via Naukri.com and was interviewed in Sep 2021. There were 3 interview rounds.
posted on 4 Nov 2021
I applied via Naukri.com and was interviewed in May 2021. There was 1 interview round.
We are using Java 11 and Spring Boot 2.4.3 in our current project.
Java 11 provides better performance and security features compared to previous versions.
Spring Boot 2.4.3 offers improved support for Kotlin and GraalVM.
We are also using Spring Data JPA for database access and Spring Security for authentication and authorization.
Singleton Design Pattern ensures only one instance of a class exists. No, we cannot create a clone of an object from singleton class.
Singleton pattern restricts the instantiation of a class to one object.
It is used when only one object is required to coordinate actions across the system.
The instance is created only when it is requested for the first time.
The constructor of the singleton class is private.
Clone method is
Joins in SQL are used to combine data from two or more tables based on a related column.
Joins are used to retrieve data from multiple tables in a single query
Types of joins include inner join, left join, right join, and full outer join
Join conditions are specified using the ON keyword and can include multiple conditions
Aliases can be used to simplify the syntax of join queries
Triggers are database objects that automatically execute in response to certain events. Stored procedures are precompiled SQL statements.
Triggers are used to enforce business rules or to audit changes to data.
Stored procedures are used to encapsulate frequently used SQL statements for reuse and to improve performance.
Triggers can be used to update related tables when a record is inserted, updated, or deleted.
Stored pro...
Program to reverse sort keys in HashMap
Create a List from the keySet() of the HashMap
Sort the List in reverse order using Collections.sort()
Iterate through the sorted List and add the keys to a new LinkedHashMap
Return the LinkedHashMap
Maven is a build automation tool used primarily for Java projects. It manages dependencies and builds the project.
Maven is based on the concept of POM (Project Object Model) which describes the project dependencies, build process, and other configurations.
Maven has different cycles such as validate, compile, test, package, verify, install, and deploy.
The validate cycle checks if the project is correct and all necessary...
Springboot annotations are used to simplify the development process and provide additional functionality.
Annotations like @RestController and @RequestMapping are used to create RESTful web services.
@Autowired is used for dependency injection.
@Transactional is used to manage transactions.
@Component is used to mark a class as a Spring component.
@Value is used to inject values from properties files or environment variable...
based on 1 interview
Interview experience
based on 8 reviews
Rating in categories
Software Engineer
35
salaries
| ₹5.4 L/yr - ₹16.5 L/yr |
Senior Software Engineer
22
salaries
| ₹11 L/yr - ₹28 L/yr |
Network Application Engineer
16
salaries
| ₹5 L/yr - ₹9 L/yr |
Technical Lead
15
salaries
| ₹25 L/yr - ₹45.5 L/yr |
Technical Support Engineer
15
salaries
| ₹6.5 L/yr - ₹10 L/yr |
Sterlite Technologies
Cisco
BT Business
Lumen Technologies