Filter interviews by
Aptitude test was online test
I was interviewed in Apr 2017.
The program creates a copy of a doubly linked list with an additional pointer pointing to any node in the list.
Traverse the original list and create a new node for each node in the original list.
Store the mapping between original and new nodes in a hash map.
Traverse the original list again and set the next and arbit pointers of the new nodes based on the mapping.
Return the head of the new list.
Implement functionality to handle online test for 1000 students with a timer, handling power failures and resuming tests.
Create a database to store test start and end times for each student
Use a timer function to track the test duration
Implement a mechanism to handle power failures and resume tests from where they left off
Consider using backup power sources or saving test progress frequently
Ensure data integrity and co
It is not possible to stop man-in-the-middle attacks over an insecure communication line without encryption.
Encryption is the most effective way to prevent man-in-the-middle attacks.
Without encryption, an attacker can intercept and modify the communication.
Using encryption ensures that the data remains confidential and tamper-proof.
Other security measures like authentication and secure protocols can complement encrypti
Heap memory is used for dynamic memory allocation, stack memory is used for local variables. Memory tables track memory allocation.
Heap memory is used for dynamic memory allocation, while stack memory is used for local variables.
Local variables are stored in stack memory, which is faster to access but limited in size.
Memory tables track memory allocation to keep track of which parts of memory are being used and by what...
Program to create a copy of a doubly linked list with an arbit pointer.
Traverse the original list and create a new node for each node in the list.
Store the mapping of original node to the new node in a hash table.
Traverse the original list again and set the next and arbit pointers of the new nodes.
Return the head of the new list.
Implement functionality for online test with timer and handle power failure scenarios
Create a timer function to track the time
Store the start time and end time of the test
Implement a backup system to save progress in case of power failure
Use a database to store test data and progress
Handle edge cases like internet connectivity issues
A recursive function to check if a number is prime or not.
Create a function that takes a number as input.
Check if the number is less than 2, return false.
Check if the number is 2, return true.
Check if the number is divisible by any number less than it, return false.
If none of the above conditions are met, call the function recursively with the number minus 1.
To reverse a linked list, we need to traverse the list and change the direction of the pointers.
Create three pointers: prev, curr, and next
Initialize prev to null, curr to head of the linked list, and next to null
Traverse the list and change the direction of the pointers: next = curr.next; curr.next = prev; prev = curr; curr = next;
Set the new head of the linked list to prev
It is not possible to stop man in the middle attack over an insecure communication line without using any kind of encryption.
Without encryption, the communication line is inherently insecure and vulnerable to man-in-the-middle attacks.
One possible solution is to use a secure communication line, such as a VPN or a dedicated private network.
Another solution is to use digital signatures to verify the authenticity of the c...
HTTP is unsecured while HTTPS is secured with SSL/TLS encryption.
HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure.
HTTP operates on port 80 while HTTPS operates on port 443.
HTTP is unencrypted while HTTPS is encrypted with SSL/TLS.
HTTPS provides authentication and data integrity while HTTP does not.
HTTPS is used for secure online transactions such as online banking, e
Heap and stack memory are two types of memory allocation in a program. Local variables are stored in stack memory. Memory tables are used to track memory allocation.
Heap memory is used for dynamic memory allocation, while stack memory is used for static memory allocation.
Local variables are stored in stack memory and are only accessible within the scope of the function they are declared in.
Memory tables are used to kee...
Aspiring Minds interview questions for popular designations
Top trending discussions
posted on 23 Oct 2021
I applied via Campus Placement and was interviewed before Oct 2020. There was 1 interview round.
Given an array, find two elements whose sum equals the target number (two sum).
Use a hash table to store the difference between the target and each element in the array.
Iterate through the array and check if the current element exists in the hash table.
If it does, return the current element and the corresponding value in the hash table.
If it doesn't, add the difference between the target and the current element to the
The task is to find the repeated and missing numbers in an array of integers.
Iterate through the array and mark the visited numbers by changing the sign of the element at the corresponding index.
If a number is already negative, it means it is a repeated number.
The missing number can be found by checking the index of the positive number.
Alternatively, we can use a hash set to keep track of visited numbers and find the m...
I applied via Company Website and was interviewed in Jun 2024. There were 3 interview rounds.
DSA, 2hrs. along with aptitude and reasoning que were asked
I applied via Recruitment Consultant and was interviewed in Apr 2021. There were 4 interview rounds.
High-level component structure of a page refers to the organization of the main elements on a webpage.
Identify the main content area of the page
Determine the navigation menu and its placement
Decide on the placement of secondary content such as ads or related articles
Consider the footer and its contents
Ensure the page is responsive and adaptable to different screen sizes
I applied via Approached by Company and was interviewed in Jul 2024. There were 3 interview rounds.
Stream a live log file to browser
The existing project is a web application for managing inventory and sales.
Built using React for the front-end and Node.js for the back-end
Uses MongoDB as the database
Includes features such as user authentication, product management, and sales tracking
Scaling up an existing project involves optimizing performance, increasing capacity, and improving efficiency.
Identify bottlenecks and areas for improvement
Implement caching mechanisms to reduce load times
Optimize database queries for faster retrieval
Upgrade hardware or infrastructure to handle increased traffic
Use load balancing to distribute traffic evenly across servers
Some of the top questions asked at the Aspiring Minds interview -
based on 1 interview
Interview experience
based on 107 reviews
Rating in categories
Software Engineer
14
salaries
| ₹0 L/yr - ₹0 L/yr |
Deputy General Manager
12
salaries
| ₹0 L/yr - ₹0 L/yr |
Product Manager
10
salaries
| ₹0 L/yr - ₹0 L/yr |
Assistant Manager
9
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
9
salaries
| ₹0 L/yr - ₹0 L/yr |
MeritTrac
CoCubes Technologies
TalentSprint
eLitmus Evaluation