Filter interviews by
Program to create a copy of a doubly linked list with an arbit pointer.
Traverse the original list and create a new node for each node in the list.
Store the mapping of original node to the new node in a hash table.
Traverse the original list again and set the next and arbit pointers of the new nodes.
Return the head of the new list.
Implement functionality for online test with timer and handle power failure scenarios
Create a timer function to track the time
Store the start time and end time of the test
Implement a backup system to save progress in case of power failure
Use a database to store test data and progress
Handle edge cases like internet connectivity issues
A recursive function to check if a number is prime or not.
Create a function that takes a number as input.
Check if the number is less than 2, return false.
Check if the number is 2, return true.
Check if the number is divisible by any number less than it, return false.
If none of the above conditions are met, call the function recursively with the number minus 1.
To reverse a linked list, we need to traverse the list and change the direction of the pointers.
Create three pointers: prev, curr, and next
Initialize prev to null, curr to head of the linked list, and next to null
Traverse the list and change the direction of the pointers: next = curr.next; curr.next = prev; prev = curr; curr = next;
Set the new head of the linked list to prev
It is not possible to stop man in the middle attack over an insecure communication line without using any kind of encryption.
Without encryption, the communication line is inherently insecure and vulnerable to man-in-the-middle attacks.
One possible solution is to use a secure communication line, such as a VPN or a dedicated private network.
Another solution is to use digital signatures to verify the authenticity of the c...
HTTP is unsecured while HTTPS is secured with SSL/TLS encryption.
HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure.
HTTP operates on port 80 while HTTPS operates on port 443.
HTTP is unencrypted while HTTPS is encrypted with SSL/TLS.
HTTPS provides authentication and data integrity while HTTP does not.
HTTPS is used for secure online transactions such as online banking, e
Heap and stack memory are two types of memory allocation in a program. Local variables are stored in stack memory. Memory tables are used to track memory allocation.
Heap memory is used for dynamic memory allocation, while stack memory is used for static memory allocation.
Local variables are stored in stack memory and are only accessible within the scope of the function they are declared in.
Memory tables are used to kee...
Top trending discussions
posted on 6 Dec 2024
I applied via Walk-in and was interviewed in Jun 2024. There were 3 interview rounds.
Basic Logical programs
posted on 27 Apr 2024
I applied via campus placement at Bangalore Institute Of Technology (BIT) and was interviewed in Mar 2024. There were 3 interview rounds.
Time distance and basic puzzle questions,6 questions in 45 minutes
Interview for backend developer with experience in django
Django's request response flow involves the request being handled by URL dispatcher, views, middleware, and templates before generating a response.
Request is received by URL dispatcher which maps the URL to a view function
View function processes the request, interacts with models if needed, and returns a response
Middleware can intercept the request and response for additional processing
Templates are used to generate HT
posted on 30 Oct 2023
C# is a programming language developed by Microsoft for building a wide range of applications on the .NET framework.
C# is an object-oriented language with features like classes, inheritance, and polymorphism.
It is strongly typed, meaning variables must be declared with a specific data type.
C# supports modern programming concepts like async/await for asynchronous programming.
It is commonly used for developing desktop, w...
posted on 8 Feb 2024
Virtual DOM is a concept in web development where a lightweight copy of the actual DOM is created and updated efficiently.
Virtual DOM is used in frameworks like React to improve performance by minimizing direct manipulation of the actual DOM.
It allows developers to update only the necessary parts of the UI, reducing the number of expensive DOM operations.
Changes made to the virtual DOM are compared with the actual DOM,...
posted on 22 Apr 2023
I was interviewed in Jan 2021.
Round duration - 120 minutes
Round difficulty - Hard
This round was very difficult. I never do these much difficulty level of coding questions. But i give my best, and just do every questions by using step by step process.
Given an integer 'N', print an hourglass pattern based on the value of 'N'.
The first and only line of input contains an integer, denoting the value of N.
Given an undirected and disconnected graph G(V, E) where V vertices are numbered from 0 to V-1, and E represents edges, your task is to output the BFS traversal starting from the ...
Let us consider a function BFS that accepts a list of edges, EDGES, and the number of vertices VERTEX as a parameter and do:
Now, the function BF...
You are given a stack. Your task is to sort the elements within the stack in ascending order using only push and pop operations. You are allowed to use one additional stack ...
Round duration - 90 minutes
Round difficulty - Easy
This round is also coding round in this round we have a small video call interaction too, in which hr ask few questions to only those whose coding question is correct.
You are given a palindrome number represented as a string S
. Your task is to find the largest palindrome number that is strictly less than S
.
T...
You are given a grid containing oranges where each cell of the grid can contain one of the three integer values:
The idea is very simple and naive. We will process the rotten oranges second by second. Each second, we rot all the fresh oranges that are adjacent to the already rotten oranges. The time by which there are no rotten oranges left to process will be our minimum time.
In the first traversal of the grid, we will process all the cells with value 2 (rotten oranges). We will also mark their adjacent cells ...
Tip 1 : Relax and don't stress. Practice
Tip 2 : Build Resume according to Job Description , but don't lie.
Tip 3 : Have good projects and knowledge regarding important subjects related to interviews
Tip 1 : Include only genuine information, never lie in resume , it will impact to bad impression.
Tip 2 : Skills relevant to Job Description
Tip 3 : Resume should not be more than 2 pages
Tip 4 : Have some projects and internship on your resume because it will give good impression
posted on 29 Jul 2021
Rotate a matrix by 90 degrees clockwise
Transpose the matrix
Reverse each row of the transposed matrix
Alternatively, swap elements in-place layer by layer
Example: [[1,2],[3,4]] -> [[3,1],[4,2]]
based on 2 reviews
Rating in categories
Software Engineer
14
salaries
| ₹6.8 L/yr - ₹16.5 L/yr |
Deputy General Manager
12
salaries
| ₹13.5 L/yr - ₹28 L/yr |
Product Manager
10
salaries
| ₹7.9 L/yr - ₹28 L/yr |
Assistant Manager
9
salaries
| ₹2 L/yr - ₹5.5 L/yr |
Senior Software Engineer
9
salaries
| ₹7.5 L/yr - ₹18.5 L/yr |
MeritTrac
CoCubes Technologies
TalentSprint
eLitmus Evaluation