Filter interviews by
Program to create a copy of a doubly linked list with an arbit pointer.
Traverse the original list and create a new node for each node in the list.
Store the mapping of original node to the new node in a hash table.
Traverse the original list again and set the next and arbit pointers of the new nodes.
Return the head of the new list.
Implement functionality for online test with timer and handle power failure scenarios
Create a timer function to track the time
Store the start time and end time of the test
Implement a backup system to save progress in case of power failure
Use a database to store test data and progress
Handle edge cases like internet connectivity issues
A recursive function to check if a number is prime or not.
Create a function that takes a number as input.
Check if the number is less than 2, return false.
Check if the number is 2, return true.
Check if the number is divisible by any number less than it, return false.
If none of the above conditions are met, call the function recursively with the number minus 1.
To reverse a linked list, we need to traverse the list and change the direction of the pointers.
Create three pointers: prev, curr, and next
Initialize prev to null, curr to head of the linked list, and next to null
Traverse the list and change the direction of the pointers: next = curr.next; curr.next = prev; prev = curr; curr = next;
Set the new head of the linked list to prev
It is not possible to stop man in the middle attack over an insecure communication line without using any kind of encryption.
Without encryption, the communication line is inherently insecure and vulnerable to man-in-the-middle attacks.
One possible solution is to use a secure communication line, such as a VPN or a dedicated private network.
Another solution is to use digital signatures to verify the authenticity of the c...
HTTP is unsecured while HTTPS is secured with SSL/TLS encryption.
HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure.
HTTP operates on port 80 while HTTPS operates on port 443.
HTTP is unencrypted while HTTPS is encrypted with SSL/TLS.
HTTPS provides authentication and data integrity while HTTP does not.
HTTPS is used for secure online transactions such as online banking, e
Heap and stack memory are two types of memory allocation in a program. Local variables are stored in stack memory. Memory tables are used to track memory allocation.
Heap memory is used for dynamic memory allocation, while stack memory is used for static memory allocation.
Local variables are stored in stack memory and are only accessible within the scope of the function they are declared in.
Memory tables are used to kee...
Top trending discussions
Nice interview experience on the aptitude
Projects are specific tasks or assignments undertaken to achieve a particular goal or outcome.
Projects involve a defined scope, timeline, and budget.
They require a team of individuals with specific skills and roles.
Examples include developing a new software application, implementing a website redesign, or launching a marketing campaign.
Excellent knowledge you need on coding to crack
I applied via Company Website and was interviewed before Jul 2023. There was 1 interview round.
Creating specific components for software development
Identify the requirements for the component
Design the component architecture
Implement the component using appropriate programming languages and tools
Test the component for functionality and performance
Integrate the component into the larger software system
posted on 30 Oct 2023
C# is a programming language developed by Microsoft for building a wide range of applications on the .NET framework.
C# is an object-oriented language with features like classes, inheritance, and polymorphism.
It is strongly typed, meaning variables must be declared with a specific data type.
C# supports modern programming concepts like async/await for asynchronous programming.
It is commonly used for developing desktop, w...
I applied via Referral and was interviewed in Feb 2024. There were 3 interview rounds.
Implement tail -f command
Browserstack is a popular cloud-based cross-browser testing tool used by developers worldwide.
Provides access to a wide range of browsers and devices for testing
Allows for parallel testing to save time and increase efficiency
Integrates with popular testing frameworks like Selenium and Appium
Offers features like screenshots, video recordings, and debugging tools
Used by companies like Microsoft, Twitter, and Airbnb for t
Yes, I faced a challenge in integrating a new third-party API with our existing system.
Had to understand the documentation of the API thoroughly
Encountered compatibility issues with our system
Worked closely with the API provider to troubleshoot and resolve issues
I applied via Company Website and was interviewed in Jun 2024. There were 3 interview rounds.
DSA, 2hrs. along with aptitude and reasoning que were asked
I applied via Approached by Company and was interviewed before Feb 2022. There were 4 interview rounds.
Chrome and Firefox Browser automation
Log file tail last n lines where n is configurable. Followup question on how you can optimize it further incase log file size is in TBs and incase it is cluster of servers
Messaging queues are used to manage asynchronous communication between different components of a system.
Use a reliable messaging queue system like RabbitMQ or Apache Kafka
Ensure messages are properly formatted and serialized
Implement message acknowledgement and retry mechanisms
Monitor queue health and performance
Consider message ordering and partitioning for scalability
Avoid long-running tasks in message handlers
MapReduce is a programming model for processing large data sets in parallel.
MapReduce divides the input data into chunks and processes them in parallel.
It consists of two phases: Map and Reduce.
Map function takes input data and converts it into key-value pairs.
Reduce function takes the output of Map as input and combines the values with the same key.
It is used for solving dictionary keywords by mapping each word to a k
posted on 4 Jul 2024
I applied via Referral and was interviewed in Jan 2024. There were 3 interview rounds.
Normal 3 leetcode medium questions
Machine coding round to design tail -f
Some of the top questions asked at the Aspiring Minds Software Developer interview -
based on 2 reviews
Rating in categories
Software Engineer
14
salaries
| ₹0 L/yr - ₹0 L/yr |
Deputy General Manager
12
salaries
| ₹0 L/yr - ₹0 L/yr |
Product Manager
10
salaries
| ₹0 L/yr - ₹0 L/yr |
Assistant Manager
9
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
9
salaries
| ₹0 L/yr - ₹0 L/yr |
MeritTrac
CoCubes Technologies
TalentSprint
eLitmus Evaluation