Filter interviews by
Program to create a copy of a doubly linked list with an arbit pointer.
Traverse the original list and create a new node for each node in the list.
Store the mapping of original node to the new node in a hash table.
Traverse the original list again and set the next and arbit pointers of the new nodes.
Return the head of the new list.
Implement functionality for online test with timer and handle power failure scenarios
Create a timer function to track the time
Store the start time and end time of the test
Implement a backup system to save progress in case of power failure
Use a database to store test data and progress
Handle edge cases like internet connectivity issues
A recursive function to check if a number is prime or not.
Create a function that takes a number as input.
Check if the number is less than 2, return false.
Check if the number is 2, return true.
Check if the number is divisible by any number less than it, return false.
If none of the above conditions are met, call the function recursively with the number minus 1.
To reverse a linked list, we need to traverse the list and change the direction of the pointers.
Create three pointers: prev, curr, and next
Initialize prev to null, curr to head of the linked list, and next to null
Traverse the list and change the direction of the pointers: next = curr.next; curr.next = prev; prev = curr; curr = next;
Set the new head of the linked list to prev
It is not possible to stop man in the middle attack over an insecure communication line without using any kind of encryption.
Without encryption, the communication line is inherently insecure and vulnerable to man-in-the-middle attacks.
One possible solution is to use a secure communication line, such as a VPN or a dedicated private network.
Another solution is to use digital signatures to verify the authenticity of the c...
HTTP is unsecured while HTTPS is secured with SSL/TLS encryption.
HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure.
HTTP operates on port 80 while HTTPS operates on port 443.
HTTP is unencrypted while HTTPS is encrypted with SSL/TLS.
HTTPS provides authentication and data integrity while HTTP does not.
HTTPS is used for secure online transactions such as online banking, e
Heap and stack memory are two types of memory allocation in a program. Local variables are stored in stack memory. Memory tables are used to track memory allocation.
Heap memory is used for dynamic memory allocation, while stack memory is used for static memory allocation.
Local variables are stored in stack memory and are only accessible within the scope of the function they are declared in.
Memory tables are used to kee...
Aptitude test was online test
I appeared for an interview in Apr 2017.
The program creates a copy of a doubly linked list with an additional pointer pointing to any node in the list.
Traverse the original list and create a new node for each node in the original list.
Store the mapping between original and new nodes in a hash map.
Traverse the original list again and set the next and arbit pointers of the new nodes based on the mapping.
Return the head of the new list.
Implement functionality to handle online test for 1000 students with a timer, handling power failures and resuming tests.
Create a database to store test start and end times for each student
Use a timer function to track the test duration
Implement a mechanism to handle power failures and resume tests from where they left off
Consider using backup power sources or saving test progress frequently
Ensure data integrity and co
It is not possible to stop man-in-the-middle attacks over an insecure communication line without encryption.
Encryption is the most effective way to prevent man-in-the-middle attacks.
Without encryption, an attacker can intercept and modify the communication.
Using encryption ensures that the data remains confidential and tamper-proof.
Other security measures like authentication and secure protocols can complement encrypti
Heap memory is used for dynamic memory allocation, stack memory is used for local variables. Memory tables track memory allocation.
Heap memory is used for dynamic memory allocation, while stack memory is used for local variables.
Local variables are stored in stack memory, which is faster to access but limited in size.
Memory tables track memory allocation to keep track of which parts of memory are being used and by what...
Aspiring Minds interview questions for popular designations
I appeared for an interview in Jan 2021.
Round duration - 120 minutes
Round difficulty - Hard
This round was very difficult. I never do these much difficulty level of coding questions. But i give my best, and just do every questions by using step by step process.
Given an integer 'N', print an hourglass pattern based on the value of 'N'.
The first and only line of input contains an integer, denoting the value of N.
Print an hourglass pattern based on the given integer 'N'.
Read the integer 'N' as input
Print the top half of the hourglass pattern with decreasing numbers
Print the bottom half of the hourglass pattern with increasing numbers
Handle the constraints for 'N' values between 1 and 50
Given an undirected and disconnected graph G(V, E) where V vertices are numbered from 0 to V-1, and E represents edges, your task is to output the BFS traversal starting from the ...
BFS traversal in a disconnected graph starting from vertex 0.
Use BFS algorithm to traverse the graph starting from vertex 0.
Explore neighbor nodes first before moving to the next level neighbors.
Consider bidirectional edges in an undirected graph.
Output the BFS traversal sequence for each test case in a separate line.
Ensure the BFS path starts from vertex 0 and print connected nodes in numerical sort order.
You are given a stack. Your task is to sort the elements within the stack in ascending order using only push and pop operations. You are allowed to use one additional stack ...
Sort a given stack in ascending order using only push and pop operations with the help of an additional stack.
Use one additional stack to assist in sorting the elements.
Pop elements from the input stack and push them onto the auxiliary stack in sorted order.
Keep track of the current minimum element to maintain ascending order.
Pop elements from the auxiliary stack back to the input stack to get the sorted order.
Round duration - 90 minutes
Round difficulty - Easy
This round is also coding round in this round we have a small video call interaction too, in which hr ask few questions to only those whose coding question is correct.
You are given a palindrome number represented as a string S
. Your task is to find the largest palindrome number that is strictly less than S
.
T...
Find the largest palindrome number strictly less than a given palindrome number.
Iterate from the middle towards the start of the number and decrement the digits to create the largest palindrome less than the given number.
Handle cases where the number is all '9's by changing the middle digit to '9' and decrementing the rest of the digits.
If the number has an odd length, simply mirror the first half to create the largest
You are given a grid containing oranges where each cell of the grid can contain one of the three integer values:
Find minimum time to rot all fresh oranges adjacent to rotten oranges in a grid.
Use Breadth First Search (BFS) to simulate the rotting process.
Track the time taken to rot all fresh oranges.
Return -1 if all fresh oranges cannot be rotten.
Handle edge cases like empty grid or no fresh oranges.
Tip 1 : Relax and don't stress. Practice
Tip 2 : Build Resume according to Job Description , but don't lie.
Tip 3 : Have good projects and knowledge regarding important subjects related to interviews
Tip 1 : Include only genuine information, never lie in resume , it will impact to bad impression.
Tip 2 : Skills relevant to Job Description
Tip 3 : Resume should not be more than 2 pages
Tip 4 : Have some projects and internship on your resume because it will give good impression
I appeared for an interview in Apr 2024.
Secondary research involves gathering information from existing sources such as books, articles, and reports.
Secondary research is the process of collecting and analyzing data that has already been published or gathered by others.
It is used to gain a better understanding of a topic, validate primary research findings, or gather historical data.
Examples of secondary research sources include academic journals, government
I worked on data analysis projects, conducted market research, and created reports for senior management.
Conducted data analysis on customer feedback surveys
Assisted in creating financial models to analyze company performance
Researched market trends and competitor analysis
Prepared presentations and reports for senior management meetings
I applied via LinkedIn and was interviewed before Feb 2023. There were 2 interview rounds.
Research is the systematic investigation of a subject to discover new knowledge or validate existing theories.
Research involves a systematic and organized approach to gather information and analyze data.
It aims to answer specific questions or solve problems by using various methods and techniques.
Research can be conducted in various fields such as science, social sciences, business, and technology.
Examples of research ...
posted on 29 Nov 2024
I applied via AmbitionBox
Java, spring,springboot
Some of the top questions asked at the Aspiring Minds interview -
based on 1 interview
Interview experience
based on 107 reviews
Rating in categories
Software Engineer
14
salaries
| ₹6.8 L/yr - ₹16.5 L/yr |
Deputy General Manager
12
salaries
| ₹13.5 L/yr - ₹28 L/yr |
Product Manager
10
salaries
| ₹7.9 L/yr - ₹28 L/yr |
Assistant Manager
9
salaries
| ₹2 L/yr - ₹5.5 L/yr |
MIS Executive
8
salaries
| ₹2 L/yr - ₹2.8 L/yr |
Aurigo
Prime Focus Technologies
Peel-works
Yalamanchili Software Exports