i
Atyati Technologies
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I appeared for an interview before Mar 2023.
Types of dependency injection include constructor injection, property injection, and method injection.
Constructor injection: Dependencies are provided through a class's constructor.
Property injection: Dependencies are provided through public properties of a class.
Method injection: Dependencies are provided through methods of a class.
Top trending discussions
posted on 11 Mar 2022
I appeared for an interview before Mar 2021.
Round duration - 60 minutes
Round difficulty - Medium
21 students were shortlisted from the 1st MCQ round and in this round we were asked to write the codes (function only) of 3 questions in 1 hour time.
You are given a grid containing oranges where each cell of the grid can contain one of the three integer values:
Find the minimum time required to rot all fresh oranges in a grid.
Use Breadth First Search (BFS) to simulate the rotting process
Track the time taken to rot all oranges and return -1 if any fresh oranges remain
Handle edge cases like no fresh oranges or all oranges already rotten
Consider using a queue to efficiently process adjacent oranges
Given an array/list 'ARR' consisting of 'N' integers, your task is to find the majority element in the array. If there is no majority element present, return -1.
Find the majority element in an array, return -1 if no majority element exists.
Iterate through the array and keep track of the count of each element using a hashmap.
Check if any element's count is greater than floor(N/2) to determine the majority element.
Return the majority element or -1 if no majority element exists.
You are provided with a non-empty binary tree in which each node contains a non-negative integer value. Your task is to find and return the maximum ...
Find the maximum path sum between two leaf nodes in a binary tree.
Traverse the tree to find the maximum path sum between two leaf nodes.
Keep track of the maximum sum found so far.
Consider all possible paths between leaf nodes.
Handle cases where the tree has only a single leaf node.
Implement a recursive function to calculate the maximum path sum.
Round duration - 60 minutes
Round difficulty - Medium
This was a technical round with DSA based questions.
You are given a Singly Linked List of integers. The task is to find the N-th node from the end of the list.
If the given list is (1 -> -2 -&g...
Find the N-th node from the end of a Singly Linked List of integers.
Traverse the list to find the length L of the list.
Calculate the position of the N-th node from the beginning as L - N + 1.
Traverse the list again to reach the calculated position and return the node's value.
You are given a binary tree consisting of distinct integers and two nodes, X
and Y
. Your task is to find and return the Lowest Common Ancestor (LCA) of these two nodes...
Find the Lowest Common Ancestor (LCA) of two nodes in a binary tree.
Traverse the binary tree to find the paths from the root to nodes X and Y.
Compare the paths to find the last common node, which is the LCA.
Handle cases where one node is an ancestor of the other or when one node is the LCA itself.
You are given a string of length N
. Your task is to reverse the string word by word. The input may contain multiple spaces between words and may have leading o...
Reverse words in a string while handling leading/trailing spaces and multiple spaces between words.
Split the input string by spaces to get individual words
Reverse the list of words
Join the reversed words with a single space in between
Handle leading/trailing spaces by stripping them before and after reversing
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions based on DSA
Given 'N' subjects, each containing a certain number of problems, and 'K' friends, assign subjects to friends such that each subject goes to exactly one friend, maintain...
Assign subjects to friends to minimize maximum workload, find minimum time for most loaded friend.
Sort subjects in descending order
Assign subjects to friends one by one until all subjects are assigned
The maximum workload will be the sum of problems assigned to the friend with the most problems
Return the maximum workload as the minimum time required
Grammar in compiler design defines the syntax and structure of a programming language.
Grammar specifies the rules for forming valid statements in a programming language.
It consists of a set of production rules that define how valid programs can be constructed.
There are different types of grammars such as context-free grammar, regular grammar, etc.
Example: In C programming language, the grammar specifies that a for loop...
A token in compiler design is a basic unit of syntax that the compiler can understand and process.
Tokens are the smallest units of a program that are meaningful to the compiler.
Examples of tokens include keywords, identifiers, operators, and punctuation symbols.
Tokens are generated by the lexical analysis phase of the compiler.
Tokens are used by the parser to build the abstract syntax tree of the program.
Round duration - 60 minutes
Round difficulty - Easy
Technical round with questions on DSA and Compiler Design mainly. He told me that you’ll be having your final HR round in some time. I knew that I was going well because he seemed to be quite satisfied with my answers.
You are given an arbitrary binary tree consisting of N nodes, each associated with an integer value from 1 to 9. Each root-to-leaf path can be considered a number formed by concat...
Find the total sum of all root to leaf paths in a binary tree formed by concatenating node values.
Traverse the binary tree from root to leaf nodes, keeping track of the current path sum
Add the current path sum to the total sum when reaching a leaf node
Use modulo (10^9 + 7) to handle large outputs
A regular language is a language that can be recognized by a finite automaton.
Regular languages can be described by regular expressions.
Regular languages are closed under union, concatenation, and Kleene star operations.
Examples of regular languages include the set of all strings over an alphabet that contain an even number of 'a's.
NP problems are decision problems that can be verified in polynomial time, while NP-Hard problems are at least as hard as the hardest problems in NP.
NP problems can be verified in polynomial time but not necessarily solved in polynomial time.
NP-Hard problems are at least as hard as the hardest problems in NP, but may not be in NP themselves.
Examples of NP problems include the subset sum problem and the traveling salesm...
Round duration - 30 minutes
Round difficulty - Easy
That was the round for which I’ve been waiting for hours
She was very friendly and nice to talk to. It didn’t seem that I was talking to the HR. It was more like talking to a friend. Finally we discussed about the pay-scale and work culture in Accolite.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I applied via Referral and was interviewed before Jun 2021. There were 4 interview rounds.
I applied via Company Website and was interviewed in Jun 2021. There was 1 interview round.
I applied via Approached by Company and was interviewed before Sep 2023. There was 1 interview round.
Dependency injection is a design pattern where dependencies are injected into a class rather than created within the class itself.
Dependency injection helps in achieving loose coupling between classes.
It allows for easier testing and maintenance of code.
Example: Constructor injection, setter injection, and interface injection are common types of dependency injection.
Indexes in SQL are used to improve the performance of...
I applied via Approached by Company and was interviewed in Aug 2023. There were 3 interview rounds.
Deeply concept of PHP working
I applied via Approached by Company and was interviewed in Oct 2023. There were 2 interview rounds.
Abstract class is used when there is a need for default implementation, while interfaces are used for multiple inheritance.
Abstract classes can have both abstract and non-abstract methods, while interfaces can only have abstract methods.
Abstract classes can provide default implementations for methods, while interfaces cannot.
Interfaces allow a class to implement multiple interfaces, but can only inherit from one abstra...
NET core is a cross-platform, open-source framework for building modern, cloud-based, internet-connected applications. NET framework is a Windows-only framework for building Windows desktop applications. NET is a general term encompassing both .NET core and .NET framework.
NET core is cross-platform and open-source, while .NET framework is Windows-only.
.NET core is modular and lightweight, allowing for faster performanc...
Pipelines and Middlewares in .NET are used for request processing and can be configured using middleware components.
Pipelines in .NET are used to define a series of middleware components that process an HTTP request.
Middlewares are components that can handle requests and responses in the pipeline.
To configure pipelines and middlewares in .NET, you can use the 'UseMiddleware' method in the 'Configure' method of the Star...
App.Use() is used for adding middleware to the request pipeline, while App.Run() is used for handling the request directly.
App.Use() is used to add middleware components to the request pipeline.
App.Run() is used to handle the request directly without passing it to the next middleware component.
App.Use() is typically used for setting up middleware like authentication, logging, etc.
App.Run() is used for handling the fina...
String is immutable, while StringBuilder is mutable. StringBuilder is faster and more memory efficient for string manipulation.
String is immutable, meaning once created, it cannot be changed. StringBuilder is mutable, allowing for efficient string manipulation.
StringBuilder is faster than String for concatenating multiple strings, as it does not create a new string object each time.
String uses more memory as it creates...
Unique, Primary Key, Clustered, and Non-Clustered Indices are all used in database management to enforce data integrity and improve query performance.
Unique constraint ensures that all values in a column are unique, but allows NULL values.
Primary Key constraint ensures that all values in a column are unique and not NULL. Each table can have only one Primary Key.
Clustered Index physically reorders the way records in the...
JWT authentication and OAuth example for API
Implement JWT authentication by generating a token upon user login and including it in the Authorization header of API requests
Use OAuth for user authorization by obtaining access tokens from a third-party provider like Google or Facebook
Ensure API endpoints validate JWT tokens and OAuth access tokens before allowing access to resources
Both $.post and $.ajax are methods in jQuery used for making AJAX requests, but $.ajax is more versatile and customizable.
Both $.post and $.ajax are used for making AJAX requests in jQuery.
$.post is a shorthand method for $.ajax with predefined settings for POST requests.
$.ajax is more versatile and customizable, allowing for different types of requests and more options.
Example: $.post('example.php', {data: 'example'},...
based on 1 interview
Interview experience
Relationship Manager
117
salaries
| ₹1.5 L/yr - ₹4.4 L/yr |
Senior Associate
90
salaries
| ₹2 L/yr - ₹8.8 L/yr |
Technical Associate
80
salaries
| ₹2.5 L/yr - ₹5.5 L/yr |
Consultant
39
salaries
| ₹4.8 L/yr - ₹13.9 L/yr |
Process Associate
38
salaries
| ₹1.8 L/yr - ₹4.1 L/yr |
ITC Infotech
CMS IT Services
KocharTech
Xoriant