i
Blue Yonder
Filter interviews by
Clear (1)
I was interviewed in Sep 2024.
Top trending discussions
I was interviewed before Dec 2020.
Round duration - 60 minutes
Round difficulty - Easy
This was a technical round. The interviewer asked me some programming based questions and some questions on database management systems.
Given an array ARR
of size N
, your objective is to determine the sum of the largest and smallest elements within the array.
Can you achie...
Find the sum of the largest and smallest elements in an array with the least number of comparisons.
Iterate through the array to find the maximum and minimum elements.
Keep track of the maximum and minimum elements as you iterate.
After iterating, sum up the maximum and minimum elements.
To achieve the task with the least number of comparisons, compare elements in pairs.
Construct a binary tree from a given array called parent
where the parent-child relationship is determined by (PARENT[i], i), indicating that the parent of node ...
Construct a binary tree from a given parent array and perform level-order traversal.
Iterate through the parent array to create the binary tree using a queue data structure.
Keep track of the parent-child relationships and construct the tree accordingly.
Perform level-order traversal to print the nodes in the correct order.
Yes, a unique key can also be a primary key.
A primary key must be unique, but a unique key does not necessarily have to be the primary key.
A table can have multiple unique keys, but only one primary key.
Example: In a table of employees, the employee ID can be a unique key and also the primary key.
Normalized form is better for database design for data integrity and flexibility.
Normalized form reduces data redundancy and improves data integrity.
Normalized form allows for easier data updates and maintenance.
Denormalized form may be more efficient for read-heavy applications with complex queries.
Consider denormalization for performance optimization after thorough analysis.
Example: Normalized form for a customer and...
Round duration - 60 minutes
Round difficulty - Medium
The interviewer had good work experience. She was polite and calm. After brief introduction she straight jumped into my current projects and she covered my entire CV.
Round duration - 45 minutes
Round difficulty - Easy
This was a technical round involving questions on OOPS concepts and puzzles.
There are 204 squares on a chessboard.
The chessboard has 64 squares in total.
Each square can be divided into smaller squares, such as 1x1, 2x2, 3x3, etc.
The total number of squares can be calculated by adding the squares of all sizes together.
C++ is a high-level programming language known for its efficiency, flexibility, and performance.
C++ is an object-oriented language with features like classes, inheritance, and polymorphism.
It allows low-level memory manipulation through pointers.
C++ is used in developing system software, game engines, and high-performance applications.
Deep copy creates a new copy of an object with all nested objects also copied, while shallow copy creates a new copy of an object with references to nested objects.
Deep copy creates a new object and recursively copies all nested objects, resulting in a completely independent copy.
Shallow copy creates a new object but only copies references to nested objects, so changes in nested objects will reflect in both the origina...
Template classes are classes that can work with any data type. Assignment operator can be overloaded to behave differently for different data types.
Template classes allow for writing generic classes that can work with any data type.
Overloading the assignment operator allows for custom behavior based on the data type.
Example: template <class T> class MyClass { T data; public: MyClass& operator=(const T& ot...
Round duration - 30 minutes
Round difficulty - Easy
This was a 30 minute HR round. The interviewer asked me a number of questions to know more about me.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I applied via Walk-in and was interviewed before Feb 2021. There were 2 interview rounds.
Be good on basics of coding
posted on 24 Sep 2022
I applied via Naukri.com and was interviewed in Aug 2022. There were 3 interview rounds.
MCQs and coding problems
duration - 1Hr 30min
The object must implement the hashCode() and equals() methods to be used as a key in a hashmap.
hashCode() method is used to generate a unique hash code for the object.
equals() method is used to compare two objects for equality.
Both methods are necessary for proper functioning of hashmap operations like put() and get().
Use stringBuilder for toString() method as it is faster and not thread-safe.
stringBuilder is faster than stringBuffer as it is not thread-safe
toString() method is used for converting an object to a string
If thread-safety is required, use stringBuffer instead
Example: StringBuilder sb = new StringBuilder(); sb.append("Hello"); sb.append("World"); return sb.toString();
Yes, it is a good idea to wrap FileInputStream and FileOutputStream in buffered writers and readers.
Buffered streams improve performance by reducing the number of I/O operations
Buffered streams also provide additional functionality like readLine() and newLine()
Buffered streams can be chained together for even better performance
Example: BufferedReader br = new BufferedReader(new FileReader(file));
posted on 8 Jan 2025
I applied via Job Fair and was interviewed before Mar 2022. There were 11 interview rounds.
Screening of profile based on prior experience
Develop the process for cyberdefense
Group discussion with Manager and VP
Explain the profile and develop the cases that you have proposed for clearing this interview
Discussion on assignments that has been solved till now
I applied via Company Website and was interviewed in Oct 2023. There was 1 interview round.
I applied via LinkedIn and was interviewed in Aug 2022. There were 4 interview rounds.
CLR is the runtime environment for .NET applications that manages memory, security, and execution of code.
CLR stands for Common Language Runtime
It compiles code into an intermediate language (IL) that can run on any platform with CLR installed
CLR manages memory through garbage collection
It provides security through code access security (CAS)
CLR also includes just-in-time (JIT) compilation for improved performance
SOLID is a set of principles for object-oriented programming that aims to make software more maintainable, scalable, and robust.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Subtypes should be substitutable for their base types.
I - Interface Segreg...
Design pattern is a reusable solution to a commonly occurring problem in software design.
Design patterns provide a common language for developers to communicate solutions.
They help in creating flexible, maintainable, and scalable software.
Examples include Singleton, Factory, Observer, and MVC pattern.
Design patterns are categorized into three types: Creational, Structural, and Behavioral.
Program to check if a given string is a palindrome
Convert the string to lowercase to ignore case sensitivity
Remove all non-alphanumeric characters from the string
Reverse the string and compare it with the original string
If they are the same, then the string is a palindrome
Function overloading is having multiple functions with the same name but different parameters. Function overriding is having a function in a subclass with the same name and parameters as a function in the superclass.
Function overloading is used to provide different ways to call a function with different parameters.
Function overriding is used to provide a specific implementation of a function in a subclass that is diffe...
Ref and out are both used to pass arguments by reference in C#. Ref is bidirectional while out is unidirectional.
Ref and out are used to pass arguments by reference instead of by value
Ref is used for both input and output parameters while out is only used for output parameters
Ref requires the variable to be initialized before passing while out does not
Example: void MyMethod(ref int x) { x = x + 1; }
Example: void MyMeth
Jagged array is an array of arrays where each array can have different lengths.
Each array can have different number of elements
Can be used to represent tables with varying number of columns
Example: string[][] jaggedArray = new string[3][];
IIS is a web server that handles HTTP requests and responses.
IIS stands for Internet Information Services.
It is a component of Windows Server.
It listens for incoming HTTP requests on a specified port.
It processes the request and sends back a response.
It can host multiple websites on a single server.
It supports various protocols like HTTP, HTTPS, FTP, SMTP, etc.
It can be configured using the IIS Manager tool.
It can also
I applied via Naukri.com and was interviewed before Mar 2022. There were 6 interview rounds.
To determine if a point is inside a polygon, use the ray casting algorithm.
Create a line from the point to a point outside the polygon
Count the number of times the line intersects with the polygon edges
If the count is odd, the point is inside the polygon; otherwise, it is outside
The four storage classes in C are auto, register, static, and extern.
Auto: default storage class for all local variables
Register: used to define local variables that should be stored in a register instead of RAM
Static: used to define local variables that retain their value between function calls
Extern: used to declare a global variable that is defined in another file
i is stored in global data segment, j is stored in stack, k is stored in heap.
i is a global variable and is stored in the global data segment
j is a local variable and is stored in the stack
k is a pointer variable and is stored in the stack, while the memory it points to is allocated on the heap using malloc()
Use a hash table to store the words and check for existence in constant time.
Create a hash table with the words as keys and a boolean value as the value.
For each new word, check if it exists in the hash table. If it does, it has appeared before. If not, add it to the hash table.
Alternatively, use a set data structure to store only the unique words and check for existence in the set.
based on 1 interview
Interview experience
Senior Software Engineer
366
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Consultant
262
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
238
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Technical Consultant
191
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Business Consultant
180
salaries
| ₹0 L/yr - ₹0 L/yr |
SAP
Manhattan Associates
Oracle
Infor Global Solution