Filter interviews by
Maths , coding , relational questions, technical questions
My hobbies include playing the guitar, hiking, and reading mystery novels.
Playing the guitar
Hiking
Reading mystery novels
I applied via Campus Placement and was interviewed before Oct 2023. There were 3 interview rounds.
I dont remember actually it was 5 years ago, but it was normal aptitude test
Code to find prime numbers and optimize it efficiently
Use the Sieve of Eratosthenes algorithm for efficient prime number generation
Avoid checking even numbers after 2 as they cannot be prime
Limit the search space by only checking up to the square root of the number
We see ourselves growing and developing in our chosen field, taking on new challenges and responsibilities.
Continuously learning and improving our skills
Seeking opportunities for advancement and career growth
Setting goals and working towards achieving them
Networking and building professional relationships
Remaining adaptable and open to new experiences
I applied via Recruitment Consultant and was interviewed before Nov 2019. There were 4 interview rounds.
A queue can be implemented using two stacks.
Push elements onto the first stack.
When dequeuing, pop all elements from the first stack and push onto the second stack.
Pop the top element from the second stack to dequeue.
If the second stack is empty, pop all elements from the first stack and push onto the second stack.
Top trending discussions
I appeared for an interview in Mar 2017.
I am a highly motivated individual with a passion for learning and a strong work ethic.
I have a Bachelor's degree in Computer Science
I have completed several internships in software development
I am proficient in Java, Python, and C++
I am a quick learner and enjoy taking on new challenges
I intend to gain practical experience in my field of study and contribute to the company's success.
Learn about the company's operations and culture
Assist with projects and tasks assigned by my supervisor
Collaborate with team members and offer innovative ideas
Improve my skills and knowledge in my field of study
My strengths include adaptability, problem-solving, and communication.
Adaptability: I am able to quickly adjust to new situations and environments.
Problem-solving: I enjoy finding creative solutions to complex problems.
Communication: I am able to effectively convey ideas and information to others.
I plan to continue learning and growing in my field while also exploring new opportunities for personal and professional development.
Pursue advanced education or certifications
Seek out mentorship and networking opportunities
Explore different industries and roles to broaden my skillset
Set specific goals and regularly evaluate progress
Remain adaptable and open to new challenges
I applied via Company Website and was interviewed in Aug 2021. There was 1 interview round.
posted on 8 Jun 2023
I applied via Job Portal
Discussion about information security fundamentals and CIA traid
I applied via Company Website and was interviewed before Nov 2022. There were 3 interview rounds.
Easy to medium leetcode
I have worked on various projects during my internship.
Developed a web application for tracking inventory using HTML, CSS, and JavaScript.
Assisted in the development of a mobile app for scheduling appointments using React Native.
Contributed to a data analysis project by cleaning and analyzing large datasets using Python and SQL.
Collaborated with a team to create a machine learning model for predicting customer churn us
posted on 18 Aug 2023
I applied via Campus Placement and was interviewed before Aug 2022. There were 4 interview rounds.
Basic and medium problems
An array is a data structure that stores a collection of elements of the same type in a contiguous memory location.
Arrays have a fixed size determined at the time of declaration.
Elements in an array are accessed using an index starting from 0.
Example: string[] names = {"Alice", "Bob", "Charlie"};
I applied via Campus Placement and was interviewed in Aug 2020. There was 1 interview round.
Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.
Three way handshake involves three steps: SYN, SYN-ACK, and ACK.
The client sends a SYN packet to the server to initiate the connection.
The server responds with a SYN-ACK packet, acknowledging the client's request.
Finally, the client sends an ACK packet to the server, confirming the connection establishme...
SSL and TLS are both cryptographic protocols used to secure internet communications.
SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.
TLS stands for Transport Layer Security and is the successor to SSL.
TLS is more secure than SSL and offers better encryption algorithms.
TLS also supports newer protocols and ciphers, while SSL does not.
SSL is vulnerable to attacks such as ...
Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.
Switches work on layer 2 of the OSI model and routers work on layer 3.
Switches are used to connect devices within a network and forward data based on MAC addresses.
Types of switches include unmanaged, managed, and layer 3 switches.
Routers are used to connect different networks and forward data based ...
CIA Triad ensures data security. DOS attack can cause loss of availability.
CIA Triad stands for Confidentiality, Integrity, and Availability.
It ensures data security by protecting against unauthorized access, alteration, and destruction.
DOS attack can cause loss of availability by overwhelming a system with traffic or requests.
This can result in the system becoming unresponsive or crashing, making the data unavailable...
Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.
SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.
UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.
ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.
Other types of packet...
Cryptography is the practice of secure communication in the presence of third parties.
Symmetric-key cryptography
Asymmetric-key cryptography
Hash functions
Encryption algorithms
Digital signatures
MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.
MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.
MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.
SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384,...
To reverse a linked list, traverse it and change the pointers. To reverse a binary tree, swap left and right child nodes recursively.
For reversing a linked list, traverse the list and change the pointers to point to the previous node instead of the next node.
For reversing a binary tree, swap the left and right child nodes of each node recursively starting from the root node.
Both operations can be done in O(n) time comp...
Merge short is better than other shorting techniques due to its ability to minimize risk and maximize profits.
Merge short involves combining multiple short positions into one, reducing the risk of individual short positions
It allows for greater flexibility in managing short positions and can lead to higher profits
For example, if an investor wants to short a stock but is unsure of the timing, they can use merge short to...
based on 2 interviews
Interview experience
based on 5 reviews
Rating in categories
Senior Associate
788
salaries
| ₹4.3 L/yr - ₹16.5 L/yr |
Assistant Manager
423
salaries
| ₹5.9 L/yr - ₹23.5 L/yr |
Senior Software Engineer
381
salaries
| ₹7.2 L/yr - ₹25.5 L/yr |
Technical Lead
288
salaries
| ₹10 L/yr - ₹33 L/yr |
Associate
251
salaries
| ₹1.9 L/yr - ₹9 L/yr |
DXC Technology
Sutherland Global Services
Optum Global Solutions
FIS