Filter interviews by
I applied via Referral and was interviewed before Sep 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Feb 2020. There were 4 interview rounds.
It was easy coding questions
Smart pointers are objects that store a pointer to dynamically allocated memory and provide automatic memory management.
Smart pointers help prevent memory leaks by automatically releasing memory when the pointer is no longer needed.
Examples include unique_ptr, shared_ptr, and weak_ptr in C++.
unique_ptr is used for exclusive ownership, shared_ptr for shared ownership, and weak_ptr to break circular references.
A lambda function is a small anonymous function defined in a single line of code without a name.
Lambda functions are often used in programming languages that support functional programming.
They are commonly used for short, simple operations that do not require a named function.
Lambda functions can take any number of arguments but can only have one expression.
Example: lambda x: x*2 defines a lambda function that doubles
Threading is a way for a program to split itself into multiple simultaneous tasks.
Threading allows for parallel execution of tasks within a program.
Each thread has its own stack and runs independently of other threads.
Threads can communicate with each other and share resources.
Example: A web server handling multiple client requests concurrently using threads.
Lambda function is an anonymous function in programming that can have multiple parameters and can be used as an argument to other functions.
Lambda functions are also known as anonymous functions because they do not have a name.
They are often used for short, one-time tasks that do not require a separate function definition.
Lambda functions can take multiple parameters and return a single value.
Example: lambda x, y: x + ...
posted on 18 Jul 2024
Byte padding is the process of adding extra bytes to a data structure to ensure it meets a certain size or alignment requirement.
Byte padding is commonly used in computer memory allocation to align data structures to memory boundaries.
Padding is necessary to ensure that data structures are properly aligned for efficient memory access.
For example, if a data structure requires alignment on a 4-byte boundary, padding may ...
I appeared for an interview before Aug 2023.
Detecting false targets involves analyzing patterns, behavior, and data to identify inconsistencies.
Analyze patterns and behavior of the target to look for inconsistencies
Use data validation techniques to verify the authenticity of the target
Implement anomaly detection algorithms to flag suspicious targets
Utilize machine learning models to predict and identify false targets
I am a highly experienced Senior Software Engineer with a strong background in developing innovative solutions.
Over 10 years of experience in software development
Expertise in Java, Python, and SQL
Proven track record of leading successful projects
Strong problem-solving and analytical skills
Excellent communication and teamwork abilities
I applied via Campus Placement and was interviewed in Oct 2024. There were 3 interview rounds.
Aptitude round consists of aptitudes and some pseudocode snippets to solve and it also had one medium level coding question and one hard level coding question.
Pattern pyramid number in Java
Use nested loops to print the pyramid pattern
Increment the number in each row
Handle spaces for proper alignment
A C program to find the factorial of a number using recursion
Use a recursive function to calculate the factorial
Handle the base case when the number is 0 or 1
Multiply the number with the factorial of (number-1) in each recursive call
Little endian and Big endian are byte ordering formats in which multi-byte data is stored in memory.
Little endian: Least significant byte is stored at the lowest memory address.
Big endian: Most significant byte is stored at the lowest memory address.
Example: In Little endian, the number 0x12345678 is stored as 78 56 34 12 in memory.
Example: In Big endian, the same number is stored as 12 34 56 78 in memory.
I use Docker for containerization to easily manage and deploy applications, and Git for version control to collaborate and track changes.
Docker allows for consistent development environments across different machines
Git helps track changes, collaborate with team members, and revert to previous versions if needed
Both tools improve efficiency and productivity in software development
The architecture diagram for a Machine Learning project typically includes data preprocessing, model training, evaluation, and deployment stages.
Data preprocessing stage involves cleaning, transforming, and preparing the data for model training.
Model training stage includes selecting the appropriate algorithm, training the model on the data, and tuning hyperparameters.
Evaluation stage involves assessing the model's per...
I come from a close-knit family of four, including my parents and younger sister.
My parents have always been supportive of my career choices and encouraged me to pursue my passion for software engineering.
My younger sister is currently studying computer science and we often collaborate on coding projects together.
Family gatherings are important to us and we enjoy spending quality time together, whether it's celebrating
based on 5 reviews
Rating in categories
Senior Engineer
873
salaries
| ₹5 L/yr - ₹18.1 L/yr |
Senior Software Engineer
820
salaries
| ₹6 L/yr - ₹24 L/yr |
Assistant Manager
674
salaries
| ₹5.4 L/yr - ₹19 L/yr |
Software Engineer
520
salaries
| ₹3.5 L/yr - ₹13.1 L/yr |
Deputy Manager
497
salaries
| ₹9 L/yr - ₹25.9 L/yr |
Yazaki
Faurecia
Valeo
Continental Automotive Components