i
Cadillacs
Filter interviews by
Be the first one to contribute and help others!
I applied via Company Website and was interviewed in Oct 2024. There were 3 interview rounds.
I applied via Referral and was interviewed in Jul 2024. There were 3 interview rounds.
I applied via LinkedIn and was interviewed in Dec 2024. There were 2 interview rounds.
Consisted of HTML , Javascript, React coding questions
2 DSA Questions, medium level
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
There are three main types of IoT devices: consumer, commercial, and industrial.
Consumer IoT devices: Smart home devices like thermostats, lights, and security cameras.
Commercial IoT devices: Smart meters, asset tracking systems, and connected vending machines.
Industrial IoT devices: Sensors and actuators used in manufacturing, agriculture, and healthcare.
I applied via LinkedIn and was interviewed in Mar 2024. There were 3 interview rounds.
Assignment was to create an API for an expenses sharing application where users can input the total amount and the people to be shared the amount with and each individual amount in terms of either actual amount, percentage or split equally
Processes are independent instances of a program, while threads are smaller units within a process sharing resources.
Processes have their own memory space, while threads share the same memory space within a process.
Processes are heavyweight, requiring more resources, while threads are lightweight.
Processes communicate with each other through inter-process communication mechanisms, while threads can communicate directly...
Indexing in DBMS is a technique used to improve the performance of queries by allowing faster retrieval of data.
Indexes are data structures that store a small portion of the table data in an optimized format for quick retrieval.
They help in speeding up data retrieval operations like SELECT, UPDATE, DELETE queries.
Examples of indexes include primary keys, unique keys, and composite keys.
Asymmetric encryption algorithms use a pair of keys to encrypt and decrypt data, providing secure communication.
RSA (Rivest-Shamir-Adleman) is a popular asymmetric encryption algorithm.
Elliptic Curve Cryptography (ECC) is another commonly used asymmetric encryption algorithm.
Asymmetric encryption is slower than symmetric encryption but provides better security.
Public key is used for encryption and private key is used f
Different sorting methods are beneficial in different scenarios based on factors like time complexity, space complexity, and input size.
Quick Sort: Best for large datasets due to its average time complexity of O(n log n)
Bubble Sort: Simple and easy to implement, but inefficient for large datasets with its time complexity of O(n^2)
Merge Sort: Stable and efficient for large datasets with its time complexity of O(n log n)
...
ACID properties are a set of properties that guarantee reliability and consistency in database transactions.
Atomicity: Ensures that either all operations in a transaction are completed successfully or none at all.
Consistency: Ensures that the database remains in a consistent state before and after the transaction.
Isolation: Ensures that the execution of multiple transactions concurrently does not interfere with each ot...
Indexing typically uses data structures like B-trees or hash tables for efficient retrieval, with time complexity of O(log n) or O(1) respectively.
Common data structures for indexing include B-trees and hash tables
B-trees are typically used for indexing in databases due to their balanced nature and efficient search operations
Hash tables are used for indexing in scenarios where constant time lookup is desired, but may h
Time complexity of recursive fibonacci code is O(2^n)
The time complexity of a recursive fibonacci code is exponential, O(2^n)
This is because each call branches into two recursive calls, leading to exponential growth
For example, calculating fibonacci(5) would result in 15 function calls
Web Sockets is a communication protocol that provides full-duplex communication channels over a single TCP connection.
Web Sockets allow for real-time, bi-directional communication between a client and a server.
They are commonly used in chat applications, online gaming, and live data streaming.
Web Sockets use the ws:// or wss:// protocol scheme in URLs.
The protocol is initiated with a handshake between the client and se...
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
I applied via Company Website and was interviewed in Jul 2024. There was 1 interview round.
I applied via Recruitment Consulltant and was interviewed in Aug 2024. There were 2 interview rounds.
Weather dashboard app
Js coding test on array and loops
MathCo
Zeta
Sequretek It Solutions
BIZONGO