Filter interviews by
Be the first one to contribute and help others!
I applied via Campus Placement
Regex for email validation
Start with a string of characters followed by @ symbol
Followed by a string of characters and a period
End with a string of characters with a length of 2-6 characters
Allow for optional subdomains separated by periods
Disallow special characters except for . and _ in username
Print prime numbers in a given range and optimize the solution.
Use Sieve of Eratosthenes algorithm to generate prime numbers efficiently
Start with a boolean array of size n+1, mark all as true
Loop through the array and mark all multiples of each prime as false
Print all the indexes that are still marked as true
Find angle between hour and minute hand in a clock given the time.
Calculate the angle made by the hour hand with respect to 12 o'clock position
Calculate the angle made by the minute hand with respect to 12 o'clock position
Find the difference between the two angles and take the absolute value
If the angle is greater than 180 degrees, subtract it from 360 degrees to get the smaller angle
To un-hash a string, use a reverse algorithm to convert the hash back to the original string.
Create a reverse algorithm that takes the hash as input and outputs the original string
Use the same logic as the hash function but in reverse order
If the hash function used a specific algorithm, use the inverse of that algorithm to un-hash the string
I am impressed with the company's reputation and growth potential, and I believe my skills and experience align well with the job requirements.
I have researched the company and am impressed with its reputation and growth potential
I believe my skills and experience align well with the job requirements
I am excited about the opportunity to work with a talented team and contribute to the company's success
I have the necessary skills, experience, and passion to excel in this role.
I have a proven track record of success in similar roles.
I am a quick learner and adaptable to new situations.
I am passionate about this industry and eager to contribute to its growth.
I have excellent communication and teamwork skills.
I am committed to delivering high-quality work and exceeding expectations.
I would prioritize completing my current assignment and then discuss the transfer with my supervisor to ensure a smooth transition.
I would communicate with my supervisor to understand the urgency of the transfer
I would prioritize completing my current assignment to the best of my ability
I would discuss the transfer with my supervisor to ensure a smooth transition
I would try to complete as much work as possible before l...
A batsman can score a maximum of 264 runs in an ODI.
The maximum number of runs a batsman can score in an ODI is limited by the number of balls bowled and the number of boundaries hit.
The maximum number of balls bowled in an ODI is 300, assuming no extras are bowled.
If a batsman hits a boundary off every ball they face, they can score a maximum of 240 runs.
If a batsman hits sixes off every ball they face, they can score...
Solving two jug problems to obtain a specified amount of water using differently sized jugs.
Understand the capacity of each jug
Determine the amount of water needed
Fill one jug with water and pour it into the other jug
Repeat until the desired amount is reached
Use the remaining water in the larger jug to measure the remaining amount needed
Consider the possibility of multiple solutions
I was interviewed before Feb 2021.
Round duration - 90 minutes
Round difficulty - Medium
Questions on aptitude, English, logical reasoning, C/C++ and 5 coding ques. (only pseudo code).
Bob and his wife are in the famous 'Arcade' mall in the city of Berland. This mall has a unique way of moving between shops using trampolines. Each shop is laid out in a st...
Find the minimum number of trampoline jumps Bob needs to make to reach the final shop, or return -1 if it's impossible.
Use Breadth First Search (BFS) algorithm to find the minimum number of jumps required.
Keep track of the visited shops to avoid revisiting them.
If a shop has an Arr value of 0, it is impossible to reach the final shop.
Return -1 if the final shop cannot be reached.
Given two strings, S
and X
, your task is to find the smallest substring in S
that contains all the characters present in X
.
S = "abdd", X = "bd"
Find the smallest substring in S that contains all characters in X.
Use a sliding window approach to find the smallest window in S containing all characters of X.
Maintain a hashmap to keep track of characters in X and their frequencies in the current window.
Slide the window to the right, updating the hashmap and shrinking the window until all characters in X are present.
Return the smallest window found.
Example: S = 'abd
You need to determine all possible paths for a rat starting at position (0, 0) in a square maze to reach its destination at (N-1, N-1). The maze is represented as an N*N ma...
Find all possible paths for a rat in a maze from start to destination.
Use backtracking to explore all possible paths in the maze.
Keep track of visited cells to avoid revisiting them.
Return paths in alphabetical order as a list of strings.
Round duration - 60 minutes
Round difficulty - Easy
Questions based on OOPS were asked in this round.
A virtual function is a function in a base class that is declared using the keyword 'virtual' and can be overridden by a function with the same signature in a derived class.
Virtual functions allow for dynamic polymorphism in C++
They are used in inheritance to achieve runtime polymorphism
Virtual functions are declared in a base class and can be overridden in derived classes
They are called based on the type of object bei...
Types of polymorphism in OOP include compile-time (method overloading) and runtime (method overriding) polymorphism.
Compile-time polymorphism is achieved through method overloading, where multiple methods have the same name but different parameters.
Runtime polymorphism is achieved through method overriding, where a subclass provides a specific implementation of a method that is already defined in its superclass.
Polymor...
Deep copy creates a new object and recursively copies all nested objects, while shallow copy creates a new object and copies only the references to nested objects.
Deep copy creates a new object and copies all nested objects, while shallow copy creates a new object and copies only the references to nested objects.
In deep copy, changes made to the original object do not affect the copied object, while in shallow copy, ch...
Round duration - 30 minutes
Round difficulty - Easy
HR round with typical behavioral problems.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I got to participate in a robotics competition at IIT
Designed and built a robot from scratch
Programmed the robot to complete tasks autonomously
Competed against other teams from different colleges
Learned valuable skills in engineering and teamwork
I chose IIT for its reputation and opportunities. No regrets. The environment is competitive and challenging.
IIT has a strong reputation for producing successful graduates
I was attracted to the opportunities for research and innovation
The academic environment is highly competitive and challenging
I have no regrets about my decision to attend IIT
A portfolio is a collection of investments. Risk can be measured through standard deviation, beta, or value at risk.
A portfolio is a combination of different investments such as stocks, bonds, and mutual funds.
The purpose of a portfolio is to diversify investments and reduce risk.
Risk can be measured through standard deviation, which measures the volatility of returns.
Beta measures the sensitivity of a portfolio to mar...
Beta is a measure of a stock's volatility. Value at risk is a statistical measure of potential losses. Formula for beta is Covariance(Stock, Market) / Variance(Market).
Beta measures a stock's sensitivity to market movements.
Value at risk is the maximum potential loss that an investment portfolio may suffer within a given time frame.
Beta formula is calculated by dividing the covariance of the stock and market returns by...
Covariance measures the relationship between two variables. It measures sensitivity by indicating the direction of the relationship.
Covariance is a statistical measure that shows how two variables are related to each other.
It measures the direction of the relationship between two variables.
A positive covariance indicates that the two variables move in the same direction.
A negative covariance indicates that the two vari...
WACC is the weighted average cost of capital. To value a company, one can use various methods such as DCF, comparables, or precedent transactions. A method to decide on project undertaking is NPV analysis.
WACC is the average cost of all the capital a company has raised
To value a company, one can use DCF, comparables, or precedent transactions
DCF involves projecting future cash flows and discounting them back to present...
Find pair of elements in an array whose sum is equal to a given number K.
Iterate through the array and for each element, check if K minus the element exists in the array.
Use a hash table to store the elements and their indices for faster lookup.
If multiple pairs exist, return any one of them.
If no pair exists, return null or an appropriate message.
Session is maintained using session affinity or sticky sessions.
Session affinity ensures that a user's session is always directed to the same server.
Load balancer uses a unique identifier to route requests to the same server.
Sticky sessions can be implemented using cookies or URL rewriting.
Session replication can also be used to maintain session data across multiple servers.
Singleton pattern ensures only one instance of a class is created and provides a global point of access to it.
Create a private constructor to prevent direct instantiation of the class
Create a private static instance of the class
Create a public static method to access the instance
Ensure thread safety by using synchronized keyword or static initialization block
Examples: Logger, Configuration Manager, Database Connection
Explaining abstract class, interface and multiple inheritance in PHP.
Abstract class is a class that cannot be instantiated and can have abstract methods.
Interface is a collection of abstract methods and constants that can be implemented by a class.
Multiple inheritance is not possible in PHP, but can be achieved using interfaces.
Interfaces can be implemented by multiple classes, allowing for multiple inheritance-like be
Write a stored procedure from given tables and conditions
Identify the tables and their relationships
Determine the conditions to be used in the stored procedure
Write the SQL code for the stored procedure
Test the stored procedure to ensure it returns the desired results
To increase PHP memory at run time, modify the php.ini file or use ini_set() function.
Edit the memory_limit value in php.ini file
Use ini_set('memory_limit', '256M') function to increase memory limit at run time
Check for memory leaks in the code
Use unset() function to free up memory after use
php.ini is a configuration file for PHP that allows users to customize various settings.
Change PHP settings such as memory limit, file upload size, and error reporting
Enable or disable extensions and modules
Set timezone and language settings
Configure email settings
Control caching and session settings
Use window.location to get domain from a url in jQuery.
Use window.location to get the full url
Use .hostname to get the domain name
Use .replace() to remove 'www.' if present
WAP to find smallest palindrome number larger than given number.
Convert the given number to string and check if it is already a palindrome.
If not, increment the number and check if it is a palindrome.
Repeat until a palindrome number larger than the given number is found.
Use a while loop to implement the above steps.
WAP to check if linked list elements is a palindrome without using any extra space.
Traverse the linked list and reverse the second half of the list
Compare the first half with the reversed second half
Use two pointers to traverse the list, one at normal speed and other at double speed
Find the first non-repeating character in a string.
Create a hash table to store the frequency of each character in the string.
Iterate through the string and check the frequency of each character.
Return the first character with a frequency of 1.
Connection pooling is a technique of reusing database connections to improve performance.
Connection pooling helps to reduce the overhead of creating and destroying database connections.
It maintains a pool of connections that can be reused by multiple clients.
Connection pooling is commonly used in web applications to handle multiple requests simultaneously.
It can be configured with parameters like maximum number of conn...
A singleton class in PHP is a class that can only be instantiated once.
Create a private constructor to prevent direct instantiation
Create a private static variable to hold the instance of the class
Create a public static method to get the instance of the class
Ensure that the public static method always returns the same instance
To connect to MySQL database using PHP, create a Connection class.
Use mysqli_connect() function to establish a connection
Pass the database credentials as parameters to the function
Create a constructor method to initialize the connection
Create a query method to execute SQL queries
Close the connection using mysqli_close() method
There are three types of errors in PHP: syntax errors, runtime errors, and logical errors.
Syntax errors occur when the code is not written correctly, such as missing semicolons or parentheses.
Runtime errors occur during the execution of the code, such as trying to access an undefined variable.
Logical errors occur when the code runs without errors, but produces unexpected results, such as a miscalculation in a formula.
Session in PHP allows to store user data on the server for later use.
Session starts when a user logs in and ends when the user logs out or the session expires.
Session data is stored on the server and identified by a unique session ID.
Session variables can be set and accessed using the $_SESSION superglobal array.
Session can be destroyed using the session_destroy() function.
Session can be used to store user-specific dat...
Find missing element in an array of elements from 0 to n-1
Calculate sum of all elements in array and subtract from sum of n natural numbers
Use XOR operation on all elements and n natural numbers
Sort the array and find the missing element
I was interviewed before Jan 2021.
Round duration - 60 minutes
Round difficulty - Easy
This was a written coding test with 2 coding questions to be solved in 60 minutes.
You have a sequence of consecutive nonnegative integers. By appending all integers end-to-end, you formed a string S
without any separators. During this pro...
Given a string of consecutive nonnegative integers with one missing number, find the missing integer.
Iterate through the string to find the missing number by checking the consecutive integers.
If there is more than one missing number, all integers are present, or the string is invalid, return -1.
Handle cases where the missing number is at the beginning or end of the sequence.
Consider edge cases such as single-digit numb
You are given a string consisting of English alphabet characters. Your task is to identify and return the first character in the string that does not repeat...
The task is to find the first non-repeating character in a string, or return the first character if all characters repeat.
Iterate through the string to count the frequency of each character
Find the first character with a frequency of 1, or return the first character if no such character exists
Handle both uppercase and lowercase characters separately
Use a hashmap to store character frequencies efficiently
Round duration - 60 minutes
Round difficulty - Medium
Technical interview round with questions around PHP and DBMS.
Connection pooling is a technique used to manage a pool of database connections to improve performance and efficiency.
Connection pooling reduces the overhead of opening and closing database connections for each request.
It allows multiple clients to reuse a pre-established set of connections to the database.
Connection pooling helps in improving the scalability and performance of applications by efficiently managing data...
To create a singleton design pattern in PHP 5, use a private static variable to store the instance and a static method to retrieve it.
Create a private static variable to store the instance of the class.
Create a private constructor to prevent outside instantiation of the class.
Create a static method to check if an instance already exists and return it, or create a new instance if it doesn't.
Yes, PHP can be used to connect to MySQL by using MySQLi or PDO extensions.
Use MySQLi extension to connect PHP to MySQL
Use PDO extension to connect PHP to MySQL
Example using MySQLi: $conn = new mysqli($servername, $username, $password, $dbname);
Example using PDO: $conn = new PDO('mysql:host=$servername;dbname=$dbname', $username, $password);
Different types of errors in PHP include syntax errors, runtime errors, and logical errors.
Syntax errors: Occur when there is a mistake in the code syntax, preventing the script from running.
Runtime errors: Happen during script execution, such as division by zero or calling a function that does not exist.
Logical errors: Difficult to detect as the code runs without errors, but produces incorrect results.
Fatal errors: St...
Session management in PHP involves storing user data on the server to maintain state between multiple requests.
Sessions are started using session_start() function in PHP.
Session data is stored on the server and a unique session ID is sent to the client's browser.
Session variables can be set, accessed, and unset using $_SESSION superglobal array.
Sessions can be destroyed using session_destroy() function.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I was interviewed before Jan 2021.
Round duration - 60 minutes
Round difficulty - Medium
Technical round where the interviewer asked me questions based on data structures , algorithms and load balancer and session management.
You are given an integer array 'ARR' of size 'N' and an integer 'S'. Your task is to find and return a list of all pairs of elements where each sum of a pair equals 'S'.
Find pairs of elements in an array that sum up to a given value, sorted in a specific order.
Iterate through the array and use a hashmap to store the difference between the target sum and each element.
Check if the difference exists in the hashmap, if so, add the pair to the result list.
Sort the result list based on the criteria mentioned in the problem statement.
Find the next smallest palindrome strictly greater than a given number 'N' represented as a string 'S'.
You are given a number in string format, a...
Find the next smallest palindrome greater than a given number represented as a string.
Convert the string number to an integer for comparison.
Increment the number until a palindrome greater than the input is found.
Handle cases where the input is already a palindrome or has leading zeros.
Return the next greater palindrome as a string.
Round duration - 60 minutes
Round difficulty - Medium
Technical round where the interviewer asked me questions based on data structures , design patterns and php.
Given a singly linked list of integers, determine if the linked list is a palindrome.
A linked list is considered a palindrome if it reads the same forwar...
Check if a given singly linked list of integers is a palindrome.
Create a function to reverse the linked list.
Use slow and fast pointers to find the middle of the linked list.
Compare the first half of the linked list with the reversed second half to determine if it's a palindrome.
Singleton Design pattern ensures a class has only one instance and provides a global point of access to it.
Ensure the class has a private static instance variable.
Provide a public static method to access the instance.
Make the constructor private to prevent instantiation from outside the class.
Lazy initialization can be used to create the instance only when needed.
Thread safety considerations may be necessary in a multi
Round duration - 60 minutes
Round difficulty - Medium
Technical round where the interviewer asked me questions based on Javascript, dbms, oops concepts and php.
A stored procedure to join two tables in a database.
Use the JOIN keyword to combine rows from two or more tables based on a related column between them.
Specify the columns to be selected from each table in the SELECT statement.
Use the ON keyword to specify the join condition.
Consider using INNER JOIN, LEFT JOIN, RIGHT JOIN, or FULL JOIN based on the desired result.
Test the stored procedure with sample data to ensure it
Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
Abstract class can have constructors, fields, and methods, while interface cannot have any implementation.
A class can only extend one abstract class, but can implement multiple interfaces.
Abstract classes are used to define common characteristics among subclasses, while interfaces are used to define a contract...
Use jQuery to extract domain name from a URL
Use the 'a' element to create a temporary link with the URL
Access the 'hostname' property of the link to get the domain name
Use regular expressions to extract the domain name from the URL
Closures in JavaScript are functions that have access to variables from their outer scope even after the outer function has finished executing.
Closures allow functions to access variables from their parent function even after the parent function has finished executing.
They are created whenever a function is defined within another function.
Closures are commonly used to create private variables and functions in JavaScrip...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
based on 9 reviews
Rating in categories
HR Executive
7
salaries
| ₹0 L/yr - ₹0 L/yr |
Operations Manager
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Data Entry Operator
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Calling Agent
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Office Assistant
4
salaries
| ₹0 L/yr - ₹0 L/yr |
JustDial
Indiamart Intermesh
Quikr
Urban Company