i
Filter interviews by
I was interviewed before Mar 2024.
I applied via Company Website and was interviewed in Aug 2024. There was 1 interview round.
I applied via Referral and was interviewed in Oct 2024. There were 2 interview rounds.
Computer Networks, DBMS, OOPS, etc
I applied via Campus Placement and was interviewed in Jul 2024. There was 1 interview round.
The structure of a Java program includes classes, methods, variables, and packages.
Java program starts with a class definition, which includes methods and variables.
Methods contain the code that defines the behavior of the program.
Variables are used to store data within the program.
Packages are used to organize classes and provide a namespace for the program.
Example: public class HelloWorld { public static void main(St...
Garbage collector in Java manages memory by reclaiming unused objects, preventing memory leaks.
Automatically frees up memory by removing objects that are no longer in use
Prevents memory leaks by reclaiming memory from objects that are no longer referenced
Utilized in Java programming to improve memory management and prevent out-of-memory errors
I rate my proficiency in Java programming as advanced.
Advanced knowledge of object-oriented programming principles
Experience with Java frameworks like Spring and Hibernate
Ability to write efficient and scalable code
Familiarity with design patterns and best practices
Completed multiple Java projects successfully
A common model used in natural language processing is the Bag of Words model.
Bag of Words model represents text as a collection of words, ignoring grammar and word order.
It creates a vocabulary of unique words in the text and counts the frequency of each word.
This model is often used for tasks like sentiment analysis, document classification, and topic modeling.
Activation functions introduce non-linearity to neural networks, enabling them to learn complex patterns and relationships.
Activation functions help neural networks to learn complex patterns and relationships by introducing non-linearity.
They ensure that the output of each neuron is mapped to a specific range, allowing for better learning and generalization.
Common activation functions include ReLU, Sigmoid, Tanh, and S...
Centre for Development of Advanced Computing interview questions for popular designations
I applied via LinkedIn and was interviewed in Jul 2024. There were 2 interview rounds.
Mutex is used for exclusive access to a resource by a single thread, while semaphore is used for controlling access to a resource by multiple threads.
Mutex is binary in nature, allowing only one thread to access the resource at a time.
Semaphore can have a count greater than 1, allowing multiple threads to access the resource simultaneously.
Mutex is typically used for protecting critical sections of code.
Semaphore is of...
When volatile and const are used together, the variable is treated as read-only and its value can change unexpectedly.
The const keyword indicates that the variable's value cannot be changed by the program.
The volatile keyword tells the compiler that the variable's value may change at any time, even if it doesn't appear to be modified by the program.
When used together, the variable is treated as read-only by the program...
Brute force can be both good and bad depending on the context and application.
Brute force can be effective for small scale problems or when time is limited.
However, it is inefficient and impractical for large scale problems.
Brute force may also be necessary in certain scenarios where no other efficient solution exists.
For example, brute force can be used in password cracking when other methods fail.
Mutex is used for exclusive access to a resource by a single thread, while semaphore is used for controlling access to a resource by multiple threads.
Mutex is binary in nature, allowing only one thread to access the resource at a time.
Semaphore can have a count greater than 1, allowing multiple threads to access the resource simultaneously.
Mutex is used for protecting critical sections of code, while semaphore is used ...
When volatile and const are used together, the variable is treated as read-only and its value can change unexpectedly.
Using volatile and const together is rare but can be useful for memory-mapped hardware registers.
The volatile keyword tells the compiler that the variable can be changed unexpectedly, while const ensures the variable is read-only.
Example: const volatile int * const ptr = (int *)0x1234; // pointer to a r...
Get interview-ready with Top Centre for Development of Advanced Computing Interview Questions
I applied via AICTE and was interviewed in Sep 2024. There was 1 interview round.
DDOS attack is a malicious attempt to disrupt normal traffic of a targeted server or network by overwhelming it with a flood of internet traffic.
DDOS stands for Distributed Denial of Service attack.
Attackers use multiple compromised systems to flood the target with traffic.
Common types include UDP flood, SYN flood, and HTTP flood.
DDOS attacks can lead to service disruption, financial losses, and reputational damage.
Mit...
Google search works by crawling and indexing web pages, and then ranking them based on relevance and quality.
Google uses web crawlers to discover and index web pages.
The search algorithm ranks pages based on relevance to the search query.
Factors like keywords, backlinks, and user experience influence rankings.
Google constantly updates its algorithm to improve search results.
Google also considers user location and searc
I prioritize tasks, set boundaries, delegate when necessary, and make time for self-care.
Prioritize tasks based on deadlines and importance
Set boundaries by establishing work hours and sticking to them
Delegate tasks to team members when feeling overwhelmed
Make time for self-care activities such as exercise, hobbies, and relaxation
Avoid multitasking and focus on one task at a time
Yes, ISO 9000 is a set of international standards for quality management and quality assurance.
ISO 9000 is a series of standards developed by the International Organization for Standardization (ISO) that focus on quality management systems.
These standards provide guidance and tools for companies to ensure their products and services consistently meet customer requirements and regulatory standards.
ISO 9000 certification...
I was interviewed in Jan 2025.
Top trending discussions
The duration of Centre for Development of Advanced Computing interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 99 interviews
Interview experience
based on 896 reviews
Rating in categories
Project Engineer
2.9k
salaries
| ₹0 L/yr - ₹0 L/yr |
Project Associate
433
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
181
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Project Engineer
143
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
85
salaries
| ₹0 L/yr - ₹0 L/yr |
National Informatics Centre
TCS
Wipro
Infosys