i
Filter interviews by
I applied via LinkedIn and was interviewed in Jul 2024. There were 2 interview rounds.
Mutex is used for exclusive access to a resource by a single thread, while semaphore is used for controlling access to a resource by multiple threads.
Mutex is binary in nature, allowing only one thread to access the resource at a time.
Semaphore can have a count greater than 1, allowing multiple threads to access the resource simultaneously.
Mutex is typically used for protecting critical sections of code.
Semaphore is of...
When volatile and const are used together, the variable is treated as read-only and its value can change unexpectedly.
The const keyword indicates that the variable's value cannot be changed by the program.
The volatile keyword tells the compiler that the variable's value may change at any time, even if it doesn't appear to be modified by the program.
When used together, the variable is treated as read-only by the program...
Brute force can be both good and bad depending on the context and application.
Brute force can be effective for small scale problems or when time is limited.
However, it is inefficient and impractical for large scale problems.
Brute force may also be necessary in certain scenarios where no other efficient solution exists.
For example, brute force can be used in password cracking when other methods fail.
Mutex is used for exclusive access to a resource by a single thread, while semaphore is used for controlling access to a resource by multiple threads.
Mutex is binary in nature, allowing only one thread to access the resource at a time.
Semaphore can have a count greater than 1, allowing multiple threads to access the resource simultaneously.
Mutex is used for protecting critical sections of code, while semaphore is used ...
When volatile and const are used together, the variable is treated as read-only and its value can change unexpectedly.
Using volatile and const together is rare but can be useful for memory-mapped hardware registers.
The volatile keyword tells the compiler that the variable can be changed unexpectedly, while const ensures the variable is read-only.
Example: const volatile int * const ptr = (int *)0x1234; // pointer to a r...
Top trending discussions
posted on 19 Aug 2022
I applied via Referral and was interviewed before Aug 2021. There were 2 interview rounds.
I applied via Naukri.com and was interviewed before Mar 2020. There were 4 interview rounds.
Hashtable is synchronized while hashmap is not.
Hashtable is thread-safe while hashmap is not.
Hashtable does not allow null keys or values while hashmap allows one null key and multiple null values.
Hashtable is slower than hashmap due to synchronization.
Hashtable is a legacy class while hashmap is a newer implementation.
Hashmap is not thread-safe while Concurrent Hashmap is thread-safe.
Hashmap is not suitable for multi-threaded environments as it can lead to race conditions and data inconsistencies.
Concurrent Hashmap allows multiple threads to access and modify the map concurrently without any data inconsistencies.
Concurrent Hashmap uses a technique called lock striping to achieve thread-safety.
Concurrent Hashmap is slower than Hashma...
I appeared for an interview in Sep 2017.
I applied via Naukri.com and was interviewed before May 2018. There were 5 interview rounds.
I appeared for an interview in Sep 2019.
I applied via Recruitment Consultant and was interviewed before Jan 2020. There were 5 interview rounds.
I am proficient in Java, Python, and C++. I have 2 years of experience in software development. I have excellent communication skills for client interaction.
Proficient in Java, Python, and C++
2 years of software development experience
Excellent communication skills for client interaction
I applied via Walk-in and was interviewed before Jul 2021. There were 3 interview rounds.
Data structures and algorithms
Python etl,pandas, pyspark questions
I applied via first naukari and was interviewed before Oct 2020. There were 4 interview rounds.
To find the shortest path in a graph stored in SQL, use algorithms like Dijkstra's or A* with SQL queries for traversal.
Use Dijkstra's algorithm for weighted graphs to find the shortest path efficiently.
For unweighted graphs, consider using Breadth-First Search (BFS).
Store graph edges in a table with columns for source, destination, and weight.
Example SQL query: SELECT * FROM edges WHERE source = 'A' AND destination = ...
Some of the top questions asked at the Centre for Development of Advanced Computing Embedded Software Engineer interview -
based on 1 interview experience
Difficulty level
Duration
based on 2 reviews
Rating in categories
Project Engineer
3.2k
salaries
| ₹5.5 L/yr - ₹11 L/yr |
Project Associate
474
salaries
| ₹2.7 L/yr - ₹6.1 L/yr |
Software Developer
194
salaries
| ₹1.6 L/yr - ₹8.8 L/yr |
Senior Project Engineer
157
salaries
| ₹8.4 L/yr - ₹14.7 L/yr |
Knowledge Associate
80
salaries
| ₹7.8 L/yr - ₹11 L/yr |
ITC Infotech
CMS IT Services
KocharTech
3i Infotech