i
Filter interviews by
I applied via Company Website and was interviewed in Aug 2024. There was 1 interview round.
I applied via LinkedIn and was interviewed in Jul 2024. There were 2 interview rounds.
Mutex is used for exclusive access to a resource by a single thread, while semaphore is used for controlling access to a resource by multiple threads.
Mutex is binary in nature, allowing only one thread to access the resource at a time.
Semaphore can have a count greater than 1, allowing multiple threads to access the resource simultaneously.
Mutex is typically used for protecting critical sections of code.
Semaphore is of...
When volatile and const are used together, the variable is treated as read-only and its value can change unexpectedly.
The const keyword indicates that the variable's value cannot be changed by the program.
The volatile keyword tells the compiler that the variable's value may change at any time, even if it doesn't appear to be modified by the program.
When used together, the variable is treated as read-only by the program...
Brute force can be both good and bad depending on the context and application.
Brute force can be effective for small scale problems or when time is limited.
However, it is inefficient and impractical for large scale problems.
Brute force may also be necessary in certain scenarios where no other efficient solution exists.
For example, brute force can be used in password cracking when other methods fail.
Mutex is used for exclusive access to a resource by a single thread, while semaphore is used for controlling access to a resource by multiple threads.
Mutex is binary in nature, allowing only one thread to access the resource at a time.
Semaphore can have a count greater than 1, allowing multiple threads to access the resource simultaneously.
Mutex is used for protecting critical sections of code, while semaphore is used ...
When volatile and const are used together, the variable is treated as read-only and its value can change unexpectedly.
Using volatile and const together is rare but can be useful for memory-mapped hardware registers.
The volatile keyword tells the compiler that the variable can be changed unexpectedly, while const ensures the variable is read-only.
Example: const volatile int * const ptr = (int *)0x1234; // pointer to a r...
I applied via AICTE and was interviewed in Sep 2024. There was 1 interview round.
DDOS attack is a malicious attempt to disrupt normal traffic of a targeted server or network by overwhelming it with a flood of internet traffic.
DDOS stands for Distributed Denial of Service attack.
Attackers use multiple compromised systems to flood the target with traffic.
Common types include UDP flood, SYN flood, and HTTP flood.
DDOS attacks can lead to service disruption, financial losses, and reputational damage.
Mit...
Google search works by crawling and indexing web pages, and then ranking them based on relevance and quality.
Google uses web crawlers to discover and index web pages.
The search algorithm ranks pages based on relevance to the search query.
Factors like keywords, backlinks, and user experience influence rankings.
Google constantly updates its algorithm to improve search results.
Google also considers user location and searc
I prioritize tasks, set boundaries, delegate when necessary, and make time for self-care.
Prioritize tasks based on deadlines and importance
Set boundaries by establishing work hours and sticking to them
Delegate tasks to team members when feeling overwhelmed
Make time for self-care activities such as exercise, hobbies, and relaxation
Avoid multitasking and focus on one task at a time
Yes, ISO 9000 is a set of international standards for quality management and quality assurance.
ISO 9000 is a series of standards developed by the International Organization for Standardization (ISO) that focus on quality management systems.
These standards provide guidance and tools for companies to ensure their products and services consistently meet customer requirements and regulatory standards.
ISO 9000 certification...
Centre for Development of Advanced Computing interview questions for popular designations
I applied via Youtube and was interviewed in Nov 2023. There was 1 interview round.
I applied via Campus Placement and was interviewed in Aug 2024. There was 1 interview round.
I applied via LinkedIn and was interviewed in Feb 2024. There were 2 interview rounds.
I applied via Campus Placement and was interviewed in May 2023. There were 3 interview rounds.
Understanding data structures and algorithms commonly used in MySQL databases.
Array: a data structure that stores a collection of elements in a contiguous memory location.
ArrayList: a resizable array implementation that dynamically adjusts its size as elements are added or removed.
LinkedList: a data structure where each element is connected to the next element via pointers.
Binary Tree: a tree data structure where each ...
Top trending discussions
Some of the top questions asked at the Centre for Development of Advanced Computing interview for freshers -
The duration of Centre for Development of Advanced Computing interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 14 interviews
Interview experience
based on 949 reviews
Rating in categories
Project Engineer
2.9k
salaries
| ₹3.8 L/yr - ₹14 L/yr |
Project Associate
454
salaries
| ₹3 L/yr - ₹6.1 L/yr |
Software Developer
182
salaries
| ₹1 L/yr - ₹9.5 L/yr |
Senior Project Engineer
141
salaries
| ₹6 L/yr - ₹16 L/yr |
Software Engineer
80
salaries
| ₹3 L/yr - ₹10.1 L/yr |
ITC Infotech
CMS IT Services
KocharTech
3i Infotech