Filter interviews by
The code snippet defines a macro called clrscr() and then calls it in the main function.
The macro clrscr() is defined as 100, so when it is called, it will be replaced with 100.
The printf statement will print the value returned by clrscr(), which is 100.
The output of the code will be '100'.
The question asks about the ratio of the area of a triangle to the area of a trapezium formed by a parallel line cutting the triangle.
The given line DE is parallel to the base side of triangle ABC.
The ratio of DE to BC is 3:5.
We need to find the ratio of the area of triangle ABC to the area of the trapezium formed by DE and the base side of the triangle.
To access x, use the following syntax: y.s3.s2.x
Accessing x requires navigating through the nested structures
Start with y, then access s3, followed by s2, and finally x
The method returns the least common multiple (LCM) of two numbers m and n.
The method uses prime factorization to find the LCM.
It iterates through all prime numbers less than m and n.
For each prime number, it finds the largest power of the prime that divides both m and n.
The method then multiplies the current LCM by the prime raised to the maximum power.
Finally, it returns the computed LCM.
The program finds the number of ways to create 1 rupee using different coins.
Use a recursive function to iterate through all possible combinations of coins
Start with the largest coin and subtract its value from the target amount
Repeat the process with the remaining coins until the target amount becomes zero
Count the number of successful combinations
Answering two programming questions related to printf() function and data types.
In the first program, the output will be 'as hi is'.
In the second program, the output will be '-1 255'.
The first program uses printf() function to print three strings.
The second program demonstrates type conversion from unsigned short to unsigned char.
The value of -1 in unsigned short is converted to 255 in unsigned char.
An alternatively sorted array has elements in a specific order. Use binary search for efficient element lookup.
Identify the pattern: elements are sorted in alternating high-low order.
Use binary search to find the target element efficiently.
Check both halves of the array based on the middle element's value.
Example: In the array [12, 2, 16, 5, 18, 32, 33, 38], to find 18, check the middle element and adjust search accord...
Algorithm to find elements appearing more than n/3 times in an array in linear time
Divide the array into three equal parts
Iterate through the array and count the occurrences of each element in each part
Check if the count of any element is greater than n/3
Return the elements that meet the condition
An algorithm to schedule matches in a tournament with N teams, where each team plays only one match per day.
Create a round-robin schedule where each team plays every other team once.
Start by assigning each team a number.
Generate a schedule by pairing teams based on their numbers.
Optimize the schedule by minimizing the number of days required.
Consider using a graph-based approach to find the optimal schedule.
The code snippet demonstrates the use of the fork() function to create multiple child processes.
The fork() function is used to create a new process by duplicating the existing process.
Each time fork() is called, it creates a new child process that starts executing from the same point as the parent process.
In the given code, fork() is called four times, resulting in a total of 16 processes (including the original parent...
Bridges are used in the network layer of the OSI model.
Bridges are used to connect two or more network segments or LANs.
They operate at the data link layer (Layer 2) of the OSI model.
Bridges use MAC addresses to forward data packets between segments.
They can filter and forward network traffic based on MAC addresses.
Examples of bridges include Ethernet bridges and wireless bridges.
Top trending discussions
My role model is Elon Musk.
I admire his innovative thinking and determination to push boundaries.
His ability to lead multiple successful companies is inspiring.
His focus on sustainable energy and space exploration aligns with my values.
I strive to emulate his work ethic and passion for making a positive impact on the world.
I have been involved in various extra-curricular activities such as volunteering, sports, and music.
Volunteered at local animal shelter
Played on intramural basketball team
Participated in school choir
Attended coding workshops and hackathons
I appeared for an interview before Jan 2016.
I am excited to join Centurylink because of their reputation for innovation and commitment to customer satisfaction.
Centurylink has a strong focus on developing cutting-edge technology solutions
The company values customer feedback and strives to provide excellent service
I am impressed by Centurylink's dedication to diversity and inclusion in the workplace
Relocated to Noida for better career opportunities and growth.
Noida is a hub for IT companies and offers a lot of job opportunities in the software development field.
The city has a good work-life balance and a lower cost of living compared to other metropolitan cities.
I was also attracted to the diverse culture and the opportunity to work with people from different backgrounds.
I did my research and found that Noida has...
Yes, I am comfortable working in US shift.
I have prior experience working in US shift.
I am flexible with my work timings.
I understand the importance of meeting project deadlines.
I am willing to adjust my personal schedule to accommodate work requirements.
I appeared for an interview before Apr 2021.
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions on OOPS and OS mainly.
Little Endian and Big Endian refer to the order in which bytes are stored in computer memory.
Little Endian stores the least significant byte first, while Big Endian stores the most significant byte first.
Little Endian is commonly used in x86 architecture, while Big Endian is used in architectures like SPARC and PowerPC.
Endianness can affect data transmission between systems with different byte orders.
The volatile keyword in programming is used to indicate that a variable's value can be changed unexpectedly.
Volatile keyword is used in multithreaded programming to prevent compiler optimizations on variables that can be changed by other threads.
It tells the compiler not to cache the variable's value in a register, ensuring that every access is made to the variable's memory location.
Commonly used in embedded systems pr...
The kernel is the core component of an operating system that manages system resources and provides a bridge between software and hardware.
Manages system resources such as CPU, memory, and I/O devices
Provides a bridge between software applications and hardware components
Handles tasks such as process scheduling, memory management, and device drivers
Controls communication between hardware and software layers
Round duration - 30 minutes
Round difficulty - Easy
HR round with typical behavioral problems.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I applied via Campus Placement and was interviewed in Dec 2016. There were 3 interview rounds.
Program to reverse an integer
Convert the integer to a string
Reverse the string
Convert the reversed string back to an integer
I have worked on various projects including a web application for inventory management and a mobile app for task tracking.
Developed a web application using React for inventory management, allowing users to track stock levels and generate reports.
Created a mobile app using Flutter for task tracking, enabling users to create, assign, and track tasks in real-time.
Collaborated with a team of developers to integrate APIs an...
Data structures are fundamental concepts in software engineering that organize and store data efficiently.
Arrays: Simple and efficient for storing and accessing elements.
Linked Lists: Dynamic and flexible, efficient for insertion and deletion.
Stacks: LIFO structure, useful for managing function calls and undo operations.
Queues: FIFO structure, ideal for managing tasks and scheduling.
Trees: Hierarchical structure, used ...
The difference is that 'int arr[5]' creates an array on the stack, while 'malloc(5*sizeof(int))' allocates memory on the heap.
int arr[5] creates an array of 5 integers on the stack, which is a fixed-size memory allocation.
malloc(5*sizeof(int)) dynamically allocates memory on the heap, allowing for variable-size memory allocation.
The memory allocated with malloc must be explicitly freed with free() to avoid memory leaks...
I appeared for an interview before Mar 2021.
Round duration - 40 minutes
Round difficulty - Easy
Technical round with questions based on DSA.
Create a program to reverse a given integer N
. The output should be the reversed integer.
If a number has trailing zeros, their reversed version should not inclu...
Reverse a given integer while excluding trailing zeros.
Create a program to reverse the given integer by converting it to a string and then reversing it.
Remove any trailing zeros from the reversed string before converting it back to an integer.
Handle the constraints of the input integer being between 0 and 10^8.
Example: For input 1230, the output should be 321.
You are given a Singly Linked List of integers. Your task is to reverse the Linked List by changing the links between nodes.
The first line of input contai...
new int[5] is C++ specific and initializes the array with default values, while malloc(5 * sizeof(int)) is a C function and does not initialize the array.
new int[5] is C++ specific and calls constructors for each element in the array.
malloc(5 * sizeof(int)) is a C function and does not call constructors, leaving the array uninitialized.
new int[5] returns a pointer to the first element of the array, while malloc(5 * siz...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
posted on 9 Dec 2021
I applied via Naukri.com and was interviewed before Dec 2020. There were 3 interview rounds.
Eager loading is a technique used in software development to load related data in advance to avoid multiple database queries.
Eager loading is used to optimize database queries and improve performance.
It loads all the required data in a single query instead of making multiple queries.
It is commonly used in Object-Relational Mapping (ORM) frameworks like Hibernate, Entity Framework, etc.
Eager loading can be used with var...
I applied via Campus Placement and was interviewed in Jun 2021. There were 4 interview rounds.
Some of the top questions asked at the Cisco Electronic Packaging Designer interview -
Software Engineer
2.8k
salaries
| ₹16.8 L/yr - ₹39.6 L/yr |
Technical Consulting Engineer
695
salaries
| ₹9.7 L/yr - ₹30.4 L/yr |
Senior Software Engineer
665
salaries
| ₹24.5 L/yr - ₹45 L/yr |
Network Engineer
400
salaries
| ₹5.8 L/yr - ₹14 L/yr |
Technical Lead
353
salaries
| ₹30.5 L/yr - ₹55 L/yr |
Microsoft Corporation
Sterlite Technologies
Nokia Networks