i
Coditas Technologies
Filter interviews by
I applied via Recruitment Consultant and was interviewed in Nov 2021. There was 1 interview round.
Sanity and smoke are types of testing in software engineering.
Sanity testing is a quick test to check if the major functionalities of the application are working after a small change is made.
Smoke testing is a quick test to check if the application is stable enough to proceed with further testing.
Sanity testing is done to ensure that the application is ready for further testing.
Smoke testing is done to ensure that the ...
A header is a piece of information at the beginning of a data packet or file that contains details about the data.
Headers are used in communication protocols to provide information about the data being transmitted.
Headers typically include metadata such as the source and destination addresses, data type, and size.
In HTTP, headers are used to pass additional information between the client and server, such as cookies or
Verification ensures that the product is built according to the design specifications, while validation ensures that the product meets the customer's needs and requirements.
Verification checks if the product is being built correctly, while validation checks if the right product is being built.
Verification is a process of evaluating the intermediate work products, while validation is a process of evaluating the final pr...
Top trending discussions
I applied via LinkedIn and was interviewed in Jul 2024. There were 2 interview rounds.
I have 5 years of experience working as a software engineer in various industries.
Developed web applications using Java, Spring, and AngularJS
Led a team of developers in a successful project delivery
Implemented CI/CD pipelines to automate software deployment
Worked on improving system performance and scalability
posted on 24 Jun 2024
I applied via Campus Placement
45 questions were asked
3 questions were asked one from SQL and 2 from java
posted on 22 Nov 2024
Encapsulation, Inheritance, Polymorphism, Abstraction are the four pillars of OOPS in Java.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Inheritance: Allows a class to inherit properties and behavior from another class.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the implementation details and showing only the necessary features.
A constructor in Java is a special type of method that is used to initialize objects.
Constructors have the same name as the class they are in.
They do not have a return type, not even void.
Constructors are called when an object of a class is created.
Example: public class Car { public Car() { // constructor code } }
I applied via Company Website and was interviewed in Apr 2021. There was 1 interview round.
I applied via Company Website and was interviewed in Jun 2024. There were 3 interview rounds.
3 questions, medium hard
I applied via Referral and was interviewed in Aug 2023. There were 2 interview rounds.
Leetcode practice should be sufficient to tackle this round.
Trapping Rain Water problem involves calculating the amount of water that can be trapped between buildings given their heights.
Calculate the maximum height of buildings to the left and right of each building
Find the minimum of the two heights
Subtract the height of the current building to get the amount of water that can be trapped at that building
I applied via Referral and was interviewed before Jun 2023. There was 1 interview round.
2 Greedy Algo problems
I applied via Job Portal and was interviewed in Aug 2022. There were 4 interview rounds.
2 coding questions 10 aptitude and other 15 technical questions
I applied via Campus Placement and was interviewed in Jul 2023. There were 3 interview rounds.
There were 13 MCQ questions on DSA, 17 MCQ aptitude questions, and 2 coding questions.
Check if after interleaving strings s1 and s2, we get s3 as one of the answers.
Create a recursive function to check all possible interleavings of s1 and s2
Check if the current interleaving matches s3
Return true if a valid interleaving is found, false otherwise
Cluster indexing physically reorders the data on disk to match the index, while non-cluster indexing does not.
Cluster indexing physically reorders the data on disk to match the index structure, leading to faster retrieval of data.
Non-cluster indexing creates a separate data structure that points to the actual data, which may result in slower retrieval times.
Cluster indexing is typically used in primary keys, while non-...
Stack memory is used for static memory allocation and follows a Last In First Out (LIFO) structure, while heap memory is used for dynamic memory allocation and has a more flexible structure.
Stack memory is limited in size and is typically faster to access compared to heap memory.
Variables stored in stack memory have a fixed size determined at compile time, while variables in heap memory can have a size determined at ru...
A stable sort is a sorting algorithm that preserves the relative order of equal elements in the sorted output.
Stable sorts are useful when the original order of equal elements needs to be maintained.
Examples of stable sorting algorithms include Merge Sort, Bubble Sort, and Insertion Sort.
In a stable sort, if two elements have the same key value, their relative order in the original array is preserved in the sorted arra
Time complexity of insertion in a hashmap is O(1).
Insertion in a hashmap has a constant time complexity of O(1) on average.
This is because hashmaps use a hashing function to determine the index where the key-value pair should be stored.
Even in the worst-case scenario, where there are collisions, the time complexity is still O(1) due to techniques like chaining or open addressing.
Example: Inserting a key-value pair into...
Hashing is a process of converting input data into a fixed-size string of bytes using a hash function.
Hashing is used to securely store passwords by converting them into a hash value.
Hashing is used in data structures like hash tables to quickly retrieve data based on a key.
Common hash functions include MD5, SHA-1, and SHA-256.
Software Engineer
406
salaries
| ₹4.6 L/yr - ₹12.4 L/yr |
Associate Software Engineer
149
salaries
| ₹1 L/yr - ₹9.1 L/yr |
Software Developer
129
salaries
| ₹5 L/yr - ₹20.5 L/yr |
Senior Software Engineer
109
salaries
| ₹10.5 L/yr - ₹35 L/yr |
Data Engineer
58
salaries
| ₹6 L/yr - ₹14 L/yr |
Mobile Programming
Diverse Lynx
Arcesium
Solartis Technology Services