CommVault
10+ Ekart Logistics Interview Questions and Answers
Q1. Sliding Maximum Problem Statement
Given an array of integers ARR
of length 'N' and a positive integer 'K', find the maximum elements for each contiguous subarray of size K.
Example:
Input:
ARR = [3, 4, -1, 1, 5...read more
Q2. Longest Palindromic Substring Problem Statement
You are provided with a string STR
of length N
. The goal is to identify the longest palindromic substring within this string. In cases where multiple palindromic ...read more
Q3. Jump Game Problem Statement
In this problem, you are given an array ARR
consisting of N
integers. Your task is to determine the minimum number of jumps required to reach the last index of the array N - 1
. At an...read more
Q4. Count Substrings with K Distinct Characters
Given a lowercase string 'STR' and an integer K, the task is to count all possible substrings that consist of exactly K distinct characters. These substrings are not ...read more
Q5. Collect Maximum Coins from Matrix
You are provided with a matrix consisting of 'M' rows and 'N' columns. Each cell in this matrix either contains a coin or is empty.
Your task is to collect the maximum number o...read more
Q6. Optimize Memory Usage Problem Statement
Alex wants to maximize the use of 'K' memory spaces on his computer. He has 'N' different document downloads, each with unique memory usage, and 'M' computer games, each ...read more
Q7. Given a table, tell the normal form it is in and normalise it.
Answering normalisation of a given table in an interview for Quality Analyst.
Identify the functional dependencies in the table
Check for any partial dependencies and remove them by creating new tables
Check for any transitive dependencies and remove them by creating new tables
Normalize the table to 1st, 2nd or 3rd normal form based on the dependencies
Ensure that the new tables have a primary key and foreign key relationships with the original table
Q8. Who has the right to decide the termination clause in an contract?
The termination clause in a contract is typically decided by both parties involved in the contract.
The termination clause is usually negotiated and agreed upon by both parties during the contract drafting process.
It is important for both parties to clearly outline the conditions under which the contract can be terminated.
In some cases, termination clauses may be influenced by legal requirements or industry standards.
The termination clause should specify the notice period, rea...read more
Q9. Programming using python
Python is a versatile programming language known for its simplicity and readability.
Python is an interpreted language, making it easy to write and test code quickly.
It supports multiple programming paradigms, including object-oriented, imperative, and functional programming.
Python has a large standard library with built-in modules for various tasks, reducing the need for external libraries.
Python uses indentation to define code blocks, promoting clean and readable code.
Python...read more
Q10. How virtual pointers work?
Virtual pointers are used in C++ to implement polymorphism by allowing objects to be accessed through a base class pointer.
Virtual pointers are used in C++ to achieve runtime polymorphism.
They are created by adding virtual keyword to a function in a base class.
Virtual pointers allow objects of derived classes to be accessed through a base class pointer.
Q11. How backup process goes?
The backup process involves copying and storing data to prevent loss in case of system failure.
Identify critical data to be backed up
Choose a backup method (full, incremental, differential)
Select a backup location (external hard drive, cloud storage)
Schedule regular backups to ensure data is up to date
Test backups to ensure data can be restored successfully
Q12. Design a multithreaded logger system
A multithreaded logger system allows multiple threads to log messages concurrently without blocking each other.
Use a thread-safe data structure like a concurrent queue to store log messages.
Implement a logging class with methods for adding log messages and writing them to a file.
Use synchronization mechanisms like locks or semaphores to ensure thread safety.
Consider using a separate thread for writing log messages to the file to avoid blocking the main threads.
Include timesta...read more
Q13. How snapshots work
Snapshots are point-in-time copies of data stored on a storage device, allowing for easy recovery in case of data loss or corruption.
Snapshots capture the state of data at a specific moment in time
They are read-only copies that can be used for data recovery or testing purposes
Snapshots consume storage space but are more efficient than traditional backups
Some storage systems allow for scheduled or automatic snapshot creation
Q14. What is DNS and HTTPS?
DNS is a system that translates domain names to IP addresses, while HTTPS is a secure protocol for transferring data over the internet.
DNS stands for Domain Name System and is used to translate domain names to IP addresses.
HTTPS stands for Hypertext Transfer Protocol Secure and is a secure version of HTTP.
DNS helps users access websites by translating human-readable domain names (e.g. www.google.com) to machine-readable IP addresses (e.g. 172.217.3.206).
HTTPS encrypts data tr...read more
Q15. Types of backups
Types of backups include full, incremental, differential, and mirror backups.
Full backup: A complete copy of all data in a system.
Incremental backup: Only backs up data that has changed since the last backup.
Differential backup: Backs up all changes since the last full backup.
Mirror backup: An exact copy of data in real-time.
More about working at CommVault
Interview Process at Ekart Logistics
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month