Filter interviews by
Sharding in MongoDB involves partitioning data across multiple servers to improve scalability and performance.
Sharding is achieved by dividing data into chunks based on a shard key
Each shard contains a subset of the data, distributed across multiple servers
MongoDB's sharding architecture includes config servers, query routers, and shard servers
Sharding can be implemented at the collection level in MongoDB
I am passionate about software development and believe in the company's mission and values.
I admire the company's innovative projects and technologies.
I resonate with the company's culture of collaboration and continuous learning.
I am excited about the opportunity to work with a talented team of developers.
I believe my skills and experience align well with the company's needs.
posted on 12 Jun 2021
Computer networking is the practice of connecting devices together to share resources and communicate with each other.
Computer networking involves the use of hardware and software to connect devices together, such as computers, printers, and servers.
Networking protocols, such as TCP/IP, are used to facilitate communication between devices.
Examples of computer networks include local area networks (LANs), wide area netwo...
I applied via Naukri.com and was interviewed in Aug 2020. There were 5 interview rounds.
Interfaces define a contract for classes to implement certain methods and properties.
Interfaces allow for polymorphism and loose coupling.
Classes can implement multiple interfaces.
Interfaces cannot be instantiated on their own.
Interfaces can have default method implementations.
Interfaces can be used to enforce design patterns like the adapter pattern.
I applied via Campus Placement and was interviewed in Dec 2020. There were 5 interview rounds.
Program to print a pattern and implement bubble sort on an array of strings.
For pattern printing, use nested loops to print the desired pattern.
For bubble sort, compare adjacent elements and swap if necessary.
Use a loop to iterate through the array until no more swaps are needed.
C# is a programming language, ASP.NET is a web framework, and MVC is a design pattern for building web applications.
C# is used to write code for various applications, including web applications.
ASP.NET is a web framework that provides tools and libraries for building web applications.
MVC is a design pattern that separates an application into three components: Model, View, and Controller.
ASP.NET MVC is a web framework t...
posted on 16 Aug 2015
Network layers are a hierarchical way of organizing communication protocols.
Network layers provide a modular approach to networking.
Each layer has a specific function and communicates with adjacent layers.
The OSI model has 7 layers, while the TCP/IP model has 4 layers.
Examples of layers include the physical layer, data link layer, network layer, transport layer, and application layer.
Deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.
Occurs in multi-threaded/multi-process environments
Can lead to system freeze or crash
Prevention techniques include resource ordering and timeouts
Example: Process A holds resource X and waits for resource Y, while Process B holds resource Y and waits for resource X
Paging and Segmentation are memory management techniques used by operating systems.
Paging divides memory into fixed-size pages and stores them in physical memory.
Segmentation divides memory into logical segments and stores them in physical memory.
Paging allows for efficient use of physical memory and reduces fragmentation.
Segmentation allows for protection and sharing of memory between processes.
Examples of operating s...
Reverse a linked list using iterative and recursive methods.
Iterative method involves traversing the list and changing the pointers to reverse the order.
Recursive method involves calling the function recursively on the next node and changing the pointers.
Both methods have O(n) time complexity and O(1) space complexity.
Example: 1->2->3->4->5 becomes 5->4->3->2->1.
Clone a linked list with a random pointer.
Create a new node for each node in the original list.
Use a hash table to map the original nodes to their clones.
Iterate through the original list again and update the random pointers of the clone nodes.
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Senior Consultant
239
salaries
| ₹15 L/yr - ₹38 L/yr |
Graphic Designer
231
salaries
| ₹1.5 L/yr - ₹6.4 L/yr |
Consultant
227
salaries
| ₹7.7 L/yr - ₹22.5 L/yr |
Analyst
101
salaries
| ₹3.5 L/yr - ₹11 L/yr |
Senior Graphic Designer
68
salaries
| ₹3.2 L/yr - ₹7.2 L/yr |
DXC Technology
Mphasis
Sutherland Global Services
Optum Global Solutions