i
Digitas
Filter interviews by
String Array manipulation
Different launch modes control how activities are launched, services run in the background, and intent-services handle asynchronous tasks.
Launch modes include standard, singleTop, singleTask, and singleInstance
Services are used for long-running operations in the background
Intent-services are used for handling asynchronous tasks on a separate worker thread
Experienced Senior Android Developer with a passion for creating innovative mobile applications and a strong background in software engineering.
Over 7 years of experience in Android development, specializing in Kotlin and Java.
Led a team of developers in creating a top-rated e-commerce app that increased user engagement by 30%.
Proficient in using Android SDK, RESTful APIs, and third-party libraries to enhance app funct...
I applied via LinkedIn and was interviewed in Sep 2023. There were 2 interview rounds.
XGBoost is preferred over Random Forest due to its faster execution speed and better performance in complex datasets.
XGBoost is faster than Random Forest due to its optimized implementation of gradient boosting algorithm.
XGBoost generally performs better in complex datasets with high-dimensional features.
XGBoost allows for more fine-tuning of hyperparameters compared to Random Forest.
XGBoost has regularization techniqu...
I applied via Naukri.com and was interviewed before Oct 2023. There were 2 interview rounds.
Technical question on based of resume
Questionnaire given to solve
I applied via Naukri.com and was interviewed in Apr 2021. There were 3 interview rounds.
Top trending discussions
I appeared for an interview in Jun 2021.
I applied via Recruitment Consulltant and was interviewed before May 2021. There were 2 interview rounds.
The end to end implementation cycle of ISMS involves planning, implementation, monitoring, review, and improvement.
Planning involves identifying the scope, objectives, and risks of the ISMS.
Implementation involves designing and implementing controls to mitigate identified risks.
Monitoring involves regular checks to ensure the controls are effective.
Review involves assessing the effectiveness of the ISMS and identifying...
Risk assessment involves identifying, analyzing, and evaluating potential risks to determine the likelihood and impact of those risks.
Identify potential risks
Analyze the likelihood and impact of each risk
Evaluate the risks to determine their priority
Develop a plan to mitigate or manage the risks
Monitor and review the risks regularly
Annex A controls are the information security controls listed in ISO 27001 standard.
Annex A contains 114 controls categorized into 14 sections.
These controls are designed to ensure the confidentiality, integrity, and availability of information.
Examples of controls include access control, asset management, cryptography, incident management, and more.
Organizations must select and implement controls based on their risk a...
The program capitalizes the first letter of each reversed word in a sentence.
Split the sentence into an array of words using space as a delimiter.
Reverse each word in the array and capitalize the first letter.
Join the modified words back into a sentence.
Maximize clothes donation between two sets of countries with one-to-one relationships.
Model the problem as a bipartite graph where one set represents donors and the other set represents recipients.
Use algorithms like the Hungarian algorithm or maximum flow to find the optimal matching.
Example: If country A donates 5 clothes to country B, and country C donates 6 to country D, ensure no overlaps.
Consider edge cases where...
Probability of a horse going out of a chessboard in 'n' steps.
The total number of possible moves for a horse is 8.
The probability of going out of the board depends on the position of the horse.
For example, if the horse is at a corner, the probability of going out of the board is higher.
The probability can be calculated using combinatorics and geometry.
Algorithms for manipulating arrays and strings in coding
Use sorting algorithms like quicksort and mergesort for arrays
Use string manipulation functions like substring and replace for strings
Use dynamic programming for optimizing solutions to array and string problems
Designing a large scale Ad Server
Use distributed systems for scalability
Implement caching for faster ad delivery
Ensure high availability and fault tolerance
Use real-time bidding for efficient ad placement
Implement fraud detection mechanisms
Ensure compliance with privacy regulations
based on 5 interview experiences
Difficulty level
Duration
based on 110 reviews
Rating in categories
Technical Recruiter
27
salaries
| ₹2.4 L/yr - ₹5.5 L/yr |
Senior Associate Project Manager
23
salaries
| ₹9 L/yr - ₹15 L/yr |
Lead Application Developer
21
salaries
| ₹13.2 L/yr - ₹22 L/yr |
Accounts Manager
15
salaries
| ₹5.6 L/yr - ₹8.5 L/yr |
Associate Application Developer
12
salaries
| ₹4.3 L/yr - ₹10.5 L/yr |
R.R. Donnelley
Epsilon
Denave
Smollan Group