Filter interviews by
I was interviewed before Mar 2016.
I was attracted to this company because of its strong reputation in the industry and its commitment to innovation.
The company has a proven track record of success and is highly regarded in the market.
I was impressed by the company's focus on staying ahead of industry trends and constantly seeking new ways to improve.
The company's values and mission align with my own professional goals and aspirations.
I was excited abou...
The key points of marketing that fascinated me were its creativity, strategic thinking, and impact on consumer behavior.
Creativity in developing unique campaigns and messaging to attract customers
Strategic thinking in analyzing market trends and competition to create effective marketing strategies
Impact on consumer behavior by influencing purchasing decisions through targeted marketing efforts
I was interviewed in May 2016.
I am a highly motivated and experienced professional with a strong background in project management and team leadership.
Over 10 years of experience in managing complex projects and leading cross-functional teams.
Proven track record of delivering projects on time and within budget.
Expertise in strategic planning, risk management, and stakeholder communication.
Strong problem-solving and decision-making skills.
Excellent c...
Threads provide a lightweight way to achieve multitasking within a process.
Threads share the same memory space, while processes have separate memory spaces.
Threads are faster to create and terminate compared to processes.
Threads allow for efficient communication and synchronization between different parts of a program.
Threads are commonly used in applications that require concurrent execution, such as web servers or mu...
The value of x will depend on the execution order of the threads.
The function fun() increments the value of x by 1.
If all three threads run the function concurrently, the final value of x will be 8.
If the threads run sequentially, the final value of x will be 7.
The virtual keyword is used in object-oriented programming to indicate that a method or property can be overridden in a derived class.
The virtual keyword allows for polymorphism, where a derived class can provide its own implementation of a method or property inherited from a base class.
It enables the concept of dynamic dispatch, where the appropriate method implementation is determined at runtime based on the actual t...
No, we cannot implement overloading using different return types of function.
Overloading is based on the number and types of parameters, not the return type.
If we have two functions with the same name and parameters but different return types, it will result in a compilation error.
Return type alone is not sufficient to differentiate between overloaded functions.
Sliding window protocol is a technique used in computer networks to ensure reliable and efficient data transmission.
Sliding window protocol is used to manage the flow of data between sender and receiver in a network.
It divides the data into small packets and assigns a sequence number to each packet.
The sender sends a fixed number of packets and waits for acknowledgment from the receiver before sending more packets.
If a...
Directi interview questions for popular designations
Sorting an array of 0, 1 and 2 can be done in O(n) using two pointers.
Use two pointers, one for 0 and one for 2, and a current pointer to traverse the array
If the current pointer encounters a 0, swap it with the 0 pointer and move both pointers to the right
If the current pointer encounters a 2, swap it with the 2 pointer and move the 2 pointer to the left
Repeat until the current pointer meets the 2 pointer
Algorithm to find if a number is present in a sorted n x n matrix with linear time complexity.
Start with the top right element
Compare the element with x
If equal, return its position
If e < x, move down (if out of bounds, return false)
If e > x, move left (if out of bounds, return false)
Repeat till element is found or returned false
The problem is to find non-empty subsets of a given set of integers whose sum is zero.
The problem is a special case of the knapsack problem and is known to be NP-Complete.
A brute-force approach would involve generating all subsets and checking their sums.
The brute-force approach has an exponential time complexity.
There is no known polynomial time solution for this problem.
Data structure with O(1) insert, delete, and find min without creating new structures
Use two stacks, one for actual data and one for minimum values
When inserting, push the value onto the data stack and push the minimum of the new value and the top of the minimum stack onto the minimum stack
When deleting, pop from both stacks
When finding the minimum, return the top of the minimum stack
Given a string and pairs of indices, output the lexicographically smallest string after swapping characters.
Sort the pairs based on the first index in ascending order.
Use union-find data structure to keep track of connected components.
Swap characters in the string based on the connected components.
Return the lexicographically smallest string.
Output all edges in any shortest path from x to y in an undirected weighted graph
Use Dijkstra's algorithm to find all shortest paths from x to y
Store the predecessor of each vertex to reconstruct the paths
Output all edges in any of the shortest paths found
The angle between the hour hand and minute hand of a clock can be calculated using a simple formula.
The angle between the hour hand and minute hand is given by the formula: |(30H - 11/2) - 6M| degrees
H is the hour hand position and M is the minute hand position
If the result is greater than 180 degrees, subtract it from 360 degrees to get the acute angle
To find the country of an IP address from a CSV file, we can use a lookup table based on the IP address range.
Create a lookup table from the CSV file with IP address ranges and corresponding country codes
Parse the given IP address and match it with the ranges in the lookup table to find the corresponding country code
Use binary search for efficient lookup in the IP address ranges
Handle cases where the given IP address f
To detect a loop in a linked list, we can use Floyd's Cycle Detection Algorithm.
Use two pointers, one moving at twice the speed of the other
If there is a loop, the two pointers will eventually meet at some point
Alternatively, use a hash set to store visited nodes and check for duplicates
Top trending discussions
Some of the top questions asked at the Directi interview -
based on 6 interviews
Interview experience
Software Development Engineer II
13
salaries
| ₹21.5 L/yr - ₹55 L/yr |
Senior Software Engineer
11
salaries
| ₹25 L/yr - ₹57 L/yr |
Product Manager
11
salaries
| ₹21 L/yr - ₹35 L/yr |
Software Engineer
9
salaries
| ₹9.1 L/yr - ₹36.4 L/yr |
Software Developer
9
salaries
| ₹8.4 L/yr - ₹30 L/yr |
Zoho
TCS
Infosys
Wipro