i
Diverse Lynx
Filter interviews by
I applied via Naukri.com and was interviewed before Jun 2023. There was 1 interview round.
Top trending discussions
posted on 22 Nov 2024
Encapsulation, Inheritance, Polymorphism, Abstraction are the four pillars of OOPS in Java.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Inheritance: Allows a class to inherit properties and behavior from another class.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the implementation details and showing only the necessary features.
A constructor in Java is a special type of method that is used to initialize objects.
Constructors have the same name as the class they are in.
They do not have a return type, not even void.
Constructors are called when an object of a class is created.
Example: public class Car { public Car() { // constructor code } }
I applied via Company Website and was interviewed in Jun 2024. There were 3 interview rounds.
3 questions, medium hard
Types of triggers in Azure Data Factory include schedule, tumbling window, event-based, and manual.
Schedule trigger allows you to run pipelines on a specified schedule
Tumbling window trigger runs pipelines at specified time intervals
Event-based trigger runs pipelines based on events like file arrival or HTTP request
Manual trigger allows you to manually trigger pipeline runs
I applied via LinkedIn and was interviewed before Dec 2023. There were 2 interview rounds.
Coding questions on Javascript
I applied via Company Website and was interviewed before Mar 2023. There was 1 interview round.
Use a loop to iterate through the list and compare each element with the target element
Iterate through the list using a loop
Compare each element with the target element
Return the element if found, otherwise return null
I applied via Recruitment Consulltant and was interviewed before Sep 2021. There was 1 interview round.
posted on 24 Jun 2024
I applied via Campus Placement
45 questions were asked
3 questions were asked one from SQL and 2 from java
I applied via campus placement at Thapar Institute of Engineering and Technology (TIET) and was interviewed in Jul 2023. There were 2 interview rounds.
There were 13 MCQ questions on DSA, 17 MCQ aptitude questions, and 2 coding questions.
Check if after interleaving strings s1 and s2, we get s3 as one of the answers.
Create a recursive function to check all possible interleavings of s1 and s2
Check if the current interleaving matches s3
Return true if a valid interleaving is found, false otherwise
Cluster indexing physically reorders the data on disk to match the index, while non-cluster indexing does not.
Cluster indexing physically reorders the data on disk to match the index structure, leading to faster retrieval of data.
Non-cluster indexing creates a separate data structure that points to the actual data, which may result in slower retrieval times.
Cluster indexing is typically used in primary keys, while non-...
Stack memory is used for static memory allocation and follows a Last In First Out (LIFO) structure, while heap memory is used for dynamic memory allocation and has a more flexible structure.
Stack memory is limited in size and is typically faster to access compared to heap memory.
Variables stored in stack memory have a fixed size determined at compile time, while variables in heap memory can have a size determined at ru...
A stable sort is a sorting algorithm that preserves the relative order of equal elements in the sorted output.
Stable sorts are useful when the original order of equal elements needs to be maintained.
Examples of stable sorting algorithms include Merge Sort, Bubble Sort, and Insertion Sort.
In a stable sort, if two elements have the same key value, their relative order in the original array is preserved in the sorted arra
Time complexity of insertion in a hashmap is O(1).
Insertion in a hashmap has a constant time complexity of O(1) on average.
This is because hashmaps use a hashing function to determine the index where the key-value pair should be stored.
Even in the worst-case scenario, where there are collisions, the time complexity is still O(1) due to techniques like chaining or open addressing.
Example: Inserting a key-value pair into...
Hashing is a process of converting input data into a fixed-size string of bytes using a hash function.
Hashing is used to securely store passwords by converting them into a hash value.
Hashing is used in data structures like hash tables to quickly retrieve data based on a key.
Common hash functions include MD5, SHA-1, and SHA-256.
Interview experience
based on 9 reviews
Rating in categories
Technical Recruiter
122
salaries
| ₹1.7 L/yr - ₹6 L/yr |
Software Engineer
79
salaries
| ₹3.5 L/yr - ₹9.8 L/yr |
Senior Software Engineer
77
salaries
| ₹4.2 L/yr - ₹12 L/yr |
Senior Technical Recruiter
64
salaries
| ₹3.3 L/yr - ₹7.6 L/yr |
Senior IT Recruiter
47
salaries
| ₹3 L/yr - ₹7 L/yr |
TCS
Infosys
Wipro
HCLTech