i
DRC Systems
Filter interviews by
I applied via campus placement at Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT), Gandhinagar and was interviewed in Oct 2024. There were 2 interview rounds.
It was a 100-minute test consisting of mcqs and one coding question on articulation points in the graph.
Postgresql is known for its advanced features and support for complex queries, while MySQL is popular for its ease of use and speed.
Postgresql is known for its advanced features such as support for complex queries, indexing, and JSON data types.
MySQL is popular for its ease of use, speed, and compatibility with various platforms.
Postgresql has a strong focus on standards compliance and extensibility, while MySQL is mor...
ACID properties in DBMS ensure data integrity and consistency in transactions.
Atomicity: All operations in a transaction are completed successfully or none at all.
Consistency: Data is always in a valid state before and after a transaction.
Isolation: Transactions are executed independently without interference from other transactions.
Durability: Once a transaction is committed, changes are permanent and cannot be lost.
E...
Object-oriented programming concepts that focus on classes and objects
Encapsulation: Bundling data and methods that operate on the data into a single unit (class)
Inheritance: Ability of a class to inherit properties and behavior from another class
Polymorphism: Ability to present the same interface for different data types
Abstraction: Hiding the complex implementation details and showing only the necessary features
Top trending discussions
I applied via Approached by Company and was interviewed in Oct 2024. There were 2 interview rounds.
Leetcode easy-medium
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Cyber security involves implementing measures to prevent unauthorized access, data breaches, and other cyber threats.
It includes technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
Examples of cyber security measures include firewalls, ant...
Types of encryption include symmetric encryption, asymmetric encryption, and hashing.
Symmetric encryption: Uses the same key for both encryption and decryption, examples include AES and DES.
Asymmetric encryption: Uses a pair of public and private keys for encryption and decryption, examples include RSA and ECC.
Hashing: Converts data into a fixed-size string of bytes, examples include MD5 and SHA.
30 questions from math reasoning coding
Very good recent topics from current affairs
I applied via Referral and was interviewed in Jun 2023. There were 2 interview rounds.
OOPs Concepts focus on encapsulation, inheritance, polymorphism, and abstraction. Functions are reusable blocks of code.
OOPs Concepts include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation involves bundling data and methods that operate on the data into a single unit.
Inheritance allows a class to inherit properties and behavior from another class.
Polymorphism enables objects to be treated as in...
Algorithms for manipulating arrays and strings in coding
Use sorting algorithms like quicksort and mergesort for arrays
Use string manipulation functions like substring and replace for strings
Use dynamic programming for optimizing solutions to array and string problems
Designing a large scale Ad Server
Use distributed systems for scalability
Implement caching for faster ad delivery
Ensure high availability and fault tolerance
Use real-time bidding for efficient ad placement
Implement fraud detection mechanisms
Ensure compliance with privacy regulations
I was interviewed before Feb 2024.
There was multiple choice questions which was based on logical reasoning and numericals
I applied via Job Portal and was interviewed in Oct 2021. There were 3 interview rounds.
Maximum sub sequence sum in an array
Use Kadane's algorithm
Initialize max_so_far and max_ending_here to 0
Iterate through the array and update max_ending_here and max_so_far
Return max_so_far
Endianness refers to the byte order of a system. It determines how multi-byte data types are stored in memory.
Little-endian systems store the least significant byte first, while big-endian systems store the most significant byte first.
Endianness can affect the way data is transmitted between systems.
To determine the endianness of a system, you can use the byte order mark (BOM) or write a test program that checks the by...
Sort an array of 0's and 1's only.
Use two pointers, one at the beginning and one at the end of the array.
Swap 0's from the beginning with 1's from the end until the pointers meet.
Alternatively, use a counting sort algorithm to count the number of 0's and 1's and then reconstruct the array.
Heaps are data structures used to efficiently find the maximum or minimum element in a collection.
Max heap: parent nodes are always greater than or equal to child nodes
Min heap: parent nodes are always smaller than or equal to child nodes
Heaps are commonly used in priority queues and sorting algorithms
Heap operations include insert, delete, and extract max/min
Example: An array [3, 8, 2, 5, 1, 4, 6] can be represented a
Find 3 numbers in an array where a+b=c.
Loop through the array and check for all possible combinations of a and b.
Use a hash table to store the values of a and b, and check if c is present in the hash table.
Sort the array and use two pointers to find a and b, and then check if their sum equals c.
based on 2 interviews
Interview experience
Software Engineer
37
salaries
| ₹2 L/yr - ₹6 L/yr |
Senior Software Engineer
33
salaries
| ₹3.6 L/yr - ₹14.6 L/yr |
Associate Software Engineer
21
salaries
| ₹3 L/yr - ₹7.4 L/yr |
Software Developer
11
salaries
| ₹1.7 L/yr - ₹8 L/yr |
Associate
7
salaries
| ₹3.6 L/yr - ₹7.2 L/yr |
TCS
Infosys
Wipro
HCLTech