Filter interviews by
I applied via Campus Placement and was interviewed in Apr 2024. There were 2 interview rounds.
Aptitude questions are logical thinking and critical problem solving in scenario based questions
Scenario based concepts in coding challenge and advice coding solutions
Top trending discussions
Program to create a copy of a doubly linked list with an arbit pointer.
Traverse the original list and create a new node for each node in the list.
Store the mapping of original node to the new node in a hash table.
Traverse the original list again and set the next and arbit pointers of the new nodes.
Return the head of the new list.
Implement functionality for online test with timer and handle power failure scenarios
Create a timer function to track the time
Store the start time and end time of the test
Implement a backup system to save progress in case of power failure
Use a database to store test data and progress
Handle edge cases like internet connectivity issues
A recursive function to check if a number is prime or not.
Create a function that takes a number as input.
Check if the number is less than 2, return false.
Check if the number is 2, return true.
Check if the number is divisible by any number less than it, return false.
If none of the above conditions are met, call the function recursively with the number minus 1.
To reverse a linked list, we need to traverse the list and change the direction of the pointers.
Create three pointers: prev, curr, and next
Initialize prev to null, curr to head of the linked list, and next to null
Traverse the list and change the direction of the pointers: next = curr.next; curr.next = prev; prev = curr; curr = next;
Set the new head of the linked list to prev
It is not possible to stop man in the middle attack over an insecure communication line without using any kind of encryption.
Without encryption, the communication line is inherently insecure and vulnerable to man-in-the-middle attacks.
One possible solution is to use a secure communication line, such as a VPN or a dedicated private network.
Another solution is to use digital signatures to verify the authenticity of the c...
HTTP is unsecured while HTTPS is secured with SSL/TLS encryption.
HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure.
HTTP operates on port 80 while HTTPS operates on port 443.
HTTP is unencrypted while HTTPS is encrypted with SSL/TLS.
HTTPS provides authentication and data integrity while HTTP does not.
HTTPS is used for secure online transactions such as online banking, e
Heap and stack memory are two types of memory allocation in a program. Local variables are stored in stack memory. Memory tables are used to track memory allocation.
Heap memory is used for dynamic memory allocation, while stack memory is used for static memory allocation.
Local variables are stored in stack memory and are only accessible within the scope of the function they are declared in.
Memory tables are used to kee...
Certifications are not mandatory for software developers, but can add value to their resume.
Certifications in programming languages like Java, Python, C++
Certifications in software development methodologies like Agile, Scrum
Certifications in cloud computing platforms like AWS, Azure
Certifications in security like CISSP, CEH
Certifications in project management like PMP
Certifications in mobile app development like Androi
I applied via Naukri.com and was interviewed in Jun 2021. There were 2 interview rounds.
Excellent knowledge you need on coding to crack
I applied via Campus Placement and was interviewed in Jul 2021. There was 1 interview round.
Polymorphism is the ability of an object to take on many forms.
Polymorphism allows objects to be treated as if they are of multiple types.
It enables code to be written that can work with objects of different classes in a uniform way.
Polymorphism can be achieved through method overloading or method overriding.
Example: A shape class can have multiple subclasses like circle, square, triangle, etc. and all can be treated a...
Inheritance is a mechanism in object-oriented programming where a new class is created by inheriting properties of an existing class.
Inheritance allows for code reuse and promotes code organization.
The existing class is called the parent or superclass, and the new class is called the child or subclass.
The child class inherits all the properties and methods of the parent class, and can also add new properties and method...
I applied via Referral and was interviewed in Aug 2021. There were 2 interview rounds.
PHP, c , html and CSS , bootstrap
I applied via Company Website and was interviewed in Nov 2022. There were 3 interview rounds.
Online Aptitude test attending in desktop power system laptop general questions logitechnic questions
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
Business Associate
16
salaries
| ₹0 L/yr - ₹0 L/yr |
Management Trainee
6
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Business Associate
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Full Stack Developer
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
CoCubes Technologies
MeritTrac
Aspiring Minds
TalentSprint