Filter interviews by
I applied via campus placement at University of Mumbai, Mumbai and was interviewed in Sep 2023. There were 5 interview rounds.
Round 1 : Aptitude Round (MCQs)
Time : 1.5 Hour
Consist of 3 Sections
1. Quant ( 40 Questions - 60 Minutes )
2. Verbal ( 10 Questions - 15 Minutes )
3. Pseudocode and Language Related Questions ( 10 Question - 15 Minutes )
Topics for Quant: Percentages, Profit & Loss, Speed Distance & Time, Clocks & Angles, Probability, Permutation & Combination, Number System, Simple & Compound Interest, Ratio & Proportion, Letter Series, Number Series, Ages, Blood Relations, Area & Volumes
Topics for Verbal: Paragraphs, Vocabulary, Grammer
Topics for Pseudocode MCQs: C++/Java, Syntax, Variables, Error identification, If-else conditions, for/while/do-while loops, Arrays, Strings, Arithmetic Operations, Bytes, Logical Operators.
Languages - 4, Development - 3, Databases - 3
Proficient in Java and Python for development
Familiar with SQL for database management
Continuously learning new languages and technologies
Object Oriented Programming is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
OOP focuses on creating objects that interact with each other to solve problems.
Encapsulation, inheritance, and polymorphism are key principles of OOP.
Classes are used to create objects, which can have attributes (fields) and methods (functions).
Example: ...
Encapsulation, Inheritance, Polymorphism, Abstraction
Encapsulation: Bundling data and methods that operate on the data into a single unit
Inheritance: Ability of a class to inherit properties and behavior from another class
Polymorphism: Ability to present the same interface for different data types
Abstraction: Hiding the complex implementation details and showing only the necessary features
The 4 pillars refer to the key components of a consulting framework: problem solving, client management, team collaboration, and personal development.
Problem solving involves analyzing issues, developing solutions, and implementing strategies.
Client management focuses on building relationships, understanding needs, and delivering value.
Team collaboration requires effective communication, coordination, and leveraging di...
Structured Query Language (SQL) is a standard language for managing and manipulating databases.
SQL is used to communicate with databases to perform tasks such as querying data, updating data, and creating databases.
It is a declarative language, meaning users specify what they want to retrieve or modify without needing to specify how to do it.
Common SQL commands include SELECT, INSERT, UPDATE, DELETE, CREATE, and DROP.
S...
Union and intersection are set operations in mathematics.
Union of two sets includes all unique elements from both sets
Intersection of two sets includes only elements that are common to both sets
Example: Set A = {1, 2, 3} and Set B = {3, 4, 5}, Union of A and B = {1, 2, 3, 4, 5}, Intersection of A and B = {3}
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down data into smaller, more manageable tables
It helps in reducing data redundancy by storing data in a structured way
Normalization ensures data integrity by avoiding update anomalies
There are different normal forms like 1NF, 2NF, 3NF, and BCNF
Example: A customer table and an ord...
There are three forms of normalization in database design: 1NF, 2NF, and 3NF.
1NF (First Normal Form) - Ensures that each column in a table contains atomic values. No repeating groups of columns are allowed.
2NF (Second Normal Form) - Requires that the table is in 1NF and all non-key attributes are fully functional dependent on the primary key.
3NF (Third Normal Form) - Builds on 2NF by ensuring that there are no transiti
1NF is the first step in database normalization where each column in a table contains only atomic values.
Each column in a table must contain only a single value
Values in a column must be of the same data type
Each column must have a unique name
Example: A table with columns for student ID, name, and address
2NF is a database normalization form that ensures non-prime attributes are fully functionally dependent on the primary key.
In 2NF, a table is in 1NF and all non-key attributes are fully functionally dependent on the primary key.
It eliminates partial dependencies by moving non-prime attributes to a separate table.
For example, if we have a table with columns {Student ID, Course, Instructor}, where Course depends on Stude...
Partial dependency in 2NF can be removed by splitting the table into two separate tables.
Identify the attributes causing partial dependency in the table.
Create a new table with the partially dependent attributes along with the determinant attribute.
Link the new table to the original table using a foreign key.
Ensure each table now satisfies 2NF independently.
3NF is a database normalization technique that ensures data is stored in a table with no transitive dependencies.
Each non-prime attribute is non-transitively dependent on every super key.
Every non-prime attribute is fully functionally dependent on the primary key.
Helps in reducing data redundancy and improving data integrity.
Example: If a table has columns A, B, and C where B is functionally dependent on A, and C is fu...
Character functions are functions in programming that manipulate individual characters within a string.
Character functions can be used to convert characters to uppercase or lowercase.
They can also be used to check if a character is a digit or a letter.
Examples include functions like toupper(), tolower(), isdigit(), isalpha().
Character functions are used to manipulate individual characters in a string.
toupper(): Converts a character to uppercase
tolower(): Converts a character to lowercase
Number functions are mathematical operations that can be performed on numbers to manipulate or analyze data.
Number functions include addition, subtraction, multiplication, division, exponentiation, etc.
They can be used to perform calculations in various fields such as finance, engineering, and statistics.
Examples of number functions include finding the average of a set of numbers, calculating the square root, or determ
Number functions are mathematical operations that can be performed on numbers.
Two number functions include addition and subtraction.
Addition is the process of combining two or more numbers to get a total.
Subtraction is the process of taking one number away from another to find the difference.
SQL query to find MAXIMUM salary from the table
Use the SELECT statement to retrieve data
Use the MAX() function to find the maximum salary
Specify the column name for salary in the query
SQL query to find second maximum salary from a table.
Use the MAX function to find the highest salary
Use the WHERE clause to exclude the highest salary
Order the results in descending order and limit the output to 1
Create a SQL query to create a database with proper fields
Use CREATE DATABASE statement to create a new database
Specify the database name after CREATE DATABASE
Define the fields and their data types using CREATE TABLE statement
Object Oriented Programming is a programming paradigm based on the concept of objects, which can contain data and code.
OOP focuses on creating objects that interact with each other to solve problems
Encapsulation, inheritance, and polymorphism are key principles of OOP
Examples of OOP languages include Java, C++, and Python
Encapsulation, Inheritance, Polymorphism, Abstraction
Encapsulation: Bundling data and methods that operate on the data into a single unit
Inheritance: Ability of a class to inherit properties and behavior from another class
Polymorphism: Ability to present the same interface for different data types
Abstraction: Hiding the complex implementation details and showing only the necessary features
Abstraction is the process of hiding complex implementation details and showing only the necessary features of an object.
Abstraction allows us to focus on what an object does rather than how it does it.
It helps in reducing complexity and improving efficiency in software development.
Pseudocode example: abstract class Shape { abstract void draw(); }
In the example above, the Shape class is abstract and only defines th...
Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.
Encapsulation helps in hiding the internal state of an object and restricting access to it.
It allows for better control over the data by preventing direct access from outside the class.
Encapsulation is achieved in object-oriented programming languages through the use of access specifiers like public, private, and prote...
Inheritance is a concept in object-oriented programming where a class can inherit attributes and methods from another class.
Allows a class to inherit attributes and methods from another class
Promotes code reusability and reduces redundancy
Derived class can add its own unique attributes and methods
Examples: Parent class 'Animal' can have attributes like 'name' and methods like 'eat', and Child class 'Dog' can inherit th
There are 4 types of inheritance in object-oriented programming: single, multiple, multilevel, and hierarchical.
Single inheritance: a class inherits from only one base class.
Multiple inheritance: a class inherits from more than one base class.
Multilevel inheritance: a class inherits from a derived class, which in turn inherits from another class.
Hierarchical inheritance: multiple classes inherit from a single base clas
Explain them in short
Provide a concise explanation of a topic or concept
Avoid unnecessary details and focus on key points
Use clear and simple language to ensure understanding
Polymorphism is the ability of a single function or method to operate on different types of data.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
It enables a single interface to represent multiple data types.
Examples include method overloading and method overriding in object-oriented programming.
The regulatory authority of banks in India is the Reserve Bank of India (RBI).
Reserve Bank of India (RBI) is the central banking institution in India
RBI regulates the functioning of banks in India to ensure financial stability and prevent malpractices
It issues guidelines, policies, and regulations for banks to follow
Top trending discussions
posted on 17 Dec 2024
There were 45 questions in total: 20 questions on aptitude and 25 questions on basic C, C++, and Java.
I applied via Referral and was interviewed before Aug 2023. There were 4 interview rounds.
Java program to return prime numbers in a given range
Iterate through the given range and check if each number is prime
A prime number is a number that is only divisible by 1 and itself
Use a nested loop to check for divisibility by numbers less than the current number
Synchronization in Selenium ensures that the automation script waits for the web page to load completely before performing actions.
Use implicit wait to wait for a certain amount of time before throwing an exception
Use explicit wait to wait for a specific condition to be met before proceeding
Use fluent wait to wait for a specific condition with a polling frequency
driver.close() closes the current window, while driver.quit() closes all windows and ends the WebDriver session.
driver.close() closes the current window or tab in the browser.
driver.quit() closes all windows and tabs opened by the WebDriver and ends the WebDriver session.
driver.close() is used when you want to close a specific window, while driver.quit() is used when you want to close the entire browser session.
SOAP is a protocol, while REST is an architectural style for APIs.
SOAP is a protocol that uses XML for messaging and operates over HTTP, SMTP, etc.
REST is an architectural style that uses standard HTTP methods like GET, POST, PUT, DELETE.
SOAP is more rigid and requires more bandwidth, while REST is lightweight and flexible.
SOAP has built-in security features like WS-Security, while REST relies on external security meas...
HTTP methods are used to indicate the desired action to be performed on a resource.
GET - Retrieve data from a server
POST - Send data to a server to create/update a resource
PUT - Update a resource on the server
DELETE - Remove a resource from the server
PATCH - Update a resource partially
OPTIONS - Get information about the communication options available for a resource
HEAD - Retrieve headers from a server without the body
There were 2 coding question on the hacker rank platform , questions were easy , both were string and java related issue problem of DSA
Java program to count triplets in a given array
Create a nested loop to iterate through all possible triplets in the array
Use a counter to keep track of the number of triplets that satisfy the condition
Check if the sum of the triplet is equal to a given target value
Some common exceptions in Selenium include NoSuchElementException, ElementNotVisibleException, TimeoutException, StaleElementReferenceException.
NoSuchElementException occurs when an element could not be found in the DOM.
ElementNotVisibleException occurs when an element is present in the DOM but not visible on the page.
TimeoutException occurs when a command does not complete in the specified time.
StaleElementReferenceEx...
JSON Schema is a vocabulary that allows you to annotate and validate JSON documents.
JSON Schema defines the structure of JSON data
It provides clear guidelines on what data is allowed and how it should be structured
JSON Schema can be used to validate JSON data against a predefined schema
I have a strong technical background, excellent problem-solving skills, and a proven track record of delivering successful software solutions.
Extensive experience in software development and consulting
Strong problem-solving skills
Proven track record of delivering successful software solutions
Excellent communication and teamwork abilities
In the next 5 years, I see myself growing into a senior software consultant role, leading projects and mentoring junior team members.
Continuing to enhance my technical skills and knowledge in software development
Taking on more responsibilities in project management and client interactions
Mentoring and guiding junior team members to help them grow in their careers
Possibly pursuing certifications or advanced degrees to f...
Strength: Strong problem-solving skills. Weakness: Sometimes too detail-oriented.
Strength: Ability to quickly analyze complex problems and find effective solutions
Weakness: Can get caught up in minor details and lose sight of the bigger picture
Strength: Strong communication skills to explain technical concepts to non-technical stakeholders
Weakness: Difficulty delegating tasks and trusting others to complete them
Strengt...
posted on 19 Jan 2024
I applied via LinkedIn and was interviewed in Dec 2023. There were 2 interview rounds.
Basic Aptitude test and personality test, It's easy
Print diagonal elements in a 2D array and reverse a string without using an empty string.
Iterate through the rows and columns of the 2D array and print the elements where the row index is equal to the column index.
Iterate through the characters of the string from the last index to the first index and append each character to a new string.
posted on 6 Aug 2024
I was interviewed before Aug 2023.
Dsa question like pattern or any other basic dsa
posted on 30 Sep 2022
I applied via Walk-in and was interviewed before Sep 2021. There were 5 interview rounds.
General Aptitude and logical reasoning
About programming and basic programs with advanced program
Aptitude question, Coding question
posted on 5 Oct 2023
I was interviewed in Apr 2023.
Numeric ability test, Verbal ability test, Reasoning ability test.
To clear coding test, just need to solve 1 question out of 5, difficulty level of question - most of the time appear as (3 easy 2 medium) .
A LinkedList is a linear data structure where each element is a separate object with a reference to the next element.
Create a Node class with data and next pointer
Initialize LinkedList with a head node pointing to null
Implement methods like insert, delete, search, and traverse
Example: Node class {int data; Node next;}
Example: Insert method to add a new node at the end of the list
Bubble Sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Compare adjacent elements and swap if necessary
Repeat until no swaps are needed
Time complexity: O(n^2)
Space complexity: O(1)
Example: [5, 3, 8, 2, 1] -> [3, 5, 2, 1, 8] -> [3, 2, 1, 5, 8] -> [2, 1, 3, 5, 8] -> [1, 2, 3, 5, 8]
SQL query to find 2nd maximum salary from employee table
Use ORDER BY and LIMIT to get the second highest salary
SELECT salary FROM employee ORDER BY salary DESC LIMIT 1, 1
Hard level of coding
Machine learning algorithms are used to train models to make predictions or decisions based on data.
Machine learning algorithms can be supervised, unsupervised, or semi-supervised
Examples of machine learning algorithms include linear regression, decision trees, and neural networks
Machine learning algorithms require large amounts of data to train and improve accuracy
posted on 2 Dec 2024
I applied via Naukri.com and was interviewed before Dec 2023. There were 2 interview rounds.
Medium level stars pattern for programming
Interview experience
based on 1 review
Rating in categories
Product Consultant
37
salaries
| ₹4.2 L/yr - ₹8.7 L/yr |
Associate Consultant
32
salaries
| ₹5 L/yr - ₹6.8 L/yr |
Consultant
25
salaries
| ₹4.5 L/yr - ₹11 L/yr |
Software Engineer
23
salaries
| ₹4.8 L/yr - ₹9.2 L/yr |
Senior Consultant
23
salaries
| ₹11.5 L/yr - ₹23 L/yr |
Intellect Design Arena
Nelito System
Nucleus Software Exports
TCS