Filter interviews by
I applied via Company Website and was interviewed before Sep 2021. There were 2 interview rounds.
The number of bits transferred for a given baud rate depends on the duration of each bit.
Baud rate is the number of signal changes per second
The duration of each bit is the reciprocal of the baud rate
Higher baud rates transfer more bits per second
Top trending discussions
I was interviewed in Dec 2024.
C and c++ collectively 20 questions.14 is my achievement by the grace of Allah and his messager(S.A.W) peace be upon him.
Hashing is a technique used to map data to a fixed-size array, collision occurs when two different inputs produce the same hash value.
Hashing involves using a hash function to map data to a fixed-size array.
Collision happens when two different inputs produce the same hash value.
Common techniques to handle collisions include chaining and open addressing.
No, time complexity of HashMap is not always O(1).
Time complexity of HashMap is O(1) on average, but can degrade to O(n) in worst case scenarios.
Worst case scenarios include hash collisions, which can lead to linear probing and degrade performance.
Load factor and capacity of the HashMap can also affect time complexity.
In scenarios where many keys hash to the same index, the time complexity can degrade.
I applied via Approached by Company and was interviewed in Oct 2024. There were 2 interview rounds.
1 dsa question 1 sql and 18 mcq questions
RISC stands for Reduced Instruction Set Computing and CISC stands for Complex Instruction Set Computing.
RISC processors have a smaller set of simple instructions, while CISC processors have a larger set of complex instructions.
RISC processors typically execute instructions in one clock cycle, while CISC processors may require multiple clock cycles.
RISC processors rely on optimizing compilers for performance, while CISC...
Interpreter translates code line by line while compiler translates entire code at once.
Interpreter: translates code line by line, slower execution, easier debugging (e.g. Python)
Compiler: translates entire code at once, faster execution, harder debugging (e.g. C++)
I applied via Referral and was interviewed in Jan 2024. There were 2 interview rounds.
Create a program for string manipulation using an array of strings.
Use built-in string manipulation functions like substring, replace, and concat.
Iterate through the array of strings to perform different manipulations.
Consider edge cases like empty strings or null values.
Example: Reverse each string in the array and concatenate them together.
HashMap is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
To retrieve a value, the key is hashed again to fi...
posted on 28 Mar 2024
SDLC stands for Software Development Life Cycle, which is a process used by software development teams to design, develop, and test high-quality software.
SDLC consists of several phases including planning, analysis, design, implementation, testing, and maintenance.
Each phase has its own set of activities and deliverables to ensure the software meets the requirements and quality standards.
Examples of SDLC models include...
CAN protocol is a communication standard used in automotive and industrial applications.
CAN protocol stands for Controller Area Network
It is a message-based protocol used for communication between electronic control units (ECUs)
CAN protocol allows for high-speed communication and real-time data transmission
It is commonly used in automotive applications for functions such as engine control, transmission control, and bod...
posted on 9 Dec 2024
Tree algorithm about some riddels
posted on 11 Sep 2023
InterGlobe Aviation
Tata Advanced Systems
Hindustan Aeronautics
Serco