i
GlobalLogic
Filter interviews by
I applied via Referral and was interviewed in Nov 2023. There was 1 interview round.
posted on 12 Jun 2022
To find 2 unique numbers in an array with others occurring twice.
Iterate through the array and use a hash table to count the occurrences of each number.
Iterate through the hash table and find the two numbers with a count of 1.
Return the two unique numbers as an array of strings.
Allocate minimum number of pages
Determine the total content to be included
Decide on the layout and formatting
Consider the font size and spacing
Allocate pages based on the above factors
I applied via Recruitment Consulltant and was interviewed before Mar 2022. There were 2 interview rounds.
An UI for food applications should be user-friendly, visually appealing, and easy to navigate.
Include high-quality images of food items
Use a simple and intuitive layout
Allow users to easily search for specific foods or restaurants
Include filters for dietary restrictions or preferences
Provide clear and concise information about each food item, including ingredients and nutritional information
What people are saying about GlobalLogic
I applied via Referral and was interviewed before Nov 2019. There were 4 interview rounds.
Special variables in Shell Scripting
Special variables are predefined variables in shell scripts
They provide information about the script and its environment
Examples include $0 (name of the script), $1-$9 (arguments passed to the script), and $# (number of arguments)
Other special variables include $?, $$ (process ID of the script), and $! (process ID of the last background command)
SED and AWK are Linux commands used for text processing and manipulation.
SED stands for Stream Editor and is used for performing basic text transformations on an input stream
AWK is a programming language used for text processing and data extraction
SED can be used for tasks such as search and replace, inserting or deleting lines, and more
AWK can be used for tasks such as filtering and sorting data, performing calculatio...
Daemons are background processes that run continuously on a computer system.
Daemons are usually started at system boot time
They perform tasks such as handling requests from other programs or monitoring system activity
Examples include web servers, email servers, and print spoolers
Linux architecture consists of kernel, system libraries, user space programs and file system.
Linux architecture is based on a monolithic kernel.
The kernel provides low-level hardware interaction and manages system resources.
System libraries provide higher-level functionality to user space programs.
User space programs are applications that run on top of the kernel.
The file system organizes and stores data on the system.
...
ACID properties ensure database transactions are reliable. Normalization reduces data redundancy.
ACID stands for Atomicity, Consistency, Isolation, and Durability.
Atomicity ensures that a transaction is treated as a single unit of work.
Consistency ensures that a transaction brings the database from one valid state to another.
Isolation ensures that concurrent transactions do not interfere with each other.
Durability ensu...
GlobalLogic interview questions for designations
I applied via Naukri.com and was interviewed in Aug 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed before Feb 2020. There were 6 interview rounds.
I applied via Company Website and was interviewed before Feb 2020. There was 1 interview round.
I applied via Campus Placement and was interviewed in Oct 2020. There were 4 interview rounds.
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Start from the first element and compare it with the next element
If the next element is smaller, swap them
Repeat this process for all elements in the array
Continue this process until no more swaps are needed
A program to print all prime numbers
Take input from user for range of numbers
Loop through the range and check if each number is prime
Print the prime numbers
Hashmap is a data structure that stores key-value pairs and allows constant time access to values based on their keys.
Hashmap uses a hash function to map keys to indices in an array.
Collisions can occur when multiple keys map to the same index, which can be resolved using techniques like chaining or open addressing.
Examples of hashmap implementations include Java's HashMap class and Python's dict type.
Inheritance is a mechanism in object-oriented programming where a new class is created by inheriting properties of an existing class.
Inheritance allows code reuse and promotes code organization.
The existing class is called the parent or superclass, and the new class is called the child or subclass.
The child class inherits all the properties and methods of the parent class and can also add new properties and methods.
For...
I applied via Walk-in and was interviewed in Mar 2021. There was 1 interview round.
based on 2 interviews
Interview experience
based on 17 reviews
Rating in categories
Associate Analyst
3.9k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
3.3k
salaries
| ₹0 L/yr - ₹0 L/yr |
Analyst
3.1k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
3k
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Consultant
2.8k
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Wipro
Infosys
HCLTech