Filter interviews by
I applied via Referral and was interviewed before Aug 2021. There were 2 interview rounds.
Top trending discussions
Algorithms for manipulating arrays and strings in coding
Use sorting algorithms like quicksort and mergesort for arrays
Use string manipulation functions like substring and replace for strings
Use dynamic programming for optimizing solutions to array and string problems
Designing a large scale Ad Server
Use distributed systems for scalability
Implement caching for faster ad delivery
Ensure high availability and fault tolerance
Use real-time bidding for efficient ad placement
Implement fraud detection mechanisms
Ensure compliance with privacy regulations
I applied via Campus Placement
I am an avid traveler and have visited over 20 countries
I love experiencing new cultures and trying new foods
I have backpacked through Europe and Asia
I have volunteered in orphanages in Cambodia and Nepal
Mobile advertising platform
Adtech
Mobile marketing
App monetization
Probability of a horse going out of a chessboard in 'n' steps.
The total number of possible moves for a horse is 8.
The probability of going out of the board depends on the position of the horse.
For example, if the horse is at a corner, the probability of going out of the board is higher.
The probability can be calculated using combinatorics and geometry.
Maximum sub sequence sum in an array
Use Kadane's algorithm
Initialize max_so_far and max_ending_here to 0
Iterate through the array and update max_ending_here and max_so_far
Return max_so_far
Endianness refers to the byte order of a system. It determines how multi-byte data types are stored in memory.
Little-endian systems store the least significant byte first, while big-endian systems store the most significant byte first.
Endianness can affect the way data is transmitted between systems.
To determine the endianness of a system, you can use the byte order mark (BOM) or write a test program that checks the by...
Sort an array of 0's and 1's only.
Use two pointers, one at the beginning and one at the end of the array.
Swap 0's from the beginning with 1's from the end until the pointers meet.
Alternatively, use a counting sort algorithm to count the number of 0's and 1's and then reconstruct the array.
Heaps are data structures used to efficiently find the maximum or minimum element in a collection.
Max heap: parent nodes are always greater than or equal to child nodes
Min heap: parent nodes are always smaller than or equal to child nodes
Heaps are commonly used in priority queues and sorting algorithms
Heap operations include insert, delete, and extract max/min
Example: An array [3, 8, 2, 5, 1, 4, 6] can be represented a
Find 3 numbers in an array where a+b=c.
Loop through the array and check for all possible combinations of a and b.
Use a hash table to store the values of a and b, and check if c is present in the hash table.
Sort the array and use two pointers to find a and b, and then check if their sum equals c.
The program capitalizes the first letter of each reversed word in a sentence.
Split the sentence into an array of words using space as a delimiter.
Reverse each word in the array and capitalize the first letter.
Join the modified words back into a sentence.
I applied via Recruitment Consulltant and was interviewed before May 2021. There were 2 interview rounds.
The end to end implementation cycle of ISMS involves planning, implementation, monitoring, review, and improvement.
Planning involves identifying the scope, objectives, and risks of the ISMS.
Implementation involves designing and implementing controls to mitigate identified risks.
Monitoring involves regular checks to ensure the controls are effective.
Review involves assessing the effectiveness of the ISMS and identifying...
Risk assessment involves identifying, analyzing, and evaluating potential risks to determine the likelihood and impact of those risks.
Identify potential risks
Analyze the likelihood and impact of each risk
Evaluate the risks to determine their priority
Develop a plan to mitigate or manage the risks
Monitor and review the risks regularly
Annex A controls are the information security controls listed in ISO 27001 standard.
Annex A contains 114 controls categorized into 14 sections.
These controls are designed to ensure the confidentiality, integrity, and availability of information.
Examples of controls include access control, asset management, cryptography, incident management, and more.
Organizations must select and implement controls based on their risk a...
I applied via Indeed and was interviewed in Mar 2023. There were 3 interview rounds.
I am a software developer with a passion for creating efficient and user-friendly applications.
Proficient in multiple programming languages such as Java, C++, and Python
Experience in developing web applications using HTML, CSS, and JavaScript
Strong problem-solving and analytical skills
Familiarity with agile development methodologies
Excellent communication and teamwork abilities
I have 5 years of experience as a Software Developer and I want to switch to explore new technologies and challenges.
I have 5 years of experience as a Software Developer.
I have gained expertise in various programming languages and frameworks.
I have successfully delivered multiple projects and contributed to their success.
I want to switch to explore new technologies and challenges.
I believe switching will help me enhanc
Simple basic code for Form data
posted on 27 Oct 2021
I applied via Recruitment Consultant and was interviewed in Apr 2021. There were 4 interview rounds.
Scope of variable in Perl determines where the variable can be accessed.
Perl has three types of variable scope: global, local, and lexical.
Global variables can be accessed from anywhere in the program.
Local variables are declared using the 'my' keyword and can only be accessed within the block they are declared in.
Lexical variables are declared using the 'state' keyword and can be accessed within the block they are dec...
Hash is a data structure that stores data in key-value pairs while array is an ordered list of scalar values.
Hashes are denoted by % symbol and arrays by @ symbol in Perl.
Hashes are useful for storing and retrieving data quickly based on a unique key.
Arrays can be accessed using index numbers starting from 0.
Both hashes and arrays can store different data types such as strings, numbers, and references.
Example: %hash = ...
CDATA is a way to include special characters in XML data without causing parsing errors.
CDATA stands for Character Data
It is used to include data that contains characters that would otherwise be interpreted as XML markup
CDATA is enclosed in tags
Example:
posted on 29 Jul 2024
I applied via Approached by Company and was interviewed in Jun 2024. There was 1 interview round.
Pivoting columns in SQL involves transforming rows into columns to display data in a different format.
Use the PIVOT keyword in SQL to pivot columns
Specify the columns to pivot on and the values to display in the new columns
Aggregate functions like SUM, AVG, COUNT can be used with PIVOT
Example: SELECT * FROM table_name PIVOT (SUM(value_column) FOR pivot_column IN ('value1', 'value2', 'value3'))
based on 4 reviews
Rating in categories
Software Engineer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Web Developer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
UI Developer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Product Manager
3
salaries
| ₹0 L/yr - ₹0 L/yr |
R.R. Donnelley
Denave
Smollan Group
Echobooom Management & Entrepreneurial Solutions