Filter interviews by
I appeared for an interview before Apr 2021.
Round duration - 90 minutes
Round difficulty - Medium
This round had 3 coding questions of Medium to Hard level of difficulty.
Given an integer N
representing the number of pairs of parentheses, find all the possible combinations of balanced parentheses using the given number of pairs.
Generate all possible combinations of balanced parentheses for a given number of pairs.
Use recursion to generate all possible combinations of balanced parentheses.
Keep track of the number of open and close parentheses used in each combination.
Return the valid combinations as an array of strings.
You are given a long type array/list ARR
of size N
, representing an elevation map. The value ARR[i]
denotes the elevation of the ith
bar. Your task is to determine th...
Calculate the total amount of rainwater that can be trapped between given elevations in an array.
Iterate through the array and calculate the maximum height on the left and right of each bar.
Calculate the amount of water that can be trapped at each bar by taking the minimum of the maximum heights on the left and right.
Sum up the trapped water at each bar to get the total trapped water for the entire array.
You are given a grid containing oranges where each cell of the grid can contain one of the three integer values:
Find the minimum time required to rot all fresh oranges adjacent to rotten oranges.
Create a queue to store the coordinates of rotten oranges and perform BFS to rot adjacent fresh oranges.
Track the time taken to rot all fresh oranges and return -1 if not all fresh oranges can be rotten.
Update the grid with the new state of oranges after each second.
Handle edge cases such as empty grid or no fresh oranges present.
Example...
Round duration - 60 Minutes
Round difficulty - Medium
This was a standard DS/Algo round where I was given 2 questions to solve under 60 minutes. I was able to come up with the optimal approach for both the questions and then at the end of the interview I was also asked the famous Die Hard Water Puzzle.
Design a queue data structure following the FIFO (First In First Out) principle using only stack instances.
Your task is to complete predefined functions t...
Implement a queue using stacks following FIFO principle.
Use two stacks to simulate a queue.
For enQueue operation, push elements onto stack1.
For deQueue operation, if stack2 is empty, pop all elements from stack1 and push onto stack2, then pop from stack2.
For peek operation, if stack2 is empty, pop all elements from stack1 and push onto stack2, then return top of stack2.
For isEmpty operation, check if both stack1 and st...
You are provided with 'N' intervals, each containing two integers denoting the start time and end time of the interval.
Your task is to merge all overlapping intervals a...
Merge overlapping intervals and return sorted list of merged intervals by start time.
Sort the intervals based on start time.
Iterate through intervals and merge overlapping ones.
Return the merged intervals in sorted order.
Round duration - 60 Minutes
Round difficulty - Medium
This round had 2 coding questions - first one related to Binary Tree and the second one was a simple question from Bit Manipulation. This was followed by some questions from OOPS.
You are given a Binary Tree, and you need to determine the length of the diameter of the tree.
The diameter of a binary tree is the length of the longest path betwe...
The task is to find the diameter of a binary tree, which is the length of the longest path between any two end nodes in the tree.
Traverse the tree to find the longest path between two nodes.
Keep track of the maximum diameter found during traversal.
The diameter may not necessarily pass through the root node.
Consider both left and right subtrees while calculating the diameter.
Example: For input 1 2 3 4 -1 5 6 -1 7 -1 -1
Determine if it is possible to reorder the digits of a given integer 'N' such that the resulting number is a power of two. The leading digit must not be zero.
The fir...
The problem involves determining if it is possible to reorder the digits of a given integer to form a power of 2.
Iterate through all possible permutations of the digits of the given integer.
Check if any of the permutations form a power of 2.
Return 1 if a valid permutation is found, else return 0.
Advantages of OOP include code reusability, modularity, and easier maintenance.
Code reusability: Objects can be reused in different parts of the program, reducing redundancy.
Modularity: OOP allows for breaking down complex problems into smaller, more manageable parts.
Easier maintenance: Changes to one part of the codebase do not necessarily affect other parts, making maintenance easier.
Encapsulation: Data hiding and ab...
Access specifiers define the level of access to class members in Object-Oriented Programming.
Access specifiers include public, private, protected, and default
Public members are accessible from outside the class
Private members are only accessible within the class
Protected members are accessible within the class and its subclasses
Default access is when no access specifier is specified
Round duration - 30 Minutes
Round difficulty - Easy
This was my last round and I hoped it to go good just like the other rounds. The interviewer was very straight to point
and professional. The interview lasted for 30 minutes.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
Queue can be implemented using two stacks by maintaining the order of elements in the stacks.
Create two stacks, let's call them stack1 and stack2
When an element is enqueued, push it to stack1
When an element is dequeued, pop all elements from stack1 and push them to stack2
Pop the top element from stack2 and return it as the dequeued element
If stack2 is empty, repeat step 3
To get the front element of the queue, peek the
Left join returns all records from left table and matching records from right table. Full outer join returns all records from both tables.
Left join is used to combine two tables based on a common column.
In left join, all records from the left table are returned along with matching records from the right table.
If there is no match in the right table, NULL values are returned.
Example: SELECT * FROM table1 LEFT JOIN table...
Magic functions are special methods in PHP that start with __. Autoloading is a way to automatically load classes.
Magic functions are used to handle certain events in PHP, such as object creation or property access.
Autoloading allows PHP to automatically load classes when they are needed, without requiring manual includes.
Magic functions can be used in conjunction with autoloading to dynamically load classes or handle
Given three sorted arrays, find common elements.
Create three pointers to traverse each array
Compare the elements at the pointers and move the pointer of the smallest element
If all pointers point to the same element, add it to the result and move all pointers
Repeat until any pointer reaches the end of its array
Check if a number is a power of 2 or not.
A power of 2 has only one bit set in its binary representation.
Use bitwise AND operator to check if the number is a power of 2.
If n is a power of 2, then n & (n-1) will be 0.
I appeared for an interview in Nov 2016.
I am a motivated and enthusiastic individual with a strong passion for learning and gaining practical experience in the field of [internship field].
I am currently pursuing a degree in [relevant field] at [university name].
I have completed various projects and coursework that have equipped me with skills in [relevant skills].
I am a quick learner and enjoy taking on new challenges.
I have a strong work ethic and am dedica...
My interested area is artificial intelligence and machine learning.
I have a strong passion for developing algorithms and models to solve complex problems.
I enjoy working with large datasets and finding patterns within them.
I have experience with programming languages such as Python and R for machine learning projects.
posted on 17 Aug 2016
I appeared for an interview in Jan 2016.
Machine learning is a subset of artificial intelligence that enables machines to learn from data without being explicitly programmed.
It involves training algorithms on large datasets to make predictions or decisions.
It can be supervised, unsupervised, or semi-supervised.
Examples include image recognition, natural language processing, and recommendation systems.
Prediction uses data analysis and statistical models to forecast future outcomes.
Prediction involves collecting and analyzing data to identify patterns and trends.
Statistical models are then used to make predictions based on the identified patterns.
Predictions can be made for a wide range of applications, such as weather forecasting, stock market trends, and customer behavior.
Accuracy of predictions can be improved by ...
Classification algorithms can be represented using flow charts.
Classification algorithms are used to categorize data into different classes.
Flow charts can be used to represent the decision-making process of classification algorithms.
Examples of classification algorithms include decision trees, k-nearest neighbors, and support vector machines.
Deadlocks are situations where two or more processes are unable to proceed because each is waiting for the other to release a resource.
Deadlocks occur when multiple processes are stuck in a circular waiting state.
Prevention techniques include resource allocation strategies, deadlock detection, and avoidance algorithms.
Examples of prevention techniques are using a resource allocation graph, implementing a banker's algor...
Banker's algorithm is a resource allocation and deadlock avoidance algorithm used in operating systems.
It is used to prevent deadlocks by ensuring that the system never enters an unsafe state.
It works by simulating the allocation of resources and checking if the system will remain in a safe state.
It requires knowledge of the maximum resource needs of each process and the currently available resources.
If a request for r...
Public and private IP addresses are used in computer networks. Public IPs are globally unique and accessible from the internet, while private IPs are used within a local network.
Public IP is assigned by the Internet Service Provider (ISP) and is used to identify a device on the internet.
Private IP is assigned by a local network administrator and is used to identify a device within a local network.
Public IPs are globall...
A message is transferred in OSI layer through a process called encapsulation and decapsulation.
The message is divided into smaller chunks called packets at the transport layer.
Each packet is then encapsulated with headers containing necessary information.
The encapsulated packets are then passed down to the network layer.
At the network layer, the packets are further encapsulated with network layer headers.
The encapsulat...
Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as the same type.
Polymorphism is achieved through method overriding and method overloading.
It allows for code reusability and flexibility in object-oriented programming.
Three conditions for polymorphism are inheritance, method overriding, and a common interface or base class.
Interoperability in inheritance and polymorphism allows objects of different classes to be used interchangeably.
Inheritance allows a subclass to inherit properties and methods from a superclass.
Polymorphism allows objects of different classes to be treated as if they are of the same class.
Interoperability between inheritance and polymorphism allows objects of different classes to be used interchangeably.
For example, a ...
Transaction logs are records of all the changes made to a database or file system.
They help in recovering data in case of system failure or errors.
They provide a history of all the transactions made to the database or file system.
They are used for auditing and compliance purposes.
Examples include SQL Server transaction logs, file system transaction logs, etc.
C is a procedural programming language while C++ is an object-oriented programming language.
C is a procedural programming language, meaning it focuses on procedures or functions.
C++ is an extension of C and adds object-oriented features like classes and inheritance.
C++ supports polymorphism, encapsulation, and abstraction, which C lacks.
C++ allows the use of standard template library (STL) for data structures and algor...
I have worked on various technologies including Java, Python, and SQL.
Java - used for developing enterprise-level applications
Python - used for scripting, web development, and data analysis
SQL - used for managing and querying databases
Thrashing is a phenomenon in computer systems where excessive swapping of data between RAM and virtual memory occurs.
Occurs when a computer spends more time swapping data between RAM and virtual memory than executing actual tasks
Can be caused by insufficient RAM or poorly optimized programs
Can lead to a significant decrease in system performance
Example: A computer running multiple memory-intensive programs simultaneous
Java is platform independent while C++ is not.
Java code is compiled into bytecode which can run on any platform with a JVM, while C++ code needs to be compiled separately for each platform.
Java has automatic memory management through garbage collection, while C++ requires manual memory management.
Java has built-in support for multithreading, while C++ requires external libraries.
Java has a simpler syntax and is easier ...
Persistence is important for storing data permanently and ensuring data integrity.
Persistent storage allows data to be saved even after the application is closed or the system is restarted.
It ensures data integrity by preventing data loss in case of system failures.
Persistent data can be accessed and shared across different sessions or devices.
Examples: databases, file systems, cloud storage.
I found the GD to be well-organized and productive.
The GD had a clear agenda and all participants were given equal opportunity to express their views.
The facilitator ensured that the discussion stayed on track and encouraged active participation.
I appreciated the diverse perspectives brought by the participants, which enriched the discussion.
Examples: One of the participants shared a real-life case study that added dep...
I rate my HR interview as positive overall, with room for improvement in certain areas.
Overall, I felt the HR interview was well-structured and professional.
I appreciated the opportunity to discuss my skills and experiences in depth.
However, I felt that some questions were repetitive and could have been more engaging.
I believe the interview process could benefit from more focus on technical skills and problem-solving a...
I would recommend John and Sarah for their strong technical skills and ability to work well in a team.
John has a deep understanding of algorithms and data structures, and consistently delivers high-quality code.
Sarah is a quick learner and has a knack for problem-solving, often coming up with innovative solutions.
Both John and Sarah have excellent communication skills and collaborate effectively with their peers.
Precompilation unit is a compiled code that can be reused by multiple source files.
Precompilation unit is created by the compiler from the source code.
It contains the compiled code of header files and other dependencies.
It can be reused by multiple source files, reducing compilation time.
It is also known as precompiled header or PCH.
Example: stdafx.h in Visual Studio is a precompiled header file.
posted on 15 Feb 2016
The first 50 prime numbers are...
Start with 2, the first prime number
Check each odd number greater than 2
Use trial division to check if a number is prime
Stop when you have found 50 prime numbers
Sorting a file within a range
Use a sorting algorithm like quicksort or mergesort
Read the file and store the data in an array or list
Sort the array or list within the given range
Write the sorted data back to the file
I am a passionate software engineer with experience in developing web applications using various technologies.
Experienced in developing web applications using HTML, CSS, JavaScript, and frameworks like React and Angular
Proficient in backend development with Node.js, Express, and MongoDB
Familiar with version control systems like Git and project management tools like Jira
posted on 27 Dec 2015
I am a passionate software engineer with experience in developing web applications and a strong background in computer science.
Experienced in developing web applications using technologies such as HTML, CSS, JavaScript, and React
Strong background in computer science with knowledge in algorithms and data structures
Passionate about learning new technologies and solving complex problems
I have worked on various projects including a web application for inventory management and a mobile app for fitness tracking.
Developed a web application using React for inventory management
Created a mobile app using Flutter for fitness tracking
Implemented RESTful APIs for communication between frontend and backend systems
My area of interest is artificial intelligence and machine learning.
I have experience in developing machine learning models for predictive analytics.
I am interested in natural language processing and computer vision applications.
I enjoy exploring deep learning algorithms and neural networks.
I have worked on projects involving recommendation systems and image recognition.
C++ is a high-level programming language with features like object-oriented programming, templates, and memory management.
C++ supports object-oriented programming concepts like encapsulation, inheritance, and polymorphism.
Templates allow generic programming and code reusability.
C++ provides low-level memory manipulation through pointers.
Standard Template Library (STL) provides a collection of classes and functions for ...
Big Data refers to large and complex data sets that cannot be processed using traditional data processing methods.
Big Data is characterized by the 3Vs - Volume, Velocity, and Variety.
It requires specialized tools and technologies such as Hadoop, Spark, and NoSQL databases.
Examples of Big Data include social media data, sensor data, and financial market data.
Program to reverse a string without using string function
Iterate through the string from end to start and append each character to a new string
Use a loop to swap the first and last characters, then move towards the middle until the entire string is reversed
Convert the string to a character array, then swap the first and last elements until the entire array is reversed
I was responsible for designing and implementing the project's database and backend functionality.
Designed the database schema and created the necessary tables
Implemented the backend functionality using Java and Spring framework
Collaborated with team members to integrate the frontend and backend components
Tested the application and fixed any bugs or issues that arose
Presented the project to the faculty and received pos
Keys in a database are unique identifiers used to establish relationships between tables and ensure data integrity.
Keys are used to uniquely identify records in a database table.
Primary keys are used to uniquely identify each record in a table.
Foreign keys establish relationships between tables.
Keys help enforce data integrity and maintain consistency in the database.
Examples of keys include primary keys, foreign keys,
Issues in cloud include security, downtime, vendor lock-in, and data privacy.
Security concerns such as data breaches and unauthorized access
Downtime and service interruptions affecting business operations
Vendor lock-in and limited flexibility in choosing cloud providers
Data privacy and compliance with regulations such as GDPR and HIPAA
Developed a web application for online shopping using React and Node.js
Implemented user authentication and authorization using JSON Web Tokens (JWT)
Used MongoDB as the database to store user and product information
Implemented a search feature using Elasticsearch to provide fast and accurate search results
Integrated Stripe payment gateway for secure online transactions
The flow diagram of my final year project showcases the step-by-step process of its execution.
The flow diagram illustrates the sequence of activities and their dependencies.
It helps in understanding the overall structure and logic of the project.
Each step in the diagram represents a specific task or action.
Arrows indicate the flow of control or data between different steps.
Decision points are represented by diamond-sha...
Normalisation reduces data redundancy and improves data integrity in a database.
Prevents data duplication and inconsistencies
Simplifies database maintenance and updates
Improves query performance
Enforces data integrity and consistency
Follows best practices for database design
Examples: breaking down a customer table into separate tables for orders, addresses, and payments
Examples: creating a separate table for product ca...
I am a passionate software engineer with experience in developing web applications and a strong background in computer science.
Experienced in developing web applications using technologies like HTML, CSS, JavaScript, and React
Strong background in computer science with knowledge of algorithms and data structures
Familiar with agile development methodologies and version control systems like Git
I am a problem solver, team player, quick learner, detail-oriented, and have strong communication skills.
Problem solver - I enjoy tackling complex problems and finding innovative solutions.
Team player - I work well with others and value collaboration in achieving goals.
Quick learner - I am able to pick up new technologies and concepts quickly.
Detail-oriented - I pay attention to the smallest details to ensure high-qual...
Yes, I have a Bachelor's degree in Computer Engineering.
Bachelor's degree in Computer Engineering
Experience in software development
Knowledge of engineering principles applied to software design
My day was productive and challenging, with a lot of problem-solving and collaboration.
Completed a major coding project ahead of schedule
Participated in a brainstorming session with team members
Solved a tricky bug in the codebase
Attended a virtual meeting with stakeholders
No, I do not have any relatives in Pune. I have arranged for my accommodation in a rented apartment near the office.
No relatives in Pune
Accommodation arranged in a rented apartment near the office
Yes, My Passion Challenge test is a coding competition for software engineers.
My Passion Challenge test is a coding competition that evaluates the coding skills of software engineers.
It is designed to test problem-solving abilities, algorithmic thinking, and coding proficiency.
Participants are given a set of coding challenges to solve within a specified time limit.
The challenges can range from simple to complex, coveri...
Considering pursuing a Master's degree in Computer Science to deepen knowledge and advance career.
Considering pursuing a Master's degree in Computer Science
To deepen knowledge and advance career
Examples: MS in Computer Science at XYZ University, online courses in AI and Machine Learning
posted on 21 Mar 2015
based on 1 interview
Interview experience
Lab Technician
43
salaries
| ₹1 L/yr - ₹3 L/yr |
Data Entry Operator
10
salaries
| ₹1.8 L/yr - ₹2.5 L/yr |
Medical Laboratory Technician
9
salaries
| ₹1.2 L/yr - ₹3.5 L/yr |
Molecular Biologist
5
salaries
| ₹1.5 L/yr - ₹3.5 L/yr |
Administration Executive
4
salaries
| ₹1.3 L/yr - ₹2.2 L/yr |
Optum Global Solutions
IQVIA
Persistent Systems
Hetero