Filter interviews by
I applied via Referral and was interviewed before Jun 2022. There were 6 interview rounds.
I was given 10 records to research within 15 minutes on excel.
Management was discussing about the organisation objectives and goals
I applied via Campus Placement and was interviewed in Jan 2016. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.
To find a loop in a linked list, we use Floyd's cycle-finding algorithm.
Floyd's cycle-finding algorithm uses two pointers, one moving at twice the speed of the other.
If there is a loop in the linked list, the two pointers will eventually meet.
To detect the meeting point, we reset one of the pointers to the head of the linked list and move both pointers at the same speed.
The meeting point is the start of the loop.
LRU, MRU and LFU are caching algorithms used to manage memory in computer systems.
LRU stands for Least Recently Used and removes the least recently used items from the cache when the cache is full.
MRU stands for Most Recently Used and removes the most recently used items from the cache when the cache is full.
LFU stands for Least Frequently Used and removes the least frequently used items from the cache when the cache i...
posted on 7 May 2017
I was interviewed in Feb 2017.
I was interviewed before May 2016.
I applied via Referral and was interviewed before Apr 2021. There was 1 interview round.
I applied via Referral and was interviewed before May 2023. There were 2 interview rounds.
To resolve space issue with GET API request, consider pagination, compression, caching, and optimizing query parameters.
Implement pagination to limit the number of results returned in each request.
Use compression techniques like Gzip to reduce the size of the response data.
Implement caching mechanisms to store frequently accessed data and reduce the number of requests.
Optimize query parameters to only request necessary
Malware refers to any software designed to harm or exploit any device or network.
Malware is a broad term that includes viruses, worms, trojans, ransomware, spyware, adware, and more.
Viruses are malicious programs that replicate themselves and infect other files on the device.
Worms are self-replicating malware that spread through networks.
Trojans are disguised as legitimate software but contain malicious code.
Ransomware...
posted on 18 Jul 2024
I applied via Naukri.com and was interviewed before Jul 2023. There were 2 interview rounds.
IPC mechanism in Windows allows communication between processes through shared memory, message passing, and synchronization.
IPC mechanisms in Windows include named pipes, mailslots, shared memory, and sockets.
Named pipes allow communication between processes on the same machine or over a network.
Mailslots are used for one-way interprocess communication.
Shared memory allows processes to share data by mapping a region of...
Multi-threading in Windows allows multiple threads to run concurrently within a single process.
Windows provides APIs like CreateThread and CreateProcess to create and manage threads.
Threads share the same memory space within a process, allowing for efficient communication and resource sharing.
Windows supports both user-mode and kernel-mode threads, with user-mode threads being more lightweight.
Synchronization mechanism...
Memory mapping in Windows allows files to be mapped directly into memory for faster access and manipulation.
Memory mapping allows files to be accessed as if they were in memory
File mapping can be used for sharing data between processes
Improves performance by reducing disk I/O operations
Examples: CreateFileMapping, MapViewOfFile, UnmapViewOfFile
Critical section in Windows is a synchronization mechanism used to protect shared resources from concurrent access.
Critical sections are used to ensure mutual exclusion between threads accessing shared resources.
They are implemented using the Windows API functions InitializeCriticalSection, EnterCriticalSection, and LeaveCriticalSection.
Critical sections are more efficient than mutexes for synchronization within a sing...
based on 7 reviews
Rating in categories
Team Lead
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Data Mining Specialist
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Marketing and Operations Executive
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Marketing Manager
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Event Manager
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Cybermedia
Data Security Council of India
Network Intelligence India
K7 Computing