i
InMobi
Filter interviews by
Polyfill of promise is a code that adds support for promises in older browsers.
Polyfill is used to fill in the gaps in browser support for certain features.
For promises, a polyfill can be used to provide support in older browsers that do not natively support promises.
Popular promise polyfills include 'es6-promise' and 'bluebird'.
Types of encryption include symmetric encryption, asymmetric encryption, and hashing.
Symmetric encryption: Uses the same key for both encryption and decryption, examples include AES and DES.
Asymmetric encryption: Uses a pair of public and private keys for encryption and decryption, examples include RSA and ECC.
Hashing: Converts data into a fixed-size string of bytes, examples include MD5 and SHA.
Implement a stack that supports push, pop, and retrieving the most frequent element efficiently.
Use a hash map to count frequencies of elements.
Maintain a stack for each frequency level to store elements.
When pushing, update the frequency and push to the corresponding stack.
When popping, retrieve from the highest frequency stack and update counts.
Example: Push(5), Push(7), Push(5) results in frequency {5: 2, 7: 1}...
Calculate the minimum number of platforms needed at a train station based on arrival and departure times.
Sort arrival and departure times.
Use a two-pointer technique to track platforms needed.
Increment platform count on arrival and decrement on departure.
Example: For arrivals [10:00, 10:15] and departures [10:30, 10:45], 1 platform is needed.
Find the maximum sum of a circular subarray in a given array of integers.
Use Kadane's algorithm to find the maximum subarray sum in a non-circular manner.
Calculate the total sum of the array and apply Kadane's algorithm to find the minimum subarray sum.
The maximum circular subarray sum can be found as: max(max_subarray_sum, total_sum - min_subarray_sum).
Example: For array [1, -2, 3, -2], max subarray sum is 3, and...
Query to find nth highest salary in SQL
Use the ORDER BY clause to sort the salaries in descending order
Use the DISTINCT keyword to eliminate duplicates
Use LIMIT and OFFSET to get the nth highest salary
To take the Rajasthani Shoe business from online to offline, a multi-channel approach can be adopted.
Establish physical stores in key locations to increase accessibility and visibility.
Collaborate with local retailers or distributors to expand the offline presence.
Organize pop-up shops or participate in trade shows to showcase the products.
Implement effective marketing strategies to create awareness about the offl...
Apple i-Pad is a success.
The i-Pad has sold over 500 million units worldwide.
It has revolutionized the tablet market and set the standard for other companies.
The i-Pad has been used in various industries such as education, healthcare, and entertainment.
Apple continues to release new and improved versions of the i-Pad, showing its success.
The i-Pad has also contributed significantly to Apple's revenue and profits.
Design a feature for ad publishers to define restrictions on ad content.
Create a user-friendly interface for publishers to set their content restrictions.
Allow publishers to select specific categories of restricted content (e.g. porn, alcohol, violence).
Implement a keyword-based filtering system to identify restricted content.
Provide an option for publishers to upload custom lists of restricted keywords.
Offer a pr...
The sort order algorithm for an e-commerce search page determines the arrangement of products based on relevance to the search query.
The algorithm should consider factors like product popularity, customer ratings, and relevance to the search query.
It should prioritize products that closely match the search query and have higher ratings or popularity.
The algorithm can also take into account other factors like price...
Remove all duplicates from a linked list of integers
Traverse the linked list and keep track of seen values using a hash set
If a value is already in the hash set, remove the node from the linked list
Time complexity: O(n), Space complexity: O(n)
Implement a queue using stack
Use two stacks, one for enqueue and one for dequeue
When enqueueing, push onto the enqueue stack
When dequeueing, pop from the dequeue stack
If the dequeue stack is empty, transfer all elements from enqueue stack to dequeue stack
Design a class for a math quiz game with random numbers, timer, score, and retry option.
Create a class with two random number generators and a random mathematical operation
Implement a timer and score tracker
If user answers correctly, generate a new question, else allow user to retry
Examples of mathematical operations: addition, subtraction, multiplication, division
Examples of retry options: allow user to see correct an...
A function to transform one string into another by changing one character at a time, ensuring each transformation results in a valid English word.
Use a breadth-first search algorithm to explore all possible transformations
Create a dictionary of valid English words to check against
Track visited words to avoid repeating transformations
Return the shortest path of transformations from the starting string to the target stri...
Print all paths from 0,0 to n,n in a matrix of n*n by increasing x or y coordinate.
Use recursion to traverse through all possible paths
At each step, check if moving right is possible, if yes, move right and add 'R' to path
Similarly, check if moving down is possible, if yes, move down and add 'D' to path
If current position is (n-1, n-1), print the path
Backtrack to previous position and remove last added direction from p...
I applied via Referral and was interviewed in Nov 2024. There was 1 interview round.
Polyfill of promise is a code that adds support for promises in older browsers.
Polyfill is used to fill in the gaps in browser support for certain features.
For promises, a polyfill can be used to provide support in older browsers that do not natively support promises.
Popular promise polyfills include 'es6-promise' and 'bluebird'.
Leetcode easy-medium
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Cyber security involves implementing measures to prevent unauthorized access, data breaches, and other cyber threats.
It includes technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
Examples of cyber security measures include firewalls, ant...
Types of encryption include symmetric encryption, asymmetric encryption, and hashing.
Symmetric encryption: Uses the same key for both encryption and decryption, examples include AES and DES.
Asymmetric encryption: Uses a pair of public and private keys for encryption and decryption, examples include RSA and ECC.
Hashing: Converts data into a fixed-size string of bytes, examples include MD5 and SHA.
I applied via Referral and was interviewed in May 2024. There were 2 interview rounds.
Find the maximum sum of a circular subarray in a given array of integers.
Use Kadane's algorithm to find the maximum subarray sum in a non-circular manner.
Calculate the total sum of the array and apply Kadane's algorithm to find the minimum subarray sum.
The maximum circular subarray sum can be found as: max(max_subarray_sum, total_sum - min_subarray_sum).
Example: For array [1, -2, 3, -2], max subarray sum is 3, and circ...
Implement a stack that supports push, pop, and retrieving the most frequent element efficiently.
Use a hash map to count frequencies of elements.
Maintain a stack for each frequency level to store elements.
When pushing, update the frequency and push to the corresponding stack.
When popping, retrieve from the highest frequency stack and update counts.
Example: Push(5), Push(7), Push(5) results in frequency {5: 2, 7: 1}.
Calculate the minimum number of platforms needed at a train station based on arrival and departure times.
Sort arrival and departure times.
Use a two-pointer technique to track platforms needed.
Increment platform count on arrival and decrement on departure.
Example: For arrivals [10:00, 10:15] and departures [10:30, 10:45], 1 platform is needed.
I applied via Referral and was interviewed in Mar 2024. There was 1 interview round.
I applied via Referral and was interviewed in Mar 2024. There were 2 interview rounds.
Top trending discussions
Some of the top questions asked at the InMobi interview -
The duration of InMobi interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 25 interview experiences
Difficulty level
Duration
based on 195 reviews
Rating in categories
Accounts Manager
51
salaries
| ₹9.1 L/yr - ₹19 L/yr |
Senior Analyst
47
salaries
| ₹8 L/yr - ₹23 L/yr |
Software Development Engineer II
42
salaries
| ₹18.5 L/yr - ₹45 L/yr |
Senior Software Engineer
38
salaries
| ₹18 L/yr - ₹65 L/yr |
Analyst
36
salaries
| ₹6.2 L/yr - ₹11 L/yr |
R.R. Donnelley
Epsilon
Denave
Smollan Group