i
Intellect Design Arena
Filter interviews by
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
Coding test with MCQs
I applied via campus placement at KJ Somaiya Institute of Engineering and Information Technology and was interviewed before Jan 2023. There were 4 interview rounds.
2-3 coding questions based on DSA
It was a basic SHL test
I applied via Campus Placement and was interviewed in Aug 2021. There were 4 interview rounds.
A pointer is a variable that stores the memory address of another variable.
Pointers are used to manipulate memory directly.
They can be used to pass large data structures to functions without copying them.
Pointers can be used to create dynamic data structures like linked lists and trees.
They can also be used to access hardware directly.
Examples of pointer types include int*, char*, and void*.
Swap 2 numbers without using 3rd variable
Use addition and subtraction
Use multiplication and division
Use bitwise XOR operation
Answering Fibonacci series with and without recursion
Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones
Recursion method involves calling the function within itself
Non-recursive method involves using a loop to calculate the series
Recursive method is slower and can cause stack overflow for large inputs
Non-recursive method is faster and more efficient for large inputs
Print series of prime numbers
Start with 2 as the first prime number
Check if each number greater than 2 is divisible by any number less than it
If not, add it to the list of prime numbers
Continue until desired number of primes are found
posted on 16 Jun 2022
I applied via Approached by Company and was interviewed in Dec 2021. There were 2 interview rounds.
Communication skills
posted on 10 Sep 2020
I applied via Referral and was interviewed in Mar 2020. There were 4 interview rounds.
Data Integrity refers to the accuracy and consistency of data throughout its lifecycle.
Ensuring data is not corrupted or modified without authorization
Maintaining data accuracy and consistency through proper storage and retrieval
Preventing data loss or unauthorized access
Examples: checksums, encryption, access controls
posted on 14 Jan 2015
posted on 3 Apr 2015
posted on 25 Apr 2015
posted on 5 Jul 2015
Code for subtitle syncing application
Create a function to parse subtitle file and extract time stamps
Create a function to parse video file and extract time stamps
Calculate time difference between subtitle and video time stamps
Adjust subtitle time stamps accordingly
Output synced subtitle file
Design ADT for chess game classes
Create classes for pieces (king, queen, etc.), board, player, game
Use inheritance to represent different types of pieces
Implement methods for moving pieces, checking for checkmate, etc.
Microsoft is a leader in technology innovation and provides a challenging and rewarding work environment.
Microsoft is a well-established and respected company in the tech industry
The company is known for its cutting-edge technology and innovation
Working at Microsoft offers opportunities for growth and development
The company culture values diversity and inclusion
Microsoft has a strong commitment to social responsibility
Yes, I left Barclays to join Microsoft.
I was looking for new challenges and opportunities to grow my skills.
Microsoft offered a more dynamic and innovative work environment.
I was excited about the potential to work on cutting-edge technology and make a real impact.
I had always admired Microsoft's commitment to innovation and customer satisfaction.
I believe in continuous learning and improvement, and strive to bring innovative solutions to the table.
I am always looking for ways to improve my skills and knowledge
I am proactive in identifying and solving problems
I am a team player and collaborate effectively with my colleagues
I am committed to delivering high-quality work and meeting deadlines
I am adaptable and able to work in a fast-paced environment
AI logic for Chess representation
Implement minimax algorithm with alpha-beta pruning
Use evaluation function to assign values to board positions
Implement move ordering to improve efficiency
Use transposition tables to store previously evaluated positions
Implement iterative deepening to improve search depth
posted on 7 Jul 2015
To find least common ancestor of two nodes in a binary tree, traverse the tree from root to the nodes and store the paths. Then compare the paths to find the common ancestor.
Traverse the binary tree from root to the two nodes and store the paths
Compare the paths to find the common ancestor
If the binary tree is a BST, compare the values of the nodes to find the common ancestor
If one of the nodes is the ancestor of the o
Optimizing for binary search tree
Ensure the tree is balanced to maintain O(log n) search time
Implement efficient insertion and deletion algorithms
Use in-order traversal for sorted output
Consider using AVL or Red-Black trees for self-balancing
Avoid using recursion for large trees to prevent stack overflow
Search for a string in a 2D character matrix in any direction
Iterate through each cell of the matrix
For each cell, check all possible directions for the string
If found, return the starting and ending coordinates of the string
To identify swapped nodes in a binary search tree, we need to perform an inorder traversal and compare adjacent nodes.
Perform an inorder traversal of the binary search tree
Compare each node with its adjacent node
If a node is smaller than its previous node, mark it as a swapped node
If two nodes are swapped, swap their values to restore the original binary search tree
based on 2 reviews
Rating in categories
Consultant
1.4k
salaries
| ₹5.3 L/yr - ₹17.4 L/yr |
Associate Consultant
973
salaries
| ₹3.4 L/yr - ₹10 L/yr |
Team Lead
508
salaries
| ₹7.1 L/yr - ₹24.6 L/yr |
Senior Project Leader
426
salaries
| ₹8 L/yr - ₹26 L/yr |
Software Developer
324
salaries
| ₹2.7 L/yr - ₹11.4 L/yr |
TCS
Infosys
Wipro
HCLTech