Filter interviews by
I applied via Recruitment Consulltant and was interviewed in Dec 2022. There were 7 interview rounds.
Top trending discussions
I was interviewed in Dec 2016.
posted on 27 Dec 2015
Difference between #define and const
Both are used to define constants
#define is a preprocessor directive and replaces all occurrences of the defined identifier with the given value
const is a keyword and creates a read-only variable
const is type-safe and has better scope control than #define
Example: #define PI 3.14 vs const float PI = 3.14;
Example: #define MAX(a,b) ((a)>(b)?(a):(b)) vs const int MAX = (a)>(b)?(a):(b);
OSI layers are a conceptual model that describes the communication functions of a network.
Layer 1 (Physical): Transmits raw data bits over a physical medium
Layer 2 (Data Link): Provides error-free transfer of data frames between nodes
Layer 3 (Network): Routes data packets between networks
Layer 4 (Transport): Provides reliable data transfer between end systems
Layer 5 (Session): Establishes, manages, and terminates sessi...
Structure refers to the arrangement or organization of something.
Structure is the way something is put together or organized.
It can refer to physical objects, such as buildings or bridges, or abstract concepts, such as language or music.
Examples of structures include the skeletal structure of a human body, the organizational structure of a company, and the grammatical structure of a sentence.
Code for creating a node in linked list
Create a struct for the node with data and pointer to next node
Allocate memory for the node using malloc()
Assign data to the node
Assign the next pointer to NULL or the next node in the list
Encoders and decoders are used to convert data from one format to another.
Encoders convert analog signals to digital signals.
Decoders convert digital signals to analog signals.
Encoders are used in devices like cameras, sensors, and audio equipment.
Decoders are used in devices like televisions, radios, and DVD players.
One cryptographic technique is RSA, which uses public and private keys to encrypt and decrypt data.
RSA stands for Rivest-Shamir-Adleman, named after its creators.
It is a widely used asymmetric encryption algorithm.
RSA uses a public key to encrypt data and a private key to decrypt it.
The security of RSA is based on the difficulty of factoring large prime numbers.
RSA is used in various applications such as secure communi
Public and private keys are used for secure communication and encryption.
Public key is used for encryption and can be shared with anyone.
Private key is used for decryption and should be kept secret.
They are used in various security protocols like SSL, SSH, and PGP.
Example: When you visit a website with SSL, your browser uses the website's public key to encrypt data, which can only be decrypted by the website's private ...
Steps to follow when a customer reports inability to edit in Microsoft Word
Ask the customer if they are receiving any error messages
Check if the document is in read-only mode
Check if the customer has the necessary permissions to edit the document
Check if the customer's version of Microsoft Word is up to date
Try repairing or reinstalling Microsoft Word
If all else fails, escalate the issue to a higher level of support
B-Tree is a self-balancing tree data structure with multiple child nodes and is used for efficient disk access.
B-Tree has a root node, internal nodes, and leaf nodes.
Each node can have multiple child nodes.
The number of child nodes is fixed for a given B-Tree.
B-Tree is self-balancing, which means that the height of the tree is minimized.
B-Tree is used for efficient disk access as it reduces the number of disk accesses ...
I would bring my technical expertise and passion for problem-solving to contribute to Microsoft's mission of empowering people and organizations.
I would familiarize myself with Microsoft's products and services to better assist customers
I would actively seek out opportunities to learn and improve my skills
I would collaborate with my team and other departments to provide the best support possible
I would prioritize custo...
I applied via Campus Placement
posted on 2 Dec 2016
I applied via Campus Placement and was interviewed in Jan 2016. There were 5 interview rounds.
To find a loop in a directed graph, use Floyd's cycle-finding algorithm. To find the last element in a binary tree, traverse the tree and return the rightmost leaf node.
For finding a loop in a directed graph, use Floyd's cycle-finding algorithm which uses two pointers moving at different speeds.
To find the last element in a binary tree, traverse the tree recursively or iteratively and return the rightmost leaf node.
The question is about finding the last number in a circular queue that has the highest number of digits.
Implement a circular queue data structure
Iterate through the circular queue to find the last number with the highest number of digits
Compare the number of digits of each number in the circular queue
Keep track of the last number with the highest number of digits
posted on 2 Dec 2016
I applied via Campus Placement and was interviewed in Dec 2016. There was 1 interview round.
Check if left child is less than right child in a binary tree
Traverse the tree recursively and compare left and right child values
Use a stack to traverse the tree iteratively and compare left and right child values
Return true if all left children are less than right children, else false
Use built-in string method to check substring presence for faster execution.
Use 'indexOf' method to check if substring is present in the main string.
If the method returns -1, the substring is not present.
If the method returns a non-negative integer, the substring is present.
posted on 21 Aug 2016
I applied via Campus Placement
posted on 21 Aug 2016
I applied via Campus Placement
To test if every left child's value is less than the right child's value in a binary tree.
Traverse the binary tree using any traversal algorithm (e.g., in-order, pre-order, post-order)
Compare the value of each left child with its right child
If any left child's value is greater than or equal to its right child's value, return false
If all left child's values are less than their right child's values, return true
Cloning a linked list-like structure
Create a new node for each node in the original linked list
Set the value of the new node to the value of the corresponding node in the original linked list
Set the next pointer of the new node to the new node corresponding to the next node in the original linked list
Repeat the above steps until all nodes in the original linked list are cloned
To find the nth character in a stream of bytes, we need to read the stream byte by byte until we reach the nth position.
Start reading the stream byte by byte until you reach the nth position
Return the byte at the nth position
If the stream ends before reaching the nth position, return null or throw an exception
Rearrange a string to avoid consecutive same characters.
Iterate through the string and keep track of the previous character.
If the current character is the same as the previous, swap it with the next different character.
Repeat until no consecutive same characters are left.
The task is to find the next highest palindrome number given a number.
Convert the given number to a string
Check if the number is already a palindrome
If not, increment the number by 1 and check if it is a palindrome
Repeat the previous step until a palindrome is found
Canonicalizing a directory path involves simplifying and standardizing the path to remove any redundant or unnecessary elements.
Remove any consecutive slashes and replace them with a single slash
Remove any trailing slashes
Resolve any relative paths (e.g., '..' and '.')
Handle special cases like the root directory ('/')
Normalize the path by removing any unnecessary elements
posted on 21 Aug 2016
I applied via Campus Placement
based on 2 interviews
Interview experience
2-6 Yrs
Not Disclosed
Business Analyst
7
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Development Engineer II
7
salaries
| ₹0 L/yr - ₹0 L/yr |
QA Engineer
7
salaries
| ₹0 L/yr - ₹0 L/yr |
Solution Architect
6
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Sales Engineer
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Kaleyra
Uniphore Software Systems
Signzy Technologies
ZestMoney