Filter interviews by
I applied via Referral and was interviewed in Mar 2024. There were 6 interview rounds.
Top trending discussions
I was interviewed in Dec 2024.
I am particularly proud of leading the development of a cutting-edge autonomous drone for search and rescue missions.
Led a team in designing and implementing advanced AI algorithms for autonomous navigation
Collaborated with hardware engineers to optimize drone performance and durability
Successfully tested the drone in simulated rescue scenarios, showcasing its effectiveness in real-world applications
I prioritize and clarify single-line requirements with clients to ensure understanding and alignment.
Prioritize communication with clients to clarify single-line requirements
Ask probing questions to fully understand the client's needs
Document the requirements clearly to avoid misunderstandings
Provide regular updates to the client on the progress of the project
I would implement a new project by following a structured process from requirement gathering to delivery.
Conduct thorough requirement gathering sessions with stakeholders
Create a detailed project plan outlining tasks, timelines, and resources
Assign responsibilities to team members based on their expertise
Regularly monitor progress and address any issues or roadblocks
Perform thorough testing and quality assurance before
Design a web crawler to fetch and index web pages
Start by identifying the target websites and their structure
Develop a system to fetch web pages using HTTP requests
Implement a parser to extract relevant information from the HTML content
Store the extracted data in a database for indexing and retrieval
posted on 3 Dec 2015
The memory layout of C programs refers to how variables and data structures are organized in memory.
C programs typically have four main sections in memory: code, data, heap, and stack.
The code section contains the compiled program instructions.
The data section stores global and static variables.
The heap is used for dynamic memory allocation.
The stack is used for function calls and local variables.
Pointers in C hold mem...
Inefficiency and lack of organization irritate me.
Inefficient code or processes
Lack of documentation
Disorganized project management
Inconsistent coding standards
Poor communication within the team
I know multiple computer languages including Java, Python, and C++.
Java
Python
C++
Design a P2P sharing network like torrent
Consider the architecture and protocols for file sharing
Include mechanisms for file discovery and download
Implement a distributed system for efficient data transfer
Ensure data integrity and security
Handle scalability and load balancing
Consider user interface and ease of use
A good job is one that provides satisfaction, growth opportunities, work-life balance, and fair compensation.
Satisfaction: Feeling fulfilled and accomplished in the work being done.
Growth opportunities: Having chances to learn, develop new skills, and advance in the career.
Work-life balance: Striking a healthy equilibrium between work responsibilities and personal life.
Fair compensation: Being adequately rewarded for t...
I was interviewed before Mar 2021.
Round duration - 60 minutes
Round difficulty - Easy
Technical interview round with questions based on DSA and OOPS.
Use double pointer to dynamically allocate memory for array of strings in C.
Declare a double pointer to hold the 2D array of strings.
Allocate memory for the rows first using malloc.
Then allocate memory for each string in the row using malloc.
Assign values to the strings in the array.
Example: char **array = malloc(rows * sizeof(char *));
Example: array[i] = malloc(strlen(str) + 1); strcpy(array[i], str);
Virtual functions in C++ are functions that can be overridden in derived classes, allowing for polymorphic behavior.
Virtual functions are declared using the 'virtual' keyword in the base class.
They are used to achieve runtime polymorphism in C++.
Derived classes can override the virtual functions defined in the base class.
Example: class Base { public: virtual void display() { cout << 'Base class dis...
Virtual base classes are classes that are inherited virtually to avoid multiple instances of the same base class in a derived class hierarchy.
Virtual base classes are used in multiple inheritance to prevent the Diamond Problem.
They are declared with the 'virtual' keyword in the base class.
When a class inherits a virtual base class, the most derived class is responsible for initializing the virtual base class.
Example: c...
Round duration - 60 minutes
Round difficulty - Easy
Technical interview round with questions based on OS/Networking etc.
The system call that creates a separate connection is fork()
fork() is a system call in Unix-like operating systems that creates a new process by duplicating the existing process
The new process created by fork() is called the child process, while the original process is called the parent process
fork() is commonly used in network programming to create separate connections for handling multiple clients
epoll_wait() system call waits for events on an epoll instance
Used in Linux for I/O event notification
Blocks until one or more file descriptors become ready
Returns the number of file descriptors ready for I/O operations
Different protocols used in the transport layer include TCP, UDP, SCTP, and DCCP.
TCP (Transmission Control Protocol) - reliable, connection-oriented protocol used for most internet communication
UDP (User Datagram Protocol) - connectionless protocol used for applications where speed is more important than reliability
SCTP (Stream Control Transmission Protocol) - supports multiple streams of data, used for telecommunicati...
TCP is a connection-oriented protocol that ensures reliable data delivery, while UDP is a connectionless protocol that focuses on speed.
TCP is reliable and ensures data delivery by establishing a connection before sending data.
UDP is faster but less reliable as it does not establish a connection before sending data.
TCP is used for applications that require high reliability and error correction, such as web browsing and...
Round duration - 60 minutes
Round difficulty - Easy
Technical interview round with questions based on Networking etc.
ICMP is a protocol used for error reporting, diagnostics, and network management in IP networks.
ICMP is used to report errors in packet delivery
It is used for network diagnostics and troubleshooting
ICMP messages are encapsulated within IP packets
Examples include ping (echo request/reply) and traceroute
TCP supports four types of connection release: active close, passive close, simultaneous close, and abortive close.
Active close: Client initiates the connection release process by sending a FIN packet.
Passive close: Server initiates the connection release process by sending a FIN packet.
Simultaneous close: Both client and server send FIN packets to each other simultaneously.
Abortive close: Connection is terminated abru...
The MAC layer uses protocols like CSMA/CA, CSMA/CD, and TDMA to manage access to the network.
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is used in wireless networks to avoid collisions.
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is used in wired networks to detect and handle collisions.
TDMA (Time Division Multiple Access) is used in networks where devices are assigned specific
ARP (Address Resolution Protocol) is a protocol used to map an IP address to a MAC address in a local network.
ARP is used to resolve IP addresses to MAC addresses in a local network.
It operates at the data link layer of the OSI model.
ARP requests are broadcasted to all devices on the network.
Example: When a device wants to communicate with another device on the same network, it uses ARP to find the MAC address correspo
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I applied via Referral and was interviewed before May 2023. There were 2 interview rounds.
To resolve space issue with GET API request, consider pagination, compression, caching, and optimizing query parameters.
Implement pagination to limit the number of results returned in each request.
Use compression techniques like Gzip to reduce the size of the response data.
Implement caching mechanisms to store frequently accessed data and reduce the number of requests.
Optimize query parameters to only request necessary
I applied via LinkedIn and was interviewed in Sep 2020. There was 1 interview round.
Some of the top questions asked at the Ivanti Engineering Manager interview for freshers -
based on 1 interview
Interview experience
based on 2 reviews
Rating in categories
Senior Software Engineer
107
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
47
salaries
| ₹0 L/yr - ₹0 L/yr |
Staff Software Engineer
39
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Software Engineer
27
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Solutions Engineer
22
salaries
| ₹0 L/yr - ₹0 L/yr |
VMware Software
Citrix
Gen
McAfee