i
Juniper Networks
Filter interviews by
Clear (1)
I applied via Company Website and was interviewed in Apr 2023. There were 3 interview rounds.
Aptitude test is the round of i step to enter the compition
Method overloading is creating multiple methods with the same name but different parameters. Method overriding is creating a new implementation of an existing method in a subclass.
Method overloading is used to provide different ways of calling the same method with different parameters.
Method overriding is used to change the behavior of an existing method in a subclass.
Method overloading is resolved at compile-time base...
Polymorphism is the ability of an object to take on many forms.
Polymorphism allows objects of different classes to be treated as if they are of the same class.
It is achieved through method overriding and method overloading.
Example: A parent class Animal can have child classes like Dog, Cat, and Bird. All these child classes can have their own implementation of the method 'makeSound', but they can be treated as Animals.
...
Yes, we can overload the constructor in Java.
Overloading constructor means creating multiple constructors with different parameters.
The constructors can have different number of parameters or different types of parameters.
The constructor with the matching parameters will be called during object creation.
Data type is a classification of data based on the type of value it holds.
Data type determines the type of operations that can be performed on the data.
Examples of data types include integer, float, boolean, and string.
Data types can be primitive or non-primitive.
Primitive data types are predefined by the language and non-primitive data types are created by the programmer.
Top trending discussions
I was interviewed in Oct 2016.
My hobbies include hiking, playing guitar, and cooking.
Hiking: I enjoy exploring nature trails and challenging myself physically.
Playing guitar: I love learning new songs and improving my skills.
Cooking: I like experimenting with different recipes and creating delicious meals.
In 5 years, I see myself as a senior software developer leading a team and working on complex projects.
Leading a team of developers
Working on complex projects
Continuously learning and improving my skills
Contributing to the growth and success of the company
I want to join DELL because of their innovative technology solutions and strong reputation in the industry.
DELL is known for their cutting-edge technology solutions which align with my passion for software development.
I admire DELL's strong reputation in the industry and their commitment to customer satisfaction.
I believe joining DELL will provide me with opportunities for growth and career advancement.
I was interviewed in Jan 2017.
posted on 13 Jun 2024
I applied via Company Website and was interviewed in May 2024. There was 1 interview round.
The task was a Codility type
I was interviewed before Mar 2021.
Round duration - 15 minutes
Round difficulty - Easy
This was a group discussion round where we were divided into groups of 10 and we had 15 minutes for GD.
Round duration - 60 minutes
Round difficulty - Medium
This is all about how good you are with the fundamentals. Out of 10 I would give it a 6.5 on difficulty.
You are given a string STR
which contains alphabets, numbers, and special characters. Your task is to reverse the string.
STR = "abcde"
"e...
Reverse a given string containing alphabets, numbers, and special characters.
Iterate through the string from the end to the beginning and append each character to a new string.
Use built-in functions like reverse() or StringBuilder in languages like Python or Java for efficient reversal.
Handle special characters and numbers while reversing the string.
Ensure to consider the constraints on the length of the string and the
A deadlock is a situation in which two or more processes are unable to proceed because each is waiting for the other to release a resource.
Occurs in multitasking environments where processes compete for limited resources
Can be resolved using techniques like deadlock prevention, deadlock avoidance, and deadlock detection
Example: Process A holds Resource X and waits for Resource Y, while Process B holds Resource Y and wa
A thread is a lightweight sub-process that allows concurrent execution within a single process.
Threads share the same memory space within a process.
Threads are used to achieve parallelism and improve performance.
Examples of threads include the main thread in a program and worker threads in a multi-threaded application.
Multiprocessing involves multiple processors executing multiple tasks simultaneously, while multiprogramming involves multiple programs sharing a single processor by switching between them.
Multiprocessing utilizes multiple processors to execute multiple tasks concurrently.
Multiprogramming involves multiple programs sharing a single processor by switching between them.
Multiprocessing is more efficient in terms of perfor...
Process life cycle in an operating system involves creation, execution, termination, and resource management.
Creation: When a process is created, it is assigned a unique process ID and allocated necessary resources.
Execution: The process is then scheduled by the operating system to run on the CPU.
Termination: Once the process completes its task or is terminated by the user, it is removed from memory.
Resource Management...
Windows XP and Windows 7 are both operating systems developed by Microsoft, but they have several key differences.
User interface: Windows 7 has a more modern and user-friendly interface compared to Windows XP.
Performance: Windows 7 is generally faster and more stable than Windows XP.
Security: Windows 7 has more advanced security features and updates compared to Windows XP.
Hardware support: Windows 7 supports newer hard...
Round duration - 60 minutes
Round difficulty - Easy
Technical round with questions on DBMS and Networking mainly.
RDBMS is a type of DBMS that stores data in a structured format with relationships between tables.
RDBMS enforces referential integrity and allows for normalization of data.
DBMS is a general term for any system that manages databases, while RDBMS specifically refers to relational databases.
Examples of RDBMS include MySQL, Oracle, and SQL Server.
Examples of DBMS include MongoDB and Redis.
An Object-Oriented Database Management System (OODBMS) is a type of database management system that supports the creation and management of objects in a database.
OODBMS stores data in the form of objects, which can contain attributes and methods.
It allows for complex data structures and relationships to be represented more easily.
Examples of OODBMS include db4o, ObjectDB, and ObjectStore.
Use the COUNT DISTINCT function in SQL to find the number of unique values in a database.
Use the COUNT DISTINCT function along with the column name to count the number of unique values in that column.
For example, SELECT COUNT(DISTINCT column_name) FROM table_name;
You can also use GROUP BY to find the number of unique values for multiple columns.
A hub operates at the physical layer and broadcasts data to all devices on the network, while a switch operates at the data link layer and forwards data only to the intended recipient.
Hub operates at the physical layer, while switch operates at the data link layer
Hub broadcasts data to all devices on the network, while switch forwards data only to the intended recipient
Switch is more efficient and secure compared to a
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
Physical Layer: Deals with the physical connection between devices. Example: Ethernet cables.
Data Link Layer: Responsible for node-to-node communication. Example: MAC addresses.
Network Layer: Manages routing of data packets. Example: IP addresses.
T...
Different protocols supported at each OSI layer
Layer 1 (Physical): Ethernet, Wi-Fi, Bluetooth
Layer 2 (Data Link): MAC, PPP, HDLC
Layer 3 (Network): IP, ICMP, ARP
Layer 4 (Transport): TCP, UDP, SCTP
Layer 5 (Session): NetBIOS, PPTP
Layer 6 (Presentation): SSL, TLS
Layer 7 (Application): HTTP, FTP, SMTP
Round duration - 15 minutes
Round difficulty - Easy
IF you make it to the HR round you are selected. All 28 that attended got selected . It was more like stuff for formality. The usual questions.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I was interviewed before Mar 2021.
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions based on DSA, OOPS and puzzles.
Given a Singly Linked List of integers, your task is to reverse the Linked List by altering the links between the nodes.
The first line of input is an intege...
Reverse a singly linked list by altering the links between nodes.
Iterate through the linked list and reverse the links between nodes
Use three pointers to keep track of the current, previous, and next nodes
Update the links between nodes until the end of the list is reached
Ninja is exploring new challenges and desires to reverse a given number. Your task is to assist Ninja in reversing the number provided.
If a number has trailing ze...
Implement a function to reverse a given number, omitting trailing zeros.
Create a function that takes an integer as input and reverses it while omitting trailing zeros
Use modulo and division operations to extract digits and reverse the number
Handle cases where the reversed number has leading zeros by omitting them
Ensure the reversed number is within the constraints specified
You are given a string STR
which contains alphabets, numbers, and special characters. Your task is to reverse the string.
STR = "abcde"
"e...
Reverse a given string containing alphabets, numbers, and special characters.
Iterate through the string from end to start and append each character to a new string.
Use built-in functions like reverse() or slicing to reverse the string.
Handle special characters and numbers while reversing the string.
Ensure to consider the constraints provided in the problem statement.
Overloading in OOP is the ability to define multiple methods with the same name but different parameters.
Overloading allows multiple methods with the same name but different parameters to coexist in a class.
The compiler determines which method to call based on the number and type of arguments passed.
Example: having multiple constructors in a class with different parameter lists.
Round duration - 60 minutes
Round difficulty - Medium
Technical round with question based on Web Dev, Cloud Computing, Networking etc.
TELNET is a network protocol used to establish a connection with a remote computer over a network.
TELNET stands for Telecommunication Network.
It allows a user to log in to a remote computer and execute commands as if they were directly connected to that computer.
TELNET operates on port 23.
It is not secure as the data is transmitted in plain text.
SSH (Secure Shell) is a more secure alternative to TELNET.
TELNET is insecure, while SSH is secure for remote access to servers.
TELNET sends data in plain text, while SSH encrypts data for secure communication
SSH uses public-key cryptography for authentication, TELNET does not
SSH provides secure remote access to servers, TELNET does not prioritize security
TELNET operates on port 23, while SSH operates on port 22
Given an array/list ARR
consisting of integers where each element is either 0, 1, or 2, your task is to sort this array in increasing order.
The input sta...
Sort an array of 0s, 1s, and 2s in increasing order.
Use a three-pointer approach to partition the array into sections of 0s, 1s, and 2s.
Iterate through the array and swap elements based on their values.
Time complexity should be O(n) to meet the constraints.
A hypervisor is a software that creates and runs virtual machines on a physical host machine.
Hypervisors allow multiple operating systems to run on a single physical machine
They provide isolation between virtual machines
Examples include VMware ESXi, Microsoft Hyper-V, and KVM
Cloud computing is like renting a computer over the internet instead of owning one.
Cloud computing allows users to access and store data and applications over the internet instead of on their own physical computer.
It offers scalability, flexibility, and cost-effectiveness as users can easily adjust their storage and computing needs.
Examples include services like Amazon Web Services (AWS), Microsoft Azure, and Google Cl
The stages in the Software Development Life Cycle include planning, design, development, testing, deployment, and maintenance.
1. Planning: Define project scope, requirements, and timelines.
2. Design: Create architecture, UI/UX, and database design.
3. Development: Write code based on design specifications.
4. Testing: Verify functionality, performance, and security.
5. Deployment: Release the software to users or clients.
...
Round duration - 60 minutes
Round difficulty - Medium
Technical Interview round with questions based on DSA and OOPS. A detailed discussion on my projects was also carried out.
Given three sorted arrays A
, B
, and C
of lengths N
, M
, and K
respectively, your task is to find all elements that are present in all three arrays.
The first...
Find common elements in three sorted arrays and output them in order.
Iterate through all three arrays simultaneously using three pointers.
Compare elements at pointers and move pointers accordingly.
If elements are equal, add to result and move all pointers forward.
If elements are not equal, move pointer of smallest element forward.
A volatile variable is a variable that can be modified by multiple threads simultaneously.
Volatile variables are used in multithreading to ensure visibility of changes made by one thread to other threads.
They are not cached in thread's local memory, but always read from main memory.
They are typically used for flags or status variables that are accessed by multiple threads.
Example: 'volatile boolean flag = true;'
Multithreading in Java allows multiple threads to execute concurrently, improving performance and responsiveness.
Multithreading allows multiple threads to run concurrently within a single process.
Threads share the same memory space, allowing for efficient communication and data sharing.
Java provides built-in support for multithreading through the Thread class and Runnable interface.
Example: Creating a new thread using ...
Round duration - 30 minutes
Round difficulty - Easy
HR round with typical behavioral problems.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I was interviewed before Mar 2021.
Round duration - 60 minutes
Round difficulty - Easy
Need to write working code on a shared document so that the interviewer can see if you can put your ideas into code. In this round, they are not bothered about time complexity of your algorithm. They just wanted to know if you can code whatever you think. So if you do not find best solution also it is OK but write the code for average case at-least.
Given a sorted array that has been rotated clockwise by an unknown amount, you need to answer Q
queries. Each query is represented by an integer Q[i]
, and you must ...
Search for integers in a rotated sorted array efficiently.
Use binary search to find the pivot point where the array is rotated.
Based on the pivot point, apply binary search on the appropriate half of the array.
Return the index of the integer if found, else return -1.
Time complexity should be O(logN) for each query.
Given a Binary Search Tree (BST) and a target value 'K', determine if there exist two unique elements in the BST such that their sum equals the target 'K'.
A ...
Check if there exist two unique elements in a BST that sum up to a target value 'K'.
Traverse the BST in-order to get a sorted array of elements.
Use two pointers approach to find the pair sum in the sorted array.
Consider edge cases like duplicate elements or negative values.
Time complexity can be optimized to O(n) using a HashSet to store visited nodes.
Round duration - 60 minutes
Round difficulty - Medium
I was interviewed for vcloud team so they asked me questions on Cloud, DSA etc.
You are provided with a linked list having 'N' nodes and an integer 'K'. Your task is to reverse the linked list in groups of size K. If the list is numbered fro...
Reverse a linked list in groups of size K
Iterate through the linked list in groups of size K
Reverse each group of nodes
Handle cases where the last group may have fewer than K nodes
Reverse a given stack of integers using recursion. You must accomplish this without utilizing extra space beyond the internal stack space used by recursion. Additionally, you ...
Reverse a given stack of integers using recursion without using extra space or loops.
Use recursion to pop all elements from the original stack and store them in function call stack
Once the stack is empty, push the elements back in reverse order using recursion
Use the top(), pop(), and push() methods to manipulate the stack
Cloud computing is the delivery of computing services over the internet, including storage, databases, networking, software, and more.
Cloud computing allows users to access resources on-demand without the need for physical infrastructure.
Examples of cloud computing services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Cloud computing offers scalability, flexibility, cost-effectiveness, ...
Cloud computing offers scalability, cost-efficiency, flexibility, and improved collaboration.
Scalability: Easily scale resources up or down based on demand without the need for physical infrastructure.
Cost-efficiency: Pay only for the resources you use, reducing upfront costs and maintenance expenses.
Flexibility: Access data and applications from anywhere with an internet connection, enabling remote work and collaborat...
Challenges of cloud computing include security concerns, data privacy issues, and potential downtime.
Security concerns: Data breaches and unauthorized access are major risks in cloud computing.
Data privacy issues: Ensuring compliance with regulations like GDPR can be challenging when data is stored in the cloud.
Potential downtime: Dependence on internet connectivity and cloud service providers can lead to downtime affe...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I was interviewed before Mar 2021.
Round duration - 60 minutes
Round difficulty - Medium
Technical Interview round with questions based on DSA.
You are given a string STR
which contains alphabets, numbers, and special characters. Your task is to reverse the string.
STR = "abcde"
"e...
Reverse a given string containing alphabets, numbers, and special characters.
Iterate through the string from the end to the beginning and append each character to a new string.
Use built-in functions like reverse() or StringBuilder in languages like Python or Java for efficient reversal.
Handle special characters and numbers along with alphabets while reversing the string.
Ensure to consider the constraints on the number ...
Given an array of integers ARR
of size N, consisting of 0s and 1s, you need to select a sub-array and flip its bits. Your task is to return the maximum count of 1s that can b...
Given an array of 0s and 1s, find the maximum count of 1s by flipping a sub-array at most once.
Iterate through the array and keep track of the maximum count of 1s obtained by flipping a sub-array.
Consider flipping a sub-array from index i to j by changing 0s to 1s and vice versa.
Update the maximum count of 1s if the current count is greater.
Return the maximum count of 1s obtained after flipping a sub-array at most once
Determine whether a given array ARR
of positive integers is a valid Preorder Traversal of a Binary Search Tree (BST).
A binary search tree (BST) is a tree structure w...
Check if a given array of positive integers is a valid Preorder Traversal of a Binary Search Tree (BST).
Create a function that takes the array as input and checks if it satisfies the properties of a BST preorder traversal.
Iterate through the array and maintain a stack to keep track of the nodes in the BST.
Compare each element with the top of the stack to ensure it follows the BST property.
If the array is a valid preord...
Given a sorted array/list ARR
consisting of ‘N’ elements, and an integer ‘K’, your task is to find the first and last occurrence of ‘K’ in ARR
.
Find the first and last occurrence of a given element in a sorted array.
Use binary search to find the first occurrence of the element.
Use binary search to find the last occurrence of the element.
Handle cases where the element is not present in the array.
Round duration - 60 minutes
Round difficulty - Medium
Technical round with questions based on DSA, OS, OOPS etc.
Given two arrays A
and B
with sizes N
and M
respectively, both sorted in non-decreasing order, determine their intersection.
The intersection of two arrays in...
The problem involves finding the intersection of two sorted arrays efficiently.
Use two pointers to iterate through both arrays simultaneously.
Compare elements at the pointers and move the pointers accordingly.
Handle cases where elements are equal or not equal to find the intersection.
Return the intersection as an array of common elements.
You are provided with a linked list consisting of N nodes. Your task is to remove duplicate nodes such that each element occurs only once in t...
Remove duplicates from an unsorted linked list while preserving the order of nodes.
Iterate through the linked list while keeping track of seen elements using a hash set.
If a duplicate element is encountered, skip it by adjusting the pointers.
Ensure the order of nodes is preserved by only keeping the first occurrence of each element.
Paging is a memory management scheme that allows the operating system to store and retrieve data from secondary storage in fixed-size blocks, while swapping involves moving entire processes between main memory and disk.
Paging involves dividing physical memory into fixed-size blocks called pages, while swapping involves moving entire processes between main memory and disk.
Paging allows for more efficient use of physical...
A deadlock in operating systems occurs when two or more processes are unable to proceed because each is waiting for the other to release a resource.
Deadlock involves a circular wait, where each process is waiting for a resource held by another process in the cycle.
Four necessary conditions for deadlock are mutual exclusion, hold and wait, no preemption, and circular wait.
Example: Process A holds Resource 1 and waits fo...
Round duration - 60 minutes
Round difficulty - Medium
Technical Interview round with questions on DSA, OOPS and Puzzles.
In a wedding ceremony at NinjaLand, attendees are blindfolded. People from the bride’s side hold odd numbers, while people from the groom’s side hold even numbers. For...
Rearrange a linked list such that odd numbers appear before even numbers while preserving the order of appearance.
Iterate through the linked list and maintain two separate lists for odd and even numbers.
Merge the two lists while preserving the order of appearance.
Ensure to handle edge cases like empty list or list with only odd or even numbers.
Given a sorted array of length N
, your task is to construct a balanced binary search tree (BST) from the array. If multiple balanced BSTs are possible, you ca...
Construct a balanced binary search tree from a sorted array.
Create a function that recursively constructs a balanced BST from a sorted array.
Use the middle element of the array as the root of the BST.
Recursively build the left and right subtrees using the elements to the left and right of the middle element.
Ensure that the left and right subtrees are also balanced BSTs.
Return 1 if the constructed tree is correct, other
MVC focuses on separating concerns of an application into three components, while MVT is a variation used in Django framework.
MVC separates an application into Model (data), View (presentation), and Controller (logic) components.
MVT is used in Django framework where Model represents data, View represents presentation, and Template represents logic.
In MVC, the Controller handles user input and updates the Model and View...
Round duration - 30 minutes
Round difficulty - Easy
HR round with typical behavioral problems.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
posted on 7 Feb 2022
I was interviewed before Feb 2021.
Round duration - 70 Minutes
Round difficulty - Medium
This round had 40 MCQ's followed by 2 questions of DS and Algo. The programming questions were preety standard and can be solved within 30 minutes.
Given an array arr
of length N
consisting of integers, find the sum of the subarray (including empty subarray) with the maximum sum among all subarrays.
Find the sum of the subarray with the maximum sum among all subarrays in a given array.
Iterate through the array and keep track of the maximum sum subarray seen so far.
Use Kadane's algorithm to efficiently find the maximum subarray sum.
Handle cases where all elements are negative or array is empty.
Example: For input arr = [-2, 1, -3, 4, -1], the maximum subarray sum is 4.
Given a string str
and a character 'X', develop a function to eliminate all instances of 'X' from str
and return the resulting string.
The first lin...
Develop a function to remove all instances of a given character from a string.
Iterate through the string character by character and only add characters that are not equal to the given character to a new string.
Alternatively, use built-in string manipulation functions to remove all instances of the given character from the string.
Ensure the function handles edge cases such as empty strings or strings with no instances o...
Round duration - 60 Minutes
Round difficulty - Medium
This round had questions from DSA, OS, DBMS and Computer Networks. The programming question was quiet easy and I coded it preety fast after discussing the appropriate approach and complexity analysis.
You are provided with two singly linked lists containing integers, where both lists converge at some node belonging to a third linked list.
Your task is to determine t...
Find the node where two linked lists merge, return -1 if no merging occurs.
Traverse both lists to find their lengths and the difference in lengths
Move the pointer of the longer list by the difference in lengths
Traverse both lists simultaneously until they meet at the merging point
Multitasking involves executing multiple tasks simultaneously, while multiprogramming involves running multiple programs on a single processor.
Multitasking allows multiple tasks to run concurrently on a single processor, switching between them quickly.
Multiprogramming involves loading multiple programs into memory and executing them concurrently, utilizing idle CPU time efficiently.
Examples of multitasking include runn...
A process is an executing instance of a program, while a program is a set of instructions stored in the computer's memory.
A program is a static set of instructions stored on disk, while a process is a dynamic instance of those instructions being executed in memory.
Multiple processes can be running the same program simultaneously, each with its own memory space and resources.
Processes have their own unique process ID (P...
A process is an instance of a program, while a thread is a unit of execution within a process.
A process has its own memory space, while threads share the same memory space.
Processes are independent and isolated, while threads can communicate and share resources.
Creating a new process is more resource-intensive than creating a new thread.
Processes have their own program counter, while threads share the same program coun...
UNION combines and removes duplicate rows, UNION ALL combines without removing duplicates.
UNION combines the result sets of two or more SELECT statements into a single result set
UNION removes duplicate rows from the result set
UNION ALL combines the result sets without removing duplicates
UNION is slower than UNION ALL as it requires additional processing to remove duplicates
Use UNION when you want to combine and remove ...
Views provide a virtual representation of data, offering advantages such as simplifying complex queries, enhancing security, and improving performance.
Views simplify complex queries by predefining commonly used joins, filters, and aggregations.
Views enhance security by allowing users to access only specific columns or rows of a table.
Views improve performance by storing the results of complex queries, reducing the need...
ARP stands for Address Resolution Protocol, used to map IP addresses to MAC addresses in a local network.
ARP is used to find the MAC address of a device based on its IP address
It operates at the data link layer of the OSI model
ARP requests are broadcasted to all devices on the local network
Example: When a device wants to communicate with another device on the same network, it uses ARP to find the MAC address of the des
Round duration - 30 Minutes
Round difficulty - Easy
This is a cultural fitment testing round. HR was very frank and asked standard questions. Then we discussed about my role.
I should be hired because of my strong technical skills, problem-solving abilities, and passion for software development.
I have a solid understanding of data structures and algorithms.
I have experience in developing and debugging complex software systems.
I am a quick learner and can adapt to new technologies and programming languages.
I have a track record of delivering high-quality code on time.
I am a team player and c...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Software Engineer
284
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer III
248
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer2
170
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer IV
160
salaries
| ₹0 L/yr - ₹0 L/yr |
Financial Analyst
58
salaries
| ₹0 L/yr - ₹0 L/yr |
Cisco
Huawei Technologies
Nokia Networks
Ericsson