i
Kissflow
Filter interviews by
I applied via Approached by Company and was interviewed before Jun 2022. There were 3 interview rounds.
Reasoning, logical thinking, guesstimates, assignment,
Top trending discussions
Leetcode easy-medium
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Cyber security involves implementing measures to prevent unauthorized access, data breaches, and other cyber threats.
It includes technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
Examples of cyber security measures include firewalls, ant...
Types of encryption include symmetric encryption, asymmetric encryption, and hashing.
Symmetric encryption: Uses the same key for both encryption and decryption, examples include AES and DES.
Asymmetric encryption: Uses a pair of public and private keys for encryption and decryption, examples include RSA and ECC.
Hashing: Converts data into a fixed-size string of bytes, examples include MD5 and SHA.
posted on 11 Sep 2024
It was online , evryone cheated , and even solving all the questions wont get you shortlisted
Dynamic memory allocation in C allows for allocating memory at runtime, enabling flexibility in memory usage.
Use functions like malloc(), calloc(), and realloc() to dynamically allocate memory in C.
Remember to free the allocated memory using free() to prevent memory leaks.
Dynamic memory allocation is commonly used for creating arrays or structures of unknown size at compile time.
I applied via Recruitment Consulltant and was interviewed in Jan 2024. There was 1 interview round.
Create a table of Manager-Employee, add rows, and write queries.
Create a table named 'ManagerEmployee' with columns 'ManagerID' and 'EmployeeID'
Add rows to the table to represent the relationship between managers and employees
Write queries to retrieve information such as employees reporting to a specific manager
I applied via Campus Placement and was interviewed in Aug 2024. There were 3 interview rounds.
Arrays and strings, trees
Check if two strings are anagrams by comparing the sorted characters in each string.
Sort the characters in both strings and compare if they are equal.
Ignore spaces and punctuation when comparing the strings.
Example: 'listen' and 'silent' are anagrams.
Example: 'hello' and 'world' are not anagrams.
Tally Solutions is a software company that provides accounting and business management software solutions.
Tally Solutions offers software for financial accounting, inventory management, payroll, and more
It is widely used by small and medium-sized businesses for managing their finances
Tally software helps in generating reports, tracking expenses, and ensuring compliance with tax regulations
I applied via Campus Placement and was interviewed before Apr 2021. There were 2 interview rounds.
Aptitude, logical , reasoning, verbal
I applied via Campus Placement and was interviewed before Jun 2021. There were 3 interview rounds.
Basic aptitude test on AMCAT
Data structure coding questions on circular queue and pattern printing question
Algorithms for manipulating arrays and strings in coding
Use sorting algorithms like quicksort and mergesort for arrays
Use string manipulation functions like substring and replace for strings
Use dynamic programming for optimizing solutions to array and string problems
Designing a large scale Ad Server
Use distributed systems for scalability
Implement caching for faster ad delivery
Ensure high availability and fault tolerance
Use real-time bidding for efficient ad placement
Implement fraud detection mechanisms
Ensure compliance with privacy regulations
I applied via Campus Placement
I am an avid traveler and have visited over 20 countries
I love experiencing new cultures and trying new foods
I have backpacked through Europe and Asia
I have volunteered in orphanages in Cambodia and Nepal
Mobile advertising platform
Adtech
Mobile marketing
App monetization
Maximum sub sequence sum in an array
Use Kadane's algorithm
Initialize max_so_far and max_ending_here to 0
Iterate through the array and update max_ending_here and max_so_far
Return max_so_far
Endianness refers to the byte order of a system. It determines how multi-byte data types are stored in memory.
Little-endian systems store the least significant byte first, while big-endian systems store the most significant byte first.
Endianness can affect the way data is transmitted between systems.
To determine the endianness of a system, you can use the byte order mark (BOM) or write a test program that checks the by...
Sort an array of 0's and 1's only.
Use two pointers, one at the beginning and one at the end of the array.
Swap 0's from the beginning with 1's from the end until the pointers meet.
Alternatively, use a counting sort algorithm to count the number of 0's and 1's and then reconstruct the array.
Heaps are data structures used to efficiently find the maximum or minimum element in a collection.
Max heap: parent nodes are always greater than or equal to child nodes
Min heap: parent nodes are always smaller than or equal to child nodes
Heaps are commonly used in priority queues and sorting algorithms
Heap operations include insert, delete, and extract max/min
Example: An array [3, 8, 2, 5, 1, 4, 6] can be represented a
Find 3 numbers in an array where a+b=c.
Loop through the array and check for all possible combinations of a and b.
Use a hash table to store the values of a and b, and check if c is present in the hash table.
Sort the array and use two pointers to find a and b, and then check if their sum equals c.
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Software Engineer
20
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
12
salaries
| ₹0 L/yr - ₹0 L/yr |
Product Consultant
10
salaries
| ₹0 L/yr - ₹0 L/yr |
Product Designer
8
salaries
| ₹0 L/yr - ₹0 L/yr |
Automation Test Engineer
8
salaries
| ₹0 L/yr - ₹0 L/yr |
Zoho
Freshworks
Tally Solutions
LTIMindtree