Filter interviews by
Find the maximum repeated number in a given string by counting occurrences of each digit and identifying the highest one.
Iterate through the string: Loop through each character in the string to check if it's a digit.
Count occurrences: Use a map or array to count how many times each digit appears.
Identify the maximum: After counting, determine which digit has the highest count.
Return the result: Output the digit th...
Indexing can improve query performance but has drawbacks like increased storage and maintenance overhead.
Increased storage requirements: Indexes consume additional disk space. For example, a large table with multiple indexes can significantly increase storage needs.
Slower write operations: Inserting, updating, or deleting records can be slower due to the need to update indexes. For instance, adding a new row requi...
ConcurrentSkipListMap is a concurrent, sorted map implementation in Java.
ConcurrentSkipListMap is a concurrent version of SkipListMap, which is a sorted map implementation based on skip list data structure.
It allows multiple threads to access and modify the map concurrently.
It provides logarithmic time complexity for most operations, making it efficient for concurrent access.
Example: ConcurrentSkipListMap<Integ...
Annotations in Java provide metadata about a program that can be used by the compiler or at runtime.
Annotations start with the @ symbol.
Annotations can be used to provide information to the compiler or to runtime environments.
Annotations can be used to define custom metadata for classes, methods, fields, etc.
Annotations can also be used for code generation, documentation, and validation.
Examples of annotations in ...
Saga design pattern is used to manage long-lived transactions between microservices.
It ensures that all services involved in a transaction are either committed or rolled back together.
It uses a sequence of local transactions to achieve global consistency.
It can be implemented using either choreography or orchestration.
Example: A customer places an order, which involves multiple microservices such as inventory, pay...
Hash collusion is when two different inputs produce the same hash value.
It is a security vulnerability in hash functions.
Attackers can exploit this vulnerability to create a collision attack.
For example, an attacker can create a malicious file with the same hash value as a legitimate file to bypass security checks.
Microservices design pattern is an architectural approach to building software applications as a collection of small, independent services.
Microservices are independently deployable and scalable
Each microservice focuses on a specific business capability
Communication between microservices is done through APIs
Microservices can be developed using different programming languages and technologies
Examples of companies u...
Sessions in Hibernate are used to manage the interaction between the application and the database.
A session is a single-threaded object that represents a connection between the application and the database.
It is responsible for managing the persistence of objects, executing queries, and providing transactional support.
A session can be obtained from a session factory and should be closed when no longer needed.
Examp...
Garbage collection is an automatic memory management process that frees up memory occupied by objects that are no longer in use.
Garbage collection is performed by the JVM.
It helps prevent memory leaks and improves application performance.
There are different types of garbage collectors such as serial, parallel, CMS, and G1.
Garbage collection can cause pauses in the application, which can be minimized by tuning the ...
Annotations in Java provide metadata about a program that can be used by the compiler or at runtime.
Annotations start with the @ symbol.
Annotations can be used to provide information to the compiler or to runtime environments.
Annotations can be used to define custom metadata for classes, methods, fields, etc.
Annotations can also be used for code generation, documentation, and validation.
Examples of annotations in Java ...
ConcurrentSkipListMap is a concurrent, sorted map implementation in Java.
ConcurrentSkipListMap is a concurrent version of SkipListMap, which is a sorted map implementation based on skip list data structure.
It allows multiple threads to access and modify the map concurrently.
It provides logarithmic time complexity for most operations, making it efficient for concurrent access.
Example: ConcurrentSkipListMap<Integer, S...
I applied via Naukri.com and was interviewed in Aug 2024. There were 4 interview rounds.
2 Basic Programsl on LRU amd strings
I appeared for an interview in Mar 2025, where I was asked the following questions.
Find the maximum repeated number in a given string by counting occurrences of each digit and identifying the highest one.
Iterate through the string: Loop through each character in the string to check if it's a digit.
Count occurrences: Use a map or array to count how many times each digit appears.
Identify the maximum: After counting, determine which digit has the highest count.
Return the result: Output the digit that is...
Indexing can improve query performance but has drawbacks like increased storage and maintenance overhead.
Increased storage requirements: Indexes consume additional disk space. For example, a large table with multiple indexes can significantly increase storage needs.
Slower write operations: Inserting, updating, or deleting records can be slower due to the need to update indexes. For instance, adding a new row requires u...
I applied via Naukri.com and was interviewed in Nov 2022. There were 2 interview rounds.
Garbage collection is an automatic memory management process that frees up memory occupied by objects that are no longer in use.
Garbage collection is performed by the JVM.
It helps prevent memory leaks and improves application performance.
There are different types of garbage collectors such as serial, parallel, CMS, and G1.
Garbage collection can cause pauses in the application, which can be minimized by tuning the JVM p...
Microservices design pattern is an architectural approach to building software applications as a collection of small, independent services.
Microservices are independently deployable and scalable
Each microservice focuses on a specific business capability
Communication between microservices is done through APIs
Microservices can be developed using different programming languages and technologies
Examples of companies using ...
Sessions in Hibernate are used to manage the interaction between the application and the database.
A session is a single-threaded object that represents a connection between the application and the database.
It is responsible for managing the persistence of objects, executing queries, and providing transactional support.
A session can be obtained from a session factory and should be closed when no longer needed.
Example: S...
Hash collusion is when two different inputs produce the same hash value.
It is a security vulnerability in hash functions.
Attackers can exploit this vulnerability to create a collision attack.
For example, an attacker can create a malicious file with the same hash value as a legitimate file to bypass security checks.
Saga design pattern is used to manage long-lived transactions between microservices.
It ensures that all services involved in a transaction are either committed or rolled back together.
It uses a sequence of local transactions to achieve global consistency.
It can be implemented using either choreography or orchestration.
Example: A customer places an order, which involves multiple microservices such as inventory, payment,...
Top trending discussions
DBMS stands for Database Management System. It is used to manage and organize data in a structured manner.
DBMS is used in various industries such as healthcare, finance, education, and more.
It helps in creating, modifying, and deleting data in a database.
DBMS provides security features to protect data from unauthorized access.
Examples of DBMS include MySQL, Oracle, Microsoft SQL Server, and PostgreSQL.
An object is a self-contained entity that contains data and behavior.
Objects are instances of classes
They have attributes (data) and methods (behavior)
Objects can interact with each other through method calls
Example: A car object has attributes like color, make, and model, and methods like start and stop
Sorting is the process of arranging data in a particular order.
Sorting can be done in ascending or descending order.
Common sorting algorithms include bubble sort, insertion sort, and quicksort.
Sorting can be done on various data types, including strings, numbers, and objects.
Sorting can be done using built-in functions in programming languages such as sort() in JavaScript.
Sorting can be optimized for performance by cho...
C is a procedural programming language while C++ is an object-oriented programming language.
C++ supports classes and objects while C does not.
C++ has better support for polymorphism and inheritance than C.
C++ has a larger standard library than C.
C++ allows function overloading while C does not.
C++ supports exception handling while C does not.
Yes, my family is supportive of my career and relocation decisions.
My family understands the importance of career growth and is supportive of my decisions.
We have discussed the possibility of relocation and they are willing to make the necessary adjustments.
They trust my judgment and believe that this move will be beneficial for my career.
We have also considered the quality of life in Hyderabad and believe that it will...
posted on 3 Feb 2021
I applied via Naukri.com and was interviewed before Sep 2020. There were 3 interview rounds.
Company policies and locations
Our company has strict policies regarding data privacy and security
We have multiple locations across the country and internationally
Each location has its own set of policies and procedures
Employees are expected to adhere to all company policies regardless of location
I applied via Approached by Company and was interviewed before Mar 2021. There were 4 interview rounds.
DSA
About Social changes
I appeared for an interview before Sep 2020.
Round duration - 90 minutes
Round difficulty - Medium
We were supposed to give test in any time between 3 PM to 9 PM.
You are located at point ‘A’, the top-left corner of an M x N matrix, and your target is point ‘B’, the bottom-right corner of the same matrix. Your task is to calcula...
The problem involves finding the total number of unique paths from the top-left to bottom-right cell of a matrix by moving only right or down.
Use dynamic programming to solve the problem efficiently.
Create a 2D array to store the number of unique paths at each cell.
Initialize the first row and first column with 1 as there is only one way to reach them.
For each cell (i, j), the number of unique paths is the sum of paths...
We are provided with a tree containing 'N' nodes, numbered from 0 to N-1. The objective is to determine the total number of nodes within each subtree of the provided tree. Speci...
Given a tree with N nodes, find the number of elements in each subtree rooted at every node.
Traverse the tree using Depth First Search (DFS) to calculate subtree sizes for each node.
Use an array to store subtree sizes for each node, starting with leaf nodes having size 1.
The subtree size of a node is the sum of subtree sizes of its children plus 1 for the node itself.
Round duration - 120 minutes
Round difficulty - Medium
Pair Programming Interview( this round is similar to machine coding round) it started around 11 AM
Focus Areas: Problem solving and implementation of extensions.
The pair coding round is focused on OOPS concepts. You are paired with a TWer for this round. They let you code first for an hour and in the next hour they review your code and suggest changes which would improve the code structure, readability and make it modular and reusable and functional.
Ninja stands at the start of a wooden bridge over a river. Some segments of the bridge are damaged. The undamaged segments, marked as 'safe', are listed in an array S...
Check if Ninja can cross the river by jumping from one safe segment to another based on given constraints.
Iterate through the 'SAFE' array and check if Ninja can make the required jumps to reach the last safe segment.
Ensure that the next jump is either 'X' - 1, 'X', or 'X' + 1 units from the previous jump.
Return 'true' if Ninja can successfully cross the river, otherwise return 'false'.
Round duration - 120 minutes
Round difficulty - Medium
Students who were shortlisted from Pair Programming round was selected for this round around 3 PM. In this round there were two interviewer.
You are given the head node of a singly linked list. Your task is to return a pointer pointing to the middle of the linked list.
If there is an odd number of elements, return the ...
Return the middle element of a singly linked list, or the one farther from the head if there are even elements.
Traverse the linked list with two pointers, one moving twice as fast as the other
When the fast pointer reaches the end, the slow pointer will be at the middle
Return the element pointed to by the slow pointer
Tip 1 : Have good grasp on OOPS since they have a round named Pair Programming round which is focused upon this.
Tip 2 : Write clean, modular and functional code.
Tip 3 : Practice Data Structures and Algorithms
Tip 4 : You should know breadth and depth of whatever is mentioned in your resume.
Tip 5 : Be loud and clear.
Tip 1 : Make single page resume.
Tip 2 : Mention relevant things on resume.
Tip 3 : Do not put any false things on resume. Projects, internships you are mentioning be ready to answer questions related to it regarding what you solved, idea, databases, design.
Tip 4 : Contribute in open source, participate in hackathons.
based on 4 interview experiences
Difficulty level
Duration
based on 2 reviews
Rating in categories
Senior Software Engineer
550
salaries
| ₹19.2 L/yr - ₹35 L/yr |
Senior Consultant
409
salaries
| ₹20.7 L/yr - ₹38.3 L/yr |
Consultant
314
salaries
| ₹12 L/yr - ₹22 L/yr |
Software Engineer
212
salaries
| ₹5.5 L/yr - ₹16.1 L/yr |
Senior Software Developer
155
salaries
| ₹17 L/yr - ₹30 L/yr |
Accenture
Synechron
Movate
Sopra Steria