i
MBM Newtech
Filter interviews by
I have thoroughly reviewed my resume twice to ensure accuracy and relevance.
Highlighted key achievements and experiences in each role
Checked for any spelling or grammatical errors
Ensured consistency in formatting and layout
The question seems to be incomplete or unclear.
Ask for clarification on the question
Request more information to provide a relevant answer
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
Top trending discussions
I applied via campus placement at Vellore Institute of Technology (VIT) and was interviewed in Oct 2024. There were 2 interview rounds.
It included mcqs and multiple coding questions.
posted on 22 Oct 2024
Linux is a free and open-source operating system based on Unix, with some key differences in licensing and development.
Linux is open-source and freely available, while Unix is a proprietary operating system.
Linux is developed by a community of developers worldwide, while Unix is developed by various companies.
Linux has a wider range of distributions (e.g. Ubuntu, Fedora), while Unix has fewer variations (e.g. Solaris, ...
The company specializes in developing innovative software solutions for various industries.
Develops software solutions for industries such as healthcare, finance, and retail
Focuses on creating cutting-edge technology to improve efficiency and productivity
Provides customized software solutions to meet specific business needs
I applied via Approached by Company and was interviewed in Mar 2024. There were 5 interview rounds.
Starts with an online assessment test on HackerRank. Expect a LeetCode Medium question most of the time, mostly created by HackerRank.
A promise is an object representing the eventual completion or failure of an asynchronous operation.
Promises are used in JavaScript to handle asynchronous operations.
They can be in one of three states: pending, fulfilled, or rejected.
Promises can be chained using .then() to handle success and failure callbacks.
Example: Fetching data from an API returns a promise that resolves with the data or rejects with an error.
Hoisting is a JavaScript mechanism where variable and function declarations are moved to the top of their containing scope during compilation.
Variable and function declarations are hoisted to the top of their scope.
Only declarations are hoisted, not initializations.
Function declarations take precedence over variable declarations.
Event loop is a mechanism in programming that allows for asynchronous execution of code by continuously checking for and handling events.
Event loop is commonly used in JavaScript to handle asynchronous operations like setTimeout, setInterval, and AJAX requests.
It allows for non-blocking I/O operations, ensuring that the program can continue running while waiting for I/O operations to complete.
Event loop works by contin...
posted on 25 Jun 2024
I was interviewed in May 2024.
Calculate the frequency of a specific integer in an array of strings.
Iterate through the array and use a hashmap to store the frequency of each integer.
Return the frequency of the specified integer from the hashmap.
Node.js is a runtime environment that allows you to run JavaScript on the server side.
Node.js is built on Chrome's V8 JavaScript engine.
It uses an event-driven, non-blocking I/O model.
Node.js is commonly used for building server-side applications and APIs.
It has a large ecosystem of libraries and frameworks, such as Express and Socket.io.
posted on 25 Apr 2024
DNS port number is 53.
DNS port number is used for DNS queries and responses.
It is a well-known port number, which is 53.
DNS uses both TCP and UDP protocols on port 53.
SSH port number is 22.
SSH port number is used for secure communication over a network.
Default port number for SSH is 22.
Port number can be changed for security reasons.
Example: ssh user@hostname -p 2222
A brute force attack is a trial-and-error method used by hackers to crack passwords or encryption by systematically trying all possible combinations.
Brute force attacks are time-consuming but effective against weak passwords.
Hackers use automated tools to try all possible combinations until the correct one is found.
Examples include trying all possible 4-digit PIN codes or dictionary words as passwords.
Strong passwords ...
I applied via LinkedIn and was interviewed in Jul 2024. There was 1 interview round.
Questions were asked about my on my education background, my family, and why do I want to join this company?
based on 2 interviews
Interview experience
based on 16 reviews
Rating in categories
Fractal Analytics
Watchyourhealth.com
Subex
MathCo