i
Mystifly Consulting
Filter interviews by
I applied via Naukri.com and was interviewed before Aug 2023. There was 1 interview round.
I applied via LinkedIn and was interviewed in Dec 2022. There were 3 interview rounds.
Seeking new challenges and opportunities for growth
Desire for new challenges and learning opportunities
Current role lacks growth potential
Interested in working with cutting-edge technologies
Seeking better work-life balance
The current project follows a microservices architecture with Docker containers and Kubernetes for orchestration.
Microservices architecture is used to break down the application into smaller, independent services that can be developed, deployed, and scaled independently.
Docker containers are used to package the application and its dependencies into a standardized unit for development, shipment, and deployment.
Kubernete...
TTL in Redis is decided based on the desired expiration time for the data stored in the cache.
Consider the nature of the data and how frequently it needs to be updated
Take into account the memory constraints and performance requirements of the application
Use a combination of default TTL values and custom TTL settings for different types of data
Monitor the cache usage and adjust TTL values based on usage patterns
LINQ (Language Integrated Query) is a feature in C# that allows querying data from different data sources using a uniform syntax.
LINQ allows querying data from collections, databases, XML, and other data sources using a common syntax.
It provides a set of standard query operators like Where, Select, OrderBy, GroupBy, etc.
LINQ queries are written in C# and are translated into equivalent SQL queries when querying database...
ACID properties ensure data integrity in relational databases.
Atomicity: All transactions are either fully completed or fully aborted.
Consistency: Data remains consistent before and after transactions.
Isolation: Transactions are isolated from each other until they are completed.
Durability: Once a transaction is committed, changes are permanent.
Example: If a bank transfer fails midway, the entire transaction is rolled b...
A linked list is a data structure that consists of a sequence of nodes, where each node contains a reference to the next node.
Advantages of linked list:
- Dynamic size: Linked lists can grow or shrink as needed.
- Efficient insertion and deletion: Adding or removing elements from a linked list is faster than an array.
- Flexibility: Linked lists can be easily modified and reorganized.
Representation of a linked list:
- Each...
Code for Fibonacci number using recursion
Define a function that takes an integer as input
If the input is 0 or 1, return the input
Else, return the sum of the function called with input-1 and input-2
Call the function with the desired input
Check if a sorted array from 1 to n has a repeated number.
Iterate through the array and check if the current element is equal to the next element.
If yes, return true. If no, continue iterating.
If the loop completes without finding a repeated element, return false.
Print a string with all occurrences of the first character first.
Loop through the string and count the occurrences of the first character.
Print the first character that many times, then print the rest of the string.
Print Fibonacci series using iterative or recursive approach.
Iterative approach: Use a loop to generate the series.
Recursive approach: Use a function to call itself to generate the series.
Start with 0 and 1, then add the previous two numbers to get the next number.
The series goes like this: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, ...
The series can be generated up to a certain limit or until a certain number is re
OOPS concepts are the principles of Object-Oriented Programming that focus on encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: bundling of data and methods that operate on that data within a single unit
Inheritance: ability of a class to inherit properties and methods from a parent class
Polymorphism: ability of objects to take on many forms or have multiple behaviors
Abstraction: hiding of complex...
Pillars of OOPS are the fundamental principles of Object-Oriented Programming.
Abstraction: Hiding implementation details and showing only necessary information.
Encapsulation: Binding data and functions together to protect data from outside interference.
Inheritance: Acquiring properties and behavior of a parent class by a child class.
Polymorphism: Ability of objects to take multiple forms or have multiple behaviors.
OOPS is important for code reusability, maintainability, and extensibility.
Encapsulation ensures data security and prevents unwanted access.
Inheritance allows for code reuse and reduces redundancy.
Polymorphism enables flexibility and extensibility of code.
Abstraction simplifies complex systems and hides implementation details.
OOPS promotes modular design and improves code maintainability.
OOPS facilitates team collabora...
Classes are templates for creating objects. Objects are instances of classes that have their own properties and methods.
Classes define the properties and methods that objects of that class will have
Objects are instances of classes that can be created and manipulated in code
Classes and objects are fundamental concepts in object-oriented programming
Example: A class 'Car' can have properties like 'make', 'model', 'year',
A constructor is a special method that is used to initialize objects in a class.
Constructors have the same name as the class they are in
They are called automatically when an object is created
They can take parameters to set initial values for object properties
Abstraction and interface are both used to achieve abstraction in programming.
Abstraction is the process of hiding implementation details while showing only the necessary information to the user.
Interface is a blueprint for a class that defines a set of methods and properties that the class must implement.
Abstraction can be achieved through abstract classes and interfaces.
Abstraction is a concept while interface is a l...
Abstraction is a way of hiding implementation details and showing only necessary information to the user.
Abstract class is a class that cannot be instantiated and can have both abstract and non-abstract methods.
Interface is a collection of abstract methods and constants that can be implemented by any class.
Abstract classes can have constructors, while interfaces cannot.
A class can implement multiple interfaces, but can...
Types of inheritance in software engineering
Single inheritance: a class inherits from only one parent class
Multiple inheritance: a class inherits from multiple parent classes
Multilevel inheritance: a class inherits from a derived class, which in turn inherits from another class
Hierarchical inheritance: multiple classes inherit from a single parent class
Hybrid inheritance: a combination of multiple and multilevel inheri
Structures are value types while classes are reference types.
Structures are allocated on stack while classes are allocated on heap.
Structures do not support inheritance while classes do.
Structures cannot have destructors while classes can.
Structures are used for small data structures while classes are used for larger, more complex objects.
Structures are passed by value while classes are passed by reference.
Constructor and destructor are special member functions in a class that are used to initialize and destroy objects respectively.
Constructor is called when an object is created and is used to initialize the object's data members.
Destructor is called when an object is destroyed and is used to free up any resources allocated by the object.
Constructor has the same name as the class and no return type, while destructor has ...
Encapsulation is the process of hiding implementation details and exposing only necessary information.
Encapsulation is achieved through access modifiers like public, private, and protected.
It helps in achieving data abstraction and information hiding.
It prevents unauthorized access to the internal state of an object.
Example: A class with private variables and public methods to access them.
To add a new column to an existing table, use the ALTER TABLE command.
Use the ALTER TABLE command followed by the table name.
Use the ADD keyword followed by the new column name and its data type.
Example: ALTER TABLE table_name ADD column_name data_type;
Make sure to specify any additional constraints or default values for the new column.
Query to return customers who joined the company in March.
Use the WHERE clause to filter the join date by month
Assuming the join date is stored in a 'join_date' column
Example: SELECT * FROM customers WHERE MONTH(join_date) = 3
The OSI model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the layers above and below it.
The Physical layer deals with the physical transmission of data.
The Data Link layer provid...
The application layer uses various protocols such as HTTP, FTP, SMTP, etc.
HTTP (Hypertext Transfer Protocol) is used for web browsing
FTP (File Transfer Protocol) is used for file transfer
SMTP (Simple Mail Transfer Protocol) is used for email communication
POP3 (Post Office Protocol version 3) is used for retrieving emails
IMAP (Internet Message Access Protocol) is used for accessing emails on a server
DNS (Domain Name Sys...
TCP is a connection-oriented protocol while UDP is connectionless.
TCP provides reliable, ordered, and error-checked delivery of data while UDP does not guarantee any of these.
TCP is slower but more reliable while UDP is faster but less reliable.
TCP is used for applications that require high reliability and accuracy while UDP is used for applications that require speed and efficiency.
Examples of TCP-based applications i...
To measure 4 minutes using two hourglasses of 11 and 7 minutes, start both hourglasses simultaneously and flip the 7-minute hourglass when it runs out. When the 11-minute hourglass runs out, 4 minutes will have passed.
Start both hourglasses simultaneously
When the 7-minute hourglass runs out, flip it
When the 11-minute hourglass runs out, 4 minutes will have passed
Program an ATM machine to dispense only 500 and 100 notes and count their number.
Create a function to dispense money
Use a loop to count the number of notes
Use if statements to check if the amount is divisible by 500 or 100
Display the total number of notes dispensed
Program to find binary format of 4 and 7.
Convert decimal numbers to binary using bitwise operator.
Print the binary format of the numbers.
Use printf or cout to display the output.
Print Fibonacci Series between two given numbers iteratively and recursively.
Iteratively, use a loop to generate Fibonacci numbers until the upper limit is reached.
Recursively, use a function to generate Fibonacci numbers until the upper limit is reached.
Store the generated Fibonacci numbers in an array and print them between the given numbers.
All possible ways to traverse a tree.
Pre-order traversal: root, left, right
In-order traversal: left, root, right
Post-order traversal: left, right, root
Level-order traversal: breadth-first search
Reverse level-order traversal: depth-first search
To find a loop in a linked list, use Floyd's cycle-finding algorithm.
Floyd's algorithm uses two pointers, one moving at twice the speed of the other.
If there is a loop, the faster pointer will eventually catch up to the slower one.
To determine the start of the loop, reset one pointer to the beginning and move both at the same speed.
Height of a tree refers to the maximum number of edges from the root node to any leaf node in the tree.
Height of a tree can be calculated recursively by finding the height of left and right subtrees and adding 1 to the maximum of the two heights.
Height of a tree can also be calculated iteratively using level order traversal.
Height of a tree with only one node is 0.
Height of an empty tree is -1.
I would use a Linked List data structure for frequent insertion and deletion operations.
Linked Lists have constant time complexity for insertion and deletion operations.
Arrays have a linear time complexity for these operations.
Doubly Linked Lists allow for efficient deletion of nodes.
Examples of use cases include implementing a queue or stack.
Find the element that occurs only once in an array of numbers from 1 to n with all other numbers occurring twice.
Use XOR operation to find the unique element.
Iterate through the array and XOR each element with the result.
The final result will be the unique element.
Abstraction: hiding implementation details. Inheritance: creating new classes from existing ones. Polymorphism: same method, different behavior.
Abstraction: Focuses on what an object does instead of how it does it.
Inheritance: Allows a new class to be based on an existing class.
Runtime Polymorphism: Same method can be used for different objects, with different behavior.
Example: A car is an abstraction of a vehicle. Sed...
DBMS stands for Database Management System. It is a software system that manages and organizes data in a database.
DBMS is used to create, modify, and delete databases and their objects.
It provides a way to store, retrieve, and manipulate data efficiently.
Examples of DBMS include MySQL, Oracle, SQL Server, and MongoDB.
Primary key uniquely identifies a record in a table, while unique key ensures uniqueness of a column.
Primary key can't have null values, while unique key can have one null value.
A table can have only one primary key, but multiple unique keys.
Primary key is used as a foreign key in other tables, while unique key is not.
Example: Primary key - employee_id in employee table. Unique key - email in employee table.
Constraints are limitations or restrictions that are put on a system or process.
Constraints can be related to time, resources, budget, or technology.
They can be imposed by external factors such as regulations or internal factors such as company policies.
Examples of constraints in software development include limited memory or processing power, compatibility with existing systems, and security requirements.
OS stands for Operating System. It is responsible for managing computer hardware and software resources.
OS is the interface between the user and the computer hardware.
It manages memory, processes, and input/output devices.
Examples of OS include Windows, macOS, and Linux.
OS is responsible for providing security and managing user accounts.
It also provides a platform for running applications and software.
Multithreading is the ability of a CPU to execute multiple threads concurrently.
Multithreading allows for better utilization of CPU resources.
It can improve application performance by allowing multiple tasks to run simultaneously.
Multithreading can also lead to synchronization issues and race conditions.
Examples of multithreaded applications include web servers, video games, and media players.
Multithreading is the ability of a CPU to run multiple threads concurrently, while multitasking is the ability of an OS to run multiple processes concurrently.
Multithreading is at the CPU level, while multitasking is at the OS level.
Multithreading allows multiple threads to share the same memory space, while multitasking requires separate memory spaces for each process.
Multithreading is used for improving performance a...
I am a software engineer with 5 years of experience in developing web applications using Java and JavaScript.
I have a strong background in object-oriented programming and software development principles.
I am proficient in Java, JavaScript, and related frameworks such as Spring and React.
I have experience in designing and implementing RESTful APIs.
I am familiar with Agile methodologies and have worked in Scrum teams.
I h...
My strength is problem-solving and my weakness is perfectionism.
Strength: Strong problem-solving skills
Strength: Ability to work well in a team
Weakness: Perfectionism
Weakness: Difficulty in delegating tasks
Mystify is likely a function or method that performs a complex or obscure operation.
Mystify could be encrypting or obfuscating data.
It might be performing a transformation or manipulation on data.
Mystify could be generating random or unpredictable outputs.
I want to join your company because of its reputation for innovation and the opportunity to work on cutting-edge projects.
Reputation for innovation
Opportunity to work on cutting-edge projects
You should hire me because I have a strong technical background, excellent problem-solving skills, and a passion for software development.
I have a Bachelor's degree in Computer Science and extensive experience in software development.
I have a deep understanding of various programming languages and frameworks, including Java, Python, and JavaScript.
I have a proven track record of delivering high-quality software solutio...
Mystifly Consulting interview questions for popular designations
I applied via Approached by Company and was interviewed before May 2023. There was 1 interview round.
Get interview-ready with Top Mystifly Consulting Interview Questions
I applied via Job Portal and was interviewed before Aug 2021. There were 2 interview rounds.
Object-oriented programming is a programming paradigm that uses objects to represent and manipulate data.
Encapsulation: bundling data and methods that operate on that data within one unit
Inheritance: creating new classes from existing ones
Polymorphism: ability of objects to take on many forms
Examples: Java, C++, Python, Ruby
I applied via Referral and was interviewed before Oct 2021. There were 2 interview rounds.
Top trending discussions
posted on 3 Jan 2025
I applied via Recruitment Consulltant and was interviewed in Dec 2024. There were 2 interview rounds.
Our company has 100 employees working in various departments.
We have a total of 100 workers in our company.
The employees are distributed across different departments such as sales, marketing, operations, and finance.
Each department has a varying number of employees based on their functions and workload.
Our company opened in 2005, specializing in luxury travel experiences.
Opened in 2005
Specializes in luxury travel experiences
Our company opened in 2005 and has been providing travel services for over 15 years.
Our company was established in 2005
We have been in operation for over 15 years
We have a proven track record of providing travel services since our opening
posted on 7 Jan 2025
I applied via Referral
Normal aptitude test conducted
I applied via campus placement at Indian Institute of Technology (IIT), Jodhpur
Experienced cluster manager with a proven track record in team leadership and strategic planning.
Over 5 years of experience in managing multiple teams and projects simultaneously
Strong leadership skills with the ability to motivate and inspire team members
Expertise in strategic planning and execution to achieve organizational goals
Excellent communication and interpersonal skills for effective team collaboration
Proven t...
Interview experience
based on 84 reviews
Rating in categories
Senior Travel Consultant
59
salaries
| ₹3.5 L/yr - ₹7 L/yr |
Travel Consultant
23
salaries
| ₹3 L/yr - ₹6 L/yr |
Senior Accounts Executive
21
salaries
| ₹4.2 L/yr - ₹7.1 L/yr |
Software Engineer
20
salaries
| ₹5.5 L/yr - ₹20 L/yr |
Product Manager
15
salaries
| ₹26 L/yr - ₹41 L/yr |
Amadeus
Travelport
Sabre
Cleartrip