i
Mystifly Consulting
Filter interviews by
A linked list is a data structure that consists of a sequence of nodes, where each node contains a reference to the next node.
Advantages of linked list:
- Dynamic size: Linked lists can grow or shrink as needed.
- Efficient insertion and deletion: Adding or removing elements from a linked list is faster than an array.
- Flexibility: Linked lists can be easily modified and reorganized.
Representation of a linked list:
- Each...
Code for Fibonacci number using recursion
Define a function that takes an integer as input
If the input is 0 or 1, return the input
Else, return the sum of the function called with input-1 and input-2
Call the function with the desired input
Check if a sorted array from 1 to n has a repeated number.
Iterate through the array and check if the current element is equal to the next element.
If yes, return true. If no, continue iterating.
If the loop completes without finding a repeated element, return false.
Print a string with all occurrences of the first character first.
Loop through the string and count the occurrences of the first character.
Print the first character that many times, then print the rest of the string.
Print Fibonacci series using iterative or recursive approach.
Iterative approach: Use a loop to generate the series.
Recursive approach: Use a function to call itself to generate the series.
Start with 0 and 1, then add the previous two numbers to get the next number.
The series goes like this: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, ...
The series can be generated up to a certain limit or until a certain number is re
OOPS concepts are the principles of Object-Oriented Programming that focus on encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: bundling of data and methods that operate on that data within a single unit
Inheritance: ability of a class to inherit properties and methods from a parent class
Polymorphism: ability of objects to take on many forms or have multiple behaviors
Abstraction: hiding of complex...
Pillars of OOPS are the fundamental principles of Object-Oriented Programming.
Abstraction: Hiding implementation details and showing only necessary information.
Encapsulation: Binding data and functions together to protect data from outside interference.
Inheritance: Acquiring properties and behavior of a parent class by a child class.
Polymorphism: Ability of objects to take multiple forms or have multiple behaviors.
OOPS is important for code reusability, maintainability, and extensibility.
Encapsulation ensures data security and prevents unwanted access.
Inheritance allows for code reuse and reduces redundancy.
Polymorphism enables flexibility and extensibility of code.
Abstraction simplifies complex systems and hides implementation details.
OOPS promotes modular design and improves code maintainability.
OOPS facilitates team collabora...
Classes are templates for creating objects. Objects are instances of classes that have their own properties and methods.
Classes define the properties and methods that objects of that class will have
Objects are instances of classes that can be created and manipulated in code
Classes and objects are fundamental concepts in object-oriented programming
Example: A class 'Car' can have properties like 'make', 'model', 'year',
A constructor is a special method that is used to initialize objects in a class.
Constructors have the same name as the class they are in
They are called automatically when an object is created
They can take parameters to set initial values for object properties
Abstraction and interface are both used to achieve abstraction in programming.
Abstraction is the process of hiding implementation details while showing only the necessary information to the user.
Interface is a blueprint for a class that defines a set of methods and properties that the class must implement.
Abstraction can be achieved through abstract classes and interfaces.
Abstraction is a concept while interface is a l...
Abstraction is a way of hiding implementation details and showing only necessary information to the user.
Abstract class is a class that cannot be instantiated and can have both abstract and non-abstract methods.
Interface is a collection of abstract methods and constants that can be implemented by any class.
Abstract classes can have constructors, while interfaces cannot.
A class can implement multiple interfaces, but can...
Types of inheritance in software engineering
Single inheritance: a class inherits from only one parent class
Multiple inheritance: a class inherits from multiple parent classes
Multilevel inheritance: a class inherits from a derived class, which in turn inherits from another class
Hierarchical inheritance: multiple classes inherit from a single parent class
Hybrid inheritance: a combination of multiple and multilevel inheri
Structures are value types while classes are reference types.
Structures are allocated on stack while classes are allocated on heap.
Structures do not support inheritance while classes do.
Structures cannot have destructors while classes can.
Structures are used for small data structures while classes are used for larger, more complex objects.
Structures are passed by value while classes are passed by reference.
Constructor and destructor are special member functions in a class that are used to initialize and destroy objects respectively.
Constructor is called when an object is created and is used to initialize the object's data members.
Destructor is called when an object is destroyed and is used to free up any resources allocated by the object.
Constructor has the same name as the class and no return type, while destructor has ...
Encapsulation is the process of hiding implementation details and exposing only necessary information.
Encapsulation is achieved through access modifiers like public, private, and protected.
It helps in achieving data abstraction and information hiding.
It prevents unauthorized access to the internal state of an object.
Example: A class with private variables and public methods to access them.
To add a new column to an existing table, use the ALTER TABLE command.
Use the ALTER TABLE command followed by the table name.
Use the ADD keyword followed by the new column name and its data type.
Example: ALTER TABLE table_name ADD column_name data_type;
Make sure to specify any additional constraints or default values for the new column.
Query to return customers who joined the company in March.
Use the WHERE clause to filter the join date by month
Assuming the join date is stored in a 'join_date' column
Example: SELECT * FROM customers WHERE MONTH(join_date) = 3
The OSI model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the layers above and below it.
The Physical layer deals with the physical transmission of data.
The Data Link layer provid...
The application layer uses various protocols such as HTTP, FTP, SMTP, etc.
HTTP (Hypertext Transfer Protocol) is used for web browsing
FTP (File Transfer Protocol) is used for file transfer
SMTP (Simple Mail Transfer Protocol) is used for email communication
POP3 (Post Office Protocol version 3) is used for retrieving emails
IMAP (Internet Message Access Protocol) is used for accessing emails on a server
DNS (Domain Name Sys...
TCP is a connection-oriented protocol while UDP is connectionless.
TCP provides reliable, ordered, and error-checked delivery of data while UDP does not guarantee any of these.
TCP is slower but more reliable while UDP is faster but less reliable.
TCP is used for applications that require high reliability and accuracy while UDP is used for applications that require speed and efficiency.
Examples of TCP-based applications i...
To measure 4 minutes using two hourglasses of 11 and 7 minutes, start both hourglasses simultaneously and flip the 7-minute hourglass when it runs out. When the 11-minute hourglass runs out, 4 minutes will have passed.
Start both hourglasses simultaneously
When the 7-minute hourglass runs out, flip it
When the 11-minute hourglass runs out, 4 minutes will have passed
Program an ATM machine to dispense only 500 and 100 notes and count their number.
Create a function to dispense money
Use a loop to count the number of notes
Use if statements to check if the amount is divisible by 500 or 100
Display the total number of notes dispensed
Program to find binary format of 4 and 7.
Convert decimal numbers to binary using bitwise operator.
Print the binary format of the numbers.
Use printf or cout to display the output.
Print Fibonacci Series between two given numbers iteratively and recursively.
Iteratively, use a loop to generate Fibonacci numbers until the upper limit is reached.
Recursively, use a function to generate Fibonacci numbers until the upper limit is reached.
Store the generated Fibonacci numbers in an array and print them between the given numbers.
All possible ways to traverse a tree.
Pre-order traversal: root, left, right
In-order traversal: left, root, right
Post-order traversal: left, right, root
Level-order traversal: breadth-first search
Reverse level-order traversal: depth-first search
To find a loop in a linked list, use Floyd's cycle-finding algorithm.
Floyd's algorithm uses two pointers, one moving at twice the speed of the other.
If there is a loop, the faster pointer will eventually catch up to the slower one.
To determine the start of the loop, reset one pointer to the beginning and move both at the same speed.
Height of a tree refers to the maximum number of edges from the root node to any leaf node in the tree.
Height of a tree can be calculated recursively by finding the height of left and right subtrees and adding 1 to the maximum of the two heights.
Height of a tree can also be calculated iteratively using level order traversal.
Height of a tree with only one node is 0.
Height of an empty tree is -1.
I would use a Linked List data structure for frequent insertion and deletion operations.
Linked Lists have constant time complexity for insertion and deletion operations.
Arrays have a linear time complexity for these operations.
Doubly Linked Lists allow for efficient deletion of nodes.
Examples of use cases include implementing a queue or stack.
Find the element that occurs only once in an array of numbers from 1 to n with all other numbers occurring twice.
Use XOR operation to find the unique element.
Iterate through the array and XOR each element with the result.
The final result will be the unique element.
Abstraction: hiding implementation details. Inheritance: creating new classes from existing ones. Polymorphism: same method, different behavior.
Abstraction: Focuses on what an object does instead of how it does it.
Inheritance: Allows a new class to be based on an existing class.
Runtime Polymorphism: Same method can be used for different objects, with different behavior.
Example: A car is an abstraction of a vehicle. Sed...
DBMS stands for Database Management System. It is a software system that manages and organizes data in a database.
DBMS is used to create, modify, and delete databases and their objects.
It provides a way to store, retrieve, and manipulate data efficiently.
Examples of DBMS include MySQL, Oracle, SQL Server, and MongoDB.
Primary key uniquely identifies a record in a table, while unique key ensures uniqueness of a column.
Primary key can't have null values, while unique key can have one null value.
A table can have only one primary key, but multiple unique keys.
Primary key is used as a foreign key in other tables, while unique key is not.
Example: Primary key - employee_id in employee table. Unique key - email in employee table.
Constraints are limitations or restrictions that are put on a system or process.
Constraints can be related to time, resources, budget, or technology.
They can be imposed by external factors such as regulations or internal factors such as company policies.
Examples of constraints in software development include limited memory or processing power, compatibility with existing systems, and security requirements.
OS stands for Operating System. It is responsible for managing computer hardware and software resources.
OS is the interface between the user and the computer hardware.
It manages memory, processes, and input/output devices.
Examples of OS include Windows, macOS, and Linux.
OS is responsible for providing security and managing user accounts.
It also provides a platform for running applications and software.
Multithreading is the ability of a CPU to execute multiple threads concurrently.
Multithreading allows for better utilization of CPU resources.
It can improve application performance by allowing multiple tasks to run simultaneously.
Multithreading can also lead to synchronization issues and race conditions.
Examples of multithreaded applications include web servers, video games, and media players.
Multithreading is the ability of a CPU to run multiple threads concurrently, while multitasking is the ability of an OS to run multiple processes concurrently.
Multithreading is at the CPU level, while multitasking is at the OS level.
Multithreading allows multiple threads to share the same memory space, while multitasking requires separate memory spaces for each process.
Multithreading is used for improving performance a...
I am a software engineer with 5 years of experience in developing web applications using Java and JavaScript.
I have a strong background in object-oriented programming and software development principles.
I am proficient in Java, JavaScript, and related frameworks such as Spring and React.
I have experience in designing and implementing RESTful APIs.
I am familiar with Agile methodologies and have worked in Scrum teams.
I h...
My strength is problem-solving and my weakness is perfectionism.
Strength: Strong problem-solving skills
Strength: Ability to work well in a team
Weakness: Perfectionism
Weakness: Difficulty in delegating tasks
Mystify is likely a function or method that performs a complex or obscure operation.
Mystify could be encrypting or obfuscating data.
It might be performing a transformation or manipulation on data.
Mystify could be generating random or unpredictable outputs.
I want to join your company because of its reputation for innovation and the opportunity to work on cutting-edge projects.
Reputation for innovation
Opportunity to work on cutting-edge projects
You should hire me because I have a strong technical background, excellent problem-solving skills, and a passion for software development.
I have a Bachelor's degree in Computer Science and extensive experience in software development.
I have a deep understanding of various programming languages and frameworks, including Java, Python, and JavaScript.
I have a proven track record of delivering high-quality software solutio...
I applied via Job Portal and was interviewed before Aug 2021. There were 2 interview rounds.
Object-oriented programming is a programming paradigm that uses objects to represent and manipulate data.
Encapsulation: bundling data and methods that operate on that data within one unit
Inheritance: creating new classes from existing ones
Polymorphism: ability of objects to take on many forms
Examples: Java, C++, Python, Ruby
Top trending discussions
I applied via Campus Placement
Basic DSA questions related to string and hashmap
I applied via campus placement at Motilal Nehru Institute National Institute of Technology (NIT), Allahabad and was interviewed in Jun 2022. There were 5 interview rounds.
50 mcq were asked in 12 mins. Most of the candidates qualified this round.
3 coding questions of basic DSA were asked. Also few mcqs from Operating System, Networking and DBMS.
posted on 27 May 2022
I applied via Company Website and was interviewed in Apr 2022. There were 6 interview rounds.
Naaptol
Naaptol
Naaptol
Study ing information
I applied via campus placement at Indian Institute of Technology (IIT), Roorkee and was interviewed before Sep 2020. There was 1 interview round.
I applied via Referral and was interviewed in Jul 2023. There were 2 interview rounds.
I applied via Referral and was interviewed before Feb 2023. There were 2 interview rounds.
45 mins, Basic aptitude , comprehension and decision making questions
I applied via Youtube Video and was interviewed before Feb 2023. There were 3 interview rounds.
There were many questions to be solved within an hour, but the expectation was to solve maximum you can.
1 DSA based and 2 SQL coding questions with 5/6 DSA based MCQs
Python code to find missing element and SQL query for fetching data from multiple tables.
Python code to find missing element: Use set difference to find missing elements in range 0 to 100.
SQL query for fetching data from multiple tables: Use JOINs like INNER JOIN, LEFT JOIN, or CROSS JOIN to combine data from multiple tables.
Types of Joins in SQL: INNER JOIN, LEFT JOIN, RIGHT JOIN, FULL JOIN.
Stored Procedures: Precompi...
I applied via Naukri.com and was interviewed before Oct 2022. There were 4 interview rounds.
15 minutes test.
50 questions
easy questions
Management , Leadership , Character Type questions
2 coding questions
resume grilling
easy medium questions
Some of the top questions asked at the Mystifly Consulting Software Engineer interview -
based on 6 reviews
Rating in categories
Senior Travel Consultant
59
salaries
| ₹3.5 L/yr - ₹7 L/yr |
Travel Consultant
23
salaries
| ₹3 L/yr - ₹6 L/yr |
Senior Accounts Executive
21
salaries
| ₹4.2 L/yr - ₹7.1 L/yr |
Software Engineer
20
salaries
| ₹5.5 L/yr - ₹20 L/yr |
Product Manager
15
salaries
| ₹26 L/yr - ₹41 L/yr |
Amadeus
Travelport
Sabre
Cleartrip