i
NeoSOFT
Filter interviews by
Microservices offer benefits such as scalability, flexibility, and easier maintenance.
Scalability: Microservices allow for individual components to be scaled independently, leading to better resource utilization.
Flexibility: Each microservice can be developed, deployed, and updated independently, allowing for more flexibility in the development process.
Easier maintenance: With microservices, it is easier to identi...
ViewBag and ViewData are used in ASP.NET MVC to pass data from controller to view.
ViewBag is a dynamic property that allows you to pass data from controller to view.
ViewData is a dictionary object that allows you to pass data from controller to view.
ViewBag is a dynamic object while ViewData is a dictionary object.
Example: ViewBag.Title = 'Home Page'; ViewData['Message'] = 'Welcome to my website';
CORS stands for Cross-Origin Resource Sharing, a security feature that allows servers to specify who can access their resources.
CORS is a security feature implemented by browsers to prevent unauthorized access to resources on a different origin.
It allows servers to specify which origins are allowed to access their resources through HTTP headers.
CORS is commonly used to enable cross-origin requests in web applicati...
JWT is a compact, self-contained way to securely transmit information between parties as a JSON object.
JWT stands for JSON Web Token.
It consists of three parts: header, payload, and signature.
It is commonly used for authentication and information exchange in web development.
Example: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwp...
.Net Core is a free, open-source, cross-platform framework for building modern, cloud-based, internet-connected applications.
Developed by Microsoft as the successor to the .NET Framework
Supports multiple operating systems like Windows, macOS, and Linux
Provides high performance and scalability for web applications
Includes a modular and lightweight runtime called CoreCLR
Allows developers to use C#, F#, and Visual B...
Middleware is software that acts as a bridge between an application's front end and back end, allowing them to communicate and interact.
Middleware can handle tasks such as authentication, logging, error handling, and routing.
It can be used to modify incoming requests or outgoing responses.
Examples of middleware include Express.js middleware in Node.js applications and ASP.NET middleware in .NET applications.
Dependency Injection is a design pattern where components are given their dependencies rather than creating them internally.
Allows for better code reusability and testability
Reduces coupling between components
Promotes separation of concerns
Examples: Constructor Injection, Setter Injection, Interface Injection
Solid Principles are a set of five design principles for writing clean, maintainable, and scalable code.
Single Responsibility Principle: A class should have only one reason to change.
Open/Closed Principle: Classes should be open for extension but closed for modification.
Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the program's correc...
I applied via Referral
.Net Core is a free, open-source, cross-platform framework for building modern, cloud-based, internet-connected applications.
Developed by Microsoft as the successor to the .NET Framework
Supports multiple operating systems like Windows, macOS, and Linux
Provides high performance and scalability for web applications
Includes a modular and lightweight runtime called CoreCLR
Allows developers to use C#, F#, and Visual Basic ...
Microservices offer benefits such as scalability, flexibility, and easier maintenance.
Scalability: Microservices allow for individual components to be scaled independently, leading to better resource utilization.
Flexibility: Each microservice can be developed, deployed, and updated independently, allowing for more flexibility in the development process.
Easier maintenance: With microservices, it is easier to identify an...
ViewBag and ViewData are used in ASP.NET MVC to pass data from controller to view.
ViewBag is a dynamic property that allows you to pass data from controller to view.
ViewData is a dictionary object that allows you to pass data from controller to view.
ViewBag is a dynamic object while ViewData is a dictionary object.
Example: ViewBag.Title = 'Home Page'; ViewData['Message'] = 'Welcome to my website';
CORS stands for Cross-Origin Resource Sharing, a security feature that allows servers to specify who can access their resources.
CORS is a security feature implemented by browsers to prevent unauthorized access to resources on a different origin.
It allows servers to specify which origins are allowed to access their resources through HTTP headers.
CORS is commonly used to enable cross-origin requests in web applications, ...
JWT is a compact, self-contained way to securely transmit information between parties as a JSON object.
JWT stands for JSON Web Token.
It consists of three parts: header, payload, and signature.
It is commonly used for authentication and information exchange in web development.
Example: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf3...
Middleware is software that acts as a bridge between an application's front end and back end, allowing them to communicate and interact.
Middleware can handle tasks such as authentication, logging, error handling, and routing.
It can be used to modify incoming requests or outgoing responses.
Examples of middleware include Express.js middleware in Node.js applications and ASP.NET middleware in .NET applications.
Dependency Injection is a design pattern where components are given their dependencies rather than creating them internally.
Allows for better code reusability and testability
Reduces coupling between components
Promotes separation of concerns
Examples: Constructor Injection, Setter Injection, Interface Injection
Solid Principles are a set of five design principles for writing clean, maintainable, and scalable code.
Single Responsibility Principle: A class should have only one reason to change.
Open/Closed Principle: Classes should be open for extension but closed for modification.
Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the program's correctness...
I appeared for an interview before May 2024, where I was asked the following questions.
Basic level of maths and some coding related questions
On current affairs and daily routine
Two basic questions related to pattern string array etc
Top trending discussions
posted on 11 Mar 2022
I appeared for an interview before Mar 2021.
Round duration - 60 minutes
Round difficulty - Medium
21 students were shortlisted from the 1st MCQ round and in this round we were asked to write the codes (function only) of 3 questions in 1 hour time.
You are given a grid containing oranges where each cell of the grid can contain one of the three integer values:
Find the minimum time required to rot all fresh oranges in a grid.
Use Breadth First Search (BFS) to simulate the rotting process
Track the time taken to rot all oranges and return -1 if any fresh oranges remain
Handle edge cases like no fresh oranges or all oranges already rotten
Consider using a queue to efficiently process adjacent oranges
Given an array/list 'ARR' consisting of 'N' integers, your task is to find the majority element in the array. If there is no majority element present, return -1.
Find the majority element in an array, return -1 if no majority element exists.
Iterate through the array and keep track of the count of each element using a hashmap.
Check if any element's count is greater than floor(N/2) to determine the majority element.
Return the majority element or -1 if no majority element exists.
You are provided with a non-empty binary tree in which each node contains a non-negative integer value. Your task is to find and return the maximum ...
Find the maximum path sum between two leaf nodes in a binary tree.
Traverse the tree to find the maximum path sum between two leaf nodes.
Keep track of the maximum sum found so far.
Consider all possible paths between leaf nodes.
Handle cases where the tree has only a single leaf node.
Implement a recursive function to calculate the maximum path sum.
Round duration - 60 minutes
Round difficulty - Medium
This was a technical round with DSA based questions.
You are given a Singly Linked List of integers. The task is to find the N-th node from the end of the list.
If the given list is (1 -> -2 -&g...
Find the N-th node from the end of a Singly Linked List of integers.
Traverse the list to find the length L of the list.
Calculate the position of the N-th node from the beginning as L - N + 1.
Traverse the list again to reach the calculated position and return the node's value.
You are given a binary tree consisting of distinct integers and two nodes, X
and Y
. Your task is to find and return the Lowest Common Ancestor (LCA) of these two nodes...
Find the Lowest Common Ancestor (LCA) of two nodes in a binary tree.
Traverse the binary tree to find the paths from the root to nodes X and Y.
Compare the paths to find the last common node, which is the LCA.
Handle cases where one node is an ancestor of the other or when one node is the LCA itself.
You are given a string of length N
. Your task is to reverse the string word by word. The input may contain multiple spaces between words and may have leading o...
Reverse words in a string while handling leading/trailing spaces and multiple spaces between words.
Split the input string by spaces to get individual words
Reverse the list of words
Join the reversed words with a single space in between
Handle leading/trailing spaces by stripping them before and after reversing
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions based on DSA
Given 'N' subjects, each containing a certain number of problems, and 'K' friends, assign subjects to friends such that each subject goes to exactly one friend, maintain...
Assign subjects to friends to minimize maximum workload, find minimum time for most loaded friend.
Sort subjects in descending order
Assign subjects to friends one by one until all subjects are assigned
The maximum workload will be the sum of problems assigned to the friend with the most problems
Return the maximum workload as the minimum time required
Grammar in compiler design defines the syntax and structure of a programming language.
Grammar specifies the rules for forming valid statements in a programming language.
It consists of a set of production rules that define how valid programs can be constructed.
There are different types of grammars such as context-free grammar, regular grammar, etc.
Example: In C programming language, the grammar specifies that a for loop...
A token in compiler design is a basic unit of syntax that the compiler can understand and process.
Tokens are the smallest units of a program that are meaningful to the compiler.
Examples of tokens include keywords, identifiers, operators, and punctuation symbols.
Tokens are generated by the lexical analysis phase of the compiler.
Tokens are used by the parser to build the abstract syntax tree of the program.
Round duration - 60 minutes
Round difficulty - Easy
Technical round with questions on DSA and Compiler Design mainly. He told me that you’ll be having your final HR round in some time. I knew that I was going well because he seemed to be quite satisfied with my answers.
You are given an arbitrary binary tree consisting of N nodes, each associated with an integer value from 1 to 9. Each root-to-leaf path can be considered a number formed by concat...
Find the total sum of all root to leaf paths in a binary tree formed by concatenating node values.
Traverse the binary tree from root to leaf nodes, keeping track of the current path sum
Add the current path sum to the total sum when reaching a leaf node
Use modulo (10^9 + 7) to handle large outputs
A regular language is a language that can be recognized by a finite automaton.
Regular languages can be described by regular expressions.
Regular languages are closed under union, concatenation, and Kleene star operations.
Examples of regular languages include the set of all strings over an alphabet that contain an even number of 'a's.
NP problems are decision problems that can be verified in polynomial time, while NP-Hard problems are at least as hard as the hardest problems in NP.
NP problems can be verified in polynomial time but not necessarily solved in polynomial time.
NP-Hard problems are at least as hard as the hardest problems in NP, but may not be in NP themselves.
Examples of NP problems include the subset sum problem and the traveling salesm...
Round duration - 30 minutes
Round difficulty - Easy
That was the round for which I’ve been waiting for hours
She was very friendly and nice to talk to. It didn’t seem that I was talking to the HR. It was more like talking to a friend. Finally we discussed about the pay-scale and work culture in Accolite.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
posted on 27 Jul 2022
I applied via Campus Placement and was interviewed before Jul 2021. There were 5 interview rounds.
Round 1 was about 60 mins long. Basic Aptitude questions along with Programming MCQ
Round 2 had 2 coding questions with a time limit of 60mins. Intermediate level problem solving
knowledge is neccessary.
posted on 12 Jun 2021
I applied via Campus Placement and was interviewed in Dec 2020. There was 1 interview round.
Convert given no to corresponding excel no.
Excel no starts from 1 and goes up to 16384
Excel no is calculated using column and row numbers
For example, 1 corresponds to A, 27 corresponds to AA, 28 corresponds to AB, and so on
Find unique characters in a window of k size in a string.
Use a sliding window approach.
Maintain a hash table to keep track of character frequency.
Remove characters from hash table as the window slides.
I applied via Campus Placement and was interviewed in May 2022. There were 3 interview rounds.
It was a 1 Hour aptitude test along a few MCQ based questions on DSA.
Identify and return missing numbers from a given list in Python using various methods.
Use a set to find missing numbers: Convert the list to a set and compare with a complete set of numbers.
Example: Given list [1, 2, 4, 6], complete set is {1, 2, 3, 4, 5, 6}. Missing: {3, 5}.
Utilize list comprehension: Create a list of numbers in the range and filter out those present in the original list.
Example: [n for n in range(1, ...
Quick sort is an efficient sorting algorithm that uses a divide-and-conquer approach to sort elements in an array.
1. Choose a 'pivot' element from the array. Example: In [3, 6, 8, 10, 1, 2, 1], choose 6 as pivot.
2. Partition the array into two sub-arrays: elements less than the pivot and elements greater than the pivot.
3. Recursively apply the above steps to the sub-arrays. Example: [3, 1, 2] and [8, 10] after partitio...
I applied via Naukri.com and was interviewed in Oct 2024. There were 3 interview rounds.
Online zoom coding test will be there - 4 questions - 2 about output of code & 2 about technical questions.
Polymorphism is the ability of a single function or method to operate on different types of data.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
Virtual polymorphism is achieved through virtual functions in C++.
Virtual functions allow a function in a base class to be overridden in a derived class.
Example: Animal class with virtual function 'makeSound' overridden in Dog a...
Virtual polymorphism allows objects of different classes to be treated as objects of a common superclass.
Create a base class with virtual functions
Create derived classes that override the virtual functions
Use pointers or references of the base class to call the overridden functions
I seek new challenges and opportunities for growth that align with my career goals and aspirations in software development.
Career Growth: I'm looking for a position that offers more opportunities for advancement, such as leading projects or mentoring junior developers.
Skill Development: I want to work with new technologies and frameworks that will enhance my skill set, like transitioning from Java to modern cloud techn...
based on 4 interview experiences
Difficulty level
Duration
Software Engineer
2.1k
salaries
| ₹5.2 L/yr - ₹12 L/yr |
Senior Software Engineer
807
salaries
| ₹9.8 L/yr - ₹18.2 L/yr |
Software Developer
715
salaries
| ₹3.4 L/yr - ₹13.1 L/yr |
Softwaretest Engineer
509
salaries
| ₹3.8 L/yr - ₹9 L/yr |
Front end Developer
204
salaries
| ₹4.6 L/yr - ₹10.8 L/yr |
ITC Infotech
CMS IT Services
KocharTech
Xoriant