i
NetApp
Filter interviews by
I applied via campus placement at National Institute of Industrial Engineering (NITIE) and was interviewed before Nov 2021. There were 5 interview rounds.
The aptitude test comprised both coding as well as aptitude questions but most of them were purely aptitude based.
Machine learning is teaching computers to learn and improve from experience without being explicitly programmed.
Machine learning is a subset of artificial intelligence.
It involves training algorithms to recognize patterns in data.
The algorithms then use these patterns to make predictions or decisions.
Examples include image recognition, speech recognition, and recommendation systems.
Machine learning requires large amoun...
Research methodology is a systematic approach to conducting research, including the collection and analysis of data.
Research methodology involves identifying a research problem, developing a research plan, collecting data, analyzing data, and drawing conclusions.
There are different types of research methodologies, including qualitative, quantitative, and mixed methods.
Qualitative research involves collecting non-numeri...
Machine learning is a subset of AI that uses statistical techniques to enable machines to learn from data and improve performance.
Artificial Intelligence is the broader concept of machines being able to carry out tasks in a way that we would consider smart.
Statistics is the study of the collection, analysis, interpretation, presentation, and organization of data.
Machine learning is a subset of AI that uses statistical ...
I applied via campus placement at Vellore Institute of Technology (VIT) and was interviewed before Sep 2021. There were 6 interview rounds.
Hackerank Test where we need to solve a couple of questions
Multi-threading allows concurrent execution of multiple threads. Collection framework provides a set of interfaces and classes for storing and manipulating data.
Multi-threading improves performance by utilizing multiple cores of CPU
Collection framework provides interfaces like List, Set, Map for storing data
Java provides synchronized collections for thread-safe operations
ConcurrentHashMap is a thread-safe implementatio
Salesforce Sales Process is a structured approach to selling that involves identifying, qualifying, and closing deals.
The process starts with lead generation and qualification
Sales reps then engage with prospects to understand their needs and pain points
They then present a solution and negotiate terms
Finally, they close the deal and follow up with post-sales activities
Salesforce provides tools to manage the entire proc...
NetApp interview questions for popular designations
I applied via Naukri.com and was interviewed in Jan 2021. There were 3 interview rounds.
Get interview-ready with Top NetApp Interview Questions
I applied via Referral and was interviewed before Feb 2020. There were 3 interview rounds.
Parity is calculated by counting the number of 1s in a binary sequence.
Parity is used to detect errors in data transmission.
Even parity means the number of 1s in the sequence should be even.
Odd parity means the number of 1s in the sequence should be odd.
Parity can be calculated using XOR operation on the binary sequence.
Baseline is the starting point of performance measurement while benchmark is the standard for comparison.
Baseline is the initial measurement of performance used as a reference point for future comparisons.
Benchmark is the standard or best practice used for comparison with the current performance.
Baseline and benchmark are used to measure and improve performance.
For example, a company may set a baseline for their websit...
I analyze logs, monitor system resources, and use profiling tools to identify and resolve performance issues.
Analyze logs to identify potential bottlenecks
Monitor system resources such as CPU, memory, and disk usage
Use profiling tools to identify slow code and optimize it
Identify and eliminate unnecessary database queries
Optimize network communication
Implement caching mechanisms
Conduct load testing to identify performa
iSCSI, SAN, FC, MAA are protocols used in storage networking.
iSCSI (Internet Small Computer System Interface) is a protocol used to transmit SCSI commands over IP networks.
SAN (Storage Area Network) is a network that provides block-level access to data storage.
FC (Fibre Channel) is a high-speed network technology used to connect servers and storage devices.
MAA (Massive Array of Idle Disks) is a storage architecture tha
Top command displays real-time system resource usage and process information.
Top command shows system load, CPU usage, memory usage, and running processes.
The first line shows overall system statistics.
The second line shows CPU usage.
The third line shows memory usage.
The fourth line shows swap usage.
The fifth line shows running processes.
Press 'q' to exit top command.
I applied via LinkedIn and was interviewed in Aug 2020. There was 1 interview round.
I applied via Recruitment Consultant and was interviewed before Sep 2019. There was 1 interview round.
I'm sorry, I cannot answer this question as it requires real-time data and is not related to the job of a Procurement Manager.
This question is not relevant to the job of a Procurement Manager
Real-time data is required to answer this question
The question is not related to procurement or supply chain management
The answer would constantly change throughout the day
I want to work at NetApp because of its reputation for innovation, strong company culture, and opportunities for growth.
NetApp is known for its innovative solutions in the technology industry, and I am excited to be a part of a company that is constantly pushing boundaries.
I have heard great things about NetApp's company culture, including its focus on collaboration, diversity, and work-life balance.
I am impressed by N...
I was interviewed before Mar 2021.
Round duration - 60 minutes
Round difficulty - Easy
This was the first technical round.
Given a singly linked list of integers, return the head of the reversed linked list.
Initial linked list: 1 -> 2 -> 3 -> 4 -> NULL
Reversed link...
This can be solved both: recursively and iteratively.
The recursive approach is more intuitive. First reverse all the nodes after head. Then we need to set head to be the final node in the reversed list. We simply set its next node in the original list (head -> next) to point to it and sets its next to NULL. The recursive approach has a O(N) time complexity and auxiliary space complexity.
For solving the question is c...
You are given a binary tree consisting of distinct integers and two nodes, X
and Y
. Your task is to find and return the Lowest Common Ancestor (LCA) of these two nodes...
The recursive approach is to traverse the tree in a depth-first manner. The moment you encounter either of the nodes node1 or node2, return the node. The least common ancestor would then be the node for which both the subtree recursions return a non-NULL node. It can also be the node which itself is one of node1 or node2 and for which one of the subtree recursions returns that particular node.
Pseudo code :
LowestC...
Internal fragmentation happens when the memory is split into mounted-sized blocks. Whenever a method is requested for the memory, the mounted-sized block is allotted to the method. just in case the memory allotted to the method is somewhat larger than the memory requested, then the distinction between allotted and requested memory is that the internal fragmentation.
The uninitialized data segment is also known as a . bss segment that stores all the uninitialized global, local and external variables. If the global, static and external variables are not initialized, they are assigned with zero value by default.
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions on DSA, OS, OOPS etc.
Given a positive integer 'N', compute its square root and return it. If 'N' is not a perfect square, then return the floor value of sqrt(N).
N = 25
N = 20
N...
The Simple Approach is to find the floor of the square root, try with all-natural numbers starting from 1. Continue incrementing the number until the square of that number is greater than the given number.
Algorithm:
1. Create a variable (counter) i and take care of some base cases, i.e when the given number is 0 or 1.
2. Run a loop until i*i <= n , where n is the given number. Increment i by 1.
3. The floor of th...
In UNIX systems it looks something like this:
When you compile a program with gcc, it wraps a startup routine around your main() function. This routine calls your main() function and saves its return value. It then calls the exit() function (which your program might call as well), that does some general clean up. This function then again calls _exit(), which is a system call that tells the OS to save the returned value ...
Segmentation fault is a specific kind of error caused by accessing memory that “does not belong to you.”
When a piece of code tries to do read and write operation in a read only location in memory or freed block of memory, it is known as core dump. It is an error indicating memory corruption.
Round duration - 30 minutes
Round difficulty - Easy
This was a typical managerial round.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I was interviewed before Mar 2021.
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions on DSA, Programming and OOPS.
Given two strings A
and B
, find the index of the first occurrence of A
in B
. If A
is not present in B
, return -1.
A = "bc", B = "abcdd...
Iterative implementation of strstr(): It returns a pointer to the first occurrence of Y in X or a null pointer if Y is not part of X. The time complexity of this solution is O(m.n) where m and n are the length of String X and Y, respectively.
// returns true if `X` and `Y` are the same
int compare(const char *X, const char *Y)
{
while (*X && *Y)
{
if (*X != *Y) {
return 0;
}
X++;
Y++;
...
The standard says that accessing a NULL ptr is “undefined behavior”. Undefined behavior can be anything, including:
Nothing at all - continue running the program as if nothing happened
Crashing the application
Corrupting application data
Phase 1: Lexical Analysis
Lexical Analysis is the first phase when compiler scans the source code. This process can be left to right, character by character, and group these characters into tokens.
Here, the character stream from the source program is grouped in meaningful sequences by identifying the tokens. It makes the entry of the corresponding tickets into the symbol table and passes that token to next phase.
Phase 2...
The system stack (a.k.a. call stack or just "the stack") is a place in memory for things that the heap doesn't cover. The system stack is more organized than the heap since it uses the stack data structure, where order matters. Also, the address of the next allocation is known at all times because of this organization. Allocated items are pushed on to the stack in a particular order and popped off when needed. Most imp...
Given an integer N
, for each integer from 0
through N
, find and print the number of set bits (1s) present in its binary representation.
N = 5
...
The direct approach would be to loop through all bits in an integer, check if a bit is set and if it is, then increment the set bit count.
Time Complexity: Θ(logn) (Theta of logn)
Auxiliary Space: O(1)
Brian Kernighan’s Algorithm can also be used here.
This algorithm is based on the idea that subtracting 1 from a decimal number flips all the bits after the rightmost set bit(which is 1) including the rightmost set bit...
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions on DSA, Programming and OOPS.
You are provided with a binary tree consisting of 'N' nodes, where each node contains an integer value. Your task is to perform the In-Order traversal ...
Inorder traversal requires that we print the leftmost node first and the right most node at the end.
So basically for each node we need to go as far as down and left as possible and then we need to come back and go right. So the steps would be :
1. Start with the root node.
2. Push the node in the stack and visit it's left child.
3. Repeat step 2 while node is not NULL, if it's NULL then pop the topmost n...
Determine if a given singly linked list of integers contains a cycle.
A cycle in a linked list occurs when a node's next points back to a previous node in ...
Floyd's algorithm can be used to solve this question.
Define two pointers slow and fast. Both point to the head node, fast is twice as fast as slow. There will be no cycle if it reaches the end. Otherwise, it will eventually catch up to the slow pointer somewhere in the cycle.
Let X be the distance from the first node to the node where the cycle begins, and let X+Y be the distance the slow pointer travels. To catch up, t...
An interrupt is a special type of condition that occurs during the working of a microprocessor.
Microprocessor services the interrupt by executing a subroutine called interrupt service routine (ISR).
The interrupt can be given to the processor by the external signal(i.e. on external pins of a Microprocessor) or as a software interrupt or by the condition produced by the program.
Carrier Sense Multiple Access (CSMA) is a network protocol for carriertransmission that operates in the Medium Access Control (MAC) layer. It senses or listens whether the shared channel for transmission is busy or not, and transmits if the channel is not busy. Using CMSA protocols, more than one users or nodes send and receive data through a shared medium that may be a single cable or optical fiber connecting multiple...
Round duration - 30 minutes
Round difficulty - Easy
Typical Managerial round.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
Top trending discussions
Interview experience
based on 347 reviews
Rating in categories
Member Technical Staff
204
salaries
| ₹14.8 L/yr - ₹51 L/yr |
Professional Service Engineer
98
salaries
| ₹7.1 L/yr - ₹27.9 L/yr |
Technical Staff Member 3
71
salaries
| ₹21 L/yr - ₹46.2 L/yr |
Software Engineer
70
salaries
| ₹11 L/yr - ₹23 L/yr |
Mts Software Engineer
61
salaries
| ₹15 L/yr - ₹47.1 L/yr |
Nutanix
IBM
Oracle
Dell