Filter interviews by
Web hosting is a service that allows individuals and organizations to make their websites accessible on the internet.
Web hosting provides server space for websites to store files and data.
Types of web hosting include shared, VPS, dedicated, and cloud hosting.
Examples of web hosting providers are Bluehost, HostGator, and SiteGround.
Web hosting often includes features like domain registration, email accounts, and we...
IP refers to Internet Protocol, while an IP address is a unique identifier for a device on a network using that protocol.
IP (Internet Protocol) is a set of rules for data transmission over networks.
An IP address is a numerical label assigned to each device connected to a network.
Example of IP: IPv4 and IPv6 are two versions of Internet Protocol.
Example of an IP address: 192.168.1.1 (IPv4) or 2001:0db8:85a3:0000:00...
Analyzing the increase in churn rate for a popular fitness tracking app reveals key areas for improvement.
User Experience: Complicated navigation may frustrate users, leading to churn. Example: Users struggle to find workout plans.
Feature Overload: Introducing too many features can overwhelm users. Example: Users may not use new tracking features and feel lost.
Pricing Changes: Increasing subscription fees without ...
DNS (Domain Name System) is a system that translates domain names to IP addresses.
DNS resolves domain names to IP addresses
It consists of a hierarchy of servers
DNS queries are sent from client to DNS resolver to authoritative DNS server
DNS records include A (IPv4 address), AAAA (IPv6 address), CNAME (canonical name), MX (mail exchange), etc.
Booting process is the sequence of events that occur when a computer is turned on.
Power on self-test (POST) is performed to check hardware components
BIOS or UEFI firmware is loaded to initialize hardware
Boot loader is loaded to start the operating system
Operating system kernel is loaded into memory
User login prompt is displayed
Design a Tinder-like application for connecting people based on mutual interests and location.
Create user profiles with photos and interests
Implement swiping feature for liking/disliking profiles
Include messaging functionality for matched users
Incorporate geolocation for finding nearby matches
Rate limiting controls the number of requests a user can make to a service in a given timeframe to prevent abuse.
Implement token bucket algorithm for flexible rate limiting.
Use leaky bucket for smoothing burst traffic.
Set limits per user, e.g., 100 requests per minute.
Consider IP-based limits to prevent abuse from a single source.
Use HTTP headers to inform clients of their rate limits.
A bug is a flaw or error in a computer program that causes it to behave unexpectedly or crash.
Bugs can cause software to malfunction or crash
They can be caused by coding errors, hardware issues, or external factors
Debugging is the process of identifying and fixing bugs
Examples of bugs include syntax errors, logic errors, and race conditions
A bug is an error or flaw in a computer program that causes it to malfunction or produce unexpected results.
Bugs can cause crashes, freezes, or data loss.
They can also lead to security vulnerabilities.
Examples of bugs include syntax errors, logic errors, and race conditions.
Debugging is the process of finding and fixing bugs.
Preventing bugs requires careful testing and code review.
The main part of hacking is gaining unauthorized access to a system or network.
Hacking involves exploiting vulnerabilities in software or hardware
It can be used for malicious purposes such as stealing data or disrupting services
Ethical hacking is a legitimate practice used to identify and fix security weaknesses
Examples of hacking techniques include phishing, SQL injection, and social engineering
I applied via Approached by Company and was interviewed in Aug 2024. There were 4 interview rounds.
Analyzing the increase in churn rate for a popular fitness tracking app reveals key areas for improvement.
User Experience: Complicated navigation may frustrate users, leading to churn. Example: Users struggle to find workout plans.
Feature Overload: Introducing too many features can overwhelm users. Example: Users may not use new tracking features and feel lost.
Pricing Changes: Increasing subscription fees without added...
Case study for increasing ACS.
I appeared for an interview in Feb 2025, where I was asked the following questions.
I applied via Campus Placement and was interviewed in Sep 2023. There were 6 interview rounds.
Round 1: MCQ Test [60 Minutes]
Topics: Computer Networks, Operating Systems, Object-Oriented Concepts, Linux commands and operations, System Design and Architecture.
Please be cautious while answering, as there is a negative marking system in place.
Half of the students were eliminated during this round.
Difficulty Level: Moderate to High.
Two coding questions based on Strings.
String Minimization
Task: Minimize the length of a string (S) consisting of ‘a, ‘b’, and ‘c’.
Operation: Split the string into two non-empty parts and append the left part to the right part.
Special Rule: While appending, remove matching characters from the boundaries of the appended portions.
Objective: Find the shortest possible resulting string length.
Cyclic Shift
Input:
Integer N represented as a 16-bit binary.
Integer ‘m’ represents the number of positions to shift.
Character ‘c’ can be either ‘L’ for a left shift or ‘R’ for right shift.
Task: Determine the number ‘M’ generated after cyclically shifting the binary representation of N by ‘m’ positions, based on the direction specified by ‘c’ (‘L’ for left, ‘R’ for right).
One SQL query question
Basic SQL query which involved the use of DISTINCT, GROUP BY and NOT IN operators.
Explanation of OSI model layers, HTTP status codes, encryption techniques, security assessment, networking protocols, common ports, and TCP/UDP use cases.
OSI model layers: Physical, Data Link, Network, Transport, Session, Presentation, Application
HTTP status codes: 200 OK, 404 Not Found, 500 Internal Server Error
Encryption techniques: AES, RSA, DES
Security assessment: Vulnerability scanning, Penetration testing, Securi...
I applied via Approached by Company and was interviewed in May 2024. There was 1 interview round.
Had psuedo codes, SQL and aptitude questions. Diificulty was medium.
2 coding questions and 1 Sql question. Coding question1 was on DP, other was summary based.
Basic coding found on leetcode
I have experience in low level designing from college projects.
Studied principles of low level designing in college courses
Implemented low level designs in projects using languages like C or assembly
Focused on optimizing performance and memory usage in designs
Design a Tinder-like application for connecting people based on mutual interests and location.
Create user profiles with photos and interests
Implement swiping feature for liking/disliking profiles
Include messaging functionality for matched users
Incorporate geolocation for finding nearby matches
Rate limiting controls the number of requests a user can make to a service in a given timeframe to prevent abuse.
Implement token bucket algorithm for flexible rate limiting.
Use leaky bucket for smoothing burst traffic.
Set limits per user, e.g., 100 requests per minute.
Consider IP-based limits to prevent abuse from a single source.
Use HTTP headers to inform clients of their rate limits.
I applied via Naukri.com and was interviewed in Nov 2022. There were 3 interview rounds.
Contents
Os
DBMS
Unix
Networking
Three coding questions were given talview platform.
Top trending discussions
Some of the top questions asked at the Newfold Digital interview -
The duration of Newfold Digital interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 18 interview experiences
Difficulty level
Duration
based on 147 reviews
Rating in categories
2-4 Yrs
₹ 14-27.7 LPA
Web Solutions Specialist
87
salaries
| ₹3 L/yr - ₹4.5 L/yr |
Software Engineer
26
salaries
| ₹10 L/yr - ₹22 L/yr |
Senior Hosting Product Specialist
23
salaries
| ₹4.8 L/yr - ₹8.5 L/yr |
Senior Data Engineer
21
salaries
| ₹22 L/yr - ₹25 L/yr |
System Administrator
17
salaries
| ₹5.2 L/yr - ₹9.5 L/yr |
Accenture
Capgemini
Teleperformance
Concentrix Corporation