Nutanix
50+ MSys Tech India Interview Questions and Answers
Q1. Minimum Number of Platforms Problem
Your task is to determine the minimum number of platforms required at a railway station so that no train has to wait.
Explanation:
Given two arrays:
AT
- representing the ar...read more
Determine the minimum number of platforms needed at a railway station so that no train has to wait.
Sort the arrival and departure times arrays in ascending order.
Initialize two pointers for arrival and departure times, and a variable to keep track of the maximum number of platforms needed.
Increment the platform count when a train arrives and decrement when a train departs.
Update the maximum platform count as needed.
Return the maximum platform count at the end.
Q2. Split the String Problem Statement
You are given a string str
consisting of N
lowercase alphabets. Your task is to determine if it is possible to divide the string into three non-empty substrings such that one ...read more
Determine if it is possible to split a string into three non-empty substrings where one is a substring of the other two.
Check if any substring of the string is a substring of the other two substrings.
Iterate through all possible divisions of the string into three non-empty substrings.
Use two pointers to find all possible substrings efficiently.
Q3. Loot Houses Problem Statement
A thief is planning to steal from several houses along a street. Each house has a certain amount of money stashed. However, the thief cannot loot two adjacent houses. Determine the...read more
Determine the maximum amount of money a thief can steal from houses without looting two consecutive houses.
Create an array 'dp' to store the maximum money that can be stolen up to the i-th house.
Iterate through the houses and update 'dp' based on whether the current house is stolen or not.
Return the maximum value in 'dp' as the answer.
Q4. Ninja and Stack of Boxes Problem
Help Ninja to create the tallest stack possible using given 3-D boxes with dimensions Length 'L', Breadth 'B', and Height 'H'. Each box can be rotated to use any side as the bas...read more
Implement a function to find the maximum possible height of a stack of boxes given their dimensions.
Create all possible rotations of each box to consider all orientations for stacking
Sort the boxes based on their base dimensions in non-increasing order
Use dynamic programming to find the maximum height of the stack
Q5. Reverse Edges Problem Statement
You are given a directed graph with ‘N’ nodes and ‘M’ edges, along with two specific nodes, ‘A’ and ‘B’. Your task is to find the minimum number of operations required to create ...read more
The task is to find the minimum number of operations required to create a valid path from node A to node B by reversing edges in a directed graph.
Iterate through the graph to find the shortest path from node A to node B.
Use a graph traversal algorithm like BFS or DFS to explore possible paths.
Track the number of edge reversals needed to reach node B from node A.
Consider edge directions and reverse them as needed to create a valid path.
Return the minimum number of edge reversa...read more
Q6. Query and Matrix Problem Statement
You are given a binary matrix with 'M' rows and 'N' columns, initially consisting of all 0s. You will receive 'Q' queries, which can be of four types:
Query 1: 1 R index
Query ...read more
Implement a function to process queries on a binary matrix by flipping elements and counting zeros in rows/columns.
Create a binary matrix with all elements initialized to 0.
Process queries of type 1 by flipping elements in the specified row/column.
Process queries of type 2 by counting the number of zeros in the specified row/column.
Return the count of zeros for type 2 queries.
Ensure to handle the constraints provided in the problem statement.
Q7. Longest Increasing Path in Matrix Problem Statement
Given a 2-D matrix mat
with 'N' rows and 'M' columns, where each element at position (i, j) is mat[i][j]
, determine the length of the longest increasing path ...read more
The task is to find the length of the longest increasing path in a matrix starting from a given cell.
Create a recursive function to explore all possible paths from the starting cell, keeping track of the length of each path.
Use dynamic programming to avoid redundant calculations and optimize the solution.
At each cell, check if moving to the right or down is possible and leads to an increasing path.
Update the length of the longest increasing path found so far as you explore di...read more
Q8. Lexicographic Permutation Rank Problem Statement
Given a distinct string, determine the lexicographic permutation rank of the string.
Example:
Input:
T = 2
S = "abc"
S = "bac"
Output:
1
2
Explanation:
For the firs...read more
The problem involves determining the lexicographic permutation rank of a distinct string.
Iterate through all permutations of the string and compare with the given string to determine the rank.
Use a recursive function to generate all permutations of the string.
Keep track of the count of permutations smaller than the given string to determine the rank.
Designed a scalable system for Pastebin with various requirements.
Implemented a distributed system architecture to handle high traffic and ensure reliability.
Used load balancing techniques to evenly distribute incoming requests across multiple servers.
Implemented data sharding to partition data across multiple databases for efficient storage and retrieval.
Utilized caching mechanisms to improve performance and reduce latency.
Implemented access control mechanisms to ensure data...read more
Q10. A list/array/vector of string is given. return the first index of repeating elements. The problem was quite straight-forward
Q11. implement a calculator class which does this cal.add(2).sub(3).mul(4).delay(2000).add(4) etc
Implement a calculator class with chaining methods and delay function.
Create a Calculator class with add, sub, mul methods that return the instance of the class.
Implement a delay method that uses setTimeout and returns the instance of the class.
Use a queue to store the operations and execute them in order after the delay.
Return the result of the operations when the equals method is called.
Q12. Test Scenario for Google Login Page Puzzle about 9 identical coins where 1 coin is of slightly higher weight. TCP vs UDP
Q13. Link up all nodes present in same level of BST using next pointer
The question asks to link up all nodes present in the same level of a binary search tree using the next pointer.
Traverse the tree level by level using a queue
For each level, create a linked list by connecting the nodes using the next pointer
Use a dummy node to keep track of the start of the linked list for each level
Q14. Give the length of longest absolute directory path string Discuss the DS used Optimize it
The question asks for the length of the longest absolute directory path string and how to optimize it.
Use a depth-first search (DFS) algorithm to traverse the directory structure
Maintain a stack to keep track of the current path length
Keep updating the maximum path length encountered
Consider the length of each directory/file name and the length of the path separators
Effective paging techniques help reduce page faults, which are counted by tracking the number of times a page is accessed from disk.
Implementing LRU (Least Recently Used) algorithm to replace the page that has not been used for the longest time.
Using FIFO (First In, First Out) algorithm to replace the oldest page in memory.
Utilizing optimal page replacement algorithm to replace the page that will not be used for the longest time in the future.
Counting page faults by tracking ...read more
Q16. Design a system to find the millionth person liking particular comment. Many constraints
Design a system to find the millionth person liking a particular comment.
Use a database to store the likes for each comment
Implement a counter to keep track of the number of likes for each comment
Use a caching mechanism to improve performance
Consider sharding or partitioning the data for scalability
Implement a search algorithm to find the millionth person
Q17. Data structures, simulate Write-Back Cache using two python dictionaries with dirty bit implementation and LRU flushing technique on cache full.
Simulate Write-Back Cache using two python dictionaries with dirty bit and LRU flushing technique.
Create two dictionaries, one for cache data and one for dirty bit tracking.
Implement LRU flushing technique to remove least recently used data when cache is full.
Set dirty bit to mark data that has been modified and needs to be written back to main memory.
Update dirty bit when data is modified and track which data needs to be written back.
Flush dirty data back to main memory when...read more
Q18. Design Thread Safe implementation of HashMap
Design a thread-safe implementation of HashMap.
Use synchronized methods or locks to ensure mutual exclusion.
Consider using ConcurrentHashMap instead of HashMap.
Use volatile keyword for variables accessed by multiple threads.
Avoid using iterators as they may cause ConcurrentModificationException.
Use atomic operations for read-modify-write operations.
Consider using immutable keys to avoid synchronization issues.
Q19. Debuggng a code of Dining Philosopher Problem
Debugging a code of Dining Philosopher Problem
Check for deadlock conditions
Ensure that each philosopher can only pick up two forks at a time
Implement a solution using semaphores or monitors
Consider using a timeout mechanism to prevent deadlock
Test the code with different scenarios to identify and fix any issues
Q20. Write a code to check whether anagram of a given string is palindrome or not.
Q21. What is kernel in OS? Which storage components are there in computer?
The kernel is the core of an operating system that manages system resources. Storage components in a computer include hard drives, SSDs, and RAM.
The kernel is responsible for managing system resources such as CPU, memory, and input/output devices.
Storage components in a computer include hard drives, solid-state drives (SSDs), and random access memory (RAM).
The kernel acts as a bridge between software and hardware, allowing applications to interact with the computer's hardware...read more
Q22. How do we identify that a specific IP Address belongs to which network?
Q23. Definition of Classes and Objects with relevant examples
Q24. what happens when you search google
When you search Google, it retrieves relevant information from its index and displays results based on the search query.
Google retrieves information from its index of web pages
Results are displayed based on relevance to the search query
Search results may include websites, images, videos, news articles, and more
Q25. What are the different types of waits in Selenium
There are three types of waits in Selenium: Implicit Wait, Explicit Wait, and Fluent Wait.
Implicit Wait: Waits for a certain amount of time before throwing an exception if the element is not found.
Explicit Wait: Waits for a certain condition to occur before proceeding further in the code.
Fluent Wait: Waits for a certain condition to occur with a defined frequency before proceeding further in the code.
Q26. Design a URL Shortener
A URL shortener is a tool that takes a long URL and creates a shorter, easier-to-share link.
Generate a unique short code for each URL
Store the short code and original URL in a database
Redirect users from the short URL to the original URL
Track clicks and analytics for each short URL
Q27. Explain the osi model in detail
The OSI model is a conceptual model that describes how data is transmitted over a network.
The OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the layers above and below it.
The Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and application-level protocols.
An example of a protocol that operates at t...read more
Q28. Merge two sorted array
Q29. What are the new features of Selenium 4?
Selenium 4 has new features like improved W3C support, relative locators, and better error handling.
Improved W3C support for better browser compatibility
Relative locators for easier element location
Better error handling with detailed error messages
New APIs for easier browser automation
Support for Chromium-based Edge browser
Integration with DevTools Protocol for better debugging
Q30. Tell me how a router can be fixed when it is not working
Q31. Remove duplicates from the string
Q32. Find the first 50 prime numbers
Generate the first 50 prime numbers
Start with the first prime number, 2
Use a loop to check for prime numbers by dividing each number by all numbers less than it
Keep track of the prime numbers found until you have 50
Q33. What are static variables?
Q34. What is use of PostgreSQL?
Q35. What is your driving force
My driving force is to create impactful solutions that solve real-world problems.
I am motivated by the opportunity to make a positive impact on society
I enjoy the challenge of solving complex problems
I am driven by the desire to continuously improve and innovate
I am passionate about technology and its potential to improve people's lives
Q36. Oracle database migration from onprim to cloud
Q37. Explain the IP assignment process
IP assignment process involves allocating unique IP addresses to devices on a network.
IP addresses are assigned by a DHCP server or manually by a network administrator
IP addresses can be assigned dynamically or statically
IP addresses must be unique within a network
IPv4 addresses are 32-bit and IPv6 addresses are 128-bit
Q38. GRE vs IPSEC and whats the difference
GRE and IPSEC are both protocols used for secure communication over networks, but they have different purposes and implementations.
GRE (Generic Routing Encapsulation) is a tunneling protocol used to encapsulate a wide variety of network layer protocols inside virtual point-to-point links. It does not provide encryption or authentication.
IPSEC (Internet Protocol Security) is a suite of protocols used to secure Internet Protocol (IP) communications by authenticating and encrypt...read more
Q39. High level design with low level too in a particular part
High level design refers to overall architecture while low level design focuses on specific implementation details.
High level design involves defining system architecture and components
Low level design includes detailed design of individual modules or components
Example: High level design may include choosing a database system, while low level design may involve designing database tables and queries
Q40. Test Scenario for calculator
Q41. How did you find the server went down
Q42. how did you find gateway in linux
Q43. how would kill the child process
Use the kill command with the child process ID to terminate it
Find the child process ID using tools like ps or pgrep
Use the kill command with the appropriate signal (e.g. SIGTERM, SIGKILL) and the child process ID
Example: kill -9
Q44. What is encaplsulation
Encapsulation is the process of hiding implementation details and exposing only necessary information.
Encapsulation is achieved through access modifiers like public, private, and protected.
It helps in achieving data abstraction and information hiding.
Encapsulation provides better control over the data and prevents unauthorized access.
Example: A class with private variables and public methods to access them.
Q45. Diff between DBMS and Excel.
DBMS is a software system that manages databases, while Excel is a spreadsheet program used for data analysis and visualization.
DBMS is used to store, retrieve, and manage data in a structured format, while Excel is used for data analysis and visualization.
DBMS allows for multiple users to access and manipulate data simultaneously, while Excel is typically used by a single user at a time.
DBMS supports complex queries and transactions, while Excel is more limited in its capabi...read more
Q46. Explain and write the commands of linux
Linux commands are used to interact with the operating system through the command line interface.
Commands are case-sensitive
Most commands have options and arguments that can be used to customize their behavior
Common commands include ls (list files), cd (change directory), mkdir (make directory), rm (remove files), and more
Q47. Second largest number in an array.
Find the second largest number in an array of strings.
Convert the array of strings to an array of integers for comparison.
Sort the array in descending order and return the second element.
Handle cases where there may be duplicates of the largest number.
Q48. What is Operating System
An operating system is a software that manages computer hardware and provides services for computer programs.
Manages computer hardware resources such as CPU, memory, and storage
Provides a user interface for interacting with the computer
Supports running applications and managing processes
Examples include Windows, macOS, Linux, iOS, Android
Q49. Commands awk and sed in linux
awk and sed are powerful text processing tools in Linux.
awk is used for pattern scanning and processing
sed is used for text stream editing
Both can be used in combination to manipulate text files
Example: awk '{print $1}' file.txt
Example: sed 's/old/new/g' file.txt
Q50. How actually DNS works
Q51. Difference between HTTPS and HTTP
HTTPS is a secure version of HTTP that encrypts data transmitted between a website and a user's browser.
HTTPS uses SSL/TLS encryption to secure data transmission
HTTP sends data in plain text, making it vulnerable to interception
HTTPS is indicated by a padlock icon in the browser's address bar
Websites that handle sensitive information like banking or shopping use HTTPS
Q52. Softwares that i am aware of
I am aware of various e-learning authoring tools such as Articulate Storyline, Adobe Captivate, and Camtasia.
Articulate Storyline
Adobe Captivate
Camtasia
Q53. What is DHCP protocol
DHCP protocol is used to automatically assign IP addresses to devices on a network.
DHCP stands for Dynamic Host Configuration Protocol
It allows devices to obtain IP addresses and other network configuration information dynamically
DHCP servers assign IP addresses to devices for a specific lease period
DHCP reduces the need for manual configuration of network settings
Example: When you connect to a Wi-Fi network, DHCP assigns your device an IP address
Q54. Why NAT is needed
NAT is needed to allow multiple devices on a private network to share a single public IP address.
NAT helps conserve public IP addresses by allowing multiple devices on a private network to communicate with the internet using a single public IP address.
NAT provides an additional layer of security by hiding the internal IP addresses of devices on the private network from external sources.
NAT allows for easier management of IP addresses within a network by simplifying the routin...read more
Q55. Explain DNS and DHCP
DNS is a system that translates domain names to IP addresses, while DHCP is a protocol that assigns IP addresses to devices on a network.
DNS stands for Domain Name System and is used to translate domain names like www.example.com to IP addresses like 192.168.1.1.
DHCP stands for Dynamic Host Configuration Protocol and automatically assigns IP addresses to devices on a network.
DNS helps users access websites using easy-to-remember domain names, while DHCP simplifies network adm...read more
Q56. parameters of IOSTAT in linux
Q57. Explain about Deadlocks
Deadlocks occur when two or more processes are waiting for each other to release resources, resulting in a standstill.
Deadlocks involve a circular wait, where each process is waiting for a resource held by another process.
Four conditions must be met for a deadlock to occur: mutual exclusion, hold and wait, no preemption, and circular wait.
Examples of deadlocks include a printer waiting for a computer to release a file, while the computer is waiting for the printer to finish p...read more
Q58. Design a QA chatbot
A QA chatbot designed to answer questions related to quality assurance processes and best practices.
Implement natural language processing to understand user queries
Create a knowledge base of QA processes, tools, and methodologies
Provide accurate and relevant answers to user questions
Offer interactive features like quizzes or tutorials to engage users
More about working at Nutanix
Interview Process at MSys Tech India
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month