Nutanix
50+ Acufore India Interview Questions and Answers
You have been given two arrays, 'AT' and 'DT', representing the arrival and departure times of all trains that reach a railway station.
Your task is to find the minimum number of plat...read more
Ninja has been given ‘N’ rectangular 3-D ‘BOXES’. Each box has dimensions Length ‘L’, Breadth ‘B’ and Height ‘H’. Ninja has to create a stack of boxes as tall as possible. But there is a...read more
You are given a string ‘str’ of ‘N’ lowercase alphabets. Your task is to check whether it is possible to split the given string into three non-empty substrings such that one of them is a substri...read more
Ninja got holiday homework from his English teacher. His teacher gave him a string and told him to find the rank of the string if the string is sorted in lexicographical order.
Nin...read more
A thief wants to loot houses. He knows the amount of money in each house. He cannot loot two consecutive houses. Find the maximum amount of money he can loot.
Input Format :
The first line of input c...read more
You are given a 2-D matrix ‘mat’, consisting of ’N’ rows and ‘M’ columns. The element at the i-th row and j-th column is ‘mat[i][j]’.
From mat[i][j], you can move to mat[i+1][j] if mat[...read more
You are given a directed graph of ‘N’ nodes and ‘M’ edges. Also, you have two nodes ‘A’ and ‘B’. Your task is to make at least one valid path from ‘A’ to ‘B’ by doing the below operations a minimum...read more
You are given a binary matrix with ‘M’ rows and ‘N’ columns initially consisting of all 0s. 'Q' queries follow. The queries can be of 4 types:
Query 1: 1 R index Query 2: 1 C index Query 3: 2 R ...read more
Q9. A list/array/vector of string is given. return the first index of repeating elements. The problem was quite straight-forward
We were given a piece of code for concurrent file writes and sequential acknowledgments and as you would have judged from the name, it was an Operating System (OS) based round. We were each given a ...read more
Q11. implement a calculator class which does this cal.add(2).sub(3).mul(4).delay(2000).add(4) etc
Implement a calculator class with chaining methods and delay function.
Create a Calculator class with add, sub, mul methods that return the instance of the class.
Implement a delay method that uses setTimeout and returns the instance of the class.
Use a queue to store the operations and execute them in order after the delay.
Return the result of the operations when the equals method is called.
I was asked to do a system design for Pastebin and a set of requirements were given which I had to fulfill.
Q13. Test Scenario for Google Login Page Puzzle about 9 identical coins where 1 coin is of slightly higher weight. TCP vs UDP
Q14. Link up all nodes present in same level of BST using next pointer
The question asks to link up all nodes present in the same level of a binary search tree using the next pointer.
Traverse the tree level by level using a queue
For each level, create a linked list by connecting the nodes using the next pointer
Use a dummy node to keep track of the start of the linked list for each level
Q15. Give the length of longest absolute directory path string Discuss the DS used Optimize it
The question asks for the length of the longest absolute directory path string and how to optimize it.
Use a depth-first search (DFS) algorithm to traverse the directory structure
Maintain a stack to keep track of the current path length
Keep updating the maximum path length encountered
Consider the length of each directory/file name and the length of the path separators
Q16. Design a system to find the millionth person liking particular comment. Many constraints
Design a system to find the millionth person liking a particular comment.
Use a database to store the likes for each comment
Implement a counter to keep track of the number of likes for each comment
Use a caching mechanism to improve performance
Consider sharding or partitioning the data for scalability
Implement a search algorithm to find the millionth person
Q17. Data structures, simulate Write-Back Cache using two python dictionaries with dirty bit implementation and LRU flushing technique on cache full.
Simulate Write-Back Cache using two python dictionaries with dirty bit and LRU flushing technique.
Create two dictionaries, one for cache data and one for dirty bit tracking.
Implement LRU flushing technique to remove least recently used data when cache is full.
Set dirty bit to mark data that has been modified and needs to be written back to main memory.
Update dirty bit when data is modified and track which data needs to be written back.
Flush dirty data back to main memory when...read more
Q18. Design Thread Safe implementation of HashMap
Design a thread-safe implementation of HashMap.
Use synchronized methods or locks to ensure mutual exclusion.
Consider using ConcurrentHashMap instead of HashMap.
Use volatile keyword for variables accessed by multiple threads.
Avoid using iterators as they may cause ConcurrentModificationException.
Use atomic operations for read-modify-write operations.
Consider using immutable keys to avoid synchronization issues.
Q19. Debuggng a code of Dining Philosopher Problem
Debugging a code of Dining Philosopher Problem
Check for deadlock conditions
Ensure that each philosopher can only pick up two forks at a time
Implement a solution using semaphores or monitors
Consider using a timeout mechanism to prevent deadlock
Test the code with different scenarios to identify and fix any issues
Q20. Write a code to check whether anagram of a given string is palindrome or not.
Q21. What is kernel in OS? Which storage components are there in computer?
The kernel is the core of an operating system that manages system resources. Storage components in a computer include hard drives, SSDs, and RAM.
The kernel is responsible for managing system resources such as CPU, memory, and input/output devices.
Storage components in a computer include hard drives, solid-state drives (SSDs), and random access memory (RAM).
The kernel acts as a bridge between software and hardware, allowing applications to interact with the computer's hardware...read more
Q22. How do we identify that a specific IP Address belongs to which network?
Q23. Definition of Classes and Objects with relevant examples
Effective paging techniques, count page faults
Q25. what happens when you search google
When you search Google, it retrieves relevant information from its index and displays results based on the search query.
Google retrieves information from its index of web pages
Results are displayed based on relevance to the search query
Search results may include websites, images, videos, news articles, and more
Q26. What are the different types of waits in Selenium
There are three types of waits in Selenium: Implicit Wait, Explicit Wait, and Fluent Wait.
Implicit Wait: Waits for a certain amount of time before throwing an exception if the element is not found.
Explicit Wait: Waits for a certain condition to occur before proceeding further in the code.
Fluent Wait: Waits for a certain condition to occur with a defined frequency before proceeding further in the code.
Q27. Design a URL Shortener
A URL shortener is a tool that takes a long URL and creates a shorter, easier-to-share link.
Generate a unique short code for each URL
Store the short code and original URL in a database
Redirect users from the short URL to the original URL
Track clicks and analytics for each short URL
Q28. Explain the osi model in detail
The OSI model is a conceptual model that describes how data is transmitted over a network.
The OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the layers above and below it.
The Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and application-level protocols.
An example of a protocol that operates at t...read more
Q29. Merge two sorted array
Q30. What are the new features of Selenium 4?
Selenium 4 has new features like improved W3C support, relative locators, and better error handling.
Improved W3C support for better browser compatibility
Relative locators for easier element location
Better error handling with detailed error messages
New APIs for easier browser automation
Support for Chromium-based Edge browser
Integration with DevTools Protocol for better debugging
Q31. Tell me how a router can be fixed when it is not working
Q32. Remove duplicates from the string
Q33. Find the first 50 prime numbers
Generate the first 50 prime numbers
Start with the first prime number, 2
Use a loop to check for prime numbers by dividing each number by all numbers less than it
Keep track of the prime numbers found until you have 50
Q34. What are static variables?
Q35. What is use of PostgreSQL?
Q36. What is your driving force
My driving force is to create impactful solutions that solve real-world problems.
I am motivated by the opportunity to make a positive impact on society
I enjoy the challenge of solving complex problems
I am driven by the desire to continuously improve and innovate
I am passionate about technology and its potential to improve people's lives
Q37. Oracle database migration from onprim to cloud
Q38. Explain the IP assignment process
IP assignment process involves allocating unique IP addresses to devices on a network.
IP addresses are assigned by a DHCP server or manually by a network administrator
IP addresses can be assigned dynamically or statically
IP addresses must be unique within a network
IPv4 addresses are 32-bit and IPv6 addresses are 128-bit
Q39. GRE vs IPSEC and whats the difference
GRE and IPSEC are both protocols used for secure communication over networks, but they have different purposes and implementations.
GRE (Generic Routing Encapsulation) is a tunneling protocol used to encapsulate a wide variety of network layer protocols inside virtual point-to-point links. It does not provide encryption or authentication.
IPSEC (Internet Protocol Security) is a suite of protocols used to secure Internet Protocol (IP) communications by authenticating and encrypt...read more
Q40. High level design with low level too in a particular part
High level design refers to overall architecture while low level design focuses on specific implementation details.
High level design involves defining system architecture and components
Low level design includes detailed design of individual modules or components
Example: High level design may include choosing a database system, while low level design may involve designing database tables and queries
Q41. Test Scenario for calculator
Q42. How did you find the server went down
Q43. how did you find gateway in linux
Q44. how would kill the child process
Use the kill command with the child process ID to terminate it
Find the child process ID using tools like ps or pgrep
Use the kill command with the appropriate signal (e.g. SIGTERM, SIGKILL) and the child process ID
Example: kill -9
Q45. What is encaplsulation
Encapsulation is the process of hiding implementation details and exposing only necessary information.
Encapsulation is achieved through access modifiers like public, private, and protected.
It helps in achieving data abstraction and information hiding.
Encapsulation provides better control over the data and prevents unauthorized access.
Example: A class with private variables and public methods to access them.
Q46. Diff between DBMS and Excel.
DBMS is a software system that manages databases, while Excel is a spreadsheet program used for data analysis and visualization.
DBMS is used to store, retrieve, and manage data in a structured format, while Excel is used for data analysis and visualization.
DBMS allows for multiple users to access and manipulate data simultaneously, while Excel is typically used by a single user at a time.
DBMS supports complex queries and transactions, while Excel is more limited in its capabi...read more
Q47. Explain and write the commands of linux
Linux commands are used to interact with the operating system through the command line interface.
Commands are case-sensitive
Most commands have options and arguments that can be used to customize their behavior
Common commands include ls (list files), cd (change directory), mkdir (make directory), rm (remove files), and more
Q48. Second largest number in an array.
Find the second largest number in an array of strings.
Convert the array of strings to an array of integers for comparison.
Sort the array in descending order and return the second element.
Handle cases where there may be duplicates of the largest number.
Q49. What is Operating System
An operating system is a software that manages computer hardware and provides services for computer programs.
Manages computer hardware resources such as CPU, memory, and storage
Provides a user interface for interacting with the computer
Supports running applications and managing processes
Examples include Windows, macOS, Linux, iOS, Android
Q50. Commands awk and sed in linux
awk and sed are powerful text processing tools in Linux.
awk is used for pattern scanning and processing
sed is used for text stream editing
Both can be used in combination to manipulate text files
Example: awk '{print $1}' file.txt
Example: sed 's/old/new/g' file.txt
Q51. How actually DNS works
Q52. Difference between HTTPS and HTTP
HTTPS is a secure version of HTTP that encrypts data transmitted between a website and a user's browser.
HTTPS uses SSL/TLS encryption to secure data transmission
HTTP sends data in plain text, making it vulnerable to interception
HTTPS is indicated by a padlock icon in the browser's address bar
Websites that handle sensitive information like banking or shopping use HTTPS
Q53. Softwares that i am aware of
I am aware of various e-learning authoring tools such as Articulate Storyline, Adobe Captivate, and Camtasia.
Articulate Storyline
Adobe Captivate
Camtasia
Q54. What is DHCP protocol
DHCP protocol is used to automatically assign IP addresses to devices on a network.
DHCP stands for Dynamic Host Configuration Protocol
It allows devices to obtain IP addresses and other network configuration information dynamically
DHCP servers assign IP addresses to devices for a specific lease period
DHCP reduces the need for manual configuration of network settings
Example: When you connect to a Wi-Fi network, DHCP assigns your device an IP address
Q55. Why NAT is needed
NAT is needed to allow multiple devices on a private network to share a single public IP address.
NAT helps conserve public IP addresses by allowing multiple devices on a private network to communicate with the internet using a single public IP address.
NAT provides an additional layer of security by hiding the internal IP addresses of devices on the private network from external sources.
NAT allows for easier management of IP addresses within a network by simplifying the routin...read more
Q56. Explain DNS and DHCP
DNS is a system that translates domain names to IP addresses, while DHCP is a protocol that assigns IP addresses to devices on a network.
DNS stands for Domain Name System and is used to translate domain names like www.example.com to IP addresses like 192.168.1.1.
DHCP stands for Dynamic Host Configuration Protocol and automatically assigns IP addresses to devices on a network.
DNS helps users access websites using easy-to-remember domain names, while DHCP simplifies network adm...read more
Q57. parameters of IOSTAT in linux
Q58. Explain about Deadlocks
Deadlocks occur when two or more processes are waiting for each other to release resources, resulting in a standstill.
Deadlocks involve a circular wait, where each process is waiting for a resource held by another process.
Four conditions must be met for a deadlock to occur: mutual exclusion, hold and wait, no preemption, and circular wait.
Examples of deadlocks include a printer waiting for a computer to release a file, while the computer is waiting for the printer to finish p...read more
Q59. Design a QA chatbot
A QA chatbot designed to answer questions related to quality assurance processes and best practices.
Implement natural language processing to understand user queries
Create a knowledge base of QA processes, tools, and methodologies
Provide accurate and relevant answers to user questions
Offer interactive features like quizzes or tutorials to engage users
More about working at Nutanix
Top HR Questions asked in Acufore India
Interview Process at Acufore India
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month