Add office photos
Employer?
Claim Account for FREE

Nutanix

3.8
based on 155 Reviews
Video summary
Filter interviews by

50+ Farco Tech Interview Questions and Answers

Updated 19 Dec 2024
Popular Designations

Q1. Minimum Number of Platforms Problem

Your task is to determine the minimum number of platforms required at a railway station so that no train has to wait.

Explanation:

Given two arrays:

  • AT - representing the ar...read more
Add your answer

Q2. Ninja and Stack of Boxes Problem

Help Ninja to create the tallest stack possible using given 3-D boxes with dimensions Length 'L', Breadth 'B', and Height 'H'. Each box can be rotated to use any side as the bas...read more

Add your answer

Q3. Split the String Problem Statement

You are given a string str consisting of N lowercase alphabets. Your task is to determine if it is possible to divide the string into three non-empty substrings such that one ...read more

Add your answer

Q4. Lexicographic Permutation Rank Problem Statement

Given a distinct string, determine the lexicographic permutation rank of the string.

Example:

Input:
T = 2
S = "abc"
S = "bac"
Output:
1
2
Explanation:

For the firs...read more

Add your answer
Discover Farco Tech interview dos and don'ts from real experiences

Q5. Loot Houses Problem Statement

A thief is planning to steal from several houses along a street. Each house has a certain amount of money stashed. However, the thief cannot loot two adjacent houses. Determine the...read more

Add your answer

Q6. Longest Increasing Path in Matrix Problem Statement

Given a 2-D matrix mat with 'N' rows and 'M' columns, where each element at position (i, j) is mat[i][j], determine the length of the longest increasing path ...read more

Add your answer
Are these interview questions helpful?

Q7. Reverse Edges Problem Statement

You are given a directed graph with ‘N’ nodes and ‘M’ edges, along with two specific nodes, ‘A’ and ‘B’. Your task is to find the minimum number of operations required to create ...read more

Add your answer

Q8. Query and Matrix Problem Statement

You are given a binary matrix with 'M' rows and 'N' columns, initially consisting of all 0s. You will receive 'Q' queries, which can be of four types:

Query 1: 1 R index
Query ...read more
Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. A list/array/vector of string is given. return the first index of repeating elements. The problem was quite straight-forward

Add your answer

Q10. implement a calculator class which does this cal.add(2).sub(3).mul(4).delay(2000).add(4) etc

Ans.

Implement a calculator class with chaining methods and delay function.

  • Create a Calculator class with add, sub, mul methods that return the instance of the class.

  • Implement a delay method that uses setTimeout and returns the instance of the class.

  • Use a queue to store the operations and execute them in order after the delay.

  • Return the result of the operations when the equals method is called.

Add your answer
Q11. Can you describe the system design you created for Pastebin and the set of requirements you had to fulfill?
Add your answer

Q12. Test Scenario for Google Login Page Puzzle about 9 identical coins where 1 coin is of slightly higher weight. TCP vs UDP

Add your answer

Q13. Link up all nodes present in same level of BST using next pointer

Ans.

The question asks to link up all nodes present in the same level of a binary search tree using the next pointer.

  • Traverse the tree level by level using a queue

  • For each level, create a linked list by connecting the nodes using the next pointer

  • Use a dummy node to keep track of the start of the linked list for each level

Add your answer

Q14. Give the length of longest absolute directory path string Discuss the DS used Optimize it

Ans.

The question asks for the length of the longest absolute directory path string and how to optimize it.

  • Use a depth-first search (DFS) algorithm to traverse the directory structure

  • Maintain a stack to keep track of the current path length

  • Keep updating the maximum path length encountered

  • Consider the length of each directory/file name and the length of the path separators

Add your answer

Q15. Design a system to find the millionth person liking particular comment. Many constraints

Ans.

Design a system to find the millionth person liking a particular comment.

  • Use a database to store the likes for each comment

  • Implement a counter to keep track of the number of likes for each comment

  • Use a caching mechanism to improve performance

  • Consider sharding or partitioning the data for scalability

  • Implement a search algorithm to find the millionth person

Add your answer

Q16. Data structures, simulate Write-Back Cache using two python dictionaries with dirty bit implementation and LRU flushing technique on cache full.

Ans.

Simulate Write-Back Cache using two python dictionaries with dirty bit and LRU flushing technique.

  • Create two dictionaries, one for cache data and one for dirty bit tracking.

  • Implement LRU flushing technique to remove least recently used data when cache is full.

  • Set dirty bit to mark data that has been modified and needs to be written back to main memory.

  • Update dirty bit when data is modified and track which data needs to be written back.

  • Flush dirty data back to main memory when...read more

Add your answer

Q17. Design Thread Safe implementation of HashMap

Ans.

Design a thread-safe implementation of HashMap.

  • Use synchronized methods or locks to ensure mutual exclusion.

  • Consider using ConcurrentHashMap instead of HashMap.

  • Use volatile keyword for variables accessed by multiple threads.

  • Avoid using iterators as they may cause ConcurrentModificationException.

  • Use atomic operations for read-modify-write operations.

  • Consider using immutable keys to avoid synchronization issues.

Add your answer

Q18. Debuggng a code of Dining Philosopher Problem

Ans.

Debugging a code of Dining Philosopher Problem

  • Check for deadlock conditions

  • Ensure that each philosopher can only pick up two forks at a time

  • Implement a solution using semaphores or monitors

  • Consider using a timeout mechanism to prevent deadlock

  • Test the code with different scenarios to identify and fix any issues

Add your answer

Q19. Write a code to check whether anagram of a given string is palindrome or not.

Add your answer

Q20. What is kernel in OS? Which storage components are there in computer?

Ans.

The kernel is the core of an operating system that manages system resources. Storage components in a computer include hard drives, SSDs, and RAM.

  • The kernel is responsible for managing system resources such as CPU, memory, and input/output devices.

  • Storage components in a computer include hard drives, solid-state drives (SSDs), and random access memory (RAM).

  • The kernel acts as a bridge between software and hardware, allowing applications to interact with the computer's hardware...read more

Add your answer

Q21. How do we identify that a specific IP Address belongs to which network?

Add your answer

Q22. Definition of Classes and Objects with relevant examples

Add your answer
Q23. What are effective paging techniques, and how do you count page faults?
Add your answer

Q24. what happens when you search google

Ans.

When you search Google, it retrieves relevant information from its index and displays results based on the search query.

  • Google retrieves information from its index of web pages

  • Results are displayed based on relevance to the search query

  • Search results may include websites, images, videos, news articles, and more

Add your answer

Q25. What are the different types of waits in Selenium

Ans.

There are three types of waits in Selenium: Implicit Wait, Explicit Wait, and Fluent Wait.

  • Implicit Wait: Waits for a certain amount of time before throwing an exception if the element is not found.

  • Explicit Wait: Waits for a certain condition to occur before proceeding further in the code.

  • Fluent Wait: Waits for a certain condition to occur with a defined frequency before proceeding further in the code.

Add your answer

Q26. Design a URL Shortener

Ans.

A URL shortener is a tool that takes a long URL and creates a shorter, easier-to-share link.

  • Generate a unique short code for each URL

  • Store the short code and original URL in a database

  • Redirect users from the short URL to the original URL

  • Track clicks and analytics for each short URL

Add your answer

Q27. Explain the osi model in detail

Ans.

The OSI model is a conceptual model that describes how data is transmitted over a network.

  • The OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has a specific function and communicates with the layers above and below it.

  • The Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and application-level protocols.

  • An example of a protocol that operates at t...read more

Add your answer

Q28. Merge two sorted array

Add your answer

Q29. What are the new features of Selenium 4?

Ans.

Selenium 4 has new features like improved W3C support, relative locators, and better error handling.

  • Improved W3C support for better browser compatibility

  • Relative locators for easier element location

  • Better error handling with detailed error messages

  • New APIs for easier browser automation

  • Support for Chromium-based Edge browser

  • Integration with DevTools Protocol for better debugging

Add your answer

Q30. Tell me how a router can be fixed when it is not working

Add your answer

Q31. Remove duplicates from the string

Add your answer

Q32. Find the first 50 prime numbers

Ans.

Generate the first 50 prime numbers

  • Start with the first prime number, 2

  • Use a loop to check for prime numbers by dividing each number by all numbers less than it

  • Keep track of the prime numbers found until you have 50

Add your answer

Q33. What are static variables?

Add your answer

Q34. What is use of PostgreSQL?

Add your answer

Q35. What is your driving force

Ans.

My driving force is to create impactful solutions that solve real-world problems.

  • I am motivated by the opportunity to make a positive impact on society

  • I enjoy the challenge of solving complex problems

  • I am driven by the desire to continuously improve and innovate

  • I am passionate about technology and its potential to improve people's lives

Add your answer

Q36. Oracle database migration from onprim to cloud

Add your answer

Q37. Explain the IP assignment process

Ans.

IP assignment process involves allocating unique IP addresses to devices on a network.

  • IP addresses are assigned by a DHCP server or manually by a network administrator

  • IP addresses can be assigned dynamically or statically

  • IP addresses must be unique within a network

  • IPv4 addresses are 32-bit and IPv6 addresses are 128-bit

Add your answer

Q38. GRE vs IPSEC and whats the difference

Ans.

GRE and IPSEC are both protocols used for secure communication over networks, but they have different purposes and implementations.

  • GRE (Generic Routing Encapsulation) is a tunneling protocol used to encapsulate a wide variety of network layer protocols inside virtual point-to-point links. It does not provide encryption or authentication.

  • IPSEC (Internet Protocol Security) is a suite of protocols used to secure Internet Protocol (IP) communications by authenticating and encrypt...read more

Add your answer

Q39. High level design with low level too in a particular part

Ans.

High level design refers to overall architecture while low level design focuses on specific implementation details.

  • High level design involves defining system architecture and components

  • Low level design includes detailed design of individual modules or components

  • Example: High level design may include choosing a database system, while low level design may involve designing database tables and queries

Add your answer

Q40. Test Scenario for calculator

Add your answer

Q41. How did you find the server went down

Add your answer

Q42. how did you find gateway in linux

Add your answer

Q43. how would kill the child process

Ans.

Use the kill command with the child process ID to terminate it

  • Find the child process ID using tools like ps or pgrep

  • Use the kill command with the appropriate signal (e.g. SIGTERM, SIGKILL) and the child process ID

  • Example: kill -9

Add your answer

Q44. What is encaplsulation

Ans.

Encapsulation is the process of hiding implementation details and exposing only necessary information.

  • Encapsulation is achieved through access modifiers like public, private, and protected.

  • It helps in achieving data abstraction and information hiding.

  • Encapsulation provides better control over the data and prevents unauthorized access.

  • Example: A class with private variables and public methods to access them.

Add your answer

Q45. Diff between DBMS and Excel.

Ans.

DBMS is a software system that manages databases, while Excel is a spreadsheet program used for data analysis and visualization.

  • DBMS is used to store, retrieve, and manage data in a structured format, while Excel is used for data analysis and visualization.

  • DBMS allows for multiple users to access and manipulate data simultaneously, while Excel is typically used by a single user at a time.

  • DBMS supports complex queries and transactions, while Excel is more limited in its capabi...read more

Add your answer

Q46. Explain and write the commands of linux

Ans.

Linux commands are used to interact with the operating system through the command line interface.

  • Commands are case-sensitive

  • Most commands have options and arguments that can be used to customize their behavior

  • Common commands include ls (list files), cd (change directory), mkdir (make directory), rm (remove files), and more

Add your answer

Q47. Second largest number in an array.

Ans.

Find the second largest number in an array of strings.

  • Convert the array of strings to an array of integers for comparison.

  • Sort the array in descending order and return the second element.

  • Handle cases where there may be duplicates of the largest number.

Add your answer

Q48. What is Operating System

Ans.

An operating system is a software that manages computer hardware and provides services for computer programs.

  • Manages computer hardware resources such as CPU, memory, and storage

  • Provides a user interface for interacting with the computer

  • Supports running applications and managing processes

  • Examples include Windows, macOS, Linux, iOS, Android

Add your answer

Q49. Commands awk and sed in linux

Ans.

awk and sed are powerful text processing tools in Linux.

  • awk is used for pattern scanning and processing

  • sed is used for text stream editing

  • Both can be used in combination to manipulate text files

  • Example: awk '{print $1}' file.txt

  • Example: sed 's/old/new/g' file.txt

Add your answer

Q50. How actually DNS works

Add your answer

Q51. Difference between HTTPS and HTTP

Ans.

HTTPS is a secure version of HTTP that encrypts data transmitted between a website and a user's browser.

  • HTTPS uses SSL/TLS encryption to secure data transmission

  • HTTP sends data in plain text, making it vulnerable to interception

  • HTTPS is indicated by a padlock icon in the browser's address bar

  • Websites that handle sensitive information like banking or shopping use HTTPS

Add your answer

Q52. Softwares that i am aware of

Ans.

I am aware of various e-learning authoring tools such as Articulate Storyline, Adobe Captivate, and Camtasia.

  • Articulate Storyline

  • Adobe Captivate

  • Camtasia

Add your answer

Q53. What is DHCP protocol

Ans.

DHCP protocol is used to automatically assign IP addresses to devices on a network.

  • DHCP stands for Dynamic Host Configuration Protocol

  • It allows devices to obtain IP addresses and other network configuration information dynamically

  • DHCP servers assign IP addresses to devices for a specific lease period

  • DHCP reduces the need for manual configuration of network settings

  • Example: When you connect to a Wi-Fi network, DHCP assigns your device an IP address

Add your answer

Q54. Why NAT is needed

Ans.

NAT is needed to allow multiple devices on a private network to share a single public IP address.

  • NAT helps conserve public IP addresses by allowing multiple devices on a private network to communicate with the internet using a single public IP address.

  • NAT provides an additional layer of security by hiding the internal IP addresses of devices on the private network from external sources.

  • NAT allows for easier management of IP addresses within a network by simplifying the routin...read more

Add your answer

Q55. Explain DNS and DHCP

Ans.

DNS is a system that translates domain names to IP addresses, while DHCP is a protocol that assigns IP addresses to devices on a network.

  • DNS stands for Domain Name System and is used to translate domain names like www.example.com to IP addresses like 192.168.1.1.

  • DHCP stands for Dynamic Host Configuration Protocol and automatically assigns IP addresses to devices on a network.

  • DNS helps users access websites using easy-to-remember domain names, while DHCP simplifies network adm...read more

Add your answer

Q56. parameters of IOSTAT in linux

Add your answer

Q57. Explain about Deadlocks

Ans.

Deadlocks occur when two or more processes are waiting for each other to release resources, resulting in a standstill.

  • Deadlocks involve a circular wait, where each process is waiting for a resource held by another process.

  • Four conditions must be met for a deadlock to occur: mutual exclusion, hold and wait, no preemption, and circular wait.

  • Examples of deadlocks include a printer waiting for a computer to release a file, while the computer is waiting for the printer to finish p...read more

Add your answer

Q58. Design a QA chatbot

Ans.

A QA chatbot designed to answer questions related to quality assurance processes and best practices.

  • Implement natural language processing to understand user queries

  • Create a knowledge base of QA processes, tools, and methodologies

  • Provide accurate and relevant answers to user questions

  • Offer interactive features like quizzes or tutorials to engage users

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Farco Tech

based on 48 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.7
 • 3k Interview Questions
3.4
 • 650 Interview Questions
4.0
 • 471 Interview Questions
3.3
 • 316 Interview Questions
View all
Top Nutanix Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter