Add office photos
Employer?
Claim Account for FREE

Nutanix

3.8
based on 150 Reviews
Filter interviews by

50+ Acufore India Interview Questions and Answers

Updated 19 Dec 2024
Popular Designations
Q1. Minimum Number of Platforms

You have been given two arrays, 'AT' and 'DT', representing the arrival and departure times of all trains that reach a railway station.

Your task is to find the minimum number of plat...read more

View 3 more answers
Q2. Ninja And Stack Of Boxes

Ninja has been given ‘N’ rectangular 3-D ‘BOXES’. Each box has dimensions Length ‘L’, Breadth ‘B’ and Height ‘H’. Ninja has to create a stack of boxes as tall as possible. But there is a...read more

View 3 more answers
Q3. Split the String

You are given a string ‘str’ of ‘N’ lowercase alphabets. Your task is to check whether it is possible to split the given string into three non-empty substrings such that one of them is a substri...read more

View 2 more answers
Q4. Lexicographic Permutation Rank

Ninja got holiday homework from his English teacher. His teacher gave him a string and told him to find the rank of the string if the string is sorted in lexicographical order.

Nin...read more

View 2 more answers
Discover Acufore India interview dos and don'ts from real experiences
Q5. Loot Houses

A thief wants to loot houses. He knows the amount of money in each house. He cannot loot two consecutive houses. Find the maximum amount of money he can loot.

Input Format :
The first line of input c...read more
View 3 more answers
Q6. Increasing Path In Matrix

You are given a 2-D matrix ‘mat’, consisting of ’N’ rows and ‘M’ columns. The element at the i-th row and j-th column is ‘mat[i][j]’.

From mat[i][j], you can move to mat[i+1][j] if mat[...read more

View 3 more answers
Are these interview questions helpful?
Q7. Reverse Edges

You are given a directed graph of ‘N’ nodes and ‘M’ edges. Also, you have two nodes ‘A’ and ‘B’. Your task is to make at least one valid path from ‘A’ to ‘B’ by doing the below operations a minimum...read more

Add your answer
Q8. Query And Matrix

You are given a binary matrix with ‘M’ rows and ‘N’ columns initially consisting of all 0s. 'Q' queries follow. The queries can be of 4 types:

Query 1: 1 R index Query 2: 1 C index Query 3: 2 R ...read more
Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. A list/array/vector of string is given. return the first index of repeating elements. The problem was quite straight-forward

Add your answer
Q10. OS Questions

We were given a piece of code for concurrent file writes and sequential acknowledgments and as you would have judged from the name, it was an Operating System (OS) based round. We were each given a ...read more

Add your answer

Q11. implement a calculator class which does this cal.add(2).sub(3).mul(4).delay(2000).add(4) etc

Ans.

Implement a calculator class with chaining methods and delay function.

  • Create a Calculator class with add, sub, mul methods that return the instance of the class.

  • Implement a delay method that uses setTimeout and returns the instance of the class.

  • Use a queue to store the operations and execute them in order after the delay.

  • Return the result of the operations when the equals method is called.

Add your answer
Q12. System Design Question

I was asked to do a system design for Pastebin and a set of requirements were given which I had to fulfill.

Add your answer

Q13. Test Scenario for Google Login Page Puzzle about 9 identical coins where 1 coin is of slightly higher weight. TCP vs UDP

Add your answer

Q14. Link up all nodes present in same level of BST using next pointer

Ans.

The question asks to link up all nodes present in the same level of a binary search tree using the next pointer.

  • Traverse the tree level by level using a queue

  • For each level, create a linked list by connecting the nodes using the next pointer

  • Use a dummy node to keep track of the start of the linked list for each level

Add your answer

Q15. Give the length of longest absolute directory path string Discuss the DS used Optimize it

Ans.

The question asks for the length of the longest absolute directory path string and how to optimize it.

  • Use a depth-first search (DFS) algorithm to traverse the directory structure

  • Maintain a stack to keep track of the current path length

  • Keep updating the maximum path length encountered

  • Consider the length of each directory/file name and the length of the path separators

Add your answer

Q16. Design a system to find the millionth person liking particular comment. Many constraints

Ans.

Design a system to find the millionth person liking a particular comment.

  • Use a database to store the likes for each comment

  • Implement a counter to keep track of the number of likes for each comment

  • Use a caching mechanism to improve performance

  • Consider sharding or partitioning the data for scalability

  • Implement a search algorithm to find the millionth person

Add your answer

Q17. Data structures, simulate Write-Back Cache using two python dictionaries with dirty bit implementation and LRU flushing technique on cache full.

Ans.

Simulate Write-Back Cache using two python dictionaries with dirty bit and LRU flushing technique.

  • Create two dictionaries, one for cache data and one for dirty bit tracking.

  • Implement LRU flushing technique to remove least recently used data when cache is full.

  • Set dirty bit to mark data that has been modified and needs to be written back to main memory.

  • Update dirty bit when data is modified and track which data needs to be written back.

  • Flush dirty data back to main memory when...read more

Add your answer

Q18. Design Thread Safe implementation of HashMap

Ans.

Design a thread-safe implementation of HashMap.

  • Use synchronized methods or locks to ensure mutual exclusion.

  • Consider using ConcurrentHashMap instead of HashMap.

  • Use volatile keyword for variables accessed by multiple threads.

  • Avoid using iterators as they may cause ConcurrentModificationException.

  • Use atomic operations for read-modify-write operations.

  • Consider using immutable keys to avoid synchronization issues.

Add your answer

Q19. Debuggng a code of Dining Philosopher Problem

Ans.

Debugging a code of Dining Philosopher Problem

  • Check for deadlock conditions

  • Ensure that each philosopher can only pick up two forks at a time

  • Implement a solution using semaphores or monitors

  • Consider using a timeout mechanism to prevent deadlock

  • Test the code with different scenarios to identify and fix any issues

Add your answer

Q20. Write a code to check whether anagram of a given string is palindrome or not.

Add your answer

Q21. What is kernel in OS? Which storage components are there in computer?

Ans.

The kernel is the core of an operating system that manages system resources. Storage components in a computer include hard drives, SSDs, and RAM.

  • The kernel is responsible for managing system resources such as CPU, memory, and input/output devices.

  • Storage components in a computer include hard drives, solid-state drives (SSDs), and random access memory (RAM).

  • The kernel acts as a bridge between software and hardware, allowing applications to interact with the computer's hardware...read more

Add your answer

Q22. How do we identify that a specific IP Address belongs to which network?

Add your answer

Q23. Definition of Classes and Objects with relevant examples

Add your answer
Q24. OS Questions

Effective paging techniques, count page faults

Add your answer

Q25. what happens when you search google

Ans.

When you search Google, it retrieves relevant information from its index and displays results based on the search query.

  • Google retrieves information from its index of web pages

  • Results are displayed based on relevance to the search query

  • Search results may include websites, images, videos, news articles, and more

Add your answer

Q26. What are the different types of waits in Selenium

Ans.

There are three types of waits in Selenium: Implicit Wait, Explicit Wait, and Fluent Wait.

  • Implicit Wait: Waits for a certain amount of time before throwing an exception if the element is not found.

  • Explicit Wait: Waits for a certain condition to occur before proceeding further in the code.

  • Fluent Wait: Waits for a certain condition to occur with a defined frequency before proceeding further in the code.

Add your answer

Q27. Design a URL Shortener

Ans.

A URL shortener is a tool that takes a long URL and creates a shorter, easier-to-share link.

  • Generate a unique short code for each URL

  • Store the short code and original URL in a database

  • Redirect users from the short URL to the original URL

  • Track clicks and analytics for each short URL

Add your answer

Q28. Explain the osi model in detail

Ans.

The OSI model is a conceptual model that describes how data is transmitted over a network.

  • The OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has a specific function and communicates with the layers above and below it.

  • The Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and application-level protocols.

  • An example of a protocol that operates at t...read more

Add your answer

Q29. Merge two sorted array

Add your answer

Q30. What are the new features of Selenium 4?

Ans.

Selenium 4 has new features like improved W3C support, relative locators, and better error handling.

  • Improved W3C support for better browser compatibility

  • Relative locators for easier element location

  • Better error handling with detailed error messages

  • New APIs for easier browser automation

  • Support for Chromium-based Edge browser

  • Integration with DevTools Protocol for better debugging

Add your answer

Q31. Tell me how a router can be fixed when it is not working

Add your answer

Q32. Remove duplicates from the string

Add your answer

Q33. Find the first 50 prime numbers

Ans.

Generate the first 50 prime numbers

  • Start with the first prime number, 2

  • Use a loop to check for prime numbers by dividing each number by all numbers less than it

  • Keep track of the prime numbers found until you have 50

Add your answer

Q34. What are static variables?

Add your answer

Q35. What is use of PostgreSQL?

Add your answer

Q36. What is your driving force

Ans.

My driving force is to create impactful solutions that solve real-world problems.

  • I am motivated by the opportunity to make a positive impact on society

  • I enjoy the challenge of solving complex problems

  • I am driven by the desire to continuously improve and innovate

  • I am passionate about technology and its potential to improve people's lives

Add your answer

Q37. Oracle database migration from onprim to cloud

Add your answer

Q38. Explain the IP assignment process

Ans.

IP assignment process involves allocating unique IP addresses to devices on a network.

  • IP addresses are assigned by a DHCP server or manually by a network administrator

  • IP addresses can be assigned dynamically or statically

  • IP addresses must be unique within a network

  • IPv4 addresses are 32-bit and IPv6 addresses are 128-bit

Add your answer

Q39. GRE vs IPSEC and whats the difference

Ans.

GRE and IPSEC are both protocols used for secure communication over networks, but they have different purposes and implementations.

  • GRE (Generic Routing Encapsulation) is a tunneling protocol used to encapsulate a wide variety of network layer protocols inside virtual point-to-point links. It does not provide encryption or authentication.

  • IPSEC (Internet Protocol Security) is a suite of protocols used to secure Internet Protocol (IP) communications by authenticating and encrypt...read more

Add your answer

Q40. High level design with low level too in a particular part

Ans.

High level design refers to overall architecture while low level design focuses on specific implementation details.

  • High level design involves defining system architecture and components

  • Low level design includes detailed design of individual modules or components

  • Example: High level design may include choosing a database system, while low level design may involve designing database tables and queries

Add your answer

Q41. Test Scenario for calculator

Add your answer

Q42. How did you find the server went down

Add your answer

Q43. how did you find gateway in linux

Add your answer

Q44. how would kill the child process

Ans.

Use the kill command with the child process ID to terminate it

  • Find the child process ID using tools like ps or pgrep

  • Use the kill command with the appropriate signal (e.g. SIGTERM, SIGKILL) and the child process ID

  • Example: kill -9

Add your answer

Q45. What is encaplsulation

Ans.

Encapsulation is the process of hiding implementation details and exposing only necessary information.

  • Encapsulation is achieved through access modifiers like public, private, and protected.

  • It helps in achieving data abstraction and information hiding.

  • Encapsulation provides better control over the data and prevents unauthorized access.

  • Example: A class with private variables and public methods to access them.

Add your answer

Q46. Diff between DBMS and Excel.

Ans.

DBMS is a software system that manages databases, while Excel is a spreadsheet program used for data analysis and visualization.

  • DBMS is used to store, retrieve, and manage data in a structured format, while Excel is used for data analysis and visualization.

  • DBMS allows for multiple users to access and manipulate data simultaneously, while Excel is typically used by a single user at a time.

  • DBMS supports complex queries and transactions, while Excel is more limited in its capabi...read more

Add your answer

Q47. Explain and write the commands of linux

Ans.

Linux commands are used to interact with the operating system through the command line interface.

  • Commands are case-sensitive

  • Most commands have options and arguments that can be used to customize their behavior

  • Common commands include ls (list files), cd (change directory), mkdir (make directory), rm (remove files), and more

Add your answer

Q48. Second largest number in an array.

Ans.

Find the second largest number in an array of strings.

  • Convert the array of strings to an array of integers for comparison.

  • Sort the array in descending order and return the second element.

  • Handle cases where there may be duplicates of the largest number.

Add your answer

Q49. What is Operating System

Ans.

An operating system is a software that manages computer hardware and provides services for computer programs.

  • Manages computer hardware resources such as CPU, memory, and storage

  • Provides a user interface for interacting with the computer

  • Supports running applications and managing processes

  • Examples include Windows, macOS, Linux, iOS, Android

Add your answer

Q50. Commands awk and sed in linux

Ans.

awk and sed are powerful text processing tools in Linux.

  • awk is used for pattern scanning and processing

  • sed is used for text stream editing

  • Both can be used in combination to manipulate text files

  • Example: awk '{print $1}' file.txt

  • Example: sed 's/old/new/g' file.txt

Add your answer

Q51. How actually DNS works

Add your answer

Q52. Difference between HTTPS and HTTP

Ans.

HTTPS is a secure version of HTTP that encrypts data transmitted between a website and a user's browser.

  • HTTPS uses SSL/TLS encryption to secure data transmission

  • HTTP sends data in plain text, making it vulnerable to interception

  • HTTPS is indicated by a padlock icon in the browser's address bar

  • Websites that handle sensitive information like banking or shopping use HTTPS

Add your answer

Q53. Softwares that i am aware of

Ans.

I am aware of various e-learning authoring tools such as Articulate Storyline, Adobe Captivate, and Camtasia.

  • Articulate Storyline

  • Adobe Captivate

  • Camtasia

Add your answer

Q54. What is DHCP protocol

Ans.

DHCP protocol is used to automatically assign IP addresses to devices on a network.

  • DHCP stands for Dynamic Host Configuration Protocol

  • It allows devices to obtain IP addresses and other network configuration information dynamically

  • DHCP servers assign IP addresses to devices for a specific lease period

  • DHCP reduces the need for manual configuration of network settings

  • Example: When you connect to a Wi-Fi network, DHCP assigns your device an IP address

Add your answer

Q55. Why NAT is needed

Ans.

NAT is needed to allow multiple devices on a private network to share a single public IP address.

  • NAT helps conserve public IP addresses by allowing multiple devices on a private network to communicate with the internet using a single public IP address.

  • NAT provides an additional layer of security by hiding the internal IP addresses of devices on the private network from external sources.

  • NAT allows for easier management of IP addresses within a network by simplifying the routin...read more

Add your answer

Q56. Explain DNS and DHCP

Ans.

DNS is a system that translates domain names to IP addresses, while DHCP is a protocol that assigns IP addresses to devices on a network.

  • DNS stands for Domain Name System and is used to translate domain names like www.example.com to IP addresses like 192.168.1.1.

  • DHCP stands for Dynamic Host Configuration Protocol and automatically assigns IP addresses to devices on a network.

  • DNS helps users access websites using easy-to-remember domain names, while DHCP simplifies network adm...read more

Add your answer

Q57. parameters of IOSTAT in linux

Add your answer

Q58. Explain about Deadlocks

Ans.

Deadlocks occur when two or more processes are waiting for each other to release resources, resulting in a standstill.

  • Deadlocks involve a circular wait, where each process is waiting for a resource held by another process.

  • Four conditions must be met for a deadlock to occur: mutual exclusion, hold and wait, no preemption, and circular wait.

  • Examples of deadlocks include a printer waiting for a computer to release a file, while the computer is waiting for the printer to finish p...read more

Add your answer

Q59. Design a QA chatbot

Ans.

A QA chatbot designed to answer questions related to quality assurance processes and best practices.

  • Implement natural language processing to understand user queries

  • Create a knowledge base of QA processes, tools, and methodologies

  • Provide accurate and relevant answers to user questions

  • Offer interactive features like quizzes or tutorials to engage users

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Acufore India

based on 47 interviews in the last 1 year
Interview experience
3.9
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.4
 • 785 Interview Questions
3.8
 • 405 Interview Questions
3.8
 • 361 Interview Questions
3.5
 • 308 Interview Questions
4.2
 • 207 Interview Questions
3.7
 • 150 Interview Questions
View all
Top Nutanix Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter