Nutanix
50+ Farco Tech Interview Questions and Answers
Q1. Minimum Number of Platforms Problem
Your task is to determine the minimum number of platforms required at a railway station so that no train has to wait.
Explanation:
Given two arrays:
AT
- representing the ar...read more
Q2. Ninja and Stack of Boxes Problem
Help Ninja to create the tallest stack possible using given 3-D boxes with dimensions Length 'L', Breadth 'B', and Height 'H'. Each box can be rotated to use any side as the bas...read more
Q3. Split the String Problem Statement
You are given a string str
consisting of N
lowercase alphabets. Your task is to determine if it is possible to divide the string into three non-empty substrings such that one ...read more
Q4. Lexicographic Permutation Rank Problem Statement
Given a distinct string, determine the lexicographic permutation rank of the string.
Example:
Input:
T = 2
S = "abc"
S = "bac"
Output:
1
2
Explanation:
For the firs...read more
Q5. Loot Houses Problem Statement
A thief is planning to steal from several houses along a street. Each house has a certain amount of money stashed. However, the thief cannot loot two adjacent houses. Determine the...read more
Q6. Longest Increasing Path in Matrix Problem Statement
Given a 2-D matrix mat
with 'N' rows and 'M' columns, where each element at position (i, j) is mat[i][j]
, determine the length of the longest increasing path ...read more
Q7. Reverse Edges Problem Statement
You are given a directed graph with ‘N’ nodes and ‘M’ edges, along with two specific nodes, ‘A’ and ‘B’. Your task is to find the minimum number of operations required to create ...read more
Q8. Query and Matrix Problem Statement
You are given a binary matrix with 'M' rows and 'N' columns, initially consisting of all 0s. You will receive 'Q' queries, which can be of four types:
Query 1: 1 R index
Query ...read more
Q9. A list/array/vector of string is given. return the first index of repeating elements. The problem was quite straight-forward
Q10. implement a calculator class which does this cal.add(2).sub(3).mul(4).delay(2000).add(4) etc
Implement a calculator class with chaining methods and delay function.
Create a Calculator class with add, sub, mul methods that return the instance of the class.
Implement a delay method that uses setTimeout and returns the instance of the class.
Use a queue to store the operations and execute them in order after the delay.
Return the result of the operations when the equals method is called.
Q12. Test Scenario for Google Login Page Puzzle about 9 identical coins where 1 coin is of slightly higher weight. TCP vs UDP
Q13. Link up all nodes present in same level of BST using next pointer
The question asks to link up all nodes present in the same level of a binary search tree using the next pointer.
Traverse the tree level by level using a queue
For each level, create a linked list by connecting the nodes using the next pointer
Use a dummy node to keep track of the start of the linked list for each level
Q14. Give the length of longest absolute directory path string Discuss the DS used Optimize it
The question asks for the length of the longest absolute directory path string and how to optimize it.
Use a depth-first search (DFS) algorithm to traverse the directory structure
Maintain a stack to keep track of the current path length
Keep updating the maximum path length encountered
Consider the length of each directory/file name and the length of the path separators
Q15. Design a system to find the millionth person liking particular comment. Many constraints
Design a system to find the millionth person liking a particular comment.
Use a database to store the likes for each comment
Implement a counter to keep track of the number of likes for each comment
Use a caching mechanism to improve performance
Consider sharding or partitioning the data for scalability
Implement a search algorithm to find the millionth person
Q16. Data structures, simulate Write-Back Cache using two python dictionaries with dirty bit implementation and LRU flushing technique on cache full.
Simulate Write-Back Cache using two python dictionaries with dirty bit and LRU flushing technique.
Create two dictionaries, one for cache data and one for dirty bit tracking.
Implement LRU flushing technique to remove least recently used data when cache is full.
Set dirty bit to mark data that has been modified and needs to be written back to main memory.
Update dirty bit when data is modified and track which data needs to be written back.
Flush dirty data back to main memory when...read more
Q17. Design Thread Safe implementation of HashMap
Design a thread-safe implementation of HashMap.
Use synchronized methods or locks to ensure mutual exclusion.
Consider using ConcurrentHashMap instead of HashMap.
Use volatile keyword for variables accessed by multiple threads.
Avoid using iterators as they may cause ConcurrentModificationException.
Use atomic operations for read-modify-write operations.
Consider using immutable keys to avoid synchronization issues.
Q18. Debuggng a code of Dining Philosopher Problem
Debugging a code of Dining Philosopher Problem
Check for deadlock conditions
Ensure that each philosopher can only pick up two forks at a time
Implement a solution using semaphores or monitors
Consider using a timeout mechanism to prevent deadlock
Test the code with different scenarios to identify and fix any issues
Q19. Write a code to check whether anagram of a given string is palindrome or not.
Q20. What is kernel in OS? Which storage components are there in computer?
The kernel is the core of an operating system that manages system resources. Storage components in a computer include hard drives, SSDs, and RAM.
The kernel is responsible for managing system resources such as CPU, memory, and input/output devices.
Storage components in a computer include hard drives, solid-state drives (SSDs), and random access memory (RAM).
The kernel acts as a bridge between software and hardware, allowing applications to interact with the computer's hardware...read more
Q21. How do we identify that a specific IP Address belongs to which network?
Q22. Definition of Classes and Objects with relevant examples
Q24. what happens when you search google
When you search Google, it retrieves relevant information from its index and displays results based on the search query.
Google retrieves information from its index of web pages
Results are displayed based on relevance to the search query
Search results may include websites, images, videos, news articles, and more
Q25. What are the different types of waits in Selenium
There are three types of waits in Selenium: Implicit Wait, Explicit Wait, and Fluent Wait.
Implicit Wait: Waits for a certain amount of time before throwing an exception if the element is not found.
Explicit Wait: Waits for a certain condition to occur before proceeding further in the code.
Fluent Wait: Waits for a certain condition to occur with a defined frequency before proceeding further in the code.
Q26. Design a URL Shortener
A URL shortener is a tool that takes a long URL and creates a shorter, easier-to-share link.
Generate a unique short code for each URL
Store the short code and original URL in a database
Redirect users from the short URL to the original URL
Track clicks and analytics for each short URL
Q27. Explain the osi model in detail
The OSI model is a conceptual model that describes how data is transmitted over a network.
The OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the layers above and below it.
The Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and application-level protocols.
An example of a protocol that operates at t...read more
Q28. Merge two sorted array
Q29. What are the new features of Selenium 4?
Selenium 4 has new features like improved W3C support, relative locators, and better error handling.
Improved W3C support for better browser compatibility
Relative locators for easier element location
Better error handling with detailed error messages
New APIs for easier browser automation
Support for Chromium-based Edge browser
Integration with DevTools Protocol for better debugging
Q30. Tell me how a router can be fixed when it is not working
Q31. Remove duplicates from the string
Q32. Find the first 50 prime numbers
Generate the first 50 prime numbers
Start with the first prime number, 2
Use a loop to check for prime numbers by dividing each number by all numbers less than it
Keep track of the prime numbers found until you have 50
Q33. What are static variables?
Q34. What is use of PostgreSQL?
Q35. What is your driving force
My driving force is to create impactful solutions that solve real-world problems.
I am motivated by the opportunity to make a positive impact on society
I enjoy the challenge of solving complex problems
I am driven by the desire to continuously improve and innovate
I am passionate about technology and its potential to improve people's lives
Q36. Oracle database migration from onprim to cloud
Q37. Explain the IP assignment process
IP assignment process involves allocating unique IP addresses to devices on a network.
IP addresses are assigned by a DHCP server or manually by a network administrator
IP addresses can be assigned dynamically or statically
IP addresses must be unique within a network
IPv4 addresses are 32-bit and IPv6 addresses are 128-bit
Q38. GRE vs IPSEC and whats the difference
GRE and IPSEC are both protocols used for secure communication over networks, but they have different purposes and implementations.
GRE (Generic Routing Encapsulation) is a tunneling protocol used to encapsulate a wide variety of network layer protocols inside virtual point-to-point links. It does not provide encryption or authentication.
IPSEC (Internet Protocol Security) is a suite of protocols used to secure Internet Protocol (IP) communications by authenticating and encrypt...read more
Q39. High level design with low level too in a particular part
High level design refers to overall architecture while low level design focuses on specific implementation details.
High level design involves defining system architecture and components
Low level design includes detailed design of individual modules or components
Example: High level design may include choosing a database system, while low level design may involve designing database tables and queries
Q40. Test Scenario for calculator
Q41. How did you find the server went down
Q42. how did you find gateway in linux
Q43. how would kill the child process
Use the kill command with the child process ID to terminate it
Find the child process ID using tools like ps or pgrep
Use the kill command with the appropriate signal (e.g. SIGTERM, SIGKILL) and the child process ID
Example: kill -9
Q44. What is encaplsulation
Encapsulation is the process of hiding implementation details and exposing only necessary information.
Encapsulation is achieved through access modifiers like public, private, and protected.
It helps in achieving data abstraction and information hiding.
Encapsulation provides better control over the data and prevents unauthorized access.
Example: A class with private variables and public methods to access them.
Q45. Diff between DBMS and Excel.
DBMS is a software system that manages databases, while Excel is a spreadsheet program used for data analysis and visualization.
DBMS is used to store, retrieve, and manage data in a structured format, while Excel is used for data analysis and visualization.
DBMS allows for multiple users to access and manipulate data simultaneously, while Excel is typically used by a single user at a time.
DBMS supports complex queries and transactions, while Excel is more limited in its capabi...read more
Q46. Explain and write the commands of linux
Linux commands are used to interact with the operating system through the command line interface.
Commands are case-sensitive
Most commands have options and arguments that can be used to customize their behavior
Common commands include ls (list files), cd (change directory), mkdir (make directory), rm (remove files), and more
Q47. Second largest number in an array.
Find the second largest number in an array of strings.
Convert the array of strings to an array of integers for comparison.
Sort the array in descending order and return the second element.
Handle cases where there may be duplicates of the largest number.
Q48. What is Operating System
An operating system is a software that manages computer hardware and provides services for computer programs.
Manages computer hardware resources such as CPU, memory, and storage
Provides a user interface for interacting with the computer
Supports running applications and managing processes
Examples include Windows, macOS, Linux, iOS, Android
Q49. Commands awk and sed in linux
awk and sed are powerful text processing tools in Linux.
awk is used for pattern scanning and processing
sed is used for text stream editing
Both can be used in combination to manipulate text files
Example: awk '{print $1}' file.txt
Example: sed 's/old/new/g' file.txt
Q50. How actually DNS works
Q51. Difference between HTTPS and HTTP
HTTPS is a secure version of HTTP that encrypts data transmitted between a website and a user's browser.
HTTPS uses SSL/TLS encryption to secure data transmission
HTTP sends data in plain text, making it vulnerable to interception
HTTPS is indicated by a padlock icon in the browser's address bar
Websites that handle sensitive information like banking or shopping use HTTPS
Q52. Softwares that i am aware of
I am aware of various e-learning authoring tools such as Articulate Storyline, Adobe Captivate, and Camtasia.
Articulate Storyline
Adobe Captivate
Camtasia
Q53. What is DHCP protocol
DHCP protocol is used to automatically assign IP addresses to devices on a network.
DHCP stands for Dynamic Host Configuration Protocol
It allows devices to obtain IP addresses and other network configuration information dynamically
DHCP servers assign IP addresses to devices for a specific lease period
DHCP reduces the need for manual configuration of network settings
Example: When you connect to a Wi-Fi network, DHCP assigns your device an IP address
Q54. Why NAT is needed
NAT is needed to allow multiple devices on a private network to share a single public IP address.
NAT helps conserve public IP addresses by allowing multiple devices on a private network to communicate with the internet using a single public IP address.
NAT provides an additional layer of security by hiding the internal IP addresses of devices on the private network from external sources.
NAT allows for easier management of IP addresses within a network by simplifying the routin...read more
Q55. Explain DNS and DHCP
DNS is a system that translates domain names to IP addresses, while DHCP is a protocol that assigns IP addresses to devices on a network.
DNS stands for Domain Name System and is used to translate domain names like www.example.com to IP addresses like 192.168.1.1.
DHCP stands for Dynamic Host Configuration Protocol and automatically assigns IP addresses to devices on a network.
DNS helps users access websites using easy-to-remember domain names, while DHCP simplifies network adm...read more
Q56. parameters of IOSTAT in linux
Q57. Explain about Deadlocks
Deadlocks occur when two or more processes are waiting for each other to release resources, resulting in a standstill.
Deadlocks involve a circular wait, where each process is waiting for a resource held by another process.
Four conditions must be met for a deadlock to occur: mutual exclusion, hold and wait, no preemption, and circular wait.
Examples of deadlocks include a printer waiting for a computer to release a file, while the computer is waiting for the printer to finish p...read more
Q58. Design a QA chatbot
A QA chatbot designed to answer questions related to quality assurance processes and best practices.
Implement natural language processing to understand user queries
Create a knowledge base of QA processes, tools, and methodologies
Provide accurate and relevant answers to user questions
Offer interactive features like quizzes or tutorials to engage users
More about working at Nutanix
Interview Process at Farco Tech
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month