Filter interviews by
I was interviewed in Dec 2020.
Round duration - 60 minutes
Round difficulty - Medium
Round duration - 40 minutes
Round difficulty - Medium
Given a Binary Search Tree of integers, transform it into a Greater Sum Tree where each node's value is replaced with the sum of all node values gr...
You are given the head node of a singly linked list. Your task is to return a pointer pointing to the middle of the linked list.
If there is an odd number of elements, return the ...
Round duration - 40 minutes
Round difficulty - Medium
Tip 1 : Do at least some project work.
Tip 2 : Practice at least 250 questions.
Tip 1 : Put some projects on resume.
Tip 2 : Do not put false things on resume.
I applied via Campus Placement and was interviewed before Jun 2020. There was 1 interview round.
I was interviewed before Mar 2021.
Round duration - 60 minutes
Round difficulty - Medium
After written test , only 4 from Mca and 4 from Mtech were selected for next round.
It was also pure technical round. Interview started just after result was declared. Since there was only two panels, It was taking time.
Given an array of integers ARR
of size N, consisting of 0s and 1s, you need to select a sub-array and flip its bits. Your task is to return the maximum count of 1s that can b...
Given a positive integer N
, compute the total number of '1's in the binary representation of all numbers from 1 to N. Return this count modulo 1e9+7 because the result can...
Round duration - 60 minutes
Round difficulty - Medium
Technical interview round with questions based on DSA/OS etc.
You are given a string STR
which contains alphabets, numbers, and special characters. Your task is to reverse the string.
STR = "abcde"
"e...
Given two strings STR1
and STR2
, determine the length of their longest common subsequence.
A subsequence is a sequence that can be derived from another sequen...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I am a highly motivated and experienced professional with a strong background in project management and team leadership.
Over 10 years of experience in managing complex projects and leading cross-functional teams
Proven track record of delivering projects on time and within budget
Expertise in strategic planning, risk management, and stakeholder communication
Strong problem-solving and decision-making skills
Excellent commu...
Program to reverse a string
Use a loop to iterate through the characters of the string
Create a new string and append each character in reverse order
Return the reversed string
Program to reverse the bits of a number
Convert the number to binary representation
Reverse the binary representation
Convert the reversed binary back to decimal
Program to check common sequence in two strings
Iterate through each character of the first string
Check if the current character is present in the second string
If yes, add it to the common sequence array
Return the common sequence array
This program finds and prints the bits that are set in a given number.
Use bitwise AND operator (&) to check if a bit is set.
Iterate through each bit of the number and print the position of the set bits.
A switch in a network is a device that connects multiple devices together and forwards data packets between them.
A switch operates at the data link layer of the OSI model.
It uses MAC addresses to determine the destination of data packets.
Switches improve network performance by reducing collisions and providing dedicated bandwidth to each connected device.
Switches can be implemented using software-defined networking (SD...
NAT stands for Network Address Translation. It is a process of translating IP addresses between different networks.
NAT allows multiple devices in a private network to share a single public IP address.
It provides security by hiding the internal IP addresses from external networks.
NAT enables the conservation of public IP addresses by allowing multiple devices to use a single IP.
It facilitates the routing of traffic betw...
VLAN stands for Virtual Local Area Network. It is a technology that allows the creation of multiple virtual networks within a single physical network.
VLANs provide segmentation and isolation of network traffic.
They improve network performance and security.
VLANs can be used to group devices based on department, function, or security requirements.
They enable easier network management and troubleshooting.
VLANs are commonl...
Client and server establish communication through sockets. Creating a socket involves several steps.
Client and server each create a socket object.
Server socket binds to a specific port number on the server machine.
Server socket listens for incoming client connections.
Client socket connects to the server socket using the server's IP address and port number.
Once the connection is established, client and server can exchan
A socket buffer is a data structure used by the operating system to store data being sent or received over a network socket.
Socket buffers are typically implemented as circular buffers.
They are used to temporarily hold data until it can be processed by the application.
Socket buffers have a fixed size and can be filled or emptied by the operating system or the application.
They help in managing the flow of data between t...
A bridge is a structure that connects two separate areas, allowing for the passage of people, vehicles, or other forms of transportation.
Bridges provide a means of crossing obstacles such as rivers, valleys, or roads.
They facilitate the movement of people, vehicles, and goods from one place to another.
Bridges can be made of various materials such as concrete, steel, or wood.
They can be designed in different styles and ...
IPC is a mechanism for communication between processes, while ITC is for communication between threads within a process.
IPC allows processes to exchange data and synchronize their actions.
ITC allows threads to share data and coordinate their activities.
IPC can be implemented using various techniques such as pipes, sockets, shared memory, and message queues.
ITC can be achieved through shared variables, message passing, ...
I come from a diverse family background and have achieved success in my career through hard work and dedication.
I come from a family with a mix of different cultures and traditions.
I have excelled in my career by consistently delivering results and taking on new challenges.
I have received several awards and recognition for my contributions to my field.
My family has always been supportive of my ambitions and encouraged
Linking is the process of connecting different web pages or resources together through hyperlinks.
Linking is an essential aspect of the World Wide Web.
It allows users to navigate between different web pages by clicking on hyperlinks.
Hyperlinks can be text, images, or other elements that when clicked, direct the user to another web page or resource.
Linking helps in organizing and structuring information on the web.
It en...
Little endian and big endian are byte ordering formats. Little endian stores the least significant byte first, while big endian stores the most significant byte first.
Little endian and big endian refer to the order in which bytes are stored in memory.
In little endian, the least significant byte is stored first, followed by the more significant bytes.
In big endian, the most significant byte is stored first, followed by ...
Different types of memory segments include code segment, data segment, stack segment, and heap segment.
Code segment stores the executable code of the program.
Data segment stores global and static variables.
Stack segment stores local variables and function call information.
Heap segment stores dynamically allocated memory.
Example: In C programming, global variables are stored in the data segment.
Zombie, daemon, and orphan processes are different types of processes in operating systems.
Zombie processes are dead processes that have completed execution but still have an entry in the process table.
Daemon processes are background processes that run continuously and perform specific tasks.
Orphan processes are child processes that continue to run even after their parent process has terminated.
Zombie processes consume...
To create parent and child processes, use fork() system call. To create threads, use pthread_create() function.
To create a child process, use fork() system call. The child process is an exact copy of the parent process.
To create threads, use pthread_create() function from pthread library.
Parent and child processes can communicate using inter-process communication mechanisms like pipes or shared memory.
Threads share the...
The common segments used by parent and child processes are code segment, data segment, and stack segment.
Code segment: Contains the executable code of the program.
Data segment: Stores global and static variables.
Stack segment: Used for local variables and function calls.
The common segments used by threads are code segment, data segment, and stack segment.
Code segment: Contains the executable code of the program.
Data segment: Stores global and static variables.
Stack segment: Used for local variables and function call information.
A symbol table is a data structure used by compilers and interpreters to store information about the variables, functions, and other symbols in a program.
It maps each symbol to its attributes, such as its data type, memory location, and scope.
Symbol tables are used during the compilation or interpretation process to resolve references to symbols and perform semantic analysis.
They enable efficient lookup and retrieval o...
gcc is a command-line compiler used to compile programs written in C or C++.
To compile a program using gcc, use the command 'gcc
The '-o' option is used to specify the name of the output file.
By default, gcc compiles C programs. To compile C++ programs, use the '-x' option followed by 'c++'.
To enable warnings during compilation, use the '-Wall' option.
To optimize the compiled code, use the '-O' opt...
One Convergence interview questions for popular designations
I am a highly motivated and experienced professional with a strong background in project management and team leadership.
Over 10 years of experience in managing complex projects and leading cross-functional teams
Proven track record of delivering projects on time and within budget
Expertise in strategic planning, risk management, and stakeholder communication
Strong problem-solving and decision-making skills
Excellent commu...
Client and server establish communication through sockets. Creating a socket involves several steps.
Client and server create sockets using the socket() system call.
They bind the socket to a specific address and port using the bind() system call.
The server listens for incoming connections using the listen() system call.
The client connects to the server using the connect() system call.
Once the connection is established, ...
Memory segments include code, data, stack, and heap. Each segment stores different parts of a program in memory.
Code segment: stores the executable code of the program
Data segment: stores global and static variables
Stack segment: stores local variables and function call information
Heap segment: stores dynamically allocated memory
The common segments used by threads are code segment, data segment, and stack segment.
Code segment: Contains the executable code of the program.
Data segment: Stores global and static variables.
Stack segment: Used for local variables and function call information.
gcc is a command-line compiler used to compile programs written in C or C++.
To compile a program using gcc, use the command 'gcc
The '-o' option is used to specify the name of the output file.
By default, gcc compiles C programs. To compile C++ programs, use the '-x' option with 'c++' argument.
To enable warnings during compilation, use the '-Wall' option.
To optimize the compiled code, use the '-O' o...
Top trending discussions
I am a passionate IOS developer with 5 years of experience in developing mobile applications.
5 years of experience in IOS development
Proficient in Swift and Objective-C programming languages
Strong knowledge of iOS SDK and Xcode IDE
Experience in integrating third-party libraries and APIs
Developed and launched multiple successful iOS apps
posted on 16 Jun 2024
I applied via Unstop and was interviewed in May 2024. There were 2 interview rounds.
First round was Aptitude + with some excel questions
CRM stands for Customer Relationship Management, a software used to manage interactions with customers and potential customers.
CRM helps businesses track customer interactions and manage customer data.
It can be used to streamline sales processes, improve customer service, and increase customer satisfaction.
Examples of popular CRM software include Salesforce, HubSpot, and Zoho CRM.
I applied via LinkedIn and was interviewed in Sep 2023. There were 4 interview rounds.
Critical thinking, Logic, English
Dependency Injection in .NET is a design pattern where dependencies are injected into a class rather than created within the class.
Dependency Injection helps in achieving loose coupling between classes.
It allows for easier testing by enabling mock objects to be injected during testing.
In .NET, Dependency Injection can be implemented using frameworks like Unity, Ninject, or built-in .NET Core DI container.
Example: Const...
Closures in JS allow functions to access variables from their outer scope. Angular uses services for state management.
Closures in JavaScript allow functions to access variables from their outer scope, even after the outer function has finished executing.
Angular uses services to manage state in applications, allowing for centralized data management and communication between components.
State management in Angular involve...
Some of the top questions asked at the One Convergence interview -
based on 6 reviews
Rating in categories
Software Engineer
7
salaries
| ₹8.5 L/yr - ₹14 L/yr |
Senior Software Engineer
5
salaries
| ₹17 L/yr - ₹26.5 L/yr |
Software Developer
3
salaries
| ₹1.5 L/yr - ₹11 L/yr |
VMware Software
Citrix
NetApp
Juniper Networks