Filter interviews by
I was interviewed in Dec 2020.
Round duration - 60 minutes
Round difficulty - Medium
1. Explain your final year project
2. What is grey hole attack?
3. What is semaphore?
4. What is mutex?
5. Difference between mutex and semaphore.
6. What is virtual memory?
7. Difference...
Round duration - 40 minutes
Round difficulty - Medium
What is SSH, SSL, SDN ?
Difference between TCP and UDP ?
What is virtual, physical memory?
What is critical section?
Our very basic intuition is that we are going to traverse the tree node by node through any order traversal (pre-order, in-order, and post-order), and for each node, we will find all the greater nodes, SUM their values and store it. Then, later we replace each node with its corresponding SUM. The steps are as follows
Round duration - 40 minutes
Round difficulty - Medium
What is deadlock?
What is segmentation fault?
What is page fault?
What is exception?
What will be stored in data section, heap, stack in memory?
What are application of stacks?
What is TTL i...
Tip 1 : Do at least some project work.
Tip 2 : Practice at least 250 questions.
Tip 1 : Put some projects on resume.
Tip 2 : Do not put false things on resume.
I applied via Campus Placement and was interviewed before Jun 2020. There was 1 interview round.
I was interviewed before Mar 2021.
Round duration - 60 minutes
Round difficulty - Medium
After written test , only 4 from Mca and 4 from Mtech were selected for next round.
It was also pure technical round. Interview started just after result was declared. Since there was only two panels, It was taking time.
Property of XOR can be used to solve this problem. 1^0 = 1 and 1^1 = 0
First, we calculate the number of digits in the given number using log.
Next, generate a number with digits equal to the digits in the given number and all bits set to 1.
The last step is to take the xor of the given number with the generated number.
The time complexity of this solution is O(log n).
The direct approach would be to loop through all bits in an integer, check if a bit is set and if it is, then increment the set bit count.
Time Complexity: Θ(logn) (Theta of logn)
Auxiliary Space: O(1)
Brian Kernighan’s Algorithm can also be used here.
This algorithm is based on the idea that subtracting 1 from a decimal number flips all the bits after the rightmost set bit(which is 1) including the rightmost set bit...
What is NAT and what are its functions?
NAT stands for network address translation. It’s a way to map multiple local private addresses to a public one before transferring the information. Organizations that want multiple devices to employ a single IP address use NAT, as do most home routers.
The functions of NAT are −
Address translation for data transfer
The border router is configured for NAT. The border router has two parts
Local interface
Global interface.
Whe...
What is VLAN?
VLAN is a custom network which is created from one or more local area networks. It enables a group of devices available in multiple networks to be combined into one logical network. The result becomes a virtual LAN that is administered like a physical LAN. The full form of VLAN is defined as Virtual Local Area Network.
What is socket buffer?
Socket buffers are the short queues of packets the kernel holds on behalf of your app, as it's shuffling data between the NIC and your app's memory space.
What is the function of a bridge?
The Bridges connect two or more different LANs that have similar protocols and provide communications between the devices.
Bridges are connected between two LANs in which some devices are connected in LAN A and LAN B.
Bridges have the capability to take the Mac address of the devices which are connected in both the LANs.
If any device sends data to the other device then it first goes to the bridge later it reads the Mac a...
Round duration - 60 minutes
Round difficulty - Medium
Technical interview round with questions based on DSA/OS etc.
If the given string is: STR...
This can be done by iterative swapping using two pointers. The first pointer points to the beginning of the string, whereas the second pointer points to the end. Both pointers keep swapping their elements and go towards each other. Essentially, the algorithm simulates the rotation of a string with respect to its midpoint.
Time Complexity : O(n)
This problem can be solved using recursion. In this approach, we will start form last element of both the strings. If elements at the last matches then we will decrement length of both the string else we will decrement the length of either of the string.
lcs(s1, s2, n, m):
if n == 0 or m == 0:
return 0
if s1[n-1] == s2[m - 1]:
return 1 + lcs(s1, s2, n-1, m-1)
else:
return max(lcs(s1, s2, n-1, m), lcs(s1, s2, n, m-1))
But this ...
Difference between Zombie, Orphan and Daemon Processes
1. A Zombie is a process that has completed its task but still, it shows an entry in a process table. A child process that remains running even after its parent process is terminated or completed without waiting for the child process execution is called an orphan. A daemon process is a system-related process always running in the background.
2. Zombie process states always indicated by Z . The orphan process was created...
What is little endian and big endian?
Little and big endian are two ways of storing multibyte data-types ( int, float, etc). In little endian machines, last byte of binary representation of the multibyte data-type is stored first. On the other hand, in big endian machines, first byte of binary representation of the multibyte data-type is stored first.
What is linking?
Linking is the process of collecting and combining various pieces of code and data into a single file that can be loaded (copied) into memory and executed. Linking can be performed at compile time, when the source code is translated into machine code, at load time, when the program is loaded into memory and executed by the loader, and even at run time, by application programs. On early computer systems, linking was per...
Explain the memory layout of a C program.
1. Text Segment:
A text segment, also known as a code segment or simply as text, is one of the sections of a program in an object file or in memory, which contains executable instructions.
As a memory region, a text segment may be placed below the heap or stack in order to prevent heaps and stack overflows from overwriting it.
2. Initialized Data Segment:
Initialized data segment, usually called simply th...
What is symbol table?
Symbol Table is an important data structure created and maintained by the compiler in order to keep track of semantics of variables i.e. it stores information about the scope and binding information about names, information about instances of various entities such as variable and function names, classes, objects, etc.
It is built-in lexical and syntax analysis phases.
The information is collected by the analysis ph...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I am a highly motivated and experienced professional with a strong background in project management and team leadership.
Over 10 years of experience in managing complex projects and leading cross-functional teams
Proven track record of delivering projects on time and within budget
Expertise in strategic planning, risk management, and stakeholder communication
Strong problem-solving and decision-making skills
Excellent commu...
Program to reverse a string
Use a loop to iterate through the characters of the string
Create a new string and append each character in reverse order
Return the reversed string
Program to reverse the bits of a number
Convert the number to binary representation
Reverse the binary representation
Convert the reversed binary back to decimal
Program to check common sequence in two strings
Iterate through each character of the first string
Check if the current character is present in the second string
If yes, add it to the common sequence array
Return the common sequence array
This program finds and prints the bits that are set in a given number.
Use bitwise AND operator (&) to check if a bit is set.
Iterate through each bit of the number and print the position of the set bits.
A switch in a network is a device that connects multiple devices together and forwards data packets between them.
A switch operates at the data link layer of the OSI model.
It uses MAC addresses to determine the destination of data packets.
Switches improve network performance by reducing collisions and providing dedicated bandwidth to each connected device.
Switches can be implemented using software-defined networking (SD...
NAT stands for Network Address Translation. It is a process of translating IP addresses between different networks.
NAT allows multiple devices in a private network to share a single public IP address.
It provides security by hiding the internal IP addresses from external networks.
NAT enables the conservation of public IP addresses by allowing multiple devices to use a single IP.
It facilitates the routing of traffic betw...
VLAN stands for Virtual Local Area Network. It is a technology that allows the creation of multiple virtual networks within a single physical network.
VLANs provide segmentation and isolation of network traffic.
They improve network performance and security.
VLANs can be used to group devices based on department, function, or security requirements.
They enable easier network management and troubleshooting.
VLANs are commonl...
Client and server establish communication through sockets. Creating a socket involves several steps.
Client and server each create a socket object.
Server socket binds to a specific port number on the server machine.
Server socket listens for incoming client connections.
Client socket connects to the server socket using the server's IP address and port number.
Once the connection is established, client and server can exchan
A socket buffer is a data structure used by the operating system to store data being sent or received over a network socket.
Socket buffers are typically implemented as circular buffers.
They are used to temporarily hold data until it can be processed by the application.
Socket buffers have a fixed size and can be filled or emptied by the operating system or the application.
They help in managing the flow of data between t...
A bridge is a structure that connects two separate areas, allowing for the passage of people, vehicles, or other forms of transportation.
Bridges provide a means of crossing obstacles such as rivers, valleys, or roads.
They facilitate the movement of people, vehicles, and goods from one place to another.
Bridges can be made of various materials such as concrete, steel, or wood.
They can be designed in different styles and ...
IPC is a mechanism for communication between processes, while ITC is for communication between threads within a process.
IPC allows processes to exchange data and synchronize their actions.
ITC allows threads to share data and coordinate their activities.
IPC can be implemented using various techniques such as pipes, sockets, shared memory, and message queues.
ITC can be achieved through shared variables, message passing, ...
I come from a diverse family background and have achieved success in my career through hard work and dedication.
I come from a family with a mix of different cultures and traditions.
I have excelled in my career by consistently delivering results and taking on new challenges.
I have received several awards and recognition for my contributions to my field.
My family has always been supportive of my ambitions and encouraged
Linking is the process of connecting different web pages or resources together through hyperlinks.
Linking is an essential aspect of the World Wide Web.
It allows users to navigate between different web pages by clicking on hyperlinks.
Hyperlinks can be text, images, or other elements that when clicked, direct the user to another web page or resource.
Linking helps in organizing and structuring information on the web.
It en...
Little endian and big endian are byte ordering formats. Little endian stores the least significant byte first, while big endian stores the most significant byte first.
Little endian and big endian refer to the order in which bytes are stored in memory.
In little endian, the least significant byte is stored first, followed by the more significant bytes.
In big endian, the most significant byte is stored first, followed by ...
Different types of memory segments include code segment, data segment, stack segment, and heap segment.
Code segment stores the executable code of the program.
Data segment stores global and static variables.
Stack segment stores local variables and function call information.
Heap segment stores dynamically allocated memory.
Example: In C programming, global variables are stored in the data segment.
Zombie, daemon, and orphan processes are different types of processes in operating systems.
Zombie processes are dead processes that have completed execution but still have an entry in the process table.
Daemon processes are background processes that run continuously and perform specific tasks.
Orphan processes are child processes that continue to run even after their parent process has terminated.
Zombie processes consume...
To create parent and child processes, use fork() system call. To create threads, use pthread_create() function.
To create a child process, use fork() system call. The child process is an exact copy of the parent process.
To create threads, use pthread_create() function from pthread library.
Parent and child processes can communicate using inter-process communication mechanisms like pipes or shared memory.
Threads share the...
The common segments used by parent and child processes are code segment, data segment, and stack segment.
Code segment: Contains the executable code of the program.
Data segment: Stores global and static variables.
Stack segment: Used for local variables and function calls.
The common segments used by threads are code segment, data segment, and stack segment.
Code segment: Contains the executable code of the program.
Data segment: Stores global and static variables.
Stack segment: Used for local variables and function call information.
A symbol table is a data structure used by compilers and interpreters to store information about the variables, functions, and other symbols in a program.
It maps each symbol to its attributes, such as its data type, memory location, and scope.
Symbol tables are used during the compilation or interpretation process to resolve references to symbols and perform semantic analysis.
They enable efficient lookup and retrieval o...
gcc is a command-line compiler used to compile programs written in C or C++.
To compile a program using gcc, use the command 'gcc
The '-o' option is used to specify the name of the output file.
By default, gcc compiles C programs. To compile C++ programs, use the '-x' option followed by 'c++'.
To enable warnings during compilation, use the '-Wall' option.
To optimize the compiled code, use the '-O' opt...
One Convergence interview questions for popular designations
I am a highly motivated and experienced professional with a strong background in project management and team leadership.
Over 10 years of experience in managing complex projects and leading cross-functional teams
Proven track record of delivering projects on time and within budget
Expertise in strategic planning, risk management, and stakeholder communication
Strong problem-solving and decision-making skills
Excellent commu...
The common segments used by threads are code segment, data segment, and stack segment.
Code segment: Contains the executable code of the program.
Data segment: Stores global and static variables.
Stack segment: Used for local variables and function call information.
gcc is a command-line compiler used to compile programs written in C or C++.
To compile a program using gcc, use the command 'gcc
The '-o' option is used to specify the name of the output file.
By default, gcc compiles C programs. To compile C++ programs, use the '-x' option with 'c++' argument.
To enable warnings during compilation, use the '-Wall' option.
To optimize the compiled code, use the '-O' o...
Top trending discussions
I applied via Approached by Company and was interviewed in Sep 2024. There were 4 interview rounds.
They will send you a link for aptitude test
Yes, I am comfortable with night shifts as I am able to adapt to different schedules and prioritize work efficiently.
I have previous experience working night shifts and have been able to perform well during those hours.
I am a night owl and find that I am more productive during the night.
I understand the importance of maintaining a healthy work-life balance and am willing to adjust my schedule to accommodate night shift
It takes me approximately 30 minutes to reach the office from my current location.
I live about 10 miles away from the office.
I usually drive to work, taking the highway to avoid traffic.
On average, it takes me half an hour to commute to the office.
I prefer to discuss salary expectations based on the responsibilities and requirements of the position.
Focus on discussing salary expectations based on the job role and industry standards.
Avoid disclosing current salary to ensure fair compensation.
Highlight relevant experience and skills that justify desired salary.
Discuss potential for growth and additional benefits instead of current salary.
I was a marketing manager at a tech company.
Managed marketing campaigns and strategies
Collaborated with cross-functional teams to drive brand awareness
Analyzed market trends and competitor activities
Implemented digital marketing initiatives
Organized events and promotions
Seeking new challenges and opportunities for growth.
Desire for career advancement
Lack of growth opportunities in previous organization
Seeking new challenges and learning experiences
IDfy is a leading identity verification and fraud prevention platform.
IDfy offers solutions for KYC verification, customer onboarding, and fraud detection.
Their platform uses AI and machine learning algorithms to verify identities in real-time.
IDfy serves a wide range of industries including finance, e-commerce, and healthcare.
The case study involves asking you about the documents and how will you verify fraud with the given documents like offer letter , and others. And the second
2 case study was
How will you teach the blind man colour blue
The answer was this was given by me hence it was out of the book
I applied via Recruitment Consulltant and was interviewed in Oct 2024. There was 1 interview round.
I worked on a project involving developing a new algorithm for optimizing network traffic. My role was to design and implement the algorithm, as well as test and debug it.
Researched existing algorithms and identified their limitations
Designed a new algorithm that addressed the limitations and improved network performance
Implemented the algorithm in code and tested it in a simulated network environment
Debugged issues an...
posted on 3 Jan 2025
I applied via Referral and was interviewed in Dec 2024. There was 1 interview round.
ACID properties are a set of properties that guarantee reliable and consistent transactions in a database system.
Atomicity ensures that either all operations in a transaction are completed successfully or none at all.
Consistency ensures that the database remains in a valid state before and after the transaction.
Isolation ensures that the concurrent execution of transactions results in a system state that would be obtai...
Idempotent HTTP requests are requests that can be repeated multiple times without changing the result beyond the initial request.
Idempotent requests have the same outcome no matter how many times they are executed.
GET, PUT, and DELETE HTTP methods are typically idempotent.
POST requests are not idempotent as they can create new resources with each execution.
posted on 20 Nov 2024
I applied via Naukri.com and was interviewed in Oct 2024. There were 3 interview rounds.
Expanding the market can be achieved through market research, identifying new target demographics, developing new products or services, and implementing effective marketing strategies.
Conduct market research to identify potential new markets or untapped segments within the current market.
Analyze competitors to understand their strategies and identify opportunities for differentiation.
Develop new products or services th...
based on 6 reviews
Rating in categories
Software Engineer
7
salaries
| ₹8.5 L/yr - ₹14 L/yr |
Senior Software Engineer
5
salaries
| ₹17 L/yr - ₹26.5 L/yr |
Software Developer
3
salaries
| ₹1.5 L/yr - ₹11 L/yr |
VMware Software
Citrix
NetApp
Juniper Networks