Filter interviews by
I am a highly motivated and experienced professional with a strong background in project management and team leadership.
Over 10 years of experience in managing complex projects and leading cross-functional teams
Proven track record of delivering projects on time and within budget
Expertise in strategic planning, risk management, and stakeholder communication
Strong problem-solving and decision-making skills
Excellent commu...
Program to reverse a string
Use a loop to iterate through the characters of the string
Create a new string and append each character in reverse order
Return the reversed string
Program to reverse the bits of a number
Convert the number to binary representation
Reverse the binary representation
Convert the reversed binary back to decimal
Program to check common sequence in two strings
Iterate through each character of the first string
Check if the current character is present in the second string
If yes, add it to the common sequence array
Return the common sequence array
This program finds and prints the bits that are set in a given number.
Use bitwise AND operator (&) to check if a bit is set.
Iterate through each bit of the number and print the position of the set bits.
A switch in a network is a device that connects multiple devices together and forwards data packets between them.
A switch operates at the data link layer of the OSI model.
It uses MAC addresses to determine the destination of data packets.
Switches improve network performance by reducing collisions and providing dedicated bandwidth to each connected device.
Switches can be implemented using software-defined networking (SD...
NAT stands for Network Address Translation. It is a process of translating IP addresses between different networks.
NAT allows multiple devices in a private network to share a single public IP address.
It provides security by hiding the internal IP addresses from external networks.
NAT enables the conservation of public IP addresses by allowing multiple devices to use a single IP.
It facilitates the routing of traffic betw...
VLAN stands for Virtual Local Area Network. It is a technology that allows the creation of multiple virtual networks within a single physical network.
VLANs provide segmentation and isolation of network traffic.
They improve network performance and security.
VLANs can be used to group devices based on department, function, or security requirements.
They enable easier network management and troubleshooting.
VLANs are commonl...
Client and server establish communication through sockets. Creating a socket involves several steps.
Client and server each create a socket object.
Server socket binds to a specific port number on the server machine.
Server socket listens for incoming client connections.
Client socket connects to the server socket using the server's IP address and port number.
Once the connection is established, client and server can exchan
A socket buffer is a data structure used by the operating system to store data being sent or received over a network socket.
Socket buffers are typically implemented as circular buffers.
They are used to temporarily hold data until it can be processed by the application.
Socket buffers have a fixed size and can be filled or emptied by the operating system or the application.
They help in managing the flow of data between t...
A bridge is a structure that connects two separate areas, allowing for the passage of people, vehicles, or other forms of transportation.
Bridges provide a means of crossing obstacles such as rivers, valleys, or roads.
They facilitate the movement of people, vehicles, and goods from one place to another.
Bridges can be made of various materials such as concrete, steel, or wood.
They can be designed in different styles and ...
IPC is a mechanism for communication between processes, while ITC is for communication between threads within a process.
IPC allows processes to exchange data and synchronize their actions.
ITC allows threads to share data and coordinate their activities.
IPC can be implemented using various techniques such as pipes, sockets, shared memory, and message queues.
ITC can be achieved through shared variables, message passing, ...
I come from a diverse family background and have achieved success in my career through hard work and dedication.
I come from a family with a mix of different cultures and traditions.
I have excelled in my career by consistently delivering results and taking on new challenges.
I have received several awards and recognition for my contributions to my field.
My family has always been supportive of my ambitions and encouraged
Linking is the process of connecting different web pages or resources together through hyperlinks.
Linking is an essential aspect of the World Wide Web.
It allows users to navigate between different web pages by clicking on hyperlinks.
Hyperlinks can be text, images, or other elements that when clicked, direct the user to another web page or resource.
Linking helps in organizing and structuring information on the web.
It en...
Little endian and big endian are byte ordering formats. Little endian stores the least significant byte first, while big endian stores the most significant byte first.
Little endian and big endian refer to the order in which bytes are stored in memory.
In little endian, the least significant byte is stored first, followed by the more significant bytes.
In big endian, the most significant byte is stored first, followed by ...
Different types of memory segments include code segment, data segment, stack segment, and heap segment.
Code segment stores the executable code of the program.
Data segment stores global and static variables.
Stack segment stores local variables and function call information.
Heap segment stores dynamically allocated memory.
Example: In C programming, global variables are stored in the data segment.
Zombie, daemon, and orphan processes are different types of processes in operating systems.
Zombie processes are dead processes that have completed execution but still have an entry in the process table.
Daemon processes are background processes that run continuously and perform specific tasks.
Orphan processes are child processes that continue to run even after their parent process has terminated.
Zombie processes consume...
To create parent and child processes, use fork() system call. To create threads, use pthread_create() function.
To create a child process, use fork() system call. The child process is an exact copy of the parent process.
To create threads, use pthread_create() function from pthread library.
Parent and child processes can communicate using inter-process communication mechanisms like pipes or shared memory.
Threads share the...
The common segments used by parent and child processes are code segment, data segment, and stack segment.
Code segment: Contains the executable code of the program.
Data segment: Stores global and static variables.
Stack segment: Used for local variables and function calls.
The common segments used by threads are code segment, data segment, and stack segment.
Code segment: Contains the executable code of the program.
Data segment: Stores global and static variables.
Stack segment: Used for local variables and function call information.
A symbol table is a data structure used by compilers and interpreters to store information about the variables, functions, and other symbols in a program.
It maps each symbol to its attributes, such as its data type, memory location, and scope.
Symbol tables are used during the compilation or interpretation process to resolve references to symbols and perform semantic analysis.
They enable efficient lookup and retrieval o...
gcc is a command-line compiler used to compile programs written in C or C++.
To compile a program using gcc, use the command 'gcc
The '-o' option is used to specify the name of the output file.
By default, gcc compiles C programs. To compile C++ programs, use the '-x' option followed by 'c++'.
To enable warnings during compilation, use the '-Wall' option.
To optimize the compiled code, use the '-O' opt...
I was interviewed in Dec 2020.
Round duration - 60 minutes
Round difficulty - Medium
Round duration - 40 minutes
Round difficulty - Medium
Given a Binary Search Tree of integers, transform it into a Greater Sum Tree where each node's value is replaced with the sum of all node values gr...
Convert a Binary Search Tree to a Greater Sum Tree by replacing each node's value with the sum of all node values greater than the current node's value.
Traverse the BST in reverse inorder (right, root, left) to visit nodes in descending order.
Keep track of the running sum of visited nodes and update each node's value with this sum.
Modify the BST in place without creating a new tree.
Example: Input BST: 4 1 6 0 2 5 7 -1 ...
You are given the head node of a singly linked list. Your task is to return a pointer pointing to the middle of the linked list.
If there is an odd number of elements, return the ...
Return the middle element of a singly linked list, or the one farther from the head if there are even elements.
Traverse the linked list with two pointers, one moving twice as fast as the other
When the fast pointer reaches the end, the slow pointer will be at the middle
If there are even elements, return the one that is farther from the head node
Handle edge cases like linked list of size 1 or empty list
Round duration - 40 minutes
Round difficulty - Medium
Tip 1 : Do at least some project work.
Tip 2 : Practice at least 250 questions.
Tip 1 : Put some projects on resume.
Tip 2 : Do not put false things on resume.
I applied via Campus Placement and was interviewed before Jun 2020. There was 1 interview round.
I am a highly motivated and experienced professional with a strong background in project management and team leadership.
Over 10 years of experience in managing complex projects and leading cross-functional teams
Proven track record of delivering projects on time and within budget
Expertise in strategic planning, risk management, and stakeholder communication
Strong problem-solving and decision-making skills
Excellent commu...
Client and server establish communication through sockets. Creating a socket involves several steps.
Client and server create sockets using the socket() system call.
They bind the socket to a specific address and port using the bind() system call.
The server listens for incoming connections using the listen() system call.
The client connects to the server using the connect() system call.
Once the connection is established, ...
Memory segments include code, data, stack, and heap. Each segment stores different parts of a program in memory.
Code segment: stores the executable code of the program
Data segment: stores global and static variables
Stack segment: stores local variables and function call information
Heap segment: stores dynamically allocated memory
The common segments used by threads are code segment, data segment, and stack segment.
Code segment: Contains the executable code of the program.
Data segment: Stores global and static variables.
Stack segment: Used for local variables and function call information.
gcc is a command-line compiler used to compile programs written in C or C++.
To compile a program using gcc, use the command 'gcc
The '-o' option is used to specify the name of the output file.
By default, gcc compiles C programs. To compile C++ programs, use the '-x' option with 'c++' argument.
To enable warnings during compilation, use the '-Wall' option.
To optimize the compiled code, use the '-O' o...
One Convergence interview questions for popular designations
I was interviewed before Mar 2021.
Round duration - 60 minutes
Round difficulty - Medium
After written test , only 4 from Mca and 4 from Mtech were selected for next round.
It was also pure technical round. Interview started just after result was declared. Since there was only two panels, It was taking time.
Given an array of integers ARR
of size N, consisting of 0s and 1s, you need to select a sub-array and flip its bits. Your task is to return the maximum count of 1s that can b...
Given an array of 0s and 1s, find the maximum count of 1s by flipping a sub-array at most once.
Iterate through the array and keep track of the maximum count of 1s obtained by flipping a sub-array.
Consider flipping a sub-array from index i to j and calculate the count of 1s in the resulting array.
Return the maximum count of 1s obtained by flipping a sub-array at most once.
Given a positive integer N
, compute the total number of '1's in the binary representation of all numbers from 1 to N. Return this count modulo 1e9+7 because the result can...
Count the total number of set bits in the binary representation of numbers from 1 to N modulo 1e9+7.
Iterate through numbers from 1 to N and count the set bits in their binary representation
Use bitwise operations to count the set bits efficiently
Return the count modulo 1e9+7 for each test case
NAT stands for Network Address Translation. It is used to translate private IP addresses to public IP addresses.
NAT allows multiple devices on a local network to share a single public IP address.
It enhances security by hiding internal IP addresses from external networks.
Types of NAT include Static NAT, Dynamic NAT, and Port Address Translation (PAT).
A VLAN (Virtual Local Area Network) is a network of computers that behave as if they are connected to the same physical network, even though they may be located on different segments.
VLANs are used to segment network traffic and improve network performance and security.
They allow for logical grouping of devices regardless of their physical location.
VLANs can be configured to separate different departments within an org...
A socket buffer is a temporary storage area in memory used for sending and receiving data over a network.
Socket buffers are used by the operating system to temporarily store data being sent or received over a network connection.
They help in managing the flow of data between the application and the network interface.
Socket buffers can be adjusted in size to optimize network performance.
Examples include TCP send and rece
A bridge in networking is a device that connects two or more network segments, allowing them to communicate with each other.
Bridges operate at the data link layer of the OSI model.
They use MAC addresses to forward data between network segments.
Bridges help reduce network congestion by only forwarding data to the segment where the destination device is located.
Example: Connecting a wired LAN to a wireless LAN using a br
Round duration - 60 minutes
Round difficulty - Medium
Technical interview round with questions based on DSA/OS etc.
You are given a string STR
which contains alphabets, numbers, and special characters. Your task is to reverse the string.
STR = "abcde"
"e...
Reverse a given string containing alphabets, numbers, and special characters.
Iterate through the string from the end to the beginning and append each character to a new string.
Use built-in functions like reverse() or StringBuilder in languages like Python or Java for efficient reversal.
Handle special characters and numbers while reversing the string.
Ensure to consider the constraints provided in the problem statement.
T...
Given two strings STR1
and STR2
, determine the length of their longest common subsequence.
A subsequence is a sequence that can be derived from another sequen...
The task is to find the length of the longest common subsequence between two given strings.
Implement a function to find the longest common subsequence between two strings.
Use dynamic programming to solve the problem efficiently.
Iterate through the strings and build a matrix to store the lengths of common subsequences.
Return the length of the longest common subsequence found.
Zombie, Orphan, and Daemon processes are different types of processes in operating systems.
Zombie process is a terminated process that has not been removed from the process table yet.
Orphan process is a child process whose parent process has terminated.
Daemon process is a background process that runs detached from the controlling terminal.
Little endian and big endian are ways of storing multibyte data in memory, with little endian storing the least significant byte first and big endian storing the most significant byte first.
Little endian stores the least significant byte first, while big endian stores the most significant byte first.
For example, the number 0x12345678 would be stored as 78 56 34 12 in little endian and 12 34 56 78 in big endian.
Most mod...
Linking is the process of connecting different parts of a program together to create a single executable file.
Linking combines object files generated by the compiler into a single executable file.
There are two types of linking: static linking and dynamic linking.
Static linking includes all necessary libraries and dependencies in the executable file.
Dynamic linking references external libraries at runtime.
Examples of li...
Memory layout of a C program includes sections like text, data, bss, heap, and stack.
The 'text' section contains the executable code of the program.
The 'data' section contains initialized global and static variables.
The 'bss' section contains uninitialized global and static variables.
The 'heap' is used for dynamic memory allocation.
The 'stack' is used for function call and local variables.
A symbol table is a data structure used by a compiler to store information about the names of variables, functions, and other symbols in a program.
It maps identifiers to information about them, such as their type, scope, and memory location.
Symbol tables are used during compilation to resolve references to symbols and perform semantic analysis.
Examples of symbol tables include the global symbol table in Python and the
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
Top trending discussions
I applied via Company Website and was interviewed before Oct 2023. There were 2 interview rounds.
Hiring assessment of total 75 minutes
I applied via Referral and was interviewed in Apr 2024. There were 2 interview rounds.
The question is about implementing a children sum property in trees and finding the height of a binary tree.
Children sum property in trees means that the value of a node must be equal to the sum of the values of its children nodes.
To find the height of a binary tree, you can recursively calculate the height of the left and right subtrees and return the maximum height plus one.
Example: For a binary tree with nodes 1, 2,
I applied via Campus Placement and was interviewed before Nov 2020. There was 1 interview round.
Some of the top questions asked at the One Convergence interview -
based on 6 reviews
Rating in categories
Software Engineer
7
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
3
salaries
| ₹0 L/yr - ₹0 L/yr |
VMware Software
Citrix
NetApp
Juniper Networks