Optum Global Solutions
20+ ITD Cementation India Interview Questions and Answers
Q1. Delete a Node from a Linked List
You are provided with a linked list of integers. Your task is to implement a function that deletes a node located at a specified position 'POS'.
Input:
The first line contains a...read more
Implement a function to delete a node from a linked list at a specified position.
Traverse the linked list to find the node at the specified position.
Update the pointers of the previous and next nodes to skip the node to be deleted.
Handle edge cases such as deleting the head or tail of the linked list.
Ensure to free the memory of the deleted node to avoid memory leaks.
Q2. Array Intersection Problem Statement
Given two integer arrays/ lists ARR1
and ARR2
of sizes N
and M
respectively, you are required to determine their intersection. An intersection is defined as the set of commo...read more
Find the intersection of two integer arrays/lists in the order they appear in the first array/list.
Iterate through the elements of the first array/list and check if they exist in the second array/list.
Use a hash set to store elements of the first array/list for efficient lookups.
Print the common elements in the order they appear in the first array/list.
Q3. Author and Books Formatting
Given a structured list of books and their authors, format the information as specified.
Input:
The first line of input contains an integer ‘T' representing the number of test cases....read more
The task is to format a list of authors and their books in a specific way as per the given input format.
Parse the input to extract the number of test cases, number of authors, author names, and their respective books.
Format the output by printing the author names and their books in the specified format.
Ensure correct sequence and labeling of authors and books as per the example provided.
Handle multiple test cases and authors with varying numbers of books.
Focus on the structur...read more
Q4. Longest Palindromic Substring Problem Statement
You are provided with a string STR
of length N. The task is to find the longest palindromic substring within STR
. If there are several palindromic substrings of t...read more
Find the longest palindromic substring in a given string.
Iterate through the string and expand around each character to find palindromes
Keep track of the longest palindrome found so far
Return the longest palindromic substring
Q5. Maximum XOR Problem Statement
You are given an integer X
. Your goal is to find an integer Y
such that the bitwise XOR of X
and Y
yields the maximum possible value. The integer Y
must not exceed 2305843009213693...read more
Find an integer Y such that XOR of X and Y yields maximum value within given constraints.
Iterate through each test case and find the maximum possible Y by flipping all bits of X except the most significant bit.
The maximum value of Y is 2^61 - 1, which is 2305843009213693951.
Ensure that the obtained Y does not exceed the given constraints.
Q6. Minimum Days to Complete Work
You have 'N' tasks to complete. Each task can only be done on one of two specific days provided in two arrays: day1
and day2
.
For each task i, day1[i]
represents the earliest day t...read more
Find the minimum number of days required to complete all tasks given specific completion days for each task.
Sort the tasks based on day1 in ascending order.
For each task, choose the minimum of day1 and day2 as the completion day.
Keep track of the maximum completion day for each task.
The final answer is the maximum completion day of all tasks.
Q7. Graph Coloring Problem
You are given a graph with 'N' vertices numbered from '1' to 'N' and 'M' edges. Your task is to color this graph using two colors, such as blue and red, in a way that no two adjacent vert...read more
Given a graph with 'N' vertices and 'M' edges, determine if it can be colored using two colors without adjacent vertices sharing the same color.
Use graph coloring algorithm like BFS or DFS to check if the graph can be colored with two colors without conflicts.
Check if any adjacent vertices have the same color. If so, it is not possible to color the graph as described.
If the graph has connected components, color each component separately to determine if the entire graph can be...read more
Q8. Kth Largest Element Problem
Given an array containing N
distinct positive integers and a number K
, determine the Kth largest element in the array.
Example:
Input:
N = 6, K = 3, array = [2, 1, 5, 6, 3, 8]
Output...read more
Find the Kth largest element in an array of distinct positive integers.
Sort the array in non-increasing order to easily find the Kth largest element.
Ensure all elements in the array are distinct for accurate results.
Handle multiple test cases efficiently by iterating through each case.
Q9. Bubble Sort Problem Statement
Sort the given unsorted array consisting of N non-negative integers in non-decreasing order using the Bubble Sort algorithm.
Input:
The first line contains an integer 'T' represent...read more
Bubble Sort algorithm is used to sort an array of non-negative integers in non-decreasing order.
Implement the Bubble Sort algorithm to sort the array in place.
Compare adjacent elements and swap them if they are in the wrong order.
Repeat this process until the array is sorted.
Time complexity of Bubble Sort is O(n^2) in the worst case.
Example: For input [6, 2, 8, 4, 10], the output should be [2, 4, 6, 8, 10].
Measure 9 minutes using a 4-minute hourglass and a 7-minute hourglass
Start both hourglasses at the same time
When the 4-minute hourglass runs out, flip it immediately
When the 7-minute hourglass runs out, flip it immediately
When the 4-minute hourglass runs out for the second time, 9 minutes have passed
Use SQL query with ORDER BY and LIMIT to find the 5th highest salary.
Use ORDER BY clause to sort salaries in descending order
Use LIMIT 4,1 to skip the first 4 salaries and get the 5th highest salary
Q12. What is the difference between obj open and obj open by handle
obj open vs obj open by handle
obj open opens a file and returns a file object
obj open by handle opens a file using a file descriptor
obj open by handle is faster than obj open
obj open by handle is used when you already have a file descriptor
Q13. How to change the work object status of the multiple cases from pending to closed.
To change work object status of multiple cases from pending to closed.
Identify the cases that need to be closed
Update the status of each case to closed
Save the changes made to the cases
Use a loop to perform the above steps for multiple cases
Example: Use a query to identify all cases with pending status and update their status to closed
Q14. Difference between append to and append to map to
Append to adds an element to a list while append to map adds a key-value pair to a map.
Append to is used for lists while append to map is used for maps.
Append to adds an element to the end of the list while append to map adds a key-value pair to the map.
Append to map can also update the value of an existing key in the map.
Q15. Queue processor and job schedule difference
Queue processor manages tasks in a queue while job scheduler schedules tasks based on time or event triggers.
Queue processor manages tasks in a queue and processes them in a first-in, first-out (FIFO) order.
Job scheduler schedules tasks based on time or event triggers, and can prioritize tasks based on their importance.
Queue processor is typically used for real-time processing of tasks, while job scheduler is used for batch processing.
Examples of queue processors include Rabb...read more
Q16. Why blocked rules are carry forward
Blocked rules are carry forward to ensure consistency and prevent errors in future processing.
Blocked rules are rules that have been prevented from executing due to certain conditions not being met.
These rules are carried forward to ensure that they are not missed in future processing.
This helps to maintain consistency and prevent errors in the system.
For example, if a rule is blocked due to a missing data field, it will be carried forward until the missing field is filled in...read more
Q17. Use of superclass data transform check box
Superclass data transform checkbox is used to inherit data transform rules from a parent class.
When checked, the subclass will inherit the data transform rules from the superclass
This can save time and effort in creating duplicate data transform rules
Example: A superclass has a data transform rule to convert a date format, when the checkbox is checked in a subclass, it will also use the same rule
This checkbox is available in Pega platform for software development
Q18. What is the use of previliges
Privileges are permissions granted to users or processes to perform specific actions or access certain resources.
Privileges are used to control access to sensitive data or critical system resources.
They can be assigned to individual users or groups.
Examples include read, write, execute, and delete permissions.
Privileges can also be used to restrict access to certain functions or features within an application.
Without proper privileges, users may not be able to perform necessa...read more
Q19. What are closer in js
Closures in JavaScript are functions that have access to variables from their outer scope even after the outer function has finished executing.
Closures allow for maintaining state in an asynchronous environment.
They are created whenever a function is defined within another function.
Closures can be used to create private variables and functions in JavaScript.
Q20. Write a code on debouncing
Debouncing is a technique used to limit the rate at which a function is called.
Use a timer to delay the execution of a function until a certain amount of time has passed without the function being called again.
Reset the timer each time the function is called to prevent it from being executed multiple times in quick succession.
Debouncing is commonly used in scenarios like handling button clicks to prevent multiple rapid clicks from triggering the function multiple times.
Interview Process at ITD Cementation India
Top Software Developer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month