i
Oracle
Filter interviews by
Mutex and semaphores are synchronization mechanisms used in multi-threaded environments.
Mutex is used to provide mutual exclusion, allowing only one thread to access a shared resource at a time.
Semaphore is used to control access to a shared resource by multiple threads, allowing a specified number of threads to access it simultaneously.
Mutex is binary, meaning it has only two states: locked or unlocked.
Semaphore ...
To find the nth node in a linked list, iterate through the list until reaching the nth node.
Start at the head of the linked list
Iterate through the list, moving to the next node each time
Stop when reaching the nth node
The data structure for efficient implementation of cache level memory is a multi-level cache hierarchy.
Use a multi-level cache hierarchy with different levels of cache (L1, L2, L3, etc.)
Each cache level should have a smaller size and faster access time compared to the previous level
Implement a cache coherence protocol to ensure consistency between different cache levels
Use a replacement policy (e.g., LRU - Least R...
To solve question 1 with O(n) time complexity, iterate through the array once. To solve with O(logn) time complexity, use binary search.
For O(n) time complexity, iterate through the array once and perform the required operations.
For O(logn) time complexity, use binary search to find the desired element or perform the required operations.
O(n) time complexity is generally faster than O(logn) time complexity for smal...
What people are saying about Oracle
Pre-order traversal of a BST iteratively
Create an empty stack and push the root node onto it
While the stack is not empty, pop the top node and print its value
Push the right child onto the stack if it exists
Push the left child onto the stack if it exists
UNIX OS uses a dynamic memory management scheme to allocate and deallocate memory efficiently.
UNIX OS uses virtual memory to provide each process with its own address space.
The memory management scheme includes techniques like paging and segmentation.
Paging divides memory into fixed-size pages and maps them to physical memory.
Segmentation divides memory into logical segments of varying sizes.
UNIX OS uses demand pa...
ACID properties are a set of characteristics that ensure reliability and consistency in database transactions.
ACID stands for Atomicity, Consistency, Isolation, and Durability.
Atomicity ensures that a transaction is treated as a single, indivisible unit of work.
Consistency ensures that a transaction brings the database from one valid state to another.
Isolation ensures that concurrent transactions do not interfere ...
To solve question 1 with O(n) time complexity, iterate through the array once. To solve with O(logn) time complexity, use binary search.
For O(n) time complexity, iterate through the array once and perform the required operations.
For O(logn) time complexity, use binary search to find the desired element or perform the required operations.
O(n) time complexity is generally faster than O(logn) time complexity for smaller i...
UNIX OS uses a dynamic memory management scheme to allocate and deallocate memory efficiently.
UNIX OS uses virtual memory to provide each process with its own address space.
The memory management scheme includes techniques like paging and segmentation.
Paging divides memory into fixed-size pages and maps them to physical memory.
Segmentation divides memory into logical segments of varying sizes.
UNIX OS uses demand paging ...
The data structure for efficient implementation of cache level memory is a multi-level cache hierarchy.
Use a multi-level cache hierarchy with different levels of cache (L1, L2, L3, etc.)
Each cache level should have a smaller size and faster access time compared to the previous level
Implement a cache coherence protocol to ensure consistency between different cache levels
Use a replacement policy (e.g., LRU - Least Recent...
Pre-order traversal of a BST iteratively
Create an empty stack and push the root node onto it
While the stack is not empty, pop the top node and print its value
Push the right child onto the stack if it exists
Push the left child onto the stack if it exists
ACID properties are a set of characteristics that ensure reliability and consistency in database transactions.
ACID stands for Atomicity, Consistency, Isolation, and Durability.
Atomicity ensures that a transaction is treated as a single, indivisible unit of work.
Consistency ensures that a transaction brings the database from one valid state to another.
Isolation ensures that concurrent transactions do not interfere with ...
Mutex and semaphores are synchronization mechanisms used in multi-threaded environments.
Mutex is used to provide mutual exclusion, allowing only one thread to access a shared resource at a time.
Semaphore is used to control access to a shared resource by multiple threads, allowing a specified number of threads to access it simultaneously.
Mutex is binary, meaning it has only two states: locked or unlocked.
Semaphore can h...
To find the nth node in a linked list, iterate through the list until reaching the nth node.
Start at the head of the linked list
Iterate through the list, moving to the next node each time
Stop when reaching the nth node
I am a dedicated and experienced server technician with a passion for technology and problem-solving.
I have been working in the server technology field for over 5 years.
I have extensive knowledge of server hardware and software.
I am skilled in troubleshooting and resolving server-related issues.
I have experience in managing server infrastructure and ensuring optimal performance.
I am constantly staying updated with the ...
I applied via Approached by Company and was interviewed before Jun 2021. There were 2 interview rounds.
Frameworks provide structure and pre-built components for software development, but can also limit flexibility and require learning curve.
Advantage: Provides structure and pre-built components for faster development
Advantage: Can improve code quality and maintainability
Disadvantage: Can limit flexibility and customization
Disadvantage: Requires learning curve and potential dependency issues
Example: ReactJS provides a fr...
Oops stands for Object-Oriented Programming. It is a programming paradigm that uses objects to represent real-world entities.
Advantages: code reusability, modularity, encapsulation, inheritance, polymorphism
Disadvantages: complexity, steep learning curve, performance overhead
Example: creating a class 'Car' with properties like 'make', 'model', and 'year', and methods like 'start_engine' and 'stop_engine'
posted on 8 Jan 2021
What people are saying about Oracle
I applied via Company Website and was interviewed before Oct 2019. There were 4 interview rounds.
I applied via Campus Placement and was interviewed before Nov 2021. There were 3 interview rounds.
Numerical and logical aptitude test
There are 5 rounds on datastructure and algorithm
posted on 16 Sep 2021
I appeared for an interview before Sep 2020.
Round duration - 50 minutes
Round difficulty - Easy
This was a Data Structural round.
Given a two-dimensional array/list consisting of integers 0s and 1s, where 1 represents land and 0 represents water, determine the number of distinct islands. A group of...
Count the number of distinct islands in a 2D array of 0s and 1s.
Identify islands by performing depth-first search (DFS) on the grid
Use a set to store the shape of each island and check for duplicates
Consider translations to determine distinct islands
Round duration - 50 minutes
Round difficulty - Easy
This was a Data Structural round.
You are tasked with arranging 'N' words of varying lengths such that each line contains at most 'M' characters, with each word separated by a space. The challenge is to minimiz...
The goal is to minimize the total cost of arranging 'N' words on each line with a maximum character limit 'M'.
Calculate the cost of each line as the cube of extra space characters needed to reach 'M'.
Minimize the total cost by arranging words to fit within the character limit on each line.
Ensure each word appears fully on one line without breaking across lines.
Round duration - 60 minutes
Round difficulty - Easy
This was a System Design round.
Design a system similar to Red Bus for handling bookings and onboarding vendors and customers.
Implement a user-friendly interface for customers to search and book tickets
Create a vendor portal for vendors to manage their offerings and availability
Include payment gateway integration for secure transactions
Develop a robust backend system for managing bookings, cancellations, and refunds
Utilize a database to store user in...
Round duration - 50 minutes
Round difficulty - Easy
This was a System Design round
Round duration - 50 minutes
Round difficulty - Easy
This was an HR round.
Tip 1 : Practice as much as you can.
Tip 2 : Prepare for company, not in general.
Tip 3 : Your past work should be objective and your contribution should be very clear
Tip 1 : Keep only relevant things for the job you are applying.
Tip 2 : Minimal data with measurable contribution and effect.
posted on 8 Apr 2021
I applied via Naukri.com and was interviewed before Oct 2019. There was 1 interview round.
A generic swap function swaps two values of any data type.
The function should take two parameters of any data type.
Use a temporary variable to store the value of one parameter.
Assign the value of the second parameter to the first parameter.
Assign the value of the temporary variable to the second parameter.
Search for an element in a rotated sorted linked list.
Find the pivot point where the list is rotated.
Divide the list into two sublists based on the pivot point.
Perform binary search on the appropriate sublist.
Handle edge cases such as empty list and list with only one element.
Search an element in a rotated sorted array
Find the pivot point where the array is rotated
Divide the array into two sub-arrays based on pivot point
Perform binary search on the appropriate sub-array
Repeat until element is found or sub-array size is 1
Given a Sudoku board, find possible numbers for an empty cell.
Iterate through empty cells and check possible numbers using row, column, and box constraints.
Use a set to keep track of possible numbers for each empty cell.
Return the set of possible numbers for the given empty cell.
Find integer average of 4 unsigned integers without typecasting
Add all the integers and divide by 4
Use bit shifting to divide by 4
Handle overflow by using long long data type
Use unsigned int data type for input
Code to identify 32 bit or 64 bit architecture of a processor
Check if the operating system is 32 bit or 64 bit
If OS is 32 bit, processor is 32 bit
If OS is 64 bit, check if processor supports 64 bit architecture
Use CPUID instruction to check if processor supports 64 bit architecture
Convert binary number to base 64 integer
Divide the binary number into groups of 6 bits
Convert each group of 6 bits to decimal
Map the decimal value to the corresponding base 64 character
Concatenate the base 64 characters to form the final integer
Senior Software Engineer
2.5k
salaries
| ₹12 L/yr - ₹42 L/yr |
Principal Consultant
2.2k
salaries
| ₹10.9 L/yr - ₹38.5 L/yr |
Senior Consultant
2.2k
salaries
| ₹9.2 L/yr - ₹25 L/yr |
Senior Member of Technical Staff
1.9k
salaries
| ₹13.5 L/yr - ₹47.5 L/yr |
Software Developer
1.5k
salaries
| ₹8.4 L/yr - ₹31.6 L/yr |
SAP
MongoDB
Salesforce
IBM