Filter interviews by
Be the first one to contribute and help others!
I applied via Company Website and was interviewed in Nov 2024. There were 4 interview rounds.
Directions: Each of the following question has a question and two statements labelled as (i) and (ii). Use the data/information given in (i) and (ii) to decide whether the data are sufficient to answer the question record your answer as
A) If you can get the answer from (1)alone but not from (2)
B) If you can get the answer from (2)alone but not from (1)
C) If can get the answer from (1)and (2)together ,although neither statement by itself suffice
D) If statement (1)alone suffices and statement (2) alone also suffice.
E) If can\'t get the answer from statements (1) and (2) together and you need more data.
Copyright protection is given for a work having originality,i.e. it should be from the author and must have minimum degree of creativity. So it is the author who is the real creator of the work thereby first owner of the copyright and Indian law recognizes author as the firstowner of the copyright .But by the term ‘ownership it means it includes not only theauthor ,but also assignee and can even a legal entity even though not defined in the !ct. InBern convention the term !uthor is not defined, instead it says that the person under whose name the work is disclosed, which implies that it is not necessary that always theauthor should be the owner. "owever Indian copyright !ct defines the tern ‘!uthor withrespect to various works, but still leaves some problems. It becomes more comple# in theconte#t of changing technologies, i.e. cinematographic works, sound recording, broadcasting etc which is a combination of different works, also when author does thework in the course of employment. $hen new technologies emerge, different mode of communication simultaneously arise and the e#ploitation of the copyright by wayof assignment %licensing will add economic benefits to the copyright owner and the provisions of assignment and licensing becomes crucial. By amendments Indian Copyright!ct has taken care of such provisions, but still leaving lacunae % the role of &udiciary becomes crucial in interpreting such provisions for effectively protecting the rights of the authors.
What are the constraints and give example that's include all constraints? 2. Basic SQL queries were asked but I don't remember 3. Then asked questions from my college projects
Public, private, and protected are access modifiers used in object-oriented programming to control the visibility of class members.
Public: allows access to the member from outside the class
Private: restricts access to the member only within the class
Protected: allows access to the member within the class and its subclasses
SQL joins are used to combine rows from two or more tables based on a related column between them.
INNER JOIN: Returns rows when there is at least one match in both tables.
LEFT JOIN: Returns all rows from the left table, and the matched rows from the right table.
RIGHT JOIN: Returns all rows from the right table, and the matched rows from the left table.
FULL JOIN: Returns rows when there is a match in one of the tables.
C...
posted on 2 Jan 2025
I applied via Approached by Company and was interviewed in Dec 2024. There were 3 interview rounds.
I applied via Company Website and was interviewed in Oct 2024. There were 3 interview rounds.
It was a coding round interview along with interviewer via Virtual mode. I was given 2 coding questions on HackerRank for the interview:
1. one was an easy problem on counting minimum replacements.
2. "pat is an ordinary kid who works hard to be a great runner...." this was a challenging problem (which I managed to solve).
3. I was asked some basic Python questions, as the role was for a Python Developer.
I would use a relational database like MySQL for the Parking lot as it provides structured data storage and supports complex queries.
Relational databases like MySQL offer structured data storage for parking lot information
Supports complex queries for managing parking lot data efficiently
Ability to handle large amounts of data and transactions
Provides data integrity and security features
Can easily integrate with other s
posted on 17 Dec 2024
I applied via Naukri.com and was interviewed in Nov 2024. There were 4 interview rounds.
I applied via Company Website and was interviewed in Oct 2024. There were 4 interview rounds.
Basic Python, SQL, and Bash questions
Data pipeline design involves creating a system to efficiently collect, process, and analyze data.
Understand the data sources and requirements before designing the pipeline.
Use tools like Apache Kafka, Apache NiFi, or AWS Glue for data ingestion and processing.
Implement data validation and error handling mechanisms to ensure data quality.
Consider scalability and performance optimization while designing the pipeline.
Doc...
I applied via LinkedIn and was interviewed in Nov 2024. There were 2 interview rounds.
Mainly data leakage related problems
Best practices for handling memory leaks in iOS development
Use Instruments to identify memory leaks
Avoid strong reference cycles with weak or unowned references
Use autorelease pools for temporary objects
Implement proper memory management with ARC (Automatic Reference Counting)
I applied via Company Website and was interviewed in Sep 2024. There were 2 interview rounds.
Testing Pyramid is a testing strategy that suggests the right balance of different types of automated tests.
The Testing Pyramid consists of three layers: Unit Tests, Service Tests, and UI Tests.
Unit Tests are at the bottom of the pyramid and focus on testing individual components or functions in isolation.
Service Tests are in the middle layer and focus on testing the interactions between different components or service...
Developers perform unit testing to ensure individual units of code are working correctly.
Developers are responsible for writing unit tests for their own code.
Unit testing is typically done using testing frameworks like JUnit, NUnit, or pytest.
Unit tests focus on testing small, isolated parts of the codebase, such as functions or methods.
Unit testing helps identify bugs early in the development process.
Automated unit te...
Automation code for handling multiple windows
Use getWindowHandles() method to get handles of all open windows
Switch between windows using switchTo().window() method
Perform actions on each window as needed
Convert string to array and extract vowels into a new array
Iterate through each character in the string
Check if the character is a vowel (a, e, i, o, u)
Add the vowel to a new array of strings
posted on 28 Nov 2024
HashMap is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
To retrieve a value, the key is hash...
Find anagrams from a string array
Iterate through each string in the array
Sort the characters of each string to create a key for comparison
Use a hashmap to group anagrams together
Return the grouped anagrams as arrays
A top view of a binary tree shows the nodes visible when looking at the tree from the top.
The top view of a binary tree is the set of nodes visible when looking at the tree from the top.
Nodes at the same horizontal distance from the root are considered at the same level.
Use a map to store the horizontal distance of each node and only keep the first node encountered at each horizontal distance.
Height of a binary tree is the maximum number of edges on the longest path from the root node to a leaf node.
Height of an empty tree is -1
Height of a tree with only one node is 0
Height of a binary tree can be calculated recursively by finding the height of left and right subtrees and adding 1 to the maximum of the two heights
Solid Principles are a set of five design principles for writing clean, maintainable, and scalable code.
Single Responsibility Principle (SRP) - A class should have only one reason to change.
Open/Closed Principle (OCP) - Software entities should be open for extension but closed for modification.
Liskov Substitution Principle (LSP) - Objects of a superclass should be replaceable with objects of its subclasses without affe...
Design patterns are reusable solutions to common problems encountered in software design and development.
Design patterns provide a way to communicate solutions to common design problems
They help in making code more maintainable, scalable, and reusable
Examples include Singleton, Factory, Observer, and Strategy patterns
Our current project architecture follows a microservices design pattern with Docker containers and Kubernetes for orchestration.
Microservices architecture
Docker containers
Kubernetes for orchestration
I am interested in NCR because of its reputation for innovation and cutting-edge technology in the software industry.
NCR has a strong reputation for innovation and cutting-edge technology
I am excited about the opportunity to work on challenging projects at NCR
I believe NCR offers a great platform for career growth and development
based on 2 reviews
Rating in categories
Assistant Manager Design & Development
3
salaries
| ₹7.2 L/yr - ₹14.4 L/yr |
KPIT Technologies
Intellect Design Arena
Oracle Cerner
Oracle Financial Services Software