i
Persistent Systems
Filter interviews by
I was interviewed in Jan 2016.
Machine learning is a subset of artificial intelligence that enables machines to learn from data without being explicitly programmed.
It involves training algorithms on large datasets to make predictions or decisions.
It can be supervised, unsupervised, or semi-supervised.
Examples include image recognition, natural language processing, and recommendation systems.
Prediction uses data analysis and statistical models to forecast future outcomes.
Prediction involves collecting and analyzing data to identify patterns and trends.
Statistical models are then used to make predictions based on the identified patterns.
Predictions can be made for a wide range of applications, such as weather forecasting, stock market trends, and customer behavior.
Accuracy of predictions can be improved by ...
Classification algorithms can be represented using flow charts.
Classification algorithms are used to categorize data into different classes.
Flow charts can be used to represent the decision-making process of classification algorithms.
Examples of classification algorithms include decision trees, k-nearest neighbors, and support vector machines.
Deadlocks are situations where two or more processes are unable to proceed because each is waiting for the other to release a resource.
Deadlocks occur when multiple processes are stuck in a circular waiting state.
Prevention techniques include resource allocation strategies, deadlock detection, and avoidance algorithms.
Examples of prevention techniques are using a resource allocation graph, implementing a banker's algor...
Banker's algorithm is a resource allocation and deadlock avoidance algorithm used in operating systems.
It is used to prevent deadlocks by ensuring that the system never enters an unsafe state.
It works by simulating the allocation of resources and checking if the system will remain in a safe state.
It requires knowledge of the maximum resource needs of each process and the currently available resources.
If a request for r...
Public and private IP addresses are used in computer networks. Public IPs are globally unique and accessible from the internet, while private IPs are used within a local network.
Public IP is assigned by the Internet Service Provider (ISP) and is used to identify a device on the internet.
Private IP is assigned by a local network administrator and is used to identify a device within a local network.
Public IPs are globall...
A message is transferred in OSI layer through a process called encapsulation and decapsulation.
The message is divided into smaller chunks called packets at the transport layer.
Each packet is then encapsulated with headers containing necessary information.
The encapsulated packets are then passed down to the network layer.
At the network layer, the packets are further encapsulated with network layer headers.
The encapsulat...
Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as the same type.
Polymorphism is achieved through method overriding and method overloading.
It allows for code reusability and flexibility in object-oriented programming.
Three conditions for polymorphism are inheritance, method overriding, and a common interface or base class.
Interoperability in inheritance and polymorphism allows objects of different classes to be used interchangeably.
Inheritance allows a subclass to inherit properties and methods from a superclass.
Polymorphism allows objects of different classes to be treated as if they are of the same class.
Interoperability between inheritance and polymorphism allows objects of different classes to be used interchangeably.
For example, a ...
Transaction logs are records of all the changes made to a database or file system.
They help in recovering data in case of system failure or errors.
They provide a history of all the transactions made to the database or file system.
They are used for auditing and compliance purposes.
Examples include SQL Server transaction logs, file system transaction logs, etc.
C is a procedural programming language while C++ is an object-oriented programming language.
C is a procedural programming language, meaning it focuses on procedures or functions.
C++ is an extension of C and adds object-oriented features like classes and inheritance.
C++ supports polymorphism, encapsulation, and abstraction, which C lacks.
C++ allows the use of standard template library (STL) for data structures and algor...
I have worked on various technologies including Java, Python, and SQL.
Java - used for developing enterprise-level applications
Python - used for scripting, web development, and data analysis
SQL - used for managing and querying databases
Thrashing is a phenomenon in computer systems where excessive swapping of data between RAM and virtual memory occurs.
Occurs when a computer spends more time swapping data between RAM and virtual memory than executing actual tasks
Can be caused by insufficient RAM or poorly optimized programs
Can lead to a significant decrease in system performance
Example: A computer running multiple memory-intensive programs simultaneous
Java is platform independent while C++ is not.
Java code is compiled into bytecode which can run on any platform with a JVM, while C++ code needs to be compiled separately for each platform.
Java has automatic memory management through garbage collection, while C++ requires manual memory management.
Java has built-in support for multithreading, while C++ requires external libraries.
Java has a simpler syntax and is easier ...
I found the GD to be well-organized and productive.
The GD had a clear agenda and all participants were given equal opportunity to express their views.
The facilitator ensured that the discussion stayed on track and encouraged active participation.
I appreciated the diverse perspectives brought by the participants, which enriched the discussion.
Examples: One of the participants shared a real-life case study that added dep...
I would recommend John and Sarah for their strong technical skills and ability to work well in a team.
John has a deep understanding of algorithms and data structures, and consistently delivers high-quality code.
Sarah is a quick learner and has a knack for problem-solving, often coming up with innovative solutions.
Both John and Sarah have excellent communication skills and collaborate effectively with their peers.
Basic MCQs on General aptitude, logical reasoning and programming questions
A constructor in C++ is a special member function that is automatically called when an object is created.
Constructors have the same name as the class and do not have a return type.
They can be used to initialize the object's data members.
Default constructors are automatically generated if no constructor is defined.
Parameterized constructors can be defined to accept arguments during object creation.
Copy assignment operator is a special member function in C++ that allows one object to be assigned the values of another object of the same class.
Copy assignment operator is denoted by the = operator.
It is used to copy the values of one object into another object of the same class.
It is automatically generated by the compiler if not explicitly defined.
Example: MyClass obj1; MyClass obj2; obj2 = obj1; // Copy assignment
Virtualization in C++ is the process of creating a virtual version of a class or function to allow for polymorphism and dynamic binding.
Virtualization in C++ is achieved through the use of virtual functions and inheritance.
Virtual functions are declared in a base class and overridden in derived classes to provide different implementations.
Virtualization allows for polymorphism, where a pointer to a base class can point...
Implement a custom String class in a programming language.
Define a class with necessary properties and methods to manipulate strings.
Include methods for concatenation, substring, length, etc.
Handle memory allocation and deallocation properly.
Example: class MyString { // implementation }
Smart pointers are objects that act like pointers but provide automatic memory management.
Smart pointers help prevent memory leaks by automatically deallocating memory when no longer needed.
Examples include unique_ptr, shared_ptr, and weak_ptr in C++.
They provide better memory safety compared to raw pointers.
I applied via campus placement at Visveswaraiah Technological University (VTU) and was interviewed in Sep 2024. There were 3 interview rounds.
Aptitude, Technical MCQs
I am a software engineer with 5 years of experience in developing web applications using Java, Spring, and Angular.
5 years of experience in software development
Proficient in Java, Spring, and Angular
Strong problem-solving skills
Experience in developing web applications
I am interested in working with artificial intelligence and machine learning technologies.
Artificial Intelligence
Machine Learning
Natural Language Processing
Computer Vision
I applied via Campus Placement
Aptitude exam and coding test
Java has various datatypes like int, double, boolean, etc. to store different types of values.
Primitive datatypes include int, double, boolean, char, etc.
Reference datatypes include classes, interfaces, arrays, etc.
Examples: int num = 10; double price = 19.99; boolean isTrue = true;
A star program prints a pattern of stars in a specific shape.
Use nested loops to control the number of rows and columns
Use if-else statements to determine when to print a star or a space
Example: Print a pyramid of stars with 5 rows
Persistent Systems interview questions for designations
Aptitude and two questions were there
Get interview-ready with Top Persistent Systems Interview Questions
You need to be very sharp. The question can be based on any DSA topic.
I applied via Campus Placement and was interviewed in Mar 2024. There were 4 interview rounds.
It was Aptitude+Coding test for the fundamentals of Computers related topics such as CN,OS,SDLC,OOPS,DBMS,etc
Aptitude test normal questions
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
To retrieve a value, the key is hashed a...
What people are saying about Persistent Systems
Some of the top questions asked at the Persistent Systems Software Engineer interview -
The duration of Persistent Systems Software Engineer interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 108 interviews
5 Interview rounds
based on 585 reviews
Rating in categories
Software Engineer
4.4k
salaries
| ₹2.5 L/yr - ₹9.5 L/yr |
Senior Software Engineer
3.9k
salaries
| ₹5 L/yr - ₹13 L/yr |
Lead Engineer
3.1k
salaries
| ₹9.9 L/yr - ₹30 L/yr |
Lead Software Engineer
3k
salaries
| ₹7.1 L/yr - ₹18.4 L/yr |
Project Lead
1.9k
salaries
| ₹13.2 L/yr - ₹38.8 L/yr |
Cognizant
TCS
IBM
Wipro