Filter interviews by
I applied via Approached by Company and was interviewed in Jun 2024. There were 2 interview rounds.
To find the path from the root to any node in a binary tree, perform a depth-first search and keep track of the path taken.
Perform a depth-first search starting from the root node
Keep track of the path taken using a stack or array
When the target node is found, the path will be stored in the stack or array
Reverse a string using recursion
Create a recursive function that takes a string as input
Base case: if the string is empty, return an empty string
Recursive case: return the last character of the string concatenated with the result of calling the function on the substring excluding the last character
Singleton is a design pattern that restricts the instantiation of a class to one object and provides a global point of access to that instance.
Ensure private constructor to prevent instantiation of multiple objects.
Provide a static method to access the single instance.
Use a static variable to hold the single instance.
Implement a private clone method to prevent cloning of the instance.
A CRM tool for HR's and Job Seekers with features like Profile Management, Job Application Tracking, Job Posting and Searching, Scalable Database Design, and Handling large database and latency.
Implement user-friendly interface for profile management with options to update personal information, skills, and experience.
Create a dashboard for job seekers to track their job applications, including status updates and interv...
Handling fault tolerance involves monitoring and logging with Prometheus, Grafana, and ELK, as well as implementing redundancy and failover mechanisms.
Implement health checks to monitor the status of services and applications
Set up alerts and notifications for abnormal behavior or failures
Use Prometheus for metric collection and Grafana for visualization of data
Utilize ELK stack for centralized logging and analysis of ...
Yes, Kubernetes can be used to manage n number of instances by defining the desired number in the deployment configuration.
Define the desired number of instances in the 'replicas' field of the deployment configuration.
For example, setting 'replicas: 3' will ensure that Kubernetes maintains 3 instances of the application running at all times.
Kubernetes will automatically scale the number of instances up or down based on
I applied via AccioJob and was interviewed in Oct 2021. There were 4 interview rounds.
The test is designed to test your logical reasoning skills. The test duration will be 30 minutes, where you will have to attempt 25 questions of difficulty levels varying from medium to hard.
Explaining approach to round 1 questions and suggestions for improvement.
I reviewed the questions and identified areas where I struggled or needed clarification.
I researched and practiced those topics to improve my understanding.
I also sought feedback from others who had experience with similar questions.
To improve, I suggest providing more context or examples in the questions.
It would also be helpful to provide feedba
To reverse N cards, time complexity is O(N).
The time complexity to reverse N cards is O(N).
The algorithm needs to flip each card once, so the time complexity is linear.
The time it takes to reverse all cards is directly proportional to the number of cards.
For example, if there are 10 cards, it will take 10 flips to reverse all of them.
Count subarrays in an array whose sum is divisible by k.
Create a prefix sum array to keep track of the sum of elements up to a certain index.
Use a hash table to store the frequency of remainders when the prefix sum is divided by k.
For each prefix sum, check if there exists a previous prefix sum with the same remainder.
If yes, add the frequency of that remainder to the count of subarrays.
Update the frequency of the curr...
Print all valid IP Addresses from a given input of strings.
Split the input string into 4 parts and check if each part is a valid IP address component
Use regular expressions to validate each component
Use nested loops to generate all possible combinations of valid IP addresses
Email validation can be done using regular expressions in JavaScript.
Use regex to check if email is in correct format
Check for presence of '@' and '.' in email
Ensure that there are no spaces in email
Validate email on both client and server side
Top trending discussions
Implement tree traversal algorithm to visit each node in a tree structure
Use depth-first search (DFS) or breadth-first search (BFS) to traverse the tree
DFS can be implemented using recursion or a stack data structure
BFS can be implemented using a queue data structure
Example: Inorder traversal of a binary tree - left, root, right
Find the path in a matrix with the longest sum of elements
Start from the top-left corner of the matrix
Move only right or down in the matrix
Keep track of the sum of elements in each path
Return the path with the longest sum
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
Developed a mobile app for tracking personal fitness goals
Used React Native to create a cross-platform app
Implemented features such as goal setting, progress tracking, and workout logging
Integrated with wearable devices like Fitbit for automatic data syncing
Ways to speed up SQL queries in increasing order of complexity
Use indexes on columns frequently used in WHERE clauses
Optimize queries by avoiding unnecessary joins and subqueries
Use stored procedures to reduce network traffic and improve performance
Consider denormalizing tables for frequently accessed data
Use query optimization techniques like query caching and query hints
Redis is single-threaded.
Redis is single-threaded, meaning it can only execute one command at a time.
This design choice allows Redis to be extremely fast and efficient for certain use cases.
However, it also means that Redis may not be the best choice for highly concurrent workloads.
Data types that can be used as keys in Python include strings, integers, floats, tuples, and custom objects.
Strings are commonly used as keys in Python dictionaries.
Integers and floats can also be used as keys.
Tuples can be used as keys if they only contain immutable elements.
Custom objects can be used as keys if they are hashable.
Examples: {'name': 'John'}, {1: 'apple'}, {(1, 2): 'tuple'}
Types of indexing in SQL include clustered, non-clustered, unique, and composite indexes.
Clustered index physically reorders the table based on the index key
Non-clustered index creates a separate structure for the index
Unique index ensures that all values in the index column are unique
Composite index uses multiple columns for indexing
posted on 9 Oct 2024
I applied via campus placement at National Institute of Technology (NIT), Raipur and was interviewed in Jul 2024. There were 2 interview rounds.
The coding test consists of multiple-choice questions and one medium-hard level coding question.
The angle between the minute and hour hand of a clock at 3:45 is 157.5 degrees.
Calculate the angle formed by the hour hand from 12 o'clock position to 3:45 position (135 degrees)
Calculate the angle formed by the minute hand from 12 o'clock position to 3:45 position (22.5 degrees)
Subtract the smaller angle from the larger angle to get the angle between the two hands (157.5 degrees)
Indexing in DBMS is a technique used to improve the performance of queries by allowing faster retrieval of data.
Indexes are data structures that store a small portion of the data set in an easily searchable format.
They help in speeding up the data retrieval process by reducing the number of disk accesses needed.
Indexes can be created on one or more columns of a table to improve the performance of SELECT queries.
Example...
The lifecycle of a React component includes mounting, updating, and unmounting phases.
Mounting phase: constructor, render, componentDidMount
Updating phase: shouldComponentUpdate, render, componentDidUpdate
Unmounting phase: componentWillUnmount
To delete an entry in MongoDB database, you can use the deleteOne() or deleteMany() methods.
Use deleteOne() method to delete a single document based on a specific condition
Use deleteMany() method to delete multiple documents based on a specific condition
Make sure to specify the filter criteria to accurately delete the desired entry
posted on 5 Oct 2024
Inheritance is a mechanism in object-oriented programming where a class inherits properties and behaviors from another class.
Allows a class to inherit attributes and methods from another class
Promotes code reusability and reduces redundancy
Creates a parent-child relationship between classes
Derived class can override or extend the functionality of the base class
Types of joins in MySQL include inner join, left join, right join, and full join.
Inner join: Returns rows when there is a match in both tables.
Left join: Returns all rows from the left table and the matched rows from the right table.
Right join: Returns all rows from the right table and the matched rows from the left table.
Full join: Returns rows when there is a match in one of the tables.
Use a centralized API gateway to manage and route requests to multiple APIs efficiently.
Implement a centralized API gateway to handle incoming requests and route them to the appropriate API based on the endpoint.
Utilize API management tools like Apigee, Kong, or AWS API Gateway to manage and monitor multiple APIs.
Consider implementing a caching layer to improve performance and reduce the number of requests to external
strstr function searches for a substring within a string and returns a pointer to the first occurrence of the substring.
Used in C programming language
Syntax: char *strstr(const char *haystack, const char *needle)
Example: char *str = strstr("hello world", "world")
I applied via LinkedIn and was interviewed in Nov 2024. There were 2 interview rounds.
Maths ,english ,reasoning, puzzles
Jackeron was the platform
I applied via Campus Placement and was interviewed in Jul 2024. There were 3 interview rounds.
The topic given to me is AI is good or bad
A program to find prime numbers in a given range.
Iterate through numbers in the given range
Check if each number is divisible by any number other than 1 and itself
If not divisible, then the number is prime
Program to find duplicates in an array of strings
Iterate through the array and store each element in a hash set
If an element is already in the hash set, it is a duplicate
Return a list of all duplicates found
The project code is a web application that allows users to create and share interactive quizzes.
The code uses HTML, CSS, and JavaScript to create the front-end interface.
It utilizes Node.js and Express for the back-end server.
MongoDB is used as the database to store user-generated quizzes.
Socket.io is used for real-time communication between users during quiz sessions.
Some of the top questions asked at the Phenom Software Engineer interview -
based on 3 interviews
Interview experience
based on 39 reviews
Rating in categories
Product Development Engineer
204
salaries
| ₹5.5 L/yr - ₹18.1 L/yr |
Software Engineer
106
salaries
| ₹3 L/yr - ₹11 L/yr |
Product Development Engineer 2
91
salaries
| ₹13.3 L/yr - ₹32 L/yr |
Product Development Engineer 1
76
salaries
| ₹5 L/yr - ₹17 L/yr |
Senior Software Engineer
32
salaries
| ₹5 L/yr - ₹12.3 L/yr |
Talentica Software
TalentSprint
TALENTEDGE
PeopleStrong