Filter interviews by
Check if a number is even or odd without using mod operator.
Use bitwise AND operator with 1 to check the last bit of the number.
If the last bit is 0, the number is even. If it's 1, the number is odd.
Example: (num & 1) == 0 for even, (num & 1) == 1 for odd.
Apigee gateway is a platform for managing and securing APIs.
It acts as a mediator between the client and the backend services.
It provides features like authentication, rate limiting, caching, and analytics.
It can be deployed on-premises or in the cloud.
It supports various protocols like REST, SOAP, and GraphQL.
It helps in API versioning and documentation.
HashMap is a data structure that stores key-value pairs and provides constant time complexity for basic operations.
HashMap uses hashing to store and retrieve elements
It uses an array of linked lists to handle collisions
The hash function is used to map the key to an index in the array
The internal implementation includes methods like put(), get(), and resize()
Java 8 introduced several new features including lambda expressions, streams, and default methods.
Lambda expressions for functional programming
Streams for processing large data sets
Default methods for backward compatibility
Date and Time API improvements
Nashorn JavaScript engine
Parallel array sorting
Type annotations
Repeatable annotations
Optional class for null checks
Base64 encoding and decoding
PermGen space replaced wit...
Hashcode and equals method are related to object comparison in Java.
Hashcode is used to identify the object and equals method is used to compare two objects.
If two objects are equal, their hashcode values must be the same.
If two objects have the same hashcode value, it doesn't necessarily mean that they are equal.
It is recommended to override both hashcode and equals method when creating custom classes.
I applied via Job Portal and was interviewed before Sep 2020. There were 3 interview rounds.
The digin pattern implemented for string pool is a technique to reuse string objects to optimize memory usage.
String pool is a cache of string objects stored in memory.
When a string is created, it is first checked if it already exists in the pool.
If it does, a reference to the existing string object is returned instead of creating a new one.
This helps in reducing memory consumption and improving performance.
Examples: S...
I appeared for an interview before Mar 2021.
Round duration - 60 minutes
Round difficulty - Easy
This was a technical round with questions on DBMS.
Data integrity refers to the accuracy, consistency, and reliability of data throughout its lifecycle.
Data integrity ensures that data is accurate and consistent in storage and transmission.
It involves maintaining the quality and reliability of data over time.
Methods for ensuring data integrity include checksums, encryption, and error detection codes.
Examples of data integrity violations include data corruption, unautho
A trigger is a special type of stored procedure that automatically executes when certain events occur in a database.
Triggers are used to enforce business rules, maintain data integrity, and automate repetitive tasks.
They can be triggered by INSERT, UPDATE, or DELETE operations on a table.
Examples of triggers include auditing changes to a table, updating related tables when a record is modified, or enforcing referential
Clustered indexes physically order the data in the table, while non-clustered indexes do not.
Clustered indexes determine the physical order of data in the table, while non-clustered indexes do not.
A table can have only one clustered index, but multiple non-clustered indexes.
Clustered indexes are faster for retrieval of data, especially range queries, compared to non-clustered indexes.
Non-clustered indexes are stored se...
Round duration - 60 minutes
Round difficulty - Easy
Technical interview round with questions on DBMS.
UNION combines and removes duplicates, UNION ALL combines without removing duplicates.
UNION merges the result sets of two or more SELECT statements and removes duplicates.
UNION ALL merges the result sets of two or more SELECT statements without removing duplicates.
UNION is slower than UNION ALL as it involves removing duplicates.
Example: SELECT column1 FROM table1 UNION SELECT column1 FROM table2;
Example: SELECT column...
A cursor in PL/SQL is used to retrieve and process multiple rows of data one at a time.
Allows iteration over a result set
Retrieves data row by row
Can be used to update or delete rows in a table
Must be declared, opened, fetched, and closed
SQL query to fetch the nth highest salary from a table
Use the ORDER BY clause to sort salaries in descending order
Use the LIMIT clause to fetch the nth highest salary
Round duration - 30 minutes
Round difficulty - Easy
This was a managerial round with typical behavioral problems.
Tip 1 : Since this was a SQL post, I would suggest you to get the basics intact and try practicing few queries.
Tip 2 : Must do Previously asked Interview as well as Online Test Questions.
Tip 3 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I appeared for an interview in Jan 2021.
I appeared for an interview before Sep 2020.
Round duration - 90 minutes
Round difficulty - Medium
It was Technical + Aptitude MCQ round.The technical section consisted if MCQ related to DSA,OS,DBMS.The aptitude section consisted of questions related to basic mathematics.
Prateek is a kindergarten teacher with a mission to distribute candies to students based on their performance. Each student must get at least one candy, and if two s...
The task is to distribute candies to students based on their performance while minimizing the total candies distributed.
Create an array to store the minimum candies required for each student.
Iterate through the students' ratings array to determine the minimum candies needed based on the given criteria.
Consider the ratings of adjacent students to decide the number of candies to distribute.
Calculate the total candies req...
Round duration - 30 minutes
Round difficulty - Medium
It was a technical interview testing the basic skills of OS and DBMS of candidates along with few project discussions from your CV.
List of 15 Linux commands with their functions
ls - list directory contents
pwd - print working directory
cd - change directory
mkdir - make a new directory
rm - remove files or directories
cp - copy files and directories
mv - move or rename files and directories
grep - search for patterns in files
chmod - change file permissions
ps - display information about running processes
top - display and update sorted information about pr...
DDL is used to define the structure of database objects, while DML is used to manipulate data within those objects.
DDL includes commands like CREATE, ALTER, DROP to define database objects like tables, indexes, etc.
DML includes commands like INSERT, UPDATE, DELETE to manipulate data within tables.
Example of DDL: CREATE TABLE employees (id INT, name VARCHAR(50));
Example of DML: INSERT INTO employees VALUES (1, 'John Doe
Tip 1 : Be clear about the concepts of Linux and shell scripting.
Tip 2 : Learn about the basics of Data structures and Algorithm.
Tip 3 : Be prepared to explain your projects mentioned in your CV.
Tip 1 : Use professional Keywords in your resume.
Tip 2 : Don't mention anything you are not confident in.
There are two ways to throw an exception in exception handling.
Exceptions can be thrown using the throw keyword.
Exceptions can also be thrown implicitly by the runtime system.
Examples of explicit throwing include throw new Exception() and throw new IOException().
Examples of implicit throwing include division by zero or null pointer dereference.
Reverse a given string using array of characters.
Create an empty array to store the reversed string.
Loop through the original string from end to start.
Push each character into the empty array.
Join the array to form the reversed string.
Copy constructor creates a new object by copying an existing object, while assignment operator assigns the value of an existing object to another object.
Copy constructor is used to initialize a new object with the values of an existing object.
Assignment operator is used to assign the value of an existing object to another object.
Copy constructor is called when a new object is created from an existing object.
Assignment ...
A copy constructor is used to create a new object with the same values as an existing object. We implement our own to ensure proper copying of data members.
A copy constructor is needed when we want to create a new object with the same values as an existing object.
If we don't implement our own copy constructor, the default copy constructor provided by the compiler may not copy data members properly.
We can implement our ...
QT framework is used for developing cross-platform applications with a single codebase.
QT provides a wide range of libraries and tools for developing GUI applications.
QT supports multiple platforms including Windows, Linux, macOS, Android, and iOS.
QT has a large community and extensive documentation.
QT is written in C++ and supports other programming languages like Python and Java.
QT is used by companies like Autodesk,...
RTTI stands for Run-Time Type Identification.
RTTI is a feature in C++ that allows the type of an object to be determined at runtime.
It is used to implement dynamic_cast, typeid, and exception handling.
RTTI can be used to check if an object is of a certain type before casting it.
It can also be used to determine the type of an object in order to perform specific operations on it.
I have used the Singleton and Factory design patterns in my previous projects.
Singleton pattern was used to ensure only one instance of a class is created and provide a global point of access to it.
Factory pattern was used to create objects without exposing the instantiation logic to the client and provide a way to create objects of a family without specifying their concrete classes.
QT supports multiple operating systems and cross-compilation is possible.
QT supports Windows, macOS, Linux, Android, iOS, and many other operating systems.
Cross-compilation is possible, meaning you can compile for different operating systems on a single machine.
QT also supports embedded systems like Raspberry Pi and BeagleBone.
QT provides pre-built binaries for some operating systems, but for others, you may need to co...
QPointer is a deprecated Qt class used for storing and managing pointers.
QPointer is used to avoid dangling pointers in Qt applications.
It is a template class that can be used with any QObject-derived class.
QPointer is now deprecated and replaced by QWeakPointer.
QPointer can be used to check if a QObject is still valid before accessing it.
dpointer is a Qt framework concept used for efficient memory management.
dpointer is a private implementation pointer.
It is used to hide implementation details from the public API.
dpointer allows for copy-on-write semantics.
It reduces memory usage and improves performance.
Example: QString uses dpointer to store its data.
Example: QSharedDataPointer is used to share data between objects.
I have used Qt version 5.12.3 for my previous project.
Qt version 5.12.3 was used in my previous project
I have experience working with Qt 5.15.2 as well
I am familiar with the features and functionalities of Qt 5.12.3
To check if a linked list is circular, use two pointers, one moving at twice the speed of the other. If they meet, the list is circular.
Use two pointers, one moving at twice the speed of the other
If the faster pointer catches up to the slower pointer, the list is circular
If the faster pointer reaches the end of the list, the list is not circular
Find the merge point of 2 linked lists.
Traverse both lists and find their lengths
Move the pointer of the longer list to the same distance as the shorter list
Move both pointers until they meet at the merge point
If there is no merge point, return null
To find a string in a sorted array of strings.
Use binary search algorithm to search for the string in the array.
Compare the search string with the middle element of the array.
If the search string is less than the middle element, search in the left half of the array.
If the search string is greater than the middle element, search in the right half of the array.
Repeat the process until the string is found or the search sp
Singleton class is a design pattern that restricts the instantiation of a class to one object.
To create a singleton, we need to make the constructor private and provide a static method to get the instance of the class.
To delete the singleton object, we can simply set the instance to null.
Singletons are useful when we need to ensure that only one instance of a class exists throughout the application.
Example: Logger clas...
Dynamic memory allocation in C/C++ is done using malloc(), calloc(), realloc() functions. C++ also has new and delete operators.
malloc() allocates memory block of specified size
calloc() allocates memory block and initializes it to zero
realloc() changes the size of previously allocated memory block
new operator in C++ allocates memory and calls constructor
delete operator in C++ deallocates memory and calls destructor
I applied via Recruitment Consultant and was interviewed in May 2019. There were 4 interview rounds.
I applied via Naukri.com and was interviewed before Oct 2019. There was 1 interview round.
Some of the top questions asked at the PK Global Software Technologies Senior Software Engineer interview for experienced candidates -
based on 1 review
Rating in categories
Senior Software Engineer
24
salaries
| ₹8.5 L/yr - ₹19 L/yr |
Software Engineer
9
salaries
| ₹6.5 L/yr - ₹20 L/yr |
Senior Software Developer
4
salaries
| ₹18 L/yr - ₹24.5 L/yr |
Senior Technical Lead
3
salaries
| ₹18.2 L/yr - ₹18.4 L/yr |
Associate Technical Manager
3
salaries
| ₹21 L/yr - ₹23.2 L/yr |
Thomson Reuters
Oracle Cerner
NextComm Corporation
Chetu