Filter interviews by
Yes, Ping can be used to measure congestion in the system.
Ping measures the round-trip time for packets to travel from the source to the destination.
If the round-trip time is high, it indicates congestion in the network.
Ping can also be used to measure packet loss, which is another indicator of congestion.
Create and insert nodes in a linked list using C and STL.
Define a struct for the linked list node
Allocate memory for the nodes using malloc or new
Set the data and next pointer for each node
Use push_back or insert functions in STL for insertion
TCP/IP protocol stack consists of 4 layers: Application, Transport, Internet, and Network Access.
Application layer: interacts with user applications and provides services like email, file transfer, etc.
Transport layer: responsible for end-to-end communication between hosts and provides reliable data transfer using TCP or unreliable using UDP.
Internet layer: responsible for routing packets across networks using IP ...
A Denial of Service (DoS) attack is an attempt to make a website or network unavailable to users by overwhelming it with traffic.
DoS attack floods a network or server with traffic to make it unavailable to users
Remedy includes implementing firewalls, load balancers, and intrusion detection systems
Another remedy is to use a content delivery network (CDN) to distribute traffic
Examples of DoS attacks include Ping of ...
Minimum Spanning Tree helps in finding the shortest path in a network.
MST helps in reducing the cost of network connections.
It is used in network design and optimization.
MST algorithms like Kruskal's and Prim's are used in network routing protocols.
MST can be used to find the shortest path between two nodes in a network.
Example: MST can be used to find the shortest path for data transmission in a computer network.
A router routes a packet by examining the destination IP address and forwarding it to the appropriate network.
The router receives a packet from a device on one of its interfaces
The router examines the destination IP address in the packet header
The router looks up the destination IP address in its routing table
The router forwards the packet to the appropriate interface based on the routing table
If the destination n...
Page fault is an error that occurs when a program tries to access a page that is not currently in physical memory.
Occurs when a program tries to access a page not in physical memory
Operating system retrieves the page from disk to physical memory
Can cause performance issues if it happens frequently
Can be caused by insufficient memory or memory fragmentation
Deleting a node in a linked list given a pointer to the node.
Save the next node's pointer in a temp variable
Copy the data of the next node to the current node
Delete the next node using the temp variable
A router uses longest prefix matching to find the most specific route for a packet.
The router looks at the destination IP address of the packet
It compares the address with the entries in its routing table
The router selects the entry with the longest matching prefix
The packet is then forwarded to the next hop in that route
If there is no matching prefix, the router uses the default route
Longest prefix matching ensur...
Page fault is serviced by fetching the required page from disk to memory.
When a process tries to access a page that is not in memory, a page fault occurs.
The operating system then checks if the page is present in the disk.
If the page is not present in the disk, it results in a segmentation fault.
If the page is present in the disk, it is fetched to memory and the process continues.
The process is then restarted from...
Create and insert nodes in a linked list using C and STL.
Define a struct for the linked list node
Allocate memory for the nodes using malloc or new
Set the data and next pointer for each node
Use push_back or insert functions in STL for insertion
Deleting a node in a linked list given a pointer to the node.
Save the next node's pointer in a temp variable
Copy the data of the next node to the current node
Delete the next node using the temp variable
TCP/IP protocol stack consists of 4 layers: Application, Transport, Internet, and Network Access.
Application layer: interacts with user applications and provides services like email, file transfer, etc.
Transport layer: responsible for end-to-end communication between hosts and provides reliable data transfer using TCP or unreliable using UDP.
Internet layer: responsible for routing packets across networks using IP addre...
A router routes a packet by examining the destination IP address and forwarding it to the appropriate network.
The router receives a packet from a device on one of its interfaces
The router examines the destination IP address in the packet header
The router looks up the destination IP address in its routing table
The router forwards the packet to the appropriate interface based on the routing table
If the destination networ...
A router uses longest prefix matching to find the most specific route for a packet.
The router looks at the destination IP address of the packet
It compares the address with the entries in its routing table
The router selects the entry with the longest matching prefix
The packet is then forwarded to the next hop in that route
If there is no matching prefix, the router uses the default route
Longest prefix matching ensures ef...
Page fault is an error that occurs when a program tries to access a page that is not currently in physical memory.
Occurs when a program tries to access a page not in physical memory
Operating system retrieves the page from disk to physical memory
Can cause performance issues if it happens frequently
Can be caused by insufficient memory or memory fragmentation
Page fault is serviced by fetching the required page from disk to memory.
When a process tries to access a page that is not in memory, a page fault occurs.
The operating system then checks if the page is present in the disk.
If the page is not present in the disk, it results in a segmentation fault.
If the page is present in the disk, it is fetched to memory and the process continues.
The process is then restarted from the ...
Calculating round trip time and bandwidth of network using Pin
Use Pin to measure the time it takes for a packet to travel from source to destination and back
Divide the round trip time by 2 to get the one-way latency
Calculate bandwidth by dividing the size of the packet by the one-way latency
Repeat the process with different packet sizes to get an average bandwidth
Use Pin's built-in tools to analyze the data and generat...
Yes, Ping can be used to measure congestion in the system.
Ping measures the round-trip time for packets to travel from the source to the destination.
If the round-trip time is high, it indicates congestion in the network.
Ping can also be used to measure packet loss, which is another indicator of congestion.
Algorithms used in networking include routing, switching, and security protocols.
Routing algorithms determine the best path for data to travel between devices on a network.
Switching algorithms determine how data is forwarded between network devices.
Security algorithms are used to protect data and prevent unauthorized access.
Examples of routing algorithms include OSPF and BGP.
Examples of switching algorithms include Spa...
Minimum Spanning Tree helps in finding the shortest path in a network.
MST helps in reducing the cost of network connections.
It is used in network design and optimization.
MST algorithms like Kruskal's and Prim's are used in network routing protocols.
MST can be used to find the shortest path between two nodes in a network.
Example: MST can be used to find the shortest path for data transmission in a computer network.
Articulation points are nodes in a network whose removal would disconnect the network or increase the number of connected components.
Articulation points are also known as cut vertices.
They are significant in network design and analysis as they help identify critical points in the network.
Removing an articulation point can cause the network to split into multiple disconnected components.
For example, in a computer networ...
Sort an array of 0s, 1s, and 2s without counting their occurrences.
Use three pointers to keep track of the last index of 0s, 1s, and 2s.
Iterate through the array and swap elements to their respective pointers.
Time complexity: O(n), Space complexity: O(1).
A Denial of Service (DoS) attack is an attempt to make a website or network unavailable to users by overwhelming it with traffic.
DoS attack floods a network or server with traffic to make it unavailable to users
Remedy includes implementing firewalls, load balancers, and intrusion detection systems
Another remedy is to use a content delivery network (CDN) to distribute traffic
Examples of DoS attacks include Ping of Death...
DDoS is a cyber attack where multiple systems flood a targeted server with traffic to make it unavailable.
DDoS attack overwhelms a server with traffic from multiple sources
Attackers use botnets to launch DDoS attacks
DDoS attacks can be mitigated by using specialized software and hardware
Examples of DDoS attacks include the 2016 Dyn cyberattack and the 2018 GitHub attack
Top trending discussions
I appeared for an interview before Jan 2021.
Round duration - 120 Minutes
Round difficulty - Medium
This was an online coding round where we had 3 questions to solve under 120 minutes. The questions were of medium to hard difficulty level.
Determine the minimum time required to travel from a starting point to a destination point in a two-dimensional coordinate system, considering both direct movement and the...
Find the minimum time to travel from a starting point to a destination point using direct movement and wormholes.
Calculate the time taken for direct movement from source to destination.
Consider using each wormhole to see if it reduces the total travel time.
Choose the path with the minimum total time to reach the destination.
Ninja needs help in a battle against the string man. Given two strings, 'S' and 'T', the task is to find the number of substrings in 'S' that differ from some su...
The task is to find the number of substrings in 'S' that differ from some substrings of 'T' by exactly one character.
Iterate through all substrings of 'S' and 'T' and compare them character by character to find the ones that differ by exactly one character.
Use nested loops to generate all possible substrings of 'S' and 'T'.
Count the number of substrings that differ by exactly one character and return the total count.
Determine whether a given integer N
is a power of two. Return true
if it is, otherwise return false
.
An integer 'N' is considered a power of two if it can be e...
Check if a given integer is a power of two or not.
Check if the given integer is greater than 0.
Check if the given integer has only one bit set in its binary representation.
Return true if the above conditions are met, else return false.
Round duration - 60 Minutes
Round difficulty - Medium
This round had 2 questions related to DSA where I was first expected to explain my approaches and then discuss the time and space complexities of my solution. After that , I was asked some core concepts related to OS.
Given a singly linked list of integers, return the head of the reversed linked list.
Initial linked list: 1 -> 2 -> 3 -> 4 -> NULL
Reversed link...
Reverse a singly linked list of integers and return the head of the reversed linked list.
Iterate through the linked list and reverse the pointers to point to the previous node instead of the next node.
Use three pointers - prev, current, and next to reverse the linked list in O(N) time and O(1) space complexity.
Update the head of the reversed linked list as the last node encountered during reversal.
You are provided with an undirected graph containing 'N' vertices and 'M' edges. The vertices are numbered from 1 to 'N'. Your objective is to determi...
Detect cycles in an undirected graph.
Use Depth First Search (DFS) to detect cycles in the graph.
Maintain a visited array to keep track of visited vertices.
If a visited vertex is encountered again during DFS, a cycle exists.
Check for cycles in each connected component of the graph.
Example: For input N=3, Edges=[[1, 2], [2, 3], [1, 3]], output is Yes.
Mutex is used for exclusive access to a resource by only one thread at a time, while semaphore can allow multiple threads to access a resource simultaneously.
Mutex is binary semaphore with ownership, used for mutual exclusion.
Mutex is typically used to protect critical sections of code.
Semaphore is a signaling mechanism, used for synchronization between multiple threads.
Semaphore can have a count greater than 1, allowi...
Multitasking refers to the ability of an operating system to run multiple tasks concurrently, while multithreading involves executing multiple threads within a single process.
Multitasking allows multiple processes to run simultaneously on a single processor, switching between them quickly to give the illusion of parallel execution.
Multithreading involves breaking a process into multiple threads that can be executed ind...
Round duration - 60 Minutes
Round difficulty - Medium
This round had 2 Algorithmic questions wherein I was supposed to code both the problems after discussing their
approaches and respective time and space complexities . After that , I was grilled on some OOPS concepts related to C++.
You are given a long type array/list ARR
of size N
, representing an elevation map. The value ARR[i]
denotes the elevation of the ith
bar. Your task is to determine th...
Calculate the total amount of rainwater that can be trapped between given elevations in an array.
Iterate through the array and calculate the maximum height on the left and right of each bar.
Calculate the amount of water that can be trapped at each bar by taking the minimum of the maximum heights on the left and right.
Sum up the trapped water at each bar to get the total trapped water for the entire array.
You are provided with an array nums
which contains the first N positive integers. In this array, one integer appears twice, and one integer is missi...
Given an array of first N positive integers with one number repeating and one missing, find the repeating and missing numbers.
Iterate through the array and keep track of the sum of elements and sum of squares to find the missing and repeating numbers.
Use a set to identify the repeating number and calculate the missing number based on the sum of elements.
Example: For nums = [1, 2, 3, 4, 4, 5], the repeating number is 4 ...
Diamond Problem in C++ is a common issue in multiple inheritance where a class inherits from two classes that have a common base class.
Diamond Problem occurs when a class inherits from two classes that have a common base class, leading to ambiguity in accessing members.
It can be resolved in C++ using virtual inheritance, where the common base class is inherited virtually to avoid duplicate copies of base class members.
...
Friend functions in C++ are functions that are not members of a class but have access to its private and protected members.
Friend functions are declared inside a class with the 'friend' keyword.
They can access private and protected members of the class.
They are not member functions of the class, but have the same access rights as member functions.
Friend functions are useful for implementing operators that are not membe...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I appeared for an interview in Aug 2017.
posted on 3 Dec 2015
I appeared for an interview in Aug 2016.
I appeared for an interview before Jun 2016.
Yesterday was a productive day filled with meetings and project work.
Attended a team meeting in the morning
Worked on a project proposal in the afternoon
Had a networking event in the evening
The letters on a keyboard are placed in a specific layout called QWERTY, which was designed to prevent typewriter jams.
The QWERTY layout was developed by Christopher Sholes in 1873 for typewriters.
The layout was designed to separate commonly used letters to reduce the likelihood of jamming.
The arrangement of letters was based on the frequency of their use in the English language.
The QWERTY layout became popular and was...
An air conditioner is a device that cools and dehumidifies the air in a room or building.
Air conditioners work by removing heat and moisture from the air.
They use a refrigeration cycle to cool the air.
Air conditioners can be used for both residential and commercial purposes.
They come in different types such as window units, split systems, and central air conditioning systems.
Air conditioners improve indoor air quality ...
Some of the top questions asked at the Polycom interview -
Staff Engineer
8
salaries
| ₹20 L/yr - ₹31 L/yr |
Senior Software Engineer
7
salaries
| ₹9.3 L/yr - ₹18 L/yr |
Technical Support Engineer
6
salaries
| ₹6.3 L/yr - ₹8.5 L/yr |
Software Engineer
5
salaries
| ₹5.9 L/yr - ₹8 L/yr |
Territory Sales Manager
5
salaries
| ₹10 L/yr - ₹28.6 L/yr |
Samsung
vivo
Dell
Godrej & Boyce Manufacturing