Filter interviews by
I applied via Approached by Company and was interviewed in Jan 2024. There was 1 interview round.
Using Java Stream operations to manipulate student objects
Use Stream API to perform operations on a collection of student objects
Apply filter, map, reduce, and other stream operations to transform and manipulate data
Use lambda expressions to define the operations to be performed on each student object
Example: filtering students based on a certain criteria, mapping student names to uppercase, calculating the average gra
Top trending discussions
posted on 22 Apr 2021
I applied via Naukri.com and was interviewed in Oct 2020. There were 4 interview rounds.
posted on 10 May 2015
Locate sum of 2 numbers in a linear array (unsorted and sorted) and their complexities
For unsorted array, use nested loops to compare each element with every other element until the sum is found
For sorted array, use two pointers approach starting from the beginning and end of the array and move them towards each other until the sum is found
Complexity for unsorted array is O(n^2) and for sorted array is O(n)
Pointers are used to manipulate memory addresses and values in C++. Increment/decrement, address of and value at operators are commonly used.
Incrementing a pointer moves it to the next memory location of the same data type
Decrementing a pointer moves it to the previous memory location of the same data type
The address of operator (&) returns the memory address of a variable
The value at operator (*) returns the value sto
To determine if a point is inside or outside a rectangle, we check if the point's coordinates fall within the rectangle's boundaries.
Check if the point's x-coordinate is greater than the left edge of the rectangle
Check if the point's x-coordinate is less than the right edge of the rectangle
Check if the point's y-coordinate is greater than the top edge of the rectangle
Check if the point's y-coordinate is less than the b...
To find line that divides rectangle into 2 equal halves through a point inside it.
Find the center of the rectangle
Draw a line from the center to the given point
Extend the line to the opposite side of the rectangle
The extended line will divide the rectangle into 2 equal halves
There are multiple combinations of 8-bit and 16-bit signed numbers. How many such combinations are possible?
There are 2^8 (256) possible combinations of 8-bit signed numbers.
There are 2^16 (65,536) possible combinations of 16-bit signed numbers.
To find the total number of combinations, we can add the number of combinations of 8-bit and 16-bit signed numbers.
Therefore, the total number of possible combinations is 256 +
Find duplicates in an array of elements in 0(n) time and 0(1) space.
Use the property of inputs to your advantage
Iterate through the array and mark elements as negative
If an element is already negative, it is a duplicate
Return all the negative elements as duplicates
I appeared for an interview before May 2016.
posted on 16 Sep 2021
I appeared for an interview before Sep 2020.
Round duration - 30 minutes
Round difficulty - Easy
To search for a node in a linked list, iterate through the list and compare each node's value with the target value.
Start at the head of the linked list
Iterate through each node by following the 'next' pointer
Compare the value of each node with the target value
Return the node if found, otherwise return null
To detect a loop in a linked list, we can use Floyd's Cycle Detection Algorithm.
Initialize two pointers, slow and fast, at the head of the linked list.
Move slow pointer by one step and fast pointer by two steps.
If there is a loop, the two pointers will eventually meet.
Alternatively, we can use a hash set to store visited nodes and check for duplicates.
Implement a stack using a singly linked list
Create a Node class with data and next pointer
Create a Stack class with top pointer pointing to the top of the stack
Implement push, pop, and peek operations by manipulating the linked list
Example: Node class - Node { int data; Node next; }
Round duration - 40 minutes
Round difficulty - Easy
The top view of a binary tree shows the nodes visible from the top when looking down from the root node.
The top view of a binary tree is the set of nodes visible from the top when looking down from the root node.
Nodes at the same horizontal distance from the root are considered at the same level in the top view.
If multiple nodes are at the same horizontal distance, only the topmost node at that level is included in the...
Deleting a node from a linked list involves updating pointers to maintain the list's integrity.
Identify the node to be deleted by traversing the list
Update the previous node's next pointer to skip the node to be deleted
Free the memory allocated to the node to be deleted
Do practice a lot of questions on linked list and stacks as these are two most important data structures asked in the interview. Also, try to implement it yourself without seeing the solution. Also prepare for Computer Science subjects like Operating System, Database Management System, Computer Networks, etc. I prepared them through Coding Ninjas notes which were simpler and easy to understand.
Application resume tips for other job seekersKeep your resume short and up to mark and check spellings before submitting it for the interview process.
Final outcome of the interviewSelectedposted on 23 May 2021
Quality tools are techniques used to ensure quality in a product or service.
Quality control charts
Pareto charts
Fishbone diagrams
Histograms
Control charts
Scatter diagrams
Statistical process control
A histogram is used to represent the distribution of numerical data. Frequency is the number of occurrences and interval is the range of values.
Histograms are useful for visualizing data and identifying patterns.
Frequency refers to the number of times a value appears in the data set.
Interval refers to the range of values that are grouped together in the histogram.
Histograms are commonly used in statistics, finance, and...
Rework of produced parts affects the factors of Overall Equipment Efficiency (OEE).
Rework increases the time required to produce a part, reducing the availability factor of OEE.
Rework increases the number of defects, reducing the quality factor of OEE.
Rework increases the amount of scrap or waste, reducing the performance factor of OEE.
Rework can lead to increased downtime for equipment setup and adjustments, reducing ...
Autonomous maintenance is a maintenance approach where operators take responsibility for routine maintenance tasks.
Operators are trained to perform routine maintenance tasks
Operators conduct inspections and minor repairs
Autonomous maintenance reduces downtime and improves equipment reliability
It also frees up maintenance staff to focus on more complex tasks
Companies are going for TPM to improve productivity, reduce downtime, and increase efficiency.
TPM helps in identifying and eliminating equipment failures before they occur
It ensures that equipment is maintained properly and in a timely manner
TPM also helps in reducing the need for emergency repairs and downtime
It improves overall equipment effectiveness and reduces costs
Companies that have implemented TPM have seen sig...
SPC stands for Statistical Process Control. Cp and Cpk are statistical tools used to measure process capability.
SPC is a method of monitoring and controlling a process to ensure it is operating within acceptable limits.
Cp is a measure of how well the process is centered between the upper and lower specification limits.
Cpk is a measure of how well the process is capable of producing within the specification limits.
Cp an...
OEE can be calculated by multiplying Availability, Performance, and Quality percentages.
Calculate Availability by dividing Operating Time by Planned Production Time.
Calculate Performance by dividing Actual Production by Maximum Production.
Calculate Quality by dividing Good Units by Total Units Produced.
Multiply Availability, Performance, and Quality percentages to get OEE.
Major losses affecting OEE include availability, performance, and quality losses.
Availability losses occur when equipment is not running due to breakdowns, changeovers, or lack of materials.
Performance losses occur when equipment is running below its maximum speed or efficiency.
Quality losses occur when defective products are produced and need to be scrapped or reworked.
Other losses may include startup and shutdown los...
IATF stands for International Automotive Task Force and its current revised name is IATF 16949:2016.
IATF stands for International Automotive Task Force
Its current revised name is IATF 16949:2016
A capacitor is an electronic component that stores electrical energy in an electric field. It is used in various electronic circuits.
Capacitors are used to filter out noise and stabilize voltage in power supplies.
They are used in timing circuits, oscillators, and filters.
Capacitors are also used in audio equipment to filter out unwanted frequencies.
They can be found in electronic devices such as TVs, computers, and sma...
posted on 21 Mar 2022
I appeared for an interview in Aug 2021.
Round duration - 75 minutes
Round difficulty - Medium
This was an online coding round where I had 2 questions to solve under 75 minutes. Both the coding questions were related to DP and were of Medium to Hard level of difficulty.
Imagine Ninja is tackling a puzzle during his long summer vacation. He has two arrays of integers, each with lengths 'N' and 'M'. Ninja's task is to dete...
Find the length of the longest subsequence common to two arrays consisting only of prime numbers.
Iterate through both arrays to find prime numbers
Use dynamic programming to find the longest common subsequence
Consider edge cases like empty arrays or no common prime numbers
You are given an array ARR
of N integers. Your task is to perform operations on this array until it becomes empty, and maximize the sum of selected elements. In each operatio...
Given an array, select elements to maximize sum by removing adjacent elements. Return the maximum sum.
Iterate through the array and keep track of the frequency of each element.
Select the element with the highest frequency first, then remove adjacent elements.
Repeat the process until the array becomes empty and calculate the sum of selected elements.
Round duration - 60 minutes
Round difficulty - Medium
This round had 2 Algorithmic questions wherein I was supposed to code both the problems after discussing their approaches and respective time and space complexities . After that , I was grilled on some OOPS concepts related to C++.
Your task is to determine if a given Singly Linked List of integers forms a cycle.
Explanation: A cycle in a linked list occurs when there is a node in the list that conn...
Detect if a given singly linked list of integers forms a cycle.
Use Floyd's Tortoise and Hare algorithm to detect cycle in linked list
Maintain two pointers, one moving at double the speed of the other
If they meet at some point, there is a cycle in the linked list
Determine whether a given array ARR
of positive integers is a valid Preorder Traversal of a Binary Search Tree (BST).
A binary search tree (BST) is a tree structure w...
Check if a given array of positive integers is a valid Preorder Traversal of a Binary Search Tree (BST).
Create a stack to keep track of nodes.
Iterate through the array and compare each element with the top of the stack.
If the current element is less than the top of the stack, push it onto the stack.
If the current element is greater than the top of the stack, pop elements from the stack until a greater element is found ...
Vtable and VPTR are used in C++ for implementing polymorphism through virtual functions.
Vtable (Virtual Table) is a table of function pointers used to implement dynamic dispatch for virtual functions.
VPTR (Virtual Pointer) is a pointer that points to the Vtable of an object.
Vtable is created by the compiler for each class that has virtual functions.
VPTR is added as a hidden member in each object of a class with virtual...
Friend functions in C++ are functions that are not members of a class but have access to its private and protected members.
Friend functions are declared inside a class with the keyword 'friend'.
They can access private and protected members of the class.
They are not member functions of the class, but have the same access rights as member functions.
Friend functions are useful when you want to allow a function external to
Round duration - 60 minutes
Round difficulty - Medium
This was also a DS/Algo round where I was given 2 questions to solve and I was expected to come up with the optimal approach as far as possible. I solved both the questions with the optimal time and space complexities and then I was asked some more questions related to DBMS towards the end of the interview.
You are given a binary tree. Your task is to print the Top View of the Binary Tree, displaying the nodes from left to right order.
The first line contains an integer 't'...
The task is to print the Top View of a Binary Tree from left to right order.
Use a map to store the horizontal distance of each node from the root.
Perform a level order traversal of the tree and keep track of the horizontal distance of each node.
Print the nodes in the map in ascending order of their horizontal distance.
Handle the case where multiple nodes have the same horizontal distance by printing the one that appear
Given a string STR
, determine the total number of palindromic substrings within STR
.
The first line contains an integer 't' representing the number ...
Count the total number of palindromic substrings in a given string.
Iterate through each character in the string and expand around it to find palindromic substrings.
Use dynamic programming to store previously calculated palindromic substrings.
Consider both odd and even length palindromes while counting.
Example: For input 'abbc', palindromic substrings are ['a', 'b', 'b', 'c', 'bb']. Total count is 5.
DELETE removes specific rows from a table, while TRUNCATE removes all rows and resets auto-increment values.
DELETE is a DML command, while TRUNCATE is a DDL command.
DELETE can be rolled back, while TRUNCATE cannot be rolled back.
DELETE triggers delete triggers, while TRUNCATE does not trigger any triggers.
DELETE is slower as it maintains logs, while TRUNCATE is faster as it does not maintain logs.
Example: DELETE FROM t
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity, while denormalization is the process of intentionally introducing redundancy to improve performance.
Normalization involves breaking down a table into smaller tables and defining relationships between them to reduce redundancy and dependency.
Denormalization involves combining tables and duplicating data to impr...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I applied via Walk-in and was interviewed in Nov 2022. There were 4 interview rounds.
Error proofing is a method of designing processes or systems to prevent errors from occurring.
Error proofing involves identifying potential errors and implementing measures to prevent them.
Examples of error proofing include using checklists, automation, and visual cues to guide correct actions.
Error proofing helps improve quality, reduce defects, and increase efficiency in operations.
Quality management system is a set of policies, processes, and procedures required for planning and execution in the core business area of an organization.
It involves defining quality policies and objectives
Implementing processes to ensure quality standards are met
Monitoring and measuring performance
Continual improvement through corrective actions and audits
I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.
based on 1 interview
Interview experience
Senior Engineer
1.3k
salaries
| ₹15.7 L/yr - ₹45 L/yr |
Software Engineer
1k
salaries
| ₹10 L/yr - ₹38.5 L/yr |
Engineer
890
salaries
| ₹9.9 L/yr - ₹30 L/yr |
Senior Software Engineer
650
salaries
| ₹12.6 L/yr - ₹50 L/yr |
Senior Leader Engineer
450
salaries
| ₹20 L/yr - ₹72 L/yr |
Nvidia
Intel
Mercedes-Benz Research and Development India
Tata Electronics