Filter interviews by
Count the number of connected islands in a graph
Use Depth First Search (DFS) or Breadth First Search (BFS) to traverse the graph and mark visited nodes
Keep track of the number of islands encountered during traversal
An island is a group of connected 1s in a 2D grid, where '1' represents land and '0' represents water
Understanding hashcode and equals methods is crucial for object comparison and storage in hash-based collections.
The hashCode() method returns an integer representation of an object, used in hash tables.
The equals() method checks if two objects are logically equivalent.
If two objects are equal (equals() returns true), they must have the same hash code (hashCode() returns the same value).
Example: In a custom class,...
Semaphore is a synchronization object used to control access to a shared resource.
Semaphore is a signaling mechanism used to control access to a shared resource
It maintains a count of available resources and blocks the thread if the count is zero
Semaphore can be used to implement critical sections, mutexes, and barriers
Examples include controlling access to a database or limiting the number of concurrent connectio...
WAP set bit or reset bit is a programming concept used to manipulate individual bits in a binary number.
Setting a bit involves changing its value from 0 to 1.
Resetting a bit involves changing its value from 1 to 0.
This concept is commonly used in low-level programming and hardware manipulation.
Example: Setting the 3rd bit of a binary number 1010 would result in 1110.
Example: Resetting the 2nd bit of a binary numbe...
The command used for taking Wireshark logs is 'tcpdump'.
Wireshark is a network protocol analyzer tool
Tcpdump is a command-line tool used to capture network traffic
Tcpdump can be used to capture packets and save them as a file for analysis in Wireshark
Example command: tcpdump -i eth0 -w capture.pcap
To find a loop in a linked list, use Floyd's cycle-finding algorithm.
Use two pointers, one moving at a rate of one node per iteration and the other moving at a rate of two nodes per iteration.
If there is a loop, the two pointers will eventually meet at the same node.
If there is no loop, the faster pointer will reach the end of the list.
Time complexity: O(n), Space complexity: O(1)
RB's bandwidth usage depends on the specific product and its features.
RB's have different bandwidth usage depending on the product
The bandwidth usage also depends on the features of the product
Examples of RB's with different bandwidth usage are RB750Gr3 and RB4011iGS+RM
Use command line tools like 'ps' or 'top' to find the number of running processes on a server.
Use 'ps aux' command to list all running processes and count the number of lines
Use 'top' command and look for the 'Tasks' section which shows the number of running processes
Use 'htop' command which provides a more interactive and detailed view of running processes
Use 5 threads to print alternate numbers with thread synchronization
Create 5 threads, each responsible for printing a specific set of numbers
Use mutex or semaphore to synchronize the threads
Thread 1 prints odd numbers, Thread 2 prints even numbers, and so on
Ensure proper handling of thread creation and synchronization
Example: Thread 1 prints 1, 3, 5, ... Thread 2 prints 2, 4, 6, ...
BWP part concept refers to the concept of breaking down a software system into smaller, more manageable parts.
BWP stands for Break-When-Problematic
It helps in identifying and isolating issues in the system
Each part should have a clear responsibility and interface with other parts
I applied via Referral and was interviewed in Oct 2023. There were 3 interview rounds.
The coding test was for 90 mins, and comprised of questions from topics such as DP and hashtables. It was taken on hackerrank platform
Understanding hashcode and equals methods is crucial for object comparison and storage in hash-based collections.
The hashCode() method returns an integer representation of an object, used in hash tables.
The equals() method checks if two objects are logically equivalent.
If two objects are equal (equals() returns true), they must have the same hash code (hashCode() returns the same value).
Example: In a custom class, if t...
Count the number of connected islands in a graph
Use Depth First Search (DFS) or Breadth First Search (BFS) to traverse the graph and mark visited nodes
Keep track of the number of islands encountered during traversal
An island is a group of connected 1s in a 2D grid, where '1' represents land and '0' represents water
Use 5 threads to print alternate numbers with thread synchronization
Create 5 threads, each responsible for printing a specific set of numbers
Use mutex or semaphore to synchronize the threads
Thread 1 prints odd numbers, Thread 2 prints even numbers, and so on
Ensure proper handling of thread creation and synchronization
Example: Thread 1 prints 1, 3, 5, ... Thread 2 prints 2, 4, 6, ...
I appeared for an interview before Mar 2024, where I was asked the following questions.
I applied via Naukri.com and was interviewed in Sep 2021. There was 1 interview round.
BWP part concept refers to the concept of breaking down a software system into smaller, more manageable parts.
BWP stands for Break-When-Problematic
It helps in identifying and isolating issues in the system
Each part should have a clear responsibility and interface with other parts
Corset is a tight-fitting undergarment worn to shape and support the torso.
Corsets were popular in the Victorian era.
They were worn by women to achieve an hourglass figure.
Modern corsets are often used as fashion statements or for waist training.
Corsets can be made of various materials such as satin, leather, or lace.
They can be fastened with laces, hooks, or zippers.
UE attach procedure is a process in LTE network where a UE establishes a connection with the network.
UE sends RRC Connection Request message to eNodeB
eNodeB sends RRC Connection Setup message to UE
UE sends RRC Connection Setup Complete message to eNodeB
eNodeB sends RRC Connection Reconfiguration message to UE
UE sends RRC Connection Reconfiguration Complete message to eNodeB
UE is now attached to the network
I am not using any numerology in my work as a Senior Software Engineer.
I do not believe in numerology and do not use it in my work.
My focus is on writing efficient and effective code.
Numerology has no place in software engineering.
RB's bandwidth usage depends on the specific product and its features.
RB's have different bandwidth usage depending on the product
The bandwidth usage also depends on the features of the product
Examples of RB's with different bandwidth usage are RB750Gr3 and RB4011iGS+RM
CCE stands for Continuous and Comprehensive Evaluation.
CCE is a system of evaluation in education that assesses students' progress continuously throughout the year.
It is a comprehensive approach that takes into account various aspects of a student's development, including academic, social, and emotional.
CCE aims to reduce the emphasis on rote learning and promote a more holistic approach to education.
It was introduced ...
To find a loop in a linked list, use Floyd's cycle-finding algorithm.
Use two pointers, one moving at a rate of one node per iteration and the other moving at a rate of two nodes per iteration.
If there is a loop, the two pointers will eventually meet at the same node.
If there is no loop, the faster pointer will reach the end of the list.
Time complexity: O(n), Space complexity: O(1)
WAP set bit or reset bit is a programming concept used to manipulate individual bits in a binary number.
Setting a bit involves changing its value from 0 to 1.
Resetting a bit involves changing its value from 1 to 0.
This concept is commonly used in low-level programming and hardware manipulation.
Example: Setting the 3rd bit of a binary number 1010 would result in 1110.
Example: Resetting the 2nd bit of a binary number 110...
Semaphore is a synchronization object used to control access to a shared resource.
Semaphore is a signaling mechanism used to control access to a shared resource
It maintains a count of available resources and blocks the thread if the count is zero
Semaphore can be used to implement critical sections, mutexes, and barriers
Examples include controlling access to a database or limiting the number of concurrent connections
Arrays are faster for random access, while linked lists are better for frequent insertions and deletions.
Arrays have a fixed size, while linked lists can grow dynamically.
Arrays are stored in contiguous memory, while linked lists use pointers to connect nodes.
Accessing an element in an array is O(1), while in a linked list it is O(n).
Inserting or deleting an element in an array is O(n), while in a linked list it is O(1...
The command used for taking Wireshark logs is 'tcpdump'.
Wireshark is a network protocol analyzer tool
Tcpdump is a command-line tool used to capture network traffic
Tcpdump can be used to capture packets and save them as a file for analysis in Wireshark
Example command: tcpdump -i eth0 -w capture.pcap
Use command line tools like 'ps' or 'top' to find the number of running processes on a server.
Use 'ps aux' command to list all running processes and count the number of lines
Use 'top' command and look for the 'Tasks' section which shows the number of running processes
Use 'htop' command which provides a more interactive and detailed view of running processes
Top trending discussions
30min duration C coding 10 questions asked
1hr duration interviewer will be giving some random C questions to code
posted on 1 Apr 2025
I appeared for an interview before Apr 2024, where I was asked the following questions.
Implemented a multi-faceted approach to mitigate incidents, focusing on root cause analysis and team collaboration.
Conducted a thorough root cause analysis to identify underlying issues, leading to a 30% reduction in similar incidents.
Established a cross-functional incident response team to improve communication and response times during incidents.
Developed and implemented a comprehensive incident management process, i...
As a Senior Software Engineer, I lead projects, mentor teams, and ensure high-quality software delivery.
Lead software development projects from conception to deployment, ensuring alignment with business goals.
Mentor junior developers, providing guidance on best practices and code reviews to enhance team skills.
Collaborate with cross-functional teams, including product management and design, to define project requiremen...
posted on 6 Feb 2024
I applied via Approached by Company and was interviewed before Feb 2023. There were 2 interview rounds.
I applied via Naukri.com and was interviewed before Sep 2022. There were 4 interview rounds.
I applied via Recruitment Consultant
I will drive innovation through cross-functional collaboration, continuous learning, and data-driven decision-making.
Promote cross-functional collaboration to leverage diverse perspectives and expertise
Encourage continuous learning and development to stay ahead of industry trends
Utilize data-driven decision-making to identify opportunities for growth and optimization
Designing a messaging system like WhatsApp
Choose a reliable and scalable backend technology like Node.js
Implement end-to-end encryption for secure communication
Use push notifications for real-time messaging
Allow users to create groups and broadcast messages
Provide features like voice and video calling
Ensure data privacy and compliance with regulations
Design a user-friendly interface for easy navigation
based on 3 interview experiences
Difficulty level
Duration
based on 46 reviews
Rating in categories
Lead Engineer
272
salaries
| ₹14 L/yr - ₹42.2 L/yr |
Senior Software Engineer
271
salaries
| ₹10.5 L/yr - ₹34 L/yr |
Software Engineer
262
salaries
| ₹6 L/yr - ₹18 L/yr |
Staff Engineer
193
salaries
| ₹20 L/yr - ₹52 L/yr |
Senior Engineer
145
salaries
| ₹10.5 L/yr - ₹34 L/yr |
Motorola Solutions
HFCL Limited
Ciena
CommScope