i
RDQ Tradingswala Technologies
Filter interviews by
Be the first one to contribute and help others!
I applied via Approached by Company and was interviewed in Dec 2024. There were 2 interview rounds.
I applied via Referral and was interviewed in Oct 2024. There was 1 interview round.
Iterate through array and check if element is greater than its adjacent elements
Iterate through array and check if current element is greater than element at index-1 and index+1
Return the first element found that satisfies the condition
Handle edge cases where element is at the beginning or end of array
Find and sum numbers in a string
Iterate through each character in the string
Check if the character is a digit
If digit, convert to integer and add to sum
posted on 13 Dec 2024
Mintu Babu lives in a smaller house than her brother and in a larger house than her parents. Her children reside with her, and she has no other relatives. If Mintu Babu's relative U lives in a larger house than her relative S, then all the following may be true except: \n\n1) S is U's father \n\n2) S is U's mother \n\n3) U is younger than S \n\n4) S is younger than U
Merge two sorted linked lists without creating new nodes by rearranging existing nodes.
Traverse both linked lists simultaneously
Compare the values of nodes and rearrange pointers accordingly
Continue until one of the lists is fully traversed
Reverse a linked list by changing the direction of pointers.
Start with three pointers: current, previous, and next.
Iterate through the linked list, updating pointers to reverse the direction.
Update the head of the linked list to be the previous node once iteration is complete.
I applied via Job Portal and was interviewed in Oct 2024. There was 1 interview round.
Yes, Postman supports data driven testing through the use of variables and data files.
Postman allows users to define variables and use them in requests for data driven testing.
Data files such as CSV or JSON can be imported into Postman to drive test data.
Iterations can be set up in Postman to run tests with different data sets.
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
There are three main types of IoT devices: consumer, commercial, and industrial.
Consumer IoT devices: Smart home devices like thermostats, lights, and security cameras.
Commercial IoT devices: Smart meters, asset tracking systems, and connected vending machines.
Industrial IoT devices: Sensors and actuators used in manufacturing, agriculture, and healthcare.
I applied via Referral and was interviewed in Jul 2024. There were 2 interview rounds.
They given me to solve 50 appittude question on different topics such as probability and statistics and various mathematics concepts etc
I am a dedicated and detail-oriented Business Analyst with experience in data analysis and process improvement.
Experienced in conducting data analysis to identify trends and insights
Skilled in process improvement and optimization
Strong communication and presentation skills
Proficient in using tools like Excel, SQL, and Tableau
Certified in Business Analysis (e.g. CBAP)
I applied via LinkedIn and was interviewed in Mar 2024. There were 3 interview rounds.
Assignment was to create an API for an expenses sharing application where users can input the total amount and the people to be shared the amount with and each individual amount in terms of either actual amount, percentage or split equally
Processes are independent instances of a program, while threads are smaller units within a process sharing resources.
Processes have their own memory space, while threads share the same memory space within a process.
Processes are heavyweight, requiring more resources, while threads are lightweight.
Processes communicate with each other through inter-process communication mechanisms, while threads can communicate directly...
Indexing in DBMS is a technique used to improve the performance of queries by allowing faster retrieval of data.
Indexes are data structures that store a small portion of the table data in an optimized format for quick retrieval.
They help in speeding up data retrieval operations like SELECT, UPDATE, DELETE queries.
Examples of indexes include primary keys, unique keys, and composite keys.
Asymmetric encryption algorithms use a pair of keys to encrypt and decrypt data, providing secure communication.
RSA (Rivest-Shamir-Adleman) is a popular asymmetric encryption algorithm.
Elliptic Curve Cryptography (ECC) is another commonly used asymmetric encryption algorithm.
Asymmetric encryption is slower than symmetric encryption but provides better security.
Public key is used for encryption and private key is used f
Different sorting methods are beneficial in different scenarios based on factors like time complexity, space complexity, and input size.
Quick Sort: Best for large datasets due to its average time complexity of O(n log n)
Bubble Sort: Simple and easy to implement, but inefficient for large datasets with its time complexity of O(n^2)
Merge Sort: Stable and efficient for large datasets with its time complexity of O(n log n)
...
ACID properties are a set of properties that guarantee reliability and consistency in database transactions.
Atomicity: Ensures that either all operations in a transaction are completed successfully or none at all.
Consistency: Ensures that the database remains in a consistent state before and after the transaction.
Isolation: Ensures that the execution of multiple transactions concurrently does not interfere with each ot...
Indexing typically uses data structures like B-trees or hash tables for efficient retrieval, with time complexity of O(log n) or O(1) respectively.
Common data structures for indexing include B-trees and hash tables
B-trees are typically used for indexing in databases due to their balanced nature and efficient search operations
Hash tables are used for indexing in scenarios where constant time lookup is desired, but may h
Time complexity of recursive fibonacci code is O(2^n)
The time complexity of a recursive fibonacci code is exponential, O(2^n)
This is because each call branches into two recursive calls, leading to exponential growth
For example, calculating fibonacci(5) would result in 15 function calls
Web Sockets is a communication protocol that provides full-duplex communication channels over a single TCP connection.
Web Sockets allow for real-time, bi-directional communication between a client and a server.
They are commonly used in chat applications, online gaming, and live data streaming.
Web Sockets use the ws:// or wss:// protocol scheme in URLs.
The protocol is initiated with a handshake between the client and se...
I applied via Job Portal and was interviewed in Jun 2024. There were 3 interview rounds.
They had given 2 assignments. One was based on some canva using plan html and js.
And othe was using nextjs that is coutdowntimer
I applied via Approached by Company and was interviewed in Jul 2024. There were 2 interview rounds.
Online Assessment for 60 min
I handle critical projects by prioritizing tasks, communicating effectively, and resolving conflicts through open dialogue and compromise.
Prioritize tasks based on urgency and impact on project timeline
Communicate clearly with team members about expectations and deadlines
Address conflicts promptly through open dialogue and seeking compromise
Encourage team members to share their perspectives and work towards a common go...
based on 9 reviews
Rating in categories
Software Developer
4
salaries
| ₹1 L/yr - ₹3.6 L/yr |
XenonStack
Verificient Technologies
Joy Technologies
Xitadel CAE Technologies