Filter interviews by
I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.
To rotate a matrix by 90 degrees clockwise, transpose the matrix and then reverse each row. To rotate anticlockwise, reverse each row and then transpose.
Transpose the matrix by swapping elements at (i, j) with (j, i)
Reverse each row of the transposed matrix
To rotate anticlockwise, reverse each row of the original matrix and then transpose
There are three common methods to compress images: lossless compression, lossy compression, and resizing.
Lossless compression reduces file size without losing any image quality. Examples include PNG and GIF formats.
Lossy compression reduces file size by discarding some image data. Examples include JPEG format.
Resizing reduces file size by changing the dimensions of the image. It can be done manually or using image proc
Identify the most recent duplicate in an array of strings.
Iterate through the array and keep track of the indices of each string using a hashmap.
If a string is already present in the hashmap, update its index.
After iterating through the array, find the string with the highest index in the hashmap.
There are 3 possible triangles that can be formed using the two lines.
To form a triangle, we need three points.
With two lines, we have a total of four points.
By choosing any three points, we can form a triangle.
Therefore, there are 3 possible triangles.
The function should return the element k from a Binary Search Tree (BST).
Traverse the BST in-order and keep track of the current element
If the current element is equal to k, return it
If the current element is greater than k, move to the left subtree
If the current element is less than k, move to the right subtree
Repeat until the element is found or the entire tree is traversed
The question is asking for a solution to find the nearest element to a given element in an array.
Iterate through the array and calculate the absolute difference between each element and the given element.
Keep track of the minimum difference encountered and the corresponding element.
Return the element with the minimum difference as the nearest element.
Top trending discussions
I applied via Campus Placement and was interviewed in Jan 2016. There were 3 interview rounds.
Yes
Knowledge of network protocols and architectures
Understanding of data structures and algorithms
Experience with network troubleshooting and analysis
Familiarity with network security and encryption
Proficiency in network programming and socket programming
The test went well, I was able to complete all the tasks within the given time frame.
I prepared well for the test by reviewing relevant materials
I managed my time effectively during the test
I was able to solve all the problems and complete all the tasks
I double-checked my work to ensure accuracy
I applied via Referral
Program to print binary tree elements in spiral order
Use two stacks to keep track of nodes at odd and even levels
Push nodes from left to right in odd level stack and right to left in even level stack
Pop nodes from the stack alternatively and print them
Repeat until both stacks are empty
Entering a URL in the browser triggers a series of events to retrieve and display the requested webpage.
The browser checks the cache for a previously stored copy of the webpage
If not found, the browser sends a request to the DNS server to resolve the domain name to an IP address
The browser then sends a request to the web server at the IP address for the webpage
The web server responds with the requested webpage
The brows...
MAC addresses are required for identifying devices on a local network, while IP addresses are used for identifying devices on a global network.
MAC addresses are used for communication within a local network
IP addresses are used for communication across different networks
MAC addresses are assigned by the manufacturer and cannot be changed
IP addresses can be assigned dynamically or statically
MAC addresses are used in the...
Developed a web application for tracking inventory and sales data
Used React.js for front-end development
Implemented RESTful APIs using Node.js and Express for back-end
Utilized MongoDB for database management
Integrated authentication and authorization features for secure access
Designed user-friendly interface with responsive design
An ArrayList is a dynamic array in Java that can grow or shrink in size during runtime.
ArrayList is a class in Java's Collection framework.
It implements the List interface and allows duplicate elements.
Elements can be added or removed using methods like add(), remove(), etc.
It can also be sorted using the sort() method.
Example: ArrayList
names.add("John"); names.add("Mary"); names.remove(0);
ArrayList is a resizable array while LinkedList is a doubly linked list.
ArrayList is faster for accessing elements while LinkedList is faster for adding or removing elements.
ArrayList uses contiguous memory while LinkedList uses non-contiguous memory.
ArrayList is better for random access while LinkedList is better for sequential access.
Example: ArrayList - List
Java is not a pure OO language due to primitive types not being objects.
Primitive types like int, boolean, etc. are not objects in Java
They do not have methods or inheritance like objects do
This violates the principle of everything being an object in pure OO languages
Wrapper classes like Integer, Boolean, etc. were introduced to provide object-like behavior for primitives
Object-oriented languages support inheritance and polymorphism, while object-based languages do not.
Object-oriented languages allow for the creation of classes and objects, and support inheritance and polymorphism.
Object-based languages only support objects, but do not have the concept of classes or inheritance.
Examples of object-oriented languages include Java, C++, and Python, while JavaScript is an example of an obj
Inheritance is a way to create new classes based on existing ones. Abstraction is a way to hide implementation details.
Inheritance allows a subclass to inherit properties and methods from a superclass.
Abstraction allows a class to provide a simplified interface to its users while hiding its implementation details.
For example, a Car class can inherit properties and methods from a Vehicle class, while also implementing i...
I applied via Referral
No, as a software engineer, you may not have the necessary experience or skills to work as an IT manager.
Software engineers typically focus on coding and technical aspects, while IT managers are responsible for overseeing projects, teams, and budgets.
IT managers need strong leadership, communication, and decision-making skills, which may not be the primary focus of a software engineer.
Consider gaining experience in pro...
OSI stack has 7 layers that define how data is transmitted over a network.
OSI stands for Open Systems Interconnection
Each layer has a specific function and communicates with adjacent layers
Layers are: Physical, Data Link, Network, Transport, Session, Presentation, Application
A router is needed to connect two computers in different networks or to share internet connection.
When two computers are in different networks, a router is needed to connect them.
A router can also be used to share internet connection between multiple devices.
Routers can provide additional security features like firewall and VPN.
Examples of routers include Cisco, Netgear, and TP-Link.
IPv4 has 32 bits and IPv6 has 128 bits.
IPv4 addresses are in the format of xxx.xxx.xxx.xxx where each xxx is an 8-bit number.
IPv6 addresses are in the format of xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx where each xxxx is a 16-bit number.
IPv6 addresses allow for a much larger number of unique addresses than IPv4.
IPv6 is needed due to the exhaustion of IPv4 addresses and the need for more unique IP addresses.
IPv6 provides a significantly larger address space compared to IPv4.
It allows for the allocation of unique IP addresses to every device connected to the internet.
IPv6 supports improved security features and better network performance.
It enables the growth of Internet of Things (IoT) devices and services.
Transitioning to IPv...
A /24 address can have 256 clients. Network address is the first IP and broadcast address is the last IP.
A /24 address has 256 IP addresses
The network address is the first IP in the range
The broadcast address is the last IP in the range
Anycast, unicast, and multicast are different ways of routing network traffic.
Unicast is one-to-one communication between a sender and a receiver.
Anycast is one-to-nearest communication where the sender sends a message to the nearest receiver.
Multicast is one-to-many communication where the sender sends a message to a group of receivers.
Anycast is used for load balancing and finding the nearest server.
Unicast is used f...
Virtual memory is a memory management technique that allows a computer to use more memory than physically available.
Virtual memory is created by using hard disk space as an extension of RAM.
It allows running more programs than the physical memory can handle.
The size of virtual memory is typically larger than the size of main memory.
Virtual memory is divided into pages, which are swapped in and out of main memory as nee...
I rate myself 8 in C and 7 in web technologies.
I have extensive experience in C programming and have worked on multiple projects using it.
In web technologies, I have a good understanding of HTML, CSS, and JavaScript, but there is always room for improvement.
I am constantly learning and improving my skills in both areas.
My strengths include problem-solving skills, attention to detail, and strong programming abilities.
Strong problem-solving skills - able to analyze complex problems and come up with effective solutions
Attention to detail - meticulous in writing code and ensuring it is error-free
Strong programming abilities - proficient in multiple programming languages such as Java, Python, and C++
I applied via Campus Placement and was interviewed in Dec 2016. There were 3 interview rounds.
Program to reverse an integer
Convert the integer to a string
Reverse the string
Convert the reversed string back to an integer
I have worked on various projects including a web application for inventory management and a mobile app for task tracking.
Developed a web application using React for inventory management, allowing users to track stock levels and generate reports.
Created a mobile app using Flutter for task tracking, enabling users to create, assign, and track tasks in real-time.
Collaborated with a team of developers to integrate APIs an...
Yes, I am interested in studying further to enhance my skills and knowledge in software engineering.
Interested in pursuing a Master's degree in Computer Science
Enrolling in online courses to learn new technologies and programming languages
Attending workshops and conferences to stay updated with industry trends
Reverse a linked list without using extra memory
Iterate through the linked list and change the next pointers to reverse the list
Use three pointers - prev, current, and next - to keep track of the reversed list
Start with prev and current pointing to null and the head of the linked list respectively
While traversing the list, update the next pointer of the current node to point to the previous node
Move prev and current po...
Data structures are fundamental concepts in software engineering that organize and store data efficiently.
Arrays: Simple and efficient for storing and accessing elements.
Linked Lists: Dynamic and flexible, efficient for insertion and deletion.
Stacks: LIFO structure, useful for managing function calls and undo operations.
Queues: FIFO structure, ideal for managing tasks and scheduling.
Trees: Hierarchical structure, used ...
The difference is that 'int arr[5]' creates an array on the stack, while 'malloc(5*sizeof(int))' allocates memory on the heap.
int arr[5] creates an array of 5 integers on the stack, which is a fixed-size memory allocation.
malloc(5*sizeof(int)) dynamically allocates memory on the heap, allowing for variable-size memory allocation.
The memory allocated with malloc must be explicitly freed with free() to avoid memory leaks
I am a passionate software engineer with a strong background in computer science and experience in developing innovative solutions.
Completed a Bachelor's degree in Computer Science from XYZ University
Proficient in programming languages such as Java, Python, and C++
Worked on various projects including a mobile app for tracking fitness goals
Familiar with Agile development methodologies and version control systems like Gi
In 5 years, I see myself as a senior software engineer leading a team of developers on innovative projects.
Continuing to enhance my technical skills and knowledge through ongoing learning and certifications
Taking on more leadership responsibilities and mentoring junior team members
Contributing to the development of cutting-edge software solutions for the company
Possibly pursuing opportunities for advancement within the...
I tend to overthink details and can be overly critical of my own work.
Overthinking details can lead to delays in completing tasks
Being overly critical can hinder progress and confidence
Yes, I am interested in studying further to enhance my skills and stay updated with the latest technologies.
I believe continuous learning is essential in the fast-paced tech industry
Further studies can help me specialize in a specific area of software engineering
Advanced degrees or certifications can open up new career opportunities
Some of the top questions asked at the Riverbed Technology Software Engineer interview -
based on 2 reviews
Rating in categories
Member Technical Staff
42
salaries
| ₹0 L/yr - ₹0 L/yr |
Escalation Engineer
19
salaries
| ₹0 L/yr - ₹0 L/yr |
Technical Lead
12
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
6
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
6
salaries
| ₹0 L/yr - ₹0 L/yr |
Cisco
Juniper Networks
VMware Software
Palo Alto Networks