Filter interviews by
Optimize page performance by reducing load times through various strategies like caching, lazy loading, and efficient queries.
Implement caching strategies (e.g., Redis or Memcached) to store frequently accessed data.
Use lazy loading for images and other resources to load them only when they are in the viewport.
Optimize database queries by using indexing and avoiding N+1 query problems.
Minimize HTTP requests by com...
Find the largest palindrome substring in a given string.
Iterate through the string and check for palindromes of odd and even lengths.
Keep track of the largest palindrome found so far.
Use dynamic programming to optimize the solution.
Example: 'babad' -> 'bab' or 'aba'.
To give group and user permissions in Linux, use the chmod command.
Use the chmod command followed by the permission code (e.g. 755) and the file or directory name.
To give permissions to a specific user, use the chown command followed by the username and file or directory name.
To give permissions to a specific group, use the chgrp command followed by the group name and file or directory name.
A cron job can be run using the crontab command in Unix/Linux systems.
Open the terminal and type 'crontab -e' to edit the cron table.
Add a new line with the desired schedule and command to run.
Save and exit the editor to activate the cron job.
Use 'crontab -l' to list all current cron jobs.
Use 'crontab -r' to remove all cron jobs.
Sort numbers in string format using Python
Convert the array of strings to an array of integers using map()
Sort the array of integers using sorted()
Convert the sorted array of integers back to an array of strings using map()
Code is pushed to Github using Git commands through the terminal or a Git client.
Create a new repository on Github
Clone the repository to your local machine
Make changes to the code and commit them using Git commands
Push the changes to Github using Git commands
Execution of non-existent file
An error message is displayed indicating the file does not exist
The program may crash or terminate abruptly
The operating system may throw an exception
The program may prompt the user to create the file
Kubernetes was chosen due to its superior orchestration capabilities and larger community support.
Kubernetes has better load balancing and scaling features
Kubernetes has a larger community and more resources available
Docker Swarm is simpler and easier to use for smaller projects
Kubernetes is more suitable for complex, large-scale applications
Swap two numbers without using third variable
Use arithmetic operators to swap values
Addition and subtraction can be used to swap values
XOR operator can also be used to swap values
Reverse a string without using array
Use two pointers, one at the start and one at the end of the string
Swap the characters at the two pointers and move the pointers towards each other
Repeat until the pointers meet in the middle of the string
Online test on mettl
Dependency Injection is a design pattern that allows a class to receive its dependencies from an external source rather than creating them internally.
Promotes loose coupling between classes, making code easier to manage and test.
Facilitates unit testing by allowing mock dependencies to be injected.
Commonly used in frameworks like Spring (Java) and Angular (JavaScript).
Example: Instead of a class instantiating its own d...
Optimize page performance by reducing load times through various strategies like caching, lazy loading, and efficient queries.
Implement caching strategies (e.g., Redis or Memcached) to store frequently accessed data.
Use lazy loading for images and other resources to load them only when they are in the viewport.
Optimize database queries by using indexing and avoiding N+1 query problems.
Minimize HTTP requests by combinin...
I applied via Referral and was interviewed in Mar 2021. There were 3 interview rounds.
Swap two numbers without using third variable
Use arithmetic operators to swap values
Addition and subtraction can be used to swap values
XOR operator can also be used to swap values
Reverse a string without using array
Use two pointers, one at the start and one at the end of the string
Swap the characters at the two pointers and move the pointers towards each other
Repeat until the pointers meet in the middle of the string
Find the largest palindrome substring in a given string.
Iterate through the string and check for palindromes of odd and even lengths.
Keep track of the largest palindrome found so far.
Use dynamic programming to optimize the solution.
Example: 'babad' -> 'bab' or 'aba'.
Sort numbers in string format using Python
Convert the array of strings to an array of integers using map()
Sort the array of integers using sorted()
Convert the sorted array of integers back to an array of strings using map()
Execution of non-existent file
An error message is displayed indicating the file does not exist
The program may crash or terminate abruptly
The operating system may throw an exception
The program may prompt the user to create the file
To give group and user permissions in Linux, use the chmod command.
Use the chmod command followed by the permission code (e.g. 755) and the file or directory name.
To give permissions to a specific user, use the chown command followed by the username and file or directory name.
To give permissions to a specific group, use the chgrp command followed by the group name and file or directory name.
Docker is a platform for developing, shipping, and running applications using containerization technology.
Docker allows developers to package their applications and dependencies into a container that can run on any system
Containers are lightweight and provide isolation, making it easy to deploy and scale applications
Docker Hub is a repository of pre-built images that can be used to quickly deploy applications
Docker Com...
Kubernetes is an open-source container orchestration platform that automates deployment, scaling, and management of containerized applications.
Kubernetes is used to manage containerized applications across multiple hosts.
It automates deployment, scaling, and management of containerized applications.
It provides a platform for deploying, scaling, and managing containerized applications.
Kubernetes is highly scalable and f...
Kubernetes was chosen due to its superior orchestration capabilities and larger community support.
Kubernetes has better load balancing and scaling features
Kubernetes has a larger community and more resources available
Docker Swarm is simpler and easier to use for smaller projects
Kubernetes is more suitable for complex, large-scale applications
Code is pushed to Github using Git commands through the terminal or a Git client.
Create a new repository on Github
Clone the repository to your local machine
Make changes to the code and commit them using Git commands
Push the changes to Github using Git commands
git clone copies a repository to local machine while git fork creates a copy on GitHub.
git clone downloads the entire repository to local machine
git fork creates a copy of the repository on GitHub
git clone is used to work on an existing repository
git fork is used to contribute to someone else's repository
git clone creates a local copy of the repository
git fork creates a remote copy of the repository
Maven is a build automation tool used primarily for Java projects.
Maven manages dependencies and builds the project using a pom.xml file
It simplifies the build process by providing a standard way of building and packaging projects
Maven can also generate reports and documentation for the project
Example: mvn clean install - compiles, tests, and packages the project
To change the owner of a file in Linux, use the chown command.
Use the chown command followed by the new owner's username and the file name.
To change the owner and group, use chown followed by the new owner's username, a colon, the new group's name, and the file name.
To change the owner of a directory and its contents, use the -R option with chown.
Example: chown newowner myfile.txt
Example: chown newowner:newgroup myfile...
A cron job can be run using the crontab command in Unix/Linux systems.
Open the terminal and type 'crontab -e' to edit the cron table.
Add a new line with the desired schedule and command to run.
Save and exit the editor to activate the cron job.
Use 'crontab -l' to list all current cron jobs.
Use 'crontab -r' to remove all cron jobs.
Top trending discussions
I appeared for an interview before Apr 2024, where I was asked the following questions.
I applied via Naukri.com and was interviewed in Dec 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Dec 2020. There were 3 interview rounds.
I applied via Referral and was interviewed in May 2022. There was 1 interview round.
I am a dedicated professional with experience in project management and a passion for driving team success in dynamic environments.
I have over 5 years of experience in project management, leading cross-functional teams to deliver projects on time and within budget.
In my last role at XYZ Corp, I managed a team of 10, overseeing the successful launch of a new product line that increased revenue by 20%.
I joined XYZ Corp b...
BGC in initiation time can be done by conducting thorough background checks on potential employees.
Conduct reference checks with previous employers
Verify educational qualifications and certifications
Perform criminal background checks
Check social media profiles for any red flags
Ensure all necessary documentation is provided and verified
Train HR personnel on proper BGC procedures
BGC reports can be checked by verifying the authenticity of the report and reviewing the information provided.
Verify the authenticity of the report by checking the source and ensuring it is from a reputable agency.
Review the information provided in the report, including criminal history, employment history, and education.
Check for any discrepancies or red flags in the report, such as gaps in employment or criminal conv...
QC can be checked through various methods including visual inspection, statistical sampling, and testing equipment.
Perform visual inspection to ensure product meets specifications
Use statistical sampling to check for consistency and identify any trends
Utilize testing equipment such as calipers, gauges, and spectrometers to measure product attributes
Establish a quality control plan and regularly review and update it
Trai...
posted on 16 Jan 2025
String related questions
based on 2 interview experiences
Senior Consultant
16
salaries
| ₹20 L/yr - ₹33.3 L/yr |
Consultant
12
salaries
| ₹13.7 L/yr - ₹26.4 L/yr |
Senior Software Engineer
8
salaries
| ₹18 L/yr - ₹30 L/yr |
Software Engineer2
7
salaries
| ₹13.2 L/yr - ₹18 L/yr |
Software Engineer Level 1
7
salaries
| ₹7.7 L/yr - ₹11.2 L/yr |
G4S
Security and Intelligence Services (India)
Border Security Force
Central Industrial Security Force