i
RWS Group
Filter interviews by
Civil engineering questions
Top trending discussions
I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.
To rerun a failed Cucumber test case, use the cucumber command with the --tags option.
Identify the failed test case by reviewing the test results or logs.
Add a unique tag to the failed test case in the feature file.
Run the cucumber command with the --tags option and specify the tag of the failed test case.
The cucumber command will rerun only the failed test case.
I applied via Recruitment Consulltant and was interviewed before Jan 2024. There were 2 interview rounds.
Aptitude test based on logical and testing basics
posted on 15 Aug 2023
I was interviewed before Aug 2022.
posted on 16 Aug 2015
Network layers are a hierarchical way of organizing communication protocols.
Network layers provide a modular approach to networking.
Each layer has a specific function and communicates with adjacent layers.
The OSI model has 7 layers, while the TCP/IP model has 4 layers.
Examples of layers include the physical layer, data link layer, network layer, transport layer, and application layer.
Deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.
Occurs in multi-threaded/multi-process environments
Can lead to system freeze or crash
Prevention techniques include resource ordering and timeouts
Example: Process A holds resource X and waits for resource Y, while Process B holds resource Y and waits for resource X
Paging and Segmentation are memory management techniques used by operating systems.
Paging divides memory into fixed-size pages and stores them in physical memory.
Segmentation divides memory into logical segments and stores them in physical memory.
Paging allows for efficient use of physical memory and reduces fragmentation.
Segmentation allows for protection and sharing of memory between processes.
Examples of operating s...
Developed a web-based project management tool for a startup
Used React for the frontend and Node.js for the backend
Implemented user authentication and authorization using JWT
Integrated with third-party APIs such as Trello and Slack
Implemented real-time updates using WebSockets
Deployed on AWS using EC2 and RDS
Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.
Start with 0 and 1 as the first two numbers
Add the previous two numbers to get the next number
Repeat until desired number of terms
I am a software engineer with experience in developing web applications and mobile apps.
Proficient in programming languages such as Java, Python, and JavaScript
Skilled in using frameworks like React, Angular, and Spring Boot
Experienced in working with databases such as MySQL and MongoDB
Familiar with Agile development methodologies and DevOps practices
There are numerous ways to use a box full of pencils depending on the context and purpose.
Pencils can be used for writing, drawing, sketching, coloring, shading, and more.
They can be used for artistic purposes, schoolwork, office work, or personal use.
Pencils can also be used as a tool for measurement, as a makeshift stylus, or even as a musical instrument.
The number of ways to use a box full of pencils is virtually li...
My dream is to build innovative software solutions that positively impact people's lives.
Developing cutting-edge technology
Creating user-friendly interfaces
Solving complex problems
Collaborating with talented individuals
Making a difference in society
Continuous learning and growth
Reverse a linked list using iterative and recursive methods.
Iterative method involves traversing the list and changing the pointers to reverse the order.
Recursive method involves calling the function recursively on the next node and changing the pointers.
Both methods have O(n) time complexity and O(1) space complexity.
Example: 1->2->3->4->5 becomes 5->4->3->2->1.
Clone a linked list with a random pointer.
Create a new node for each node in the original list.
Use a hash table to map the original nodes to their clones.
Iterate through the original list again and update the random pointers of the clone nodes.
based on 1 review
Rating in categories
Software Engineer
143
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
108
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
100
salaries
| ₹0 L/yr - ₹0 L/yr |
Project Manager
91
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Project Manager
79
salaries
| ₹0 L/yr - ₹0 L/yr |
Lionbridge Technologies
Welocalize
TransPerfect
Cohizon Life Sciences Limited