Filter interviews by
I applied via Naukri.com and was interviewed in Sep 2023. There were 2 interview rounds.
Use caching to avoid loading large file on every post API hit
Implement a caching mechanism to store the loaded file data in memory
Check if the file has been loaded before making the API call, if so, retrieve data from cache
Set a time-to-live (TTL) for the cached data to ensure it stays up to date
Consider using a distributed caching system like Redis for better performance
Use hashing to efficiently sort and find duplicates in a large list of numbers.
Use a hash table to store counts of each number from 1 to 100.
Iterate through the list of numbers and increment the count in the hash table for each number.
Finally, iterate through the hash table and output the numbers with count greater than 1 as duplicates.
Find paired substring from main string
Iterate through the main string and check for pairs of substrings
Use a hashmap to keep track of seen substrings
Return an array of paired substrings
I applied via Approached by Company and was interviewed before May 2017. There were 6 interview rounds.
I applied via Naukri.com and was interviewed in Mar 2020. There was 1 interview round.
As an Education Counselor of a leading ad-tech MNC, I would manage real-life situations with professionalism and empathy.
I would listen actively to the concerns of clients and provide tailored solutions.
I would maintain a positive and proactive attitude towards challenges.
I would stay up-to-date with industry trends and developments to provide the best advice.
I would prioritize building strong relationships with client...
I applied via Other and was interviewed in Feb 2018. There were 4 interview rounds.
I was interviewed before May 2016.
I was interviewed in Feb 2017.
I was interviewed before May 2016.
posted on 24 Feb 2017
I was interviewed in Jul 2016.
I was interviewed before Feb 2016.
I was interviewed in Nov 2016.
Active Directory is a Microsoft service that manages network resources and user accounts.
It provides a centralized location for network administration and security.
It allows for the creation and management of user accounts, groups, and computers.
It enables authentication and authorization for network resources.
It can be used to manage access to applications and services.
Examples of resources that can be managed include...
TCS
Accenture
Wipro
Cognizant