Filter interviews by
I applied via Approached by Company and was interviewed in Nov 2024. There was 1 interview round.
I applied via Campus Placement and was interviewed in Aug 2024. There were 2 interview rounds.
First round is aptitude test, it didn't have any technical questions, then later on there is 1 technical, 1 HR+Technical and 1 CEO or HR round.
Code to find number of solutions for jumps problem in array.
Use dynamic programming to keep track of number of ways to reach each index.
Initialize an array to store number of ways to reach each index.
Iterate through the array and update the number of ways based on previous indices.
Return the number of ways to reach the last index.
Use dynamic programming to find the longest palindromic substring in a given string.
Iterate through the string and consider each character as the center of a potential palindrome
Expand around the center to check for palindromes of odd and even lengths
Keep track of the longest palindrome found
I was interviewed before Apr 2022.
Top trending discussions
I applied via Naukri.com and was interviewed in Oct 2024. There were 3 interview rounds.
Online zoom coding test will be there - 4 questions - 2 about output of code & 2 about technical questions.
Polymorphism is the ability of a single function or method to operate on different types of data.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
Virtual polymorphism is achieved through virtual functions in C++.
Virtual functions allow a function in a base class to be overridden in a derived class.
Example: Animal class with virtual function 'makeSound' overridden in Dog a
Virtual polymorphism allows objects of different classes to be treated as objects of a common superclass.
Create a base class with virtual functions
Create derived classes that override the virtual functions
Use pointers or references of the base class to call the overridden functions
Hackearth online coding test for 1 hour
Use sorting or heap data structure to find k largest elements in an array of strings.
Sort the array in descending order and return the first k elements.
Use a max heap data structure to efficiently find the k largest elements.
Examples: ['apple', 'banana', 'orange', 'kiwi'], k=2 -> ['orange', 'kiwi']
Remove duplicates from array of strings
Create a Set to store unique strings
Iterate through the array and add each string to the Set
Convert the Set back to an array to get the unique strings
posted on 4 Nov 2024
I applied via Approached by Company and was interviewed in Jun 2024. There were 3 interview rounds.
Design a RESTful API for CRUD operations on user resources.
Use HTTP methods like GET, POST, PUT, DELETE for CRUD operations
Create endpoints like /users for listing all users, /users/{id} for specific user
Use status codes like 200 for success, 404 for not found, 400 for bad request
Implement authentication and authorization mechanisms for security
Include request and response body formats like JSON or XML
posted on 25 Jul 2024
I applied via Company Website and was interviewed in Jun 2024. There were 4 interview rounds.
There were 3 coding questions of moderate difficulty.
Transpose a matrix by swapping rows with columns
Iterate through each row and column and swap the elements
Create a new matrix with swapped rows and columns
Ensure the new matrix has the correct dimensions
Implement a swap method for two variables.
Create a temporary variable to store the value of one variable.
Assign the value of the second variable to the first variable.
Assign the value of the temporary variable to the second variable.
The depth of a binary tree is the number of edges on the longest path from the root node to a leaf node.
Depth of a binary tree can be calculated recursively by finding the maximum depth of the left and right subtrees and adding 1.
The depth of a binary tree with only one node (the root) is 0.
Example: For a binary tree with root node A, left child B, and right child C, the depth would be 1.
To find the middle element of a linked list, use two pointers - one moving at double the speed of the other.
Use two pointers - slow and fast, with fast moving at double the speed of slow.
When fast reaches the end of the list, slow will be at the middle element.
I want to join Hashedin because of its reputation for innovative projects and collaborative work environment.
Reputation for innovative projects
Collaborative work environment
Opportunities for growth and learning
Managing tight deadlines and learning new technologies were the main challenges faced in my previous internship.
Meeting tight project deadlines
Adapting to new technologies quickly
Working in a fast-paced environment
Collaborating with team members effectively
OOPS stands for Object-Oriented Programming System. It is a programming paradigm based on the concept of objects.
OOPS focuses on creating objects that contain data and methods to manipulate that data.
It allows for encapsulation, inheritance, and polymorphism.
Examples of OOPS languages include Java, C++, and Python.
Dependency Injection is a design pattern where components are given their dependencies rather than creating them internally.
Allows for easier testing by mocking dependencies
Promotes loose coupling between components
Improves code reusability and maintainability
Example: Constructor injection, Setter injection
Normalization in SQL is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a table into smaller tables and defining relationships between them.
It helps in reducing data redundancy by storing data in a structured manner.
There are different normal forms like 1NF, 2NF, 3NF, and BCNF that define the level of normalization.
Example: If we have a t...
posted on 18 Sep 2024
I applied via Shine and was interviewed in Aug 2024. There were 2 interview rounds.
Normal coding round with simple oa complexity
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
Consumers read data from topics, while producers write data to topics in Kafka.
Consumers subscribe to topics to read messages from them
Producers publish messages to topics for consumers to read
Consumers can be part of a consumer group to scale out consumption
Producers can specify key for messages to control partitioning
based on 1 review
Rating in categories
Software Engineer
139
salaries
| ₹4 L/yr - ₹15.2 L/yr |
Cloud Engineer
108
salaries
| ₹4 L/yr - ₹16 L/yr |
Cloud Consultant
86
salaries
| ₹6.6 L/yr - ₹21 L/yr |
Analyst
67
salaries
| ₹2 L/yr - ₹6 L/yr |
Data Engineer
50
salaries
| ₹4.2 L/yr - ₹14.5 L/yr |
WNS
Genpact
TCS
Infosys