i
Synopsys
Filter interviews by
I applied via Campus Placement and was interviewed before Jun 2023. There was 1 interview round.
Authentication verifies the identity of a user, while authorization determines what actions a user is allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics.
Authorization controls access to resources based on the authenticated user's permissions.
Authentication precedes authorization in the access control process.
Example: Logging into a system (authentication) ...
Top trending discussions
A confusion matrix is a table that is often used to describe the performance of a classification model.
It is a matrix with rows representing the actual class and columns representing the predicted class.
It helps in evaluating the performance of a classification model by showing the number of correct and incorrect predictions.
It consists of four quadrants: True Positive, False Positive, True Negative, and False Negative...
Principal component analysis is a statistical technique used to reduce the dimensionality of data while preserving important information.
PCA is used to identify patterns in data and express it in a more easily understandable form.
It works by finding the directions (principal components) along which the variance of the data is maximized.
These principal components are orthogonal to each other, meaning they are uncorrelat...
Inventory policy is a set of guidelines for managing inventory levels, while inventory control method is the process of implementing those guidelines.
Inventory policy determines when to order new inventory and how much to order
Inventory control method involves tracking inventory levels, forecasting demand, and optimizing order quantities
Examples of inventory policies include Just-in-Time (JIT) and Economic Order Quanti...
Reverse logistics is the process of moving goods from their final destination back to the manufacturer or point of origin for resale, recycling, or disposal.
Involves returning products from customers to the manufacturer or retailer
Includes activities such as returns, refurbishment, recycling, or disposal
Helps in reducing waste and maximizing value from returned products
Examples: returning a defective product to the man...
I applied via Company Website and was interviewed before Oct 2023. There was 1 interview round.
How do you maintain the admin configuration in Microsoft Dynamic CRM?
I applied via Naukri.com and was interviewed before Mar 2022. There were 4 interview rounds.
Generic analytical problem and case study on a problem statement given
Use cases study , they review on design approach , and business skills
The Aptitude test was tough!
posted on 21 Apr 2025
I appeared for an interview before Apr 2024, where I was asked the following questions.
To fetch the 3rd highest salary, SQL queries can utilize ranking functions or subqueries for effective retrieval.
Using Subquery: A common method is to use a subquery to select distinct salaries and then limit the results. Example: SELECT DISTINCT salary FROM employees ORDER BY salary DESC LIMIT 1 OFFSET 2;
Using DENSE_RANK: SQL's DENSE_RANK function can rank salaries and allow for easy retrieval of the 3rd highest. Exam...
I applied via Referral and was interviewed before Dec 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Jul 2024. There were 2 interview rounds.
Few standard dsa questions were asked.
Projects are specific tasks or assignments that require a set of skills and resources to achieve a particular goal or outcome.
Projects involve defining objectives and deliverables
They require planning, execution, and monitoring
Projects often have timelines and budgets
Examples: Data analysis project to identify customer trends, Project to implement a new software system
posted on 7 May 2017
I appeared for an interview in Feb 2017.
malloc is a function in C that dynamically allocates memory on the heap. It is used to allocate memory for variables or data structures.
malloc is used in C programming language.
It is used to allocate memory on the heap.
malloc is different from 'new' in C++ as it does not call constructors for objects.
C++ is a general-purpose programming language while Objective C is a superset of C used for iOS and macOS development.
C++ is widely used for developing applications, games, and system software.
Objective C is mainly used for iOS and macOS development.
C++ supports both procedural and object-oriented programming paradigms.
Objective C is an object-oriented language with dynamic runtime features.
C++ has a larger community a...
Class container is a class that holds objects of other classes, while class composition is a way to combine multiple classes to create a new class.
Class container holds objects of other classes, acting as a collection or container.
Class composition combines multiple classes to create a new class with its own behavior and attributes.
In class container, the objects are typically stored in a data structure like an array o...
Divide the horses into groups of 5 and race them. Take the top 2 from each race and race them again. Finally, race the top 2 horses to determine the top 3.
Divide the horses into 3 groups of 5 and race them.
Take the top 2 horses from each race and race them again.
Finally, race the top 2 horses to determine the top 3.
Developing a real-time data processing system for a high-traffic e-commerce website
Implemented a distributed system architecture to handle large volumes of data
Optimized algorithms for efficient data processing and storage
Utilized caching mechanisms to improve system performance
Worked closely with cross-functional teams to troubleshoot and resolve issues
Example: Successfully reduced data processing time by 50% by imple...
Seeking new challenges and opportunities for growth.
Looking for a more challenging role to further develop my skills
Interested in exploring new technologies and industries
Seeking better career advancement opportunities
Want to work in a more collaborative team environment
The width of a tree is the maximum number of nodes at any level in the tree.
To calculate the width of a tree, we can perform a level order traversal and keep track of the maximum number of nodes at any level.
We can use a queue data structure to perform the level order traversal.
At each level, we count the number of nodes in the queue and update the maximum width if necessary.
posted on 10 May 2015
Locate sum of 2 numbers in a linear array (unsorted and sorted) and their complexities
For unsorted array, use nested loops to compare each element with every other element until the sum is found
For sorted array, use two pointers approach starting from the beginning and end of the array and move them towards each other until the sum is found
Complexity for unsorted array is O(n^2) and for sorted array is O(n)
Pointers are used to manipulate memory addresses and values in C++. Increment/decrement, address of and value at operators are commonly used.
Incrementing a pointer moves it to the next memory location of the same data type
Decrementing a pointer moves it to the previous memory location of the same data type
The address of operator (&) returns the memory address of a variable
The value at operator (*) returns the value sto...
To determine if a point is inside or outside a rectangle, we check if the point's coordinates fall within the rectangle's boundaries.
Check if the point's x-coordinate is greater than the left edge of the rectangle
Check if the point's x-coordinate is less than the right edge of the rectangle
Check if the point's y-coordinate is greater than the top edge of the rectangle
Check if the point's y-coordinate is less than the b...
To find line that divides rectangle into 2 equal halves through a point inside it.
Find the center of the rectangle
Draw a line from the center to the given point
Extend the line to the opposite side of the rectangle
The extended line will divide the rectangle into 2 equal halves
There are multiple combinations of 8-bit and 16-bit signed numbers. How many such combinations are possible?
There are 2^8 (256) possible combinations of 8-bit signed numbers.
There are 2^16 (65,536) possible combinations of 16-bit signed numbers.
To find the total number of combinations, we can add the number of combinations of 8-bit and 16-bit signed numbers.
Therefore, the total number of possible combinations is 256 + ...
Find duplicates in an array of elements in 0(n) time and 0(1) space.
Use the property of inputs to your advantage
Iterate through the array and mark elements as negative
If an element is already negative, it is a duplicate
Return all the negative elements as duplicates
Generate all combinations of digits from an array, allowing and disallowing repetition.
Use recursion or backtracking to generate combinations.
For repetition allowed: e.g., arr={1,2}, combinations are 11, 12, 21, 22.
For repetition not allowed: e.g., arr={1,2,3}, combinations are 123, 132, 213, 231, 312, 321.
Utilize a set to track used digits when repetition is not allowed.
based on 1 interview experience
Difficulty level
R&D Engineer
160
salaries
| ₹8.1 L/yr - ₹27.6 L/yr |
Staff Engineer
159
salaries
| ₹18 L/yr - ₹48 L/yr |
Senior R&D Engineer
92
salaries
| ₹15 L/yr - ₹35 L/yr |
Software Engineer
75
salaries
| ₹6.5 L/yr - ₹25 L/yr |
Security Consultant
73
salaries
| ₹5.8 L/yr - ₹16.9 L/yr |
Intel
Apar Industries
Molex
TDK India Private Limited