i
Vehere
Filter interviews by
I applied via Naukri.com and was interviewed before Dec 2023. There was 1 interview round.
In my current position, I provide technical support to customers, troubleshoot issues, and resolve technical problems.
Providing technical support to customers
Troubleshooting technical issues
Resolving technical problems
Collaborating with other teams to address complex issues
Top trending discussions
A pointer to pointer is a variable that stores the memory address of another pointer variable.
It is used to create dynamic data structures like linked lists and trees.
It allows multiple levels of indirection.
It is denoted by ** in C and C++.
Example: int **ptr;
Example: ptr = &p; where p is a pointer variable.
posted on 2 Jul 2024
Main principles of Java include object-oriented programming, platform independence, and automatic memory management.
Object-oriented programming: Java is based on classes and objects, allowing for encapsulation, inheritance, and polymorphism.
Platform independence: Java code can run on any platform that has a Java Virtual Machine (JVM) installed.
Automatic memory management: Java uses garbage collection to automatically m
The == operator compares the memory addresses of two objects, while the equals method compares the content of two objects.
The == operator is used to compare the memory addresses of two objects in Java.
The equals method is used to compare the content of two objects in Java.
Example: String str1 = new String("hello"); String str2 = new String("hello"); str1 == str2 will return false, but str1.equals(str2) will return true
posted on 9 May 2024
I applied via Campus Placement and was interviewed in Apr 2024. There were 2 interview rounds.
Tha aptitude exam was not very easy and not that difficult. It was something which one can easily get into.
posted on 18 Jul 2024
I applied via Naukri.com and was interviewed before Jul 2023. There were 2 interview rounds.
IPC mechanism in Windows allows communication between processes through shared memory, message passing, and synchronization.
IPC mechanisms in Windows include named pipes, mailslots, shared memory, and sockets.
Named pipes allow communication between processes on the same machine or over a network.
Mailslots are used for one-way interprocess communication.
Shared memory allows processes to share data by mapping a region of...
Multi-threading in Windows allows multiple threads to run concurrently within a single process.
Windows provides APIs like CreateThread and CreateProcess to create and manage threads.
Threads share the same memory space within a process, allowing for efficient communication and resource sharing.
Windows supports both user-mode and kernel-mode threads, with user-mode threads being more lightweight.
Synchronization mechanism...
Memory mapping in Windows allows files to be mapped directly into memory for faster access and manipulation.
Memory mapping allows files to be accessed as if they were in memory
File mapping can be used for sharing data between processes
Improves performance by reducing disk I/O operations
Examples: CreateFileMapping, MapViewOfFile, UnmapViewOfFile
Critical section in Windows is a synchronization mechanism used to protect shared resources from concurrent access.
Critical sections are used to ensure mutual exclusion between threads accessing shared resources.
They are implemented using the Windows API functions InitializeCriticalSection, EnterCriticalSection, and LeaveCriticalSection.
Critical sections are more efficient than mutexes for synchronization within a sing...
posted on 8 Dec 2024
I applied via Campus Placement and was interviewed before Apr 2023. There were 2 interview rounds.
Normal apptitude queations were asked in this round
I applied via Campus Placement and was interviewed before Oct 2023. There was 1 interview round.
posted on 14 Nov 2024
Ransomware is a type of malware that encrypts a user's files and demands payment in exchange for the decryption key.
Ransomware is typically spread through phishing emails, malicious websites, or software vulnerabilities.
Once a user's files are encrypted, the ransomware will display a message demanding payment in cryptocurrency.
Paying the ransom does not guarantee that the files will be decrypted, and it may encourage f...
based on 2 interviews
Interview experience
based on 7 reviews
Rating in categories
Software Engineer
10
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
9
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Software Engineer
8
salaries
| ₹0 L/yr - ₹0 L/yr |
Test Engineer
8
salaries
| ₹0 L/yr - ₹0 L/yr |
Product Engineer
7
salaries
| ₹0 L/yr - ₹0 L/yr |
Paladion Networks
FireEye
QUICK HEAL TECHNOLOGIES
TCS