Veritas
30+ Interview Questions and Answers
You are given a string of length ‘N’ containing only the following characters: ‘[’, ‘{’, ‘(’, ‘)’, ‘}’, ‘]’. At some places, there is ‘X’ in place of any bracket. Your task is...read more
Q2. Tell all things that happen inside a system when we press 'k' on the notepad.
Pressing 'k' on Notepad triggers a series of events including key press event, character insertion, and potential text manipulation.
When 'k' is pressed, a key press event is triggered
The key press event is captured by the Notepad application
The character 'k' is inserted at the current cursor position
If any text is selected, it may be replaced by the character 'k'
The cursor position is updated to the next position
If auto-save is enabled, the document may be saved
Given a string, determine if it is a palindrome, considering only alphanumeric characters.
Palindrome
A palindrome is a word, number, phrase, or other sequences of characters which read the sam...read more
What is semaphore?
Critical section problem.
Q5. Implement LRU
LRU (Least Recently Used) is a caching algorithm that removes the least recently used item when the cache is full.
LRU uses a combination of a doubly linked list and a hash map.
The doubly linked list keeps track of the order of recently used items.
The hash map allows for efficient lookup of items in the cache.
When a new item is accessed, it is moved to the front of the list.
If the cache is full, the item at the end of the list is evicted.
Q6. What proper paper you for legal clearing.
The proper paper for legal clearing is typically a legal clearance form or document.
Legal clearance forms or documents are necessary to ensure compliance with legal requirements.
These papers may include background checks, consent forms, and legal agreements.
Examples of proper papers for legal clearing may include a signed non-disclosure agreement, a background check report, or a consent form for data processing.
Q7. Put vs post vs Patch request
PUT is used to update an existing resource, POST is used to create a new resource, PATCH is used to update a part of an existing resource.
PUT replaces the entire resource with the new one
POST creates a new resource with a new URI
PATCH updates a part of the existing resource
PUT and POST are idempotent, PATCH is not
PUT and PATCH are safe, POST is not
Q8. What challenges you face while reviewing SOW ?
Q9. What is difference between SOW and MSA?
Q10. What do you mean by forecasting
Q11. Previous project and os concept
Developed a project using the concept of operating systems to optimize resource allocation and improve performance.
Implemented process scheduling algorithms like Round Robin and Priority Scheduling.
Utilized memory management techniques such as paging and segmentation.
Used synchronization mechanisms like semaphores and mutexes to prevent race conditions.
Q12. Peak element in rotated sorted array
Peak element in rotated sorted array
Peak element is greater than its neighbors
Binary search can be used to find peak element
Consider edge cases like array with only one element or no peak element
Q13. Array vs Arraylist
Array is a fixed size collection of elements while ArrayList is a dynamic collection that can grow or shrink.
Arrays are faster and more memory efficient than ArrayLists.
Arrays can only store elements of the same data type while ArrayLists can store any type of object.
ArrayLists have built-in methods for adding, removing, and sorting elements while arrays require manual manipulation.
Arrays are typically used for small collections with a fixed size while ArrayLists are used for...read more
Q14. what are docker
Docker is a platform for developing, shipping, and running applications in containers.
Docker allows developers to package an application and its dependencies into a container that can run on any system.
Containers are lightweight, standalone, and executable packages that include everything needed to run a piece of software.
Docker provides tools for managing containers, such as Docker Engine for building and running containers, Docker Compose for defining multi-container applic...read more
Q15. Implement stack using queue
Implement stack using queue by using two queues and maintaining the order of elements.
Use two queues to simulate stack operations - push, pop, top.
For push operation, add element to queue1.
For pop operation, move all elements from queue1 to queue2 except the last one, then remove and return the last element.
For top operation, move all elements from queue1 to queue2 except the last one, then return the last element without removing it.
Q16. What is Prepaid contract?
Q17. How do you analyse contracts?
I analyse contracts by reviewing terms, conditions, pricing, and legal implications.
Review all terms and conditions outlined in the contract
Analyze pricing structures and payment terms
Assess legal implications and obligations for both parties
Ensure compliance with company policies and regulations
Negotiate any necessary changes or amendments
Q18. What types of khatas
Khatas are types of traditional account books used in India for maintaining financial records.
Khatas are commonly used in businesses like retail shops, grocery stores, and small-scale enterprises.
There are different types of khatas based on the purpose and format, such as Bahi Khata, Ledger Khata, and Cash Book Khata.
Bahi Khata is a general-purpose account book used for recording daily transactions and maintaining customer accounts.
Ledger Khata is a more detailed account book...read more
Q19. Left view of binary tree
The left view of a binary tree shows the nodes that are visible when looking at the tree from the left side.
The left view of a binary tree can be obtained by performing a level order traversal and keeping track of the first node at each level.
Example: For a binary tree with root node 1, left child 2, and right child 3, the left view would be [1, 2].
Q20. What is expected ctc.
The expected CTC for the Operations Buyer position is negotiable based on experience and qualifications.
Expected CTC will depend on the candidate's level of experience in procurement and operations.
Qualifications such as certifications or relevant degrees may impact the offered CTC.
Negotiation skills can also play a role in determining the final CTC.
Research industry standards for Operations Buyer roles to get an idea of the expected salary range.
Q21. Explain basics of Excel & Powerbi
Excel is a spreadsheet program used for data analysis and organization, while Power BI is a business analytics tool for visualizing data.
Excel is used for creating spreadsheets, organizing data, and performing calculations.
Power BI is a business analytics tool that allows users to visualize and share insights from their data.
Excel can be used to create charts, graphs, and pivot tables to analyze data.
Power BI connects to various data sources to create interactive reports and ...read more
Q22. What is Purchase Order
Q23. differnce between softlink and hardlink
Softlinks are pointers to the original file while hardlinks are direct references to the file's inode.
Softlinks are symbolic links that point to the original file by its path.
Hardlinks are direct references to the file's inode on the disk.
Softlinks can span across different file systems while hardlinks cannot.
If the original file is deleted, softlinks become broken but hardlinks still point to the file data.
Softlinks have different inode numbers and permissions, while hardlin...read more
Q24. Coin change problem
The coin change problem involves finding the minimum number of coins needed to make a certain amount of change.
Use dynamic programming to solve this problem efficiently.
Start by creating a table to store the minimum number of coins needed for each amount from 0 to the target amount.
Iterate through each coin denomination and update the table accordingly.
Return the value in the table corresponding to the target amount as the minimum number of coins needed.
Q25. stl vs collectin in java
STL (Standard Template Library) is a library of generic algorithms, data structures, and iterators in C++. Collections in Java are interfaces and classes that represent data structures.
STL in C++ provides containers like vectors, lists, maps, etc. for storing data and algorithms for manipulating them.
Collections in Java include interfaces like List, Set, Map, and classes like ArrayList, HashSet, HashMap, etc.
STL is part of the C++ standard library, while Collections are part ...read more
Q26. Types of DEED
DEED stands for Deed of Trust, Deed of Reconveyance, and Deed of Release.
Deed of Trust is a legal document used in real estate transactions.
Deed of Reconveyance is a document that transfers the title of property from a trustee back to the borrower.
Deed of Release is a document that releases a lien on a property.
Q27. Sort zeroes to end of array
Sort zeroes to end of array
Iterate through the array and move all zeroes to the end
Use two pointers approach to swap elements
Maintain a count of zeroes encountered
Q28. Explain joins in dbms?
Joins in DBMS are used to combine rows from two or more tables based on a related column between them.
Joins are used to retrieve data from multiple tables based on a related column.
Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
INNER JOIN returns rows when there is at least one match in both tables.
LEFT JOIN returns all rows from the left table and the matched rows from the right table.
RIGHT JOIN returns all rows from the right table and the ma...read more
Q29. Explain linux details
Linux is an open-source operating system based on Unix that is widely used in servers, desktops, and embedded systems.
Linux is free and open-source, meaning anyone can modify and distribute it.
It is based on Unix and follows a multi-user, multitasking model.
Linux uses a command-line interface, but also has graphical user interfaces like GNOME and KDE.
Common distributions include Ubuntu, CentOS, and Debian.
Q30. What is linkedlist
A linked list is a data structure that consists of nodes where each node contains a data field and a reference to the next node in the sequence.
Consists of nodes connected by pointers or references
Can be singly linked (each node points to the next node) or doubly linked (each node points to the next and previous nodes)
Allows for dynamic memory allocation and efficient insertion/deletion operations
Example: Singly linked list: 1 -> 2 -> 3 -> 4 -> null
Q31. What is copy maps
Copy maps are data structures used to create a shallow copy of an existing map.
Copy maps are commonly used in programming languages like JavaScript and Go.
They allow you to duplicate the key-value pairs of a map into a new map.
The new map shares the same references to the values as the original map.
If any of the values in the original map are modified, the corresponding values in the copy map will also be modified.
Copy maps are useful when you want to create a new map with th...read more
More about working at Veritas
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month