i
ViaPlus by VINCI Highways
Filter interviews by
posted on 27 Jan 2025
I appeared for an interview in Dec 2024.
Authentication verifies the identity of a user, while authorization determines what actions a user is allowed to perform.
Authentication confirms the user's identity through credentials like passwords or biometrics.
Authorization controls access to resources based on the authenticated user's permissions.
Example: Logging into a system with a username and password is authentication, while being able to view or edit specifi
I applied via Job Portal
Normal basic questions
Question will be different for everyone. 1st Question (easy-medium) (Arrays/Strings) , 2nd Question(medium-hard)(Trees/Graphs)
I applied via Campus Placement and was interviewed in Sep 2024. There were 2 interview rounds.
I can demonstrate my strengths through specific examples and experiences mentioned in my resume.
Provide specific examples of projects or tasks where you utilized these strengths
Discuss any relevant achievements or accomplishments that showcase these strengths
Share feedback or testimonials from previous supervisors or colleagues that highlight these strengths
SQL is a relational database management system, while NoSQL is a non-relational database management system.
SQL uses structured query language for defining and manipulating data, while NoSQL databases use various data models like document, key-value, graph, or wide-column stores.
SQL databases are table-based, with a predefined schema, while NoSQL databases are document-based, key-value pairs, wide-column stores, or grap...
My internship was at a marketing agency where I worked on social media campaigns and market research.
Assisted in creating social media content for clients
Conducted market research to identify target audiences
Analyzed data to measure campaign success
Attended client meetings to present findings
Collaborated with team members on various projects
ViaPlus by VINCI Highways interview questions for popular designations
I applied via Referral and was interviewed before Dec 2023. There was 1 interview round.
I appeared for an interview before Jan 2024.
Real time project implementation involves developing software that processes and responds to data in real time.
Understand the requirements and constraints of the project
Choose appropriate technologies for real-time processing (e.g. Kafka, Spark)
Implement data pipelines for continuous data ingestion and processing
Ensure scalability and fault tolerance of the system
Test the system thoroughly to handle real-time data stre
Real time project implementation involves developing software that processes and displays data in real time.
Understand the requirements and constraints of the project
Choose appropriate technologies for real-time processing
Implement data streaming and processing algorithms
Ensure scalability and reliability of the system
Test the system thoroughly to handle real-time data
Monitor and optimize performance for real-time resp
I applied via Naukri.com and was interviewed before Apr 2023. There were 2 interview rounds.
ref is used for passing a variable by reference, while out is used for passing a variable by reference and also requires the variable to be initialized before passing.
ref keyword is used to pass a variable by reference, allowing the called method to modify the value of the variable.
out keyword is similar to ref, but it requires the variable to be initialized before passing to the method.
Example: int x = 10; Method(ref ...
OOPs components in C# are the building blocks of object-oriented programming, including classes, objects, inheritance, polymorphism, and encapsulation.
Classes: Blueprint for creating objects with properties and methods.
Objects: Instances of classes that hold data and behavior.
Inheritance: Ability to create new classes based on existing ones, inheriting their properties and methods.
Polymorphism: Ability to use a single ...
MVC stands for Model-View-Controller, a software design pattern for organizing code in a way that separates concerns.
Model represents the data and business logic of the application.
View is responsible for displaying the data to the user.
Controller acts as an intermediary between Model and View, handling user input and updating the Model accordingly.
Example: In a web application, the Model could be a database, the View ...
There are four types of joins in SQL Server: INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
INNER JOIN: Returns rows when there is at least one match in both tables.
LEFT JOIN: Returns all rows from the left table and the matched rows from the right table.
RIGHT JOIN: Returns all rows from the right table and the matched rows from the left table.
FULL JOIN: Returns rows when there is a match in one of the tables.
I applied via Campus Placement and was interviewed before Aug 2023. There were 3 interview rounds.
Test based on aptitude
2 medium level questions and some mcqs
I appeared for an interview before Apr 2021.
Round duration - 90 minutes
Round difficulty - Easy
It was on online objective test consisting of 4 sections: Aptitude, Technical MCQs, Code snippet based MCQs and Coding part.
Given a string 'STR' consisting solely of the characters “{”, “}”, “(”, “)”, “[” and “]”, determine if the parentheses are balanced.
The first line contains an...
The task is to determine if a given string of parentheses is balanced or not.
Iterate through the characters of the string and use a stack to keep track of opening parentheses.
When encountering an opening parenthesis, push it onto the stack. When encountering a closing parenthesis, check if it matches the top of the stack.
If the stack is empty at the end or there are unmatched parentheses, the string is not balanced.
Exa...
Determine if a given singly linked list of integers is a palindrome. Return true
if it is a palindrome, otherwise return false
.
1 -> 2 -> ...
Check if a given singly linked list of integers is a palindrome.
Use two pointers to find the middle of the linked list.
Reverse the second half of the linked list.
Compare the first half with the reversed second half to determine if it is a palindrome.
Round duration - 60 minutes
Round difficulty - Easy
This was a technical and managerial round. The interviewer gave me a situation where I am in testing team and I found that customer requirement was drop down list at a place but developer has used bullet selection, and is not ready to change it. How will you manage? I gave some good replies and he was convinced.
A virtual function is a function in a base class that is declared using the keyword 'virtual' and can be overridden by a function with the same signature in a derived class.
Virtual functions allow for dynamic polymorphism in object-oriented programming.
They are used to achieve runtime polymorphism by enabling late binding.
Virtual functions are declared in a base class and can be overridden in derived classes.
Example: v...
Level order traversal of a binary tree in spiral form involves alternating between left and right while traversing each level.
Start by pushing the root node into a queue.
While the queue is not empty, pop a node, print its value, and push its children into the queue.
For each level, alternate between popping nodes from the queue and printing their values from left to right or right to left.
Continue this process until all
Abstract classes in C++ are classes that cannot be instantiated and are designed to be base classes for other classes.
Abstract classes may contain pure virtual functions, making them incomplete and unable to be instantiated.
Derived classes must implement all pure virtual functions from the abstract class in order to be concrete classes.
Abstract classes can have non-virtual functions and member variables like regular cl...
Round duration - 60 minutes
Round difficulty - Easy
This was also a technical round. He asked to optimize the code I wrote in coding round. Then he asked me a few puzzles and questions on OOPS, OS and DBMS.
ACID properties are a set of properties that guarantee the reliability of transactions in database management systems.
ACID stands for Atomicity, Consistency, Isolation, and Durability.
Atomicity ensures that either all operations in a transaction are completed successfully or none of them are.
Consistency ensures that the database remains in a consistent state before and after the transaction.
Isolation ensures that the e...
Paging and segmentation are memory management techniques in operating systems.
Paging divides physical memory into fixed-size blocks called pages, while segmentation divides logical memory into variable-size segments.
Paging allows for efficient memory allocation and management, while segmentation provides protection and sharing of memory.
Paging is simpler to implement but can lead to internal fragmentation, while segmen...
Concurrency control is a technique used in databases to manage simultaneous access and modification of data by multiple users or processes.
Concurrency control ensures that transactions are executed in a way that maintains data consistency and integrity.
Techniques like locking, timestamp ordering, and optimistic concurrency control are used to implement concurrency control.
For example, in a banking system, concurrency c...
String Buffer is synchronized and thread-safe, while String Builder is not synchronized and faster.
String Buffer is synchronized, making it thread-safe for use in multi-threaded environments.
String Builder is not synchronized, resulting in faster performance but not thread-safe.
String Builder is preferred for single-threaded operations, while String Buffer is preferred for multi-threaded operations.
Smart pointers in C++ are objects that act like pointers but provide automatic memory management.
Smart pointers help prevent memory leaks by automatically managing memory allocation and deallocation.
Examples include unique_ptr, shared_ptr, and weak_ptr.
unique_ptr is used for exclusive ownership, shared_ptr for shared ownership, and weak_ptr to prevent circular references.
Mutex is used for exclusive access to a resource, while semaphore is used for controlling access to a resource by multiple threads.
Mutex is binary and allows only one thread to access the resource at a time.
Semaphore can have a count greater than one, allowing multiple threads to access the resource simultaneously.
Mutex is typically used for protecting critical sections of code, while semaphore is used for synchronizat...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
Program for snake traversal of binary tree
Use a stack to keep track of nodes to be visited
Start with the root node and push it onto the stack
While the stack is not empty, pop a node and print its value
If the level is even, push the left child first and then the right child onto the stack
If the level is odd, push the right child first and then the left child onto the stack
Code to check if linked list is palindrome without using any other data structure and in a single traversal.
Traverse the linked list using two pointers, one slow and one fast
Reverse the first half of the linked list while traversing
Compare the reversed first half with the second half of the linked list
based on 8 interviews
Interview experience
based on 42 reviews
Rating in categories
Software Engineer
64
salaries
| ₹4.8 L/yr - ₹9 L/yr |
Senior Software Engineer
11
salaries
| ₹9 L/yr - ₹19.5 L/yr |
Principal Software Engineer
10
salaries
| ₹13.8 L/yr - ₹28 L/yr |
Senior Test Engineer
6
salaries
| ₹9.4 L/yr - ₹15.4 L/yr |
Devops Engineer
5
salaries
| ₹4 L/yr - ₹6.3 L/yr |
Aurigo
Prime Focus Technologies
Yodlee
Algonomy