Filter interviews by
I applied via Job Fair and was interviewed in Jul 2024. There were 4 interview rounds.
Neural Hack 6 - Round 1 - 7 DSA Question I have solved 5 only
Round 2 - 5 DSA Problem I'm able to solve only 3 not able to top 100 but call for interview
The most efficient sorting algorithm is Quick Sort due to its average time complexity of O(n log n).
Quick Sort is efficient due to its divide and conquer approach.
It has an average time complexity of O(n log n) and a worst-case time complexity of O(n^2).
Example: Sorting an array of integers using Quick Sort.
OOPS stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects, which can contain data and code.
OOPS focuses on creating objects that interact with each other to solve a problem
Key principles of OOPS include encapsulation, inheritance, polymorphism, and abstraction
Encapsulation: bundling data and methods that operate on the data into a single unit
Inheritance: allows a class to...
I developed a mobile app for tracking daily water intake and exercise routines.
Implemented user-friendly interface for easy input of water intake and exercise details
Integrated push notifications to remind users to drink water and exercise regularly
Used Firebase for backend data storage and retrieval
Faced challenges with optimizing app performance on older devices
Encountered issues with syncing data across multiple dev
Code to reverse an array of strings
Use a loop to iterate through half of the array and swap elements at opposite ends
Create a temporary variable to hold one element during swapping
Ensure to handle odd length arrays by not swapping the middle element
Company policies outline rules and guidelines for employees to follow.
Company policies cover areas such as dress code, attendance, code of conduct, and benefits.
Examples of company policies include a policy on remote work, a policy on social media usage, and a policy on harassment.
Employees are expected to adhere to company policies to maintain a positive work environment and ensure compliance with legal regulations.
Dynamic programming, back tracking, string operations, etc.,
I am a dedicated and hardworking individual with relevant skills and experience that align with the requirements of the position.
I have a strong work ethic and am committed to delivering high-quality results.
My previous experience in similar roles has equipped me with the necessary skills and knowledge to excel in this position.
I am a quick learner and adaptable to new environments and challenges.
I am passionate about ...
Yes, I faced difficulties in managing tight deadlines and coordinating with team members.
Managing tight deadlines was challenging due to unexpected delays in the project timeline.
Coordinating with team members was difficult as everyone had different schedules and priorities.
Communication issues arose when team members were not clear on their roles and responsibilities.
Technical challenges also impacted the project prog...
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
BASIC APTITUDE LEARNING
BASIC CODING QUESTIONS
What people are saying about Virtusa Consulting Services
I applied via Job Portal
Discussion about information security fundamentals and CIA traid
Virtusa Consulting Services interview questions for designations
I applied via Campus Placement and was interviewed before Aug 2022. There were 4 interview rounds.
Basic and medium problems
An array is a data structure that stores a collection of elements of the same type in a contiguous memory location.
Arrays have a fixed size determined at the time of declaration.
Elements in an array are accessed using an index starting from 0.
Example: string[] names = {"Alice", "Bob", "Charlie"};
I applied via Campus Placement and was interviewed before Aug 2022. There were 5 interview rounds.
This was easy. All questions were answerable.
Number of coding questions are 3 and 3 are able to solve.
I applied via Campus Placement and was interviewed before Jun 2022. There were 4 interview rounds.
Common aptitude questions
Common coding questions
I appeared for an interview in Mar 2017.
I am a highly motivated individual with a passion for learning and a strong work ethic.
I have a Bachelor's degree in Computer Science
I have completed several internships in software development
I am proficient in Java, Python, and C++
I am a quick learner and enjoy taking on new challenges
I intend to gain practical experience in my field of study and contribute to the company's success.
Learn about the company's operations and culture
Assist with projects and tasks assigned by my supervisor
Collaborate with team members and offer innovative ideas
Improve my skills and knowledge in my field of study
My strengths include adaptability, problem-solving, and communication.
Adaptability: I am able to quickly adjust to new situations and environments.
Problem-solving: I enjoy finding creative solutions to complex problems.
Communication: I am able to effectively convey ideas and information to others.
I plan to continue learning and growing in my field while also exploring new opportunities for personal and professional development.
Pursue advanced education or certifications
Seek out mentorship and networking opportunities
Explore different industries and roles to broaden my skillset
Set specific goals and regularly evaluate progress
Remain adaptable and open to new challenges
I applied via Campus Placement and was interviewed in Aug 2020. There was 1 interview round.
Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.
Three way handshake involves three steps: SYN, SYN-ACK, and ACK.
The client sends a SYN packet to the server to initiate the connection.
The server responds with a SYN-ACK packet, acknowledging the client's request.
Finally, the client sends an ACK packet to the server, confirming the connection establishme...
SSL and TLS are both cryptographic protocols used to secure internet communications.
SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.
TLS stands for Transport Layer Security and is the successor to SSL.
TLS is more secure than SSL and offers better encryption algorithms.
TLS also supports newer protocols and ciphers, while SSL does not.
SSL is vulnerable to attacks such as ...
Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.
Switches work on layer 2 of the OSI model and routers work on layer 3.
Switches are used to connect devices within a network and forward data based on MAC addresses.
Types of switches include unmanaged, managed, and layer 3 switches.
Routers are used to connect different networks and forward data based ...
CIA Triad ensures data security. DOS attack can cause loss of availability.
CIA Triad stands for Confidentiality, Integrity, and Availability.
It ensures data security by protecting against unauthorized access, alteration, and destruction.
DOS attack can cause loss of availability by overwhelming a system with traffic or requests.
This can result in the system becoming unresponsive or crashing, making the data unavailable...
Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.
SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.
UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.
ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.
Other types of packet...
Cryptography is the practice of secure communication in the presence of third parties.
Symmetric-key cryptography
Asymmetric-key cryptography
Hash functions
Encryption algorithms
Digital signatures
MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.
MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.
MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.
SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384,...
I applied via Job Fair and was interviewed before Mar 2023. There was 1 interview round.
Revenue recognition is the process of identifying and recording revenue earned by a company in a specific period.
Recognize revenue when it is realized or realizable and earned
Revenue is considered realized when goods or services are delivered
Revenue is considered earned when the company has substantially completed what it needs to do to be entitled to the benefits represented by the revenue
Use accrual accounting method...
based on 9 interviews
3 Interview rounds
based on 34 reviews
Rating in categories
Senior Consultant
3.8k
salaries
| ₹8 L/yr - ₹30 L/yr |
Lead Consultant
3.5k
salaries
| ₹10.5 L/yr - ₹34.6 L/yr |
Software Engineer
3.3k
salaries
| ₹3.5 L/yr - ₹13.3 L/yr |
Consultant
3.3k
salaries
| ₹6 L/yr - ₹20 L/yr |
Associate Consultant
2.7k
salaries
| ₹4.7 L/yr - ₹15.1 L/yr |
Cognizant
TCS
Infosys
Accenture