Filter interviews by
I applied via LinkedIn and was interviewed in May 2021. There were 4 interview rounds.
I appeared for an interview before Mar 2021.
Round duration - 75 minutes
Round difficulty - Medium
This was an online coding round where we had 2 questions to solve under 75 minutes. I found both the questions to be of Easy to Medium level of difficulty.
You are given several sets of points on a 2D plane, each set represented as a list of coordinates. Your task is to determine if there exists a line parallel to the Y-axis...
The task is to determine if there exists a line parallel to the Y-axis that reflects given points symmetrically.
Iterate through each test case and check if a vertical reflection line exists for the given points
Calculate the midpoint of the x-coordinates and check if it reflects the points symmetrically
Consider edge cases where points are on the reflection line or have the same x-coordinate
You are provided with a 2-dimensional matrix having N
rows and M
columns, containing only 1s (land) and 0s (water). Your goal is to determine the number of islands in t...
Count the number of islands in a 2D matrix of 1s and 0s.
Iterate through the matrix and perform depth-first search (DFS) to find connected 1s.
Mark visited cells to avoid redundant traversal.
Increment island count whenever a new island is encountered.
Round duration - 60 minutes
Round difficulty - Medium
This round had 2 coding questions followed by some questions from DBMS.
You are given an array/list HEIGHTS
of length N
, where each element represents the height of a histogram bar. The width of each bar is considered to be 1.
Find the area of the largest rectangle that can be formed within the bounds of a given histogram.
Iterate through the histogram bars and calculate the area of the largest rectangle that can be formed using each bar as the height.
Use a stack to keep track of the indices of the bars in non-decreasing order of height.
Pop elements from the stack and calculate the area until a smaller height bar is encountered.
Update the max...
Given a string 'STR' consisting solely of the characters “{”, “}”, “(”, “)”, “[” and “]”, determine if the parentheses are balanced.
The first line contains an...
The task is to determine if a given string consisting of parentheses is balanced or not.
Iterate through the characters of the string and use a stack to keep track of opening parentheses.
If an opening parenthesis is encountered, push it onto the stack.
If a closing parenthesis is encountered, check if it matches the top of the stack. If it does, pop the stack, else the string is not balanced.
At the end, if the stack is e...
ACID properties in DBMS ensure data integrity and consistency in transactions.
Atomicity: All operations in a transaction are completed successfully or none at all.
Consistency: Data is always in a valid state before and after a transaction.
Isolation: Transactions are isolated from each other to prevent interference.
Durability: Once a transaction is committed, changes are permanent and survive system failures.
Example: If...
Levels of data abstraction in a DBMS refer to the different views of data provided to users and applications.
Physical level: Deals with how data is stored on the storage media. Example: data blocks, pages, indexes.
Logical level: Focuses on how data is represented to users. Example: tables, views, constraints.
View level: Provides a customized view of the database for specific users or applications. Example: queries, rep
Round duration - 60 minutes
Round difficulty - Medium
Standard DS/Algo round with 2 coding questions followed by 2 interesting puzzles.
You are provided with an undirected graph containing 'N' vertices and 'M' edges. The vertices are numbered from 1 to 'N'. Your objective is to determi...
Detect if an undirected graph contains a cycle by exploring all possible paths.
Use Depth First Search (DFS) algorithm to traverse the graph and detect cycles.
Maintain a visited set to keep track of visited vertices and a parent pointer to avoid visiting the same vertex twice.
If a visited vertex is encountered that is not the parent of the current vertex, a cycle is present.
Consider edge cases like disconnected graphs a
Given a matrix ARR
with dimensions N
* M
, consisting only of 0s and 1s where each row is sorted, determine the index of the row that contains the highest number of 1s. If multi...
Find the row with the maximum number of 1s in a sorted matrix.
Iterate through each row of the matrix and count the number of 1s in each row
Keep track of the row index with the maximum number of 1s
Return the index of the row with the highest count of 1s
By lighting both wires at the same time, the shorter wire will burn out first, allowing you to measure a specific duration of time.
Light both wires at the same time
Measure the time it takes for the shorter wire to burn out completely
The remaining length of the longer wire will indicate the specific duration of time
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
posted on 16 Aug 2015
Network layers are a hierarchical way of organizing communication protocols.
Network layers provide a modular approach to networking.
Each layer has a specific function and communicates with adjacent layers.
The OSI model has 7 layers, while the TCP/IP model has 4 layers.
Examples of layers include the physical layer, data link layer, network layer, transport layer, and application layer.
Deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.
Occurs in multi-threaded/multi-process environments
Can lead to system freeze or crash
Prevention techniques include resource ordering and timeouts
Example: Process A holds resource X and waits for resource Y, while Process B holds resource Y and waits for resource X
Paging and Segmentation are memory management techniques used by operating systems.
Paging divides memory into fixed-size pages and stores them in physical memory.
Segmentation divides memory into logical segments and stores them in physical memory.
Paging allows for efficient use of physical memory and reduces fragmentation.
Segmentation allows for protection and sharing of memory between processes.
Examples of operating s...
Reverse a linked list using iterative and recursive methods.
Iterative method involves traversing the list and changing the pointers to reverse the order.
Recursive method involves calling the function recursively on the next node and changing the pointers.
Both methods have O(n) time complexity and O(1) space complexity.
Example: 1->2->3->4->5 becomes 5->4->3->2->1.
Clone a linked list with a random pointer.
Create a new node for each node in the original list.
Use a hash table to map the original nodes to their clones.
Iterate through the original list again and update the random pointers of the clone nodes.
I am a software developer with experience in multiple programming languages and a passion for problem-solving.
Experienced in Java, C++, and Python
Strong knowledge of data structures and algorithms
Proficient in web development using HTML, CSS, and JavaScript
Familiar with agile development methodologies
Excellent problem-solving and analytical skills
Automation framework is a set of guidelines, standards, and coding practices used to create automated test scripts.
It provides a structured way to develop and maintain automated tests
It includes tools, libraries, and reusable components
It helps in reducing the time and effort required for testing
Examples include Selenium, Appium, and Robot Framework
High severity refers to critical defects that impact the core functionality of the software, while low severity refers to minor issues that have minimal impact on functionality.
High severity issues can cause the software to crash or result in data loss.
Low severity issues are cosmetic or minor usability problems.
From a QA point of view, high severity issues are more critical as they can significantly impact the user ex...
Class is a blueprint for creating objects while interface defines a contract for classes to implement.
A class can have attributes and methods while an interface only has method signatures.
A class can be instantiated while an interface cannot.
A class can only inherit from one class while it can implement multiple interfaces.
Example: Class - Animal, Interface - Flyable
Animal can have attributes like name, age, etc. and m...
Static keyword is used to declare a variable or method that belongs to the class rather than an instance of the class.
Static variables are shared among all instances of a class
Static methods can be called without creating an instance of the class
Static blocks are used to initialize static variables
Static keyword can also be used to create nested classes
Example: public static int count;
Access modifiers control the visibility and accessibility of class members.
Public: accessible from anywhere
Private: accessible only within the class
Protected: accessible within the class and its subclasses
Default: accessible within the same package
Used to enforce encapsulation and prevent unauthorized access
Interface defines only method signatures while abstract class can have both method signatures and implementations.
An interface can be implemented by multiple classes while an abstract class can only be extended by one class.
An abstract class can have constructors while an interface cannot.
An abstract class can have instance variables while an interface cannot.
An abstract class can provide default implementations for so...
A program for login scenario using defined automation architecture.
Identify the elements on the login page such as username, password, and login button
Use automation tools like Selenium to interact with the elements and input data
Verify successful login by checking for expected elements on the landing page
Implement error handling for incorrect login credentials
Use a modular and scalable architecture for maintainability
To store and print numbers from an array using arrayList.
Create an arrayList object
Loop through the array and add each element to the arrayList using add() method
Print the arrayList using toString() method
Example: int[] arr = {1, 2, 3}; ArrayList
Test scenario for download functionality of a songs website
Verify that the download button is visible and clickable
Check that the downloaded file is in the correct format
Ensure that the downloaded file is not corrupted
Test the download speed for different file sizes
Verify that the download progress is displayed to the user
Cache stores data temporarily to reduce server load while cookies store user information for website personalization.
Cache stores frequently accessed data to reduce server load and improve website performance.
Cookies store user information such as login credentials, preferences, and shopping cart items.
Cache is temporary and can be cleared at any time, while cookies can have an expiration date.
Cache is stored on the us...
Some of the top questions asked at the Virtusa Consulting Services Senior Java Developer interview -
based on 1 interview
Interview experience
based on 8 reviews
Rating in categories
Senior Consultant
3.8k
salaries
| ₹8 L/yr - ₹30 L/yr |
Lead Consultant
3.5k
salaries
| ₹10.5 L/yr - ₹34.6 L/yr |
Software Engineer
3.3k
salaries
| ₹3.5 L/yr - ₹13.3 L/yr |
Consultant
3.3k
salaries
| ₹6 L/yr - ₹20 L/yr |
Associate Consultant
2.7k
salaries
| ₹4.6 L/yr - ₹15.2 L/yr |
Cognizant
TCS
Infosys
Accenture