i
AppInventiv
Technologies
Filter interviews by
Do-follow links are links that allow search engines to follow them and pass link juice, while no-follow links do not allow search engines to follow them.
Do-follow links help in improving search engine rankings
No-follow links do not pass link juice to the linked website
Do-follow links are used for natural linking, while no-follow links are used for paid links or user-generated content
DA considers multiple factors including domain age, size, popularity, and backlink profile.
Domain age is an important factor in determining DA.
The size of the domain, in terms of number of pages and content, also influences DA.
Popularity of the domain, measured by traffic and engagement, plays a role in DA.
Backlink profile, quality and quantity of backlinks pointing to the domain, is a key factor in DA calculation...
Backlinks are created under the <a> HTML tag.
Backlinks are created using the <a> tag in HTML.
The href attribute within the <a> tag specifies the URL of the page the link goes to.
Example: <a href='https://www.example.com'>Example</a>
Yes, domain authority is a key factor in website ranking as it indicates the credibility and trustworthiness of a website.
Domain authority is a metric developed by Moz to predict how well a website will rank on search engine result pages (SERPs).
Websites with higher domain authority are more likely to rank higher in search results compared to websites with lower domain authority.
Domain authority is influenced by f...
Link juice refers to the value or equity passed from one site to another through hyperlinks.
Link juice helps improve a website's search engine ranking.
High-quality backlinks provide more link juice.
Internal linking can also distribute link juice within a website.
Domain authority is a metric developed by Moz to predict how well a website will rank on search engine results pages, while domain rating is a metric developed by Ahrefs to measure the backlink profile strength of a website.
Domain authority is developed by Moz, while domain rating is developed by Ahrefs.
Domain authority predicts website ranking on search engine results pages, while domain rating measures backlink ...
Some names of Google's algorithms include Panda, Penguin, Hummingbird, and RankBrain.
Panda - focuses on content quality and penalizes low-quality content
Penguin - targets spammy link building practices
Hummingbird - improves search query understanding
RankBrain - uses machine learning to improve search results
Backlinks are links from one website to another. They are important for SEO as they signal to search engines that the linked website is valuable and trustworthy.
Backlinks can be created through guest posting on other websites.
Participating in forums and including a link to your website in your signature can also create backlinks.
Reaching out to influencers or bloggers in your industry for collaborations or mention...
I applied via Naukri.com and was interviewed in Jul 2023. There were 2 interview rounds.
Domain authority is a metric developed by Moz to predict how well a website will rank on search engine results pages, while domain rating is a metric developed by Ahrefs to measure the backlink profile strength of a website.
Domain authority is developed by Moz, while domain rating is developed by Ahrefs.
Domain authority predicts website ranking on search engine results pages, while domain rating measures backlink profi...
Yes, domain authority is a key factor in website ranking as it indicates the credibility and trustworthiness of a website.
Domain authority is a metric developed by Moz to predict how well a website will rank on search engine result pages (SERPs).
Websites with higher domain authority are more likely to rank higher in search results compared to websites with lower domain authority.
Domain authority is influenced by factor...
Link juice refers to the value or equity passed from one site to another through hyperlinks.
Link juice helps improve a website's search engine ranking.
High-quality backlinks provide more link juice.
Internal linking can also distribute link juice within a website.
Domain authority is a metric developed by Moz to predict how well a website will rank on search engine results pages.
Domain authority is scored on a scale of 1 to 100, with higher scores indicating a greater ability to rank.
It is based on factors like the number of backlinks, quality of backlinks, and overall website quality.
Websites with high domain authority are more likely to rank higher in search engine results.
Dom...
DA considers multiple factors including domain age, size, popularity, and backlink profile.
Domain age is an important factor in determining DA.
The size of the domain, in terms of number of pages and content, also influences DA.
Popularity of the domain, measured by traffic and engagement, plays a role in DA.
Backlink profile, quality and quantity of backlinks pointing to the domain, is a key factor in DA calculation.
Backlinks are links from one website to another. They are important for SEO as they signal to search engines that the linked website is valuable and trustworthy.
Backlinks can be created through guest posting on other websites.
Participating in forums and including a link to your website in your signature can also create backlinks.
Reaching out to influencers or bloggers in your industry for collaborations or mentions can...
Backlinks are created under the <a> HTML tag.
Backlinks are created using the <a> tag in HTML.
The href attribute within the <a> tag specifies the URL of the page the link goes to.
Example: <a href='https://www.example.com'>Example</a>
Do-follow links are links that allow search engines to follow them and pass link juice, while no-follow links do not allow search engines to follow them.
Do-follow links help in improving search engine rankings
No-follow links do not pass link juice to the linked website
Do-follow links are used for natural linking, while no-follow links are used for paid links or user-generated content
Top trending discussions
I appeared for an interview before Apr 2021.
Round duration - 40 minutes
Round difficulty - Medium
The test has 3 sections :
1. Quantitative contains 20 questions. These questions are easy to me. If u practice quant, you can easily solve it.
2. Technical contains 20 questions. Some questions are on C , C++ , java outputs. Remaining are based on DSA. If u Know all the time complexities of algorithms then it is easy . In technical they gave one DSA problem.
3. Essay: They have given one picture and then asked to write an essay by seeing the picture.
Given an undirected graph with 'V' vertices labeled from 0 to V-1 and 'E' edges. Each edge has a weight that represents the distance between two nodes 'X' and 'Y'.
...
Dijkstra's algorithm is used to find the shortest path distances from a source node to all other vertices in a graph.
Dijkstra's algorithm is a greedy algorithm that finds the shortest path from a source node to all other nodes in a graph.
It uses a priority queue to select the node with the smallest distance and relaxes its neighbors.
The algorithm maintains a distance array to keep track of the shortest distances from t...
Round duration - 60 minutes
Round difficulty - Easy
3 persons are there in panel. They are asking questions on basic concepts in subjects and some advanced concepts.
A daemon process is a background process that runs continuously to perform system tasks.
Daemon processes do not have a controlling terminal.
They typically run in the background and perform tasks such as managing hardware devices, network services, or system maintenance.
Examples of daemon processes include cron, sshd, and apache.
Daemon processes are often started during system boot and run until the system is shut down.
System calls provide a way for user-level processes to interact with the operating system kernel.
System calls allow user programs to request services from the operating system.
They provide a secure and controlled way for applications to access system resources.
System calls enable processes to perform tasks such as file operations, network communication, and process management.
Examples of system calls include open(), re...
The select() system call is used in Unix-like operating systems to monitor multiple file descriptors for activity.
select() allows a program to wait for multiple I/O operations to complete on multiple file descriptors.
It takes three sets of file descriptors as arguments - readfds, writefds, and errorfds.
The function will block until an activity is detected on one of the file descriptors or until a timeout occurs.
select(...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I appeared for an interview before Apr 2021.
Round duration - 45 minutes
Round difficulty - Medium
Technical Interview round with questions on DSA.
Given a binary tree, your task is to convert it into its mirror tree.
A binary tree is a data structure where each parent node has at most two children.
The mirror ...
Given an array of integers, find the maximum sum of any contiguous subarray within the array.
array = [34, -50, 42, 14, -5, 86]
137
Find the maximum sum of any contiguous subarray within an array in O(N) time complexity.
Iterate through the array and keep track of the maximum sum of subarrays encountered so far
At each index, decide whether to include the current element in the subarray or start a new subarray
Update the maximum sum if a new maximum is found
Example: For array [34, -50, 42, 14, -5, 86], the maximum sum subarray is [42, 14, -5, 86] with...
Round duration - 45 minutes
Round difficulty - Hard
Technical Interview round with questions on DSA.
Your task is to determine the size of the largest subtree of a given binary tree which is also a Binary Search Tree (BST).
Find the size of the largest subtree in a binary tree that is also a Binary Search Tree (BST).
Traverse the binary tree in a bottom-up manner to check if each subtree is a BST.
Keep track of the size of the largest BST subtree encountered so far.
Use the properties of a BST to determine if a subtree is a valid BST.
Consider edge cases such as empty tree or single node tree.
Example: For input 1 2 3 4 -1 5 6 -1 7 -1 -1 -1 -1...
Given a positive integer n
, the task is to find the next smallest integer and the previous largest integer that contain the exact same nu...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
To find the maximum length BST in a given binary tree.
Traverse the tree in post-order fashion
For each node, check if it satisfies the BST property
If it does, calculate the size of the BST rooted at that node
Keep track of the maximum size seen so far
Algorithm to find absolute max subsequence of an array with positive and negative numbers in O(n) time.
Initialize max_so_far and max_ending_here as 0
Loop through the array and for each element, add it to max_ending_here
If max_ending_here becomes negative, reset it to 0
If max_ending_here is greater than max_so_far, update max_so_far
Return max_so_far
Eliminate duplicates in an array of strings and print it in linear time complexity.
Use a hash set to keep track of unique elements
Iterate through the array and add non-duplicate elements to the hash set
Print the hash set elements to get the final array
Balancing of Btrees / AVL trees is important for efficient search and insertion operations.
Btrees and AVL trees are self-balancing binary search trees.
Balancing ensures that the height of the tree is minimized, leading to faster search and insertion operations.
Btrees are used in databases while AVL trees are used in memory.
Balancing is achieved by performing rotations and node splitting.
AVL trees have a stricter balanc...
139 teams in a knock-out tournament, find the number of matches to choose the champion.
In a knock-out tournament, each team plays only one match per round.
The number of matches required to choose the champion is one less than the number of teams.
Therefore, the number of matches required is 138.
My resume includes projects such as a web-based inventory management system and a mobile app for tracking fitness goals.
Developed a web-based inventory management system using PHP and MySQL
Created a mobile app for tracking fitness goals using React Native
Implemented RESTful APIs for communication between front-end and back-end
Utilized version control tools such as Git for collaborative development
Designed and implement...
Algorithm to mirror a given Binary Tree
Create a function to swap left and right child nodes of a given node
Recursively call the function on left and right child nodes
Base case: if node is null, return
Call the function on the root node of the binary tree
Find the next largest int with same number of 1's in binary.
Count the number of 1's in the binary representation of the given int.
Increment the given int until a number with the same number of 1's is found.
Return the next largest int with same number of 1's.
Answering OOP Java design problems
Identify the problem domain and create a class hierarchy
Use encapsulation to hide implementation details
Apply inheritance to reuse code and create subtypes
Implement polymorphism to allow objects to take on multiple forms
Avoid tight coupling and favor composition over inheritance
Use design patterns to solve common problems
Consider SOLID principles for maintainable code
Default constructor is provided by the compiler if no constructor is defined. Copy constructor creates a new object by copying an existing object.
Default constructor initializes member variables to default values.
Copy constructor creates a new object with the same values as an existing object.
Default constructor is called automatically by the compiler if no constructor is defined.
Copy constructor is called when an obje...
Library functions are pre-written code that can be reused to perform common tasks.
Library functions save time and effort by providing pre-written code.
They are often included in programming languages or external libraries.
Examples include functions for string manipulation, mathematical calculations, and file input/output.
Library functions can be called from within a program to perform specific tasks.
They can also be cu...
Primary key uniquely identifies a record in a table, while unique key ensures that all values in a column are distinct.
Primary key can't have null values, while unique key can have one null value.
A table can have only one primary key, but multiple unique keys.
Primary key is used as a foreign key in other tables, while unique key is not.
Example: Primary key - employee ID, Unique key - email address.
Assembly is a low-level programming language that is used to write programs that can directly interact with computer hardware.
Assembly language is specific to a particular computer architecture.
It is a low-level language that is difficult to read and write.
Assembly language programs are faster and more efficient than programs written in high-level languages.
Examples of assembly language include x86, ARM, and MIPS.
Assem...
Serialization is the process of converting an object into a format that can be stored or transmitted.
Serialization is used to save the state of an object and recreate it later.
It is commonly used in network communication to transmit data between different systems.
Examples of serialization formats include JSON, XML, and binary formats like Protocol Buffers.
Deserialization is the opposite process of converting serialized...
Truncate removes all data from a table while Delete removes specific data from a table.
Truncate is faster than Delete as it doesn't log individual row deletions.
Truncate resets the identity of the table while Delete doesn't.
Truncate can't be rolled back while Delete can be.
Truncate doesn't fire triggers while Delete does.
Recursion function is a function that calls itself until a base condition is met.
Recursion is a technique used to solve problems by breaking them down into smaller sub-problems.
It involves a function calling itself with a modified input until a base case is reached.
Recursion can be used to solve problems such as factorial, Fibonacci series, and binary search.
Recursion can be implemented using loops as well, but it may ...
Software industry offers endless opportunities for innovation and growth.
Software industry is constantly evolving and offers opportunities to work on cutting-edge technologies.
It provides a platform to solve complex problems and create innovative solutions.
The demand for software engineers is high and the industry offers competitive salaries.
Core industries may have limited scope for growth and innovation compared to s...
Program to print a given string in reverse
Create a character array of the given string
Loop through the array from end to start and print each character
Mux is a device that selects one of several input signals and forwards the selected input into a single output line.
Mux stands for Multiplexer.
It is used in digital circuits to select one of several input signals and forward the selected input into a single output line.
It is used in communication systems to combine multiple signals into a single channel for transmission.
It is used in video and audio systems to switch b...
DeMux is short for Demultiplexer. It is a digital circuit that takes one input and directs it to multiple outputs.
DeMux is used in digital communication systems to separate signals that have been combined for transmission.
It is also used in computer memory systems to select a specific memory location.
DeMux is used in video and audio systems to separate different channels of information.
It is used in automation systems ...
Decoder converts encoded data into a readable format while Demux separates a single input into multiple outputs.
Decoder is used to decode encoded data such as binary data into a readable format.
Demux is used to separate a single input into multiple outputs based on the control signals.
Decoder is a combinational circuit while Demux is a sequential circuit.
Decoder is used in applications such as remote controls, computer...
Amadeus Labs is a leading technology company in the travel industry.
Amadeus Labs provides opportunities to work on cutting-edge technologies.
The company has a strong focus on innovation and research.
Amadeus Labs has a global presence and offers a diverse and inclusive work environment.
Working at Amadeus Labs provides the opportunity to make a real impact on the travel industry.
The company values work-life balance and o...
Yes, I am comfortable working for Testing.
I have experience in testing and understand its importance in software development.
I am willing to learn new testing techniques and tools.
I am comfortable working with testing teams and collaborating with them to ensure quality software.
I understand the importance of testing in ensuring customer satisfaction and reducing costs.
Examples: I have experience in manual and automated...
I have the necessary skills and experience to excel in the developer role.
I have a degree in computer science and have completed multiple coding projects.
I am proficient in programming languages such as Java, Python, and C++.
I have experience working with databases and web development frameworks.
I am a quick learner and enjoy solving complex problems.
I am a team player and have collaborated with other developers on var...
I appeared for an interview in Aug 2016.
I appeared for an interview before Apr 2021.
Round duration - 45 minutes
Round difficulty - Medium
Technical Interview round with questions on Core Subjects mainly.
Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.
Allows for code reusability by creating a new class based on an existing class
Child class inherits attributes and methods of the parent class
Can have multiple levels of inheritance (e.g. grandparent, parent, child classes)
Example: class Dog extends Animal, where Dog inherits properties and methods ...
Default Constructor is a constructor that is automatically called when an object is created without any arguments. Copy Constructor is used to create a new object as a copy of an existing object.
Default Constructor has no parameters, while Copy Constructor takes an object of the same class as a parameter.
Default Constructor initializes the object with default values, while Copy Constructor creates a new object with the...
Round duration - 40 minutes
Round difficulty - Easy
Technical Interview round with questions on Core Subjects mainly.
The types of access modifiers in C++ are public, private, and protected.
Public: accessible from outside the class
Private: only accessible within the class
Protected: accessible within the class and its subclasses
DDL is used to define the structure of database objects, while DML is used to manipulate data within those objects.
DDL is used to create, modify, and delete database objects like tables, indexes, etc.
DML is used to insert, update, delete, and retrieve data from database tables.
DDL statements include CREATE, ALTER, DROP, TRUNCATE, etc.
DML statements include INSERT, UPDATE, DELETE, SELECT, etc.
Primary Key uniquely identifies each record in a table, while Unique Key ensures that all values in a column are distinct.
Primary Key does not allow NULL values, while Unique Key allows one NULL value.
A table can have only one Primary Key, but multiple Unique Keys.
Primary Key is automatically indexed, while Unique Key may or may not be indexed.
Primary Key is used to establish relationships between tables, while Unique ...
Normalization in database management systems aims to reduce data redundancy, improve data integrity, and optimize database performance.
Eliminate data redundancy by breaking down data into smaller tables
Reduce update anomalies by ensuring data is stored in a logical and consistent manner
Improve data integrity by enforcing referential integrity constraints
Optimize database performance by reducing the amount of redundant ...
Round duration - 30 minutes
Round difficulty - Easy
HR round with typical behavioral problems.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I appeared for an interview before Apr 2021.
Round duration - 60 minutes
Round difficulty - Medium
Started with the discussion why do you want to join DE shaw. Since prior to my current company, I was working with a finance based company so they asked why do you want to come back to finance base company. So they asked my about debentures, bonds, mortgages and other financial jargons.
Then they asked questions related to DSA, OS etc.
Given an array ARR
consisting of N
integers, your task is to identify all distinct triplets within the array that sum up to a given integer K
.
The task is to find all distinct triplets in an array that sum up to a given integer.
Iterate through the array and use nested loops to find all possible triplets.
Use a set to store unique triplets and avoid duplicates.
Check if the sum of the triplet equals the target sum.
Return the list of valid triplets or -1 if no such triplet exists.
Your task is to determine the minimum number of platforms required at a railway station so that no train has to wait.
Given two arrays:
AT
- represent...Internal fragmentation occurs when memory is allocated in fixed-size blocks, leading to wasted space within a block. External fragmentation occurs when free memory is fragmented into small chunks, making it difficult to allocate contiguous blocks.
Internal fragmentation is caused by allocating fixed-size blocks of memory, leading to wasted space within a block.
External fragmentation occurs when free memory is fragmented...
SQL query to find the employee with the nth highest salary
Use the ORDER BY clause to sort salaries in descending order
Use the LIMIT clause to select the nth highest salary
Join the employee table with the salary table to get the employee details
Java is platform independent due to its bytecode and JVM.
Java code is compiled into bytecode, which can run on any platform with a Java Virtual Machine (JVM)
JVM acts as an intermediary between the Java code and the underlying platform, ensuring portability
Developers write code once and it can be executed on any platform that has a compatible JVM
Examples: Windows, macOS, Linux all can run Java programs without any chang...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
based on 1 interview experience
Difficulty level
Duration
based on 3 reviews
Rating in categories
Software Engineer
288
salaries
| ₹3.1 L/yr - ₹11.2 L/yr |
Senior Software Engineer
223
salaries
| ₹11.4 L/yr - ₹20.4 L/yr |
Software Developer
134
salaries
| ₹3.6 L/yr - ₹12.7 L/yr |
Business Analyst
59
salaries
| ₹3.7 L/yr - ₹9 L/yr |
Quality Analyst
58
salaries
| ₹3.9 L/yr - ₹9 L/yr |
Thomson Reuters
HighRadius
Chetu
EbixCash Limited