Filter interviews by
Map unique elements in an array of strings
Create a map to store unique elements
Iterate through the array and add each element to the map as a key
Retrieve the keys of the map to get the unique elements
Reversing a linked list involves changing the direction of its pointers to reverse the order of nodes.
Iterative approach: Use three pointers (prev, current, next) to reverse links.
Example: For list 1 -> 2 -> 3, after reversal it becomes 3 -> 2 -> 1.
Recursive approach: Reverse the rest of the list and adjust pointers.
Example: For list A -> B -> C, recursively reverse to get C -> B -> A.
Reversing a string involves rearranging its characters in the opposite order, often used in programming tasks.
Use built-in functions: In Python, use `s[::-1]` to reverse a string. Example: `s = 'hello'; reversed_s = s[::-1]` results in 'olleh'.
Iterative approach: Loop through the string from the end to the beginning. Example: `''.join(s[i] for i in range(len(s)-1, -1, -1))`.
Recursive method: Define a function that...
My current CTC is $80,000 and I am looking for a 10-15% increase in my next role.
Current CTC is $80,000
Expecting a 10-15% increase in next role
Open to negotiation based on job responsibilities and benefits
What people are saying about Bosch Global Software Technologies
Sets are data structures that store unique elements and can be used to efficiently find elements in the set.
Sets do not allow duplicate elements, so each element in a set is unique.
To find elements in a set, you can use the 'has' method to check if a specific element is present in the set.
Sets are commonly used in programming for tasks like removing duplicates from a list or checking for the presence of specific e...
Structs are used to define a data structure with multiple fields, while enumerations are used to define a set of named constants.
Structs are used to group related data together, while enumerations are used to define a set of named constants.
Structs can have multiple fields of different data types, while enumerations can only have a fixed set of named values.
Example: struct Person { string name; int age; } vs enum ...
Paging in operating systems is a memory management scheme that allows the operating system to use disk space as an extension of RAM.
Paging divides physical memory into fixed-size blocks called pages.
Virtual memory is divided into fixed-size blocks called frames.
The operating system keeps track of which pages are in RAM and which are on disk using a page table.
When a process needs a page that is not in RAM, a page ...
The project uses JSON Web Tokens (JWT) for authentication.
JWT is used to securely transmit information between parties as a JSON object.
JWTs are signed using a secret (with HMAC algorithm) or a public/private key pair (using RSA or ECDSA).
JWTs consist of three parts: header, payload, and signature.
Example: Upon successful login, a JWT is generated and sent to the client for subsequent API requests.
Reversing a string involves rearranging its characters in the opposite order, often used in programming tasks.
Use built-in functions: In Python, use `s[::-1]` to reverse a string. Example: `s = 'hello'; reversed_s = s[::-1]` results in 'olleh'.
Iterative approach: Loop through the string from the end to the beginning. Example: `''.join(s[i] for i in range(len(s)-1, -1, -1))`.
Recursive method: Define a function that call...
Reversing a linked list involves changing the direction of its pointers to reverse the order of nodes.
Iterative approach: Use three pointers (prev, current, next) to reverse links.
Example: For list 1 -> 2 -> 3, after reversal it becomes 3 -> 2 -> 1.
Recursive approach: Reverse the rest of the list and adjust pointers.
Example: For list A -> B -> C, recursively reverse to get C -> B -> A.
Map unique elements in an array of strings
Create a map to store unique elements
Iterate through the array and add each element to the map as a key
Retrieve the keys of the map to get the unique elements
Sets are data structures that store unique elements and can be used to efficiently find elements in the set.
Sets do not allow duplicate elements, so each element in a set is unique.
To find elements in a set, you can use the 'has' method to check if a specific element is present in the set.
Sets are commonly used in programming for tasks like removing duplicates from a list or checking for the presence of specific elemen...
I applied via Campus Placement
English basic electrical
I applied via Campus Placement and was interviewed in Jul 2024. There were 2 interview rounds.
Got question related to logical reasoning
Structs are used to define a data structure with multiple fields, while enumerations are used to define a set of named constants.
Structs are used to group related data together, while enumerations are used to define a set of named constants.
Structs can have multiple fields of different data types, while enumerations can only have a fixed set of named values.
Example: struct Person { string name; int age; } vs enum Days ...
Paging in operating systems is a memory management scheme that allows the operating system to use disk space as an extension of RAM.
Paging divides physical memory into fixed-size blocks called pages.
Virtual memory is divided into fixed-size blocks called frames.
The operating system keeps track of which pages are in RAM and which are on disk using a page table.
When a process needs a page that is not in RAM, a page fault...
I have worked on various projects including a web application for a retail company, a mobile app for a fitness tracker, and a data analysis tool for a marketing agency.
Developed a web application for a retail company to manage inventory and sales
Created a mobile app for a fitness tracker to track workouts and progress
Built a data analysis tool for a marketing agency to analyze customer behavior and campaign effectivene...
The project uses JSON Web Tokens (JWT) for authentication.
JWT is used to securely transmit information between parties as a JSON object.
JWTs are signed using a secret (with HMAC algorithm) or a public/private key pair (using RSA or ECDSA).
JWTs consist of three parts: header, payload, and signature.
Example: Upon successful login, a JWT is generated and sent to the client for subsequent API requests.
Was the experience great and amazing?
Was the experience quite negative?
I am motivated by the opportunity to solve complex problems and create innovative solutions.
I am driven by the challenge of tackling new and interesting problems
I enjoy the satisfaction of seeing my code come to life and make a positive impact
I am inspired by the constant learning and growth opportunities in the field
I applied via LinkedIn and was interviewed in Nov 2023. There were 2 interview rounds.
Nice company i found on earth is this
My current CTC is $80,000 and I am looking for a 10-15% increase in my next role.
Current CTC is $80,000
Expecting a 10-15% increase in next role
Open to negotiation based on job responsibilities and benefits
I applied via LinkedIn and was interviewed before Dec 2023. There were 3 interview rounds.
It’s coding round , and multiple choices questions on java
I appeared for an interview before Apr 2024, where I was asked the following questions.
based on 18 interview experiences
Difficulty level
Duration
based on 104 reviews
Rating in categories
Senior Software Engineer
6.7k
salaries
| ₹6.6 L/yr - ₹20 L/yr |
Senior Engineer
2.9k
salaries
| ₹6.9 L/yr - ₹21 L/yr |
Software Engineer
2.9k
salaries
| ₹3.6 L/yr - ₹11.5 L/yr |
Associate Software Engineer
2k
salaries
| ₹4 L/yr - ₹10.4 L/yr |
Specialist
1.5k
salaries
| ₹10 L/yr - ₹33 L/yr |
Mercedes-Benz Research and Development India
Capgemini
Accenture
Genpact