i
Filter interviews by
The chmod command changes file permissions in Unix/Linux systems, controlling read, write, and execute access.
chmod uses symbolic (rwx) or numeric (0-7) modes to set permissions.
Example: 'chmod 755 file.txt' grants full access to the owner and read/execute to others.
Symbolic example: 'chmod u+x script.sh' adds execute permission for the user.
Permissions are divided into three categories: user (u), group (g), and o...
The chmod command in Linux changes file permissions for users, groups, and others.
Syntax: chmod [options] mode file(s)
Mode can be specified in symbolic (rwx) or numeric (octal) format.
Example: chmod 755 myfile.txt sets read, write, execute for owner, read and execute for group and others.
Example: chmod u+x myscript.sh adds execute permission for the user.
Linux virtual memory system manages memory allocation, swapping, and paging to optimize performance and resource utilization.
Virtual memory allows the system to use disk space as an extension of RAM.
It enables processes to use more memory than physically available by swapping pages in and out.
The Linux kernel uses a page table to map virtual addresses to physical addresses.
Swapping can lead to performance degradat...
Node.js architecture involves event-driven, non-blocking I/O model, single-threaded event loop, and asynchronous programming.
Event-driven architecture allows Node.js to handle multiple connections efficiently.
Non-blocking I/O model ensures that Node.js can handle many concurrent connections without getting blocked.
Single-threaded event loop processes all I/O operations asynchronously, improving performance.
Asynchr...
Database architecture involves the design, structure, and organization of databases to ensure efficient data storage and retrieval.
Database architecture includes defining data models, schemas, indexing, and relationships.
It involves choosing the right database management system (e.g. relational, NoSQL) based on requirements.
Performance tuning, scalability, and security are key considerations in database architectu...
I appeared for an interview in Mar 2025, where I was asked the following questions.
The chmod command in Linux changes file permissions for users, groups, and others.
Syntax: chmod [options] mode file(s)
Mode can be specified in symbolic (rwx) or numeric (octal) format.
Example: chmod 755 myfile.txt sets read, write, execute for owner, read and execute for group and others.
Example: chmod u+x myscript.sh adds execute permission for the user.
I appeared for an interview in Mar 2025, where I was asked the following questions.
15mins each code merge two array
I appeared for an interview in Aug 2023.
Node.js architecture involves event-driven, non-blocking I/O model, single-threaded event loop, and asynchronous programming.
Event-driven architecture allows Node.js to handle multiple connections efficiently.
Non-blocking I/O model ensures that Node.js can handle many concurrent connections without getting blocked.
Single-threaded event loop processes all I/O operations asynchronously, improving performance.
Asynchronous...
Database architecture involves the design, structure, and organization of databases to ensure efficient data storage and retrieval.
Database architecture includes defining data models, schemas, indexing, and relationships.
It involves choosing the right database management system (e.g. relational, NoSQL) based on requirements.
Performance tuning, scalability, and security are key considerations in database architecture.
Ex...
Top trending discussions
I applied via Naukri.com and was interviewed before Jul 2019. There were 4 interview rounds.
To check if a directed graph is cyclic or not
Use Depth First Search (DFS) algorithm to traverse the graph
Maintain a visited set to keep track of visited nodes
Maintain a recursion stack to keep track of nodes in the current DFS traversal
If a node is visited and is already in the recursion stack, then the graph is cyclic
If DFS traversal completes without finding a cycle, then the graph is acyclic
Return a random byte from a stream of bytes with equal probability.
Create a variable to store the count of bytes read
Create a variable to store the current random byte
For each byte read, generate a random number between 0 and the count of bytes read
If the random number is 0, store the current byte as the random byte
Return the random byte
Algorithm to find Nth-to-Last element in a singly linked list of unknown length
Traverse the list and maintain two pointers, one at the beginning and one at Nth node from beginning
Move both pointers simultaneously until the second pointer reaches the end of the list
The first pointer will be pointing to the Nth-to-Last element
If N=0, return the last element
Parse the list only once
Print all possible permutations of an array of integers
Use recursion to swap elements and generate permutations
Start with the first element and swap it with each subsequent element
Repeat the process for the remaining elements
Stop when all elements have been swapped with the first element
Print each permutation as it is generated
Design a stack that prints the minimum element pushed in O(1)
Use two stacks, one for storing elements and another for storing minimums
When pushing an element, compare it with the top of minimum stack and push the smaller one
When popping an element, pop from both stacks
To get the minimum element, just return the top of minimum stack
To find the starting point of a loop in a linked list, use Floyd's cycle-finding algorithm.
Use two pointers, one moving at twice the speed of the other.
When they meet, move one pointer to the head of the list and keep the other at the meeting point.
Move both pointers one step at a time until they meet again, which is the starting point of the loop.
To find a number in a matrix where all rows and columns are sorted non-decreasingly. Complexity of the solution.
Use binary search to find the number in each row and column
Start from the top-right corner or bottom-left corner to optimize search
Time complexity: O(m log n) or O(n log m) depending on the starting corner
I applied via Company Website and was interviewed before May 2018. There were 3 interview rounds.
I appeared for an interview before Feb 2022.
I applied via Company Website and was interviewed in Nov 2020. There were 5 interview rounds.
based on 5 interview experiences
Difficulty level
Duration
based on 29 reviews
Rating in categories
Devops Engineer
7
salaries
| ₹7.1 L/yr - ₹10 L/yr |
Cloud Operations Engineer
6
salaries
| ₹8 L/yr - ₹14 L/yr |
Senior Contract Analyst
5
salaries
| ₹11.8 L/yr - ₹12 L/yr |
Senior Software Engineer
5
salaries
| ₹21.2 L/yr - ₹36.3 L/yr |
Senior Cloud Operations Engineer
4
salaries
| ₹13 L/yr - ₹19.2 L/yr |
Yodlee
Fingent
Bravura Solutions
Eagleview