Filter interviews by
One hour - only maths
Their are 60 questions. these 60 questions divided into 2 parts one is apptitude and another is technical .
Top trending discussions
I appeared for an interview before Mar 2020.
Cyber security refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.
Cyber security involves various technologies, processes, and practices to safeguard digital assets.
It includes measures such as firewalls, antivirus software, encryption, and access controls.
Cyber security threats can come from various sources, including hackers, malware, ...
DoS and DDoS are types of cyber attacks. DoS targets a single system, while DDoS targets multiple systems simultaneously.
DoS stands for Denial of Service, where an attacker overwhelms a target system with a flood of traffic or requests.
DDoS stands for Distributed Denial of Service, where multiple systems are used to launch the attack.
DoS attacks can be carried out by a single attacker using a single device or network.
D...
SQL injection is a type of cyber attack. Splunk is a software platform used for searching, analyzing and visualizing machine-generated data.
SQL injection is a technique where malicious SQL statements are inserted into an entry field to execute unauthorized actions.
Splunk architecture consists of forwarders, indexers, and search heads.
Forwarders collect data from various sources and send it to indexers.
Indexers store an...
Black hat hackers are cyber criminals who exploit vulnerabilities for personal gain, while white hat hackers use their skills for ethical purposes.
Black hat hackers use their skills to steal data, spread malware, and commit other cyber crimes.
White hat hackers are hired by organizations to test their security systems and identify vulnerabilities.
Grey hat hackers fall somewhere in between, using their skills for both et...
Red Hat is a leading provider of open source software solutions, including the popular Red Hat Enterprise Linux operating system.
Red Hat is a software company that specializes in open source solutions.
They are known for their flagship product, Red Hat Enterprise Linux (RHEL).
Red Hat offers a range of software products and services for businesses.
Their solutions focus on security, reliability, and scalability.
Red Hat al...
posted on 4 Mar 2025
I have over three years of experience in cybersecurity, focusing on threat analysis, incident response, and vulnerability management.
Conducted regular security assessments and vulnerability scans, identifying and mitigating risks in network infrastructure.
Managed incident response for security breaches, leading a team to investigate and remediate threats effectively.
Developed and implemented security policies and proce...
I appeared for an interview before Jan 2016.
Seeking new challenges and growth opportunities.
I felt that I had reached a plateau in my role and was no longer being challenged.
I was interested in exploring new technologies and wanted to work on more innovative projects.
I wanted to work in a more collaborative and dynamic environment.
I left on good terms and have maintained positive relationships with my former colleagues.
I am excited to bring my skills and experie...
I am excited to join Centurylink because of their reputation for innovation and commitment to customer satisfaction.
Centurylink has a strong focus on developing cutting-edge technology solutions
The company values customer feedback and strives to provide excellent service
I am impressed by Centurylink's dedication to diversity and inclusion in the workplace
Relocated to Noida for better career opportunities and growth.
Noida is a hub for IT companies and offers a lot of job opportunities in the software development field.
The city has a good work-life balance and a lower cost of living compared to other metropolitan cities.
I was also attracted to the diverse culture and the opportunity to work with people from different backgrounds.
I did my research and found that Noida has...
Yes, I am comfortable working in US shift.
I have prior experience working in US shift.
I am flexible with my work timings.
I understand the importance of meeting project deadlines.
I am willing to adjust my personal schedule to accommodate work requirements.
I currently reside in New York City.
I live in an apartment in Manhattan.
My neighborhood is known for its diverse food options.
I have easy access to public transportation.
I enjoy exploring the city in my free time.
I appeared for an interview before Apr 2021.
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions on OOPS and OS mainly.
Little Endian and Big Endian refer to the order in which bytes are stored in computer memory.
Little Endian stores the least significant byte first, while Big Endian stores the most significant byte first.
Little Endian is commonly used in x86 architecture, while Big Endian is used in architectures like SPARC and PowerPC.
Endianness can affect data transmission between systems with different byte orders.
Program to determine system's endianness
Check the endianness by storing a multi-byte integer and checking the byte order
Use bitwise operations to extract the least significant byte
If the least significant byte is at the lowest memory address, it's little-endian
If the least significant byte is at the highest memory address, it's big-endian
The volatile keyword in programming is used to indicate that a variable's value can be changed unexpectedly.
Volatile keyword is used in multithreaded programming to prevent compiler optimizations on variables that can be changed by other threads.
It tells the compiler not to cache the variable's value in a register, ensuring that every access is made to the variable's memory location.
Commonly used in embedded systems pr...
Function pointers in C are used to store the address of functions, allowing for dynamic function calls and callbacks.
Function pointers can be used to implement callbacks in event-driven programming.
They can be used to switch between different functions at runtime.
Function pointers are commonly used in implementing data structures like function pointers in an array of function pointers.
Example: void (*funcPtr)(int) = &a...
Design a data structure for multi-threading
Use a thread-safe queue to manage tasks for each thread
Implement a lock or semaphore to control access to shared resources
Consider using condition variables for synchronization
Use atomic operations for shared variables to prevent race conditions
The kernel is the core component of an operating system that manages system resources and provides a bridge between software and hardware.
Manages system resources such as CPU, memory, and I/O devices
Provides a bridge between software applications and hardware components
Handles tasks such as process scheduling, memory management, and device drivers
Controls communication between hardware and software layers
A storage class in programming defines the scope and lifetime of variables.
Storage classes include auto, register, static, and extern.
Auto variables are created when a function is called and destroyed when the function ends.
Register variables are stored in CPU registers for faster access.
Static variables retain their value between function calls.
Extern variables are declared outside of any function and can be accessed ...
Round duration - 30 minutes
Round difficulty - Easy
HR round with typical behavioral problems.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I appeared for an interview before Jan 2021.
Round duration - 70 Minutes
Round difficulty - Medium
This was an Online Coding+MCQ round where we had a total of 50 MCQ questions and 1 coding problem. The coding problem was of easy to medium level but was a bit implementation heavy.
Design a data structure for a Least Recently Used (LRU) cache that supports the following operations:
1. get(key)
- Return the value of the key if it exists in the cache; otherw...
Design a Least Recently Used (LRU) cache data structure that supports get and put operations with capacity constraint.
Implement a doubly linked list to maintain the order of recently used keys.
Use a hashmap to store key-value pairs for quick access.
When capacity is reached, evict the least recently used item before inserting a new item.
Update the position of a key in the linked list whenever it is accessed or updated.
H...
Round duration - 60 Minutes
Round difficulty - Medium
This round had 1 coding question in which I was first required to explain my approach and then discuss the time and space complexities. After this , some basic questions from OOPS and Java were asked.
For a given singly linked list, identify if a loop exists and remove it, adjusting the linked list in place. Return the modified linked list.
A...
Detect and remove loop in a singly linked list in place with O(n) time complexity and O(1) space complexity.
Use Floyd's Cycle Detection Algorithm to identify the loop in the linked list.
Once the loop is detected, use two pointers to find the start of the loop.
Adjust the pointers to remove the loop and return the modified linked list.
ArrayList is implemented using a dynamic array while LinkedList is implemented using a doubly linked list.
ArrayList provides fast random access but slow insertion and deletion operations.
LinkedList provides fast insertion and deletion operations but slow random access.
Example: ArrayList is suitable for scenarios where frequent access and traversal of elements is required, while LinkedList is suitable for scenarios wher...
Abstraction focuses on hiding implementation details, while inheritance allows a class to inherit properties and behavior from another class.
Abstraction is the concept of hiding the complex implementation details and showing only the necessary features of an object.
Inheritance is a mechanism where a new class inherits properties and behavior from an existing class.
Abstraction is achieved through interfaces and abstract...
Round duration - 60 Minutes
Round difficulty - Medium
This round had questions from OS and OOPS. The interviewer also tested my problem solving skills by asking me some puzzles in the end.
Piping in Unix/Linux allows the output of one command to be used as the input for another command.
Piping is done using the | symbol
Multiple commands can be piped together
Piping allows for the creation of complex command chains
Example: ls -l | grep txt
A static variable in C is a variable that retains its value between function calls.
Static variables are declared using the 'static' keyword.
They are initialized only once and retain their value throughout the program's execution.
Static variables have a default value of 0 if not explicitly initialized.
They are stored in the data segment of the program's memory.
Example: static int count = 0; declares a static variable 'c...
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
posted on 9 Dec 2021
I applied via Naukri.com and was interviewed before Dec 2020. There were 3 interview rounds.
OOPs concept stands for Object-Oriented Programming concepts which includes encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation is the process of hiding the implementation details from the user.
Inheritance allows a class to inherit properties and methods from another class.
Polymorphism allows objects to take on multiple forms or behaviors.
Abstraction is the process of hiding unnecessary details from...
Lazy loading is a technique used to defer the loading of non-critical resources until they are needed.
It improves page load time and performance.
It is commonly used for images, videos, and other media files.
It can be implemented using JavaScript libraries like LazyLoad or Intersection Observer API.
Lazy loading can also be used for modules and components in web applications.
It helps to reduce the initial load time of th...
Eager loading is a technique used in software development to load related data in advance to avoid multiple database queries.
Eager loading is used to optimize database queries and improve performance.
It loads all the required data in a single query instead of making multiple queries.
It is commonly used in Object-Relational Mapping (ORM) frameworks like Hibernate, Entity Framework, etc.
Eager loading can be used with var...
based on 2 interview experiences
Software Engineer
33
salaries
| ₹9.4 L/yr - ₹26.6 L/yr |
Associate Software Engineer
23
salaries
| ₹8 L/yr - ₹11.5 L/yr |
Senior Software Engineer
21
salaries
| ₹19 L/yr - ₹39 L/yr |
Software Developer
6
salaries
| ₹8 L/yr - ₹10.1 L/yr |
Technical Lead
5
salaries
| ₹24 L/yr - ₹46.5 L/yr |
Sterlite Technologies
Cisco
BT Business
Lumen Technologies