Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
Technical Interview round with questions based on DSA, UNIX commands , Web Security etc.
Let the array be [1, 2, 3, 4, 4, 5]. In the given array ‘4’ occurs twice and the number ‘6’ is missing.
A simple approach could be to use sorting.
• Sort the input array.
• Traverse the array and check for missing and repeating.
Time Complexity : O(NlogN)
An efficient approach could be to use elements as indexes and mark the visited places. Traverse the array. While traversing, use the absolute value of every element as an index and make the value at this index as negative to mark it visited. If something is already marked negative then this is the repeating element. To find missing, traverse the array again and look for a positive value.
Pseudocode :
printTwoElements(arr, size)
{
for (i = 0; i < size; i++) {
if (arr[abs(arr[i]) - 1] > 0)
arr[abs(arr[i]) - 1] = -arr[abs(arr[i]) - 1];
else
print the repeating element (arr[i])
}
for (i = 0; i < size; i++) {
if (arr[i] > 0)
print the missing element (arr[i]
}
}
What is the difference between ps and top command ?
top is mostly used interactively (try reading man page or pressing "h" while top is running) and ps is designed for non-interactive use (scripts, extracting some information with shell pipelines etc.)
What is cross-site scripting (XSS)?
Cross-site scripting (also known as XSS) is a web security vulnerability that allows an attacker to compromise the interactions that users have with a vulnerable application. It allows an attacker to circumvent the same origin policy, which is designed to segregate different websites from each other. Cross-site scripting vulnerabilities normally allow an attacker to masquerade as a victim user, to carry out any actions that the user is able to perform, and to access any of the user's data.
How to Prevent an SQL Injection?
The only sure way to prevent SQL Injection attacks is input validation and parametrized queries including prepared statements. The application code should never use the input directly. The developer must sanitize all input, not only web form inputs such as login forms. They must remove potential malicious code elements such as single quotes.
Command to kill all running java processes
If you just want to kill any/all java processes, then all you need is : killall java
Questions based on designing. My first project as it was related to Image processing, so he also asked questions related to it.
Design a complete system for “Traffic enforcement camera”
Tip 1: A traffic enforcement camera is a camera which may be mounted beside or over a road or installed in an enforcement vehicle to detect motoring offenses, including speeding, vehicles going through a red traffic light, vehicles going through a toll booth without paying, unauthorized use of a bus lane, or for recording vehicles inside a congestion charge area.
Tip 2: Before you jump into the solution always clarify all the assumptions you’re making at the beginning of the interview. Ask questions to identify the scope of the system. This will clear the initial doubt, and you will get to know what are the specific detail interviewer wants to consider in this service.
How JSON(JavaScript Object Notation) works?
JSON is a text-based data format following JavaScript object syntax, which was popularized by Douglas Crockford. Even though it closely resembles JavaScript object literal syntax, it can be used independently from JavaScript, and many programming environments feature the ability to read (parse) and generate JSON.
JSON exists as a string — useful when you want to transmit data across a network. It needs to be converted to a native JavaScript object when you want to access the data. This is not a big issue — JavaScript provides a global JSON object that has methods available for converting between the two.
Do you know about any software testing framework?
A framework defines a set of rules or best practices that we can follow in a systematic way to achieve the desired results.
Each automation framework has its own architecture, advantages, and disadvantages. Some of these frameworks are:
Linear Automation Framework : The linear Automation framework is commonly used in the testing of small applications. This framework is also called as a Record and playback framework.
Modular Driven Framework : In this Framework, the tester can create test scripts module wise by breaking down the whole application into smaller modules as per the client requirements and create test scripts individually.
Behavior Driven framework : Behavior Driven Development framework is to create a platform, which allows every person, like Developers, Testers, business analyst, etc., to participate actively. It also increases collaboration between the tester and the developers on your project.
Data-Driven Framework : Test Data is read from the external files like Excel Files, Text Files, CSV Files, ODBC Sources, DAO Objects and they are loaded into the variables inside the Test Script. The data-driven framework allows us to create test automation scripts by passing different sets of test data.
Keyword-Driven Framework : The keyword-Driven Testing framework is also known as table-driven testing. This framework is suitable only for small projects or applications. The automation test scripts performed are based on the keywords specified in the excel sheet of the project.
Hybrid Testing Framework : Hybrid Framework is used to combine the benefits of Keyword Driven and Data-Driven frameworks.
What is the best protocol to store images?
A reasonable approach to storing large images and videos is to have them stored on a very fast file system and possibly using a database to organize metadata about them (names, descriptions, etc), as well as links to the actual data such as full paths to their file names. If you have huge numbers of images, you may well end up with them on multiple machines.
This was a typical HR round with questions related to my final year project and some behavioral problems.
Q. Why should I hire you , not others?
Tip 1: Employers want to understand how you use your time and energy to stay productive and efficient. Be sure to emphasize that you adhere to deadlines and take them seriously.
Tip 2: Talk about a relevant incident that made you keen on the profession you are pursuing and follow up by discussing your education.
Here's your problem of the day
Solving this problem will increase your chance to get selected in this company
Which SQL keyword removes duplicate records from a result set?