Skip to content
Gblog Must Do Coding Questions for Product Based Companies
As the placement season is back, GeeksforGeeks is here to help you crack the interview. We have selected some most commonly asked and MUST DO… Read More
First round was HackerRank test: Your job is to write a method that will take a stream of integer values, and put them into a… Read More
Let f be a function from a set A to a set B, g a function from B to C, and h a function from… Read More
ROUND 1: Aptitude questions – both Quantitative aptitude and in programming. they were NOT MCQs ROUND 2: 1. Arrange the numbers in descending order depending… Read More
A HTML form is to be designed to enable purchase of office stationery. Required items are to be selected (checked). Credit card details are to… Read More
Count to infinity is a problem associated with (A) link state routing protocol. (B) distance vector routing protocol (C) DNS while resolving host name. (D)… Read More
Which of the following statements is TRUE about CSMA/CD   (A) IEEE 802.11 wireless LAN runs CSMA/CD protocol (B) Ethernet is not based on CSMA/CD… Read More
Traceroute reports a possible route that is taken by packets moving from some host A to some other host B. Which of the following options… Read More
Consider the three commands : PROMPT, HEAD and RCPT. Which of the following options indicate a correct association of these commands with protocols where these… Read More
Amongst the ACID properties of a transaction, the ‘Durability’ property requires that the changes made to the database by a successful transaction persist   (A)… Read More
A B-Tree used as an index for a large database table has four levels including the root node. If a new key is inserted in… Read More
A table has fields Fl, F2, F3, F4, F5 with the following functional dependencies   F1 → F3   F2→ F4   (F1 . F2)… Read More
Consider the entities ‘hotel room’, and ‘person’ with a many to many relationship ‘lodging’ as shown below: If we wish to store information about the… Read More
The Function Point (FP) calculated for a software project are often used to obtain an estimate of Lines of Code (LOC) required for that project.… Read More
A user level process in Unix traps the signal sent on a Ctrl-C input, and has a signal handling routine that saves appropriate files before… Read More
The shell command find -name passwd -print is executed in /etc directory of a computer system running Unix. Which of the following shell commands will… Read More

Start Your Coding Journey Now!