Prep
Prep
1.Cpp program without main function can be compiled , but not executed as
main () is the entry point to the code
Due to the above limitations, references in C++ cannot be used for implementing
data structures like Linked List, Tree, etc. In Java, references don’t have the
above restrictions and can be used to implement all data structures. References
being more powerful in Java is the main reason Java doesn’t need pointers.
5. Diff between c and cpp and java
6.C++ code is compiled into machine code, which can be directly executed by
the computer's processor. The compilation process involves several steps:
10.malloc() vs new -
The main difference between new and malloc lies in their usage and behavior
within C++.
1. Stack:
2. Heap
The heap is a region of memory used for dynamic memory allocation. It is not
automatically managed and requires explicit allocation and deallocation by the
programmer.
● Memory on the heap is typically allocated using operators like new and
new[] in C++ or functions like malloc in C.
● Heap memory is used for objects with a longer lifespan, such as
dynamically created objects and data structures.
● The programmer is responsible for deallocating the memory when it is no
longer needed using operators like delete and delete[] in C++ or the free
function in C.
● Heap memory allocation and deallocation can be slower compared to the
stack because it involves searching for available blocks of memory and
maintaining a heap data structure.
● The heap size is usually larger than the stack and can grow dynamically as
needed, but excessive and uncontrolled allocation can lead to memory
fragmentation and potential performance issues.
12. Dangling pointer - pointing to memory location which doesnt have any value
13. Memory Leak - Memory leaks occur when dynamically allocated memory is
not properly deallocated. Over time, these leaks accumulate, resulting in unused
memory that is not released back to the system. As a result, the program's
memory usage gradually increases, leading to excessive memory consumption.
This can cause performance degradation and may eventually result in the
program running out of available memory and unknown erors and bugs
function template- We write a generic function that can be used for different data
types. Examples of function templates are sort(), max(), min(),
Class template - class templates are useful when a class defines something that
is independent of the data type. Can be useful for classes like LinkedList,
BinaryTree, Stack, Queue, Array, etc.
18. STL
Unlike Java, in C++, all exceptions are unchecked, i.e., the compiler doesn’t
check whether an exception is caught or not
Like Java, the C++ library has a standard exception class which is the base class
for all standard exceptions. All objects thrown by the components of the standard
library are derived from this class. Therefore, all standard exceptions can be
caught by catching this type
In summary, while both const and constexpr are used to create constants, const
is evaluated at runtime and can have different values for different instances,
while constexpr is evaluated at compile-time and must have a value that can be
determined during compilation.
Int &ref = x; // ref is an alias for x , i.e. any change in x or ref , will result in
change for both ref and x , both variables point to the same location
List Node* tmp = new ListNode() is creating a new list node object with the
default constructor on the heap and storing a pointer to it as tmp
fn (vector<int> &nums) is passing nums by reference, meaning nums is not
copied it is used as-is from the place the function is called
&nums is basically a shortcut to passing a pointer and dereferencing it yourself
to use
25. Volatile keyword tells the compiler that the value of a variable must never be
cached as its value may change outside of the scope of the program itself.This is
crucial when dealing with hardware registers or shared memory accessed by
multiple threads.
1.Both equals() method and the == operator are used to compare two objects in
Java. == is an operator and equals() is method. But == operator compares
reference or memory location of objects in a heap, whether they point to the
same location or not.
Whenever we create an object using the operator new, it will create a new
memory location for that object. So we use the == operator to check memory
location or address of two objects are the same or not.
{
String s1 = "HELLO";
String s2 = "HELLO";
String s3 = new String("HELLO");
2.Exceptions - 2 types , builtin ( out of bounds, arithmetic , file not found etc)
User defined -create your own exception subclass by
inheriting Exception class
3.Error vs exception
Error refers to an illegal operation performed by the user which results in the
abnormal working of the program. Programming errors often remain undetected
until the program is compiled or executed. (compile time , run time or logical)
Exceptions are the conditions that occur at runtime and may cause the
termination of the program. But they are recoverable using try, catch and throw
keywords. Types - CHecked( compiler knows like ArrayIndex out of bounds
exception) , unchecked (found during runtime like filenotfound)
4.throw is a keyword in java which is used to throw an exception manually
throws is also a keyword in java which is used in the method signature to
indicate that this method may throw mentioned exceptions
Throwable is a super class for all types of errors and exceptions in java. This
class is a member of java.lang package
When multiple threads access shared resources concurrently, it can lead to race
conditions and inconsistencies. Java provides synchronization mechanisms,
such as the synchronized keyword, to ensure that only one thread can access
a shared resource at a time.
8.https://www.javatpoint.com/c-vs-cpp-vs-java
10.java.lang.Object is the root class for all the Java classes and we don’t need to
extend it
11.A static method cannot access non-static variables or methods because static
methods can be accessed without instantiating the class, so if the class is not
instantiated the variables are not initialized and thus cannot be accessed from a
static method.
12.Wrapper classes convert the Java primitives into reference types (objects).
Every primitive data type has a class dedicated to it. These are known as
wrapper classes because they “wrap” the primitive data type into an object of
that class.
13.Java doesnt have pointers because pointers are not necessary for OOP
model and also pointers make the program complex .JVM is responsible for
implicit memory allocation, thus to avoid direct access to memory by the user,
pointers are discouraged in Java.
This keyword - Used to refer current class instance variable.To invoke current
class constructor
15.Abstract classes are classes that contain one or more abstract methods. An
abstract method is a method that is declared but contains no implementation.
Abstract classes may not be instantiated, and require subclasses to provide
implementations for the abstract methods.
16.In Java, all classes inherit from the Object class directly or indirectly.
Therefore, there is always a single inheritance tree of classes in Java, and
Object class is the root of the tree.
17.In Java, all objects are dynamically allocated on Heap. This is different from
C++ where objects can be allocated memory either on Stack or on Heap. In C++,
when we allocate object using new(), the object is allocated on Heap, otherwise
on Stack if not global or static.
In Java, when we only declare a variable of a class type, only a reference is
created (memory is not allocated for the object). To allocate memory to an object,
we must use new(). So the object is always allocated memory on the heap.
JS
1)It is dynamically typed languge ,i.e. We dont need to provide data types while
coding
2)single threaded language , handles promises and callbacks and timers using a event
loop. It has a call stack which is maintained.
3) anonymous functions
var a = function () // called anonymous function
{
//do something
}
We can not name functions if we assign them to variables, can invoke this
function using ‘a’
Java vs JS – here
4) JavaScript data types - String , number, bigint , bool , undefined , null , symbol , object
5) null vs undefined - Undefined means the variable has been declared, but its value has
not been assigned. Null means an empty value or a blank value. The typeof() operator returns
undefined for an undefined variable. The typeof() operator returns the type as an object for a
variable whose value is assigned as null
6)
PYTHON
link 1 link 2
6) Scope and hoisting example -
HOISTING
Declaration of functions and variables ( declared by var only moved to the top of
the current scope) only declarations hoisted not initializations
In above example , var b is declared at start of function fun
As I've explained in this article, let and const variables are hoisted, only they
are hoisted without a default initialization. This makes them inaccessible (as
such variables are in a temporal dead zone). Variables declared with var , on the
other hand, are hoisted with a default initialization of undefined
function f(...args) {
const sum = args[0] + args[1];
return sum;
}
console.log(f(3, 4)); // 7
11)map() creates a new array from calling a function for every array element.
The filter() method creates a new array filled with elements that pass a test
provided by a function.
The reduce() method executes a reducer function for array element.The reduce()
method returns a single value: the function's accumulated result.
13)Js apply method can be used to give context to some function about an
object. Parameters passed as array
Js apply and Js call and js bind
Read more here
14)Asynchronous Operations in JS by callback functions or Promises.
Callback Hell - Callback Hell is essentially nested callbacks stacked below one
another forming a pyramid structure. Every callback depends/waits for the
previous callback, thereby making a pyramid structure that affects the readability
and maintainability of the code.
Promises
they are like callbacks but better.
Syntax →
.
Promises have three states:
1. Pending: The initial state when a promise is created, indicating that the
asynchronous operation is still in progress and the final result is not yet
available.
2. Fulfilled: The state of a promise when the asynchronous operation has
completed successfully. The promise returns a value, and this value is
passed as an argument to the resolve function.
3. Rejected: The state of a promise when the asynchronous operation
encounters an error. The promise returns an error, and this error is passed
as an argument to the reject function.
We can use promises with async await syntax which is much much easier to
read
JavaScript Async Await
16)High order functions - fns which take other functions as args or returns
another funs
JS is garbage collected
17)EVENT LOOP
JavaScript run time can do one thing at a time . Javascript = JS Runtime +
Browser Web APIS.
Most async functions like setTimeout fetch etc are taken care of by web APIs
Arrays , functions , objects all have some predefined methods which we can use
without implementing they come from Array Object , Function Object , etc
arr = [ 1,2,3]
Arr.__proto__ // equals Array Object
Arr.__proto__ .__proto__ ??equals Object
Throttling implies limiting the number of times a function gets called in a certain
time period. It will prohibit a function from executing if we have invoked it
“recently
https://www.youtuube.com/watch?v=8eRVxE9PEF0
https://www.youtube.com/watch?v=83ZSwO3BdHk
Now when a user tries to login , we add this salt value with the password entered
and then hash it. Now we compare this with the hash value stored.
Hashing is absolutely necessary , saving password plain text in database is very
dangerous because it means that anyone with the access to data base or if the
db is compromised the password can be seen.
Website are html which contain lots of elements , these elements are nested
together in a hierarchy to form the Document Object Model.
After the root element, webpage is split into two parts. The head contains
invisible content like the meta data and the title , then comes the body which the
end user can see.
Media Querys allow you to get information about the device thats rendering the
web page and apply different styles and layouts accordingly.
We need JS to handle events , whenever any interaction is done on the browser
like click , we can handle these events using browser apis like document which
provides a method called QUERY SELECTOR that allows us to grab elements
with a css selector. Now that we have that element set as a variable we can
assign event listeners to it .
Writing JS HTML CSS on its own for websites can be too low level , and most
developers use frameworks like react or angular these do the same thing in a
different way , these represent the UI as a tree of components. A component
encapsulates html css and js into a format which looks like a custom html
element and these framworks makes the code declarative , i.e. we write what the
ui does.
Http requests are sent to the backend to fetch or update data.
Most apps are containerized with docker making them easy to scale up and
down based on traffic received
5) HTTP vs HTTPS
The main difference is that data passed in http requests are plain texts hence
not secure.
In https , the requests are encrypted using TLS.
TLS handshake —->
Before diving into what happens on typing a url , lets discuss briefly what url is.
So it contains http or https which is the protocol or scheme used to establish
connection.
The next part is domain which is necessary to retrieve the requested webpage.
Once a URL is entered the browser needs to know how to reach the server and
its done by DNS LOOKUP. DNS or Domain Name System can be thought of as a
phonebook for the internet as it maps domain names with ip addresses of the
servers.
Now we try to find the DNS entry in different places till it is found
FIrst browser cache is checked , then OS cache , then the router cache then the
ISP cache.
If not found in above 4 caches, browser runs a recursive lookup from 1 dns
server to another until the required IP of the server is fetched.
1. The client machine sends a SYN packet to the server over the internet, asking
if it is open for new connections.
2. If the server has open ports that can accept and initiate new connections, it’ll
respond with an ACKnowledgment of the SYN packet using a SYN/ACK packet.
3. The client will receive the SYN/ACK packet from the server and will
acknowledge it by sending an ACK packet.
7) DOM
DOM stands for Document Object Model. It is a programming interface for web
documents, such as HTML, XML, or XHTML. The DOM represents the structure
of a document as a tree-like model, where each element, attribute, and text node
in the document is represented as an object.
The DOM tree consists of various types of nodes, including the document node,
element nodes, attribute nodes, and text nodes. Each node in the tree can have
child nodes and parent nodes, forming a hierarchical structure. By traversing and
manipulating this tree structure, developers can interact with and modify the
document's content and structure.
8) ORM
ORM stands for Object-Relational Mapping. It is a programming technique and a
software pattern that enables developers to work with relational databases using
an object-oriented approach. ORM bridges the gap between the relational
database and the object-oriented programming language, allowing developers to
interact with the database using objects and their methods instead of writing SQL
queries directly.
9) Browser Security
XSS-XSS stands for Cross-Site Scripting. It is a type of security vulnerability that
occurs when a web application does not properly sanitize or validate
user-supplied input and allows malicious scripts to be injected and executed in
users' browsers.
The basic idea behind XSS is that an attacker can inject malicious code, typically
JavaScript, into a web page viewed by other users. This can happen through
input fields, comment sections, or any other user-input areas where the
application fails to properly filter or escape the input. When unsuspecting users
view the affected web page, the injected script is executed in their browsers,
potentially compromising their sensitive data, session information, or enabling
further attacks.
The vulnerability arises when user input is directly concatenated into SQL
queries without proper sanitization or parameterization. If the application does
not validate or escape user input, an attacker can craft input in such a way that it
alters the intended SQL query structure or injects malicious SQL code.
CSRF
CORS -CORS stands for Cross-Origin Resource Sharing. It is a mechanism that
allows web browsers to relax the same-origin policy and enables web pages
from different origins (domains, protocols, or ports) to request and share
resources with each other.
According to the Same-Origin Policy, web pages can only access resources
(such as APIs, cookies, or DOM elements) from the same origin as the page
itself. An origin is defined by the combination of the protocol (e.g., HTTP or
HTTPS), the domain (e.g., example.com), and the port number (if specified).
CSP stands for Content Security Policy. It is a security feature implemented by
web browsers to mitigate the risks of cross-site scripting (XSS) attacks and other
types of code injection vulnerabilities. CSP allows website administrators to
define a policy that specifies which sources of content, such as scripts,
stylesheets, or images, are considered trusted and allowed to be loaded by the
browser.
REACT
Event emitter
Hooks –
1) only in func components
2) call hooks in the same order they are decalred
When using setState , always use spread operator to old merge data. If we have
setstate running on an object , entire thing will be overridden if we dont merge in
the old values
useContext
Imagine a situation where we have 5 nested components and the 1st and 5th
component needs access to some state. However to allow this all intermediate
components will have to pass the state as props which increases complexity
(called prop drilling), to combat this we use Use context hooks
React Context is a way to manage state globally
Check some examples
link 1 link 2
NEXT JS -
frame work built on top of react with some added features
SSr -Server-side rendering (SSR) is a technique that renders a web page on the server rather
than in the browser. When a website's JavaScript is rendered on the website's server, a fully
rendered page is sent to the client. The user will then get an fully rendered HTML page that
contains all of the necessary information for them to see your site without having to wait for any
JavaScript or CSS files to load.
Ease of routing - For
routing in react we have to rely on 3rd party libraries like
React Router where as for next it has an inbuilt routing based on file
system structure, so by adding /dashboard will route us to dashboard.js
Django
link 1 link 2
OOPS
Link link
OS
OPEN AT SIDE – MAIN NOTES , following is extra info
2) Types of OS -
a)Batch-Processing OS - A Batch Operating System is a type of operating
system that does not interact with the computer directly. There is an operator
who takes similar jobs having the same requirements and groups them into
batches and then processor works on them. Problems - priorities cant be set ,
idle time during IO , lead to starvation
b)Distributed OS - manages a group of different computers and makes appear
to be a single computer. These operating systems are designed to operate on a
network of computers. They allow multiple users to access shared resources and
communicate with each other over the network
c)Real time OS - serves a real-time system and the time interval required to
process and respond to inputs is very small. These operating systems are
designed to respond to events in real time. They are used in applications that
require quick and deterministic responses, such as embedded systems,
industrial control systems, and robotics.
d) Time Sharing OS - A time-shared operating system uses CPU scheduling
and multi-programming to provide each user with a small portion of a shared
computer at once. Each user has at least one separate program in memory. A
program is loaded into memory and executes, it performs a short period of time
either before completion or to complete I/O. This short period of time during
which the user gets the attention of the CPU is known as time slice, time slot,
or quantum.
8)Explain how does a process gets executed inside memory - explain process state
and queue
10) Ageing is a technique of gradually increasing the priority of processes that wait
in the system for a long time
It solves problem of starvation
13)How does an operating system handle I/O operations? Using device driver
14)What is the role of the interrupt handler in an operating system? here
15)How does a process communicate with another process in an operating system?
Inter Process COmmunication happens in 2 ways
a) Shared memory model - processes read write data in shared memory
space and exchange info
b) Message passing -
16) How does an operating system handle file permissions and security?
File protection is an essential component of modern operating systems, ensuring
that files are secured from unauthorised access, alteration, or deletion.
Some mechanisms are - file permissions , encryption , access control lists , logging ,
Seek Time
Seek time is the time taken in locating the disk arm to a specified track where the
read/write request will be satisfied.
Rotational Latency
It is the time taken by the desired sector to rotate itself to the position from where
it can access the R/W heads.
DBMS
CN
What is LLD ?
In LLD, the focus is more on designing each component in detail such as what classes are
needed, what abstractions to use, how object creation should happen, how data flows between
different objects, etc. LLD converts the high-level design into detailed design (ready to code)
components.
Class diagrams reflect the real world problem in terms of classes their relationship with other
classes how they interact with other classes responsibility of every class in terms of class
methods and functions and the data and information those classes hold in terms of class
attributes.
while designing complex systems these class interactions can get fairly complicated
and hence uml sequence diagram actually help us to understand how different instances of
classes are interacting with each other what messages they are passing to each other in what
particular order .
Tip - to understand classes kya honge , find the nouns in the problem statement , and the verbs
associated will the methods of that class
a) Has a
Composition - when one class has no meaninful existence without another class. Example
Class Human and Class Credit card. Every human has a credit card , but without human card is
useless or doesnt make sense
Aggregation - one class’ existence doesnt matter to another class. They can exist
independently
Example - Class Cart has Class Fruit
But fruit class can exist even if no cart
b) is a relation - refers to inheritance . example class fruit and class banana and class apple
So class banana is a class fruit
KEY IDEA is to hide information of one class from another as much as possible
Done by reducing msgs passed between classes as much as possible and exposing only
necessary methods in classes
SOLID PRINCIPLES
If adhered to correctly , change in one class shouldnt affect other classes in anyway
Open CLosed Principle
Open for extension closed for modification
It promotes the use of interfaces to enable you to adapt the functionality of your application
without changing the existing code.
The principle defines that objects of a superclass shall be replaceable with objects of its
subclasses without breaking the application. That requires the objects of your subclasses to
behave in the same way as the objects of your superclass.
This is used to check if inheritance in our code is done correctly and logically.
Good example – Low Level Design 107 | Liskov Substitution Principle | 2022 | System D…
DESIGN PATTERNS ‘
https://youtu.be/tAuRQs_d9F8
Even after tools like , uml diagrams, objects classes , solid principles it is somewhat tough to
convert real world problems to OOP model.
SOme commonly encountered complex design problems were identified by people over time
and we study them to save time and use the solution directly, solution here is design patterns
which are tried and tested
Types -
Creational - when instantiating new objects or create new classes
Structural - how different objects and classes are structured in relation to each other like
inheritance or how the implementation is done.
Behavioural -how objects and classes coomunicate
Situations where a class needs to have lots of constructors this can be used.
When we need only one instance of a class , ie a shared resource which many modules
can access but we need to make sure it is noy over written
We do it my creating a class with a private variable and its private constructor we only
expose its getter function
Facade Design Pattern
Facade means to have a positive outward appearance in order to hide the chaos inside
Similarly in this design pattern , we allow the client to use a facade class to simplify his task
Instead of client having access to 3-4 different classes for some functionality , give user access
to facade class which will do the operations for the client.
Acts as a medium to connect 2 diff classes which output and input different things
In cases where similar objects are created in large numbers , program starts becoming slow.
To optimize this we use flyweight patterns
In these n number of objects there are some properties common among all which dont change (
intrinsic properties ) , we store them in our code and this saves memory
System Design HLD
We try to store data in different geographical regions to decrease latency.
WHere data stored and how fetched is content delivery network.
Video streaming - data broken into chunks and we fetch these chunks. At the start we see some
buffering. Now while we watching 1 chunk , the other chunks arrive and placed in a queue
before chunk1 is viewed.
Quality adjustment - data is encoded into different quality bsed on bitrate, its the number of bits
used to store some data
Load balancing - when we have multiple servers and many clients are sending requests ,
the problem we face is which server out of n servers to send the data to ? WIll the client
decide send request to server-2 , so client sends request to a load balancer which is
responsible for routing the request to a server making sure the load is spread optimally
among all servers
There can be some requests which are asked more frequently and has the same response , so
such responses are cached using different strategies.
PROJECTS
https://docs.google.com/document/d/1zphPiyJFyxWJjKo_z1d84O9ZKzMab-Bz2776ui3oJ9M/edi
t