Bosch Global Software Technologies
200+ Your Nurse India Interview Questions and Answers
You have been given an array 'ARR' of 'N' distinct elements.
Your task is to find the minimum no. of swaps required to sort the array.
For example:
For the given...read more
You have been given a binary tree of 'N' nodes. Print the Spiral Order traversal of this binary tree.
For example
For the given binary tree [1, 2, 3, -1, -1, 4, 5, -1, -1,...read more
Given an array ‘A’ of size ‘N’, sorted in non-decreasing order. Return the pair of two distinct indices whose value adds up to the given ‘target’. The given array is 0 indexed. So returned indices are in...read more
You are given a positive integer ‘N’. Your task is to print all prime numbers less than or equal to N.
Note: A prime number is a natural number that is divisible only by 1 and itself. Example ...read more
You are given two Singly Linked List of integers, which are merging at some node of a third linked list.
Your task is to find the data of the node at which merging starts. If there is...read more
You are given a N x M matrix of integers, print the spiral path of the matrix.
For example:
Input Format:
The first line contains an integer 'T' which denotes the number of test cases or queries t...read more
What is the use of a router and how is it different from a gateway?
Print 1 to 100 using more than two threads(optimized approach).
Q9. coding questions Program to print the length of a given string Program to sort array using bubble sort Program to find the occurrence of character in a string Basic questions on c programming about Memory Opera...
read moreAnswering coding questions related to string manipulation, array sorting, character occurrence, C programming basics, memory, operators, unions, structures, OOPs concepts.
For finding the length of a given string, use the strlen() function in C.
Bubble sort algorithm can be used to sort an array in ascending or descending order.
To find the occurrence of a character in a string, iterate through the string and count the occurrences.
C programming basics include data types, variabl...read more
Q10. What is KCL,KVL? Consider a 5V DC supply connected to a 2 ohm resistor in the first mesh/loop followed by a 5 ohm resistor in the second/next loop or mesh. What is the voltage drop across 5 ohm resistor? Calcul...
read moreQuestions related to electrical engineering and digital electronics.
KCL (Kirchhoff's Current Law) states that the sum of currents entering a node is equal to the sum of currents leaving the node.
KVL (Kirchhoff's Voltage Law) states that the sum of voltage drops around a closed loop is equal to the applied voltage.
The voltage drop across the 5 ohm resistor is 3V.
The equivalent resistance of 4 meshes each having 3 resistances of 2 ohms is 6 ohms.
Microprocessor is a single chip ...read more
What is Garbage collector in JAVA?
What do you mean by data encapsulation?
When can you use super keyword?
What is meant by normalization and denormalization?
Difference between Process and Program
What’s the difference between manual testing and automated testing?
Explain Singleton Class in Java
Describe the OSI Reference Model
What are some of the best practices in test automation?
Why should Selenium be selected as a testing tool for web applications or systems?
Difference between Process and Thread
Q22. Embedded systems? A program to multiply two hex numbers in 8051 microcontroller. Explain 8051 architecture and each component involved? Harvard vs Von neuman architecture? Risc vs cisc? Memory of 8051? Register...
read moreExplanation of 8051 architecture, memory, register banks, and RTOS.
8051 architecture consists of CPU, RAM, ROM, Timers, Serial Port, Interrupts, and I/O ports.
Harvard architecture has separate memory for instructions and data, while Von Neumann architecture has a single memory for both.
RISC architecture has simple instructions and fewer addressing modes, while CISC architecture has complex instructions and more addressing modes.
8051 has 128 bytes of RAM and 4 KB of ROM.
8051 h...read more
Q23. What is the difference between inline block and a normal block in CSS
Inline block is similar to inline but can have width and height properties. Normal block takes up full width and creates a new line.
Inline block elements can be aligned horizontally and vertically within a line
Normal block elements take up full width and create a new line
Inline block elements can have width and height properties
Examples of inline block elements are images and buttons
Examples of normal block elements are paragraphs and headings
Explain TCP/IP Model
Explain Left Outer Join and Right Outer Join.
Q26. Can we make a software that can predict the crypto market
No, it is not possible to accurately predict the crypto market with software.
The crypto market is highly volatile and influenced by various factors such as news, regulations, and investor sentiment.
Past performance does not guarantee future results, making it difficult to create a reliable prediction model.
Many attempts have been made to predict the crypto market with software, but none have been consistently successful.
However, software can be used to analyze market trends a...read more
Difference between Primary key and Unique key
What is the importance of agile testing?
Q29. 6. Differences among method, constructor and deconstructor?
Method, constructor and destructor are all used in object-oriented programming to define and manipulate objects.
A method is a function that is associated with an object and can be called to perform an action on that object.
A constructor is a special method that is called when an object is created and is used to initialize the object's properties.
A destructor is a special method that is called when an object is destroyed and is used to clean up any resources that the object wa...read more
Q30. Why C is preferred over python in embedded systems
C is preferred over Python in embedded systems due to its low-level control and efficiency.
C allows for direct memory manipulation and low-level hardware access, which is necessary in embedded systems.
Python, on the other hand, is a high-level language that requires an interpreter, making it less efficient and slower than C.
C also has a smaller memory footprint and can be optimized for specific hardware, making it ideal for embedded systems.
Python is better suited for applica...read more
What are the different components of Selenium?
What is meant by Selenese? Explain different types of Selenium commands.
How can you run a selected test from a group of tests in Cucumber?
Q34. How you convert hexadecimal no. To binary no.?
To convert hexadecimal to binary, replace each hexadecimal digit with its 4-bit binary equivalent.
Divide the hexadecimal number into individual digits
Convert each digit to its 4-bit binary equivalent
Combine the binary digits to form the binary equivalent of the hexadecimal number
Q35. Write a program to sort an array of numbers
Program to sort an array of numbers
Use a sorting algorithm like bubble sort, insertion sort, or quicksort
Loop through the array and compare adjacent elements to swap them if necessary
Repeat until the array is sorted in ascending or descending order
Q36. Difference between microcontroller and micro processor
Microcontroller is a self-contained system with memory, input/output peripherals and a processor. Microprocessor only has a processor.
Microcontroller has on-chip memory and peripherals while microprocessor requires external memory and peripherals
Microcontroller is used in embedded systems while microprocessor is used in personal computers
Microcontroller is cheaper and consumes less power than microprocessor
Examples of microcontrollers are Arduino, PIC, and AVR while examples ...read more
Explain what are the JUnits annotation linked with Selenium?
Q38. 1. How to use unions inside structure? When is a union used.
Unions inside structures allow multiple variables to share the same memory location. They are used when only one variable needs to be active at a time.
Unions are used when you want to save memory by sharing the same memory location for different variables in a structure.
Only one variable inside the union can be active at a time, as they all share the same memory space.
Unions are useful when you have a structure with multiple variables, but only one variable needs to be active...read more
Q39. What is the difference between array and list?
Array is a fixed-size data structure while list is a dynamic data structure.
Arrays have a fixed size while lists can grow or shrink dynamically.
Arrays store elements of the same data type while lists can store elements of different data types.
Arrays are accessed using an index while lists are accessed using an iterator.
Examples of arrays include int[], char[], and boolean[] while examples of lists include ArrayList and LinkedList.
Q40. How you will perform diagnosis on Automotive when your senior is not nearby
To diagnose automotive issues when senior is not nearby, I would rely on my knowledge, experience, and available resources.
Utilize diagnostic tools and equipment to identify and troubleshoot problems
Refer to technical manuals, online resources, and forums for guidance
Collaborate with colleagues or seek advice from experts remotely
Use logical reasoning and problem-solving skills to analyze symptoms and potential causes
Document observations, perform tests, and gather data for f...read more
How many Aggregate functions are available in SQL?
Q42. Explain waterfall life cycle model and its stages?
Waterfall model is a linear sequential approach to software development.
It consists of five stages: Requirements, Design, Implementation, Testing, and Maintenance.
Each stage must be completed before moving on to the next.
It is a rigid model and changes cannot be made easily once a stage is completed.
It is suitable for projects with well-defined requirements and stable technology.
Example: Developing a calculator app.
Q43. What is Opamp? Opamp as inverting and non inverting adder n application of Opamp as summer, integrator, differentiator, voltage follower with ckt diagrams. Any question for us?
Opamp is a high-gain electronic amplifier used in various applications such as inverting and non-inverting adder, summer, integrator, differentiator, and voltage follower.
Opamp stands for operational amplifier and is a type of amplifier with a high gain and differential input.
In an inverting adder configuration, the output is the negative sum of the input voltages.
In a non-inverting adder configuration, the output is the sum of the input voltages.
Opamp can be used as a summer...read more
Q44. Code to sort the numbers in ascending order
Use a sorting algorithm like bubble sort or quicksort to arrange numbers in ascending order.
Implement a sorting algorithm like bubble sort, selection sort, insertion sort, quicksort, etc.
For example, in bubble sort, compare adjacent elements and swap them if they are in the wrong order.
Repeat this process until the array is sorted in ascending order.
Q45. Does python have array data structure in it?
Yes, Python has array data structure in it.
Python has a built-in array module that provides an array() object
Arrays can be of any type, such as integers, floating-point numbers, and strings
Arrays are mutable and can be modified using various methods
Q46. Can layers and explain each layers functionality, CAN frames , CAN errors
CAN (Controller Area Network) has multiple layers including physical, data link, network, transport, and application layers. Each layer has specific functionality.
Physical layer: Handles the transmission of bits over the physical medium.
Data link layer: Manages the transmission of data frames between nodes.
Network layer: Controls the flow of data between nodes on the network.
Transport layer: Ensures reliable data transfer between nodes.
Application layer: Provides interfaces f...read more
Q47. 4. Explain Encryption and Decryption Techniques?
Encryption is the process of converting plain text into a coded message, while decryption is the process of converting the coded message back into plain text.
Encryption uses an algorithm to scramble the original message into an unreadable format.
Decryption uses a key to reverse the encryption process and retrieve the original message.
Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different keys.
Common encryption tec...read more
Q48. 5. Difference between overriding and overload?
Overriding is when a subclass provides a specific implementation of a method that is already provided by its parent class. Overloading is when a class has two or more methods with the same name but different parameters.
Overriding is used for runtime polymorphism while overloading is used for compile-time polymorphism.
Overriding can only occur in a subclass while overloading can occur in the same class or its subclass.
Overriding changes the method behavior while overloading do...read more
Q49. Difference between big endian and small endian
Big endian and small endian are two ways of storing multi-byte data in computer memory.
Big endian stores the most significant byte first and the least significant byte last.
Small endian stores the least significant byte first and the most significant byte last.
The choice of endianess affects how data is interpreted and communicated between different systems.
For example, the IP protocol uses big endian for its header fields, while the x86 architecture uses small endian for its...read more
What are annotations in Cucumber?
Q51. What is the current project and block diagram of the hw used
The current project involves designing a new embedded system for a smart home automation application.
The project includes developing hardware components such as sensors, actuators, and microcontrollers.
The block diagram consists of interconnected modules for different functionalities like security, lighting control, and energy management.
Example: Sensors detect motion and send signals to the microcontroller, which triggers the lighting control module to turn on the lights.
Exa...read more
Q52. Write a program to swap two numbers
A program to swap two numbers
Declare two variables and assign values to them
Use a third variable to store the value of the first variable
Assign the value of the second variable to the first variable
Assign the value of the third variable to the second variable
Q53. swipe 2 numbers with 3rd variable
Swapping two numbers using a third variable in a software engineering interview.
Declare a third variable to store the value of one of the numbers
Assign the value of the first number to the third variable
Assign the value of the second number to the first number
Assign the value of the third variable to the second number
Q55. Develope simulink model to create filtered signal in 3 different ways
Develop a Simulink model to create filtered signal in 3 different ways
Use different types of filters such as low-pass, high-pass, and band-pass filters
Implement filters using different techniques like FIR and IIR filters
Explore different filter design methods like Butterworth, Chebyshev, and Elliptic filters
Q56. 7. Explain program, process and thread?
Program is a set of instructions that performs a specific task. Process is an instance of a program in execution. Thread is a subset of a process.
Program is a set of instructions written in a programming language.
Process is an instance of a program in execution. It has its own memory space and system resources.
Thread is a subset of a process. It is a lightweight process that shares the same memory space and system resources as the parent process.
Multiple threads can run concu...read more
Explain the working of SQL Privileges?
Q58. Draw and explain D flop truth table
D flip-flop is a digital circuit that stores a single bit of data and transfers it to the output on the rising edge of the clock signal.
D flip-flop has a single data input (D) and two outputs (Q and Q').
The truth table for D flip-flop is: D Q(t) Q(t+1), 0 0 0, 1 1 1.
The D input is sampled on the rising edge of the clock signal and transferred to the output.
The Q output is the complement of the Q' output.
D flip-flop is used in sequential circuits for storing and transferring d...read more
Q59. One employee give print to a printer over network but he/she unable to get print what is the tarbulshoot process
The troubleshooting process involves checking printer connectivity, print queue, printer drivers, and printer settings.
Check if the printer is turned on and connected to the network
Verify if the printer is added to the user's computer and set as the default printer
Check the print queue for any stuck print jobs
Ensure that the printer drivers are up-to-date and compatible with the user's computer
Verify the printer settings such as paper size, orientation, and print quality
Resta...read more
Q60. What is Fibonacci series and write the code
Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.
Start with 0 and 1 as the first two numbers in the series
Each subsequent number is the sum of the two preceding numbers
Example: 0, 1, 1, 2, 3, 5, 8, 13, 21, ...
Q61. 1. Explain the architecture of a model that you built in your previous job.
The model architecture I built in my previous job was a deep learning neural network with multiple layers and activation functions.
Used a combination of convolutional and recurrent layers for image and text data processing
Incorporated dropout layers to prevent overfitting
Utilized batch normalization for faster convergence
Implemented various activation functions such as ReLU and sigmoid
Included a softmax layer for multi-class classification
Q62. 3. Explain each layer of OSI?
OSI model has 7 layers that define how data is transmitted over a network.
Layer 1: Physical layer - deals with physical connections and electrical signals.
Layer 2: Data link layer - responsible for error-free transfer of data between nodes.
Layer 3: Network layer - handles routing of data packets between networks.
Layer 4: Transport layer - ensures reliable data transfer between end-to-end connections.
Layer 5: Session layer - establishes and manages communication sessions betwe...read more
Q63. What is bootloader
Bootloader is a program that loads and starts the operating system when a computer is turned on.
Bootloader is the first program that runs when a computer is turned on.
It is responsible for loading and executing the operating system.
Bootloader is usually stored in the computer's firmware or on the hard drive.
It performs hardware checks and initializes the system before loading the OS.
Examples of bootloaders include GRUB, LILO, and Windows Boot Manager.
Q64. assemble desktop managed and set the process
To assemble a desktop, manage and set the process, follow these steps:
Gather all necessary components such as motherboard, CPU, RAM, hard drive, power supply, etc.
Install the CPU onto the motherboard and attach the heatsink/fan
Insert the RAM into the appropriate slots on the motherboard
Attach the hard drive and optical drive to the motherboard using SATA cables
Connect the power supply to the motherboard and other components
Install the operating system and necessary drivers
Con...read more
Difference between Selenium and Cucumber.
Q68. Can you explain virtual keyword
The virtual keyword in C++ is used to declare a member function in a base class that can be overridden in a derived class.
Virtual keyword is used to achieve runtime polymorphism in C++
Virtual functions are declared in a base class and can be overridden in derived classes
When a virtual function is called, the actual function that gets executed is determined at runtime based on the type of object
Q69. swipe 2 numbers without 3rd variable
Swapping two numbers without using a third variable.
Use the XOR operation to swap the numbers.
Assign the first number to the second number using XOR.
Assign the result of XOR operation to the first number.
The numbers are now swapped without using a third variable.
Q70. 2. Explain OOPs Concepts?
OOPs concepts are the principles of Object-Oriented Programming that help in designing and implementing software systems.
Encapsulation - bundling of data and methods that operate on that data
Inheritance - creating new classes from existing ones
Polymorphism - ability of objects to take on many forms
Abstraction - hiding implementation details and showing only functionality
Example: A car is an object that encapsulates data such as speed, fuel level, and methods such as accelerat...read more
Q71. What are the plugins used in jenkins
Jenkins has a wide range of plugins for various functionalities.
Pipeline plugins (e.g. Pipeline, Multibranch Pipeline)
SCM plugins (e.g. Git, SVN)
Build and test plugins (e.g. Maven, JUnit)
Notification plugins (e.g. Email, Slack)
Monitoring plugins (e.g. Prometheus, Grafana)
Q72. How we integrate other tools to jenkins
Integrating other tools to Jenkins involves using plugins and configuring build pipelines.
Install the necessary plugins for the tools you want to integrate with Jenkins
Configure the tools in Jenkins global configuration settings
Create build pipelines that include steps for interacting with the integrated tools
Use Jenkins API to automate interactions with external tools
Q73. What is the difference between .pst and .ost file ?
PST is a personal storage table used by Outlook to store emails and other items, while OST is an offline storage table used for cached Exchange mode.
PST is a local file that stores emails, contacts, calendar items, and other data in Outlook.
OST is a copy of data from a user's mailbox on an Exchange server that is stored on the user's computer.
PST files can be imported and exported, while OST files cannot.
OST files are used for cached Exchange mode, which allows users to acces...read more
Q74. Why are you interested in the field of embedded software development?
I am fascinated by the challenge of working with low-level hardware and creating efficient, real-time systems.
Enjoy the challenge of working with low-level hardware
Excited about creating efficient, real-time systems
Passionate about developing innovative solutions for embedded systems
Q75. How do you translate program vision into actionable plan for each individual projects under the program.
Translate program vision into actionable plans by breaking down goals, assigning tasks, setting timelines, and monitoring progress.
Break down the program vision into specific goals and objectives for each project.
Assign tasks and responsibilities to team members based on their skills and expertise.
Set clear timelines and milestones to track progress and ensure deadlines are met.
Monitor the progress of each project regularly and make adjustments as needed to stay on track.
Comm...read more
Q76. which tool you have used to perform unit testing please elaborate
I have used JUnit for performing unit testing in Java projects.
JUnit is a popular unit testing framework for Java
It provides annotations like @Test to define test methods
JUnit assertions like assertEquals are used to verify expected results
Q77. What does you Hil environment consists of ?
My Hil environment consists of various tools and technologies for testing and automation.
We use tools like Selenium, Appium, JMeter, and SoapUI for testing.
We also use Jenkins for continuous integration and deployment.
Our environment includes both physical and virtual machines for testing.
We have a variety of operating systems and browsers for testing compatibility.
We use various scripting languages like Java, Python, and Ruby for automation.
We have a dedicated team for perfo...read more
Q78. Sample program in Capl to send a message cyclically.
A sample Capl program to send a message cyclically.
Use the 'on timer' event to send the message at a fixed interval
Create a message object and set its data and length
Use the 'output' function to send the message
Use the 'setTimer' function to set the timer for the next cycle
Q79. Explain with neat diagram to control hardware interface with microntroller
Hardware interface with microcontroller can be controlled using GPIO pins and communication protocols like SPI, I2C, UART.
Use GPIO pins to control hardware peripherals like LEDs, motors, sensors
Implement communication protocols like SPI, I2C, UART to interface with external devices
Design a circuit diagram showing connections between microcontroller and hardware components
Q80. How do to calculate slip ratio
Slip ratio is calculated by dividing the difference between the actual speed of a wheel and the speed of the vehicle by the speed of the vehicle.
Calculate the actual speed of the wheel by multiplying the wheel radius with the angular velocity of the wheel.
Calculate the speed of the vehicle using GPS or speedometer readings.
Subtract the actual speed of the wheel from the speed of the vehicle.
Divide the difference by the speed of the vehicle to get the slip ratio.
Q81. 1.Explain Autosar and it's different layers
Autosar is a standardized automotive software architecture that defines different layers for software development.
Autosar stands for Automotive Open System Architecture
It is a collaboration between automotive manufacturers, suppliers, and tool developers
The different layers of Autosar are Application Layer, RTE Layer, Basic Software Layer, and Microcontroller Abstraction Layer
The Application Layer contains the software components that implement the functionality of the vehicl...read more
Q82. Why can bus uses 120 ohm resistance
120 ohm resistance is used in CAN bus to match the characteristic impedance of the transmission line.
CAN bus is a differential signaling system that requires a balanced impedance to prevent signal reflections.
The 120 ohm resistance matches the characteristic impedance of the transmission line, which is typically 120 ohms.
Without the proper impedance matching, signal reflections can cause data errors and reduce the maximum communication distance.
The 120 ohm resistance is typic...read more
Q83. Adas levels and explain the details. -5 levels (level 0 to level 5) Level 0 starts has no automation and level 5 has complete remaining levels are partial and conditional
ADAS levels range from 0 to 5, with varying degrees of automation. Level 0 has no automation, while level 5 is fully automated.
Level 0: No automation, driver is fully in control.
Level 1: Driver assistance, such as cruise control.
Level 2: Partial automation, like lane-keeping assist.
Level 3: Conditional automation, where the car can handle certain tasks but the driver must be ready to take over.
Level 4: High automation, the car can handle most tasks but still requires driver i...read more
Q84. What is transisistor? Internal structure of op amp What is decoder and encoder? What is zener diode? Mosfet vs igbt qpplications
Q85. What is the principle of analog to digital converter?
An analog to digital converter converts continuous analog signals into discrete digital values.
Converts continuous analog signals into digital values
Utilizes sampling and quantization techniques
Common types include successive approximation ADC and delta-sigma ADC
Q86. How do we name to the node
Nodes can be named based on their functionality, purpose, or position in a hierarchy.
Name based on functionality (e.g. loginNode, paymentNode)
Name based on purpose (e.g. validationNode, processingNode)
Name based on position in hierarchy (e.g. parentNode, childNode)
Q87. What is https and ssh cloning
HTTPS is a secure communication protocol used for secure communication over the internet. SSH cloning is a method of cloning a repository using the SSH protocol.
HTTPS stands for Hypertext Transfer Protocol Secure and is used to secure communication over the internet.
It encrypts the data being transmitted between the client and the server, providing a secure connection.
SSH cloning is a method of cloning a Git repository using the SSH protocol instead of HTTPS.
It allows for sec...read more
Q88. Jenkis node , what is the use
Jenkins node is a machine that executes tasks as part of a Jenkins build process.
Jenkins nodes can be physical machines or virtual machines.
Nodes can be configured to run specific types of jobs or tasks.
Nodes help distribute workload and improve efficiency in Jenkins pipelines.
Q89. Print the duplicate elements in an array
Print duplicate elements in an array of strings
Iterate through the array and store elements in a HashMap with element as key and count as value
Print elements with count greater than 1 as duplicates
Q90. Are the completed OS issue
I'm sorry, but I don't understand the question. Could you please rephrase it?
Please provide more context or clarify the question
I am not sure what you mean by 'completed OS issue'
Could you please provide more information or rephrase the question?
Q91. Any problem and project to manage
I managed a project to upgrade network infrastructure and troubleshooted connectivity issues.
Upgraded network switches and routers to improve performance
Identified and resolved connectivity issues for remote users
Implemented network security measures to prevent unauthorized access
Managed network documentation and inventory
Collaborated with cross-functional teams to ensure project success
Q92. plot graphs engine out emissions Vs lambda
Plotting graphs of engine out emissions vs lambda is essential for analyzing the relationship between emissions and air-fuel ratio.
Lambda values represent the air-fuel ratio in an engine, with stoichiometric ratio at 1.0.
Engine out emissions include pollutants like CO, HC, and NOx.
Graphs can help identify optimal lambda values for minimizing emissions.
Example: Higher lambda values (lean mixtures) can reduce CO emissions but increase NOx emissions.
Example: Lower lambda values ...read more
Q93. Difference between bus and mix block
Bus is a communication block used to transfer data between components, while mix block is a processing block used to perform operations on data.
Bus is used for data transfer between components in a system
Mix block is used for processing data within a system
Bus is like a highway for data transfer, while mix block is like a junction where data is processed
Q94. How to find middle of a linked list using 2 pointers method
Use two pointers, one moving twice as fast as the other, to find the middle of a linked list.
Initialize two pointers, slow and fast, at the head of the linked list
Move slow pointer by one node and fast pointer by two nodes until fast pointer reaches the end
The node pointed to by slow pointer will be the middle of the linked list
Q95. Diff b/w docker and docker swarm
Docker is a containerization platform for running applications in isolated environments, while Docker Swarm is a tool for orchestrating multiple Docker containers across multiple hosts.
Docker is used for creating and managing containers, while Docker Swarm is used for managing multiple containers across multiple hosts.
Docker is suitable for single host deployments, while Docker Swarm is suitable for multi-host deployments.
Docker Swarm provides features like service discovery,...read more
Q96. Show a typical manufacturing drawing template with necessary details.
A manufacturing drawing template typically includes details such as dimensions, tolerances, materials, and finishing.
Title block with part name, drawing number, and revision
List of materials and their specifications
Detailed views with dimensions and tolerances
Bill of materials with part numbers and quantities
Notes section for additional information
Finishing requirements such as surface roughness and coatings
Reference to applicable standards and specifications
Q97. Com Apis names in each bsw layer
The question is asking for the names of Com APIs in each BSW layer.
BSW layer refers to the Basic Software layer in an embedded system.
Com APIs are communication application programming interfaces.
Provide the names of Com APIs used in each BSW layer.
Example: BSW Layer 1 - CanIf, BSW Layer 2 - CanTp, BSW Layer 3 - ComM
Q98. Explain relations between software and hardware
Software and hardware work together to enable a computer system to function properly.
Software is the set of instructions that tell the hardware what to do.
Hardware refers to the physical components of a computer system.
Software interacts with hardware through drivers and APIs.
Hardware provides the platform on which software runs and executes tasks.
Examples include a computer's operating system (software) interacting with its processor (hardware).
Q99. How to reduce engine out NOx
To reduce engine out NOx, optimize combustion process, use exhaust gas recirculation, and employ selective catalytic reduction.
Optimize combustion process by adjusting air-fuel ratio and injection timing
Utilize exhaust gas recirculation to reduce peak combustion temperatures
Employ selective catalytic reduction to convert NOx into nitrogen and water
Q100. Difference between malloc and calloc
malloc is used to allocate memory block of specified size, while calloc initializes the allocated memory block with zero values.
malloc does not initialize the allocated memory, while calloc initializes it to zero
malloc takes one argument specifying the size of memory block to allocate
calloc takes two arguments - number of elements to allocate and size of each element
Example: int *ptr = (int*)malloc(5 * sizeof(int));
Example: int *ptr = (int*)calloc(5, sizeof(int));
More about working at Bosch Global Software Technologies
Top HR Questions asked in Your Nurse India
Interview Process at Your Nurse India
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month