Add office photos
Employer?
Claim Account for FREE

Bosch Global Software Technologies

4.0
based on 4.1k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

200+ Your Nurse India Interview Questions and Answers

Updated 26 Nov 2024
Popular Designations
Q1. Minimum number of swaps required to sort an array

You have been given an array 'ARR' of 'N' distinct elements.

Your task is to find the minimum no. of swaps required to sort the array.

For example:
For the given...read more
View 3 more answers
Q2. Spiral Order Traversal of a Binary Tree

You have been given a binary tree of 'N' nodes. Print the Spiral Order traversal of this binary tree.

For example
For the given binary tree [1, 2, 3, -1, -1, 4, 5, -1, -1,...read more
View 3 more answers
Q3. Two Sum

Given an array ‘A’ of size ‘N’, sorted in non-decreasing order. Return the pair of two distinct indices whose value adds up to the given ‘target’. The given array is 0 indexed. So returned indices are in...read more

View 2 more answers
Q4. Find prime numbers

You are given a positive integer ‘N’. Your task is to print all prime numbers less than or equal to N.

Note: A prime number is a natural number that is divisible only by 1 and itself. Example ...read more

View 4 more answers
Discover Your Nurse India interview dos and don'ts from real experiences
Q5. Intersection of Linked List

You are given two Singly Linked List of integers, which are merging at some node of a third linked list.

Your task is to find the data of the node at which merging starts. If there is...read more

View 4 more answers
Q6. Spiral Matrix

You are given a N x M matrix of integers, print the spiral path of the matrix.

For example:

Spiral Path

Input Format:
The first line contains an integer 'T' which denotes the number of test cases or queries t...read more
View 4 more answers
Are these interview questions helpful?
Q7. Computer Networks Question

What is the use of a router and how is it different from a gateway?

Add your answer
Q8. OS Question

Print 1 to 100 using more than two threads(optimized approach).

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. coding questions Program to print the length of a given string Program to sort array using bubble sort Program to find the occurrence of character in a string Basic questions on c programming about Memory Opera...

read more
Ans.

Answering coding questions related to string manipulation, array sorting, character occurrence, C programming basics, memory, operators, unions, structures, OOPs concepts.

  • For finding the length of a given string, use the strlen() function in C.

  • Bubble sort algorithm can be used to sort an array in ascending or descending order.

  • To find the occurrence of a character in a string, iterate through the string and count the occurrences.

  • C programming basics include data types, variabl...read more

Add your answer

Q10. What is KCL,KVL? Consider a 5V DC supply connected to a 2 ohm resistor in the first mesh/loop followed by a 5 ohm resistor in the second/next loop or mesh. What is the voltage drop across 5 ohm resistor? Calcul...

read more
Ans.

Questions related to electrical engineering and digital electronics.

  • KCL (Kirchhoff's Current Law) states that the sum of currents entering a node is equal to the sum of currents leaving the node.

  • KVL (Kirchhoff's Voltage Law) states that the sum of voltage drops around a closed loop is equal to the applied voltage.

  • The voltage drop across the 5 ohm resistor is 3V.

  • The equivalent resistance of 4 meshes each having 3 resistances of 2 ohms is 6 ohms.

  • Microprocessor is a single chip ...read more

Add your answer
Q11. Java Question

What is Garbage collector in JAVA?

Add your answer
Q12. OOPS Question

What do you mean by data encapsulation?

Add your answer
Q13. OOPS Question

When can you use super keyword?

Add your answer
Q14. DBMS Question

What is meant by normalization and denormalization?

Add your answer
Q15. OS Question

Difference between Process and Program

Add your answer
Q16. Automation Testing Question

What’s the difference between manual testing and automated testing?

Add your answer
Q17. OOPS Question

Explain Singleton Class in Java

Add your answer
Q18. Computer Networks Question

Describe the OSI Reference Model

Add your answer
Q19. Automation Testing Question

What are some of the best practices in test automation?

Add your answer
Q20. Selenium Question

Why should Selenium be selected as a testing tool for web applications or systems?

Add your answer
Q21. OS Question

Difference between Process and Thread

Add your answer

Q22. Embedded systems? A program to multiply two hex numbers in 8051 microcontroller. Explain 8051 architecture and each component involved? Harvard vs Von neuman architecture? Risc vs cisc? Memory of 8051? Register...

read more
Ans.

Explanation of 8051 architecture, memory, register banks, and RTOS.

  • 8051 architecture consists of CPU, RAM, ROM, Timers, Serial Port, Interrupts, and I/O ports.

  • Harvard architecture has separate memory for instructions and data, while Von Neumann architecture has a single memory for both.

  • RISC architecture has simple instructions and fewer addressing modes, while CISC architecture has complex instructions and more addressing modes.

  • 8051 has 128 bytes of RAM and 4 KB of ROM.

  • 8051 h...read more

Add your answer

Q23. What is the difference between inline block and a normal block in CSS

Ans.

Inline block is similar to inline but can have width and height properties. Normal block takes up full width and creates a new line.

  • Inline block elements can be aligned horizontally and vertically within a line

  • Normal block elements take up full width and create a new line

  • Inline block elements can have width and height properties

  • Examples of inline block elements are images and buttons

  • Examples of normal block elements are paragraphs and headings

Add your answer
Q24. Computer Networks Question

Explain TCP/IP Model

Add your answer
Q25. DBMS Question

Explain Left Outer Join and Right Outer Join.

Add your answer

Q26. Can we make a software that can predict the crypto market

Ans.

No, it is not possible to accurately predict the crypto market with software.

  • The crypto market is highly volatile and influenced by various factors such as news, regulations, and investor sentiment.

  • Past performance does not guarantee future results, making it difficult to create a reliable prediction model.

  • Many attempts have been made to predict the crypto market with software, but none have been consistently successful.

  • However, software can be used to analyze market trends a...read more

Add your answer
Q27. DBMS Question

Difference between Primary key and Unique key

Add your answer
Q28. Software Testing Question

What is the importance of agile testing?

Add your answer

Q29. 6. Differences among method, constructor and deconstructor?

Ans.

Method, constructor and destructor are all used in object-oriented programming to define and manipulate objects.

  • A method is a function that is associated with an object and can be called to perform an action on that object.

  • A constructor is a special method that is called when an object is created and is used to initialize the object's properties.

  • A destructor is a special method that is called when an object is destroyed and is used to clean up any resources that the object wa...read more

Add your answer

Q30. Why C is preferred over python in embedded systems

Ans.

C is preferred over Python in embedded systems due to its low-level control and efficiency.

  • C allows for direct memory manipulation and low-level hardware access, which is necessary in embedded systems.

  • Python, on the other hand, is a high-level language that requires an interpreter, making it less efficient and slower than C.

  • C also has a smaller memory footprint and can be optimized for specific hardware, making it ideal for embedded systems.

  • Python is better suited for applica...read more

Add your answer
Q31. Selenium Question

What are the different components of Selenium?

Add your answer
Q32. Selenium Question

What is meant by Selenese? Explain different types of Selenium commands.

Add your answer
Q33. Cucumber Question

How can you run a selected test from a group of tests in Cucumber?

Add your answer

Q34. How you convert hexadecimal no. To binary no.?

Ans.

To convert hexadecimal to binary, replace each hexadecimal digit with its 4-bit binary equivalent.

  • Divide the hexadecimal number into individual digits

  • Convert each digit to its 4-bit binary equivalent

  • Combine the binary digits to form the binary equivalent of the hexadecimal number

Add your answer

Q35. Write a program to sort an array of numbers

Ans.

Program to sort an array of numbers

  • Use a sorting algorithm like bubble sort, insertion sort, or quicksort

  • Loop through the array and compare adjacent elements to swap them if necessary

  • Repeat until the array is sorted in ascending or descending order

Add your answer

Q36. Difference between microcontroller and micro processor

Ans.

Microcontroller is a self-contained system with memory, input/output peripherals and a processor. Microprocessor only has a processor.

  • Microcontroller has on-chip memory and peripherals while microprocessor requires external memory and peripherals

  • Microcontroller is used in embedded systems while microprocessor is used in personal computers

  • Microcontroller is cheaper and consumes less power than microprocessor

  • Examples of microcontrollers are Arduino, PIC, and AVR while examples ...read more

Add your answer
Q37. Selenium Question

Explain what are the JUnits annotation linked with Selenium?

Add your answer

Q38. 1. How to use unions inside structure? When is a union used.

Ans.

Unions inside structures allow multiple variables to share the same memory location. They are used when only one variable needs to be active at a time.

  • Unions are used when you want to save memory by sharing the same memory location for different variables in a structure.

  • Only one variable inside the union can be active at a time, as they all share the same memory space.

  • Unions are useful when you have a structure with multiple variables, but only one variable needs to be active...read more

Add your answer

Q39. What is the difference between array and list?

Ans.

Array is a fixed-size data structure while list is a dynamic data structure.

  • Arrays have a fixed size while lists can grow or shrink dynamically.

  • Arrays store elements of the same data type while lists can store elements of different data types.

  • Arrays are accessed using an index while lists are accessed using an iterator.

  • Examples of arrays include int[], char[], and boolean[] while examples of lists include ArrayList and LinkedList.

Add your answer

Q40. How you will perform diagnosis on Automotive when your senior is not nearby

Ans.

To diagnose automotive issues when senior is not nearby, I would rely on my knowledge, experience, and available resources.

  • Utilize diagnostic tools and equipment to identify and troubleshoot problems

  • Refer to technical manuals, online resources, and forums for guidance

  • Collaborate with colleagues or seek advice from experts remotely

  • Use logical reasoning and problem-solving skills to analyze symptoms and potential causes

  • Document observations, perform tests, and gather data for f...read more

Add your answer
Q41. SQL Question

How many Aggregate functions are available in SQL?

Add your answer

Q42. Explain waterfall life cycle model and its stages?

Ans.

Waterfall model is a linear sequential approach to software development.

  • It consists of five stages: Requirements, Design, Implementation, Testing, and Maintenance.

  • Each stage must be completed before moving on to the next.

  • It is a rigid model and changes cannot be made easily once a stage is completed.

  • It is suitable for projects with well-defined requirements and stable technology.

  • Example: Developing a calculator app.

Add your answer

Q43. What is Opamp? Opamp as inverting and non inverting adder n application of Opamp as summer, integrator, differentiator, voltage follower with ckt diagrams. Any question for us?

Ans.

Opamp is a high-gain electronic amplifier used in various applications such as inverting and non-inverting adder, summer, integrator, differentiator, and voltage follower.

  • Opamp stands for operational amplifier and is a type of amplifier with a high gain and differential input.

  • In an inverting adder configuration, the output is the negative sum of the input voltages.

  • In a non-inverting adder configuration, the output is the sum of the input voltages.

  • Opamp can be used as a summer...read more

Add your answer

Q44. Code to sort the numbers in ascending order

Ans.

Use a sorting algorithm like bubble sort or quicksort to arrange numbers in ascending order.

  • Implement a sorting algorithm like bubble sort, selection sort, insertion sort, quicksort, etc.

  • For example, in bubble sort, compare adjacent elements and swap them if they are in the wrong order.

  • Repeat this process until the array is sorted in ascending order.

Add your answer

Q45. Does python have array data structure in it?

Ans.

Yes, Python has array data structure in it.

  • Python has a built-in array module that provides an array() object

  • Arrays can be of any type, such as integers, floating-point numbers, and strings

  • Arrays are mutable and can be modified using various methods

Add your answer

Q46. Can layers and explain each layers functionality, CAN frames , CAN errors

Ans.

CAN (Controller Area Network) has multiple layers including physical, data link, network, transport, and application layers. Each layer has specific functionality.

  • Physical layer: Handles the transmission of bits over the physical medium.

  • Data link layer: Manages the transmission of data frames between nodes.

  • Network layer: Controls the flow of data between nodes on the network.

  • Transport layer: Ensures reliable data transfer between nodes.

  • Application layer: Provides interfaces f...read more

Add your answer

Q47. 4. Explain Encryption and Decryption Techniques?

Ans.

Encryption is the process of converting plain text into a coded message, while decryption is the process of converting the coded message back into plain text.

  • Encryption uses an algorithm to scramble the original message into an unreadable format.

  • Decryption uses a key to reverse the encryption process and retrieve the original message.

  • Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different keys.

  • Common encryption tec...read more

Add your answer

Q48. 5. Difference between overriding and overload?

Ans.

Overriding is when a subclass provides a specific implementation of a method that is already provided by its parent class. Overloading is when a class has two or more methods with the same name but different parameters.

  • Overriding is used for runtime polymorphism while overloading is used for compile-time polymorphism.

  • Overriding can only occur in a subclass while overloading can occur in the same class or its subclass.

  • Overriding changes the method behavior while overloading do...read more

Add your answer

Q49. Difference between big endian and small endian

Ans.

Big endian and small endian are two ways of storing multi-byte data in computer memory.

  • Big endian stores the most significant byte first and the least significant byte last.

  • Small endian stores the least significant byte first and the most significant byte last.

  • The choice of endianess affects how data is interpreted and communicated between different systems.

  • For example, the IP protocol uses big endian for its header fields, while the x86 architecture uses small endian for its...read more

Add your answer
Q50. Cucumber Question

What are annotations in Cucumber?

Add your answer

Q51. What is the current project and block diagram of the hw used

Ans.

The current project involves designing a new embedded system for a smart home automation application.

  • The project includes developing hardware components such as sensors, actuators, and microcontrollers.

  • The block diagram consists of interconnected modules for different functionalities like security, lighting control, and energy management.

  • Example: Sensors detect motion and send signals to the microcontroller, which triggers the lighting control module to turn on the lights.

  • Exa...read more

Add your answer

Q52. Write a program to swap two numbers

Ans.

A program to swap two numbers

  • Declare two variables and assign values to them

  • Use a third variable to store the value of the first variable

  • Assign the value of the second variable to the first variable

  • Assign the value of the third variable to the second variable

Add your answer

Q53. swipe 2 numbers with 3rd variable

Ans.

Swapping two numbers using a third variable in a software engineering interview.

  • Declare a third variable to store the value of one of the numbers

  • Assign the value of the first number to the third variable

  • Assign the value of the second number to the first number

  • Assign the value of the third variable to the second number

View 1 answer
Q54. SQL Question

What is an ALIAS command?

Add your answer

Q55. Develope simulink model to create filtered signal in 3 different ways

Ans.

Develop a Simulink model to create filtered signal in 3 different ways

  • Use different types of filters such as low-pass, high-pass, and band-pass filters

  • Implement filters using different techniques like FIR and IIR filters

  • Explore different filter design methods like Butterworth, Chebyshev, and Elliptic filters

Add your answer

Q56. 7. Explain program, process and thread?

Ans.

Program is a set of instructions that performs a specific task. Process is an instance of a program in execution. Thread is a subset of a process.

  • Program is a set of instructions written in a programming language.

  • Process is an instance of a program in execution. It has its own memory space and system resources.

  • Thread is a subset of a process. It is a lightweight process that shares the same memory space and system resources as the parent process.

  • Multiple threads can run concu...read more

Add your answer
Q57. SQL Question

Explain the working of SQL Privileges?

Add your answer

Q58. Draw and explain D flop truth table

Ans.

D flip-flop is a digital circuit that stores a single bit of data and transfers it to the output on the rising edge of the clock signal.

  • D flip-flop has a single data input (D) and two outputs (Q and Q').

  • The truth table for D flip-flop is: D Q(t) Q(t+1), 0 0 0, 1 1 1.

  • The D input is sampled on the rising edge of the clock signal and transferred to the output.

  • The Q output is the complement of the Q' output.

  • D flip-flop is used in sequential circuits for storing and transferring d...read more

Add your answer

Q59. One employee give print to a printer over network but he/she unable to get print what is the tarbulshoot process

Ans.

The troubleshooting process involves checking printer connectivity, print queue, printer drivers, and printer settings.

  • Check if the printer is turned on and connected to the network

  • Verify if the printer is added to the user's computer and set as the default printer

  • Check the print queue for any stuck print jobs

  • Ensure that the printer drivers are up-to-date and compatible with the user's computer

  • Verify the printer settings such as paper size, orientation, and print quality

  • Resta...read more

Add your answer

Q60. What is Fibonacci series and write the code

Ans.

Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.

  • Start with 0 and 1 as the first two numbers in the series

  • Each subsequent number is the sum of the two preceding numbers

  • Example: 0, 1, 1, 2, 3, 5, 8, 13, 21, ...

Add your answer

Q61. 1. Explain the architecture of a model that you built in your previous job.

Ans.

The model architecture I built in my previous job was a deep learning neural network with multiple layers and activation functions.

  • Used a combination of convolutional and recurrent layers for image and text data processing

  • Incorporated dropout layers to prevent overfitting

  • Utilized batch normalization for faster convergence

  • Implemented various activation functions such as ReLU and sigmoid

  • Included a softmax layer for multi-class classification

Add your answer

Q62. 3. Explain each layer of OSI?

Ans.

OSI model has 7 layers that define how data is transmitted over a network.

  • Layer 1: Physical layer - deals with physical connections and electrical signals.

  • Layer 2: Data link layer - responsible for error-free transfer of data between nodes.

  • Layer 3: Network layer - handles routing of data packets between networks.

  • Layer 4: Transport layer - ensures reliable data transfer between end-to-end connections.

  • Layer 5: Session layer - establishes and manages communication sessions betwe...read more

Add your answer

Q63. What is bootloader

Ans.

Bootloader is a program that loads and starts the operating system when a computer is turned on.

  • Bootloader is the first program that runs when a computer is turned on.

  • It is responsible for loading and executing the operating system.

  • Bootloader is usually stored in the computer's firmware or on the hard drive.

  • It performs hardware checks and initializes the system before loading the OS.

  • Examples of bootloaders include GRUB, LILO, and Windows Boot Manager.

Add your answer

Q64. assemble desktop managed and set the process

Ans.

To assemble a desktop, manage and set the process, follow these steps:

  • Gather all necessary components such as motherboard, CPU, RAM, hard drive, power supply, etc.

  • Install the CPU onto the motherboard and attach the heatsink/fan

  • Insert the RAM into the appropriate slots on the motherboard

  • Attach the hard drive and optical drive to the motherboard using SATA cables

  • Connect the power supply to the motherboard and other components

  • Install the operating system and necessary drivers

  • Con...read more

Add your answer
Q65. Software Testing Question

Explain STLC.

Add your answer
Q66. SQL Question

What are triggers?

Add your answer
Q67. Cucumber Question

Difference between Selenium and Cucumber.

Add your answer

Q68. Can you explain virtual keyword

Ans.

The virtual keyword in C++ is used to declare a member function in a base class that can be overridden in a derived class.

  • Virtual keyword is used to achieve runtime polymorphism in C++

  • Virtual functions are declared in a base class and can be overridden in derived classes

  • When a virtual function is called, the actual function that gets executed is determined at runtime based on the type of object

Add your answer

Q69. swipe 2 numbers without 3rd variable

Ans.

Swapping two numbers without using a third variable.

  • Use the XOR operation to swap the numbers.

  • Assign the first number to the second number using XOR.

  • Assign the result of XOR operation to the first number.

  • The numbers are now swapped without using a third variable.

Add your answer

Q70. 2. Explain OOPs Concepts?

Ans.

OOPs concepts are the principles of Object-Oriented Programming that help in designing and implementing software systems.

  • Encapsulation - bundling of data and methods that operate on that data

  • Inheritance - creating new classes from existing ones

  • Polymorphism - ability of objects to take on many forms

  • Abstraction - hiding implementation details and showing only functionality

  • Example: A car is an object that encapsulates data such as speed, fuel level, and methods such as accelerat...read more

Add your answer

Q71. What are the plugins used in jenkins

Ans.

Jenkins has a wide range of plugins for various functionalities.

  • Pipeline plugins (e.g. Pipeline, Multibranch Pipeline)

  • SCM plugins (e.g. Git, SVN)

  • Build and test plugins (e.g. Maven, JUnit)

  • Notification plugins (e.g. Email, Slack)

  • Monitoring plugins (e.g. Prometheus, Grafana)

Add your answer

Q72. How we integrate other tools to jenkins

Ans.

Integrating other tools to Jenkins involves using plugins and configuring build pipelines.

  • Install the necessary plugins for the tools you want to integrate with Jenkins

  • Configure the tools in Jenkins global configuration settings

  • Create build pipelines that include steps for interacting with the integrated tools

  • Use Jenkins API to automate interactions with external tools

Add your answer

Q73. What is the difference between .pst and .ost file ?

Ans.

PST is a personal storage table used by Outlook to store emails and other items, while OST is an offline storage table used for cached Exchange mode.

  • PST is a local file that stores emails, contacts, calendar items, and other data in Outlook.

  • OST is a copy of data from a user's mailbox on an Exchange server that is stored on the user's computer.

  • PST files can be imported and exported, while OST files cannot.

  • OST files are used for cached Exchange mode, which allows users to acces...read more

Add your answer

Q74. Why are you interested in the field of embedded software development?

Ans.

I am fascinated by the challenge of working with low-level hardware and creating efficient, real-time systems.

  • Enjoy the challenge of working with low-level hardware

  • Excited about creating efficient, real-time systems

  • Passionate about developing innovative solutions for embedded systems

Add your answer

Q75. How do you translate program vision into actionable plan for each individual projects under the program.

Ans.

Translate program vision into actionable plans by breaking down goals, assigning tasks, setting timelines, and monitoring progress.

  • Break down the program vision into specific goals and objectives for each project.

  • Assign tasks and responsibilities to team members based on their skills and expertise.

  • Set clear timelines and milestones to track progress and ensure deadlines are met.

  • Monitor the progress of each project regularly and make adjustments as needed to stay on track.

  • Comm...read more

Add your answer

Q76. which tool you have used to perform unit testing please elaborate

Ans.

I have used JUnit for performing unit testing in Java projects.

  • JUnit is a popular unit testing framework for Java

  • It provides annotations like @Test to define test methods

  • JUnit assertions like assertEquals are used to verify expected results

Add your answer

Q77. What does you Hil environment consists of ?

Ans.

My Hil environment consists of various tools and technologies for testing and automation.

  • We use tools like Selenium, Appium, JMeter, and SoapUI for testing.

  • We also use Jenkins for continuous integration and deployment.

  • Our environment includes both physical and virtual machines for testing.

  • We have a variety of operating systems and browsers for testing compatibility.

  • We use various scripting languages like Java, Python, and Ruby for automation.

  • We have a dedicated team for perfo...read more

Add your answer

Q78. Sample program in Capl to send a message cyclically.

Ans.

A sample Capl program to send a message cyclically.

  • Use the 'on timer' event to send the message at a fixed interval

  • Create a message object and set its data and length

  • Use the 'output' function to send the message

  • Use the 'setTimer' function to set the timer for the next cycle

Add your answer

Q79. Explain with neat diagram to control hardware interface with microntroller

Ans.

Hardware interface with microcontroller can be controlled using GPIO pins and communication protocols like SPI, I2C, UART.

  • Use GPIO pins to control hardware peripherals like LEDs, motors, sensors

  • Implement communication protocols like SPI, I2C, UART to interface with external devices

  • Design a circuit diagram showing connections between microcontroller and hardware components

Add your answer

Q80. How do to calculate slip ratio

Ans.

Slip ratio is calculated by dividing the difference between the actual speed of a wheel and the speed of the vehicle by the speed of the vehicle.

  • Calculate the actual speed of the wheel by multiplying the wheel radius with the angular velocity of the wheel.

  • Calculate the speed of the vehicle using GPS or speedometer readings.

  • Subtract the actual speed of the wheel from the speed of the vehicle.

  • Divide the difference by the speed of the vehicle to get the slip ratio.

Add your answer

Q81. 1.Explain Autosar and it's different layers

Ans.

Autosar is a standardized automotive software architecture that defines different layers for software development.

  • Autosar stands for Automotive Open System Architecture

  • It is a collaboration between automotive manufacturers, suppliers, and tool developers

  • The different layers of Autosar are Application Layer, RTE Layer, Basic Software Layer, and Microcontroller Abstraction Layer

  • The Application Layer contains the software components that implement the functionality of the vehicl...read more

View 1 answer

Q82. Why can bus uses 120 ohm resistance

Ans.

120 ohm resistance is used in CAN bus to match the characteristic impedance of the transmission line.

  • CAN bus is a differential signaling system that requires a balanced impedance to prevent signal reflections.

  • The 120 ohm resistance matches the characteristic impedance of the transmission line, which is typically 120 ohms.

  • Without the proper impedance matching, signal reflections can cause data errors and reduce the maximum communication distance.

  • The 120 ohm resistance is typic...read more

Add your answer

Q83. Adas levels and explain the details. -5 levels (level 0 to level 5) Level 0 starts has no automation and level 5 has complete remaining levels are partial and conditional

Ans.

ADAS levels range from 0 to 5, with varying degrees of automation. Level 0 has no automation, while level 5 is fully automated.

  • Level 0: No automation, driver is fully in control.

  • Level 1: Driver assistance, such as cruise control.

  • Level 2: Partial automation, like lane-keeping assist.

  • Level 3: Conditional automation, where the car can handle certain tasks but the driver must be ready to take over.

  • Level 4: High automation, the car can handle most tasks but still requires driver i...read more

Add your answer

Q84. What is transisistor? Internal structure of op amp What is decoder and encoder? What is zener diode? Mosfet vs igbt qpplications

Add your answer

Q85. What is the principle of analog to digital converter?

Ans.

An analog to digital converter converts continuous analog signals into discrete digital values.

  • Converts continuous analog signals into digital values

  • Utilizes sampling and quantization techniques

  • Common types include successive approximation ADC and delta-sigma ADC

Add your answer

Q86. How do we name to the node

Ans.

Nodes can be named based on their functionality, purpose, or position in a hierarchy.

  • Name based on functionality (e.g. loginNode, paymentNode)

  • Name based on purpose (e.g. validationNode, processingNode)

  • Name based on position in hierarchy (e.g. parentNode, childNode)

Add your answer

Q87. What is https and ssh cloning

Ans.

HTTPS is a secure communication protocol used for secure communication over the internet. SSH cloning is a method of cloning a repository using the SSH protocol.

  • HTTPS stands for Hypertext Transfer Protocol Secure and is used to secure communication over the internet.

  • It encrypts the data being transmitted between the client and the server, providing a secure connection.

  • SSH cloning is a method of cloning a Git repository using the SSH protocol instead of HTTPS.

  • It allows for sec...read more

Add your answer

Q88. Jenkis node , what is the use

Ans.

Jenkins node is a machine that executes tasks as part of a Jenkins build process.

  • Jenkins nodes can be physical machines or virtual machines.

  • Nodes can be configured to run specific types of jobs or tasks.

  • Nodes help distribute workload and improve efficiency in Jenkins pipelines.

Add your answer

Q89. Print the duplicate elements in an array

Ans.

Print duplicate elements in an array of strings

  • Iterate through the array and store elements in a HashMap with element as key and count as value

  • Print elements with count greater than 1 as duplicates

Add your answer

Q90. Are the completed OS issue

Ans.

I'm sorry, but I don't understand the question. Could you please rephrase it?

  • Please provide more context or clarify the question

  • I am not sure what you mean by 'completed OS issue'

  • Could you please provide more information or rephrase the question?

Add your answer

Q91. Any problem and project to manage

Ans.

I managed a project to upgrade network infrastructure and troubleshooted connectivity issues.

  • Upgraded network switches and routers to improve performance

  • Identified and resolved connectivity issues for remote users

  • Implemented network security measures to prevent unauthorized access

  • Managed network documentation and inventory

  • Collaborated with cross-functional teams to ensure project success

Add your answer

Q92. plot graphs engine out emissions Vs lambda

Ans.

Plotting graphs of engine out emissions vs lambda is essential for analyzing the relationship between emissions and air-fuel ratio.

  • Lambda values represent the air-fuel ratio in an engine, with stoichiometric ratio at 1.0.

  • Engine out emissions include pollutants like CO, HC, and NOx.

  • Graphs can help identify optimal lambda values for minimizing emissions.

  • Example: Higher lambda values (lean mixtures) can reduce CO emissions but increase NOx emissions.

  • Example: Lower lambda values ...read more

Add your answer

Q93. Difference between bus and mix block

Ans.

Bus is a communication block used to transfer data between components, while mix block is a processing block used to perform operations on data.

  • Bus is used for data transfer between components in a system

  • Mix block is used for processing data within a system

  • Bus is like a highway for data transfer, while mix block is like a junction where data is processed

Add your answer

Q94. How to find middle of a linked list using 2 pointers method

Ans.

Use two pointers, one moving twice as fast as the other, to find the middle of a linked list.

  • Initialize two pointers, slow and fast, at the head of the linked list

  • Move slow pointer by one node and fast pointer by two nodes until fast pointer reaches the end

  • The node pointed to by slow pointer will be the middle of the linked list

Add your answer

Q95. Diff b/w docker and docker swarm

Ans.

Docker is a containerization platform for running applications in isolated environments, while Docker Swarm is a tool for orchestrating multiple Docker containers across multiple hosts.

  • Docker is used for creating and managing containers, while Docker Swarm is used for managing multiple containers across multiple hosts.

  • Docker is suitable for single host deployments, while Docker Swarm is suitable for multi-host deployments.

  • Docker Swarm provides features like service discovery,...read more

Add your answer

Q96. Show a typical manufacturing drawing template with necessary details.

Ans.

A manufacturing drawing template typically includes details such as dimensions, tolerances, materials, and finishing.

  • Title block with part name, drawing number, and revision

  • List of materials and their specifications

  • Detailed views with dimensions and tolerances

  • Bill of materials with part numbers and quantities

  • Notes section for additional information

  • Finishing requirements such as surface roughness and coatings

  • Reference to applicable standards and specifications

Add your answer

Q97. Com Apis names in each bsw layer

Ans.

The question is asking for the names of Com APIs in each BSW layer.

  • BSW layer refers to the Basic Software layer in an embedded system.

  • Com APIs are communication application programming interfaces.

  • Provide the names of Com APIs used in each BSW layer.

  • Example: BSW Layer 1 - CanIf, BSW Layer 2 - CanTp, BSW Layer 3 - ComM

Add your answer

Q98. Explain relations between software and hardware

Ans.

Software and hardware work together to enable a computer system to function properly.

  • Software is the set of instructions that tell the hardware what to do.

  • Hardware refers to the physical components of a computer system.

  • Software interacts with hardware through drivers and APIs.

  • Hardware provides the platform on which software runs and executes tasks.

  • Examples include a computer's operating system (software) interacting with its processor (hardware).

Add your answer

Q99. How to reduce engine out NOx

Ans.

To reduce engine out NOx, optimize combustion process, use exhaust gas recirculation, and employ selective catalytic reduction.

  • Optimize combustion process by adjusting air-fuel ratio and injection timing

  • Utilize exhaust gas recirculation to reduce peak combustion temperatures

  • Employ selective catalytic reduction to convert NOx into nitrogen and water

Add your answer

Q100. Difference between malloc and calloc

Ans.

malloc is used to allocate memory block of specified size, while calloc initializes the allocated memory block with zero values.

  • malloc does not initialize the allocated memory, while calloc initializes it to zero

  • malloc takes one argument specifying the size of memory block to allocate

  • calloc takes two arguments - number of elements to allocate and size of each element

  • Example: int *ptr = (int*)malloc(5 * sizeof(int));

  • Example: int *ptr = (int*)calloc(5, sizeof(int));

Add your answer
1
2
3
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Your Nurse India

based on 117 interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.1
 • 2.2k Interview Questions
4.1
 • 1.2k Interview Questions
3.9
 • 700 Interview Questions
3.9
 • 518 Interview Questions
3.8
 • 261 Interview Questions
4.1
 • 247 Interview Questions
View all
Top Bosch Global Software Technologies Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter