Add office photos
Engaged Employer

Centre for Development of Advanced Computing

3.8
based on 833 Reviews
Filter interviews by

20+ N K Sharma & Associates Interview Questions and Answers

Updated 9 Oct 2024

Q1. MySQL database Array vs Array list vs Linked list What is Binary tree, Complete binary tree? Coding Questions: Preorder , Inorder, Postorder traversal of Binary tree (Recursively) Pattern Printing Coding questi...

read more
Ans.

Understanding data structures and algorithms commonly used in MySQL databases.

  • Array: a data structure that stores a collection of elements in a contiguous memory location.

  • ArrayList: a resizable array implementation that dynamically adjusts its size as elements are added or removed.

  • LinkedList: a data structure where each element is connected to the next element via pointers.

  • Binary Tree: a tree data structure where each node has at most two children.

  • Complete Binary Tree: a bina...read more

Add your answer

Q2. Explain oops concepts with real world example

Ans.

OOPs concepts are used to model real-world objects and their interactions.

  • Encapsulation: Hiding internal details of an object. Example: A car's engine is encapsulated and can only be accessed through the car's interface.

  • Inheritance: Creating new classes from existing ones. Example: A sports car class can inherit properties from a car class.

  • Polymorphism: Objects can take on many forms. Example: A vehicle class can have different methods for different types of vehicles.

  • Abstract...read more

Add your answer

Q3. Explain your cdac project in detail

Ans.

Developed a real-time traffic monitoring system using image processing techniques

  • Used OpenCV library for image processing

  • Implemented vehicle detection and tracking algorithm

  • Developed a web-based dashboard for real-time monitoring

  • Used Raspberry Pi for hardware implementation

  • Achieved an accuracy of 90% in vehicle detection

Add your answer

Q4. How convolution layer work, what is padding, what is recurrent neural network, what is gradient dissent algorithm, etc.

Ans.

Convolution layers are used in neural networks for feature extraction, padding is adding zeros to input data, RNNs are used for sequential data, gradient descent is an optimization algorithm.

  • Convolution layers in neural networks extract features by applying filters to input data.

  • Padding is adding zeros around the input data to preserve spatial dimensions.

  • Recurrent Neural Networks (RNNs) are designed to work with sequential data, where the output depends on previous inputs.

  • Gra...read more

Add your answer
Discover N K Sharma & Associates interview dos and don'ts from real experiences

Q5. Write code for jdbc db connectivity

Ans.

Code for JDBC DB connectivity

  • Load the JDBC driver class

  • Create a connection object using DriverManager.getConnection()

  • Create a statement object using connection.createStatement()

  • Execute the query using statement.executeQuery()

  • Process the result set

  • Close the result set, statement, and connection

Add your answer

Q6. Explain exception handling, Multithreading, etc

Ans.

Exception handling is a way to handle errors in code. Multithreading allows multiple threads to run concurrently.

  • Exception handling is used to catch and handle errors that occur during program execution.

  • It helps prevent the program from crashing and allows for graceful error handling.

  • Multithreading allows for multiple threads to run concurrently, improving program performance.

  • It can be used for tasks such as background processing, user interface updates, and network communica...read more

Add your answer
Are these interview questions helpful?

Q7. How to turn an LED On? Explain with design Difference between BJT and FETs Explain Project

Ans.

To turn an LED on, apply a voltage higher than the forward voltage across the LED. BJT and FETs differ in their operation and characteristics.

  • To turn an LED on, connect it in the correct polarity with a voltage source higher than its forward voltage.

  • BJTs are current-controlled devices, while FETs are voltage-controlled.

  • BJTs have higher gain and lower input impedance compared to FETs.

  • Example: To turn on a red LED with a forward voltage of 2V, connect it to a 3V battery with th...read more

Add your answer

Q8. What framework you have used in your project.

Ans.

I have used the Agile framework in my project.

  • Implemented Scrum methodology for project management

  • Used Kanban boards for task tracking

  • Held daily stand-up meetings for team communication

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. explain about how to secure database

Ans.

Securing a database involves implementing access controls, encryption, regular backups, and monitoring for suspicious activity.

  • Implement strong access controls to restrict unauthorized access to the database

  • Use encryption to protect sensitive data both at rest and in transit

  • Regularly backup the database to prevent data loss in case of a security breach

  • Monitor the database for any suspicious activity or unauthorized access attempts

  • Update database software and patches regularly...read more

Add your answer

Q10. STA numerical to calculate setup and hold time

Ans.

Setup and hold time can be calculated using the formula: Setup time = (Clock period - Required time) and Hold time = (Required time)

  • Setup time is the amount of time data must be stable before the clock edge

  • Hold time is the amount of time data must be stable after the clock edge

  • Setup time = Clock period - Required time

  • Hold time = Required time

Add your answer

Q11. How to debug design on FPGA

Ans.

Debugging design on FPGA involves using simulation tools, logic analyzers, and oscilloscopes.

  • Use simulation tools to verify functionality and identify issues

  • Utilize logic analyzers to analyze signals and troubleshoot problems

  • Use oscilloscopes to visualize waveforms and timing issues

  • Check for proper clocking and signal integrity

  • Verify the design against the specifications

Add your answer

Q12. what is encapsulation

Ans.

Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.

  • Encapsulation helps in hiding the internal state of an object and restricting access to it.

  • It allows for better control over the data by preventing outside interference.

  • Encapsulation is a fundamental principle of object-oriented programming.

  • Example: In a class representing a car, the variables like speed and fuel level, along with methods like accelerate and refuel, would be ...read more

Add your answer

Q13. Diff between shallow copy and deep copy

Ans.

Shallow copy only copies the references of objects, while deep copy creates new copies of objects.

  • Shallow copy creates a new object but does not duplicate the nested objects within it.

  • Deep copy creates a new object and also duplicates all the nested objects within it.

  • Example: Shallow copy - copying a list of objects only copies the references to those objects. Deep copy - creates new copies of all objects in the list.

Add your answer

Q14. what is abstraction

Ans.

Abstraction is the process of removing unnecessary details to focus on the essential characteristics of an object or concept.

  • Abstraction allows us to work with complex systems by simplifying them into manageable components.

  • It helps in reducing complexity and increasing efficiency in problem-solving.

  • For example, in software engineering, abstraction is used to create classes and objects that represent real-world entities while hiding the implementation details.

Add your answer

Q15. what is inheritance

Ans.

Inheritance is a concept in object-oriented programming where a class can inherit attributes and methods from another class.

  • Allows for code reusability and promotes a hierarchical structure

  • Derived class can access the properties and methods of the base class

  • Types of inheritance include single, multiple, multilevel, and hierarchical

  • Example: Class Car can inherit from class Vehicle, inheriting attributes like speed and methods like accelerate

Add your answer

Q16. what is hibernet

Ans.

Hibernate is an open-source object-relational mapping (ORM) framework for Java applications.

  • Hibernate simplifies the development of database-driven applications by mapping Java objects to database tables.

  • It provides a query language called HQL (Hibernate Query Language) for querying databases using object-oriented syntax.

  • Hibernate supports automatic generation of primary key values, caching, and transaction management.

  • Example: Hibernate can be used to map a Java class represe...read more

Add your answer

Q17. Siem solutions for management

Ans.

Siem solutions are security information and event management tools used for managing security incidents and events in real-time.

  • SIEM solutions collect, analyze, and report on security data from various sources.

  • They help organizations detect and respond to security incidents more effectively.

  • SIEM solutions can provide real-time monitoring, threat intelligence, and compliance reporting.

  • Examples of SIEM solutions include Splunk, IBM QRadar, and ArcSight.

Add your answer

Q18. Configuration of L2-L3 device

Ans.

Configuration of L2-L3 device involves setting up VLANs, IP addresses, routing protocols, and security features.

  • Configure VLANs to segment network traffic

  • Assign IP addresses to interfaces for communication

  • Implement routing protocols like OSPF or BGP for network connectivity

  • Enable security features such as access control lists (ACLs) and port security

  • Test and verify the configuration to ensure proper functionality

Add your answer

Q19. Procedure stored procedure

Ans.

A stored procedure is a set of SQL statements that can be saved and reused in a database management system.

  • Stored procedures help improve performance by reducing network traffic and improving security.

  • They can be used to encapsulate business logic for reuse.

  • Stored procedures can accept input parameters and return output parameters or result sets.

  • Examples: CREATE PROCEDURE, EXECUTE PROCEDURE.

Add your answer

Q20. explain spring security

Ans.

Spring Security is a powerful and customizable authentication and access control framework for Java applications.

  • Provides comprehensive security services for Java EE-based enterprise software applications

  • Supports authentication, authorization, and protection against common security vulnerabilities

  • Integrates with Spring Framework for seamless configuration and usage

  • Allows for custom security configurations and extensions

  • Example: Configuring role-based access control using anno...read more

Add your answer

Q21. Sql join conditions

Ans.

SQL join conditions are used to combine rows from two or more tables based on a related column between them.

  • Use JOIN keyword to combine rows from two or more tables based on a related column

  • Specify the join condition using ON keyword followed by the column names

  • Types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN

Add your answer

Q22. Explain OOPS concept

Ans.

OOPS concept stands for Object-Oriented Programming System. It is a programming paradigm based on the concept of objects.

  • OOPS focuses on creating objects that contain data in the form of attributes and code in the form of methods.

  • Encapsulation, Inheritance, Polymorphism, and Abstraction are the four main principles of OOPS.

  • Encapsulation refers to the bundling of data and methods that operate on the data into a single unit.

  • Inheritance allows a class to inherit properties and b...read more

Add your answer

Q23. describe ur work

Ans.

I work as a Project Engineer overseeing the planning, design, and execution of engineering projects.

  • Coordinate with team members to develop project plans and timelines

  • Manage project budgets and resources

  • Ensure projects are completed on time and within budget

  • Collaborate with clients to understand their needs and provide solutions

  • Troubleshoot any issues that arise during project execution

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at N K Sharma & Associates

based on 25 interviews in the last 1 year
2 Interview rounds
Technical Round 1
Technical Round 2
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Project Engineer Interview Questions from Similar Companies

3.7
 • 292 Interview Questions
4.1
 • 24 Interview Questions
4.2
 • 21 Interview Questions
4.1
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter