Add office photos
Engaged Employer

Centre for Development of Advanced Computing

3.8
based on 943 Reviews
Video summary
Filter interviews by

60+ Elentec Power India (EPI) Pvt. Ltd. Interview Questions and Answers

Updated 31 Mar 2025

Q1. MySQL database Array vs Array list vs Linked list What is Binary tree, Complete binary tree? Coding Questions: Preorder , Inorder, Postorder traversal of Binary tree (Recursively) Pattern Printing Coding questi...

read more
Ans.

Understanding data structures and algorithms commonly used in MySQL databases.

  • Array: a data structure that stores a collection of elements in a contiguous memory location.

  • ArrayList: a resizable array implementation that dynamically adjusts its size as elements are added or removed.

  • LinkedList: a data structure where each element is connected to the next element via pointers.

  • Binary Tree: a tree data structure where each node has at most two children.

  • Complete Binary Tree: a bina...read more

Add your answer

Q2. Explain oops concepts with real world example

Ans.

OOPs concepts are used to model real-world objects and their interactions.

  • Encapsulation: Hiding internal details of an object. Example: A car's engine is encapsulated and can only be accessed through the car's interface.

  • Inheritance: Creating new classes from existing ones. Example: A sports car class can inherit properties from a car class.

  • Polymorphism: Objects can take on many forms. Example: A vehicle class can have different methods for different types of vehicles.

  • Abstract...read more

Add your answer

Q3. Explain your cdac project in detail

Ans.

Developed a real-time traffic monitoring system using image processing techniques

  • Used OpenCV library for image processing

  • Implemented vehicle detection and tracking algorithm

  • Developed a web-based dashboard for real-time monitoring

  • Used Raspberry Pi for hardware implementation

  • Achieved an accuracy of 90% in vehicle detection

Add your answer

Q4. How convolution layer work, what is padding, what is recurrent neural network, what is gradient dissent algorithm, etc.

Ans.

Convolution layers are used in neural networks for feature extraction, padding is adding zeros to input data, RNNs are used for sequential data, gradient descent is an optimization algorithm.

  • Convolution layers in neural networks extract features by applying filters to input data.

  • Padding is adding zeros around the input data to preserve spatial dimensions.

  • Recurrent Neural Networks (RNNs) are designed to work with sequential data, where the output depends on previous inputs.

  • Gra...read more

Add your answer
Discover Elentec Power India (EPI) Pvt. Ltd. interview dos and don'ts from real experiences

Q5. Write code for jdbc db connectivity

Ans.

Code for JDBC DB connectivity

  • Load the JDBC driver class

  • Create a connection object using DriverManager.getConnection()

  • Create a statement object using connection.createStatement()

  • Execute the query using statement.executeQuery()

  • Process the result set

  • Close the result set, statement, and connection

Add your answer

Q6. Explain exception handling, Multithreading, etc

Ans.

Exception handling is a way to handle errors in code. Multithreading allows multiple threads to run concurrently.

  • Exception handling is used to catch and handle errors that occur during program execution.

  • It helps prevent the program from crashing and allows for graceful error handling.

  • Multithreading allows for multiple threads to run concurrently, improving program performance.

  • It can be used for tasks such as background processing, user interface updates, and network communica...read more

Add your answer
Are these interview questions helpful?

Q7. How to turn an LED On? Explain with design Difference between BJT and FETs Explain Project

Ans.

To turn an LED on, apply a voltage higher than the forward voltage across the LED. BJT and FETs differ in their operation and characteristics.

  • To turn an LED on, connect it in the correct polarity with a voltage source higher than its forward voltage.

  • BJTs are current-controlled devices, while FETs are voltage-controlled.

  • BJTs have higher gain and lower input impedance compared to FETs.

  • Example: To turn on a red LED with a forward voltage of 2V, connect it to a 3V battery with th...read more

Add your answer

Q8. What framework you have used in your project.

Ans.

I have used the Agile framework in my project.

  • Implemented Scrum methodology for project management

  • Used Kanban boards for task tracking

  • Held daily stand-up meetings for team communication

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. explain about how to secure database

Ans.

Securing a database involves implementing access controls, encryption, regular backups, and monitoring for suspicious activity.

  • Implement strong access controls to restrict unauthorized access to the database

  • Use encryption to protect sensitive data both at rest and in transit

  • Regularly backup the database to prevent data loss in case of a security breach

  • Monitor the database for any suspicious activity or unauthorized access attempts

  • Update database software and patches regularly...read more

Add your answer

Q10. STA numerical to calculate setup and hold time

Ans.

Setup and hold time can be calculated using the formula: Setup time = (Clock period - Required time) and Hold time = (Required time)

  • Setup time is the amount of time data must be stable before the clock edge

  • Hold time is the amount of time data must be stable after the clock edge

  • Setup time = Clock period - Required time

  • Hold time = Required time

Add your answer

Q11. How to debug design on FPGA

Ans.

Debugging design on FPGA involves using simulation tools, logic analyzers, and oscilloscopes.

  • Use simulation tools to verify functionality and identify issues

  • Utilize logic analyzers to analyze signals and troubleshoot problems

  • Use oscilloscopes to visualize waveforms and timing issues

  • Check for proper clocking and signal integrity

  • Verify the design against the specifications

Add your answer

Q12. what is encapsulation

Ans.

Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.

  • Encapsulation helps in hiding the internal state of an object and restricting access to it.

  • It allows for better control over the data by preventing outside interference.

  • Encapsulation is a fundamental principle of object-oriented programming.

  • Example: In a class representing a car, the variables like speed and fuel level, along with methods like accelerate and refuel, would be ...read more

Add your answer

Q13. Diff between shallow copy and deep copy

Ans.

Shallow copy only copies the references of objects, while deep copy creates new copies of objects.

  • Shallow copy creates a new object but does not duplicate the nested objects within it.

  • Deep copy creates a new object and also duplicates all the nested objects within it.

  • Example: Shallow copy - copying a list of objects only copies the references to those objects. Deep copy - creates new copies of all objects in the list.

Add your answer

Q14. what is abstraction

Ans.

Abstraction is the process of removing unnecessary details to focus on the essential characteristics of an object or concept.

  • Abstraction allows us to work with complex systems by simplifying them into manageable components.

  • It helps in reducing complexity and increasing efficiency in problem-solving.

  • For example, in software engineering, abstraction is used to create classes and objects that represent real-world entities while hiding the implementation details.

Add your answer

Q15. what is inheritance

Ans.

Inheritance is a concept in object-oriented programming where a class can inherit attributes and methods from another class.

  • Allows for code reusability and promotes a hierarchical structure

  • Derived class can access the properties and methods of the base class

  • Types of inheritance include single, multiple, multilevel, and hierarchical

  • Example: Class Car can inherit from class Vehicle, inheriting attributes like speed and methods like accelerate

Add your answer

Q16. what is hibernet

Ans.

Hibernate is an open-source object-relational mapping (ORM) framework for Java applications.

  • Hibernate simplifies the development of database-driven applications by mapping Java objects to database tables.

  • It provides a query language called HQL (Hibernate Query Language) for querying databases using object-oriented syntax.

  • Hibernate supports automatic generation of primary key values, caching, and transaction management.

  • Example: Hibernate can be used to map a Java class represe...read more

Add your answer

Q17. Siem solutions for management

Ans.

Siem solutions are security information and event management tools used for managing security incidents and events in real-time.

  • SIEM solutions collect, analyze, and report on security data from various sources.

  • They help organizations detect and respond to security incidents more effectively.

  • SIEM solutions can provide real-time monitoring, threat intelligence, and compliance reporting.

  • Examples of SIEM solutions include Splunk, IBM QRadar, and ArcSight.

Add your answer

Q18. Configuration of L2-L3 device

Ans.

Configuration of L2-L3 device involves setting up VLANs, IP addresses, routing protocols, and security features.

  • Configure VLANs to segment network traffic

  • Assign IP addresses to interfaces for communication

  • Implement routing protocols like OSPF or BGP for network connectivity

  • Enable security features such as access control lists (ACLs) and port security

  • Test and verify the configuration to ensure proper functionality

Add your answer

Q19. Procedure stored procedure

Ans.

A stored procedure is a set of SQL statements that can be saved and reused in a database management system.

  • Stored procedures help improve performance by reducing network traffic and improving security.

  • They can be used to encapsulate business logic for reuse.

  • Stored procedures can accept input parameters and return output parameters or result sets.

  • Examples: CREATE PROCEDURE, EXECUTE PROCEDURE.

Add your answer

Q20. explain spring security

Ans.

Spring Security is a powerful and customizable authentication and access control framework for Java applications.

  • Provides comprehensive security services for Java EE-based enterprise software applications

  • Supports authentication, authorization, and protection against common security vulnerabilities

  • Integrates with Spring Framework for seamless configuration and usage

  • Allows for custom security configurations and extensions

  • Example: Configuring role-based access control using anno...read more

Add your answer

Q21. Sql join conditions

Ans.

SQL join conditions are used to combine rows from two or more tables based on a related column between them.

  • Use JOIN keyword to combine rows from two or more tables based on a related column

  • Specify the join condition using ON keyword followed by the column names

  • Types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN

Add your answer

Q22. Explain OOPS concept

Ans.

OOPS concept stands for Object-Oriented Programming System. It is a programming paradigm based on the concept of objects.

  • OOPS focuses on creating objects that contain data in the form of attributes and code in the form of methods.

  • Encapsulation, Inheritance, Polymorphism, and Abstraction are the four main principles of OOPS.

  • Encapsulation refers to the bundling of data and methods that operate on the data into a single unit.

  • Inheritance allows a class to inherit properties and b...read more

Add your answer

Q23. describe ur work

Ans.

I work as a Project Engineer overseeing the planning, design, and execution of engineering projects.

  • Coordinate with team members to develop project plans and timelines

  • Manage project budgets and resources

  • Ensure projects are completed on time and within budget

  • Collaborate with clients to understand their needs and provide solutions

  • Troubleshoot any issues that arise during project execution

Add your answer

Q24. Add Two Numbers Represented as Linked Lists

Given two linked lists representing two non-negative integers, where the digits are stored in reverse order (i.e., starting from the least significant digit to the mo...read more

Ans.

Add two numbers represented as linked lists in reverse order and return the sum as a linked list.

  • Traverse both linked lists simultaneously, adding corresponding digits along with carry from previous sum.

  • Handle cases where one list is longer than the other by considering carry.

  • Create a new linked list to store the sum digits in reverse order.

  • Remember to handle the case where there is a carry after adding all digits.

Add your answer

Q25. Remove Duplicates from String Problem Statement

You are provided a string STR of length N, consisting solely of lowercase English letters.

Your task is to remove all duplicate occurrences of characters in the s...read more

Ans.

Remove duplicate occurrences of characters in a given string of lowercase English letters.

  • Iterate through the string and keep track of characters seen so far using a set.

  • Append characters to a new string only if they are not already in the set.

  • Return the new string without duplicate characters.

Add your answer

Q26. What is the role of the garbage collector in Java programming, and where is it utilized?

Ans.

Garbage collector in Java manages memory by reclaiming unused objects, preventing memory leaks.

  • Automatically frees up memory by removing objects that are no longer in use

  • Prevents memory leaks by reclaiming memory from objects that are no longer referenced

  • Utilized in Java programming to improve memory management and prevent out-of-memory errors

Add your answer

Q27. when we use volatile and const at the same time what will happen

Ans.

When volatile and const are used together, the variable is treated as read-only and its value can change unexpectedly.

  • The const keyword indicates that the variable's value cannot be changed by the program.

  • The volatile keyword tells the compiler that the variable's value may change at any time, even if it doesn't appear to be modified by the program.

  • When used together, the variable is treated as read-only by the program, but its value can still change unexpectedly due to exter...read more

Add your answer

Q28. what happens when we use volatile and const at the same time

Ans.

When volatile and const are used together, the variable is treated as read-only and its value can change unexpectedly.

  • Using volatile and const together is rare but can be useful for memory-mapped hardware registers.

  • The volatile keyword tells the compiler that the variable can be changed unexpectedly, while const ensures the variable is read-only.

  • Example: const volatile int * const ptr = (int *)0x1234; // pointer to a read-only volatile integer at memory address 0x1234

Add your answer

Q29. What is the design of a traffic scenario, and which sensors are used to manage and clear traffic efficiently?

Ans.

A traffic scenario design involves the layout of roads, intersections, signals, and parking areas. Sensors like cameras, loops, and radar are used to manage and clear traffic efficiently.

  • Traffic scenario design includes road layout, intersections, signals, and parking areas

  • Sensors such as cameras, loops, and radar are used to monitor traffic flow

  • Data from sensors is analyzed to optimize traffic signal timings and detect congestion

  • Efficient traffic management helps in reducing...read more

Add your answer

Q30. How would you rate your proficiency in Java programming?

Ans.

I rate my proficiency in Java programming as advanced.

  • Advanced knowledge of object-oriented programming principles

  • Experience with Java frameworks like Spring and Hibernate

  • Ability to write efficient and scalable code

  • Familiarity with design patterns and best practices

  • Completed multiple Java projects successfully

Add your answer

Q31. Can you explain a model used in natural language processing?

Ans.

A common model used in natural language processing is the Bag of Words model.

  • Bag of Words model represents text as a collection of words, ignoring grammar and word order.

  • It creates a vocabulary of unique words in the text and counts the frequency of each word.

  • This model is often used for tasks like sentiment analysis, document classification, and topic modeling.

Add your answer

Q32. What is modal& modless dialogbox?give any practical example of that?which commands r used for that?

Add your answer

Q33. What is zero day attack? Difference between Hashing and Encryption? CIA Traid? Question based on your skills mention in Resume. Some case study

Ans.

Zero day attack is a cyber attack exploiting a vulnerability that is unknown to the software developer or vendor.

  • Zero day attack occurs when hackers exploit a software vulnerability before the developer releases a patch.

  • These attacks are dangerous because there is no defense or fix available at the time of the attack.

  • Examples include the Stuxnet worm and the WannaCry ransomware attack.

Add your answer

Q34. does any future in IOT with cyber security related?

Add your answer

Q35. What happens when any keyboard key is pressed?

Add your answer

Q36. How will you develop a python code for ML algortihm

Add your answer

Q37. What is the structure of a Java program?

Ans.

The structure of a Java program includes classes, methods, variables, and packages.

  • Java program starts with a class definition, which includes methods and variables.

  • Methods contain the code that defines the behavior of the program.

  • Variables are used to store data within the program.

  • Packages are used to organize classes and provide a namespace for the program.

  • Example: public class HelloWorld { public static void main(String[] args) { System.out.println("Hello, World!"); }}

Add your answer

Q38. Why do we use activation functions?

Ans.

Activation functions introduce non-linearity to neural networks, enabling them to learn complex patterns and relationships.

  • Activation functions help neural networks to learn complex patterns and relationships by introducing non-linearity.

  • They ensure that the output of each neuron is mapped to a specific range, allowing for better learning and generalization.

  • Common activation functions include ReLU, Sigmoid, Tanh, and Softmax.

  • Without activation functions, neural networks would...read more

Add your answer

Q39. What is the function of getMessage Loop?

Add your answer

Q40. Are you aware of ISO standards 9000

Ans.

Yes, ISO 9000 is a set of international standards for quality management and quality assurance.

  • ISO 9000 is a series of standards developed by the International Organization for Standardization (ISO) that focus on quality management systems.

  • These standards provide guidance and tools for companies to ensure their products and services consistently meet customer requirements and regulatory standards.

  • ISO 9000 certification can help organizations improve processes, reduce errors, ...read more

Add your answer

Q41. How much u rank ur self in SDK & C++?

Add your answer

Q42. what is an environment variable example?

Ans.

Environment variables are dynamic values that can affect the behavior of running processes.

  • Environment variables are set in the operating system or shell environment

  • They are accessed by programs to retrieve information about the environment

  • Examples include PATH, HOME, and USER

Add your answer

Q43. what are web services and their use

Ans.

Web services are software systems designed to support interoperable machine-to-machine interaction over a network.

  • Web services allow different applications to communicate with each other without human intervention.

  • They use standard web protocols such as HTTP and XML to exchange data.

  • Examples include RESTful APIs, SOAP services, and microservices architecture.

Add your answer

Q44. Write for loop, write the pseudo code for fibbonacci,

Add your answer

Q45. Do u know about System Modal?

Add your answer

Q46. is brute force is good or bad

Ans.

Brute force can be both good and bad depending on the context and application.

  • Brute force can be effective for small scale problems or when time is limited.

  • However, it is inefficient and impractical for large scale problems.

  • Brute force may also be necessary in certain scenarios where no other efficient solution exists.

  • For example, brute force can be used in password cracking when other methods fail.

Add your answer

Q47. Methods to avoid rusting Heat and mass transfer basis

Ans.

Methods to prevent rusting based on heat and mass transfer

  • Coating the metal surface with a protective layer like paint or oil

  • Using sacrificial anodes to prevent corrosion

  • Applying cathodic protection by connecting the metal to a more active metal

  • Controlling the environment by reducing humidity and temperature

  • Using inhibitors to slow down the corrosion process

Add your answer

Q48. What are you learn in cyber security

Ans.

In cyber security, you learn about network security, encryption, threat detection, incident response, and ethical hacking.

  • Network security involves protecting networks from unauthorized access or attacks.

  • Encryption is the process of encoding information to make it secure and unreadable without the proper decryption key.

  • Threat detection involves identifying and responding to potential security threats or breaches.

  • Incident response is the process of reacting to and managing a s...read more

Add your answer

Q49. What is numerical methods?

Ans.

Numerical methods are techniques used to approximate solutions to mathematical problems that are difficult or impossible to solve analytically.

  • Numerical methods involve algorithms for solving equations, integrating functions, and optimizing systems.

  • Examples include Newton's method for finding roots of equations, Simpson's rule for numerical integration, and gradient descent for optimization.

  • These methods often involve iterative processes and may require trade-offs between acc...read more

Add your answer

Q50. What is Reynolds stress?

Ans.

Reynolds stress is the average of the product of the fluctuating velocity components in a fluid flow.

  • Reynolds stress is a key component in the Reynolds-averaged Navier-Stokes equations used in fluid dynamics.

  • It represents the transfer of momentum between different parts of a fluid flow.

  • Reynolds stress is often used in turbulence modeling to predict the behavior of turbulent flows.

  • An example of Reynolds stress is the interaction between the mean flow and turbulent fluctuations...read more

Add your answer

Q51. difference between mutex and semaphore

Ans.

Mutex is used for exclusive access to a resource by a single thread, while semaphore is used for controlling access to a resource by multiple threads.

  • Mutex is binary in nature, allowing only one thread to access the resource at a time.

  • Semaphore can have a count greater than 1, allowing multiple threads to access the resource simultaneously.

  • Mutex is typically used for protecting critical sections of code.

  • Semaphore is often used for synchronization between multiple threads or p...read more

Add your answer

Q52. What is oops concepts

Ans.

Object-oriented programming concepts that focus on objects and classes for code organization and reusability.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit (class).

  • Inheritance: Allowing a class to inherit properties and behavior from another class.

  • Polymorphism: Ability for objects of different classes to respond to the same message in different ways.

  • Abstraction: Hiding complex implementation details and showing only the necessary features...read more

Add your answer

Q53. How does Google search work?

Ans.

Google search works by crawling and indexing web pages, and then ranking them based on relevance and quality.

  • Google uses web crawlers to discover and index web pages.

  • The search algorithm ranks pages based on relevance to the search query.

  • Factors like keywords, backlinks, and user experience influence rankings.

  • Google constantly updates its algorithm to improve search results.

  • Google also considers user location and search history for personalized results.

Add your answer

Q54. what is multithreading?

Ans.

Multithreading is the ability of a CPU to execute multiple threads of a process simultaneously.

  • Multithreading allows for better utilization of CPU resources.

  • It can improve the performance of applications that require parallel processing.

  • Threads share the same memory space, which can lead to synchronization issues.

  • Examples of multithreaded applications include web servers, video games, and media players.

Add your answer

Q55. What is DlgProc?

Add your answer

Q56. What you understood about mvc

Ans.

MVC is a software design pattern that separates an application into three interconnected components: Model, View, and Controller.

  • Model represents the data and business logic of the application

  • View is responsible for rendering the user interface

  • Controller handles user input and updates the model and view accordingly

  • MVC promotes separation of concerns and modularity

  • Examples of MVC frameworks include Spring MVC and Ruby on Rails

Add your answer

Q57. What is Spring-boot

Ans.

Spring Boot is a framework that simplifies the development of Java applications by providing pre-configured settings and tools.

  • Spring Boot eliminates the need for manual configuration by providing default settings.

  • It allows for easy creation of standalone, production-grade Spring-based applications.

  • Spring Boot includes embedded servers like Tomcat, Jetty, or Undertow for deploying applications.

  • It offers a wide range of plugins and extensions for enhancing development producti...read more

Add your answer

Q58. what is oop in java?

Ans.

OOP in Java stands for Object-Oriented Programming, a programming paradigm that uses objects to design and build applications.

  • OOP focuses on creating objects that contain data and methods to manipulate that data.

  • Encapsulation, inheritance, and polymorphism are key principles of OOP in Java.

  • Example: Creating a class 'Car' with attributes like 'make', 'model', and methods like 'drive' and 'stop'.

Add your answer

Q59. Explain OOPS in details

Ans.

OOPS stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.

  • OOPS focuses on creating objects that contain both data and methods to manipulate that data.

  • It involves concepts like encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation refers to bundling data and methods that operate on the data into a single unit.

  • Inheritance allows a class to inherit properties and behavior from another class.

  • Polymorphism allows obj...read more

Add your answer

Q60. DDOS attack explanation

Ans.

DDOS attack is a malicious attempt to disrupt normal traffic of a targeted server or network by overwhelming it with a flood of internet traffic.

  • DDOS stands for Distributed Denial of Service attack.

  • Attackers use multiple compromised systems to flood the target with traffic.

  • Common types include UDP flood, SYN flood, and HTTP flood.

  • DDOS attacks can lead to service disruption, financial losses, and reputational damage.

  • Mitigation strategies include using firewalls, load balancers...read more

Add your answer

Q61. Deep learning and it's types

Ans.

Deep learning is a subset of machine learning using neural networks to model complex patterns in data.

  • Types of deep learning include supervised learning, unsupervised learning, and reinforcement learning.

  • Supervised learning: Training on labeled data, e.g., image classification.

  • Unsupervised learning: Finding patterns in unlabeled data, e.g., clustering.

  • Reinforcement learning: Learning through trial and error, e.g., game playing AI.

  • Deep learning architectures include Convolutio...read more

Add your answer

Q62. controller method

Ans.

A controller method is a function in a software application that handles incoming requests and returns appropriate responses.

  • Controller methods are typically found in web applications to handle user interactions.

  • They are responsible for processing data, making decisions, and returning a response to the user.

  • Examples include a login controller method that authenticates a user's credentials or a product controller method that retrieves product information.

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Elentec Power India (EPI) Pvt. Ltd.

based on 100 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.8
 • 354 Interview Questions
3.3
 • 328 Interview Questions
4.1
 • 225 Interview Questions
3.8
 • 189 Interview Questions
3.7
 • 182 Interview Questions
4.2
 • 149 Interview Questions
View all
Top Centre for Development of Advanced Computing Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter