Centre for Development of Advanced Computing
60+ Elentec Power India (EPI) Pvt. Ltd. Interview Questions and Answers
Q1. MySQL database Array vs Array list vs Linked list What is Binary tree, Complete binary tree? Coding Questions: Preorder , Inorder, Postorder traversal of Binary tree (Recursively) Pattern Printing Coding questi...
read moreUnderstanding data structures and algorithms commonly used in MySQL databases.
Array: a data structure that stores a collection of elements in a contiguous memory location.
ArrayList: a resizable array implementation that dynamically adjusts its size as elements are added or removed.
LinkedList: a data structure where each element is connected to the next element via pointers.
Binary Tree: a tree data structure where each node has at most two children.
Complete Binary Tree: a bina...read more
Q2. Explain oops concepts with real world example
OOPs concepts are used to model real-world objects and their interactions.
Encapsulation: Hiding internal details of an object. Example: A car's engine is encapsulated and can only be accessed through the car's interface.
Inheritance: Creating new classes from existing ones. Example: A sports car class can inherit properties from a car class.
Polymorphism: Objects can take on many forms. Example: A vehicle class can have different methods for different types of vehicles.
Abstract...read more
Q3. Explain your cdac project in detail
Developed a real-time traffic monitoring system using image processing techniques
Used OpenCV library for image processing
Implemented vehicle detection and tracking algorithm
Developed a web-based dashboard for real-time monitoring
Used Raspberry Pi for hardware implementation
Achieved an accuracy of 90% in vehicle detection
Q4. How convolution layer work, what is padding, what is recurrent neural network, what is gradient dissent algorithm, etc.
Convolution layers are used in neural networks for feature extraction, padding is adding zeros to input data, RNNs are used for sequential data, gradient descent is an optimization algorithm.
Convolution layers in neural networks extract features by applying filters to input data.
Padding is adding zeros around the input data to preserve spatial dimensions.
Recurrent Neural Networks (RNNs) are designed to work with sequential data, where the output depends on previous inputs.
Gra...read more
Q5. Write code for jdbc db connectivity
Code for JDBC DB connectivity
Load the JDBC driver class
Create a connection object using DriverManager.getConnection()
Create a statement object using connection.createStatement()
Execute the query using statement.executeQuery()
Process the result set
Close the result set, statement, and connection
Q6. Explain exception handling, Multithreading, etc
Exception handling is a way to handle errors in code. Multithreading allows multiple threads to run concurrently.
Exception handling is used to catch and handle errors that occur during program execution.
It helps prevent the program from crashing and allows for graceful error handling.
Multithreading allows for multiple threads to run concurrently, improving program performance.
It can be used for tasks such as background processing, user interface updates, and network communica...read more
Q7. How to turn an LED On? Explain with design Difference between BJT and FETs Explain Project
To turn an LED on, apply a voltage higher than the forward voltage across the LED. BJT and FETs differ in their operation and characteristics.
To turn an LED on, connect it in the correct polarity with a voltage source higher than its forward voltage.
BJTs are current-controlled devices, while FETs are voltage-controlled.
BJTs have higher gain and lower input impedance compared to FETs.
Example: To turn on a red LED with a forward voltage of 2V, connect it to a 3V battery with th...read more
Q8. What framework you have used in your project.
I have used the Agile framework in my project.
Implemented Scrum methodology for project management
Used Kanban boards for task tracking
Held daily stand-up meetings for team communication
Q9. explain about how to secure database
Securing a database involves implementing access controls, encryption, regular backups, and monitoring for suspicious activity.
Implement strong access controls to restrict unauthorized access to the database
Use encryption to protect sensitive data both at rest and in transit
Regularly backup the database to prevent data loss in case of a security breach
Monitor the database for any suspicious activity or unauthorized access attempts
Update database software and patches regularly...read more
Q10. STA numerical to calculate setup and hold time
Setup and hold time can be calculated using the formula: Setup time = (Clock period - Required time) and Hold time = (Required time)
Setup time is the amount of time data must be stable before the clock edge
Hold time is the amount of time data must be stable after the clock edge
Setup time = Clock period - Required time
Hold time = Required time
Q11. How to debug design on FPGA
Debugging design on FPGA involves using simulation tools, logic analyzers, and oscilloscopes.
Use simulation tools to verify functionality and identify issues
Utilize logic analyzers to analyze signals and troubleshoot problems
Use oscilloscopes to visualize waveforms and timing issues
Check for proper clocking and signal integrity
Verify the design against the specifications
Q12. what is encapsulation
Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.
Encapsulation helps in hiding the internal state of an object and restricting access to it.
It allows for better control over the data by preventing outside interference.
Encapsulation is a fundamental principle of object-oriented programming.
Example: In a class representing a car, the variables like speed and fuel level, along with methods like accelerate and refuel, would be ...read more
Q13. Diff between shallow copy and deep copy
Shallow copy only copies the references of objects, while deep copy creates new copies of objects.
Shallow copy creates a new object but does not duplicate the nested objects within it.
Deep copy creates a new object and also duplicates all the nested objects within it.
Example: Shallow copy - copying a list of objects only copies the references to those objects. Deep copy - creates new copies of all objects in the list.
Q14. what is abstraction
Abstraction is the process of removing unnecessary details to focus on the essential characteristics of an object or concept.
Abstraction allows us to work with complex systems by simplifying them into manageable components.
It helps in reducing complexity and increasing efficiency in problem-solving.
For example, in software engineering, abstraction is used to create classes and objects that represent real-world entities while hiding the implementation details.
Q15. what is inheritance
Inheritance is a concept in object-oriented programming where a class can inherit attributes and methods from another class.
Allows for code reusability and promotes a hierarchical structure
Derived class can access the properties and methods of the base class
Types of inheritance include single, multiple, multilevel, and hierarchical
Example: Class Car can inherit from class Vehicle, inheriting attributes like speed and methods like accelerate
Q16. what is hibernet
Hibernate is an open-source object-relational mapping (ORM) framework for Java applications.
Hibernate simplifies the development of database-driven applications by mapping Java objects to database tables.
It provides a query language called HQL (Hibernate Query Language) for querying databases using object-oriented syntax.
Hibernate supports automatic generation of primary key values, caching, and transaction management.
Example: Hibernate can be used to map a Java class represe...read more
Q17. Siem solutions for management
Siem solutions are security information and event management tools used for managing security incidents and events in real-time.
SIEM solutions collect, analyze, and report on security data from various sources.
They help organizations detect and respond to security incidents more effectively.
SIEM solutions can provide real-time monitoring, threat intelligence, and compliance reporting.
Examples of SIEM solutions include Splunk, IBM QRadar, and ArcSight.
Q18. Configuration of L2-L3 device
Configuration of L2-L3 device involves setting up VLANs, IP addresses, routing protocols, and security features.
Configure VLANs to segment network traffic
Assign IP addresses to interfaces for communication
Implement routing protocols like OSPF or BGP for network connectivity
Enable security features such as access control lists (ACLs) and port security
Test and verify the configuration to ensure proper functionality
Q19. Procedure stored procedure
A stored procedure is a set of SQL statements that can be saved and reused in a database management system.
Stored procedures help improve performance by reducing network traffic and improving security.
They can be used to encapsulate business logic for reuse.
Stored procedures can accept input parameters and return output parameters or result sets.
Examples: CREATE PROCEDURE, EXECUTE PROCEDURE.
Q20. explain spring security
Spring Security is a powerful and customizable authentication and access control framework for Java applications.
Provides comprehensive security services for Java EE-based enterprise software applications
Supports authentication, authorization, and protection against common security vulnerabilities
Integrates with Spring Framework for seamless configuration and usage
Allows for custom security configurations and extensions
Example: Configuring role-based access control using anno...read more
Q21. Sql join conditions
SQL join conditions are used to combine rows from two or more tables based on a related column between them.
Use JOIN keyword to combine rows from two or more tables based on a related column
Specify the join condition using ON keyword followed by the column names
Types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN
Q22. Explain OOPS concept
OOPS concept stands for Object-Oriented Programming System. It is a programming paradigm based on the concept of objects.
OOPS focuses on creating objects that contain data in the form of attributes and code in the form of methods.
Encapsulation, Inheritance, Polymorphism, and Abstraction are the four main principles of OOPS.
Encapsulation refers to the bundling of data and methods that operate on the data into a single unit.
Inheritance allows a class to inherit properties and b...read more
Q23. describe ur work
I work as a Project Engineer overseeing the planning, design, and execution of engineering projects.
Coordinate with team members to develop project plans and timelines
Manage project budgets and resources
Ensure projects are completed on time and within budget
Collaborate with clients to understand their needs and provide solutions
Troubleshoot any issues that arise during project execution
Q24. Add Two Numbers Represented as Linked Lists
Given two linked lists representing two non-negative integers, where the digits are stored in reverse order (i.e., starting from the least significant digit to the mo...read more
Add two numbers represented as linked lists in reverse order and return the sum as a linked list.
Traverse both linked lists simultaneously, adding corresponding digits along with carry from previous sum.
Handle cases where one list is longer than the other by considering carry.
Create a new linked list to store the sum digits in reverse order.
Remember to handle the case where there is a carry after adding all digits.
Q25. Remove Duplicates from String Problem Statement
You are provided a string STR
of length N
, consisting solely of lowercase English letters.
Your task is to remove all duplicate occurrences of characters in the s...read more
Remove duplicate occurrences of characters in a given string of lowercase English letters.
Iterate through the string and keep track of characters seen so far using a set.
Append characters to a new string only if they are not already in the set.
Return the new string without duplicate characters.
Q26. What is the role of the garbage collector in Java programming, and where is it utilized?
Garbage collector in Java manages memory by reclaiming unused objects, preventing memory leaks.
Automatically frees up memory by removing objects that are no longer in use
Prevents memory leaks by reclaiming memory from objects that are no longer referenced
Utilized in Java programming to improve memory management and prevent out-of-memory errors
Q27. when we use volatile and const at the same time what will happen
When volatile and const are used together, the variable is treated as read-only and its value can change unexpectedly.
The const keyword indicates that the variable's value cannot be changed by the program.
The volatile keyword tells the compiler that the variable's value may change at any time, even if it doesn't appear to be modified by the program.
When used together, the variable is treated as read-only by the program, but its value can still change unexpectedly due to exter...read more
Q28. what happens when we use volatile and const at the same time
When volatile and const are used together, the variable is treated as read-only and its value can change unexpectedly.
Using volatile and const together is rare but can be useful for memory-mapped hardware registers.
The volatile keyword tells the compiler that the variable can be changed unexpectedly, while const ensures the variable is read-only.
Example: const volatile int * const ptr = (int *)0x1234; // pointer to a read-only volatile integer at memory address 0x1234
Q29. What is the design of a traffic scenario, and which sensors are used to manage and clear traffic efficiently?
A traffic scenario design involves the layout of roads, intersections, signals, and parking areas. Sensors like cameras, loops, and radar are used to manage and clear traffic efficiently.
Traffic scenario design includes road layout, intersections, signals, and parking areas
Sensors such as cameras, loops, and radar are used to monitor traffic flow
Data from sensors is analyzed to optimize traffic signal timings and detect congestion
Efficient traffic management helps in reducing...read more
Q30. How would you rate your proficiency in Java programming?
I rate my proficiency in Java programming as advanced.
Advanced knowledge of object-oriented programming principles
Experience with Java frameworks like Spring and Hibernate
Ability to write efficient and scalable code
Familiarity with design patterns and best practices
Completed multiple Java projects successfully
Q31. Can you explain a model used in natural language processing?
A common model used in natural language processing is the Bag of Words model.
Bag of Words model represents text as a collection of words, ignoring grammar and word order.
It creates a vocabulary of unique words in the text and counts the frequency of each word.
This model is often used for tasks like sentiment analysis, document classification, and topic modeling.
Q32. What is modal& modless dialogbox?give any practical example of that?which commands r used for that?
Q33. What is zero day attack? Difference between Hashing and Encryption? CIA Traid? Question based on your skills mention in Resume. Some case study
Zero day attack is a cyber attack exploiting a vulnerability that is unknown to the software developer or vendor.
Zero day attack occurs when hackers exploit a software vulnerability before the developer releases a patch.
These attacks are dangerous because there is no defense or fix available at the time of the attack.
Examples include the Stuxnet worm and the WannaCry ransomware attack.
Q34. does any future in IOT with cyber security related?
Q35. What happens when any keyboard key is pressed?
Q36. How will you develop a python code for ML algortihm
Q37. What is the structure of a Java program?
The structure of a Java program includes classes, methods, variables, and packages.
Java program starts with a class definition, which includes methods and variables.
Methods contain the code that defines the behavior of the program.
Variables are used to store data within the program.
Packages are used to organize classes and provide a namespace for the program.
Example: public class HelloWorld { public static void main(String[] args) { System.out.println("Hello, World!"); }}
Q38. Why do we use activation functions?
Activation functions introduce non-linearity to neural networks, enabling them to learn complex patterns and relationships.
Activation functions help neural networks to learn complex patterns and relationships by introducing non-linearity.
They ensure that the output of each neuron is mapped to a specific range, allowing for better learning and generalization.
Common activation functions include ReLU, Sigmoid, Tanh, and Softmax.
Without activation functions, neural networks would...read more
Q39. What is the function of getMessage Loop?
Q40. Are you aware of ISO standards 9000
Yes, ISO 9000 is a set of international standards for quality management and quality assurance.
ISO 9000 is a series of standards developed by the International Organization for Standardization (ISO) that focus on quality management systems.
These standards provide guidance and tools for companies to ensure their products and services consistently meet customer requirements and regulatory standards.
ISO 9000 certification can help organizations improve processes, reduce errors, ...read more
Q41. How much u rank ur self in SDK & C++?
Q42. what is an environment variable example?
Environment variables are dynamic values that can affect the behavior of running processes.
Environment variables are set in the operating system or shell environment
They are accessed by programs to retrieve information about the environment
Examples include PATH, HOME, and USER
Q43. what are web services and their use
Web services are software systems designed to support interoperable machine-to-machine interaction over a network.
Web services allow different applications to communicate with each other without human intervention.
They use standard web protocols such as HTTP and XML to exchange data.
Examples include RESTful APIs, SOAP services, and microservices architecture.
Q44. Write for loop, write the pseudo code for fibbonacci,
Q45. Do u know about System Modal?
Q46. is brute force is good or bad
Brute force can be both good and bad depending on the context and application.
Brute force can be effective for small scale problems or when time is limited.
However, it is inefficient and impractical for large scale problems.
Brute force may also be necessary in certain scenarios where no other efficient solution exists.
For example, brute force can be used in password cracking when other methods fail.
Q47. Methods to avoid rusting Heat and mass transfer basis
Methods to prevent rusting based on heat and mass transfer
Coating the metal surface with a protective layer like paint or oil
Using sacrificial anodes to prevent corrosion
Applying cathodic protection by connecting the metal to a more active metal
Controlling the environment by reducing humidity and temperature
Using inhibitors to slow down the corrosion process
Q48. What are you learn in cyber security
In cyber security, you learn about network security, encryption, threat detection, incident response, and ethical hacking.
Network security involves protecting networks from unauthorized access or attacks.
Encryption is the process of encoding information to make it secure and unreadable without the proper decryption key.
Threat detection involves identifying and responding to potential security threats or breaches.
Incident response is the process of reacting to and managing a s...read more
Q49. What is numerical methods?
Numerical methods are techniques used to approximate solutions to mathematical problems that are difficult or impossible to solve analytically.
Numerical methods involve algorithms for solving equations, integrating functions, and optimizing systems.
Examples include Newton's method for finding roots of equations, Simpson's rule for numerical integration, and gradient descent for optimization.
These methods often involve iterative processes and may require trade-offs between acc...read more
Q50. What is Reynolds stress?
Reynolds stress is the average of the product of the fluctuating velocity components in a fluid flow.
Reynolds stress is a key component in the Reynolds-averaged Navier-Stokes equations used in fluid dynamics.
It represents the transfer of momentum between different parts of a fluid flow.
Reynolds stress is often used in turbulence modeling to predict the behavior of turbulent flows.
An example of Reynolds stress is the interaction between the mean flow and turbulent fluctuations...read more
Q51. difference between mutex and semaphore
Mutex is used for exclusive access to a resource by a single thread, while semaphore is used for controlling access to a resource by multiple threads.
Mutex is binary in nature, allowing only one thread to access the resource at a time.
Semaphore can have a count greater than 1, allowing multiple threads to access the resource simultaneously.
Mutex is typically used for protecting critical sections of code.
Semaphore is often used for synchronization between multiple threads or p...read more
Q52. What is oops concepts
Object-oriented programming concepts that focus on objects and classes for code organization and reusability.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class).
Inheritance: Allowing a class to inherit properties and behavior from another class.
Polymorphism: Ability for objects of different classes to respond to the same message in different ways.
Abstraction: Hiding complex implementation details and showing only the necessary features...read more
Q53. How does Google search work?
Google search works by crawling and indexing web pages, and then ranking them based on relevance and quality.
Google uses web crawlers to discover and index web pages.
The search algorithm ranks pages based on relevance to the search query.
Factors like keywords, backlinks, and user experience influence rankings.
Google constantly updates its algorithm to improve search results.
Google also considers user location and search history for personalized results.
Q54. what is multithreading?
Multithreading is the ability of a CPU to execute multiple threads of a process simultaneously.
Multithreading allows for better utilization of CPU resources.
It can improve the performance of applications that require parallel processing.
Threads share the same memory space, which can lead to synchronization issues.
Examples of multithreaded applications include web servers, video games, and media players.
Q55. What is DlgProc?
Q56. What you understood about mvc
MVC is a software design pattern that separates an application into three interconnected components: Model, View, and Controller.
Model represents the data and business logic of the application
View is responsible for rendering the user interface
Controller handles user input and updates the model and view accordingly
MVC promotes separation of concerns and modularity
Examples of MVC frameworks include Spring MVC and Ruby on Rails
Q57. What is Spring-boot
Spring Boot is a framework that simplifies the development of Java applications by providing pre-configured settings and tools.
Spring Boot eliminates the need for manual configuration by providing default settings.
It allows for easy creation of standalone, production-grade Spring-based applications.
Spring Boot includes embedded servers like Tomcat, Jetty, or Undertow for deploying applications.
It offers a wide range of plugins and extensions for enhancing development producti...read more
Q58. what is oop in java?
OOP in Java stands for Object-Oriented Programming, a programming paradigm that uses objects to design and build applications.
OOP focuses on creating objects that contain data and methods to manipulate that data.
Encapsulation, inheritance, and polymorphism are key principles of OOP in Java.
Example: Creating a class 'Car' with attributes like 'make', 'model', and methods like 'drive' and 'stop'.
Q59. Explain OOPS in details
OOPS stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.
OOPS focuses on creating objects that contain both data and methods to manipulate that data.
It involves concepts like encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation refers to bundling data and methods that operate on the data into a single unit.
Inheritance allows a class to inherit properties and behavior from another class.
Polymorphism allows obj...read more
Q60. DDOS attack explanation
DDOS attack is a malicious attempt to disrupt normal traffic of a targeted server or network by overwhelming it with a flood of internet traffic.
DDOS stands for Distributed Denial of Service attack.
Attackers use multiple compromised systems to flood the target with traffic.
Common types include UDP flood, SYN flood, and HTTP flood.
DDOS attacks can lead to service disruption, financial losses, and reputational damage.
Mitigation strategies include using firewalls, load balancers...read more
Q61. Deep learning and it's types
Deep learning is a subset of machine learning using neural networks to model complex patterns in data.
Types of deep learning include supervised learning, unsupervised learning, and reinforcement learning.
Supervised learning: Training on labeled data, e.g., image classification.
Unsupervised learning: Finding patterns in unlabeled data, e.g., clustering.
Reinforcement learning: Learning through trial and error, e.g., game playing AI.
Deep learning architectures include Convolutio...read more
Q62. controller method
A controller method is a function in a software application that handles incoming requests and returns appropriate responses.
Controller methods are typically found in web applications to handle user interactions.
They are responsible for processing data, making decisions, and returning a response to the user.
Examples include a login controller method that authenticates a user's credentials or a product controller method that retrieves product information.
Top HR Questions asked in Elentec Power India (EPI) Pvt. Ltd.
Interview Process at Elentec Power India (EPI) Pvt. Ltd.
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month