i
Ericsson
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
Method overloading is when multiple methods have the same name but different parameters. Method overriding is when a subclass provides a specific implementation of a method that is already provided by its superclass.
Method overloading allows a class to have multiple methods with the same name but different parameters.
Method overriding occurs in a subclass when a method has the same name, return type, and parameters as ...
Swapping two variables without using a third variable
Use XOR operation to swap two variables without using a third variable
Example: a = 5, b = 10; a = a ^ b; b = a ^ b; a = a ^ b; // Now a = 10, b = 5
I am impressed by the organization's innovative projects and collaborative work culture.
Impressed by innovative projects
Attracted to collaborative work culture
Excited about potential for growth and learning opportunities
My weakness is overthinking and my strength is attention to detail.
Weakness: tend to overthink situations, which can lead to indecision or unnecessary stress
Strength: strong attention to detail, ensuring accuracy and quality in my work
Example: I sometimes spend too much time analyzing a problem before taking action, but I have learned to set deadlines for myself to prevent this from affecting my productivity
Basic programming and its easy only
I applied via Referral and was interviewed before Dec 2023. There were 2 interview rounds.
Codility for sorting, debugging and builidng a simple application
I applied via Company Website and was interviewed in Mar 2023. There were 3 interview rounds.
There was a lot of typical hr questions. Such as your salary preference and what is your biggest weakness.
They asked HOG PUF question. It was a very easy question
Ericsson interview questions for designations
I applied via Naukri.com and was interviewed before Sep 2023. There were 2 interview rounds.
Hashmap is a data structure that stores key-value pairs and allows for fast retrieval of values based on keys.
Hashmap uses a hash function to map keys to indices in an array.
Collision handling is important in hashmap implementation.
Java's HashMap class is a popular implementation of hashmap.
Example: HashMap
To become a senior software developer, gain expertise in new technologies, contribute to open source projects, and mentor junior developers.
Become a senior software developer
Gain expertise in new technologies
Contribute to open source projects
Mentor junior developers
Get interview-ready with Top Ericsson Interview Questions
I applied via Approached by Company
I applied via campus placement at Madan Mohan Malaviya Engineering College (MMMEC) and was interviewed before Sep 2022. There were 2 interview rounds.
Easy questions from quant, english and reasoning
3G, 4G, and 5G architectures refer to the generations of mobile network technology, each offering faster speeds and improved capabilities.
3G (Third Generation) introduced mobile data services like internet browsing and video calling.
4G (Fourth Generation) provided faster speeds for data transmission, enabling services like HD video streaming and online gaming.
5G (Fifth Generation) offers even faster speeds, lower laten...
I applied via Recruitment Consultant and was interviewed in Sep 2020. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Jul 2020. There was 1 interview round.
I was interviewed before Mar 2021.
Round duration - 15 minutes
Round difficulty - Easy
This was a group discussion round where we were divided into groups of 10 and we had 15 minutes for GD.
Round duration - 60 minutes
Round difficulty - Medium
This is all about how good you are with the fundamentals. Out of 10 I would give it a 6.5 on difficulty.
You are given a string STR
which contains alphabets, numbers, and special characters. Your task is to reverse the string.
STR = "abcde"
"e...
This can be done by iterative swapping using two pointers. The first pointer points to the beginning of the string, whereas the second pointer points to the end. Both pointers keep swapping their elements and go towards each other. Essentially, the algorithm simulates the rotation of a string with respect to its midpoint.
Time Complexity : O(n)
Deadlock is a situation where a set of processes are blocked because each process is holding a resource and waiting for another resource acquired by some other process.
Deadlock can arise if the following four conditions hold simultaneously (Necessary Conditions)
Mutual Exclusion: One or more than one resource are non-shareable (Only one process can use at a time)
Hold and Wait: A process is holding at least o...
A thread is a path of execution within a process. A process can contain multiple threads.
There are two types of threads.
User Level Thread
Kernel Level Thread
1. The availability of more than one processor per system, that can execute several set of instructions in parallel is known as multiprocessing. The concurrent application of more than one program in the main memory is known as multiprogramming.
2. The number of CPU is more than one in multiprocessing. The number of CPU is one in multiprogramming.
3. Multiprocessing takes less time for job processing. Multiprogramming ta...
Process life cycle in OS is one of the five states in which a process can be starting from the time it has been submitted for execution, till the time when it has been executed by the system. A process can be in any of the following states –
New state
Ready state
Running state
Waiting state
Terminated
1. Worldwide release :
Windows 7 : October 22, 2009
Windows XP : October 25, 2001
2. Stable release :
Windows 7 : February 22, 2011
Windows XP : April 21, 2008
3. Kernel type :
Windows 7 : Hybrid
Windows XP : Hybrid
4. Platform support :
Windows 7 : IA-32 and x86-64
Windows XP : IA-32, x86-64 and Itanium
5. Preceded by :
Windows 7 : Windows Vista
Windows XP : Windows 2000 , Windows ME
6. Succeeded by :
Windows ...
Round duration - 60 minutes
Round difficulty - Easy
Technical round with questions on DBMS and Networking mainly.
1. DBMS stores data as file. RDBMS stores data in tabular form.
2. Data elements need to access individually in DBMS. Multiple data elements can be accessed at the same time in RDBMS.
3. No relationship between data in DBMS. Data is stored in the form of tables which are related to each other in RDBMS.
4. In DBMS, Normalization is not present. In RDBMS, Normalization is present.
5. DBMS does not support distributed databas
An object-oriented database (OOD) is a database system that can work with complex data objects — that is, objects that mirror those used in object-oriented programming languages.
In object-oriented programming, everything is an object, and many objects are quite complex, having different properties and methods. An object-oriented database management system works in concert with an object-oriented programming language to...
To count the number of different values that are stored in a given column, you simply need to designate the column you pass in to the COUNT function as DISTINCT. When given a column, COUNT returns the number of values in that column. Combining this with DISTINCT returns only the number of unique (and non-NULL) values.
A Hub is a networking device that allows you to connect multiple PCs to a single network, whereas a Switch connects various devices together on a single computer network.
A Hub operates on the physical layer, whereas Switch operates on the data link layer.
Hub uses Half-duplex cable on the other hand Switch uses Full duplex cables
Hub is a passive device while the switch is an active device
Hub uses electrical signal orbit
Physical Layer
The lowest layer of the OSI Model is concerned with electrically or optically transmitting raw unstructured data bits across the network from the physical layer of the sending device to the physical layer of the receiving device. It can include specifications such as voltages, pin layout, cabling, and radio frequencies.
Data Link Layer
At the data link layer, directly connected nodes are used to perform nod...
Layer 7 Application SMTP, HTTP, FTP, POP3, SNMP
Layer 6 Presentation MPEG, ASCH, SSL, TLS
Layer 5 Session NetBIOS, SAP
Layer 4 Transport TCP, UDP
Layer 3 Network IPV5, IPV6, ICMP, IPSEC, ARP, MPLS.
Layer 2 Data Link RAPA, PPP, Frame Relay, ATM, Fiber Cable, etc.
Layer 1 Physical RS232, 100BaseTX, ISDN, 11.
Round duration - 15 minutes
Round difficulty - Easy
IF you make it to the HR round you are selected. All 28 that attended got selected . It was more like stuff for formality. The usual questions.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
Top trending discussions
based on 8 interviews
2 Interview rounds
based on 94 reviews
Rating in categories
Senior Solution Integrator
2.4k
salaries
| ₹6.5 L/yr - ₹22 L/yr |
Senior Engineer
2.3k
salaries
| ₹6.1 L/yr - ₹19 L/yr |
Solution Architect
2.2k
salaries
| ₹13 L/yr - ₹39 L/yr |
Network Engineer
1.9k
salaries
| ₹2.4 L/yr - ₹9.5 L/yr |
Solution Integrator
1.7k
salaries
| ₹4 L/yr - ₹13.5 L/yr |
Nokia
Cisco
Huawei Technologies
Qualcomm