Add office photos
Premium Employer

Ericsson

4.2
based on 6.8k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

200+ Interview Questions and Answers

Updated 12 Dec 2024
Popular Designations

Q1. You are a team leader and one of your employee is unable to complete his/her work on time and due to him you are unable to submit the work before the deadline to your senior. How will you make that employee wor...

read more
Ans.

As a team leader, I would identify the reason for the delay and work with the employee to find a solution to complete the work on time.

  • Have a one-on-one meeting with the employee to understand the reason for the delay

  • Identify any roadblocks or challenges the employee is facing and work together to find a solution

  • Set clear expectations and deadlines for the employee to complete the work

  • Provide support and resources to help the employee complete the work on time

  • Regularly check ...read more

View 1 answer
Q2. Reverse the String

You are given a string 'STR'. The string contains [a-z] [A-Z] [0-9] [special characters]. You have to find the reverse of the string.

For example:

 If the given string is: STR = "abcde". You h...read more
View 2 more answers

Q3. What is financial and cost control during project management?

Ans.

Financial and cost control is the process of monitoring and managing project expenses to ensure they stay within budget.

  • Developing a detailed budget plan

  • Tracking expenses and comparing them to the budget plan

  • Identifying and addressing cost overruns

  • Negotiating with vendors to get the best prices

  • Implementing cost-saving measures

  • Regularly reporting on financial status to stakeholders

View 4 more answers

Q4. What do you know about GSM architecture and the interface of connectivity, OSI Model and layers (function of each layer) ?

Ans.

GSM architecture includes multiple layers of OSI model for connectivity. Each layer has a specific function.

  • GSM architecture consists of physical, data link, network, transport, and application layers.

  • Physical layer handles the transmission of bits over the air interface.

  • Data link layer provides error-free transmission of data frames.

  • Network layer handles routing and addressing of data packets.

  • Transport layer ensures reliable end-to-end data transfer.

  • Application layer provide...read more

Add your answer
Discover null interview dos and don'ts from real experiences
Q5. Longest palindromic substring

Given a string ’S’ consisting of lower case English letters, you are supposed to return the longest palindromic substring of ‘S’.

Note that in case of more than one longest palindro...read more

View 3 more answers
Q6. Find the fastest three horses

Puzzle Question-
There are 25 horses among which you need to find out the fastest 3 horses. You can conduct race among at most 5 to find out their relative speed. At no point you can...read more

Add your answer
Are these interview questions helpful?

Q7. 1-What is GSM Module? 2- Explain the architecture of Gsm module ? 3- What is type of signal ? 4- explain ADC and DAC? 5- what is python language? 6- what is oops concepts? 6- relocate question 7- minor and Majo...

read more
Ans.

Answers to questions related to Network Engineer job interview

  • GSM module is a hardware device that enables communication between mobile devices and cellular networks

  • The architecture of GSM module consists of a SIM card, a microcontroller, a power supply, and a radio transceiver

  • GSM module uses digital signal

  • ADC stands for Analog to Digital Converter and DAC stands for Digital to Analog Converter

  • Python is a high-level programming language used for web development, data analysis...read more

Add your answer
Q8. ML Question

What are the assumptions of linear regression model?

View 2 more answers
Share interview questions and help millions of jobseekers 🌟
Q9. ML Question

What problems do multicollinearity in regression analysis cause?

Add your answer
Q10. DBMS Question

How to find number of unique values in a SQl database?

Add your answer
Q11. Group Discussion

Here we are allowed to choose our own topic, we are divided into groups of 10 and u have 15 minutes per GD. You are given 2 minutes to take notes about the topic selected. Overall easy for the m...read more

Add your answer

Q12. What is default loopback ip address or what are private ip

Ans.

Default loopback IP address is 127.0.0.1 and private IPs are reserved for internal networks.

  • Default loopback IP address is used to test network software without connecting to a network.

  • Private IPs are reserved for internal networks and cannot be accessed from the internet.

  • Private IP ranges include 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.

Add your answer

Q13. What is Kubernets? what is difference between pod and VM what are different type of services in kubernetes what is difference between 4G and 5G what are messages in PFCP protocol. Interfaces in 4G and 5G

Ans.

Kubernetes is an open-source container orchestration platform that automates deployment, scaling, and management of containerized applications.

  • Pods are the smallest deployable units in Kubernetes, while VMs are complete virtual machines with their own operating system and hardware resources.

  • Types of services in Kubernetes include ClusterIP, NodePort, LoadBalancer, and ExternalName.

  • 4G and 5G are different generations of mobile network technology, with 5G offering faster speeds...read more

Add your answer

Q14. What is CRC and what impact over Network or data flow

Ans.

CRC stands for Cyclic Redundancy Check. It is an error-detecting code used in network communication to ensure data integrity.

  • CRC is a mathematical algorithm that generates a fixed-size checksum for a block of data.

  • The checksum is appended to the data and is recalculated at the receiving end to check for errors.

  • If the calculated checksum doesn't match the received checksum, it indicates that the data has been corrupted during transmission.

  • CRC helps in detecting errors caused b...read more

View 1 answer
Q15. ML Question

What are different measures used to check performance of classification model?

Add your answer

Q16. 5. When we make changes in grub what command has to be executed to reflect the changes persistently.

Ans.

The command 'update-grub' has to be executed to reflect changes made in grub persistently.

  • The 'update-grub' command updates the grub configuration file with the changes made.

  • It is important to run this command after making any changes to ensure they are saved.

  • The command can be run with sudo privileges.

  • Example: sudo update-grub

Add your answer

Q17. 4. What current grub version is available in linux and which release is currently available in RHEL

Ans.

Grub version in Linux and RHEL

  • The current version of Grub in Linux is 2.04

  • RHEL 8.4 currently uses Grub version 2.02

  • Grub is a bootloader used to load the operating system at startup

Add your answer

Q18. What is 2G , 3G, 4G call flow?

Ans.

2G, 3G, and 4G call flow are the processes involved in establishing and maintaining a mobile phone call.

  • 2G call flow involves circuit-switched technology and uses Time Division Multiple Access (TDMA) for voice transmission.

  • 3G call flow uses packet-switched technology and supports both voice and data transmission.

  • 4G call flow uses Long-Term Evolution (LTE) technology and provides high-speed data transmission.

  • All call flows involve processes such as authentication, registration...read more

Add your answer

Q19. Java What is JVM,JRE,JDK? what is the difference between class and instance variable in java? what is string Pool? write a code in java(prefer a good standard question) Web development if you have interest in w...

read more
Ans.

To build a web application, I would use a combination of front-end technologies like HTML, CSS, and JavaScript, along with back-end technologies like Node.js and MongoDB.

  • Use HTML for structuring the content of the web pages

  • Use CSS for styling the web pages and making them visually appealing

  • Use JavaScript for adding interactivity to the web pages and handling user input

  • Use Node.js for server-side scripting and handling server-side logic

  • Use MongoDB as the database to store and ...read more

Add your answer
Q20. Networking Question

What are the different protocols supported at each OSI Layer ?

Add your answer
Q21. ML Question

What are disadvantage of logistics regression?

Add your answer
Q22. Technical Question

Which LTE node is responsible for the MME selection?

Add your answer

Q23. how we can transfer file from one server to other server?

Ans.

Files can be transferred from one server to another using tools like SCP, SFTP, or rsync.

  • Use SCP (Secure Copy Protocol) to securely transfer files between servers. Example: scp file.txt user@server2:/path/to/directory

  • Use SFTP (SSH File Transfer Protocol) for interactive file transfers. Example: sftp user@server2

  • Use rsync for efficient synchronization of files between servers. Example: rsync -avz file.txt user@server2:/path/to/directory

View 2 more answers

Q24. 1.Difference between GitHub and GitLab 2. Rest API( Different REST API related Python libraries) and their uses (code) 3. Linux commands 4. Python basic questions 5. SIP Forking, SIP scenario based questions, S...

read more
Add your answer

Q25. You are unable to unmount a file system, what will you do?

Ans.

Check for any processes or open files using the file system, then force unmount if necessary.

  • Check for any processes or applications currently using the file system with 'lsof' command

  • Kill any processes that are using the file system if necessary

  • Try unmounting the file system again using 'umount -l' to force unmount if needed

View 1 answer

Q26. Difference between ABIS over IP and ABIS over TDM?

Ans.

ABIS over IP and ABIS over TDM are two different methods of transmitting biometric data.

  • ABIS over IP uses internet protocol to transmit biometric data while ABIS over TDM uses time-division multiplexing.

  • ABIS over IP is more flexible and scalable than ABIS over TDM.

  • ABIS over TDM is more reliable and secure than ABIS over IP.

  • ABIS over IP is suitable for remote locations while ABIS over TDM is suitable for local networks.

  • Examples of ABIS over IP include MorphoWave Compact and Cr...read more

Add your answer
Q27. OS Question

This is one of the questions-
To avoid the race condition, the number of processes that may be simultaneously inside their critical section is?

Add your answer

Q28. You see this bisleri water bottle. Tell me some innovative ideas to recreate it and make me convince to buy your idea and not this one.

Ans.

Reinvent the Bisleri bottle with a sleek design, eco-friendly materials, and a built-in filter for on-the-go purification.

  • Use biodegradable materials like bamboo or cornstarch-based plastics

  • Incorporate a minimalist design with a unique shape or texture

  • Add a filter to purify water from any source

  • Offer customization options like color or engraving

  • Include a reusable straw or spout for easy drinking

Add your answer

Q29. How to improve DL throughout in good RF condition

Ans.

To improve DL throughput in good RF condition, optimize antenna tilt, increase sector capacity, and reduce interference.

  • Optimize antenna tilt to improve signal strength and reduce interference

  • Increase sector capacity by adding more carriers or using advanced modulation techniques

  • Reduce interference by identifying and mitigating sources of interference

  • Ensure proper network planning and optimization to maximize DL throughput

  • Use advanced technologies like MIMO and beamforming to...read more

Add your answer

Q30. What is clustering and how to add partial repository Qm to full repository Qm?

Ans.

Clustering is grouping similar data points together. Adding partial repository Qm to full repository Qm requires merging the two clusters.

  • Clustering is used in data mining and machine learning to group similar data points together.

  • Partial repository Qm can be added to full repository Qm by merging the two clusters.

  • Examples of clustering algorithms include k-means, hierarchical clustering, and DBSCAN.

Add your answer

Q31. Case studies of daily operational activities?

Ans.

Daily operational activities case studies

  • Case study of optimizing production line for efficiency

  • Case study of implementing new safety protocols in a manufacturing plant

  • Case study of troubleshooting and resolving technical issues in a software development team

  • Case study of streamlining inventory management in a retail store

  • Case study of improving customer service processes in a call center

Add your answer

Q32. How to do load balancing? What are the parameters, How to improve verious KPi, Like VDR, HOSR Initial ERAB, CQI,SSSR

Ans.

Load balancing involves distributing network traffic across multiple servers to optimize resource utilization and prevent overload.

  • Parameters for load balancing include server health, server capacity, and current network traffic.

  • To improve various KPIs like VDR, HOSR, Initial ERAB, CQI, and SSSR, you can adjust load balancing algorithms, optimize server performance, and monitor network traffic.

  • For example, you can use round-robin, least connections, or weighted round-robin al...read more

Add your answer

Q33. how call transfers to a different operator

Ans.

Call transfers to a different operator involve redirecting the call from one operator to another.

  • Call transfer can be initiated by the caller or the current operator.

  • The caller can request a transfer by providing the desired operator's extension or department.

  • The current operator can transfer the call by using a transfer button or dialing the desired operator's extension.

  • During the transfer, the caller may be put on hold or hear a transfer announcement.

  • Once the call is transf...read more

Add your answer
Q34. DBMS Question

What is Object Oriented DBMS?

Add your answer

Q35. Difference between 3G,2G and 4G?

Ans.

3G, 2G, and 4G are different generations of mobile network technology.

  • 3G (Third Generation) provides faster data transfer speeds compared to 2G.

  • 2G (Second Generation) introduced digital voice communication and basic data services.

  • 4G (Fourth Generation) offers even faster data transfer speeds, low latency, and improved network capacity.

  • Examples of 3G networks include UMTS and CDMA2000, while 2G networks include GSM and IS-95.

  • 4G networks include LTE (Long-Term Evolution) and Wi...read more

Add your answer

Q36. What are different measures used to check performance of classification model

Ans.

Measures to check performance of classification model

  • Accuracy

  • Precision

  • Recall

  • F1 Score

  • ROC Curve

  • Confusion Matrix

View 1 answer

Q37. How to configure DHCP in a router through CMD

Ans.

To configure DHCP in a router through CMD, use the 'ip dhcp pool' command and specify the network and default gateway.

  • Open CMD and access the router's CLI

  • Enter 'enable' to access privileged mode

  • Enter 'configure terminal' to enter global configuration mode

  • Enter 'ip dhcp pool [pool name]' to create a DHCP pool

  • Specify the network and default gateway using the 'network' and 'default-router' commands

  • Exit configuration mode and save changes with 'exit' and 'write memory'

  • Example: 'i...read more

Add your answer

Q38. How to configure VLAN in a router through CMD

Ans.

To configure VLAN in a router through CMD, use the 'vlan' command and specify the VLAN ID and name.

  • Open CMD and connect to the router's console

  • Enter 'enable' to access privileged mode

  • Enter 'configure terminal' to enter global configuration mode

  • Enter 'vlan [VLAN ID]' to create the VLAN

  • Enter 'name [VLAN name]' to assign a name to the VLAN

  • Exit configuration mode by entering 'exit'

  • Save the configuration by entering 'write memory'

  • Example: 'vlan 10' and 'name Sales' will create a V...read more

Add your answer

Q39. What is APN redirection? what is 3GDT? What is MME/SGSN pooling? How APN configuration is done? What is SBA in 5G Cal flow for 4G and 5G

Ans.

APN redirection, 3GDT, MME/SGSN pooling, APN configuration, and SBA in 5G are topics related to mobile network architecture.

  • APN redirection is the process of redirecting a user's data traffic to a different Access Point Name (APN) than the one originally requested.

  • 3GDT stands for 3G Direct Tunneling, which allows for direct communication between the User Equipment (UE) and the Serving Gateway (SGW) without going through the Packet Data Network Gateway (PGW).

  • MME/SGSN pooling i...read more

Add your answer

Q40. What are the goals of a Digital Transformation and which principles are used to implement digital transformation

Add your answer

Q41. Basic architecture of 2G , 3G & 4G?

Ans.

2G, 3G, and 4G are mobile network technologies with different architectures.

  • 2G uses circuit-switched technology and is primarily used for voice calls and text messaging.

  • 3G uses packet-switched technology and offers faster data transfer rates than 2G.

  • 4G uses all-IP packet-switched technology and provides even faster data transfer rates than 3G.

  • 4G also supports advanced features like VoLTE and carrier aggregation.

  • Each generation of technology builds upon the previous one, with ...read more

Add your answer

Q42. If Script not run on commission time then what is the solution?

Ans.

The solution is to troubleshoot the issue and identify the root cause of the problem.

  • Check if the script is properly configured and scheduled

  • Verify if there are any errors or conflicts in the system

  • Debug the script to identify any coding issues

  • Consult with other team members or experts for assistance

  • Implement a backup plan or contingency measures to minimize impact

  • Document the issue and solution for future reference

Add your answer

Q43. if you have azure certification what is azure, what is Azure Blob Storage, What is ARM, what is horizontal Scaling?

Ans.

Azure is a cloud computing platform by Microsoft. Azure Blob Storage is a service for storing large amounts of unstructured data. ARM stands for Azure Resource Manager, used for managing resources in Azure. Horizontal scaling is increasing the number of instances of a service to distribute load.

  • Azure is a cloud computing platform by Microsoft

  • Azure Blob Storage is a service for storing large amounts of unstructured data

  • ARM stands for Azure Resource Manager, used for managing r...read more

Add your answer

Q44. If we required all technology on site then share the name of all technology ?

Ans.

The required technology on site depends on the specific field and industry.

  • The technology required for field maintenance engineering may include: diagnostic tools, monitoring systems, communication devices, and safety equipment.

  • Examples of technology used in field maintenance engineering include: thermal imaging cameras, vibration analyzers, ultrasonic detectors, and gas detectors.

  • Other industries may require different technology, such as medical equipment for healthcare faci...read more

Add your answer
Q45. OS Question

What is a deadlock?

Add your answer

Q46. 4G technical network operation, planning and design

Ans.

4G technical network operation, planning and design

  • Understanding of LTE/4G network architecture and protocols

  • Knowledge of radio frequency planning and optimization

  • Experience in designing and implementing 4G networks

  • Familiarity with network performance monitoring and troubleshooting

  • Ability to work with vendors and stakeholders to ensure network reliability and scalability

Add your answer

Q47. What is DHCP and its Importance ?

Ans.

DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that assigns IP addresses to devices on a network.

  • DHCP automates the process of assigning IP addresses to devices on a network.

  • It helps to avoid IP address conflicts and makes it easier to manage a large network.

  • DHCP also provides other network configuration information, such as subnet mask and default gateway.

  • Without DHCP, network administrators would have to manually assign IP addresses to each de...read more

Add your answer
Q48. OS Question

Difference between Multiprocessing and Multiprogramming

Add your answer

Q49. What is osi layer and its protocol?

Ans.

OSI layer is a conceptual model that describes the communication functions of a telecommunication or computing system.

  • OSI stands for Open Systems Interconnection.

  • It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has its own protocols and functions.

  • Examples of protocols include TCP/IP, HTTP, FTP, and SMTP.

Add your answer

Q50. What is difference between tuple and list !?

Ans.

Tuple is immutable and ordered while list is mutable and ordered.

  • Tuple uses () while list uses []

  • Tuple is faster than list for accessing elements

  • Tuple can be used as keys in dictionaries while list cannot

  • Tuple is used for heterogeneous data while list is used for homogeneous data

Add your answer
Q51. OS Question

Difference between windows XP and Windows 7

Add your answer
Q52. Networking Question

Explain the different OSI layers.

Add your answer

Q53. What is effect of multicollinearity ik regression analysis?

Ans.

Multicollinearity in regression analysis affects the accuracy and interpretability of the model.

  • Multicollinearity occurs when two or more independent variables are highly correlated.

  • It leads to unstable and unreliable estimates of regression coefficients.

  • It reduces the precision of the estimates and increases the standard errors.

  • It makes it difficult to interpret the individual effects of the independent variables.

  • It can be detected using correlation matrix, variance inflatio...read more

Add your answer
Q54. Technical Question

What is LTE architecture?

Add your answer
Q55. Technical Question

What are LTE Interfaces?

Add your answer

Q56. How to approach a business problem from Data Science perspective?

Ans.

Approach business problem with data science by understanding the problem, collecting relevant data, analyzing data, and presenting insights.

  • Understand the business problem and define the objective

  • Collect relevant data from various sources

  • Clean and preprocess the data

  • Analyze the data using statistical and machine learning techniques

  • Present insights and recommendations to stakeholders

  • Iterate and refine the approach as necessary

Add your answer

Q57. What is the used of the particular transaction code?

Ans.

Transaction codes are used to execute specific functions in SAP system.

  • Transaction codes are shortcuts to access specific functions in SAP system

  • They are used to execute specific tasks such as creating purchase orders, invoices, etc.

  • Transaction codes are four-character codes that can be entered in the command field of SAP system

  • Examples of transaction codes are ME21N for creating purchase orders, VF01 for creating invoices, etc.

Add your answer

Q58. What is transport network?

Ans.

Transport network refers to the infrastructure that enables the movement of people, goods, and information.

  • Transport network includes roads, railways, airports, seaports, and communication networks.

  • It plays a crucial role in the economy by facilitating trade and commerce.

  • Examples of transport networks include the interstate highway system in the US and the European railway network.

  • Transport network planning involves optimizing routes, modes of transportation, and infrastructu...read more

Add your answer

Q59. Explain how in this program variables will be stored in stack

Ans.

Variables are stored in stack in a last-in-first-out (LIFO) order.

  • Stack is a portion of memory used for temporary storage

  • Variables are pushed onto the stack when they are declared

  • When a function is called, its variables are pushed onto the stack

  • When the function returns, the variables are popped off the stack

  • Stack overflow can occur if too many variables are pushed onto the stack

View 1 answer

Q60. Difference between LTE & VOLTE?

Ans.

LTE is a standard for wireless broadband communication while VoLTE is a technology that enables voice calls over LTE network.

  • LTE stands for Long-Term Evolution and is a standard for wireless broadband communication.

  • VoLTE stands for Voice over LTE and is a technology that enables voice calls over LTE network.

  • LTE is used for data transfer while VoLTE is used for voice calls.

  • VoLTE provides better call quality and faster call setup time compared to traditional voice calls.

  • VoLTE r...read more

Add your answer

Q61. What is the different technique to inject bean in application context

Ans.

Different techniques for injecting beans in application context

  • Constructor Injection

  • Setter Injection

  • Field Injection

  • Method Injection

Add your answer

Q62. Write a C code for printing Febonacci Series upto n elements

Ans.

C code for printing Fibonacci Series upto n elements

  • Declare three variables to store the current, previous and next numbers in the series

  • Initialize the previous and current variables to 0 and 1 respectively

  • Use a loop to print the next number in the series by adding the previous two numbers

  • Loop should run n times to print n elements in the series

Add your answer

Q63. What is triggering and explain about channel triggering?

Ans.

Triggering is a mechanism to initiate a process or action based on a specific event or condition.

  • Triggering is commonly used in software development to automate tasks or processes.

  • Channel triggering is a type of triggering where a specific channel or communication medium is used to initiate an action.

  • For example, a chatbot can be triggered to respond to a user's message in a specific channel like Slack or Facebook Messenger.

  • Channel triggering can also be used in IoT devices w...read more

Add your answer

Q64. isolatn forest work? evalution metrics in laymann tems , pyspark basics , job lib

Ans.

Isolation Forest is an anomaly detection algorithm that works by isolating outliers in a dataset.

  • Isolation Forest is an unsupervised machine learning algorithm used for anomaly detection.

  • It works by randomly selecting a feature and then randomly selecting a split value between the maximum and minimum values of the selected feature.

  • The number of splits required to isolate an outlier is used as a measure of its abnormality.

  • Evaluation metrics for Isolation Forest in layman's ter...read more

Add your answer
Q65. DBMS Question

Difference between RDBMS and DBMS

Add your answer
Q66. Networking Question

Difference between Hub and Switch

Add your answer

Q67. What is a cell(in a cellular network)

Ans.

A cell is a geographic area covered by a base station in a cellular network.

  • A cell is the basic unit of a cellular network.

  • It is a geographic area covered by a base station.

  • Each cell has a unique identifier and can handle multiple calls simultaneously.

  • As a mobile device moves from one cell to another, the call is handed off to the new cell.

  • Cells can vary in size depending on the population density and terrain.

  • Examples of cellular networks include GSM, CDMA, and LTE.

Add your answer

Q68. What is project management?

Ans.

Project management is the process of planning, organizing, and overseeing the execution of a project from start to finish.

  • It involves defining project goals and objectives

  • Creating a project plan and timeline

  • Assigning tasks and responsibilities to team members

  • Monitoring progress and making adjustments as needed

  • Ensuring that the project is completed on time, within budget, and meets the desired quality standards

  • Examples include building construction, software development, and e...read more

Add your answer

Q69. What is resource management?

Ans.

Resource management is the process of planning, allocating, and optimizing resources to achieve organizational goals.

  • It involves identifying the resources needed for a project or task

  • Allocating those resources in an efficient manner

  • Monitoring and controlling resource usage to ensure optimal performance

  • Examples include managing personnel, finances, equipment, and time

  • Effective resource management can lead to increased productivity and cost savings

Add your answer

Q70. What are Modulation Technique ?

Ans.

Modulation techniques are used to encode information onto a carrier signal for transmission over a communication channel.

  • Modulation techniques vary in terms of the type of carrier signal used (analog or digital), the type of modulation (amplitude, frequency, phase), and the complexity of the modulation scheme.

  • Examples of modulation techniques include amplitude modulation (AM), frequency modulation (FM), phase modulation (PM), and quadrature amplitude modulation (QAM).

  • Modulati...read more

Add your answer

Q71. OOPS concepts and how are they implemented

Ans.

OOPS concepts are fundamental principles of object-oriented programming that help in designing and implementing software systems.

  • Encapsulation - bundling of data and methods that operate on that data

  • Inheritance - creating new classes from existing ones

  • Polymorphism - ability of objects to take on multiple forms

  • Abstraction - hiding implementation details and showing only functionality

  • Examples - Java, C++, Python, Ruby

Add your answer

Q72. How you design scalable and reliable distributed application

Ans.

To design scalable and reliable distributed applications, consider factors like load balancing, fault tolerance, and data partitioning.

  • Use load balancers to distribute traffic evenly across multiple servers

  • Implement fault tolerance by replicating data and services across multiple nodes

  • Partition data to distribute it across multiple nodes and avoid bottlenecks

  • Use caching to reduce the load on the database

  • Implement auto-scaling to handle sudden spikes in traffic

  • Use message queu...read more

Add your answer

Q73. What is single RAN?

Ans.

Single RAN is a network architecture that allows multiple wireless technologies to be supported on a single physical network.

  • Single RAN stands for Single Radio Access Network.

  • It enables multiple wireless technologies such as 2G, 3G, 4G, and 5G to be supported on a single physical network.

  • This reduces the need for multiple hardware and software components, resulting in cost savings and simplified network management.

  • Single RAN also allows for easier network upgrades and expansi...read more

Add your answer
Q74. Technical Question

Explain the LTE Call flow process.

Add your answer
Q75. OS Question

What is a thread?

Add your answer

Q76. What is cloud computing and what is the besic deployment model of cloud computing

Ans.

Cloud computing is the delivery of computing services over the internet, allowing users to access and store data on remote servers.

  • Cloud computing allows users to access data and applications from any device with an internet connection.

  • The basic deployment models of cloud computing are public, private, hybrid, and community clouds.

  • Public clouds are owned and operated by third-party cloud service providers, offering resources like storage and virtual machines to the public.

  • Pri...read more

Add your answer

Q77. What are disadvantage of logistics regression?

Ans.

Logistic regression assumes linear relationship between independent and dependent variables.

  • May not perform well with non-linear data

  • May overfit or underfit the data

  • May be sensitive to outliers

  • May require large sample size for stable results

Add your answer

Q78. What is the difference between interval and custom interval in Zabbix ?

Add your answer

Q79. OSI layer - Different layer Protocols and how its work

Ans.

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.

  • Layer 1 - Physical layer: Deals with physical connections and transmission of raw data. Example: Ethernet

  • Layer 2 - Data link layer: Manages data transfer between devices on the same network. Example: MAC addresses

  • Layer 3 - Network layer: Handles routing and forwarding of data packets. Example: IP addresses

  • Layer 4 - Transport layer: Ens...read more

Add your answer

Q80. What is the difference between 2G, 3G, 4G? Why 5G?

Ans.

2G, 3G, 4G, and 5G are different generations of mobile network technology.

  • 2G refers to second-generation mobile networks that primarily provided voice and text messaging services.

  • 3G introduced faster data transfer speeds, enabling internet browsing, video calling, and multimedia services.

  • 4G further improved data speeds, offering high-quality video streaming, online gaming, and advanced mobile applications.

  • 5G is the fifth generation of mobile network technology, designed to pr...read more

Add your answer

Q81. Explain OSI model devices on each layer ?

Ans.

OSI model devices are specific to each layer of the model, facilitating communication between devices.

  • Layer 1 (Physical): hubs, repeaters, cables

  • Layer 2 (Data Link): switches, bridges

  • Layer 3 (Network): routers, layer 3 switches

  • Layer 4 (Transport): gateways, firewalls

  • Layer 5 (Session): not applicable

  • Layer 6 (Presentation): encryption/decryption devices

  • Layer 7 (Application): servers, workstations

Add your answer

Q82. Wahi is the 4G parameters in kpi.

Ans.

4G parameters in KPI are key performance indicators that measure the performance of a 4G network.

  • 4G parameters in KPI include metrics such as signal strength, signal quality, throughput, latency, and handover success rate.

  • These parameters help assess the overall performance and quality of a 4G network.

  • For example, signal strength is measured in dBm and indicates the power level of the received signal.

  • Throughput measures the data transfer rate in Mbps, indicating the network's...read more

View 2 more answers

Q83. Difference between GSM and CDMA ?

Ans.

GSM and CDMA are two different technologies used in mobile communication.

  • GSM uses SIM cards while CDMA does not.

  • GSM allows for easy switching of phones while CDMA does not.

  • GSM has better international roaming capabilities than CDMA.

  • CDMA has better call quality and network capacity than GSM.

  • GSM is more widely used globally while CDMA is mostly used in the US and parts of Asia.

Add your answer

Q84. How you can schedule a job regularly?

Ans.

You can schedule a job regularly using cron jobs in Linux.

  • Use the crontab command to edit the cron table

  • Specify the schedule using the appropriate syntax (minute, hour, day of month, month, day of week)

  • For example, to schedule a job to run every day at 3am, you would add the following line to the cron table: 0 3 * * * /path/to/command

View 1 answer

Q85. What is Hard link and soft link?

Ans.

Hard links and soft links are two types of links used in Unix-like operating systems to create shortcuts to files.

  • Hard links are direct pointers to the inode of a file, while soft links are indirect pointers to the file name.

  • Hard links cannot link directories or files on different filesystems, while soft links can.

  • If the original file is deleted, hard links will still point to the data, while soft links will be broken.

  • Example: 'ln file1 file2' creates a hard link, 'ln -s file...read more

View 1 answer

Q86. No. of output pins of microprocessor 8085

Ans.

The microprocessor 8085 has a total of 40 output pins.

  • The microprocessor 8085 is an 8-bit microprocessor.

  • It has a total of 40 pins, which are used for various purposes.

  • These pins include address bus pins, data bus pins, control pins, and power supply pins.

  • Some of the output pins are used for sending signals to external devices or peripherals.

  • Examples of output pins in the microprocessor 8085 include the RD (Read) pin and the WR (Write) pin.

Add your answer

Q87. What is BGP and how much it's stats.

Ans.

BGP is a routing protocol used to exchange routing information between different networks on the internet.

  • BGP stands for Border Gateway Protocol.

  • It is used to connect different autonomous systems (AS) on the internet.

  • BGP is a path-vector protocol, which means it selects the best path for data to travel based on a number of factors such as shortest path, least number of hops, etc.

  • BGP is used by internet service providers (ISPs) to exchange routing information with each other.

  • B...read more

Add your answer

Q88. How to check ip route through CMD

Ans.

To check IP route through CMD, use the 'route print' command.

  • Open Command Prompt

  • Type 'route print' and press Enter

  • The IP route table will be displayed

  • You can filter the results using various parameters like destination IP, interface, etc.

Add your answer

Q89. what is AAA and AAAA query?

Ans.

AAA and AAAA queries are DNS queries used to retrieve IPv4 and IPv6 addresses respectively.

  • AAA query is used to retrieve IPv4 address of a domain name.

  • AAAA query is used to retrieve IPv6 address of a domain name.

  • AAA and AAAA queries are part of DNS (Domain Name System) protocol.

  • AAA and AAAA records are stored in DNS servers.

  • Example: AAA query for google.com will return 172.217.166.142.

  • Example: AAAA query for google.com will return 2a00:1450:4001:81a::200e.

View 1 answer
Q90. OS Question

Process Life Cycle in OS

Add your answer

Q91. What are the ITIL fundamentals

Ans.

ITIL fundamentals are a set of best practices for IT service management.

  • ITIL stands for Information Technology Infrastructure Library

  • It includes processes for service strategy, design, transition, operation, and continual improvement

  • ITIL helps organizations align their IT services with business needs and improve efficiency

  • Examples of ITIL processes include incident management, problem management, and change management

Add your answer

Q92. What is VOLTE?

Ans.

VOLTE stands for Voice over LTE. It is a technology that allows voice calls to be made over a 4G LTE network.

  • VOLTE uses IP packets to transmit voice calls over the LTE network

  • It provides better call quality and faster call setup times compared to traditional 2G/3G networks

  • VOLTE also allows for simultaneous voice and data usage on the same network

  • Examples of VOLTE-enabled devices include iPhone 6 and above, Samsung Galaxy S6 and above, and Google Pixel

  • VOLTE requires both the d...read more

Add your answer

Q93. What is the role of router's ?

Ans.

Routers are networking devices that forward data packets between computer networks.

  • Routers connect multiple networks together and determine the best path for data to travel.

  • They use routing tables to make decisions about where to send data packets.

  • Routers can also provide security by blocking unwanted traffic and filtering incoming data.

  • Examples of routers include home routers, enterprise routers, and core routers used by internet service providers.

Add your answer

Q94. What is jenkin and what is important in this?

Ans.

Jenkins is an open-source automation server used for continuous integration and continuous delivery (CI/CD) pipelines.

  • Jenkins helps automate the building, testing, and deployment of software projects.

  • It allows for easy integration with various tools and technologies such as Git, Docker, and Maven.

  • Jenkins provides a web-based user interface for easy configuration and monitoring of jobs.

  • It supports plugins to extend its functionality and customize workflows.

  • Jenkins helps in imp...read more

Add your answer

Q95. Hot to decide which location should be preferable to deploy a machine.

Ans.

The location for deploying a machine should be decided based on factors like latency, data sovereignty, cost, and regulatory compliance.

  • Consider latency - Choose a location closer to end users to reduce latency.

  • Data sovereignty - Ensure compliance with data protection laws by deploying in a location that meets regulatory requirements.

  • Cost - Evaluate the cost of deployment in different locations, including infrastructure and operational expenses.

  • Regulatory compliance - Conside...read more

Add your answer

Q96. What is the difference between zabbix agent and zabbix trapper?

Add your answer

Q97. What is the role of switches ?

Ans.

Switches are networking devices that connect devices together and enable communication between them.

  • Switches forward data packets between devices on a network

  • They use MAC addresses to identify devices and determine where to send data

  • Switches can improve network performance by reducing network congestion

  • They can also enhance network security by isolating traffic between devices

  • Examples of switches include Ethernet switches, LAN switches, and data center switches

Add your answer

Q98. What are the security controls implemented in your applications

Add your answer

Q99. What are the types of modulations?

Ans.

Modulation is the process of varying a carrier signal in order to transmit information.

  • Amplitude Modulation (AM) - varying the amplitude of the carrier signal

  • Frequency Modulation (FM) - varying the frequency of the carrier signal

  • Phase Modulation (PM) - varying the phase of the carrier signal

  • Quadrature Amplitude Modulation (QAM) - combining amplitude and phase modulation

  • Pulse Amplitude Modulation (PAM) - varying the amplitude of discrete pulses

  • Pulse Width Modulation (PWM) - va...read more

Add your answer

Q100. How to remove elements from list?

Ans.

To remove elements from a list, use the remove() method or list comprehension.

  • Use the remove() method to remove a specific element from the list.

  • Use list comprehension to remove multiple elements based on a condition.

  • Example: myList.remove('element') or myList = [x for x in myList if x != 'element']

Add your answer
1
2
3

More about working at Ericsson

Top Rated Large Company - 2024
HQ - Stockholm,Stockholm County, Sweden
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 132 interviews in the last 1 year
Interview experience
4.4
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 700 Interview Questions
4.0
 • 556 Interview Questions
4.0
 • 460 Interview Questions
3.8
 • 399 Interview Questions
4.3
 • 131 Interview Questions
4.2
 • 129 Interview Questions
View all
Top Ericsson Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter