Ericsson
200+ Interview Questions and Answers
Q1. You are a team leader and one of your employee is unable to complete his/her work on time and due to him you are unable to submit the work before the deadline to your senior. How will you make that employee wor...
read moreAs a team leader, I would identify the reason for the delay and work with the employee to find a solution to complete the work on time.
Have a one-on-one meeting with the employee to understand the reason for the delay
Identify any roadblocks or challenges the employee is facing and work together to find a solution
Set clear expectations and deadlines for the employee to complete the work
Provide support and resources to help the employee complete the work on time
Regularly check ...read more
You are given a string 'STR'. The string contains [a-z] [A-Z] [0-9] [special characters]. You have to find the reverse of the string.
For example:
If the given string is: STR = "abcde". You h...read more
Q3. What is financial and cost control during project management?
Financial and cost control is the process of monitoring and managing project expenses to ensure they stay within budget.
Developing a detailed budget plan
Tracking expenses and comparing them to the budget plan
Identifying and addressing cost overruns
Negotiating with vendors to get the best prices
Implementing cost-saving measures
Regularly reporting on financial status to stakeholders
Q4. What do you know about GSM architecture and the interface of connectivity, OSI Model and layers (function of each layer) ?
GSM architecture includes multiple layers of OSI model for connectivity. Each layer has a specific function.
GSM architecture consists of physical, data link, network, transport, and application layers.
Physical layer handles the transmission of bits over the air interface.
Data link layer provides error-free transmission of data frames.
Network layer handles routing and addressing of data packets.
Transport layer ensures reliable end-to-end data transfer.
Application layer provide...read more
Given a string ’S’ consisting of lower case English letters, you are supposed to return the longest palindromic substring of ‘S’.
Note that in case of more than one longest palindro...read more
Puzzle Question-
There are 25 horses among which you need to find out the fastest 3 horses. You can conduct race among at most 5 to find out their relative speed. At no point you can...read more
Q7. 1-What is GSM Module? 2- Explain the architecture of Gsm module ? 3- What is type of signal ? 4- explain ADC and DAC? 5- what is python language? 6- what is oops concepts? 6- relocate question 7- minor and Majo...
read moreAnswers to questions related to Network Engineer job interview
GSM module is a hardware device that enables communication between mobile devices and cellular networks
The architecture of GSM module consists of a SIM card, a microcontroller, a power supply, and a radio transceiver
GSM module uses digital signal
ADC stands for Analog to Digital Converter and DAC stands for Digital to Analog Converter
Python is a high-level programming language used for web development, data analysis...read more
What are the assumptions of linear regression model?
What problems do multicollinearity in regression analysis cause?
How to find number of unique values in a SQl database?
Here we are allowed to choose our own topic, we are divided into groups of 10 and u have 15 minutes per GD. You are given 2 minutes to take notes about the topic selected. Overall easy for the m...read more
Q12. What is default loopback ip address or what are private ip
Default loopback IP address is 127.0.0.1 and private IPs are reserved for internal networks.
Default loopback IP address is used to test network software without connecting to a network.
Private IPs are reserved for internal networks and cannot be accessed from the internet.
Private IP ranges include 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.
Q13. What is Kubernets? what is difference between pod and VM what are different type of services in kubernetes what is difference between 4G and 5G what are messages in PFCP protocol. Interfaces in 4G and 5G
Kubernetes is an open-source container orchestration platform that automates deployment, scaling, and management of containerized applications.
Pods are the smallest deployable units in Kubernetes, while VMs are complete virtual machines with their own operating system and hardware resources.
Types of services in Kubernetes include ClusterIP, NodePort, LoadBalancer, and ExternalName.
4G and 5G are different generations of mobile network technology, with 5G offering faster speeds...read more
Q14. What is CRC and what impact over Network or data flow
CRC stands for Cyclic Redundancy Check. It is an error-detecting code used in network communication to ensure data integrity.
CRC is a mathematical algorithm that generates a fixed-size checksum for a block of data.
The checksum is appended to the data and is recalculated at the receiving end to check for errors.
If the calculated checksum doesn't match the received checksum, it indicates that the data has been corrupted during transmission.
CRC helps in detecting errors caused b...read more
What are different measures used to check performance of classification model?
Q16. 5. When we make changes in grub what command has to be executed to reflect the changes persistently.
The command 'update-grub' has to be executed to reflect changes made in grub persistently.
The 'update-grub' command updates the grub configuration file with the changes made.
It is important to run this command after making any changes to ensure they are saved.
The command can be run with sudo privileges.
Example: sudo update-grub
Q17. 4. What current grub version is available in linux and which release is currently available in RHEL
Grub version in Linux and RHEL
The current version of Grub in Linux is 2.04
RHEL 8.4 currently uses Grub version 2.02
Grub is a bootloader used to load the operating system at startup
Q18. What is 2G , 3G, 4G call flow?
2G, 3G, and 4G call flow are the processes involved in establishing and maintaining a mobile phone call.
2G call flow involves circuit-switched technology and uses Time Division Multiple Access (TDMA) for voice transmission.
3G call flow uses packet-switched technology and supports both voice and data transmission.
4G call flow uses Long-Term Evolution (LTE) technology and provides high-speed data transmission.
All call flows involve processes such as authentication, registration...read more
Q19. Java What is JVM,JRE,JDK? what is the difference between class and instance variable in java? what is string Pool? write a code in java(prefer a good standard question) Web development if you have interest in w...
read moreTo build a web application, I would use a combination of front-end technologies like HTML, CSS, and JavaScript, along with back-end technologies like Node.js and MongoDB.
Use HTML for structuring the content of the web pages
Use CSS for styling the web pages and making them visually appealing
Use JavaScript for adding interactivity to the web pages and handling user input
Use Node.js for server-side scripting and handling server-side logic
Use MongoDB as the database to store and ...read more
What are the different protocols supported at each OSI Layer ?
What are disadvantage of logistics regression?
Which LTE node is responsible for the MME selection?
Q23. how we can transfer file from one server to other server?
Files can be transferred from one server to another using tools like SCP, SFTP, or rsync.
Use SCP (Secure Copy Protocol) to securely transfer files between servers. Example: scp file.txt user@server2:/path/to/directory
Use SFTP (SSH File Transfer Protocol) for interactive file transfers. Example: sftp user@server2
Use rsync for efficient synchronization of files between servers. Example: rsync -avz file.txt user@server2:/path/to/directory
Q24. 1.Difference between GitHub and GitLab 2. Rest API( Different REST API related Python libraries) and their uses (code) 3. Linux commands 4. Python basic questions 5. SIP Forking, SIP scenario based questions, S...
read moreQ25. You are unable to unmount a file system, what will you do?
Check for any processes or open files using the file system, then force unmount if necessary.
Check for any processes or applications currently using the file system with 'lsof' command
Kill any processes that are using the file system if necessary
Try unmounting the file system again using 'umount -l' to force unmount if needed
Q26. Difference between ABIS over IP and ABIS over TDM?
ABIS over IP and ABIS over TDM are two different methods of transmitting biometric data.
ABIS over IP uses internet protocol to transmit biometric data while ABIS over TDM uses time-division multiplexing.
ABIS over IP is more flexible and scalable than ABIS over TDM.
ABIS over TDM is more reliable and secure than ABIS over IP.
ABIS over IP is suitable for remote locations while ABIS over TDM is suitable for local networks.
Examples of ABIS over IP include MorphoWave Compact and Cr...read more
This is one of the questions-
To avoid the race condition, the number of processes that may be simultaneously inside their critical section is?
Q28. You see this bisleri water bottle. Tell me some innovative ideas to recreate it and make me convince to buy your idea and not this one.
Reinvent the Bisleri bottle with a sleek design, eco-friendly materials, and a built-in filter for on-the-go purification.
Use biodegradable materials like bamboo or cornstarch-based plastics
Incorporate a minimalist design with a unique shape or texture
Add a filter to purify water from any source
Offer customization options like color or engraving
Include a reusable straw or spout for easy drinking
Q29. How to improve DL throughout in good RF condition
To improve DL throughput in good RF condition, optimize antenna tilt, increase sector capacity, and reduce interference.
Optimize antenna tilt to improve signal strength and reduce interference
Increase sector capacity by adding more carriers or using advanced modulation techniques
Reduce interference by identifying and mitigating sources of interference
Ensure proper network planning and optimization to maximize DL throughput
Use advanced technologies like MIMO and beamforming to...read more
Q30. What is clustering and how to add partial repository Qm to full repository Qm?
Clustering is grouping similar data points together. Adding partial repository Qm to full repository Qm requires merging the two clusters.
Clustering is used in data mining and machine learning to group similar data points together.
Partial repository Qm can be added to full repository Qm by merging the two clusters.
Examples of clustering algorithms include k-means, hierarchical clustering, and DBSCAN.
Q31. Case studies of daily operational activities?
Daily operational activities case studies
Case study of optimizing production line for efficiency
Case study of implementing new safety protocols in a manufacturing plant
Case study of troubleshooting and resolving technical issues in a software development team
Case study of streamlining inventory management in a retail store
Case study of improving customer service processes in a call center
Q32. How to do load balancing? What are the parameters, How to improve verious KPi, Like VDR, HOSR Initial ERAB, CQI,SSSR
Load balancing involves distributing network traffic across multiple servers to optimize resource utilization and prevent overload.
Parameters for load balancing include server health, server capacity, and current network traffic.
To improve various KPIs like VDR, HOSR, Initial ERAB, CQI, and SSSR, you can adjust load balancing algorithms, optimize server performance, and monitor network traffic.
For example, you can use round-robin, least connections, or weighted round-robin al...read more
Q33. how call transfers to a different operator
Call transfers to a different operator involve redirecting the call from one operator to another.
Call transfer can be initiated by the caller or the current operator.
The caller can request a transfer by providing the desired operator's extension or department.
The current operator can transfer the call by using a transfer button or dialing the desired operator's extension.
During the transfer, the caller may be put on hold or hear a transfer announcement.
Once the call is transf...read more
Q35. Difference between 3G,2G and 4G?
3G, 2G, and 4G are different generations of mobile network technology.
3G (Third Generation) provides faster data transfer speeds compared to 2G.
2G (Second Generation) introduced digital voice communication and basic data services.
4G (Fourth Generation) offers even faster data transfer speeds, low latency, and improved network capacity.
Examples of 3G networks include UMTS and CDMA2000, while 2G networks include GSM and IS-95.
4G networks include LTE (Long-Term Evolution) and Wi...read more
Q36. What are different measures used to check performance of classification model
Measures to check performance of classification model
Accuracy
Precision
Recall
F1 Score
ROC Curve
Confusion Matrix
Q37. How to configure DHCP in a router through CMD
To configure DHCP in a router through CMD, use the 'ip dhcp pool' command and specify the network and default gateway.
Open CMD and access the router's CLI
Enter 'enable' to access privileged mode
Enter 'configure terminal' to enter global configuration mode
Enter 'ip dhcp pool [pool name]' to create a DHCP pool
Specify the network and default gateway using the 'network' and 'default-router' commands
Exit configuration mode and save changes with 'exit' and 'write memory'
Example: 'i...read more
Q38. How to configure VLAN in a router through CMD
To configure VLAN in a router through CMD, use the 'vlan' command and specify the VLAN ID and name.
Open CMD and connect to the router's console
Enter 'enable' to access privileged mode
Enter 'configure terminal' to enter global configuration mode
Enter 'vlan [VLAN ID]' to create the VLAN
Enter 'name [VLAN name]' to assign a name to the VLAN
Exit configuration mode by entering 'exit'
Save the configuration by entering 'write memory'
Example: 'vlan 10' and 'name Sales' will create a V...read more
Q39. What is APN redirection? what is 3GDT? What is MME/SGSN pooling? How APN configuration is done? What is SBA in 5G Cal flow for 4G and 5G
APN redirection, 3GDT, MME/SGSN pooling, APN configuration, and SBA in 5G are topics related to mobile network architecture.
APN redirection is the process of redirecting a user's data traffic to a different Access Point Name (APN) than the one originally requested.
3GDT stands for 3G Direct Tunneling, which allows for direct communication between the User Equipment (UE) and the Serving Gateway (SGW) without going through the Packet Data Network Gateway (PGW).
MME/SGSN pooling i...read more
Q40. What are the goals of a Digital Transformation and which principles are used to implement digital transformation
Q41. Basic architecture of 2G , 3G & 4G?
2G, 3G, and 4G are mobile network technologies with different architectures.
2G uses circuit-switched technology and is primarily used for voice calls and text messaging.
3G uses packet-switched technology and offers faster data transfer rates than 2G.
4G uses all-IP packet-switched technology and provides even faster data transfer rates than 3G.
4G also supports advanced features like VoLTE and carrier aggregation.
Each generation of technology builds upon the previous one, with ...read more
Q42. If Script not run on commission time then what is the solution?
The solution is to troubleshoot the issue and identify the root cause of the problem.
Check if the script is properly configured and scheduled
Verify if there are any errors or conflicts in the system
Debug the script to identify any coding issues
Consult with other team members or experts for assistance
Implement a backup plan or contingency measures to minimize impact
Document the issue and solution for future reference
Q43. if you have azure certification what is azure, what is Azure Blob Storage, What is ARM, what is horizontal Scaling?
Azure is a cloud computing platform by Microsoft. Azure Blob Storage is a service for storing large amounts of unstructured data. ARM stands for Azure Resource Manager, used for managing resources in Azure. Horizontal scaling is increasing the number of instances of a service to distribute load.
Azure is a cloud computing platform by Microsoft
Azure Blob Storage is a service for storing large amounts of unstructured data
ARM stands for Azure Resource Manager, used for managing r...read more
Q44. If we required all technology on site then share the name of all technology ?
The required technology on site depends on the specific field and industry.
The technology required for field maintenance engineering may include: diagnostic tools, monitoring systems, communication devices, and safety equipment.
Examples of technology used in field maintenance engineering include: thermal imaging cameras, vibration analyzers, ultrasonic detectors, and gas detectors.
Other industries may require different technology, such as medical equipment for healthcare faci...read more
Q46. 4G technical network operation, planning and design
4G technical network operation, planning and design
Understanding of LTE/4G network architecture and protocols
Knowledge of radio frequency planning and optimization
Experience in designing and implementing 4G networks
Familiarity with network performance monitoring and troubleshooting
Ability to work with vendors and stakeholders to ensure network reliability and scalability
Q47. What is DHCP and its Importance ?
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that assigns IP addresses to devices on a network.
DHCP automates the process of assigning IP addresses to devices on a network.
It helps to avoid IP address conflicts and makes it easier to manage a large network.
DHCP also provides other network configuration information, such as subnet mask and default gateway.
Without DHCP, network administrators would have to manually assign IP addresses to each de...read more
Difference between Multiprocessing and Multiprogramming
Q49. What is osi layer and its protocol?
OSI layer is a conceptual model that describes the communication functions of a telecommunication or computing system.
OSI stands for Open Systems Interconnection.
It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has its own protocols and functions.
Examples of protocols include TCP/IP, HTTP, FTP, and SMTP.
Q50. What is difference between tuple and list !?
Tuple is immutable and ordered while list is mutable and ordered.
Tuple uses () while list uses []
Tuple is faster than list for accessing elements
Tuple can be used as keys in dictionaries while list cannot
Tuple is used for heterogeneous data while list is used for homogeneous data
Difference between windows XP and Windows 7
Explain the different OSI layers.
Q53. What is effect of multicollinearity ik regression analysis?
Multicollinearity in regression analysis affects the accuracy and interpretability of the model.
Multicollinearity occurs when two or more independent variables are highly correlated.
It leads to unstable and unreliable estimates of regression coefficients.
It reduces the precision of the estimates and increases the standard errors.
It makes it difficult to interpret the individual effects of the independent variables.
It can be detected using correlation matrix, variance inflatio...read more
What is LTE architecture?
What are LTE Interfaces?
Q56. How to approach a business problem from Data Science perspective?
Approach business problem with data science by understanding the problem, collecting relevant data, analyzing data, and presenting insights.
Understand the business problem and define the objective
Collect relevant data from various sources
Clean and preprocess the data
Analyze the data using statistical and machine learning techniques
Present insights and recommendations to stakeholders
Iterate and refine the approach as necessary
Q57. What is the used of the particular transaction code?
Transaction codes are used to execute specific functions in SAP system.
Transaction codes are shortcuts to access specific functions in SAP system
They are used to execute specific tasks such as creating purchase orders, invoices, etc.
Transaction codes are four-character codes that can be entered in the command field of SAP system
Examples of transaction codes are ME21N for creating purchase orders, VF01 for creating invoices, etc.
Q58. What is transport network?
Transport network refers to the infrastructure that enables the movement of people, goods, and information.
Transport network includes roads, railways, airports, seaports, and communication networks.
It plays a crucial role in the economy by facilitating trade and commerce.
Examples of transport networks include the interstate highway system in the US and the European railway network.
Transport network planning involves optimizing routes, modes of transportation, and infrastructu...read more
Q59. Explain how in this program variables will be stored in stack
Variables are stored in stack in a last-in-first-out (LIFO) order.
Stack is a portion of memory used for temporary storage
Variables are pushed onto the stack when they are declared
When a function is called, its variables are pushed onto the stack
When the function returns, the variables are popped off the stack
Stack overflow can occur if too many variables are pushed onto the stack
Q60. Difference between LTE & VOLTE?
LTE is a standard for wireless broadband communication while VoLTE is a technology that enables voice calls over LTE network.
LTE stands for Long-Term Evolution and is a standard for wireless broadband communication.
VoLTE stands for Voice over LTE and is a technology that enables voice calls over LTE network.
LTE is used for data transfer while VoLTE is used for voice calls.
VoLTE provides better call quality and faster call setup time compared to traditional voice calls.
VoLTE r...read more
Q61. What is the different technique to inject bean in application context
Different techniques for injecting beans in application context
Constructor Injection
Setter Injection
Field Injection
Method Injection
Q62. Write a C code for printing Febonacci Series upto n elements
C code for printing Fibonacci Series upto n elements
Declare three variables to store the current, previous and next numbers in the series
Initialize the previous and current variables to 0 and 1 respectively
Use a loop to print the next number in the series by adding the previous two numbers
Loop should run n times to print n elements in the series
Q63. What is triggering and explain about channel triggering?
Triggering is a mechanism to initiate a process or action based on a specific event or condition.
Triggering is commonly used in software development to automate tasks or processes.
Channel triggering is a type of triggering where a specific channel or communication medium is used to initiate an action.
For example, a chatbot can be triggered to respond to a user's message in a specific channel like Slack or Facebook Messenger.
Channel triggering can also be used in IoT devices w...read more
Q64. isolatn forest work? evalution metrics in laymann tems , pyspark basics , job lib
Isolation Forest is an anomaly detection algorithm that works by isolating outliers in a dataset.
Isolation Forest is an unsupervised machine learning algorithm used for anomaly detection.
It works by randomly selecting a feature and then randomly selecting a split value between the maximum and minimum values of the selected feature.
The number of splits required to isolate an outlier is used as a measure of its abnormality.
Evaluation metrics for Isolation Forest in layman's ter...read more
Difference between RDBMS and DBMS
Difference between Hub and Switch
Q67. What is a cell(in a cellular network)
A cell is a geographic area covered by a base station in a cellular network.
A cell is the basic unit of a cellular network.
It is a geographic area covered by a base station.
Each cell has a unique identifier and can handle multiple calls simultaneously.
As a mobile device moves from one cell to another, the call is handed off to the new cell.
Cells can vary in size depending on the population density and terrain.
Examples of cellular networks include GSM, CDMA, and LTE.
Q68. What is project management?
Project management is the process of planning, organizing, and overseeing the execution of a project from start to finish.
It involves defining project goals and objectives
Creating a project plan and timeline
Assigning tasks and responsibilities to team members
Monitoring progress and making adjustments as needed
Ensuring that the project is completed on time, within budget, and meets the desired quality standards
Examples include building construction, software development, and e...read more
Q69. What is resource management?
Resource management is the process of planning, allocating, and optimizing resources to achieve organizational goals.
It involves identifying the resources needed for a project or task
Allocating those resources in an efficient manner
Monitoring and controlling resource usage to ensure optimal performance
Examples include managing personnel, finances, equipment, and time
Effective resource management can lead to increased productivity and cost savings
Q70. What are Modulation Technique ?
Modulation techniques are used to encode information onto a carrier signal for transmission over a communication channel.
Modulation techniques vary in terms of the type of carrier signal used (analog or digital), the type of modulation (amplitude, frequency, phase), and the complexity of the modulation scheme.
Examples of modulation techniques include amplitude modulation (AM), frequency modulation (FM), phase modulation (PM), and quadrature amplitude modulation (QAM).
Modulati...read more
Q71. OOPS concepts and how are they implemented
OOPS concepts are fundamental principles of object-oriented programming that help in designing and implementing software systems.
Encapsulation - bundling of data and methods that operate on that data
Inheritance - creating new classes from existing ones
Polymorphism - ability of objects to take on multiple forms
Abstraction - hiding implementation details and showing only functionality
Examples - Java, C++, Python, Ruby
Q72. How you design scalable and reliable distributed application
To design scalable and reliable distributed applications, consider factors like load balancing, fault tolerance, and data partitioning.
Use load balancers to distribute traffic evenly across multiple servers
Implement fault tolerance by replicating data and services across multiple nodes
Partition data to distribute it across multiple nodes and avoid bottlenecks
Use caching to reduce the load on the database
Implement auto-scaling to handle sudden spikes in traffic
Use message queu...read more
Q73. What is single RAN?
Single RAN is a network architecture that allows multiple wireless technologies to be supported on a single physical network.
Single RAN stands for Single Radio Access Network.
It enables multiple wireless technologies such as 2G, 3G, 4G, and 5G to be supported on a single physical network.
This reduces the need for multiple hardware and software components, resulting in cost savings and simplified network management.
Single RAN also allows for easier network upgrades and expansi...read more
Explain the LTE Call flow process.
Q76. What is cloud computing and what is the besic deployment model of cloud computing
Cloud computing is the delivery of computing services over the internet, allowing users to access and store data on remote servers.
Cloud computing allows users to access data and applications from any device with an internet connection.
The basic deployment models of cloud computing are public, private, hybrid, and community clouds.
Public clouds are owned and operated by third-party cloud service providers, offering resources like storage and virtual machines to the public.
Pri...read more
Q77. What are disadvantage of logistics regression?
Logistic regression assumes linear relationship between independent and dependent variables.
May not perform well with non-linear data
May overfit or underfit the data
May be sensitive to outliers
May require large sample size for stable results
Q78. What is the difference between interval and custom interval in Zabbix ?
Q79. OSI layer - Different layer Protocols and how its work
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
Layer 1 - Physical layer: Deals with physical connections and transmission of raw data. Example: Ethernet
Layer 2 - Data link layer: Manages data transfer between devices on the same network. Example: MAC addresses
Layer 3 - Network layer: Handles routing and forwarding of data packets. Example: IP addresses
Layer 4 - Transport layer: Ens...read more
Q80. What is the difference between 2G, 3G, 4G? Why 5G?
2G, 3G, 4G, and 5G are different generations of mobile network technology.
2G refers to second-generation mobile networks that primarily provided voice and text messaging services.
3G introduced faster data transfer speeds, enabling internet browsing, video calling, and multimedia services.
4G further improved data speeds, offering high-quality video streaming, online gaming, and advanced mobile applications.
5G is the fifth generation of mobile network technology, designed to pr...read more
Q81. Explain OSI model devices on each layer ?
OSI model devices are specific to each layer of the model, facilitating communication between devices.
Layer 1 (Physical): hubs, repeaters, cables
Layer 2 (Data Link): switches, bridges
Layer 3 (Network): routers, layer 3 switches
Layer 4 (Transport): gateways, firewalls
Layer 5 (Session): not applicable
Layer 6 (Presentation): encryption/decryption devices
Layer 7 (Application): servers, workstations
Q82. Wahi is the 4G parameters in kpi.
4G parameters in KPI are key performance indicators that measure the performance of a 4G network.
4G parameters in KPI include metrics such as signal strength, signal quality, throughput, latency, and handover success rate.
These parameters help assess the overall performance and quality of a 4G network.
For example, signal strength is measured in dBm and indicates the power level of the received signal.
Throughput measures the data transfer rate in Mbps, indicating the network's...read more
Q83. Difference between GSM and CDMA ?
GSM and CDMA are two different technologies used in mobile communication.
GSM uses SIM cards while CDMA does not.
GSM allows for easy switching of phones while CDMA does not.
GSM has better international roaming capabilities than CDMA.
CDMA has better call quality and network capacity than GSM.
GSM is more widely used globally while CDMA is mostly used in the US and parts of Asia.
Q84. How you can schedule a job regularly?
You can schedule a job regularly using cron jobs in Linux.
Use the crontab command to edit the cron table
Specify the schedule using the appropriate syntax (minute, hour, day of month, month, day of week)
For example, to schedule a job to run every day at 3am, you would add the following line to the cron table: 0 3 * * * /path/to/command
Q85. What is Hard link and soft link?
Hard links and soft links are two types of links used in Unix-like operating systems to create shortcuts to files.
Hard links are direct pointers to the inode of a file, while soft links are indirect pointers to the file name.
Hard links cannot link directories or files on different filesystems, while soft links can.
If the original file is deleted, hard links will still point to the data, while soft links will be broken.
Example: 'ln file1 file2' creates a hard link, 'ln -s file...read more
Q86. No. of output pins of microprocessor 8085
The microprocessor 8085 has a total of 40 output pins.
The microprocessor 8085 is an 8-bit microprocessor.
It has a total of 40 pins, which are used for various purposes.
These pins include address bus pins, data bus pins, control pins, and power supply pins.
Some of the output pins are used for sending signals to external devices or peripherals.
Examples of output pins in the microprocessor 8085 include the RD (Read) pin and the WR (Write) pin.
Q87. What is BGP and how much it's stats.
BGP is a routing protocol used to exchange routing information between different networks on the internet.
BGP stands for Border Gateway Protocol.
It is used to connect different autonomous systems (AS) on the internet.
BGP is a path-vector protocol, which means it selects the best path for data to travel based on a number of factors such as shortest path, least number of hops, etc.
BGP is used by internet service providers (ISPs) to exchange routing information with each other.
B...read more
Q88. How to check ip route through CMD
To check IP route through CMD, use the 'route print' command.
Open Command Prompt
Type 'route print' and press Enter
The IP route table will be displayed
You can filter the results using various parameters like destination IP, interface, etc.
Q89. what is AAA and AAAA query?
AAA and AAAA queries are DNS queries used to retrieve IPv4 and IPv6 addresses respectively.
AAA query is used to retrieve IPv4 address of a domain name.
AAAA query is used to retrieve IPv6 address of a domain name.
AAA and AAAA queries are part of DNS (Domain Name System) protocol.
AAA and AAAA records are stored in DNS servers.
Example: AAA query for google.com will return 172.217.166.142.
Example: AAAA query for google.com will return 2a00:1450:4001:81a::200e.
Q91. What are the ITIL fundamentals
ITIL fundamentals are a set of best practices for IT service management.
ITIL stands for Information Technology Infrastructure Library
It includes processes for service strategy, design, transition, operation, and continual improvement
ITIL helps organizations align their IT services with business needs and improve efficiency
Examples of ITIL processes include incident management, problem management, and change management
Q92. What is VOLTE?
VOLTE stands for Voice over LTE. It is a technology that allows voice calls to be made over a 4G LTE network.
VOLTE uses IP packets to transmit voice calls over the LTE network
It provides better call quality and faster call setup times compared to traditional 2G/3G networks
VOLTE also allows for simultaneous voice and data usage on the same network
Examples of VOLTE-enabled devices include iPhone 6 and above, Samsung Galaxy S6 and above, and Google Pixel
VOLTE requires both the d...read more
Q93. What is the role of router's ?
Routers are networking devices that forward data packets between computer networks.
Routers connect multiple networks together and determine the best path for data to travel.
They use routing tables to make decisions about where to send data packets.
Routers can also provide security by blocking unwanted traffic and filtering incoming data.
Examples of routers include home routers, enterprise routers, and core routers used by internet service providers.
Q94. What is jenkin and what is important in this?
Jenkins is an open-source automation server used for continuous integration and continuous delivery (CI/CD) pipelines.
Jenkins helps automate the building, testing, and deployment of software projects.
It allows for easy integration with various tools and technologies such as Git, Docker, and Maven.
Jenkins provides a web-based user interface for easy configuration and monitoring of jobs.
It supports plugins to extend its functionality and customize workflows.
Jenkins helps in imp...read more
Q95. Hot to decide which location should be preferable to deploy a machine.
The location for deploying a machine should be decided based on factors like latency, data sovereignty, cost, and regulatory compliance.
Consider latency - Choose a location closer to end users to reduce latency.
Data sovereignty - Ensure compliance with data protection laws by deploying in a location that meets regulatory requirements.
Cost - Evaluate the cost of deployment in different locations, including infrastructure and operational expenses.
Regulatory compliance - Conside...read more
Q96. What is the difference between zabbix agent and zabbix trapper?
Q97. What is the role of switches ?
Switches are networking devices that connect devices together and enable communication between them.
Switches forward data packets between devices on a network
They use MAC addresses to identify devices and determine where to send data
Switches can improve network performance by reducing network congestion
They can also enhance network security by isolating traffic between devices
Examples of switches include Ethernet switches, LAN switches, and data center switches
Q98. What are the security controls implemented in your applications
Q99. What are the types of modulations?
Modulation is the process of varying a carrier signal in order to transmit information.
Amplitude Modulation (AM) - varying the amplitude of the carrier signal
Frequency Modulation (FM) - varying the frequency of the carrier signal
Phase Modulation (PM) - varying the phase of the carrier signal
Quadrature Amplitude Modulation (QAM) - combining amplitude and phase modulation
Pulse Amplitude Modulation (PAM) - varying the amplitude of discrete pulses
Pulse Width Modulation (PWM) - va...read more
Q100. How to remove elements from list?
To remove elements from a list, use the remove() method or list comprehension.
Use the remove() method to remove a specific element from the list.
Use list comprehension to remove multiple elements based on a condition.
Example: myList.remove('element') or myList = [x for x in myList if x != 'element']
More about working at Ericsson
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month