HCLTech
100+ Jio Interview Questions and Answers
Q101. What and uses of selenium and cucumber
Selenium is a tool used for automating web browsers and Cucumber is a tool used for behavior-driven development.
Selenium is used for testing web applications by automating browser actions
Cucumber is used for writing and executing automated acceptance tests
Selenium can be integrated with Cucumber to write and execute automated tests in a behavior-driven development approach
Cucumber uses Gherkin syntax to write test scenarios in a human-readable format
Selenium supports multiple...read more
Q102. What is the golden rule of accounting?
The golden rule of accounting states that debit what comes in and credit what goes out.
Debit what comes in and credit what goes out
Assets = Liabilities + Equity
Helps maintain the balance in accounting records
Q103. Difference between windows 10 and 11 BSOD How do you do system scan How do you handle the issues which is pending for a long time
Windows 11 has new features like redesigned Start menu, improved multitasking, and better gaming performance compared to Windows 10.
Windows 11 has a redesigned Start menu with a centered layout, compared to the left-aligned Start menu in Windows 10.
Windows 11 offers improved multitasking features like Snap Layouts and Snap Groups, making it easier to organize and switch between multiple windows.
Windows 11 includes DirectStorage technology for faster game load times and better...read more
Q104. What is vpc and scerious
VPC stands for Virtual Private Cloud, a virtual network dedicated to an AWS account. SCERIOUS is not a recognized term in AWS.
VPC is used to create isolated virtual networks within AWS
It allows users to define their own IP address range, subnets, and route tables
VPC provides control over network traffic, security, and connectivity options
Q105. What is kyc and what purpose of KYC
KYC stands for Know Your Customer. It is a process used by financial institutions to verify the identity of their clients.
KYC is a regulatory requirement to prevent financial crimes such as money laundering and terrorism financing.
It involves collecting personal information and verifying the identity of customers.
Examples of KYC documents include government-issued IDs, proof of address, and financial statements.
KYC helps financial institutions build trust with their customers...read more
Q106. What devops tools your worked on
I have worked with various DevOps tools including Jenkins, Git, Docker, Kubernetes, Ansible, and AWS.
Experience with Jenkins for continuous integration and deployment
Proficient in Git for version control
Familiarity with Docker and Kubernetes for containerization and orchestration
Knowledge of Ansible for configuration management
Experience with AWS for cloud infrastructure management
Q107. Differences between C and Java?
C is a low-level programming language while Java is a high-level object-oriented language.
C is a procedural language while Java is an object-oriented language.
C has manual memory management while Java has automatic garbage collection.
C is platform-dependent while Java is platform-independent.
C supports pointers while Java does not.
C is typically used for system-level programming while Java is used for application development.
Q108. What is pragma autonomous transaction
Pragma autonomous transaction is used in PL/SQL to create a subtransaction that is independent of the main transaction.
Pragma autonomous transaction is used to create a subtransaction within a main transaction.
The subtransaction operates independently of the main transaction and can commit or rollback changes without affecting the main transaction.
It is commonly used to log information or perform auditing tasks without interfering with the main transaction.
Example: PRAGMA AUT...read more
Q109. What is session? Wht is the uses of session?
Session is a way to store information (variables) on the server to be used across multiple pages.
Session is used to maintain user-specific data across multiple pages.
It is created when a user logs in and destroyed when the user logs out.
Session data can be accessed and manipulated using the $_SESSION superglobal variable.
Examples of session data include user ID, username, and shopping cart items.
Q110. How can we achieve multiple inheritance in java
Multiple inheritance cannot be achieved directly in Java, but it can be simulated using interfaces or abstract classes.
Java does not support multiple inheritance of classes
Multiple inheritance can be achieved using interfaces or abstract classes
Interfaces allow a class to inherit from multiple interfaces
Abstract classes can provide partial implementation and can be extended by a single class
Q111. Material creation and types of bapi
Material creation in SAP involves using BAPIs for different types of materials.
BAPI_MATERIAL_SAVEDATA can be used for creating materials in SAP
Different types of materials include raw materials, semi-finished goods, finished goods, etc.
BAPI_MATERIAL_GET_ALL can be used to retrieve information about all materials in SAP
Q112. What is data structure?
Data structure is a way of organizing and storing data in a computer so that it can be accessed and manipulated efficiently.
Data structures define the way data is organized and stored in memory.
They provide efficient algorithms for accessing, inserting, and deleting data.
Examples of data structures include arrays, linked lists, stacks, queues, trees, and graphs.
Q113. What is a credit note and debit note
A credit note is a document issued by a seller to a buyer, indicating that a refund or credit has been made to the buyer's account. A debit note is a document issued by a seller to a buyer, indicating that a debit has been made to the buyer's account.
A credit note is issued when a seller owes money to a buyer, such as when a product is returned or a discount is given.
A debit note is issued when a buyer owes money to a seller, such as when an invoice is underpaid or there are ...read more
Q114. What is mutating error
A mutating error occurs when a program attempts to modify a value that is supposed to be immutable.
Mutating errors commonly occur in programming languages that have immutable data structures, such as Swift or Rust.
Attempting to change a constant value in Swift will result in a mutating error.
In Rust, trying to modify a value that is borrowed immutably will lead to a mutating error.
Q115. Difference between look up and look up ext function.
Q116. Whats is freeze pane and condition formatting
Freeze pane is a feature in spreadsheet software that allows the user to lock rows or columns in place while scrolling through the rest of the sheet. Conditional formatting is a tool that allows the user to apply formatting to cells based on specified conditions.
Freeze pane is used to keep certain rows or columns visible while scrolling through a large spreadsheet.
It helps in keeping important information, such as headers, always visible.
For example, if you freeze the top row...read more
Q117. Introduce and showcase your result.
I successfully designed and implemented a new software system for optimizing energy consumption in buildings.
Researched current energy consumption trends in buildings
Developed algorithms to analyze and optimize energy usage
Implemented software system using Python and SQL
Conducted testing and validation to ensure accuracy
Resulted in 20% reduction in energy consumption in test buildings
Q118. Different between bound and unbound
Bound refers to a variable that is assigned to a specific value, while unbound refers to a variable that has not yet been assigned a value.
Bound variables have a specific value assigned to them, while unbound variables do not.
Bound variables are used in programming to store and manipulate data, while unbound variables are used to represent unknown values.
Examples of bound variables include constants and variables that have been initialized with a value, while examples of unbo...read more
Q119. Tell me about yourself Linked list and Array list
I am a software trainee with knowledge in linked list and array list.
I have experience in implementing linked lists and array lists in various programming languages.
Linked lists are dynamic data structures while array lists are static data structures.
Linked lists are efficient for insertion and deletion operations while array lists are efficient for random access.
Examples of programming languages that support linked lists and array lists are Java, Python, and C++.
Q120. What is vpn and how to implement it?
VPN stands for Virtual Private Network, a secure connection that allows users to access the internet privately and securely.
VPN creates a secure encrypted connection over a less secure network, such as the internet.
It masks your IP address and encrypts data to ensure privacy and security.
VPN can be implemented using VPN software or apps, configuring VPN settings on devices, or using VPN routers.
Examples of VPN services include NordVPN, ExpressVPN, and CyberGhost.
Q121. What is ITSM and why it is used
ITSM stands for IT Service Management. It is used to manage and deliver IT services to customers efficiently and effectively.
ITSM is a set of policies, processes, and procedures for managing IT services.
It helps organizations to align IT services with business needs and improve customer satisfaction.
ITSM includes various frameworks such as ITIL, COBIT, and ISO 20000.
It involves incident management, problem management, change management, and service desk management.
ITSM tools ...read more
Q122. Did you know about SAP
Yes, I am familiar with SAP and have experience using it in previous roles.
I have used SAP for inventory management and financial reporting
I have completed training courses on SAP
I am comfortable navigating the SAP interface and running reports
Q123. What is ipsec?and how to implement it?
IPsec stands for Internet Protocol Security, a protocol suite used to secure Internet Protocol (IP) communications.
IPsec provides authentication, integrity, and confidentiality for data transmitted over a network.
It can be implemented through various protocols such as Authentication Header (AH) and Encapsulating Security Payload (ESP).
IPsec can be used to create Virtual Private Networks (VPNs) for secure communication over public networks.
Implementation involves configuring s...read more
Q124. difference between adsl and blob storage
ADSL is a type of internet connection technology, while Blob storage is a type of cloud storage service.
ADSL (Asymmetric Digital Subscriber Line) is a type of broadband connection that uses existing telephone lines to transmit data.
Blob storage is a type of cloud storage service provided by platforms like Azure, AWS, and Google Cloud.
ADSL typically has slower upload speeds compared to download speeds, while Blob storage is designed for storing large amounts of unstructured da...read more
Q125. What is exit interview and it's process?
Exit interview is a process where an employee leaving a company is interviewed to gather feedback and insights.
Exit interview is conducted when an employee is leaving the company voluntarily or involuntarily.
The purpose of an exit interview is to gather feedback on the employee's experience at the company, reasons for leaving, and suggestions for improvement.
Exit interviews are usually conducted by HR or a designated interviewer, and the information gathered is used to make i...read more
Q126. What are the highlevel languages
High-level languages are programming languages that are easier to read and write than low-level languages.
High-level languages are closer to human language than machine language.
They are easier to learn and use than low-level languages.
Examples of high-level languages include Java, Python, and C++.
Q127. Write a program to print Even numbers
Program to print even numbers
Use a loop to iterate through numbers
Check if each number is even using modulo operator
Print the even numbers
Q128. Projects done in training
I have completed multiple projects during my training in SAP ABAP.
Developed a custom report to track sales data for a retail client
Enhanced existing programs to improve performance and functionality
Worked on a team project to integrate SAP modules for a manufacturing company
Q129. Module pool programming steps
Module pool programming is a technique in SAP ABAP for creating interactive user interfaces.
Define screen elements using Screen Painter
Write ABAP code for screen logic and flow control
Handle user input and trigger actions based on user interactions
Use function modules for backend processing
Implement navigation between screens
Q130. Smart forms vs sap scripts
Smart forms are newer and more advanced than SAP scripts.
Smart forms are newer technology compared to SAP scripts.
Smart forms offer more features and flexibility in designing forms.
Smart forms are easier to maintain and modify compared to SAP scripts.
Smart forms support interactive forms and digital signatures.
SAP scripts are older technology and are being phased out in favor of smart forms.
Q131. Please define. Me who is used to pivot
Pivot is a function used in data analysis to reorganize and summarize data.
Pivot is used to transform rows into columns or columns into rows.
It helps in summarizing data by grouping and aggregating values.
Pivot is commonly used in spreadsheet software like Microsoft Excel or Google Sheets.
For example, if you have a table with sales data where each row represents a sale, you can use pivot to create a summary table with columns representing different products and rows represent...read more
Q132. Speak 2 minutes on any topic
The Importance of Time Management
Time management is crucial for success in both personal and professional life
It helps in prioritizing tasks and achieving goals efficiently
Effective time management reduces stress and improves work-life balance
Examples of time management techniques include creating to-do lists, setting deadlines, and delegating tasks
Q133. Print 1 to 10 numbers using go routines and channels
Use go routines and channels to print numbers 1 to 10
Create a channel to communicate between go routines
Use a for loop to create 10 go routines, each printing a number
Send the numbers through the channel and print them in the main routine
Q134. How to check status of an IDOC
Q135. what is port no. of http
The port number of HTTP is 80.
The default port number for HTTP is 80.
Port 80 is used for unencrypted communication over HTTP.
Port 443 is used for encrypted communication over HTTPS.
Q136. Defrance between String and String Buffer?
String is immutable, String Buffer is mutable.
String is immutable, meaning its value cannot be changed once it is created.
String Buffer is mutable, meaning its value can be changed after it is created.
String is faster and more memory efficient for simple string operations.
String Buffer is slower but more efficient for operations that require frequent modifications.
Q137. What is funds risk
Funds risk refers to the potential for financial loss in an investment due to market fluctuations or other factors.
Funds risk is the possibility of losing money on an investment.
It can be caused by market volatility, economic factors, or specific risks related to the investment.
Investors often assess funds risk before making investment decisions to determine their risk tolerance.
Examples of funds risk include market risk, credit risk, and liquidity risk.
Q138. Explain Aws and brefi
AWS is a cloud computing platform that provides a wide range of services for building and deploying applications.
AWS offers services such as compute, storage, databases, and more
It allows users to easily scale their applications and pay only for what they use
Brefi is a serverless PHP runtime for AWS Lambda
Q139. WHAT IS VPN, why it used
VPN stands for Virtual Private Network. It is used to create a secure and private connection over a public network.
VPN encrypts internet traffic to protect data from hackers and cybercriminals
It allows users to access restricted content and websites
VPN can be used to bypass internet censorship and surveillance
It is commonly used by remote workers to access company resources securely
Examples of VPN services include NordVPN, ExpressVPN, and CyberGhost
Q140. S3 name unique or nonuniqe
S3 bucket names are globally unique.
S3 bucket names must be unique across all AWS accounts.
Bucket names can contain lowercase letters, numbers, and hyphens.
Bucket names cannot contain underscores, uppercase letters, or periods.
Example of a valid bucket name: my-bucket-123
Example of an invalid bucket name: My_Bucket
Q141. Difference between tuple and list and coding
Tuple is immutable, ordered collection while list is mutable, ordered collection in Python.
Tuple is created using parentheses () while list is created using square brackets []
Tuple elements cannot be changed once assigned while list elements can be modified
Tuple is faster than list for iteration and accessing elements
Example: tuple = (1, 2, 3) and list = [1, 2, 3]
Q142. Which version of talend you are using
I am using Talend version 7.3.1 for ETL development.
I am currently using Talend version 7.3.1 for ETL development.
The specific version of Talend being used is 7.3.1.
Talend 7.3.1 offers various features and improvements for ETL processes.
Q143. Limitations of selenium?
Selenium has limitations in handling non-web-based applications and requires technical expertise for maintenance.
Selenium cannot automate desktop applications or mobile applications
It cannot handle CAPTCHA and reCAPTCHA challenges
Selenium requires technical expertise for maintenance and updates
It cannot handle complex dynamic web pages
Selenium does not have built-in reporting capabilities
Q144. How do you calculate date in excel
Q145. What the **** was HCL?
HCL is a multinational IT services company headquartered in India.
HCL Technologies is a leading global IT services company.
It was founded in 1976 and is headquartered in Noida, India.
HCL offers a wide range of services including IT consulting, enterprise transformation, remote infrastructure management, engineering and R&D services, and business process outsourcing.
The company has a presence in over 40 countries and serves clients in various industries such as healthcare, fin...read more
Q146. Future goals for carrier and knowledge towards IT
My future goal is to advance my career in IT by gaining more knowledge and expertise in emerging technologies.
Continue pursuing certifications and training in relevant IT fields
Stay updated on industry trends and advancements
Seek opportunities for hands-on experience with new technologies
Network with professionals in the IT industry to learn from their experiences
Q147. How to handle Exception
Exceptions can be handled using try-catch blocks to gracefully manage errors in code execution.
Use try-catch blocks to catch exceptions and handle them gracefully
Use specific catch blocks for different types of exceptions
Use finally block to execute code regardless of whether an exception is thrown
Throw custom exceptions when necessary to provide more context
Use logging to track and debug exceptions
Q148. What is v look up and h lookup
VLOOKUP and HLOOKUP are functions in Excel used to search for a value in a table and return a corresponding value.
VLOOKUP stands for vertical lookup and is used to search for a value in the leftmost column of a table and return a value in the same row from a specified column.
HLOOKUP stands for horizontal lookup and is used to search for a value in the top row of a table and return a value in the same column from a specified row.
Both functions are commonly used for data analys...read more
Q149. Types of funtions
Functions in programming are blocks of code that perform a specific task. They can be reusable and help in organizing code.
Functions can be categorized as built-in functions or user-defined functions.
Built-in functions are provided by the programming language and can be directly used.
User-defined functions are created by the programmer to perform specific tasks.
Functions can have parameters and return values.
Examples of functions include Math.sqrt() in JavaScript and print() ...read more
Q150. Find element,Find children output
Find element activity is used to locate a single UI element on the screen. Find children activity is used to find multiple child elements of a specified parent element.
Find element activity is used to locate a single UI element on the screen based on the selector provided.
Find children activity is used to find multiple child elements of a specified parent element based on the selector provided.
Output of Find element activity is a UiElement variable containing information abou...read more
Q151. Describe about a topic
The topic is about artificial intelligence in healthcare.
Artificial intelligence (AI) is revolutionizing the healthcare industry by improving diagnosis accuracy and treatment outcomes.
AI algorithms can analyze large amounts of medical data to identify patterns and predict patient outcomes.
Examples include IBM Watson Health using AI to assist doctors in diagnosing and treating cancer patients.
AI-powered chatbots are also being used to provide personalized healthcare recommenda...read more
Q152. What is const pointer
A const pointer is a pointer that points to a constant value and cannot be used to modify the value it points to.
A const pointer is declared using the 'const' keyword before the pointer type.
Example: const int *ptr; // pointer to a constant integer value
The value pointed to by a const pointer cannot be modified.
Example: *ptr = 10; // This will result in a compilation error
Q153. What is pointer to constant
Pointer to constant is a pointer that points to a constant value, meaning the value cannot be changed through the pointer.
Pointer to constant is declared using 'const' keyword before the data type.
The value pointed to by a pointer to constant cannot be modified.
Example: const int *ptr; // Pointer to constant integer
Q154. what is go routines
Goroutines are lightweight threads managed by the Go runtime, allowing concurrent execution of functions.
Goroutines are created using the 'go' keyword followed by a function call.
They are multiplexed onto multiple OS threads by the Go runtime.
Goroutines communicate using channels to share data safely.
Q155. How does revenue recognition work
Revenue recognition is the process of recording revenue in a company's financial statements when it is earned.
Revenue is recognized when it is realized or realizable and earned, regardless of when cash is received.
It involves determining the amount of revenue to record and when to record it.
Different industries may have specific guidelines for revenue recognition, such as the percentage-of-completion method for construction projects.
Revenue recognition is important for accura...read more
Q156. Wht is php? Need of php?
PHP is a server-side scripting language used for web development.
PHP stands for Hypertext Preprocessor.
It is an open-source language.
PHP is used to create dynamic web pages.
It can interact with databases like MySQL.
PHP is easy to learn and widely used in web development.
Popular CMS like WordPress, Drupal, and Joomla are built on PHP.
Q157. Commonly used network device
Router is a commonly used network device.
Connects multiple devices to a network
Routes data packets between networks
Provides security features like firewall and VPN
Examples: Cisco, Netgear, TP-Link
Q158. Find Fibonacci sequence?
Fibonacci sequence is a series of numbers where each number is the sum of the two preceding ones.
The sequence starts with 0 and 1, and each subsequent number is the sum of the previous two numbers.
The first ten numbers in the Fibonacci sequence are: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34.
The Fibonacci sequence has many applications in mathematics, science, and nature.
Q159. Diff. Between P2P and OTC process
P2P involves procurement of goods/services, while OTC involves sale of goods/services.
P2P stands for Procure-to-Pay process where goods/services are purchased.
OTC stands for Order-to-Cash process where goods/services are sold.
P2P involves activities like requisition, purchase order, goods receipt, invoice processing, and payment.
OTC involves activities like order entry, order fulfillment, shipping, invoicing, and payment collection.
Example: Amazon follows OTC process when a c...read more
Q160. Assign a remote coding assessment
Assign a remote coding assessment
Clearly define the problem statement and requirements
Provide a set of input/output examples for testing
Specify the programming language and any constraints
Set a time limit for completion
Include instructions for submission and evaluation
Q161. What is python
Python is a high-level, interpreted programming language known for its simplicity, readability, and versatility.
Python is used for web development, data analysis, artificial intelligence, and more.
It has a large standard library and supports multiple programming paradigms.
Python code is often shorter and easier to read than other languages.
It uses indentation to indicate code blocks instead of curly braces or keywords.
Python is open-source and has a strong community of develo...read more
Q162. What is constructor
A constructor is a special method that is used to initialize objects of a class.
Constructors have the same name as the class they belong to.
They are called automatically when an object is created.
They can be used to set initial values for object properties.
Constructors can be overloaded to accept different parameters.
Example: public class Car { public Car() { // constructor code here } }
Q163. What is network?
A network is a collection of computers, servers, mainframes, network devices, and other devices connected to one another to share data and resources.
Networks can be classified based on their size (LAN, WAN, MAN)
They can be wired or wireless
Common network devices include routers, switches, and firewalls
Examples of networks include the internet, intranets, and extranets
Q164. What is rehost in windchill
Rehost in Windchill refers to the process of moving a Windchill system from one server to another.
Rehosting involves transferring all data, configurations, and customizations to the new server.
It is important to ensure that all dependencies and integrations are properly migrated during the rehosting process.
Rehosting may require downtime for the Windchill system to be moved and reconfigured.
Examples of rehosting in Windchill include upgrading server hardware or moving to a cl...read more
Q165. What is meant by bpo
BPO stands for Business Process Outsourcing.
BPO involves contracting out specific business functions to a third-party service provider.
These functions can include customer service, technical support, accounting, and data entry.
BPO is often used by companies to reduce costs and improve efficiency.
Examples of BPO companies include Accenture, IBM, and Infosys.
Q166. Treatment of pfbd
Treatment of pfbd involves a combination of medication, therapy, and lifestyle changes.
Medication may include antidepressants or anti-anxiety medications prescribed by a doctor.
Therapy such as cognitive behavioral therapy (CBT) can help individuals learn coping mechanisms and address underlying issues.
Lifestyle changes like regular exercise, healthy diet, and stress management techniques can also be beneficial.
Support groups or counseling can provide additional support and gu...read more
Q167. Future plans why engineering
I am passionate about solving complex problems and creating innovative solutions through engineering.
Engineering allows me to apply my analytical and problem-solving skills to real-world challenges.
I am excited about the potential to make a positive impact on society through technological advancements.
I have a strong interest in [insert specific field of engineering], and I am eager to contribute to its development.
Engineering offers a diverse range of career opportunities, f...read more
Q168. Layout terminology used in VLSI
Layout terminology in VLSI refers to the terms used to describe the physical design of integrated circuits.
Metal layer: used for interconnections between components
Via: connects different metal layers
Poly layer: used for creating transistors and other active components
Well: region of silicon with specific electrical properties
DRC (Design Rule Check): ensures layout meets manufacturing requirements
Q169. Definition of accounting
Accounting is the process of recording, classifying, and summarizing financial transactions to provide information that is useful in making business decisions.
Accounting involves recording financial transactions such as sales, purchases, and payments.
It also involves classifying these transactions into categories such as assets, liabilities, and equity.
Finally, accounting involves summarizing this information in financial statements such as balance sheets and income statement...read more
Q170. What are Job Specifications
Q171. difference between goroot and gopath
GOROOT is the root directory where Go is installed, while GOPATH is the workspace directory where Go projects are stored.
GOROOT is where Go's standard library and tools are located
GOPATH is where your own Go projects and their dependencies are stored
You can have multiple GOPATHs to organize different projects
Q172. What is ur strength
My strength lies in my excellent communication skills, ability to multitask, and problem-solving capabilities.
Excellent communication skills - able to effectively convey information and listen actively
Ability to multitask - can handle multiple tasks simultaneously without compromising quality
Problem-solving capabilities - adept at analyzing situations and finding practical solutions
Q173. What is ur weakness
I tend to be overly critical of my own work, which can sometimes lead to perfectionism.
I have a tendency to overanalyze my work and strive for perfection
I can be too self-critical at times
I am working on finding a balance between striving for excellence and accepting imperfections
Q174. What is campishing?
Campishing is a term used to describe the act of campaigning for a political candidate or cause while camping.
Campishing involves combining outdoor activities like camping with political campaigning.
It is a way for candidates or activists to engage with voters in a more relaxed and informal setting.
Campishing events may include activities such as hiking, bonfires, and group discussions.
Candidates can use campishing to build personal connections with voters and showcase their ...read more
Q175. What is CCNA, router
CCNA stands for Cisco Certified Network Associate, a certification for networking professionals. A router is a networking device that forwards data packets between computer networks.
CCNA is a certification offered by Cisco for networking professionals
It covers topics such as network fundamentals, LAN switching technologies, routing technologies, and more
A router is a networking device that forwards data packets between computer networks
Routers operate at the network layer of ...read more
Q176. Ur likes and dislikes
I enjoy reading, hiking, and trying new foods. I dislike loud noises and rude people.
Likes: reading, hiking, trying new foods
Dislikes: loud noises, rude people
Q177. Define oscillation?
Oscillation is a repetitive variation, typically in a wave-like pattern.
Oscillation refers to the repetitive movement or fluctuation around a central point.
It can be seen in various phenomena such as pendulum swings, sound waves, and electronic signals.
The frequency, amplitude, and phase are important characteristics of oscillation.
Oscillation can be described mathematically using trigonometric functions like sine and cosine.
Q178. project and its briefing
The project involves designing and implementing a new electrical system for a commercial building.
The project requires understanding the electrical needs of the building
Researching and selecting appropriate electrical components and equipment
Creating a detailed design plan and layout for the electrical system
Collaborating with architects and engineers to ensure the system meets building codes and safety standards
Overseeing the installation and testing of the electrical system
Q179. Name self introduced
I am a dedicated and hardworking Electrical GET with a passion for problem-solving and innovation.
Graduated with a degree in Electrical Engineering
Completed internships at XYZ Company and ABC Corporation
Proficient in CAD software and circuit design
Strong communication and teamwork skills
Passionate about renewable energy and sustainability
Top HR Questions asked in Jio
Interview Process at Jio
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month