Premium Employer

HCLTech

3.6
based on 33.6k Reviews
Filter interviews by

80+ Interview Questions and Answers

Updated 11 Dec 2024
Popular Designations

Q1. Which BGP path attributes are used to manipulate the ingress traffic and how traffic is transit from one AS to another AS via 3rd AS?

Ans.

BGP path attributes used to manipulate ingress traffic and transit via 3rd AS.

  • AS Path attribute is used to manipulate ingress traffic by adding or removing AS numbers.

  • Local Preference attribute is used to influence the path selection within the same AS.

  • MED (Multi-Exit Discriminator) attribute is used to influence the path selection between different ASes.

  • Communities attribute is used to tag routes and influence the path selection in a specific way.

  • Transit traffic via 3rd AS c...read more

View 1 answer

Q2. What is VTep? Explain the VLan data encapsulated with VXLAN header and fields used in it?

Ans.

VTep is a virtual tunnel endpoint used in VXLAN to extend Layer 2 networks over Layer 3 networks.

  • VTep is a software-based endpoint that terminates VXLAN tunnels.

  • It is used to extend Layer 2 networks over Layer 3 networks.

  • VXLAN header encapsulates the original Ethernet frame and adds a 24-bit VXLAN Network Identifier (VNI) to identify the virtual network.

  • The VLAN data is encapsulated with VXLAN header and fields like VNI, flags, and reserved bits are used in it.

Add your answer

Q3. What is VSL in Vss, explain the mechanism and role in VSS?

Ans.

VSL is the voltage at which the substrate current becomes zero in VSS.

  • VSL is the voltage at which the substrate current becomes zero in VSS.

  • It is the minimum voltage required to maintain a zero substrate current.

  • VSL is important in VSS as it helps in reducing the leakage current.

  • It is achieved by applying a negative voltage to the substrate.

  • VSL is typically set to -0.5V or -1.0V in modern CMOS processes.

Add your answer

Q4. Which route will be priority ospf or ebgp? If we wish ospf as best route how can this achieved?

Ans.

OSPF should be priority over eBGP. Achieve this by manipulating administrative distance or metric.

  • OSPF should be preferred over eBGP as it is an interior gateway protocol while eBGP is an exterior gateway protocol

  • Manipulate administrative distance to make OSPF preferred over eBGP

  • Manipulate metric to make OSPF preferred over eBGP

  • Use route maps to manipulate the preference of OSPF over eBGP

  • Example: set the administrative distance of OSPF to a lower value than eBGP

  • Example: incre...read more

Add your answer
Discover null interview dos and don'ts from real experiences

Q5. What is VDC? relationship between Supervisor and VDC?

Ans.

VDC stands for Virtual Design and Construction. Supervisor oversees VDC process.

  • VDC is a process of creating a digital model of a construction project before it is built.

  • It helps in identifying and resolving potential issues before construction begins.

  • Supervisor oversees the VDC process to ensure that the digital model is accurate and meets the project requirements.

  • VDC can also help in improving communication and collaboration among different stakeholders involved in the proj...read more

Add your answer

Q6. What os BGP community? What ips role of BGP communities?

Ans.

BGP community is a way to tag routes with additional information. It helps in controlling the flow of traffic.

  • BGP community is a 32-bit number that can be attached to a route advertisement.

  • It is used to tag routes with additional information.

  • It helps in controlling the flow of traffic by allowing network administrators to manipulate the way BGP routes are propagated and selected.

  • BGP communities can be used to implement policies such as traffic engineering, route filtering, an...read more

Add your answer
Are these interview questions helpful?

Q7. Define EPG ? Why contract ios used for EPG communication?

Ans.

EPG is Electronic Program Guide used for TV listings. Contract iOS is used for EPG communication due to its reliability and security.

  • EPG is a digital guide that provides information about TV programs and schedules.

  • Contract iOS is a secure and reliable way to communicate EPG data between devices.

  • EPG data can be accessed through set-top boxes, smart TVs, and mobile apps.

  • EPG data includes program titles, descriptions, start and end times, and channel information.

Add your answer

Q8. How many handshakes will be there in a party with 30 members , everyone is required to handshake every person, no repeat handshakes will be there.

Ans.

The number of handshakes in a party with 30 members where each person shakes hands with every other person once.

  • Calculate the total number of handshakes using the formula n(n-1)/2, where n is the number of people.

  • Substitute n=30 in the formula to get the total number of handshakes.

  • Total handshakes = 30(30-1)/2 = 435 handshakes.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is MLAG? Difference between LACP & PAGP?

Ans.

MLAG is a protocol used for creating a loop-free network topology. LACP and PAGP are link aggregation protocols.

  • MLAG stands for Multi-Chassis Link Aggregation Group.

  • It allows multiple switches to appear as a single logical switch to the connected devices.

  • LACP (Link Aggregation Control Protocol) is an IEEE standard protocol used for link aggregation.

  • PAGP (Port Aggregation Protocol) is a Cisco proprietary protocol used for link aggregation.

  • Both LACP and PAGP are used to bundle ...read more

Add your answer

Q10. Find number which repeating first with linear complexity.

Ans.

Finding repeating number with linear complexity.

  • Use Floyd's cycle-finding algorithm to detect the cycle in the sequence.

  • Maintain two pointers, one moving at a rate of one step and the other at a rate of two steps.

  • When they meet, move one pointer to the start and keep the other pointer at the meeting point.

  • Move both pointers at a rate of one step until they meet again, which is the start of the cycle.

  • The number at the start of the cycle is the repeating number.

Add your answer

Q11. Nexus 9K hardware models used in Leaf and spine architecture?

Ans.

Nexus 9K hardware models used in Leaf and spine architecture.

  • Nexus 9372PX and 9372TX used as leaf switches

  • Nexus 9504, 9508, and 9516 used as spine switches

  • Nexus 93108TC-EX and 93180YC-EX also used as leaf switches

  • All models support VXLAN and ACI

  • Highly scalable and flexible architecture

Add your answer

Q12. What functionalities have you worked as an AEM and java developer?

Ans.

I have worked on developing custom components, templates, workflows, and integrating third-party systems in AEM. In Java, I have worked on backend development, RESTful services, and database interactions.

  • Developed custom components and templates in AEM

  • Implemented workflows for content approval processes

  • Integrated third-party systems with AEM

  • Backend development in Java

  • Created RESTful services

  • Worked on database interactions

Add your answer

Q13. Whether I have knowledge on PLM tools or not?

Ans.

Yes, I have knowledge on PLM tools.

  • I have experience working with PLM tools such as Teamcenter and Windchill.

  • I have used PLM tools to manage product data, collaborate with cross-functional teams, and track project progress.

  • I am familiar with PLM concepts such as BOM management, change management, and version control.

  • I have also worked on customizing PLM tools to meet specific business requirements.

  • Overall, my experience with PLM tools has helped me streamline product developm...read more

Add your answer

Q14. How many matches will occur if there are 20 teams and each match is knock out match.

Ans.

There will be 19 matches in total in a knock out tournament with 20 teams.

  • In a knock out tournament, each match eliminates one team.

  • To determine the number of matches, subtract 1 from the total number of teams.

  • For 20 teams, there will be 20 - 1 = 19 matches.

Add your answer

Q15. What is L3 fabric? What is COOP?

Ans.

L3 fabric is a network architecture that provides high-speed and low-latency connectivity between devices. COOP is a protocol used for failover and redundancy in networking.

  • L3 fabric is a type of network architecture that uses Layer 3 routing to provide high-speed and low-latency connectivity between devices.

  • It is designed to be scalable and flexible, allowing for easy expansion and modification of the network.

  • COOP (Cluster Over the Wire Protocol) is a protocol used for failo...read more

Add your answer

Q16. Leaf and spine architecture in Cisco ACI?

Ans.

Leaf and spine architecture is a network topology used in Cisco ACI for scalable and efficient data center networking.

  • Leaf switches connect to spine switches, which then connect to the core network.

  • Leaf switches handle traffic within their own pod, while spine switches handle traffic between pods.

  • ACI uses a 2-tier spine-leaf architecture for scalability and flexibility.

  • The spine switches act as the routing backbone, while the leaf switches provide access to endpoints.

  • ACI allo...read more

Add your answer

Q17. Prepare sets, list and dictionary from a given list.

Ans.

Creating sets, lists, and dictionaries from a given list.

  • To create a set, use the set() function.

  • To create a list, simply use square brackets [] and separate elements with commas.

  • To create a dictionary, use curly braces {} and separate key-value pairs with colons and commas.

Add your answer

Q18. What is DOE and how you applied DOE in your work

Ans.

DOE stands for Design of Experiments. It is a statistical method used to optimize processes and products.

  • DOE involves creating a plan for conducting experiments to identify the factors that affect a process or product

  • It helps in determining the optimal settings for these factors to achieve the desired outcome

  • I have applied DOE in my work by designing experiments to optimize the performance of a manufacturing process

  • For example, I used DOE to identify the optimal temperature a...read more

Add your answer

Q19. 1.Count number of occurrences from an unsorted array and from linklist.

Ans.

Count occurrences in unsorted array and linked list

  • For unsorted array, use a hash table to store the count of each element

  • For linked list, traverse the list and use a hash table to store the count of each element

  • Alternatively, for linked list, use two nested loops to compare each element with all other elements and count the occurrences

Add your answer

Q20. Write a program to convert values (int, float) to string?

Ans.

Program to convert int and float values to string.

  • Use str() function to convert int and float values to string.

  • Pass the value as an argument to the str() function.

  • The output will be a string representation of the input value.

Add your answer

Q21. Write a program for 1st lowest and 2nd lowest program in arrays

Ans.

Program to find 1st and 2nd lowest numbers in an array of strings

  • Convert array of strings to array of integers

  • Sort the array in ascending order

  • Return the first and second elements of the sorted array

Add your answer

Q22. Administrative distances value of IGPs?

Ans.

Administrative distances are values used by IGPs to determine the best path for routing.

  • Administrative distances are used to determine the trustworthiness of routing information received from different sources.

  • Lower administrative distances are preferred over higher ones.

  • Examples of IGPs and their default administrative distances include OSPF (110), IS-IS (115), and RIP (120).

Add your answer

Q23. Missing and repeating numbers in O(n) , add two numbers using linked list etc.

Ans.

The question is about finding missing and repeating numbers in an array and adding two numbers using linked lists.

  • To find missing and repeating numbers in an array, use a hash set to track the occurrence of each number.

  • To add two numbers using linked lists, traverse both lists simultaneously and keep track of carry.

  • Remember to handle edge cases like different lengths of linked lists or a carry at the end.

Add your answer

Q24. 2. Difference between local Static and global static

Ans.

Local static is limited to a function or block, while global static is accessible throughout the program.

  • Local static variables are initialized only once and retain their value between function calls.

  • Global static variables are initialized to zero by default and can be accessed by any function in the program.

  • Local static variables are useful for maintaining state between function calls.

  • Global static variables can be used for sharing data between functions or modules.

  • Local sta...read more

Add your answer

Q25. How to handle the customized exception

Ans.

Customized exceptions can be handled by creating a custom exception class and handling it using try-catch blocks.

  • Create a custom exception class that extends the Exception class

  • Throw the custom exception using the throw keyword

  • Handle the custom exception using try-catch blocks

  • Provide meaningful error messages in the custom exception class

  • Use logging to track the occurrence of the custom exception

Add your answer

Q26. Pneumatic solenoid valve double and single acting working principle

Ans.

Pneumatic solenoid valves control the flow of air in pneumatic systems using electromagnetic principles.

  • Pneumatic solenoid valves are used to control the flow of air in pneumatic systems by opening and closing the valve based on electrical signals.

  • Double-acting solenoid valves use air pressure to both open and close the valve, while single-acting solenoid valves use air pressure to open the valve and a spring to close it.

  • Double-acting solenoid valves are typically faster in r...read more

Add your answer

Q27. What is DI in .Net Core

Ans.

DI stands for Dependency Injection in .Net Core.

  • DI is a design pattern used to achieve loose coupling between objects.

  • It allows for easier testing and maintenance of code.

  • In .Net Core, DI is implemented through the built-in service container.

  • Services can be registered and injected into classes using constructor injection.

  • Example: services.AddScoped();

  • Example: public MyClass(IMyService myService) { }

Add your answer

Q28. Manufacturing processes of sheetmeral

Ans.

Sheet metal manufacturing involves cutting, bending, and shaping metal sheets to create various products.

  • Sheet metal can be cut using various methods such as laser cutting, plasma cutting, or waterjet cutting.

  • Bending can be done using press brakes or rollers.

  • Shaping can be achieved through processes like stamping, punching, or deep drawing.

  • Welding is often used to join multiple sheet metal pieces together.

  • Finishing processes like painting, powder coating, or anodizing can be ...read more

Add your answer

Q29. VR testing how its done and what is the future

Ans.

VR testing involves creating virtual environments to test software and hardware performance. The future of VR testing includes advancements in realism and automation.

  • VR testing involves creating virtual environments to simulate real-world scenarios for testing software and hardware performance.

  • Testers use VR headsets and controllers to interact with the virtual environment and identify any issues or bugs.

  • The future of VR testing includes advancements in realism, such as more ...read more

Add your answer

Q30. Bitwise manipulation. Finding whether a byte has 0's or 1's?

Ans.

To find if a byte has 0's or 1's, use bitwise AND operator with a byte containing all 1's.

  • Create a byte with all 1's using 0xFF or 0b11111111

  • Perform a bitwise AND operation with the byte to check for 0's or 1's

  • If the result is 0, the byte has all 0's. If it is not 0, it has at least one 1.

Add your answer

Q31. LDO circuits and its features..?

Ans.

LDO circuits are low-dropout voltage regulators that provide a stable output voltage with low input-output voltage differential.

  • LDO circuits are commonly used in battery-powered devices and other low-power applications.

  • They have a simple design and are easy to use.

  • LDO circuits have a low dropout voltage, which means they can regulate the output voltage even when the input voltage is close to the output voltage.

  • They have a high power-supply rejection ratio (PSRR), which means ...read more

Add your answer

Q32. Difference between procedure and functions

Ans.

Procedures and functions are both subroutines, but functions return a value while procedures do not.

  • Functions return a value while procedures do not

  • Functions can be used in expressions while procedures cannot

  • Functions can have parameters passed by value or reference while procedures can only have parameters passed by reference

  • Examples of functions include mathematical operations like addition and subtraction, while examples of procedures include printing to the console or upd...read more

Add your answer

Q33. Write a program for recursion ?

Ans.

Recursion is a programming technique where a function calls itself to solve a problem.

  • Identify the base case and recursive case

  • Ensure the recursive case moves towards the base case

  • Use a termination condition to avoid infinite recursion

  • Examples: factorial, Fibonacci sequence, binary search

View 1 answer

Q34. 4. Linklist program or sorting in linklist.

Ans.

Linklist program or sorting in linklist.

  • For linklist program, create a Node class with data and next pointer

  • Implement methods to add, delete, and traverse the linklist

  • For sorting, use any sorting algorithm like bubble sort or merge sort

  • Traverse the linklist and swap the nodes based on sorting criteria

Add your answer

Q35. Why need for check constrain

Ans.

Check constraints ensure data integrity by limiting the values that can be inserted into a database table.

  • Check constraints are used to enforce business rules or data validation rules.

  • They prevent invalid data from being inserted into a table.

  • For example, a check constraint can ensure that a date column only contains dates in the future.

  • Check constraints can also be used to limit the range of values that can be inserted into a column.

  • For example, a check constraint can ensure...read more

Add your answer

Q36. What is OOPS?

Ans.

OOPS stands for Object-Oriented Programming System.

  • OOPS is a programming paradigm that focuses on objects and their interactions.

  • It involves encapsulation, inheritance, and polymorphism.

  • Encapsulation is the process of hiding implementation details from the user.

  • Inheritance allows a class to inherit properties and methods from another class.

  • Polymorphism allows objects to take on multiple forms or behaviors.

  • Examples of OOPS languages include Java, C++, and Python.

View 2 more answers

Q37. What is storage classes In c ?

Ans.

Storage classes in C define the scope and lifetime of variables.

  • There are four storage classes in C: auto, register, static, and extern.

  • Auto storage class is the default storage class for all local variables.

  • Register storage class is used to define local variables that should be stored in a register for faster access.

  • Static storage class is used to define local variables that retain their value between function calls.

  • Extern storage class is used to declare variables that are ...read more

Add your answer

Q38. Stress Strain diagram for steel and aluminium

Ans.

Stress strain diagrams show the relationship between stress and strain in materials like steel and aluminum.

  • Stress strain diagrams for steel typically show a linear elastic region followed by a plastic region before failure.

  • Aluminum stress strain diagrams may exhibit more ductility compared to steel.

  • The ultimate tensile strength and yield strength can be determined from these diagrams for both materials.

Add your answer

Q39. Voltage divider network design..?

Ans.

A voltage divider network is a circuit that divides a voltage into smaller parts.

  • Consists of two resistors in series

  • Output voltage is a fraction of input voltage

  • Used in various applications such as level shifting and biasing

  • Formula for output voltage is Vout = Vin * (R2 / (R1 + R2))

Add your answer

Q40. how to toggle a particular bit ?

Ans.

To toggle a particular bit, you can use bitwise XOR operation with 1.

  • Use bitwise XOR operation with 1 to toggle a particular bit.

  • For example, to toggle the 3rd bit of a number 'num', you can do: num ^= (1 << 2).

Add your answer

Q41. Waveforms for comparator circuit..??

Ans.

Waveforms for comparator circuit

  • Comparator circuit compares two input voltages and outputs a digital signal based on the comparison

  • Waveform for input voltage can be a sine wave, square wave, or any other periodic waveform

  • Waveform for output signal is a square wave with a high or low voltage depending on the comparison result

Add your answer

Q42. What is the meaning of engineering?

Ans.

Engineering is the application of scientific and mathematical principles to design, build, and maintain structures, machines, and systems.

  • Engineering involves problem-solving and innovation

  • It requires a deep understanding of math, science, and technology

  • Engineers design and build everything from bridges to software

  • They work in a variety of fields, including aerospace, civil, electrical, and mechanical engineering

  • Engineering is essential for improving our quality of life and a...read more

Add your answer

Q43. 3. What is Volatile ??

Ans.

Volatile refers to a type of memory that loses its stored data when power is turned off.

  • Volatile memory is used for temporary storage of data that needs to be quickly accessed and modified.

  • Examples of volatile memory include RAM and cache memory.

  • Non-volatile memory, on the other hand, retains its stored data even when power is turned off, such as ROM and flash memory.

Add your answer

Q44. Why we have to do Validation

Ans.

Validation ensures that a product or system meets the specified requirements and functions correctly.

  • Validation helps to identify and correct errors or defects in a product or system.

  • It ensures that the product or system meets the customer's needs and expectations.

  • Validation helps to reduce the risk of failure or malfunction of the product or system.

  • It is important for regulatory compliance in certain industries such as medical devices and pharmaceuticals.

  • Examples of validati...read more

Add your answer

Q45. Write a program for string reverse?

Ans.

Program to reverse an array of strings

  • Iterate through each string in the array and reverse it using built-in functions or by swapping characters

  • Use a temporary variable to store the reversed string before updating the original string

  • Ensure to handle edge cases like empty strings or null values

Add your answer

Q46. What is Routing in mvc.

Ans.

Routing in MVC is the process of mapping incoming requests to the appropriate controller and action.

  • Routing is responsible for determining which controller and action should handle a particular request.

  • Routes are defined in the RouteConfig.cs file in the App_Start folder.

  • Routes can be customized to include parameters and constraints.

  • Example: {controller}/{action}/{id} maps to HomeController.Index(5) when the URL is /Home/Index/5

  • Routing can also be used to create friendly URLs...read more

Add your answer

Q47. explain basic user interfaces in aem?

Ans.

Basic user interfaces in AEM include authoring interface, touch-optimized UI, and classic UI.

  • Authoring interface allows content authors to create and manage content easily.

  • Touch-optimized UI is designed for mobile devices and provides a responsive design.

  • Classic UI is the older interface that is still available for certain functionalities.

  • Components like sidekick, toolbar, and console are common elements in AEM user interfaces.

Add your answer

Q48. Critical bug faced in your application?

Ans.

Encountered critical bug related to data corruption during database migration.

  • Bug occurred during migration of data from old database to new database.

  • Data corruption was caused by mismatch in data types between old and new database.

  • Implemented data validation checks and fixed data type mismatches to resolve the bug.

Add your answer

Q49. What is Object Slicing?

Ans.

Object slicing is when a derived class object is assigned to a base class object, resulting in loss of derived class attributes.

  • Object slicing occurs when a derived class object is assigned to a base class object.

  • The result is the loss of derived class attributes.

  • This happens because the base class object can only hold the attributes of the base class.

  • Example: class Base { int x; }; class Derived : public Base { int y; }; Derived d; Base b = d; // Object slicing occurs here

Add your answer

Q50. What is malloc pointer?

Ans.

malloc pointer is a function in C programming used to dynamically allocate memory.

  • malloc pointer is used to allocate memory during runtime in C programming.

  • It returns a pointer to the allocated memory.

  • Example: int *ptr = (int*)malloc(10 * sizeof(int));

Add your answer

Q51. What is ACL protocol?

Ans.

ACL protocol stands for Access Control List protocol, used to control access to network resources by defining rules for allowing or denying traffic.

  • ACL protocol is commonly used in networking to restrict access to certain resources based on defined rules.

  • ACLs can be configured on routers, switches, and firewalls to control traffic flow.

  • ACLs can be configured based on source/destination IP addresses, ports, protocols, etc.

  • Example: In a network, an ACL can be set up to block al...read more

Add your answer

Q52. DFMEA is design failure mode effective analysis

Ans.

DFMEA is a methodical approach to identifying and addressing potential failure modes in the design stage of a product or process.

  • DFMEA helps in identifying potential failure modes, their effects, and causes in the design stage.

  • It prioritizes the failure modes based on their severity, occurrence, and detectability.

  • DFMEA aims to prevent failures before they occur by implementing design changes or controls.

  • Examples of failure modes could include component malfunctions, material ...read more

Add your answer

Q53. Write a program to get Pi value ?

Ans.

Program to get Pi value

  • Use a mathematical formula to calculate Pi, such as the Leibniz formula or the Nilakantha series

  • Alternatively, use a built-in function in a programming language, such as math.pi in Python

  • The more iterations or terms used in the formula, the more accurate the value of Pi will be

Add your answer

Q54. Resistor wattage calculation.?

Ans.

Resistor wattage calculation involves determining the power rating of a resistor based on its voltage and current ratings.

  • Calculate the power dissipated by the resistor using the formula P = VI

  • Choose a resistor with a wattage rating greater than or equal to the calculated power

  • Consider the ambient temperature and the need for heat dissipation when selecting a resistor

  • Example: A resistor with a voltage rating of 12V and a current rating of 1A would require a wattage rating of ...read more

Add your answer

Q55. MOSFET and BJT difference.?

Ans.

MOSFET and BJT are both types of transistors, but differ in their construction and operation.

  • BJT is a current-controlled device, while MOSFET is a voltage-controlled device.

  • BJT has a higher gain and faster switching speed, while MOSFET has a higher input impedance and lower power consumption.

  • BJT is made of a P-N junction, while MOSFET is made of a metal gate and a semiconductor channel.

  • Examples of BJT include NPN and PNP transistors, while examples of MOSFET include enhanceme...read more

Add your answer

Q56. SMPS design calculation..?

Ans.

SMPS design calculation involves determining the required components and parameters for a switch mode power supply.

  • Determine the input voltage and current requirements

  • Calculate the output voltage and current requirements

  • Select the appropriate switching frequency

  • Choose the type of topology (e.g. buck, boost, flyback)

  • Calculate the duty cycle and choose the switching device

  • Select the inductor, capacitor, and diode based on the calculated parameters

  • Simulate the design and verify ...read more

Add your answer

Q57. Creo software experience

Ans.

I have extensive experience with Creo software, including design, analysis, and simulation.

  • Proficient in 3D modeling and drafting using Creo

  • Experience with finite element analysis (FEA) and computational fluid dynamics (CFD)

  • Familiarity with Creo simulation tools such as Mechanica and Simulate

  • Designed and optimized complex mechanical systems using Creo, such as a robotic arm for industrial applications

Add your answer

Q58. Internal working of hash map

Ans.

A hash map is a data structure that stores key-value pairs using a hash function to map keys to indices in an array.

  • Hash function is used to generate an index for the key in the array

  • Collisions can occur when two keys map to the same index

  • Collision resolution techniques include chaining and open addressing

  • HashMap in Java is an implementation of a hash map

Add your answer

Q59. Otv mechanism?

Ans.

OTV mechanism refers to Orbital Transfer Vehicle mechanism used for transferring payloads from one orbit to another.

  • OTV mechanism is used for transferring payloads from one orbit to another

  • It is commonly used in space missions to transfer payloads between different orbits

  • OTV mechanism can be used to transfer payloads from low Earth orbit to geostationary orbit

  • It is also used for transferring payloads from one planet to another in interplanetary missions

Add your answer

Q60. Need for Design patterns

Ans.

Design patterns provide reusable solutions to common software design problems.

  • Design patterns help improve code readability and maintainability.

  • They provide a common language for developers to communicate and collaborate.

  • Examples include Singleton, Factory, and Observer patterns.

  • Design patterns can also improve performance and scalability.

  • They are especially useful in large and complex software systems.

Add your answer

Q61. Proximity sensor working principle

Ans.

Proximity sensor detects the presence of an object without physical contact.

  • Proximity sensor emits electromagnetic field or infrared radiation

  • Object in proximity reflects or interrupts the field

  • Sensor detects changes in the field and triggers a response

  • Common types include capacitive, inductive, ultrasonic sensors

  • Used in smartphones for screen auto-off during calls

Add your answer

Q62. 3 phase Motor power calculation

Ans.

Calculating power of a 3 phase motor involves multiplying the voltage, current, and square root of 3.

  • Power (P) = Voltage (V) x Current (I) x √3

  • Make sure to use the correct units for voltage and current (usually in volts and amperes)

  • Consider the power factor if provided in the question

  • Example: If voltage is 230V, current is 10A, power factor is 0.8, then P = 230 x 10 x √3 x 0.8

Add your answer

Q63. What is design input?

Ans.

Design input is the initial requirements and specifications for a product or system.

  • Design input is the foundation of the design process

  • It includes customer needs, regulatory requirements, and technical specifications

  • Design input should be clear, concise, and measurable

  • Examples of design input include product size, weight, and performance requirements

Add your answer

Q64. What is Class?

Ans.

A blueprint for creating objects that share common properties and behaviors.

  • Classes are used in object-oriented programming to create objects with similar attributes and methods.

  • They serve as a blueprint for creating objects.

  • Classes can inherit properties and methods from other classes.

  • Examples include a class for creating different types of cars or a class for creating different types of animals.

Add your answer

Q65. Difference between verification and validation

Ans.

Verification ensures that the product is built according to the requirements, while validation ensures that the product meets the customer's needs.

  • Verification checks if the product is built correctly, while validation checks if the right product is built.

  • Verification is a process of evaluating the intermediate work products, while validation is a process of evaluating the final product.

  • Verification is done by developers, while validation is done by testers or customers.

  • Examp...read more

Add your answer

Q66. Explain your test benchsetup?

Ans.

My test bench setup includes hardware components, simulation tools, and test scripts to verify the functionality of the design.

  • Use of FPGA boards for hardware testing

  • Simulation tools like ModelSim for functional verification

  • Test scripts written in languages like Verilog or SystemVerilog

  • Incorporating code coverage analysis tools for thorough testing

Add your answer

Q67. What is Abstraction?

Ans.

Abstraction is the process of hiding complex implementation details and exposing only the necessary information.

  • Abstraction allows us to focus on the essential features of an object or system, without getting bogged down in unnecessary details.

  • It helps to reduce complexity and increase efficiency in software development.

  • For example, a car dashboard abstracts away the complex workings of the engine and presents only the necessary information to the driver.

  • Abstraction can be ac...read more

Add your answer

Q68. FMEA explanation with one example

Ans.

FMEA is a risk assessment tool used to identify and mitigate potential failures in a system or process.

  • FMEA stands for Failure Modes and Effects Analysis

  • It involves identifying potential failure modes, their causes and effects, and ranking them by severity, occurrence, and detectability

  • An example of FMEA is in the automotive industry, where it is used to identify potential failures in a car's braking system

  • By identifying and addressing potential failures before they occur, FM...read more

Add your answer

Q69. What is Design FMEA?

Ans.

Design FMEA is a systematic approach to identify and mitigate potential failures in a product design.

  • FMEA stands for Failure Mode and Effects Analysis

  • It involves identifying potential failure modes, their causes and effects, and ranking them based on severity, occurrence, and detectability

  • The goal is to prioritize and address high-risk failure modes early in the design process

  • Examples include identifying potential safety hazards in a medical device design or potential perform...read more

Add your answer

Q70. What is dfmea and APQP

Ans.

DFMEA stands for Design Failure Mode and Effects Analysis, while APQP stands for Advanced Product Quality Planning.

  • DFMEA is a systematic approach to identifying and preventing potential failures in the design stage of a product or process.

  • APQP is a structured method for developing and introducing new products and processes to ensure customer satisfaction.

  • DFMEA involves analyzing potential failure modes, their effects, and the likelihood of their occurrence.

  • APQP includes activ...read more

Add your answer

Q71. What for inverter used

Ans.

An inverter is a device that converts direct current (DC) to alternating current (AC) for use in electrical systems.

  • Converts DC power to AC power

  • Used in solar power systems to convert DC power from solar panels to AC power for use in homes

  • Commonly used in uninterruptible power supply (UPS) systems to provide backup power during outages

Add your answer

Q72. What is you goal ?

Ans.

My goal is to lead a team of engineers to successfully deliver high-quality projects on time and within budget.

  • Lead a team of engineers to collaborate effectively and efficiently

  • Ensure projects are completed on time and within budget

  • Maintain high quality standards in project deliverables

  • Continuously improve team performance and skills through mentorship and training

Add your answer

Q73. Different between fetch and axios

Ans.

Fetch is a built-in web API in JavaScript for making HTTP requests, while Axios is a popular third-party library for the same purpose.

  • Fetch is built into the browser, while Axios is a standalone library.

  • Axios has built-in support for handling request and response interceptors.

  • Fetch uses Promises for handling responses, while Axios uses Promises as well but also supports async/await syntax.

  • Axios has better error handling and response validation compared to Fetch.

Add your answer

Q74. MCB and MPCB WORKING PRINCIPLE

Ans.

MCB and MPCB are electrical devices used for circuit protection. MCB works based on thermal and magnetic tripping mechanisms, while MPCB includes additional protection features.

  • MCB stands for Miniature Circuit Breaker and MPCB stands for Motor Protection Circuit Breaker.

  • MCB works based on thermal and magnetic tripping mechanisms to protect circuits from overloads and short circuits.

  • MPCB includes additional protection features like phase loss, phase unbalance, and motor overlo...read more

Add your answer

Q75. VFD working principle

Ans.

VFD stands for Variable Frequency Drive, which controls the speed of an AC motor by varying the frequency and voltage of the power supplied to it.

  • VFDs convert fixed frequency AC power to variable frequency power to control motor speed

  • They use semiconductor devices like IGBTs to vary the frequency and voltage

  • VFDs are commonly used in HVAC systems, pumps, and conveyor belts for energy savings and precise control

Add your answer

Q76. AGILE Methodology and principles

Ans.

AGILE is a project management methodology that emphasizes on iterative development and customer collaboration.

  • AGILE focuses on delivering working software frequently

  • It values customer collaboration over contract negotiation

  • AGILE teams are self-organizing and cross-functional

  • It emphasizes on responding to change over following a plan

  • AGILE principles are outlined in the Agile Manifesto

Add your answer

Q77. Explain AFT in detail

Ans.

AFT stands for Accelerated Failure Time, a statistical model used to analyze survival data.

  • AFT is used to estimate the effect of covariates on the survival time of individuals.

  • It assumes that the logarithm of survival time is linearly related to the covariates.

  • AFT models are commonly used in medical research to analyze time-to-event data.

  • Example: AFT model can be used to study the impact of different treatments on the survival time of cancer patients.

Add your answer

Q78. explain technical stack of aem

Ans.

AEM technical stack includes Apache Sling, OSGi framework, JCR repository, and HTL templating language.

  • Apache Sling is used for RESTful web application development

  • OSGi framework provides modularity and extensibility

  • JCR repository stores content in a hierarchical structure

  • HTL templating language is used for creating dynamic web pages

Add your answer

Q79. explain osgi and its lifecycle

Ans.

OSGi is a Java framework for developing and deploying modular software components.

  • OSGi stands for Open Service Gateway Initiative

  • It provides a dynamic module system for Java

  • OSGi bundles are the building blocks of OSGi applications

  • OSGi has a lifecycle with states like installed, resolved, starting, active, stopping, and uninstalled

Add your answer

Q80. Number of reports handled

Ans.

I have experience handling a high volume of reports in my previous roles.

  • Managed and reviewed over 100 reports per week

  • Implemented efficient systems to streamline report processing

  • Trained team members on report handling best practices

Add your answer

Q81. Describe MVC in Rails

Ans.

MVC in Rails is a software design pattern that separates the application into three main components: Model, View, and Controller.

  • Model: Represents the data and business logic of the application

  • View: Represents the user interface of the application

  • Controller: Handles user input, interacts with the model, and updates the view

  • Example: In a Rails application, a User model would handle user data, a Profile view would display user information, and a UsersController would manage use...read more

Add your answer

Q82. Modeling of mouse in cre

Ans.

Modeling of mouse in cre

  • Modeling of mouse in cre refers to creating a computerized representation of a mouse in a specific software environment.

  • This can be used for simulations, testing, or research purposes in various fields such as biology, medicine, or engineering.

  • Examples include using computer-aided design (CAD) software to create a 3D model of a mouse for studying its anatomy or behavior.

  • Another example is using computational fluid dynamics (CFD) software to simulate ai...read more

Add your answer

Q83. Fundamentals of FEA

Ans.

FEA is a numerical method used to analyze the behavior of structures under various loads and conditions.

  • FEA involves dividing a complex structure into smaller, simpler parts called finite elements.

  • Each element is analyzed for its behavior under different loads and conditions.

  • The results are combined to predict the behavior of the entire structure.

  • FEA is used in various industries such as aerospace, automotive, and civil engineering.

  • FEA software such as ANSYS, Abaqus, and COMS...read more

Add your answer

Q84. Process of procurement

Ans.

The process of procurement involves acquiring goods or services from external sources.

  • Identifying the need for procurement

  • Researching potential suppliers

  • Requesting quotes or proposals

  • Negotiating terms and pricing

  • Creating purchase orders

  • Receiving and inspecting goods or services

  • Processing invoices and payments

Add your answer

Q85. Latest UI technologies

Ans.

Latest UI technologies include React, Angular, Vue, and Flutter.

  • React is a popular JavaScript library for building user interfaces.

  • Angular is a TypeScript-based open-source web application framework.

  • Vue is a progressive framework for building user interfaces.

  • Flutter is a mobile app SDK for building high-performance, high-fidelity, apps for iOS and Android.

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 49 interviews in the last 1 year
3 Interview rounds
Technical Round 1
Technical Round 2
HR Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Lead Engineer Interview Questions from Similar Companies

3.5
 • 18 Interview Questions
3.9
 • 11 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter