Add office photos
Employer?
Claim Account for FREE

Honeywell Automation

3.8
based on 1.5k Reviews
Filter interviews by

60+ Inficare Interview Questions and Answers

Updated 22 Oct 2024

Q1. Project Management Question : 1) what is EVM ? how do we monitor projects based on EVM ? 2) Case Study questions : what is project status -> if CPI is greater than 1 or SPI is less than 1 ! 3) How do we calcula...

read more
Ans.

EVM is Earned Value Management, a project management technique to measure project performance and progress.

  • EVM compares the planned value, earned value, and actual cost of a project to determine its status and forecast its completion.

  • CPI greater than 1 indicates the project is under budget, while SPI less than 1 indicates the project is behind schedule.

  • Planned Value is the budgeted cost of the work scheduled to be done, Earned Value is the budgeted cost of the work actually c...read more

Add your answer

Q2. How to handle a situation when the Project manager has agreed to variation order FOC without reading contract

Ans.

Discuss the importance of adhering to contract terms and the potential consequences of agreeing to variations without proper review.

  • Explain the importance of contract terms and the potential legal implications of not adhering to them

  • Highlight the need for project managers to consult the contract before agreeing to any variations

  • Suggest implementing a process where all variations must be reviewed by the contracts manager before approval

  • Provide training to project managers on c...read more

Add your answer

Q3. Planning & Scheduling Questions : 1) what is the Engineering flow for constructing the Oil & Gas or Chemical plant? 2) How much time is required for completing the Engineering activity activities ? 3) How can w...

read more
Ans.

Answers to planning and scheduling questions for Project Control Specialist role in Oil & Gas or Chemical plant construction.

  • 1) Engineering flow for constructing Oil & Gas or Chemical plant includes conceptual design, FEED, detailed engineering, procurement, construction, and commissioning.

  • 2) Time required for completing Engineering activities varies depending on the scope and complexity of the project. It can range from a few months to several years.

  • 3) Time schedule of Engin...read more

Add your answer

Q4. What to we use in primary pump systems if we don't have bypass valve

Ans.

In primary pump systems without a bypass valve, we can use a variable frequency drive (VFD) to control the pump speed.

  • Use a variable frequency drive (VFD) to adjust the speed of the pump based on system demand

  • VFDs can help maintain system pressure and flow without the need for a bypass valve

  • VFDs can also improve energy efficiency by matching pump speed to actual system requirements

Add your answer
Discover Inficare interview dos and don'ts from real experiences

Q5. What is Fire Alarm System.explain working and commesning.

Ans.

A fire alarm system is a network of devices that detect and alert people to the presence of fire.

  • Fire alarm systems consist of smoke detectors, heat detectors, and manual pull stations.

  • When a detector senses smoke or heat, it sends a signal to the control panel.

  • The control panel then activates the alarm and alerts the monitoring station or fire department.

  • Commissioning involves testing the system to ensure it is functioning properly and meets local codes and standards.

Add your answer

Q6. Details of various claims handled in the past for EPC projects.

Ans.

Handled various claims for EPC projects including delay claims, variation claims, and cost overrun claims.

  • Successfully resolved delay claims by analyzing project schedules and identifying critical path delays.

  • Negotiated settlement for variation claims by reviewing contract documents and scope changes.

  • Managed cost overrun claims by tracking project expenses and identifying areas for cost reduction.

  • Implemented strategies to mitigate risks and avoid potential claims in future pr...read more

Add your answer
Are these interview questions helpful?

Q7. What is PLC ? WHAT IS LADDAR LOGIC ? WHAT IS WORKING PRINCIPAL OF RADAR GUAGE FOR LIQUID ? WHAT IS WORKING PRINCIPAL OF DCV ? HOW CAN SWITCH PRIMARY TO STAND BY SERVER ?

Ans.

PLC stands for Programmable Logic Controller. It is a digital computer used for automation of electromechanical processes.

  • PLC is used to control industrial processes and machinery.

  • It uses a programmable memory to store instructions and execute them.

  • PLCs are commonly used in manufacturing, power plants, and transportation systems.

  • They can be programmed using ladder logic, function block diagrams, or structured text.

  • PLCs provide real-time monitoring and control of inputs and ou...read more

View 1 answer

Q8. Example of proactive and reactive contract management

Ans.

Proactive contract management involves anticipating and preventing issues, while reactive contract management involves responding to issues as they arise.

  • Proactive contract management involves setting clear expectations, monitoring performance, and addressing potential issues before they escalate.

  • Reactive contract management involves resolving disputes, renegotiating terms, and mitigating risks after issues have already occurred.

  • Example of proactive contract management: Regul...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Explain the difference between micro kernel and macro kernel

Ans.

Micro kernel is a small kernel that only provides essential services while macro kernel provides all services in the kernel space.

  • Micro kernel provides only essential services while macro kernel provides all services in the kernel space

  • Micro kernel is more secure and reliable than macro kernel

  • Examples of micro kernel-based operating systems are QNX and L4 while examples of macro kernel-based operating systems are Linux and Windows

Add your answer

Q10. What are the types of AHU modes

Ans.

The types of AHU modes include cooling mode, heating mode, and ventilation mode.

  • Cooling mode: AHU cools the air before circulating it throughout the building.

  • Heating mode: AHU heats the air before circulating it throughout the building.

  • Ventilation mode: AHU circulates fresh air throughout the building without heating or cooling.

View 1 answer

Q11. What is the important aspect of a real-time system ?

Ans.

Real-time systems require timely and accurate response to external events.

  • Real-time systems must respond to external events within a specific time frame.

  • Timing constraints must be met to ensure system reliability.

  • Examples include air traffic control systems, medical monitoring devices, and industrial control systems.

Add your answer

Q12. Experience of different building automation systems

Ans.

I have experience working with various building automation systems, including but not limited to Siemens, Honeywell, and Johnson Controls.

  • Experience with Siemens building automation systems

  • Experience with Honeywell building automation systems

  • Experience with Johnson Controls building automation systems

View 1 answer

Q13. How good at problem solving and what are your areas of interes?

Ans.

I am an excellent problem solver with a keen interest in algorithm design and optimization.

  • I enjoy breaking down complex problems into smaller, more manageable components.

  • I have experience in developing efficient algorithms for data processing and analysis.

  • I am always looking for ways to optimize code and improve performance.

  • I am interested in exploring new technologies and frameworks to solve problems in innovative ways.

Add your answer

Q14. What is the difference between Hard and Soft real-time systems

Ans.

Hard real-time systems have strict timing requirements while soft real-time systems have flexible timing requirements.

  • Hard real-time systems must meet their deadlines or catastrophic consequences may occur

  • Soft real-time systems have some flexibility in meeting their deadlines

  • Examples of hard real-time systems include air traffic control systems and medical equipment

  • Examples of soft real-time systems include video streaming and online gaming

Add your answer

Q15. Why contract amendment is required

Ans.

Contract amendments are required to modify terms, conditions, or scope of the original agreement.

  • To update pricing or payment terms

  • To extend or shorten the duration of the contract

  • To add or remove services or products

  • To address unforeseen circumstances or changes in requirements

  • To correct errors or ambiguities in the original contract

Add your answer

Q16. 2. How would you handle missing data in time series data

Ans.

Handle missing data in time series data by imputation, interpolation, or deletion.

  • Impute missing values using mean, median, mode, or predictive modeling techniques.

  • Interpolate missing values using linear interpolation, spline interpolation, or time-based interpolation.

  • Delete rows with missing values if they are few and do not significantly impact the analysis.

Add your answer

Q17. Difference between Heatwheel and Energy wheel

Ans.

Heatwheel and Energy wheel are both types of energy recovery ventilation systems used in HVAC systems, but they differ in their specific mechanisms and applications.

  • Heatwheel uses a rotating wheel with a desiccant coating to transfer heat and moisture between incoming and outgoing air streams, while Energy wheel uses a rotating wheel with a matrix of heat-absorbing material to transfer heat only.

  • Heatwheel is more effective in transferring both heat and moisture, making it sui...read more

Add your answer

Q18. Which is the best page replacement algo and Why ?

Ans.

The best page replacement algorithm depends on the system's requirements and usage patterns.

  • FIFO is simple and easy to implement but may suffer from the Belady's anomaly.

  • LRU is effective in reducing the number of page faults but requires additional hardware support.

  • Optimal algorithm has the lowest possible page fault rate but is impractical to implement.

  • Clock algorithm is a compromise between FIFO and LRU and is widely used in operating systems.

  • Second chance algorithm is a mo...read more

Add your answer

Q19. What do you about computer and data entry

Ans.

I have knowledge and experience in computer operations and data entry.

  • I am proficient in using various software and tools for data entry

  • I have experience in accurately entering data into spreadsheets and databases

  • I am familiar with keyboard shortcuts and typing speed

  • I understand the importance of data accuracy and confidentiality

  • I am able to troubleshoot basic computer issues

  • I am willing to learn new software and tools as needed

Add your answer

Q20. Duaration 45 mins DF vs Datasests vs RDDs implementation of word count Groupby vs GroupbyKey spark context lifecycle joins

Ans.

Comparison and implementation of data structures and operations in Spark for data engineering

  • DataFrames are structured data with named columns, Datasets are type-safe structured data, RDDs are resilient distributed datasets

  • Word count can be implemented using Spark transformations like flatMap, map, reduceByKey

  • GroupBy is a DataFrame operation, GroupByKey is an RDD operation

  • Spark context is the entry point for Spark functionality in a program

  • Lifecycle of a Spark application inc...read more

Add your answer

Q21. How much statistical analysis experience do you have.

Ans.

I have 5 years of statistical analysis experience in various engineering projects.

  • I have worked on analyzing data sets to identify trends and patterns.

  • I have experience with hypothesis testing and regression analysis.

  • I have used statistical software such as R and Python for data analysis.

  • I have presented statistical findings to stakeholders in a clear and concise manner.

Add your answer

Q22. What is safety system Architecture

Ans.

Safety system architecture refers to the design and structure of systems that ensure the safety of operations and prevent accidents.

  • Safety system architecture involves the arrangement of components, functions, and interfaces to achieve safety goals.

  • It includes redundancy, fault tolerance, and fail-safe mechanisms to minimize the risk of failures.

  • Examples include safety-critical systems in industries such as aerospace, automotive, and nuclear power plants.

Add your answer

Q23. What technologies you worked on for the CAD?

Ans.

I have worked on technologies like AutoCAD, SolidWorks, and CATIA for CAD development.

  • AutoCAD

  • SolidWorks

  • CATIA

Add your answer

Q24. What campaigns to run to increase online sales?

Ans.

Running targeted campaigns can increase online sales. Here are some pointers:

  • Identify target audience and create personalized campaigns

  • Offer discounts and promotions to incentivize purchases

  • Use social media and email marketing to reach potential customers

  • Create urgency with limited-time offers and countdown timers

  • Retarget customers who have abandoned their carts

  • Collaborate with influencers to promote products

  • Optimize product listings and website for search engines

  • Provide exce...read more

Add your answer

Q25. What is a mission critical system ?

Ans.

A mission critical system is a system that is essential for the operation of an organization or process.

  • A system that, if it fails, can cause significant harm to people, the environment, or the organization's operations

  • Examples include air traffic control systems, power grid systems, and emergency response systems

  • These systems require high levels of reliability, availability, and security

  • They often have redundant components and backup systems to ensure continuous operation

Add your answer

Q26. how to handle a difficult situation?

Ans.

Handling difficult situations requires staying calm, listening actively, and finding a solution.

  • Stay calm and composed to avoid escalating the situation.

  • Listen actively to understand the problem and the other person's perspective.

  • Find a solution that works for both parties and communicate it clearly.

  • If necessary, involve a mediator or escalate to a higher authority.

  • Example: Dealing with an angry customer by acknowledging their frustration, apologizing for the issue, and offer...read more

Add your answer

Q27. What is Predictive Maintenance ?

Ans.

Predictive Maintenance is a proactive approach that uses data analysis to predict equipment failures and schedule maintenance before they occur.

  • Predictive Maintenance uses data analysis techniques to identify patterns and trends that indicate potential equipment failures.

  • It involves monitoring equipment performance in real-time and collecting data on factors such as temperature, vibration, and energy consumption.

  • By analyzing this data, predictive maintenance algorithms can pr...read more

Add your answer

Q28. What is a Real-Time System ?

Ans.

A real-time system is a computer system that processes data as it is received and provides immediate results.

  • Real-time systems are used in industries such as aviation, healthcare, and finance.

  • They require fast response times and high reliability.

  • Examples include air traffic control systems, medical monitoring devices, and stock trading systems.

Add your answer

Q29. how many detectors in Notifier single loop?

Ans.

Notifier single loop detectors typically have 126 devices.

  • Notifier single loop systems usually support up to 126 detectors

  • The number of detectors in a Notifier single loop system can vary based on the specific model and configuration

  • It is important to consult the product specifications for the exact number of detectors supported

Add your answer

Q30. What is cctv.

Ans.

CCTV stands for Closed Circuit Television. It is a system of video cameras used for surveillance and security purposes.

  • CCTV is a video surveillance system used for monitoring and recording activities in a specific area.

  • It consists of cameras, monitors, and recording devices.

  • CCTV is commonly used for security purposes in public places like banks, airports, and shopping malls.

  • It can also be used for traffic monitoring, wildlife observation, and industrial processes.

  • CCTV footage...read more

View 1 answer

Q31. Types of chiller operating mode

Ans.

Types of chiller operating modes include constant speed, variable speed, and hybrid mode.

  • Constant speed mode: Chiller operates at a fixed speed regardless of load.

  • Variable speed mode: Chiller adjusts speed based on load requirements for energy efficiency.

  • Hybrid mode: Combines constant and variable speed modes for optimal performance.

  • Examples: Centrifugal chillers often operate in variable speed mode for energy savings.

Add your answer

Q32. 1. How would you deal with time series data

Ans.

Time series data can be analyzed using techniques like smoothing, decomposition, forecasting, and anomaly detection.

  • Use smoothing techniques like moving averages to remove noise and identify trends.

  • Apply decomposition methods like seasonal decomposition of time series (STL) to separate trend, seasonality, and residual components.

  • Utilize forecasting models such as ARIMA, SARIMA, or Prophet to predict future values.

  • Implement anomaly detection algorithms like Isolation Forest or...read more

Add your answer

Q33. How do you use pricing to improve profitability?

Ans.

Pricing can improve profitability by strategically setting prices to maximize revenue and margins.

  • Analyze market trends and competitors' pricing to set competitive prices

  • Implement dynamic pricing strategies to adjust prices based on demand and supply

  • Utilize pricing psychology techniques to influence consumer behavior

  • Bundle products or services to increase overall value and encourage upselling

  • Regularly review and adjust pricing strategies based on performance and feedback

Add your answer

Q34. Esd line monitoring requirement for DI channels.

Ans.

ESD line monitoring is required for DI channels.

  • ESD line monitoring is necessary to prevent damage to sensitive electronic equipment.

  • DI channels are particularly vulnerable to ESD damage.

  • ESD line monitoring can be achieved through the use of ESD protection devices and regular testing.

  • Regular maintenance and calibration of monitoring equipment is also important.

Add your answer

Q35. diffeent approach for load balancing model

Ans.

Load balancing models distribute incoming network traffic across multiple servers to ensure no single server is overwhelmed.

  • Different algorithms for load balancing include round robin, least connections, and IP hash.

  • Consider factors like server capacity, network latency, and traffic patterns when choosing a load balancing model.

  • Implementing a hybrid approach combining multiple load balancing algorithms can optimize performance and reliability.

Add your answer

Q36. What is software life cycle ?

Ans.

Software life cycle refers to the stages involved in the development of software, from conception to retirement.

  • It includes planning, designing, coding, testing, deployment, and maintenance.

  • Each stage has its own set of activities and deliverables.

  • The life cycle model can be iterative, sequential, or a combination of both.

  • Examples of life cycle models include Waterfall, Agile, and DevOps.

  • The goal is to produce high-quality software that meets the needs of the stakeholders.

Add your answer

Q37. What is EBI.

Ans.

EBI stands for Enterprise Building Integrator, a building automation system used for controlling and monitoring building systems.

  • EBI is a software platform developed by Honeywell.

  • It integrates various building systems such as HVAC, lighting, security, and fire safety.

  • EBI provides real-time monitoring, control, and automation of building systems.

  • It helps in reducing energy consumption and improving building efficiency.

  • EBI can be customized to meet the specific needs of a build...read more

Add your answer

Q38. What is virtual grpund in opamp

Add your answer

Q39. What are four pillars in oops?

Ans.

The four pillars in OOPs are Inheritance, Encapsulation, Abstraction, and Polymorphism.

  • Inheritance allows a class to inherit properties and behavior from another class.

  • Encapsulation restricts access to certain components within a class, protecting the data.

  • Abstraction hides the complex implementation details and only shows the necessary features.

  • Polymorphism allows objects to be treated as instances of their parent class or their own class.

Add your answer

Q40. Give an example of micro kernel

Ans.

A microkernel is a minimalistic approach to kernel design where the kernel provides only the essential services.

  • Microkernels are designed to be small and efficient.

  • They provide only the most basic services, such as inter-process communication and memory management.

  • Examples of microkernels include MINIX, L4, and QNX.

  • Microkernels are often contrasted with monolithic kernels, which provide a much broader range of services.

  • One advantage of microkernels is that they are more modul...read more

Add your answer

Q41. Give me example it closed loop and explain

Ans.

A closed loop is a control system where the output is fed back to the input for continuous monitoring and adjustment.

  • In a closed loop system, the output is compared to a desired value and adjustments are made to bring the output closer to the desired value.

  • Examples of closed loop systems include thermostat-controlled heating systems and cruise control in cars.

  • Closed loop systems are used to maintain stability, accuracy, and control in various engineering applications.

Add your answer

Q42. Basiss of security systems, prior experience

Ans.

The basis of security systems and prior experience

  • Understanding of different security systems and their components

  • Knowledge of installation, maintenance, and troubleshooting of security systems

  • Experience in working with access control systems, CCTV cameras, alarm systems, etc.

  • Familiarity with network protocols and IP-based security systems

  • Ability to analyze security risks and recommend appropriate solutions

  • Experience in conducting security audits and assessments

  • Knowledge of r...read more

Add your answer

Q43. What is PID, how is works

Ans.

PID stands for Proportional-Integral-Derivative. It is a control algorithm used in systems to maintain a desired output.

  • PID is a feedback control mechanism that continuously calculates an error value based on the difference between a desired setpoint and the actual output of a system.

  • The Proportional term adjusts the output proportionally to the error value.

  • The Integral term sums up the error over time to eliminate steady-state errors.

  • The Derivative term predicts future error...read more

Add your answer

Q44. Why paging is used ?

Ans.

Paging is used to efficiently manage memory by allowing the operating system to move pages of memory between RAM and disk.

  • Paging allows for more efficient use of memory by freeing up space in RAM when it is not needed.

  • It allows the operating system to move pages of memory between RAM and disk, freeing up space in RAM for other processes.

  • Paging also allows for virtual memory, which allows programs to use more memory than is physically available on the system.

  • Examples of operat...read more

Add your answer

Q45. What is power factor

Ans.

Power factor is a measure of how effectively electrical power is being used in a circuit.

  • Power factor is the ratio of real power (measured in watts) to apparent power (measured in volt-amperes).

  • It indicates the efficiency of power usage in a circuit.

  • A power factor of 1 means all the power is being used effectively, while a power factor less than 1 indicates wastage of power.

  • Inductive loads like electric motors have a lagging power factor, while capacitive loads have a leading...read more

Add your answer

Q46. program to search, sort, unix

Ans.

Program to search and sort arrays in Unix environment.

  • Use Unix commands like grep and sort to search and sort arrays.

  • Example: grep 'keyword' file.txt | sort

  • Utilize shell scripting to automate the process.

Add your answer

Q47. Sorting algorithm

Ans.

A sorting algorithm is a method of arranging elements in a specific order.

  • Sorting algorithms can be categorized as comparison-based or non-comparison-based.

  • Common sorting algorithms include bubble sort, insertion sort, selection sort, merge sort, quicksort, and heapsort.

  • Efficiency of sorting algorithms is measured by their time complexity, space complexity, and stability.

  • Example: Sorting an array of strings in alphabetical order using quicksort.

Add your answer

Q48. Tell me abt urself and

Ans.

I am a dedicated HR professional with 5 years of experience in HRIS management and implementation.

  • 5 years of experience in HRIS management and implementation

  • Strong knowledge of HR systems and databases

  • Experience in training staff on HRIS usage

  • Ability to troubleshoot and resolve HRIS issues

  • Strong attention to detail and organizational skills

Add your answer

Q49. Object drawing example 2d

Ans.

An object drawing example in 2D

  • Start by identifying the object you want to draw

  • Determine the scale and dimensions of the drawing

  • Use appropriate tools like rulers, compass, and protractors

  • Sketch the basic outline of the object

  • Add details and shading to enhance the drawing

  • Label important features or measurements

  • Review and refine the drawing for accuracy

Add your answer

Q50. Why do you like data?

Ans.

I like data because it allows me to uncover insights, make informed decisions, and solve complex problems.

  • Data helps me understand trends and patterns in various industries.

  • I enjoy using data to drive business strategies and improve processes.

  • Analyzing data allows me to make evidence-based decisions and solve real-world problems.

  • Data visualization helps me communicate findings effectively to stakeholders.

Add your answer

Q51. Explain project architecture?

Ans.

Project architecture refers to the overall design and structure of a project, including its components and how they interact.

  • It involves identifying the key components of the project and how they fit together

  • It includes defining the relationships between different components

  • It also involves determining the technologies and tools that will be used

  • Examples include client-server architecture, microservices architecture, and event-driven architecture

Add your answer

Q52. Filed side installation working

Ans.

Field side installation working refers to the process of setting up and configuring ITI Instrument systems in the field.

  • Field side installation involves installing and configuring ITI Instrument systems at remote locations.

  • This includes setting up hardware components, connecting devices, and configuring software.

  • Field side installation may require troubleshooting and resolving any issues that arise during the process.

  • Examples of field side installation working include setting...read more

Add your answer

Q53. diff b/w thread process

Ans.

A process is an instance of a program running on a computer, while a thread is a smaller unit of execution within a process.

  • Process is an independent entity that runs in its own memory space, while threads share the same memory space within a process.

  • Processes have their own resources like memory, file handles, etc., while threads share these resources.

  • Processes are heavyweight, while threads are lightweight.

  • Example: A web browser is a process, and each tab within the browser...read more

Add your answer

Q54. Explain the various GD&T categories

Add your answer

Q55. Importance of IT security

Ans.

IT security is crucial to protect sensitive data, prevent cyber attacks, ensure compliance, and maintain trust with customers.

  • Protects sensitive data from unauthorized access or theft

  • Prevents cyber attacks such as malware, ransomware, and phishing

  • Ensures compliance with regulations and standards like GDPR, HIPAA, and PCI DSS

  • Maintains trust with customers by safeguarding their information

  • Examples: Implementing firewalls, encryption, access controls, and regular security audits

Add your answer

Q56. all smart City Device configuration

Ans.

Smart City Device configuration involves setting up various sensors, communication protocols, and data management systems to enable efficient city operations.

  • Configure sensors for monitoring traffic flow, air quality, noise levels, etc.

  • Implement communication protocols such as LoRaWAN, NB-IoT, or WiFi for data transmission.

  • Set up data management systems like cloud platforms or edge computing for processing and analyzing collected data.

Add your answer

Q57. Draw a P&ID of column

Ans.

A P&ID of a column is a detailed diagram showing the piping and instrumentation of the column.

  • Include all the piping connections to and from the column

  • Label all instruments and control valves on the diagram

  • Show the flow direction of the process within the column

  • Include any safety devices or relief valves connected to the column

Add your answer

Q58. Hira identify for incident

Ans.

HIRA stands for Hazard Identification and Risk Assessment. It is a process used to identify potential hazards and assess the associated risks.

  • HIRA involves identifying hazards and assessing the risks associated with them

  • The process includes analyzing the likelihood and severity of potential incidents

  • Examples of hazards that may be identified through HIRA include chemical spills, equipment malfunctions, and workplace violence

Add your answer

Q59. Automation role

Ans.

Automation Test Engineer is responsible for designing, developing, and executing automated tests to ensure software quality.

  • Develop automated test scripts using tools like Selenium, Appium, or JUnit

  • Execute test scripts and analyze results to identify defects

  • Collaborate with developers and other team members to improve test coverage

  • Maintain and update automated test suites as needed

  • Contribute to continuous integration and continuous deployment processes

Add your answer

Q60. Explain wiring diagram

Add your answer

Q61. write a code for pattern

Ans.

Code to print a pattern using nested loops

  • Use nested loops to iterate through rows and columns

  • Print different characters or numbers based on the pattern

  • Adjust loop conditions and characters to create different patterns

Add your answer

Q62. programming languages known

Ans.

Proficient in Java, Python, and C++

  • Java

  • Python

  • C++

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Inficare

based on 85 interviews
Interview experience
4.2
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 303 Interview Questions
3.9
 • 255 Interview Questions
3.9
 • 209 Interview Questions
3.8
 • 181 Interview Questions
4.2
 • 165 Interview Questions
3.9
 • 152 Interview Questions
View all
Top Honeywell Automation Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter