Huawei Technologies
40+ Interview Questions and Answers
Q1. If there are 200 fishes in an aquarium. 99% are red. How many fishes have to be removed to make the red fishes 98 % in the aquarium?
To make the red fishes 98%, 50 fishes have to be removed from the aquarium.
Calculate 1% of 200 fishes to find out how many fishes represent 1%.
Multiply the result by 2 to find out how many fishes represent 2%.
Subtract the result from 200 to find out how many fishes represent 98%.
Q2. Basic difference between 3G,4G and 5G bands and speeds?
3G, 4G and 5G bands differ in terms of speed, frequency, and latency.
3G operates on frequencies between 850 MHz to 2100 MHz with a maximum speed of 2 Mbps.
4G operates on frequencies between 700 MHz to 2600 MHz with a maximum speed of 100 Mbps.
5G operates on frequencies between 24 GHz to 100 GHz with a maximum speed of 20 Gbps.
5G has lower latency than 4G, which means faster response times.
5G also has the ability to support more devices per square kilometer than 4G.
5G uses adv...read more
Q3. How can we write an efficient matrix multiplication method for huge matrices?
Use parallel processing, cache optimization, and matrix partitioning for efficient matrix multiplication of huge matrices.
Utilize parallel processing techniques such as multi-threading or GPU acceleration to distribute the workload and speed up computation.
Implement cache optimization strategies to minimize cache misses and improve memory access efficiency.
Divide the matrices into smaller submatrices and perform matrix multiplication on these smaller blocks to reduce memory u...read more
Q4. How to integrate the sites or the integration steps?
Integration of sites involves identifying the systems to be integrated, defining the data flow, and implementing the integration process.
Identify the systems to be integrated
Define the data flow between the systems
Choose the appropriate integration method (API, ETL, etc.)
Develop and test the integration process
Deploy the integration process and monitor for errors
Ensure data security and compliance
Provide ongoing support and maintenance
Q5. What is cyber security?
Cybersecurity refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.
It involves implementing measures to prevent cyber attacks and data breaches
It includes using firewalls, antivirus software, and encryption techniques
It also involves educating users about safe online practices and creating strong passwords
Examples of cyber attacks include phishing, malware, and ransomware
Cybersecurity is importan...read more
Q6. Markdown language means what ? Have you used githun , git lab before ? What do you mean by restructured text ?
Markdown is a lightweight markup language used for formatting text. Git and GitLab are version control systems. RestructuredText is a markup language used for technical documentation.
Markdown is used to format text on websites and in documentation
Git and GitLab are version control systems used for managing code
RestructuredText is a markup language used for technical documentation in Python projects
Q7. How can Huawei become the market leader in the segment and what are the key technical parameter industry is looking for.
Huawei can become the market leader by focusing on key technical parameters such as 5G, AI, and IoT.
Invest in research and development of 5G technology
Integrate AI capabilities into their products and services
Develop IoT solutions for various industries
Provide excellent customer service and support
Partner with other companies to expand their reach and offerings
Q8. What is your experience with parallelizing transformers, and how do you approach splitting them across multiple devices to minimize latency?
I have experience parallelizing transformers by splitting them across multiple devices to minimize latency.
I have utilized frameworks like TensorFlow and PyTorch to parallelize transformers.
I approach splitting transformers by dividing the input data into chunks and distributing them across devices.
I optimize communication overhead by minimizing data transfer between devices.
I leverage techniques like data parallelism and model parallelism to efficiently parallelize transform...read more
Q9. Elaborate full Call flow process.
Call flow process is the sequence of steps followed during a phone call.
Call initiation by dialing the number
Call routing to the appropriate network
Ring tone at the receiver end
Answering the call
Conversation between the parties
Call termination by either party
Q10. what is MPLS protocol and in what situations do we use it
MPLS (Multiprotocol Label Switching) is a protocol used in high-performance telecommunications networks to direct data packets along predefined paths.
MPLS is used to improve network performance by efficiently routing data packets based on labels instead of IP addresses.
It is commonly used in scenarios where quality of service (QoS) and traffic engineering are important, such as in large enterprise networks or service provider networks.
MPLS can be used to create virtual privat...read more
Q11. 1.What is wdm 2. What is looping 3. What is sdh and pdh 4. How may types of patchcods 5.what is power meter
WDM stands for Wavelength Division Multiplexing, a technology used in fiber optic communication to transmit multiple signals simultaneously.
WDM is a technique that combines multiple optical signals onto a single fiber by using different wavelengths of light.
It increases the capacity and efficiency of fiber optic networks.
Looping refers to the process of connecting a cable or circuit back to itself, often used for testing or troubleshooting purposes.
SDH (Synchronous Digital Hi...read more
Q12. Which type work you can do
I am proficient in data entry, file management, troubleshooting computer issues, and operating office equipment.
Data entry
File management
Troubleshooting computer issues
Operating office equipment
Q13. How can we further optimize this?
Further optimize by fine-tuning hyperparameters, improving data preprocessing, implementing more advanced algorithms, and parallelizing computations.
Fine-tune hyperparameters using techniques like grid search or random search.
Improve data preprocessing by handling missing values, scaling features, and encoding categorical variables.
Implement more advanced algorithms such as ensemble methods like Random Forest or Gradient Boosting.
Parallelize computations using tools like Spar...read more
Q14. Discuss various topics of distributed computing.
Distributed computing involves breaking down tasks into smaller parts and distributing them across multiple computers for faster processing.
Distributed systems allow for parallel processing of tasks, improving efficiency and scalability.
Topics include distributed file systems (e.g. HDFS), distributed databases (e.g. Cassandra), and distributed computing frameworks (e.g. Apache Spark).
Consistency, fault tolerance, and communication protocols are key considerations in distribut...read more
Q15. What is the benefits and challenges of hybrid cloud
Hybrid cloud offers flexibility and cost savings but comes with integration challenges and security concerns.
Benefits include flexibility to choose where to host workloads based on requirements, cost savings by utilizing public cloud for non-sensitive data, and improved disaster recovery capabilities.
Challenges include integration complexities between on-premises and cloud environments, potential security risks due to data transfer between environments, and the need for speci...read more
Q16. What TCP/IP, UDP, OSPF
TCP/IP is a protocol used for communication over the internet. UDP is a connectionless protocol. OSPF is a routing protocol.
TCP/IP is a suite of communication protocols used for transmitting data over the internet.
UDP is a connectionless protocol that does not establish a dedicated end-to-end connection.
OSPF is a routing protocol used to determine the best path for data to travel in a network.
TCP/IP and UDP are transport layer protocols, while OSPF is a network layer protocol...read more
Q17. What is Inheritance, polymorphism, virtual constructor..etc
Inheritance is a mechanism in OOP where a class inherits properties and behaviors from another class. Polymorphism allows objects of different classes to be treated as objects of a common superclass. Virtual constructor is a constructor that can be overridden in a derived class.
Inheritance allows a class to inherit properties and behaviors from another class.
Polymorphism enables objects of different classes to be treated as objects of a common superclass.
Virtual constructor i...read more
Q18. What is mean by testing
Testing is the process of evaluating a system or component to determine if it satisfies specified requirements.
Testing is done to identify defects or errors in software or hardware.
It involves executing a system or component with the intent of finding bugs or verifying its functionality.
Testing can be performed at various levels such as unit testing, integration testing, system testing, and acceptance testing.
Different types of testing include functional testing, performance ...read more
Q19. explain the three different INTER_AS solutions their advantages and disadvantages
Three different INTER_AS solutions and their advantages and disadvantages
Option 1: Option A - Advantages: Scalability, Disadvantages: Complexity
Option 2: Option B - Advantages: Simplicity, Disadvantages: Limited scalability
Option 3: Option C - Advantages: Flexibility, Disadvantages: Potential security risks
Q20. what command you use to troubleshoot network problems
To troubleshoot network problems, the 'ping' command is commonly used.
Use 'ping' command to check connectivity between devices
Check for packet loss and latency with 'ping'
Use 'traceroute' command to identify network hops and latency issues
Q21. How you fix memory leak in framework
Memory leaks in frameworks can be fixed by identifying and removing the root cause of the leak.
Identify the source of the leak using memory profiling tools
Analyze the code to find the root cause of the leak
Fix the code by releasing unused memory or optimizing memory usage
Test the framework thoroughly to ensure the leak has been fixed
Q22. Why we are doing testing
Testing is done to ensure that the software meets the requirements and is of high quality.
To identify defects and errors in the software
To ensure that the software meets the specified requirements
To improve the quality of the software
To increase customer satisfaction
To reduce the risk of software failure
To ensure that the software is reliable and secure
Q23. How do you debug with gdb?
Debugging with gdb involves setting breakpoints, stepping through code, inspecting variables, and analyzing memory.
Set breakpoints at specific lines of code using 'break' command
Step through code using 'next' or 'step' commands
Inspect variables using 'print' command
Analyze memory using 'x' command
Use 'continue' command to resume execution
Q24. What do you know about optimization
Optimization is the process of finding the best solution to a problem within given constraints.
Optimization involves maximizing or minimizing a certain objective function.
It often involves finding the optimal values for variables in a mathematical model.
Common optimization techniques include linear programming, genetic algorithms, and gradient descent.
Examples include optimizing production schedules to minimize costs or maximizing profits.
Optimization is used in various field...read more
Q25. What impact of Covid 19 in india
Covid 19 has had a significant impact on India.
India has reported a high number of Covid cases and deaths.
The pandemic has affected the economy, leading to job losses and reduced income.
The healthcare system has been overwhelmed, with shortages of hospital beds, oxygen, and medicines.
The government has implemented lockdowns and other measures to control the spread of the virus.
Vaccination efforts have been ramped up, but there are still challenges in reaching all segments of ...read more
Q26. Explain the flow of International MT message
International MT messages flow through a series of steps involving message creation, routing, transmission, and delivery.
The message is created by the sender using a messaging application or platform.
The message is then routed to the appropriate gateway or operator for transmission.
The message is transmitted through the operator's network to the recipient's operator.
The recipient's operator delivers the message to the recipient's device.
Delivery reports may be sent back to th...read more
Q27. What is STP
STP stands for Spanning Tree Protocol. It is a network protocol used to prevent loops in Ethernet networks.
STP is used to create a loop-free logical topology in a network.
It works by selecting a root bridge and calculating the shortest path to reach each network segment.
STP uses Bridge Protocol Data Units (BPDU) to exchange information between switches.
It identifies and blocks redundant paths to avoid broadcast storms and network congestion.
STP operates at the Data Link Layer...read more
Q28. can you explain Iaas Paas and Saas
IaaS, PaaS, and SaaS are different cloud service models. IaaS provides virtualized computing resources, PaaS offers a platform for developing and deploying applications, and SaaS delivers software over the internet.
IaaS (Infrastructure as a Service) - provides virtualized computing resources over the internet, such as virtual servers, storage, and networking. Examples include Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform.
PaaS (Platform as a Service) - offe...read more
Q29. What is VRRP
VRRP (Virtual Router Redundancy Protocol) is a network protocol that provides automatic failover for routers in a network.
VRRP allows multiple routers to work together as a virtual router, providing redundancy and high availability.
It uses a virtual IP address that can be shared among the routers, with one router acting as the master and others as backups.
If the master router fails, one of the backup routers takes over the virtual IP address and becomes the new master.
VRRP op...read more
Q30. how many ip addresses are there
There are approximately 4.3 billion IPv4 addresses and 340 undecillion IPv6 addresses.
There are approximately 4.3 billion IPv4 addresses.
IPv4 addresses are 32-bit numbers, allowing for a total of 2^32 addresses.
There are 340 undecillion IPv6 addresses.
IPv6 addresses are 128-bit numbers, allowing for a total of 2^128 addresses.
Q31. Tell me about OSI model
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the adjacent layers.
For example, HTTP operates at the ...read more
Q32. tell me about my compeny
I'm sorry, but I cannot answer that question as I do not have information about your company.
Q33. How a normal call/sms works??
A call/SMS works by transmitting data through a cellular network to the recipient's device.
When a call is made, the voice is converted into digital data and transmitted through the cellular network to the recipient's device.
When an SMS is sent, the message is also converted into digital data and transmitted through the cellular network to the recipient's device.
The cellular network uses radio waves to transmit the data between the devices.
The recipient's device receives the d...read more
Q34. HOW TO IMPROVE THE BUSSINESS
To improve the business, focus on increasing sales, expanding customer base, improving customer satisfaction, and implementing effective marketing strategies.
Increase sales by targeting new markets and customers
Expand customer base by offering personalized services and incentives
Improve customer satisfaction by providing excellent customer support and addressing their needs
Implement effective marketing strategies such as social media campaigns and collaborations with influenc...read more
Q35. Design an interruptible power supply for a booster
Design an interruptible power supply for a booster
Determine power requirements of the booster
Select appropriate battery capacity and type
Design circuit with automatic switch-over to battery power during power outage
Include surge protection and voltage regulation
Test the system for reliability and efficiency
Q36. What vlan?
VLAN stands for Virtual Local Area Network and is used to logically separate a network into smaller segments.
VLANs are used to improve network performance and security.
They allow for better network management and easier troubleshooting.
VLANs can be configured on switches and routers.
Examples of VLANs include separating guest and employee networks or separating different departments within a company.
Q37. What's RESTful api?
RESTful api is an architectural style for designing networked applications.
REST stands for Representational State Transfer
Uses standard HTTP methods like GET, POST, PUT, DELETE
Resources are identified by URIs
Stateless communication between client and server
Responses are typically in JSON or XML format
Q38. Design framework for media player
A media player design framework should prioritize user experience, ease of use, and accessibility.
Include intuitive controls for playback, volume, and playlist management
Ensure compatibility with a variety of media formats
Consider incorporating features such as equalizer settings and visualizations
Design for accessibility with options for closed captioning and audio descriptions
Prioritize a clean and visually appealing interface
Q39. general work principles
General work principles for a Transmission Engineer
Understanding of electrical systems and components
Knowledge of transmission line design and maintenance
Ability to troubleshoot and resolve technical issues
Adherence to safety regulations and protocols
Effective communication with team members and stakeholders
Q40. Describe OSI layer
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI model is used to understand and describe how different network protocols and technologies interact with each other.
Each layer in the OSI model has a specific function and communicates with the layers above and below it.
The seven layers of the OSI model are: Physical, Data Link, Network, Transport, Session, Presentation, and...read more
Q41. Current CTC and Expectations
I am currently earning a competitive salary and my expectations are aligned with the responsibilities and market standards for the Deputy General Manager role.
My current CTC is in line with industry standards for a professional at my level.
I have researched the market and have a clear understanding of the salary range for the Deputy General Manager position.
Considering my experience, skills, and the level of responsibility associated with the role, my salary expectations are ...read more
Q42. Difference between 2G, 3G, 4G, and 5G.
Q43. Hands-on experience on websocket
Websocket is a communication protocol that provides full-duplex communication channels over a single TCP connection.
Websocket allows for real-time, two-way communication between a client and a server.
It is commonly used in web applications for features like live chat, real-time updates, and online gaming.
Websocket connections are initiated through a handshake process and can be kept open for as long as needed.
Popular libraries for working with websockets include Socket.IO, ws...read more
Q44. Sorting with python code
Sorting an array of strings using Python code
Use the sorted() function to sort the array of strings
You can specify the key parameter to sort based on a specific criteria
You can also use the sort() method to sort the array in place
Q45. Explained test types
Test types include functional, non-functional, regression, integration, acceptance, and performance testing.
Functional testing checks if the software meets the specified requirements.
Non-functional testing checks the software's performance, usability, and security.
Regression testing ensures that changes to the software do not affect existing functionality.
Integration testing checks if different modules of the software work together.
Acceptance testing ensures that the software...read more
Q46. Types of testing
Types of testing include functional, non-functional, manual, automated, regression, performance, and security testing.
Functional testing ensures that the software meets the specified requirements.
Non-functional testing checks the software's performance, usability, and security.
Manual testing involves human testers executing test cases.
Automated testing uses tools to run tests and compare actual results with expected results.
Regression testing checks if changes to the software...read more
Q47. difference between HLR and VLR
HLR stands for Home Location Register and stores subscriber data, while VLR stands for Visitor Location Register and temporarily stores subscriber data when they are in a different location.
HLR stores permanent subscriber data, while VLR stores temporary data
HLR is used for call routing and subscriber authentication, while VLR is used for call setup and location updates
Examples: When a subscriber travels to a different country, their data is temporarily stored in the VLR of t...read more
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month