L&T Technology Services
20+ Sandeep Subhash & Company Interview Questions and Answers
Q1. What the curves on the Probability plot denotes?
Probability plot curves denote the distribution of data points compared to a theoretical distribution.
Probability plot curves help visualize how well a dataset fits a particular distribution.
The curves can indicate if the data is normally distributed or follows a different distribution.
Examples of probability plots include Q-Q plots and P-P plots.
Q2. Explain ISO 13485 implementation in your current employer?
Implemented ISO 13485 standards for medical device quality management system at current employer.
Conducted gap analysis to identify areas for improvement
Developed and implemented quality management system procedures
Trained employees on ISO 13485 requirements
Performed internal audits to ensure compliance
Worked with external auditors for certification
Q3. What is Ppk and Cpk in Six Sigma??
Ppk and Cpk are process capability indices used in Six Sigma to measure the ability of a process to produce output within specification limits.
Ppk and Cpk are statistical measurements that assess how well a process is performing in relation to its specification limits.
Ppk measures the potential capability of a process to produce output within specification limits, while Cpk measures the actual capability of a process to meet those limits.
A higher Ppk and Cpk value indicates a...read more
Q4. What are the different types of risks??
Different types of risks include financial, operational, strategic, compliance, and reputational risks.
Financial risk: related to the potential loss of financial resources, such as market risk, credit risk, and liquidity risk.
Operational risk: arises from internal processes, systems, or people, leading to errors, fraud, or disruptions.
Strategic risk: involves the impact of business decisions on the organization's long-term goals and competitiveness.
Compliance risk: stems from...read more
Q5. difference between dependency injection and IOC
Dependency injection is a design pattern where objects are passed their dependencies rather than creating them internally. Inversion of Control (IoC) is a broader concept where the control of object creation is inverted from the application to a framework.
Dependency injection is a technique to achieve Inversion of Control (IoC)
In DI, objects are given their dependencies rather than creating them internally
IoC is a design principle where the control of object creation is inver...read more
Q6. Difference between abstract class and interface
Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
Abstract class can have constructors, fields, and methods, while interface cannot have any of these.
A class can implement multiple interfaces but can only inherit from one abstract class.
Abstract classes are used to provide a common base for multiple classes, while interfaces are used to define a contract for classes to implement.
Example: Abstract class 'Shape' with ...read more
Q7. Explanation of the processor use your experience
Processors are the brain of a computer, responsible for executing instructions and performing calculations.
Processors come in different types and speeds, with varying numbers of cores and cache sizes.
The processor's clock speed determines how many instructions it can execute per second.
Processors use instruction sets, such as x86 or ARM, to understand and execute code.
Overclocking can increase a processor's performance, but can also cause overheating and instability.
Processor...read more
Q8. Electro-Mechanical standard
Electro-Mechanical standard refers to the set of guidelines and regulations for designing and manufacturing devices that combine electrical and mechanical components.
Electro-Mechanical standards ensure compatibility and safety of devices.
Examples include standards for connectors, wiring, and grounding in electronic devices.
Compliance with standards is important for product quality and reliability.
Q9. PFD of parts and how to make
PFD (Process Flow Diagram) is a visual representation of how parts are manufactured or assembled.
Identify all parts involved in the process
Map out the sequence of steps involved in manufacturing or assembling the parts
Include information on materials, tools, and equipment required for each step
Use symbols and diagrams to represent the flow of the process
Ensure clarity and accuracy in the PFD to aid in understanding and troubleshooting
Q10. what id dependency injection
Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.
Dependency injection helps in achieving loose coupling between classes.
It allows for easier testing and maintenance of code.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Q11. Buck converter control loop mechanism
Buck converter control loop mechanism is used to regulate the output voltage by adjusting the duty cycle of the switch.
The control loop compares the actual output voltage with a reference voltage and adjusts the duty cycle of the switch accordingly.
It typically consists of a feedback loop with a voltage divider, error amplifier, and PWM controller.
The PWM controller generates a signal to control the switch on and off time, regulating the output voltage.
The control loop stabil...read more
Q12. What is MVC Structure
MVC is a software design pattern that separates an application into three main components: Model, View, and Controller.
Model represents the data and business logic of the application
View is responsible for displaying the data to the user
Controller acts as an intermediary between Model and View, handling user input and updating the Model accordingly
Q13. Explain WPA3 security mode
WPA3 is a Wi-Fi security protocol that provides stronger encryption and authentication than its predecessor WPA2.
WPA3 uses Simultaneous Authentication of Equals (SAE) instead of Pre-Shared Key (PSK) for password-based authentication.
It also supports 192-bit encryption for stronger protection against brute-force attacks.
WPA3 introduces Opportunistic Wireless Encryption (OWE) for open Wi-Fi networks, providing encryption without the need for a password.
WPA3 also includes protec...read more
Q14. electrical review of schematic
Analyze and provide feedback on an electrical schematic diagram
Review the components and connections in the schematic
Check for any errors or inconsistencies in the design
Ensure that the schematic follows industry standards and best practices
Provide suggestions for improvements or optimizations
Verify that the schematic meets the project requirements
Q15. Operation of Flyback converter
A flyback converter is a type of switching power supply that uses a transformer to store energy and transfer it to the output.
Utilizes a transformer to store energy and transfer it to the output
Operates by storing energy in the transformer during the switch-on time and releasing it to the output during the switch-off time
Commonly used in low power applications such as battery chargers and LED drivers
Q16. Explain roaming technology
Roaming technology allows a mobile device to connect to a different network while maintaining its existing phone number and other settings.
Roaming is used when a mobile device is outside of its home network coverage area.
The device connects to a different network and uses its services.
Roaming can be expensive, as the user may be charged for using the other network's services.
Roaming can also be limited by the user's mobile plan or the policies of the network provider.
Examples...read more
Q17. Costing of components
Costing of components involves determining the expenses associated with each individual part of a product.
Identify all components required for the product
Determine the cost of each component based on supplier quotes or market research
Consider additional costs such as shipping, taxes, and labor
Calculate the total cost by summing up the costs of all components
Regularly review and update costing to account for changes in prices or suppliers
Q18. What is OOPS Concept
OOPS (Object-Oriented Programming) is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
OOPS focuses on creating reusable and modular code by organizing it into objects.
It involves concepts like classes, objects, inheritance, polymorphism, and encapsulation.
Example: Inheritance allows a class to inherit properties and behavior from another class, promoting code reusability.
Q19. Why .Net is better
The .Net framework is better due to its versatility, performance, and strong community support.
Versatile - Supports multiple languages like C#, F#, and Visual Basic
Performance - Optimized for Windows environments and offers high performance
Strong community support - Large community of developers and resources available
Integration with Microsoft technologies - Seamless integration with other Microsoft products like Azure and SQL Server
Q20. What is c language
C language is a high-level programming language known for its efficiency and flexibility.
C language was developed by Dennis Ritchie at Bell Labs in the early 1970s.
It is widely used for system programming, embedded systems, and software development.
C is a procedural language with a rich set of built-in functions and operators.
Example: printf() function is used to print output in C language.
Q21. Difference bw Tcp vs udp
TCP is connection-oriented, reliable, and slower. UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning a connection is established before data is sent.
TCP is reliable, as it ensures all data is received in the correct order.
TCP is slower than UDP due to the overhead of establishing a connection and error-checking.
UDP is connectionless, meaning data can be sent without establishing a connection.
UDP is unreliable, as it does not guarantee delivery o...read more
Q22. Explain DHCP process
DHCP is a protocol that assigns IP addresses to devices on a network.
DHCP server receives a request from a device for an IP address
DHCP server offers an available IP address to the device
Device accepts the offered IP address and sends a request to lease it
DHCP server acknowledges the lease request and assigns the IP address to the device
Device uses the assigned IP address to communicate on the network
Q23. Explain bandsteering
Bandsteering is a technique used in wireless networks to steer clients to the best available frequency band.
Bandsteering is used to optimize network performance by balancing client load across different frequency bands.
It can be implemented through various methods such as signal strength, client capabilities, and network congestion.
For example, if a client device supports both 2.4GHz and 5GHz bands, bandsteering can be used to steer it to the less congested 5GHz band for bett...read more
Interview Process at Sandeep Subhash & Company
Top Technical Lead Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month