Be the first one to contribute and help others!
I was interviewed in Mar 2017.
I have the technical skills, experience, and passion to deliver high-quality software solutions.
I have a strong background in programming languages such as Java, Python, and C++.
I have experience working on complex software projects and collaborating with cross-functional teams.
I am passionate about staying up-to-date with the latest technologies and trends in software development.
I am a quick learner and have a strong...
Ericsson is a global leader in telecommunications technology with a strong focus on innovation and career development.
Global leader in telecommunications technology
Strong focus on innovation
Opportunities for career development
C code for printing Fibonacci Series upto n elements
Declare three variables to store the current, previous and next numbers in the series
Initialize the previous and current variables to 0 and 1 respectively
Use a loop to print the next number in the series by adding the previous two numbers
Loop should run n times to print n elements in the series
I was interviewed before Sep 2016.
I have worked on various technologies including Java, Python, AWS, Docker, and Kubernetes.
Java
Python
AWS
Docker
Kubernetes
Daily operational activities case studies
Case study of optimizing production line for efficiency
Case study of implementing new safety protocols in a manufacturing plant
Case study of troubleshooting and resolving technical issues in a software development team
Case study of streamlining inventory management in a retail store
Case study of improving customer service processes in a call center
Project management is the process of planning, organizing, and overseeing the execution of a project from start to finish.
It involves defining project goals and objectives
Creating a project plan and timeline
Assigning tasks and responsibilities to team members
Monitoring progress and making adjustments as needed
Ensuring that the project is completed on time, within budget, and meets the desired quality standards
Examples ...
Financial and cost control is the process of monitoring and managing project expenses to ensure they stay within budget.
Developing a detailed budget plan
Tracking expenses and comparing them to the budget plan
Identifying and addressing cost overruns
Negotiating with vendors to get the best prices
Implementing cost-saving measures
Regularly reporting on financial status to stakeholders
Resource management is the process of planning, allocating, and optimizing resources to achieve organizational goals.
It involves identifying the resources needed for a project or task
Allocating those resources in an efficient manner
Monitoring and controlling resource usage to ensure optimal performance
Examples include managing personnel, finances, equipment, and time
Effective resource management can lead to increased p
2G, 3G, and 4G call flow are the processes involved in establishing and maintaining a mobile phone call.
2G call flow involves circuit-switched technology and uses Time Division Multiple Access (TDMA) for voice transmission.
3G call flow uses packet-switched technology and supports both voice and data transmission.
4G call flow uses Long-Term Evolution (LTE) technology and provides high-speed data transmission.
All call fl...
Single RAN is a network architecture that allows multiple wireless technologies to be supported on a single physical network.
Single RAN stands for Single Radio Access Network.
It enables multiple wireless technologies such as 2G, 3G, 4G, and 5G to be supported on a single physical network.
This reduces the need for multiple hardware and software components, resulting in cost savings and simplified network management.
Sing...
VOLTE stands for Voice over LTE. It is a technology that allows voice calls to be made over a 4G LTE network.
VOLTE uses IP packets to transmit voice calls over the LTE network
It provides better call quality and faster call setup times compared to traditional 2G/3G networks
VOLTE also allows for simultaneous voice and data usage on the same network
Examples of VOLTE-enabled devices include iPhone 6 and above, Samsung Gala...
LTE is a standard for wireless broadband communication while VoLTE is a technology that enables voice calls over LTE network.
LTE stands for Long-Term Evolution and is a standard for wireless broadband communication.
VoLTE stands for Voice over LTE and is a technology that enables voice calls over LTE network.
LTE is used for data transfer while VoLTE is used for voice calls.
VoLTE provides better call quality and faster c...
Transport network refers to the infrastructure that enables the movement of people, goods, and information.
Transport network includes roads, railways, airports, seaports, and communication networks.
It plays a crucial role in the economy by facilitating trade and commerce.
Examples of transport networks include the interstate highway system in the US and the European railway network.
Transport network planning involves op...
ABIS over IP and ABIS over TDM are two different methods of transmitting biometric data.
ABIS over IP uses internet protocol to transmit biometric data while ABIS over TDM uses time-division multiplexing.
ABIS over IP is more flexible and scalable than ABIS over TDM.
ABIS over TDM is more reliable and secure than ABIS over IP.
ABIS over IP is suitable for remote locations while ABIS over TDM is suitable for local networks.
...
2G, 3G, and 4G are mobile network technologies with different architectures.
2G uses circuit-switched technology and is primarily used for voice calls and text messaging.
3G uses packet-switched technology and offers faster data transfer rates than 2G.
4G uses all-IP packet-switched technology and provides even faster data transfer rates than 3G.
4G also supports advanced features like VoLTE and carrier aggregation.
Each ge...
I am a Senior engineer with 10+ years of experience in software development, specializing in backend systems and cloud technologies.
10+ years of experience in software development
Specialize in backend systems and cloud technologies
Strong problem-solving skills
Experience with large-scale distributed systems
Proficient in programming languages such as Java, Python, and Go
I have worked in various companies ranging from startups to large corporations, gaining experience in diverse technologies and industries.
Worked in a startup where I was responsible for developing a scalable backend system using Node.js and MongoDB.
At a mid-sized company, I led a team in implementing CI/CD pipelines for faster and more reliable software delivery.
In a large corporation, I worked on optimizing performanc...
I am impressed by the company's innovative projects and strong reputation in the industry.
Company's reputation for cutting-edge technology
Opportunity to work on challenging projects
Positive reviews from current employees
My notice period is currently 3 months, but it may be negotiable depending on the circumstances.
My current notice period is 3 months
I am open to negotiation depending on the circumstances
I can provide examples of when I have negotiated notice periods in the past
I was interviewed before Mar 2021.
Round duration - 15 minutes
Round difficulty - Easy
This was a group discussion round where we were divided into groups of 10 and we had 15 minutes for GD.
Round duration - 60 minutes
Round difficulty - Medium
This is all about how good you are with the fundamentals. Out of 10 I would give it a 6.5 on difficulty.
You are given a string STR
which contains alphabets, numbers, and special characters. Your task is to reverse the string.
STR = "abcde"
"e...
Reverse a given string containing alphabets, numbers, and special characters.
Iterate through the string from the end to the beginning and append each character to a new string.
Use built-in functions like reverse() or StringBuilder in languages like Python or Java for efficient reversal.
Handle special characters and numbers while reversing the string.
Ensure to consider the constraints on the length of the string and the
A deadlock is a situation in which two or more processes are unable to proceed because each is waiting for the other to release a resource.
Occurs in multitasking environments where processes compete for limited resources
Can be resolved using techniques like deadlock prevention, deadlock avoidance, and deadlock detection
Example: Process A holds Resource X and waits for Resource Y, while Process B holds Resource Y and wa
A thread is a lightweight sub-process that allows concurrent execution within a single process.
Threads share the same memory space within a process.
Threads are used to achieve parallelism and improve performance.
Examples of threads include the main thread in a program and worker threads in a multi-threaded application.
Multiprocessing involves multiple processors executing multiple tasks simultaneously, while multiprogramming involves multiple programs sharing a single processor by switching between them.
Multiprocessing utilizes multiple processors to execute multiple tasks concurrently.
Multiprogramming involves multiple programs sharing a single processor by switching between them.
Multiprocessing is more efficient in terms of perfor...
Process life cycle in an operating system involves creation, execution, termination, and resource management.
Creation: When a process is created, it is assigned a unique process ID and allocated necessary resources.
Execution: The process is then scheduled by the operating system to run on the CPU.
Termination: Once the process completes its task or is terminated by the user, it is removed from memory.
Resource Management...
Windows XP and Windows 7 are both operating systems developed by Microsoft, but they have several key differences.
User interface: Windows 7 has a more modern and user-friendly interface compared to Windows XP.
Performance: Windows 7 is generally faster and more stable than Windows XP.
Security: Windows 7 has more advanced security features and updates compared to Windows XP.
Hardware support: Windows 7 supports newer hard...
Round duration - 60 minutes
Round difficulty - Easy
Technical round with questions on DBMS and Networking mainly.
RDBMS is a type of DBMS that stores data in a structured format with relationships between tables.
RDBMS enforces referential integrity and allows for normalization of data.
DBMS is a general term for any system that manages databases, while RDBMS specifically refers to relational databases.
Examples of RDBMS include MySQL, Oracle, and SQL Server.
Examples of DBMS include MongoDB and Redis.
An Object-Oriented Database Management System (OODBMS) is a type of database management system that supports the creation and management of objects in a database.
OODBMS stores data in the form of objects, which can contain attributes and methods.
It allows for complex data structures and relationships to be represented more easily.
Examples of OODBMS include db4o, ObjectDB, and ObjectStore.
Use the COUNT DISTINCT function in SQL to find the number of unique values in a database.
Use the COUNT DISTINCT function along with the column name to count the number of unique values in that column.
For example, SELECT COUNT(DISTINCT column_name) FROM table_name;
You can also use GROUP BY to find the number of unique values for multiple columns.
A hub operates at the physical layer and broadcasts data to all devices on the network, while a switch operates at the data link layer and forwards data only to the intended recipient.
Hub operates at the physical layer, while switch operates at the data link layer
Hub broadcasts data to all devices on the network, while switch forwards data only to the intended recipient
Switch is more efficient and secure compared to a
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
Physical Layer: Deals with the physical connection between devices. Example: Ethernet cables.
Data Link Layer: Responsible for node-to-node communication. Example: MAC addresses.
Network Layer: Manages routing of data packets. Example: IP addresses.
T...
Different protocols supported at each OSI layer
Layer 1 (Physical): Ethernet, Wi-Fi, Bluetooth
Layer 2 (Data Link): MAC, PPP, HDLC
Layer 3 (Network): IP, ICMP, ARP
Layer 4 (Transport): TCP, UDP, SCTP
Layer 5 (Session): NetBIOS, PPTP
Layer 6 (Presentation): SSL, TLS
Layer 7 (Application): HTTP, FTP, SMTP
Round duration - 15 minutes
Round difficulty - Easy
IF you make it to the HR round you are selected. All 28 that attended got selected . It was more like stuff for formality. The usual questions.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Bubble sort has a worst-case and average complexity of O(n^2), where n is the number of items being sorted.
It is not efficient for large lists and is generally used for educational purposes.
Example: Sorting an array of strings in alphabetical order using bubble sort.
Auto and static are two storage classes in C. Auto variables are local to a function while static variables retain their value between function calls.
Auto variables are created when a function is called and destroyed when the function ends
Static variables are initialized only once and retain their value between function calls
Auto variables have garbage value if not initialized while static variables are initialized to
My strengths include problem-solving, attention to detail, and adaptability. My weaknesses include public speaking and impatience.
Strengths: problem-solving, attention to detail, adaptability
Weaknesses: public speaking, impatience
In 5 years, I see myself as a senior software developer leading a team of developers to create innovative solutions.
Leading a team of developers to create innovative solutions
Continuing to learn and stay up-to-date with the latest technologies
Contributing to the growth and success of the company
Mentoring and coaching junior developers
Taking on more responsibilities and challenges
I am interested in exploring new technologies and learning new programming languages.
Exploring new technologies
Learning new programming languages
Attending tech conferences and meetups
Contributing to open source projects
Yes, I am open to relocation for the right opportunity.
I am willing to relocate for the right job opportunity
I am open to exploring new cities and cultures
I am willing to consider relocation assistance
I am excited about the prospect of working in a new environment
Garbage collection is necessary to free up memory occupied by unused objects. Java uses automatic garbage collection.
Garbage collection helps prevent memory leaks and improves performance.
Java uses a mark-and-sweep algorithm to identify and remove unused objects.
The JVM periodically checks for unused objects and frees up memory occupied by them.
Developers can also manually trigger garbage collection using System.gc() m...
TCP is a connection-oriented protocol while UDP is connectionless.
TCP provides reliable data transfer while UDP does not guarantee reliability.
TCP uses flow control and congestion control while UDP does not.
TCP is slower than UDP due to the overhead of establishing and maintaining a connection.
UDP is faster than TCP for applications that can tolerate data loss such as video streaming or online gaming.
UDP is used in scenarios where speed is more important than reliability, such as online gaming and video streaming.
UDP is a connectionless protocol that does not guarantee delivery of packets
It is faster than TCP because it does not have to establish a connection before sending data
UDP is commonly used in online gaming, video streaming, and VoIP applications
It is also used for broadcasting and multicasting data to mult
The probability that three ants running on the edges of an equilateral triangle will never meet is 1/3.
The ants will never meet if they all move in the same direction (clockwise or counterclockwise) at the same speed.
The probability of this happening is 1/3, as each ant has two possible directions to choose from.
Example: If one ant starts moving clockwise, the other two ants must also move clockwise to never meet.
I am a software developer with experience in Java and Python.
I have a Bachelor's degree in Computer Science.
I have worked on various projects involving web development and data analysis.
I am proficient in Java and Python programming languages.
I am a quick learner and enjoy working in a team environment.
In 5 years, I see myself as a senior software developer leading a team of developers to create innovative solutions.
Leading a team of developers
Creating innovative solutions
Continuing to learn and grow as a developer
Contributing to the success of the company
Building strong relationships with colleagues and clients
Using Applied Electronics to prevent train accidents in IRCTC
Implement sensors to detect obstacles on tracks
Use GPS and communication systems to alert train drivers of potential dangers
Install automatic braking systems in case of emergency
Regular maintenance and inspection of tracks and trains
Train and educate staff on safety protocols and emergency procedures
IC 555 timer is a versatile timer IC used in various applications like oscillators, timers, and flip-flops.
IC 555 timer has three modes of operation: monostable, astable, and bistable.
In monostable mode, the output is high for a fixed duration when triggered.
In astable mode, the output oscillates between high and low states.
In bistable mode, the output remains in either high or low state until triggered.
IC 555 timer ca...
The internet is a global network of interconnected devices that communicate using standardized protocols.
The internet is based on the TCP/IP protocol suite.
Data is transmitted in packets across the network.
The network model consists of layers, including the physical, data link, network, transport, and application layers.
Routing protocols are used to direct packets to their destination.
Examples of internet applications ...
I am a software engineer with experience in developing web and mobile applications using various programming languages and frameworks.
Proficient in Java, Python, and JavaScript
Experience with React, Angular, and Node.js
Strong understanding of database management systems
Passionate about learning new technologies and solving complex problems
I was interviewed in Mar 2017.
To make the red fishes 98%, 50 fishes have to be removed from the aquarium.
Calculate 1% of 200 fishes, which is 2 fishes.
To make the red fishes 98%, subtract 1% (2 fishes) from 99% (198 fishes).
To find the number of fishes to be removed, divide the difference by 1% (2 fishes).
Therefore, 50 fishes have to be removed to make the red fishes 98%.
Accountant
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Development Engineer
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Service Engineer
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Ericsson
Nokia
ACT Fibernet
Huawei Technologies