Premium Employer

Micron Technology

3.7
based on 340 Reviews
Filter interviews by

40+ Sri Svr Lucky Housing Interview Questions and Answers

Updated 7 Nov 2024
Q1. Add K Nodes

You are given a Singly Linked List of integers and an integer 'K'.

Your task is to modify the linked list by inserting a new node after every 'K' node in the linked list with the node value being equ...read more

Add your answer
Q2. Nth Fibonacci Number

Nth term of Fibonacci series F(n), where F(n) is a function, is calculated using the following formula -

 F(n) = F(n-1) + F(n-2), Where, F(1) = F(2) = 1 

Provided N you have to find out the ...read more

View 3 more answers
Q3. Technical Questions

1. In detail about the OOPS concepts.
2. Inheritance types.
3. Explain static and dynamic memory allocation?
4. How to identify the head node in the Circular linked list?
5. What is join? Explain...read more

Add your answer
Q4. Count Set Bits

You are given a positive integer ‘N’. Your task is to find the total number of ‘1’ in the binary representation of all the numbers from 1 to N.

Since the count of ‘1’ can be huge, you are required...read more

View 2 more answers
Discover Sri Svr Lucky Housing interview dos and don'ts from real experiences
Q5. Technical Questions

Java:
1. In detail about the Oops concepts
2. Differences between Abstract class and Interface?
3. Differences between the real time examples of both Abstract Class and Interface?
4. What is recu...read more

Add your answer
Q6. Technical Questions

1. Explain how to find the distance between the points on the map in general terms?
2. Explain how a stack works?
3. What is normalisation? Briefly explain the normalisation types.
4. List OSI ...read more

Add your answer
Are these interview questions helpful?

Q7. Checking whether a fibonacci number is present between a particukar range (100 - 200)

Ans.

To check if a Fibonacci number is present between 100-200

  • Generate Fibonacci numbers until 200

  • Check if any number is between 100-200

  • Use dynamic programming to optimize Fibonacci generation

Add your answer

Q8. What is docker and why do we use it for containerising applications

Ans.

Docker is a platform for developing, shipping, and running applications in containers.

  • Docker allows applications to be isolated in containers, making them portable and easy to deploy across different environments.

  • Containers share the host OS kernel but run as isolated processes, providing lightweight and efficient virtualization.

  • Docker simplifies the process of packaging applications and their dependencies, ensuring consistency in development and production environments.

  • It en...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is database normalisation and how your project benefited from it in the past

Ans.

Database normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • Database normalization involves breaking down data into smaller, more manageable tables and defining relationships between them.

  • It helps in reducing data redundancy, improving data integrity, and making the database more efficient.

  • For example, in a project I worked on, we normalized the database by splitting customer information into a separate table linked t...read more

Add your answer

Q10. Convert a list of dictionaries to CSV in Python

Ans.

Convert a list of dictionaries to CSV in Python

  • Use the csv module to write to a file or StringIO object

  • Use the keys of the first dictionary as the header row

  • Loop through the list and write each dictionary as a row

Add your answer

Q11. Write a spark program to find the word with maximum length in a given string

Ans.

Use Spark program to find word with maximum length in a given string

  • Split the string into words using space as delimiter

  • Map each word to its length

  • Find the word with maximum length using reduce operation

Add your answer

Q12. Write an sql query to change rows into columns and vice versa

Ans.

Use SQL pivot function to change rows into columns and vice versa

  • Use the PIVOT function in SQL to transform rows into columns

  • Use the UNPIVOT function in SQL to transform columns into rows

  • Example: SELECT * FROM table_name PIVOT (SUM(value) FOR column_name IN (value1, value2, value3))

  • Example: SELECT * FROM table_name UNPIVOT (value FOR column_name IN (value1, value2, value3))

Add your answer

Q13. write an sql query to fetch duplicate rows in a table

Ans.

SQL query to fetch duplicate rows in a table

  • Use GROUP BY and HAVING clause to identify duplicate rows

  • Select columns to check for duplicates

  • Example: SELECT column1, column2, COUNT(*) FROM table_name GROUP BY column1, column2 HAVING COUNT(*) > 1;

Add your answer

Q14. diff between repartition and colaesce, clustering and partitioning in bq

Ans.

Repartition increases or decreases the number of partitions in a DataFrame, while coalesce only decreases the number of partitions. Clustering is used for organizing data within a partition, while partitioning is dividing data into logical units.

  • Repartition increases or decreases the number of partitions in a DataFrame, which can be useful for parallelism and performance optimization.

  • Coalesce only decreases the number of partitions in a DataFrame, which is more efficient than...read more

Add your answer

Q15. What is partitioning in Hive?

Ans.

Partitioning in Hive is a way of dividing a large table into smaller, more manageable parts based on a specific column.

  • Partitioning improves query performance by reducing the amount of data that needs to be scanned.

  • Partitions can be based on date, region, or any other relevant column.

  • Hive supports both static and dynamic partitioning.

  • Partitioning can be done on external tables as well.

Add your answer

Q16. What you will do with huge volume of data.

Ans.

I will use various techniques like data preprocessing, storage optimization, and distributed computing to handle and analyze the huge volume of data.

  • Implement data preprocessing techniques like data cleaning, data transformation, and data integration to ensure data quality.

  • Utilize storage optimization techniques like data compression and partitioning to efficiently store and retrieve large volumes of data.

  • Leverage distributed computing frameworks like Hadoop or Spark to proce...read more

Add your answer

Q17. Process simplifiction, Reason for job change

Ans.

I am looking for a new challenge and opportunity to simplify processes.

  • I have always been passionate about finding ways to streamline processes and increase efficiency.

  • In my previous role, I implemented a new software system that reduced manual data entry by 50%.

  • I am excited about the prospect of joining a team that values innovation and continuous improvement.

  • I believe that simplifying processes not only saves time and resources, but also leads to better outcomes for custome...read more

Add your answer

Q18. Garbage Collection in Java SQL queries

Ans.

Garbage collection in Java is an automatic process of freeing up memory by removing unused objects.

  • Java uses a mark-and-sweep algorithm for garbage collection

  • Objects that are no longer referenced by any part of the program are eligible for garbage collection

  • System.gc() can be used to suggest garbage collection, but it is not guaranteed to run immediately

  • Garbage collection can cause performance issues if not managed properly

Add your answer

Q19. how to predict if a 32 bit number is divisible by 8, draw a circuit using gates

Ans.

To predict if a 32 bit number is divisible by 8, design a circuit using gates.

  • Use a circuit with AND, OR, and NOT gates to check if the last three bits of the number are all zeros.

  • If the last three bits are zeros, then the number is divisible by 8.

  • For example, if the 32 bit number is 11010000, the last three bits are zeros, so it is divisible by 8.

Add your answer

Q20. Explain the Masters Thesis Project in detail. What is CNF and DNF ? How project is relevant to Binarized Neural Network ? Other questions were C language related.

Ans.

Master's thesis project focused on CNF and DNF in relation to Binarized Neural Networks.

  • CNF stands for Conjunctive Normal Form and DNF stands for Disjunctive Normal Form.

  • CNF is a conjunction of clauses, while DNF is a disjunction of clauses.

  • Binarized Neural Networks use binary values (0 or 1) for weights and activations to reduce memory and computation requirements.

  • The project likely explored how CNF and DNF can be used in the context of Binarized Neural Networks to optimize ...read more

Add your answer

Q21. How would you troubleshoot your application after deploying

Ans.

I would start by checking the application logs, verifying configurations, and testing different scenarios.

  • Check application logs for any errors or warnings

  • Verify configurations to ensure they are correct

  • Test different scenarios to replicate the issue

  • Use monitoring tools to track performance metrics

  • Collaborate with team members to troubleshoot and find solutions

Add your answer

Q22. Define inventory policy and inventory control method

Ans.

Inventory policy is a set of guidelines for managing inventory levels, while inventory control method is the process of implementing those guidelines.

  • Inventory policy determines when to order new inventory and how much to order

  • Inventory control method involves tracking inventory levels, forecasting demand, and optimizing order quantities

  • Examples of inventory policies include Just-in-Time (JIT) and Economic Order Quantity (EOQ)

  • Examples of inventory control methods include ABC ...read more

Add your answer

Q23. what is the difference between == and === in Verilog

Add your answer

Q24. How to decrease the leakage happened in DRAM

Add your answer

Q25. Finding kth largest element in array

Ans.

Finding kth largest element in array

  • Sort the array in descending order and return the element at index k-1

  • Use a max heap to find the kth largest element

  • Implement quickselect algorithm to find the kth largest element

Add your answer

Q26. difference between interface and class in java

Ans.

In Java, a class is a blueprint for creating objects, while an interface is a reference type similar to a class that can contain only constants, method signatures, default methods, static methods, and nested types.

  • Classes can have constructors, fields, methods, and can be instantiated to create objects.

  • Interfaces cannot be instantiated and can only contain method signatures and constants.

  • A class can implement multiple interfaces, but can only extend one class.

  • Interfaces are u...read more

Add your answer

Q27. The basic operation of the DRAM

Add your answer

Q28. What is confusion matrix

Ans.

A confusion matrix is a table that is often used to describe the performance of a classification model.

  • It is a matrix with rows representing the actual class and columns representing the predicted class.

  • It helps in evaluating the performance of a classification model by showing the number of correct and incorrect predictions.

  • It consists of four quadrants: True Positive, False Positive, True Negative, and False Negative.

  • It is commonly used in machine learning and statistics to...read more

Add your answer

Q29. What is reverse logistics

Ans.

Reverse logistics is the process of moving goods from their final destination back to the manufacturer or point of origin for resale, recycling, or disposal.

  • Involves returning products from customers to the manufacturer or retailer

  • Includes activities such as returns, refurbishment, recycling, or disposal

  • Helps in reducing waste and maximizing value from returned products

  • Examples: returning a defective product to the manufacturer, recycling electronic devices

Add your answer

Q30. Write Amplification, Wear leveling basics

Ans.

Write amplification is the ratio of data written to the SSD to the actual data written by the host. Wear leveling is a technique to distribute write and erase cycles evenly across all blocks of flash memory.

  • Write amplification is a measure of how much data is written to the SSD compared to the actual data written by the host.

  • Wear leveling is a technique used to distribute write and erase cycles evenly across all blocks of flash memory to extend the lifespan of the SSD.

  • Example...read more

Add your answer

Q31. difference between interface and abstract class

Ans.

Interface is a contract that defines the methods a class must implement, while abstract class can have both implemented and abstract methods.

  • Interface can only have abstract methods and constants, while abstract class can have both implemented and abstract methods.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Interfaces are used to achieve multiple inheritance in Java, while abstract classes are used to provide a common base for subcla...read more

Add your answer

Q32. repartition and coalesce difference

Ans.

Repartition increases or decreases the number of partitions in a DataFrame, while coalesce only decreases the number of partitions.

  • Repartition involves shuffling data across the network, while coalesce tries to minimize shuffling by only creating new partitions if necessary.

  • Repartition is typically used when increasing the number of partitions for parallelism, while coalesce is used when decreasing partitions to optimize performance.

  • Example: df.repartition(10) vs df.coalesce(...read more

Add your answer

Q33. List of lists and table updation

Ans.

Updating a list of lists and table in a structured manner.

  • Create a list of lists to store multiple lists of data.

  • Update the lists within the main list as needed.

  • Use a table structure to organize and display the data.

  • Update the table with the latest information from the lists.

Add your answer

Q34. Define principle component analysis

Ans.

Principal component analysis is a statistical technique used to reduce the dimensionality of data while preserving important information.

  • PCA is used to identify patterns in data and express it in a more easily understandable form.

  • It works by finding the directions (principal components) along which the variance of the data is maximized.

  • These principal components are orthogonal to each other, meaning they are uncorrelated.

  • PCA is commonly used in data visualization, noise reduc...read more

Add your answer

Q35. OOP concepts with example code

Ans.

OOP concepts involve encapsulation, inheritance, and polymorphism in object-oriented programming.

  • Encapsulation: bundling data and methods that operate on the data into a single unit (class). Example: class Car { private String color; public void setColor(String c) { color = c; } }

  • Inheritance: creating new classes based on existing classes, inheriting their attributes and methods. Example: class SUV extends Car { private boolean offRoad; }

  • Polymorphism: ability for objects of d...read more

Add your answer

Q36. IV characterstics of CMOS inverter

Ans.

IV characteristics of CMOS inverter show the relationship between input voltage and output current.

  • CMOS inverter has two transistors - NMOS and PMOS connected in series.

  • For low input voltage, NMOS is ON and PMOS is OFF, resulting in low output voltage.

  • For high input voltage, NMOS is OFF and PMOS is ON, resulting in high output voltage.

  • The transition between low and high output voltage occurs at the threshold voltage.

  • The IV curve is symmetrical around the threshold voltage.

Add your answer

Q37. What does Micron do ?

Ans.

Micron is a global leader in memory and storage solutions, providing innovative products for a wide range of applications.

  • Micron manufactures memory and storage products such as DRAM, NAND, and SSDs.

  • They cater to various industries including data centers, automotive, consumer electronics, and more.

  • Micron focuses on developing cutting-edge technologies to meet the growing demands of the digital world.

Add your answer

Q38. Set up and hold time explain

Ans.

Set up time and hold time are timing requirements in digital circuits to ensure proper operation.

  • Set up time is the minimum time before the clock edge that the input signal must be stable.

  • Hold time is the minimum time after the clock edge that the input signal must be maintained stable.

  • Violating set up time can lead to incorrect data being latched.

  • Violating hold time can lead to metastability issues.

  • Examples: In a flip-flop, set up time is the time before the clock edge that ...read more

Add your answer

Q39. print the binary tree in different order

Ans.

Printing a binary tree in different orders

  • Use inorder traversal to print the binary tree in ascending order

  • Use preorder traversal to print the binary tree in root-left-right order

  • Use postorder traversal to print the binary tree in left-right-root order

Add your answer

Q40. Swap bits from 1 and 4 position

Ans.

To swap bits from 1 and 4 position, we need to use bitwise operators.

  • Use bitwise AND operator with 0x0E to get the value of the 4th bit.

  • Use bitwise AND operator with 0x01 to get the value of the 1st bit.

  • Use bitwise XOR operator to swap the values of the 1st and 4th bits.

  • Use bitwise OR operator to combine the swapped bits with the remaining bits.

Add your answer

Q41. What is normalization

Ans.

Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • Normalization is used to eliminate data redundancy by breaking up tables into smaller, related tables.

  • It helps in reducing data anomalies such as insertion, update, and deletion anomalies.

  • Normalization is achieved through a series of stages called normal forms, with the most common being First Normal Form (1NF), Second Normal Form (2NF), and Third Normal Form (3NF).

Add your answer

Q42. use of volatile const ?

Ans.

Volatile const is used to indicate that a variable's value may change outside the program's control.

  • Volatile const is used for hardware registers that can change their value without the program's knowledge.

  • It is also used for variables that are accessed by multiple threads.

  • Example: volatile const int* const ptr = (int*)0x1234; // pointer to a hardware register

Add your answer

Q43. CMOS inverter and it's working

Ans.

A CMOS inverter is a type of digital logic gate that switches between high and low voltage levels.

  • CMOS stands for Complementary Metal-Oxide-Semiconductor

  • It consists of a PMOS (p-type metal-oxide-semiconductor) and NMOS (n-type metal-oxide-semiconductor) transistor connected in series

  • When the input is high, the PMOS transistor conducts and the output is low

  • When the input is low, the NMOS transistor conducts and the output is high

  • CMOS inverters are widely used in digital integr...read more

Add your answer

Q44. Password less ssh between machine

Ans.

Passwordless SSH allows for secure and convenient access between machines.

  • Generate SSH key pair on local machine using ssh-keygen command

  • Copy public key to remote machine's authorized_keys file

  • Ensure correct permissions on .ssh directory and authorized_keys file

  • Test SSH connection without password prompt

Add your answer

Q45. What is Adaboost?

Ans.

Adaboost is a machine learning algorithm that combines multiple weak learners to create a strong learner.

  • Adaboost stands for Adaptive Boosting.

  • It works by adjusting the weights of incorrectly classified instances so that subsequent weak learners focus more on them.

  • The final prediction is made by combining the predictions of all the weak learners, weighted by their accuracy.

  • Example: Adaboost is commonly used in face detection algorithms.

Add your answer

Q46. what is semi conductor

Ans.

A semiconductor is a material that has electrical conductivity between that of a conductor and an insulator.

  • Semiconductors are used in electronic devices such as transistors, diodes, and integrated circuits.

  • They have a band gap that allows them to selectively conduct electricity.

  • Common examples of semiconductors include silicon, germanium, and gallium arsenide.

Add your answer

Q47. explain CMOS inverter?

Ans.

CMOS inverter is a type of digital logic gate that implements logical NOT operation.

  • CMOS inverter consists of a PMOS transistor connected in series with an NMOS transistor.

  • When input is high, PMOS conducts and NMOS is off, output is low.

  • When input is low, NMOS conducts and PMOS is off, output is high.

  • CMOS inverters are widely used in digital circuits for logic operations.

  • Example: Inverter gate in a CMOS technology-based integrated circuit.

Add your answer

Q48. Code for armstrong alogrithm

Ans.

Armstrong algorithm is used to find Armstrong numbers in a given range.

  • Iterate through the numbers in the given range

  • Calculate the sum of cubes of each digit in the number

  • Check if the sum is equal to the original number

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Sri Svr Lucky Housing

based on 42 interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 3.9k Interview Questions
3.7
 • 2.8k Interview Questions
4.0
 • 613 Interview Questions
4.2
 • 268 Interview Questions
4.1
 • 146 Interview Questions
4.0
 • 135 Interview Questions
View all
Top Micron Technology Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter