i
MosChip Technologies
Filter interviews by
Clear (1)
Basic aptitude and basic C programming
Top trending discussions
Precompilation unit is a compiled code that can be reused by multiple source files.
Precompilation unit is created by the compiler from the source code.
It contains the compiled code of header files and other dependencies.
It can be reused by multiple source files, reducing compilation time.
It is also known as precompiled header or PCH.
Example: stdafx.h in Visual Studio is a precompiled header file.
posted on 15 Feb 2016
The first 50 prime numbers are...
Start with 2, the first prime number
Check each odd number greater than 2
Use trial division to check if a number is prime
Stop when you have found 50 prime numbers
Sorting a file within a range
Use a sorting algorithm like quicksort or mergesort
Read the file and store the data in an array or list
Sort the array or list within the given range
Write the sorted data back to the file
I am a passionate software engineer with experience in developing web applications using various technologies.
Experienced in developing web applications using HTML, CSS, JavaScript, and frameworks like React and Angular
Proficient in backend development with Node.js, Express, and MongoDB
Familiar with version control systems like Git and project management tools like Jira
posted on 27 Dec 2015
I am a passionate software engineer with experience in developing web applications and a strong background in computer science.
Experienced in developing web applications using technologies such as HTML, CSS, JavaScript, and React
Strong background in computer science with knowledge in algorithms and data structures
Passionate about learning new technologies and solving complex problems
I have worked on various projects including a web application for inventory management and a mobile app for fitness tracking.
Developed a web application using React for inventory management
Created a mobile app using Flutter for fitness tracking
Implemented RESTful APIs for communication between frontend and backend systems
My area of interest is artificial intelligence and machine learning.
I have experience in developing machine learning models for predictive analytics.
I am interested in natural language processing and computer vision applications.
I enjoy exploring deep learning algorithms and neural networks.
I have worked on projects involving recommendation systems and image recognition.
C++ is a high-level programming language with features like object-oriented programming, templates, and memory management.
C++ supports object-oriented programming concepts like encapsulation, inheritance, and polymorphism.
Templates allow generic programming and code reusability.
C++ provides low-level memory manipulation through pointers.
Standard Template Library (STL) provides a collection of classes and functions for ...
Big Data refers to large and complex data sets that cannot be processed using traditional data processing methods.
Big Data is characterized by the 3Vs - Volume, Velocity, and Variety.
It requires specialized tools and technologies such as Hadoop, Spark, and NoSQL databases.
Examples of Big Data include social media data, sensor data, and financial market data.
Program to reverse a string without using string function
Iterate through the string from end to start and append each character to a new string
Use a loop to swap the first and last characters, then move towards the middle until the entire string is reversed
Convert the string to a character array, then swap the first and last elements until the entire array is reversed
I was responsible for designing and implementing the project's database and backend functionality.
Designed the database schema and created the necessary tables
Implemented the backend functionality using Java and Spring framework
Collaborated with team members to integrate the frontend and backend components
Tested the application and fixed any bugs or issues that arose
Presented the project to the faculty and received pos
Keys in a database are unique identifiers used to establish relationships between tables and ensure data integrity.
Keys are used to uniquely identify records in a database table.
Primary keys are used to uniquely identify each record in a table.
Foreign keys establish relationships between tables.
Keys help enforce data integrity and maintain consistency in the database.
Examples of keys include primary keys, foreign keys,
Issues in cloud include security, downtime, vendor lock-in, and data privacy.
Security concerns such as data breaches and unauthorized access
Downtime and service interruptions affecting business operations
Vendor lock-in and limited flexibility in choosing cloud providers
Data privacy and compliance with regulations such as GDPR and HIPAA
Developed a web application for online shopping using React and Node.js
Implemented user authentication and authorization using JSON Web Tokens (JWT)
Used MongoDB as the database to store user and product information
Implemented a search feature using Elasticsearch to provide fast and accurate search results
Integrated Stripe payment gateway for secure online transactions
The flow diagram of my final year project showcases the step-by-step process of its execution.
The flow diagram illustrates the sequence of activities and their dependencies.
It helps in understanding the overall structure and logic of the project.
Each step in the diagram represents a specific task or action.
Arrows indicate the flow of control or data between different steps.
Decision points are represented by diamond-sha...
Normalisation reduces data redundancy and improves data integrity in a database.
Prevents data duplication and inconsistencies
Simplifies database maintenance and updates
Improves query performance
Enforces data integrity and consistency
Follows best practices for database design
Examples: breaking down a customer table into separate tables for orders, addresses, and payments
Examples: creating a separate table for product ca...
I am a passionate software engineer with experience in developing web applications and a strong background in computer science.
Experienced in developing web applications using technologies like HTML, CSS, JavaScript, and React
Strong background in computer science with knowledge of algorithms and data structures
Familiar with agile development methodologies and version control systems like Git
I am a problem solver, team player, quick learner, detail-oriented, and have strong communication skills.
Problem solver - I enjoy tackling complex problems and finding innovative solutions.
Team player - I work well with others and value collaboration in achieving goals.
Quick learner - I am able to pick up new technologies and concepts quickly.
Detail-oriented - I pay attention to the smallest details to ensure high-qual...
Yes, I have a Bachelor's degree in Computer Engineering.
Bachelor's degree in Computer Engineering
Experience in software development
Knowledge of engineering principles applied to software design
My day was productive and challenging, with a lot of problem-solving and collaboration.
Completed a major coding project ahead of schedule
Participated in a brainstorming session with team members
Solved a tricky bug in the codebase
Attended a virtual meeting with stakeholders
No, I do not have any relatives in Pune. I have arranged for my accommodation in a rented apartment near the office.
No relatives in Pune
Accommodation arranged in a rented apartment near the office
Yes, My Passion Challenge test is a coding competition for software engineers.
My Passion Challenge test is a coding competition that evaluates the coding skills of software engineers.
It is designed to test problem-solving abilities, algorithmic thinking, and coding proficiency.
Participants are given a set of coding challenges to solve within a specified time limit.
The challenges can range from simple to complex, coveri...
Considering pursuing a Master's degree in Computer Science to deepen knowledge and advance career.
Considering pursuing a Master's degree in Computer Science
To deepen knowledge and advance career
Examples: MS in Computer Science at XYZ University, online courses in AI and Machine Learning
I was interviewed before May 2016.
posted on 17 Aug 2016
I was interviewed in Jan 2016.
Machine learning is a subset of artificial intelligence that enables machines to learn from data without being explicitly programmed.
It involves training algorithms on large datasets to make predictions or decisions.
It can be supervised, unsupervised, or semi-supervised.
Examples include image recognition, natural language processing, and recommendation systems.
Prediction uses data analysis and statistical models to forecast future outcomes.
Prediction involves collecting and analyzing data to identify patterns and trends.
Statistical models are then used to make predictions based on the identified patterns.
Predictions can be made for a wide range of applications, such as weather forecasting, stock market trends, and customer behavior.
Accuracy of predictions can be improved by ...
Classification algorithms can be represented using flow charts.
Classification algorithms are used to categorize data into different classes.
Flow charts can be used to represent the decision-making process of classification algorithms.
Examples of classification algorithms include decision trees, k-nearest neighbors, and support vector machines.
Deadlocks are situations where two or more processes are unable to proceed because each is waiting for the other to release a resource.
Deadlocks occur when multiple processes are stuck in a circular waiting state.
Prevention techniques include resource allocation strategies, deadlock detection, and avoidance algorithms.
Examples of prevention techniques are using a resource allocation graph, implementing a banker's algor...
Banker's algorithm is a resource allocation and deadlock avoidance algorithm used in operating systems.
It is used to prevent deadlocks by ensuring that the system never enters an unsafe state.
It works by simulating the allocation of resources and checking if the system will remain in a safe state.
It requires knowledge of the maximum resource needs of each process and the currently available resources.
If a request for r...
Public and private IP addresses are used in computer networks. Public IPs are globally unique and accessible from the internet, while private IPs are used within a local network.
Public IP is assigned by the Internet Service Provider (ISP) and is used to identify a device on the internet.
Private IP is assigned by a local network administrator and is used to identify a device within a local network.
Public IPs are globall...
A message is transferred in OSI layer through a process called encapsulation and decapsulation.
The message is divided into smaller chunks called packets at the transport layer.
Each packet is then encapsulated with headers containing necessary information.
The encapsulated packets are then passed down to the network layer.
At the network layer, the packets are further encapsulated with network layer headers.
The encapsulat...
Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as the same type.
Polymorphism is achieved through method overriding and method overloading.
It allows for code reusability and flexibility in object-oriented programming.
Three conditions for polymorphism are inheritance, method overriding, and a common interface or base class.
Interoperability in inheritance and polymorphism allows objects of different classes to be used interchangeably.
Inheritance allows a subclass to inherit properties and methods from a superclass.
Polymorphism allows objects of different classes to be treated as if they are of the same class.
Interoperability between inheritance and polymorphism allows objects of different classes to be used interchangeably.
For example, a ...
Transaction logs are records of all the changes made to a database or file system.
They help in recovering data in case of system failure or errors.
They provide a history of all the transactions made to the database or file system.
They are used for auditing and compliance purposes.
Examples include SQL Server transaction logs, file system transaction logs, etc.
C is a procedural programming language while C++ is an object-oriented programming language.
C is a procedural programming language, meaning it focuses on procedures or functions.
C++ is an extension of C and adds object-oriented features like classes and inheritance.
C++ supports polymorphism, encapsulation, and abstraction, which C lacks.
C++ allows the use of standard template library (STL) for data structures and algor...
I have worked on various technologies including Java, Python, and SQL.
Java - used for developing enterprise-level applications
Python - used for scripting, web development, and data analysis
SQL - used for managing and querying databases
Thrashing is a phenomenon in computer systems where excessive swapping of data between RAM and virtual memory occurs.
Occurs when a computer spends more time swapping data between RAM and virtual memory than executing actual tasks
Can be caused by insufficient RAM or poorly optimized programs
Can lead to a significant decrease in system performance
Example: A computer running multiple memory-intensive programs simultaneous
Java is platform independent while C++ is not.
Java code is compiled into bytecode which can run on any platform with a JVM, while C++ code needs to be compiled separately for each platform.
Java has automatic memory management through garbage collection, while C++ requires manual memory management.
Java has built-in support for multithreading, while C++ requires external libraries.
Java has a simpler syntax and is easier ...
Persistence is important for storing data permanently and ensuring data integrity.
Persistent storage allows data to be saved even after the application is closed or the system is restarted.
It ensures data integrity by preventing data loss in case of system failures.
Persistent data can be accessed and shared across different sessions or devices.
Examples: databases, file systems, cloud storage.
I found the GD to be well-organized and productive.
The GD had a clear agenda and all participants were given equal opportunity to express their views.
The facilitator ensured that the discussion stayed on track and encouraged active participation.
I appreciated the diverse perspectives brought by the participants, which enriched the discussion.
Examples: One of the participants shared a real-life case study that added dep...
I rate my HR interview as positive overall, with room for improvement in certain areas.
Overall, I felt the HR interview was well-structured and professional.
I appreciated the opportunity to discuss my skills and experiences in depth.
However, I felt that some questions were repetitive and could have been more engaging.
I believe the interview process could benefit from more focus on technical skills and problem-solving a...
I would recommend John and Sarah for their strong technical skills and ability to work well in a team.
John has a deep understanding of algorithms and data structures, and consistently delivers high-quality code.
Sarah is a quick learner and has a knack for problem-solving, often coming up with innovative solutions.
Both John and Sarah have excellent communication skills and collaborate effectively with their peers.
I applied via Naukri.com and was interviewed before Mar 2021. There were 4 interview rounds.
Technical and aptitude questions
based on 1 interview
Interview experience
Embedded Software Engineer
88
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Embedded Software Engineer
26
salaries
| ₹0 L/yr - ₹0 L/yr |
Physical Design Engineer
23
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
21
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Engineer
20
salaries
| ₹0 L/yr - ₹0 L/yr |
Sasken
Einfochips
KPIT Technologies
Mindteck