Nokia
100+ BMW Industries Interview Questions and Answers
Q1. What is Stack? What are the applications of Stack? Fibonacci Series code.
A stack is a linear data structure that follows the Last-In-First-Out (LIFO) principle.
Applications include function call stack, undo-redo operations, infix to postfix conversion, and backtracking algorithms.
Push and pop operations are used to add and remove elements from the stack, respectively.
Fibonacci series can be implemented using a stack or recursion.
Stacks can be implemented using arrays or linked lists.
Q2. How could you solve problem of customer without customer care help?
By providing self-service options and resources, such as FAQs and online documentation.
Create a comprehensive FAQ section on the company's website
Develop an online knowledge base with step-by-step guides and troubleshooting tips
Offer live chat support with automated responses and chatbots
Provide video tutorials and instructional videos
Implement a community forum where customers can help each other
Q3. IMS call flow in depth. SIP call flow in depth sip header/body. Questions was from SDM like architecture etc.. 5G architecture call flow etc..
Explanation of IMS and SIP call flows, SDM and 5G architecture
IMS call flow involves registration, session establishment, media negotiation, and termination
SIP call flow includes INVITE, 100 Trying, 180 Ringing, 200 OK, ACK, and BYE messages
SDM architecture includes HSS, PCRF, and OCS components for subscriber data management
5G architecture includes gNB, AMF, SMF, UPF, and UDM components for network slicing and service delivery
Q4. Design a small module that handles the requests and responses in java.
Design a module in Java to handle requests and responses.
Create a class to handle incoming requests and process them
Use interfaces to define request and response structures
Implement methods to handle different types of requests
Use libraries like Spring MVC for handling HTTP requests
Q5. What is the performance payroll management?
Performance payroll management refers to the process of effectively managing and evaluating the performance of employees in relation to their payroll.
It involves setting performance goals and objectives for employees.
It includes monitoring and tracking employee performance on a regular basis.
Performance payroll management may involve conducting performance appraisals and evaluations.
It can also involve linking performance to compensation and rewards.
Effective performance payr...read more
Q6. Draw the architecture of Microprocessor and explain the working, with an example of adding two numbers
The microprocessor is the central processing unit (CPU) of a computer system, responsible for executing instructions.
Microprocessor is an integrated circuit that contains the arithmetic logic unit (ALU), control unit, and registers.
It fetches instructions from memory, decodes them, and executes them.
Example: To add two numbers, the microprocessor fetches the instruction, loads the numbers from memory, performs the addition in the ALU, and stores the result in memory.
The micro...read more
Q7. 1. What is the difference between classical java based web site and a web site built on node js? 2. Where does javascript run? 3. What are fundamentals of node js? 4. Docker explanation? 5. what are several way...
read moreAnswers to Solution Architect interview questions
Classical Java web sites use servlets and JSPs, while Node.js uses event-driven, non-blocking I/O model
JavaScript runs on the client-side in web browsers and on the server-side in Node.js
Fundamentals of Node.js include event-driven architecture, non-blocking I/O, and the use of modules
Docker is a containerization platform that allows for easy deployment and scaling of applications
Ways to build device-agnostic applications inclu...read more
Q8. How to find if there is cycle in linkedlist, left view of tree, Comparator vs Comparable in Java, internal implementation of Hashmap
To find if there is a cycle in a linked list, left view of a tree, Comparator vs Comparable in Java, and internal implementation of Hashmap.
To find a cycle in a linked list, you can use Floyd's Tortoise and Hare algorithm.
To get the left view of a tree, you can perform a level order traversal and print the first node at each level.
Comparator in Java is used to compare objects based on custom criteria, while Comparable is an interface used to define natural ordering of objects...read more
Q9. Which technical books you read?
I have read several technical books on programming languages, algorithms, and software design.
Clean Code by Robert C. Martin
The Pragmatic Programmer by Andrew Hunt and David Thomas
Cracking the Coding Interview by Gayle Laakmann McDowell
Design Patterns: Elements of Reusable Object-Oriented Software by Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides
Q10. Why OFDMA technique used in LTE?
OFDMA is used in LTE to improve spectral efficiency and support multiple users simultaneously.
OFDMA allows for multiple users to share the same frequency band by dividing it into smaller subcarriers.
It also enables dynamic allocation of subcarriers to users based on their bandwidth requirements.
This results in better spectral efficiency and higher data rates.
OFDMA is also resistant to interference and fading, making it suitable for wireless communication.
LTE uses a variation ...read more
Q11. How do you sale nokia phone to that customer who wants another company
To sell a Nokia phone to a customer who wants another company, highlight Nokia's unique features, benefits, and value proposition.
Emphasize Nokia's superior build quality and durability
Highlight Nokia's long-lasting battery life and reliable performance
Showcase Nokia's user-friendly interface and intuitive features
Demonstrate Nokia's exceptional camera capabilities and imaging technology
Offer competitive pricing and attractive discounts or promotions
Q12. Methodologies and practices used to manage projects where investigated and cross questioned
Various methodologies and practices are utilized to effectively manage projects, including Agile, Waterfall, Scrum, and Kanban.
Agile methodology focuses on iterative development and collaboration between cross-functional teams.
Waterfall methodology follows a linear sequential flow, with each phase dependent on the deliverables of the previous one.
Scrum is a framework that emphasizes teamwork, accountability, and iterative progress towards a well-defined goal.
Kanban is a visua...read more
Q13. What is electrical machine . State ohms law . Define kvl and kcl etc
An electrical machine is a device that converts electrical energy into mechanical energy or vice versa. Ohm's Law relates voltage, current, and resistance. KVL and KCL are laws used in circuit analysis.
Electrical machine is a device that converts electrical energy into mechanical energy or vice versa
Ohm's Law states that the current flowing through a conductor is directly proportional to the voltage applied across it and inversely proportional to the resistance of the conduct...read more
Q14. What is clamp meter and teco meter , what is capacitance
A clamp meter is a tool used to measure electrical current without the need to disconnect the circuit, while a teco meter is used to measure the speed of an electric motor. Capacitance is the ability of a component to store electrical charge.
Clamp meter is used to measure electrical current in a conductor without the need for direct contact.
Teco meter is used to measure the speed of an electric motor.
Capacitance is the ability of a component to store electrical charge, measur...read more
Q15. Do you know rules and regulations of Japan
Yes, I am familiar with the rules and regulations of Japan.
Japan has strict laws regarding drug possession and trafficking
The legal age for drinking and smoking is 20 years old
Japan has a strict recycling system
Foreigners are required to carry their passport at all times
There are strict rules regarding noise pollution and public behavior
Q16. difference between foreign key and primary key
Primary key uniquely identifies a record in a table, while foreign key refers to a field in another table.
Primary key is used to enforce data integrity and ensure uniqueness of records.
Foreign key is used to establish a relationship between two tables.
A table can have only one primary key, while it can have multiple foreign keys.
Primary key is always indexed, while foreign key may or may not be indexed.
Example: In a database of students and courses, the student ID can be the ...read more
Q17. if you have penalty charged in the project. how will the revenue be impacted.
Penalty charged in a project can impact revenue negatively.
Penalties reduce the overall revenue generated from the project.
The amount of penalty charged will directly reduce the revenue earned.
Penalties can result in a decrease in profit margin.
Revenue impact depends on the severity and frequency of penalties.
Penalties may also affect the reputation of the company, leading to potential loss of future business.
Q18. What language you prefer? OOPS in your preferred langauage.
I prefer Java for its strong OOP principles and widespread use in industry.
Java is my preferred language for its object-oriented programming capabilities.
I appreciate Java's encapsulation, inheritance, and polymorphism features.
Examples of OOP in Java include creating classes, objects, and implementing interfaces.
Q19. How are micro services different from monolithic model?
Microservices are smaller, independent services that work together, while monolithic model is a single, large application.
Microservices are smaller, independent services that can be developed, deployed, and scaled independently.
Monolithic model is a single, large application where all components are tightly coupled.
Microservices communicate with each other through APIs, while monolithic applications use in-process communication.
Microservices allow for better fault isolation a...read more
Q20. The microprocessor kit which you used was …
Q21. How the values are stored in registers?
Q22. How many types of company product
There are multiple types of company products depending on the industry and market.
The types of company products vary depending on the industry and market.
Some companies may have multiple product lines or categories.
Examples of product types include physical goods, digital products, and services.
Companies may also have different product offerings for different customer segments.
The number of product types can range from a few to hundreds or even thousands.
Q23. What is renewable energy and non renewable energy sources.
Renewable energy sources are sources of energy that are replenished naturally, such as sunlight, wind, and water. Non-renewable energy sources are sources that cannot be easily replenished, such as fossil fuels.
Renewable energy sources include solar power, wind power, hydropower, and geothermal energy
Non-renewable energy sources include coal, oil, and natural gas
Renewable energy is sustainable and environmentally friendly, while non-renewable energy contributes to pollution a...read more
Q24. 1. Create Singleton class 2. Filter duplicate using java 8 stream
Create Singleton class and filter duplicates using Java 8 stream.
To create a Singleton class, make the constructor private and provide a static method to get the instance.
To filter duplicates using Java 8 stream, use the distinct() method.
Example: String[] array = {"apple", "banana", "apple", "orange"}; List
distinctList = Arrays.stream(array).distinct().collect(Collectors.toList());
Q25. what is garbage collection?
Garbage collection is an automatic memory management process that frees up memory occupied by objects that are no longer in use.
Garbage collection is a process of identifying and freeing up memory that is no longer in use by the program.
It helps prevent memory leaks and improves program performance.
Examples of garbage collection include Java's automatic garbage collection and Python's reference counting and garbage collection.
Garbage collection can be done using different alg...read more
Q26. Tools which you aware in Data Mining
Data mining tools include RapidMiner, Weka, and KNIME.
RapidMiner: a powerful open-source data mining tool with a user-friendly interface.
Weka: a collection of machine learning algorithms for data mining tasks.
KNIME: an open-source data analytics platform with a visual workflow editor.
Other tools: SAS Enterprise Miner, IBM SPSS Modeler, Python libraries like scikit-learn and TensorFlow.
Q27. how can you implement oops using python?
Python supports object-oriented programming through classes and objects.
Define a class using the 'class' keyword
Create objects of the class using the class name followed by parentheses
Use inheritance, encapsulation, and polymorphism to implement OOP concepts
Example: class Person: def __init__(self, name, age): self.name = name self.age = age person1 = Person('Alice', 30)
Q28. What is massive MIMO?
Massive MIMO stands for Massive Multiple Input Multiple Output. It is a wireless communication technology that uses a large number of antennas at the base station to improve network performance.
Massive MIMO uses a large number of antennas at the base station to improve network performance.
It can significantly increase the capacity and coverage of wireless networks.
It works by using spatial multiplexing to transmit multiple data streams simultaneously.
Massive MIMO is a key tec...read more
Q29. How to avoid overfitting of ML model?
To avoid overfitting of ML model, use techniques like cross-validation, regularization, early stopping, and increasing training data.
Use cross-validation to evaluate model performance on different subsets of data.
Apply regularization techniques like L1 or L2 regularization to penalize complex models.
Implement early stopping to prevent the model from training for too long and overfitting.
Increase training data to provide more diverse examples for the model to learn from.
Q30. How microprocessor will respond you?
A microprocessor responds to instructions by executing them and producing the desired output.
A microprocessor executes instructions stored in its memory.
It fetches the instruction from memory, decodes it, and executes it.
The response can be in the form of performing arithmetic or logical operations, accessing memory or I/O devices, etc.
Examples of microprocessors include Intel's x86 processors, ARM processors, etc.
Q31. Languages you are comfortable with?[C,C++,...]
I am comfortable with C, C++, and Java.
C
C++
Java
Q32. Have you worked on Nokia equipment?
Yes, I have worked on Nokia equipment extensively.
I have experience in installing, configuring, and maintaining Nokia equipment.
I have worked on Nokia BTS, BSC, and MSC equipment.
I am familiar with Nokia's network management system, NetAct.
I have also provided technical support for Nokia equipment to clients.
One of my recent projects involved upgrading Nokia equipment for a telecom company.
Q33. How HR use? What is the full form of HR
HR stands for Human Resources. HR is responsible for managing employee relations, recruitment, training, and other personnel-related tasks.
HR is used by organizations to manage their workforce and ensure compliance with labor laws.
HR departments handle tasks such as recruitment, onboarding, training, performance evaluations, and employee relations.
HR professionals also play a key role in developing and implementing company policies and procedures.
Examples of HR functions incl...read more
Q34. How was system requirements r use?
System requirements are used to define the functionalities, constraints, and quality attributes of a software system.
System requirements help in understanding what the software should do and how it should behave.
They serve as a basis for design, development, testing, and validation of the software.
Examples of system requirements include performance metrics, security features, user interface specifications, and compatibility with other systems.
Q35. What are the different layers of ISO/OSI model?
The ISO/OSI model consists of seven layers that define the different functions of a network communication system.
Physical Layer: Deals with the physical connection between devices (e.g. cables, connectors)
Data Link Layer: Manages the flow of data between devices on the same network (e.g. Ethernet)
Network Layer: Handles routing and forwarding of data packets between different networks (e.g. IP)
Transport Layer: Ensures reliable data transfer between end systems (e.g. TCP)
Sessio...read more
Q36. What is your middle term goal?
Q37. How much experiance on Nokia Equipment?
I have 5 years of experience working with Nokia equipment.
I have worked with Nokia BTS and NodeB equipment.
I have experience in installation, commissioning, integration, and troubleshooting of Nokia equipment.
I have knowledge of Nokia's network architecture and protocols.
I have worked with Nokia's NetAct network management system.
I have experience in handling software upgrades and patches for Nokia equipment.
Q38. Diff. between Data Mining and Data Warehousing
Q39. Unit of capacitance , unit of luminous efficiency etc.
Unit of capacitance is Farad (F) and unit of luminous efficiency is lumen per watt (lm/W).
Unit of capacitance is Farad (F)
Unit of luminous efficiency is lumen per watt (lm/W)
Q40. Inter service communication in a distributed system
Inter service communication in a distributed system involves communication between different services to achieve a common goal.
Use of APIs for communication between services
Message queues for asynchronous communication
Service discovery for locating and connecting to services
Implementing protocols like REST, gRPC, or MQTT
Handling communication failures and retries
Q41. What is multi-processing and multi-threading?
Multi-processing involves running multiple processes simultaneously, while multi-threading involves running multiple threads within a single process.
Multi-processing allows multiple processes to run concurrently, each with its own memory space and resources.
Multi-threading allows multiple threads to run within the same process, sharing the same memory space and resources.
Multi-processing is typically used for CPU-bound tasks, while multi-threading is used for I/O-bound tasks....read more
Q42. Explain how you automate using Robot framework
I automate using Robot framework by creating test cases in a keyword-driven format and utilizing built-in libraries and custom keywords.
Create test cases using Robot framework syntax
Utilize built-in libraries for common tasks
Develop custom keywords for specific automation needs
Leverage variables and data-driven testing
Integrate with external tools and APIs for comprehensive automation
Q43. how to work on linux VM?
To work on a Linux VM, you need to first set up the VM, install necessary software, configure network settings, and access it remotely.
Set up the Linux VM using a virtualization software like VirtualBox or VMware.
Install the Linux operating system on the VM.
Configure network settings such as IP address, subnet mask, and gateway.
Access the Linux VM remotely using SSH or a remote desktop protocol.
Install necessary software and tools for your work on the Linux VM.
Q44. 1) single linked list problem 2) substring matching
The first question is about a single linked list problem, and the second question is about substring matching.
For the single linked list problem, you may need to implement operations like insertion, deletion, and traversal.
For substring matching, you can use algorithms like brute force, Knuth-Morris-Pratt, or Boyer-Moore.
Examples for the single linked list problem: reversing a linked list, finding the middle element, or detecting a loop.
Examples for substring matching: findin...read more
Q45. What is administration of HR
Administration of HR involves managing various HR functions and processes to ensure smooth operations and compliance.
Administration of HR includes tasks such as employee onboarding, record-keeping, policy implementation, and compliance with labor laws.
It involves managing employee data, maintaining personnel files, and handling employee benefits and payroll.
HR administration also includes managing employee leave, attendance, and performance management processes.
It may involve...read more
Q46. Data structure concepts and design principles
Data structure concepts and design principles are essential for efficient storage and retrieval of data.
Understanding different data structures like arrays, linked lists, trees, graphs, etc.
Applying design principles like abstraction, encapsulation, modularity, and efficiency.
Choosing the right data structure based on the requirements of the problem.
Optimizing data structures for faster access and manipulation.
Examples: Using a hash table for quick lookups, using a binary sea...read more
Q47. Can we declare the constructor private?
Yes, we can declare the constructor private in a class.
Yes, we can declare the constructor private to prevent instantiation of the class from outside.
Private constructors are commonly used in singleton design pattern implementations.
Example: private MySingleton() {}
Q48. What is company revenue
Company revenue refers to the total amount of money earned by a company through its sales and other sources of income.
It includes all the revenue generated by the company from its products or services
It also includes revenue from other sources such as investments, interest, and royalties
Company revenue is an important metric for measuring the financial health and performance of a company
Examples of companies with high revenue include Apple, Amazon, and Microsoft
Q49. System Design- Design an online food delivery platform
Design an online food delivery platform
Identify target audience and their needs
Create a user-friendly interface for ordering food
Develop a robust backend system for managing orders and deliveries
Partner with local restaurants to offer a wide variety of cuisines
Implement a payment gateway for secure transactions
Provide real-time order tracking for customers
Ensure food safety and quality through proper packaging and delivery
Offer promotions and discounts to attract and retain c...read more
Q50. What is object oriented programming language?
Object oriented programming language is a type of programming language that uses objects and classes to organize code.
Uses objects and classes to structure code
Encourages reusability and modularity
Supports concepts like inheritance, encapsulation, and polymorphism
Q51. Rate yourself in Java in the scale of 10
I would rate myself 8 out of 10 in Java.
I have a strong understanding of core Java concepts.
I am proficient in object-oriented programming and can write clean and efficient code.
I have experience in using Java frameworks and libraries like Spring and Hibernate.
I am familiar with Java development tools and IDEs like Eclipse and IntelliJ.
I have worked on various Java projects and have a good understanding of Java best practices.
Q52. Which works when? Refer alexxu system design book
The question is about understanding the timing and order of operations in a system.
Understanding the sequence of events in a system is crucial for ensuring proper functionality.
Timing considerations include when data is processed, when actions are triggered, and when resources are allocated.
Examples include knowing when to update a database record after receiving user input, or when to send a notification after a certain event occurs.
Q53. What do you know about mobile networks
Mobile networks refer to the infrastructure that allows mobile devices to communicate with each other and access the internet.
Mobile networks use a combination of radio signals, cell towers, and network infrastructure to provide coverage and connectivity.
Different generations of mobile networks include 2G, 3G, 4G, and now 5G, each offering faster speeds and improved capabilities.
Mobile networks are operated by telecommunications companies such as Verizon, AT&T, and T-Mobile.
R...read more
Q54. How to assign the field engineer for the fault
Assigning the field engineer for a fault involves considering expertise, location, availability, and workload.
Assess the nature and complexity of the fault to determine the required expertise
Consider the location of the fault and assign the nearest available field engineer
Check the availability and workload of field engineers to ensure timely response
Prioritize critical faults that require immediate attention
Communicate effectively with the field engineer to provide necessary...read more
Q55. How will you reconcile deferred revenue.
Deferred revenue is reconciled by comparing the beginning and ending balances, adjusting for any changes during the period.
Start by comparing the beginning and ending balances of deferred revenue accounts.
Identify any changes in the period, such as new revenue recognized or revenue that was previously deferred being recognized.
Adjust the balances accordingly to ensure they match the recognized revenue for the period.
Ensure that all adjustments are properly documented and supp...read more
Q56. What is doing shared_ptr in C++?
shared_ptr is a smart pointer in C++ that manages the memory of a dynamically allocated object.
shared_ptr helps in managing memory by automatically releasing the memory when the last reference to the object is destroyed.
It allows multiple shared_ptr instances to share ownership of the same dynamically allocated object.
shared_ptr uses reference counting to keep track of the number of shared_ptr instances pointing to the object.
Example: std::shared_ptr
ptr = std::make_shared (10...read more
Q57. How Kubernetes handles scaling?
Kubernetes handles scaling by automatically adjusting the number of pods based on resource usage.
Kubernetes uses Horizontal Pod Autoscaler (HPA) to automatically scale the number of pods based on CPU or memory usage.
HPA adjusts the number of replicas of a Deployment, ReplicaSet, or StatefulSet.
Kubernetes also supports Vertical Pod Autoscaler (VPA) for adjusting resource requests and limits of pods based on resource usage.
Cluster Autoscaler automatically adjusts the size of th...read more
Q58. How the o/p will be?
The output will depend on the specific context or problem being addressed.
The output can vary based on the input provided.
It could be a numerical value, a string, a boolean, or any other data type depending on the requirements.
The output may be a single value or a collection of values.
Examples of possible outputs include: '42', 'Hello World!', 'true', [1, 2, 3].
Q59. Rate yourself in C in the scale of 10
Q60. Rate yourself in C++ in the scale of 10
Q61. Explain the CI/CD process in jenkins.
CI/CD process in Jenkins automates the building, testing, and deployment of software.
Developers commit code changes to a version control system.
Jenkins pulls the code and builds it in a clean environment.
Automated tests are run to ensure code quality.
If tests pass, the code is deployed to a staging environment for further testing.
If staging tests pass, the code is deployed to production.
Jenkins also provides feedback on build status and alerts on failures.
Q62. issue or complaint facedin 4g network
Customers are facing slow internet speed and frequent disconnections in 4G network.
Slow internet speed and frequent disconnections are the major issues faced by customers in 4G network.
Customers are complaining about not being able to stream videos or download files due to slow internet speed.
Frequent disconnections are causing inconvenience to customers during important calls or while browsing.
Some customers have also reported poor network coverage in certain areas.
The issue...read more
Q63. what is Dhcp server .plase explain
DHCP server is a network server that automatically assigns IP addresses and other network configuration settings to devices on a network.
DHCP stands for Dynamic Host Configuration Protocol.
It eliminates the need for manual IP address configuration on each device.
DHCP server leases IP addresses to devices for a specific period of time.
It also provides other network configuration information like subnet mask, default gateway, and DNS server.
Example: When a new device connects t...read more
Q64. Why VPRN are created on router?
Q65. Why nokia is good? What is the nokia process?
Nokia is good because of its strong brand reputation, innovative technology, and global presence.
Nokia has a strong brand reputation built over decades of producing reliable and durable mobile phones.
The company is known for its innovative technology, such as the development of the first mobile phone with an integrated camera.
Nokia has a global presence with operations in over 100 countries, allowing it to reach a wide customer base.
The company has a history of successful par...read more
Q66. How many companies branch in world.
It is impossible to determine the exact number of companies with branches worldwide.
The number of companies with branches worldwide is constantly changing as new companies are formed and existing companies expand or close branches.
There are millions of companies worldwide, making it difficult to keep track of all of them.
Different sources may provide different estimates of the number of companies with branches worldwide.
Some of the largest multinational corporations with bran...read more
Q67. types and differentiate signals, sampling, ft, filters, mimo, project, intrest
Different types of signals, sampling, Fourier transform, filters, MIMO, and project interests in 5G development.
Types of signals include analog, digital, continuous-time, discrete-time, etc.
Sampling is the process of converting a continuous signal into a discrete signal by taking samples at regular intervals.
Fourier transform is a mathematical tool used to analyze signals in the frequency domain.
Filters are used to selectively pass or block certain frequencies in a signal.
MIM...read more
Q68. Find substring in a given string
Use string methods to find a substring within a given string.
Use the indexOf() method to find the starting index of the substring within the string.
Use the substring() method to extract the substring based on the starting index and length.
Consider using regular expressions for more complex substring matching.
Q69. what's your favorite place to clean?
My favorite place to clean is the library because I love the peaceful atmosphere and the smell of books.
I enjoy organizing the shelves and ensuring all the books are in order
I take pride in keeping the reading areas tidy and welcoming for patrons
I appreciate the opportunity to contribute to a space dedicated to knowledge and learning
Q70. Difference between DBMS and RDBMS
DBMS is a software system that manages databases, while RDBMS is a type of DBMS that uses a relational model.
DBMS is a general term for managing databases, while RDBMS is a specific type of DBMS.
DBMS can handle any type of data, while RDBMS organizes data into tables with predefined relationships.
DBMS supports non-relational databases, while RDBMS enforces the relational model with features like ACID properties and SQL.
Examples of DBMS include MongoDB and Cassandra, while exa...read more
Q71. What is CSFB?
CSFB stands for Circuit Switched Fallback, a technology that allows LTE devices to fallback to 2G or 3G networks for voice calls.
CSFB is used when a LTE device is unable to make a voice call over the LTE network.
It allows the device to switch to a 2G or 3G network for voice calls.
CSFB is a temporary solution until VoLTE (Voice over LTE) becomes more widely available.
CSFB can cause call setup delays and impact the user experience.
Q72. What are technical missings ?
Technical missings refer to bugs or defects in the software code that cause unexpected behavior or errors.
Technical missings are issues in the code that lead to incorrect functionality.
They can include syntax errors, logic errors, or missing error handling.
Examples of technical missings include null pointer exceptions, infinite loops, and memory leaks.
Q73. What is system requirements?
System requirements are a detailed description of the functions and capabilities a system must have in order to meet the needs of its users.
System requirements outline the necessary features, functions, and capabilities of a software system.
They are typically documented in a requirements specification document.
System requirements help ensure that the software meets the needs and expectations of its users.
Examples of system requirements include performance requirements, securi...read more
Q74. What is X2 interface
X2 interface is a communication interface between two eNodeBs in LTE network.
X2 interface is used for inter-cell handover and load balancing.
It is a point-to-point interface that connects two eNodeBs.
X2 interface is used for exchanging control and user plane data between eNodeBs.
It is a critical interface for LTE network performance and reliability.
X2 interface supports various protocols such as S1AP, GTP, and RANAP.
Q75. Write a sample code using AngularJS
Sample code using AngularJS
Create a module and controller
Bind data to HTML using directives
Use services for data retrieval and manipulation
Implement two-way data binding
Example: https://codepen.io/mohit-kumar/pen/ExjJzjM
Q76. Type of Handover & its process
Handover is the process of transferring an ongoing call or data session from one cell to another.
There are two types of handover: Hard Handover and Soft Handover.
Hard Handover involves breaking the connection with the current cell before establishing a connection with the new cell.
Soft Handover involves establishing a connection with the new cell before breaking the connection with the current cell.
The handover process involves measuring the signal strength of the current and...read more
Q77. Which card use in 4G?
The card used in 4G is called a SIM card.
The SIM card is used to identify and authenticate the user on the network.
It stores the user's phone number, contacts, and other information.
Different types of SIM cards are available, such as nano, micro, and standard SIM cards.
The SIM card is inserted into the device's SIM card slot.
Examples of 4G SIM card providers include AT&T, Verizon, and T-Mobile.
Q78. Which card use in 3G?
The card used in 3G is the Universal Subscriber Identity Module (USIM) card.
The USIM card is an upgraded version of the SIM card used in 2G and 2.5G networks.
It provides enhanced security features and can store more data than a regular SIM card.
Examples of USIM card providers include AT&T, Verizon, and T-Mobile.
Q79. Also justify why?
Q80. What is DBMS?
Q81. How to storage location determined?
Storage location is determined based on factors like product characteristics, storage requirements, accessibility, and inventory management system.
Storage location is determined based on the size and weight of the product.
Product characteristics such as temperature sensitivity or hazardous nature may influence storage location.
Accessibility and frequency of retrieval also play a role in determining storage location.
Inventory management system may assign storage locations base...read more
Q82. Have you worked in 4G?
Yes, I have worked in 4G.
I have experience in managing 4G network deployments and troubleshooting network issues.
I have worked with various 4G technologies such as LTE, VoLTE, and Carrier Aggregation.
I have also worked with different vendors such as Ericsson, Nokia, and Huawei in implementing 4G networks.
I am familiar with 4G network planning and optimization, including capacity planning and network performance analysis.
Q83. Explain Jira Jenkins Integration
Jira Jenkins Integration is a process of connecting Jira and Jenkins to automate the software development process.
Jenkins plugin is installed in Jira to enable integration
Jenkins build can be triggered automatically from Jira issue
Jenkins build status can be displayed in Jira issue
Jira issues can be updated automatically based on Jenkins build status
Integration helps in tracking the progress of software development process
Q84. Evaluate pull vs push based system.
Pull vs push based system refers to how data is transferred between components in a system.
Pull system involves the receiver requesting data from the sender when needed.
Push system involves the sender actively pushing data to the receiver without the receiver requesting it.
Pull systems are more efficient when the receiver does not need data constantly.
Push systems are more efficient when real-time data updates are required.
Examples: Pull - HTTP polling, Push - WebSockets.
Q85. Check Palindrome in a Linked List
Check if a linked list is a palindrome by comparing the values from both ends.
Traverse the linked list to find the middle node using slow and fast pointers.
Reverse the second half of the linked list.
Compare the values of the first half with the reversed second half to check for palindrome.
Example: 1->2->3->2->1 is a palindrome.
Q86. What is polymorphism?
Polymorphism is the ability of a single function or method to operate on different types of data.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).
Example: Inheritance in object-oriented programming languages like Java allows for polymorphism.
Q87. What is TCP Ip protocol?
TCP/IP is a set of rules governing the exchange of data over the internet.
TCP/IP stands for Transmission Control Protocol/Internet Protocol.
It is a suite of communication protocols used to connect devices on the internet.
TCP ensures that data is delivered reliably and in order.
IP is responsible for addressing and routing data packets.
Examples of TCP/IP applications include web browsing, email, and file transfer.
Q88. Interface between LTE
Interface between LTE refers to the connection between the LTE network and other networks or devices.
LTE interfaces with other cellular networks such as 3G and 2G through inter-RAT handover
LTE also interfaces with non-cellular networks such as Wi-Fi and Ethernet through evolved packet core (EPC)
LTE devices interface with the LTE network through the air interface using radio frequency signals
LTE also interfaces with core network elements such as the mobility management entity ...read more
Q89. Difference between C and C++
Q90. What is OOPS concept?
OOPS (Object-Oriented Programming) concept is a programming paradigm based on the concept of objects, which can contain data and code.
OOPS focuses on creating reusable code and organizing it into objects
Key principles include encapsulation, inheritance, polymorphism, and abstraction
Encapsulation involves bundling data and methods that operate on the data into a single unit
Inheritance allows one class to inherit properties and behavior from another class
Polymorphism enables ob...read more
Q91. What is technical?
Technical refers to anything related to technology, machinery, or scientific knowledge.
Relating to technology or machinery
Involving scientific knowledge or skills
Concerned with practical application of knowledge
Examples: coding, testing software, troubleshooting hardware
Q92. explain handover procedure in LTE
Handover procedure in LTE involves transferring an ongoing call or data session from one cell to another.
Handover decision is based on signal strength, interference levels, and quality of the target cell.
Types of handover include intra-frequency, inter-frequency, and inter-RAT handovers.
Handover process includes measurement reporting, handover decision, handover execution, and handover completion.
Example: If a user moves from one cell to another while on a call, the network i...read more
Q93. Implement Queue using linked list
Implement Queue using linked list
Create a Node class with data and next pointer
Maintain pointers for front and rear of the queue
Implement enqueue() to add elements and dequeue() to remove elements
Q94. What is your expected ctc?
My expected CTC is negotiable based on the job role, responsibilities, and benefits offered.
My expected CTC is based on industry standards and my level of experience.
I am open to discussing the salary range during the interview process.
I am looking for a competitive salary package that aligns with my skills and qualifications.
Q95. Final Sem. project in MCA
My final semester project in MCA was a web-based student information system.
Developed using HTML, CSS, JavaScript, PHP, and MySQL
Allowed students to view their grades, attendance, and course schedule
Implemented user authentication and admin functionalities
Received positive feedback from both students and faculty
Q96. Variable scope in C++
Variable scope in C++ determines where in the program a variable can be accessed.
Variables declared inside a function have local scope and can only be accessed within that function.
Global variables have file scope and can be accessed by any function in the file.
Static variables have function scope and retain their value between function calls.
Q97. Polymorphism with an example
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
Polymorphism allows for flexibility in programming by enabling objects to be treated as instances of their parent class.
It allows for method overriding, where a subclass can provide a specific implementation of a method defined in its superclass.
An example of polymorphism is a superclass Animal with subclasses Dog and Cat, both overriding the method 'makeSound'.
Q98. Plan for Higher studies
I plan to pursue a Master's degree in Business Administration to enhance my skills and knowledge in the field.
Research different MBA programs to find the best fit for my career goals
Prepare for entrance exams such as GMAT or GRE
Gather letters of recommendation and transcripts for application
Consider financial options for tuition and living expenses
Plan for relocation if necessary
Q99. How to starting sallary
Q100. Differentiate FDD & TDD
FDD and TDD are two different duplexing techniques used in wireless communication.
FDD stands for Frequency Division Duplexing and TDD stands for Time Division Duplexing.
In FDD, separate frequency bands are used for uplink and downlink communication, while in TDD, the same frequency band is used for both uplink and downlink communication.
FDD is used in technologies like 2G, 3G, and 4G LTE, while TDD is used in technologies like WiMAX and TD-SCDMA.
FDD provides symmetric data ra...read more
More about working at Nokia
Top HR Questions asked in BMW Industries
Interview Process at BMW Industries
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month