Filter interviews by
T3 and T5 violations are related to timing constraints in digital circuits.
T3 violation occurs when the data arrives too late at the destination register.
T5 violation occurs when the data arrives too early at the destination register.
T3 and T5 violations can cause setup and hold time violations.
T3 and T5 violations can be fixed by adjusting the timing constraints or by adding delay elements.
Examples of T3 and T5 v...
Coverage loss can occur due to test pattern compression, test pattern generation, and test application issues.
Test pattern compression can cause loss of coverage due to the reduction in the number of test patterns.
Test pattern generation can result in coverage loss if the generated patterns do not cover all the faults.
Test application issues such as timing violations or signal integrity problems can also lead to c...
Yes, hold time/setup violation can occur at stuckat capture.
Stuck-at faults can cause hold time violations if the data is not held long enough for the capture register to sample it.
Similarly, setup violations can occur if the data is not stable before the capture register samples it.
These violations can be avoided by proper timing constraints and clocking strategies.
For example, adding a delay to the clock signal ...
We use different browsers depending on our personal preferences and work requirements.
Some popular browsers are Google Chrome, Mozilla Firefox, Safari, and Microsoft Edge.
Chrome is known for its speed and compatibility with Google services.
Firefox is known for its privacy features and customization options.
Safari is the default browser for Apple devices.
Edge is the default browser for Windows 10.
Some people also u...
Dockerfile to setup Nginx and expose it with port 8080
Use the official Nginx image as the base image
Copy the custom Nginx configuration file to the container
Expose port 8080 in the Dockerfile
Start Nginx in the foreground using the CMD instruction
Ansible playbook to copy files based on the operating system using conditional statements.
Use the 'copy' module to transfer files.
Utilize 'when' statements to check the OS type.
Example: - name: Copy file for Ubuntu copy: src: /path/to/source dest: /path/to/destination when: ansible_os_family == 'Debian'
Example: - name: Copy file for CentOS copy: src: /path/to/source dest: /path/to/destination...
Pointers are variables that store memory addresses of other variables. Double pointers store memory addresses of pointers.
Pointers are used to access and manipulate memory addresses of variables.
Double pointers are used to store memory addresses of pointers themselves, allowing for indirect access to variables.
Example: char *ptr; int **dptr;
Noise margin in CMOS refers to the difference between the minimum input voltage required to change the logic state of a gate and the maximum input voltage that can be applied without causing an incorrect output.
Noise margin is important for ensuring reliable operation of CMOS circuits
It is typically defined as the difference between the high and low logic levels of the input signal
Noise margin can be affected by f...
IOS is a mobile operating system developed by Apple. Machine learning is a type of artificial intelligence that allows computers to learn from data.
IOS is used on Apple devices such as iPhones and iPads
Machine learning involves algorithms that can learn from data and make predictions or decisions based on that data
Examples of machine learning include image recognition, speech recognition, and recommendation system...
I appeared for an interview in Dec 2024, where I was asked the following questions.
Experienced Security Specialist with a strong background in risk assessment, incident response, and security policy development.
Over 5 years of experience in cybersecurity, focusing on threat detection and mitigation.
Led a team in a successful incident response that reduced downtime by 40%.
Developed and implemented security policies that improved compliance by 30%.
Conducted regular security audits, identifying vulnerab...
I have extensive experience in security operations, focusing on risk assessment, incident response, and compliance management.
Conducted regular security audits to identify vulnerabilities and ensure compliance with industry standards.
Developed and implemented incident response plans that reduced response time by 30%.
Collaborated with IT teams to enhance network security protocols, resulting in a 40% decrease in securit...
I appeared for an interview before May 2021, where I was asked the following questions.
I am a detail-oriented professional with a passion for processing and analyzing data to drive efficiency and improve outcomes.
Background in data processing and analysis, with experience in using software tools like Excel and SQL.
Strong problem-solving skills demonstrated through optimizing workflows in previous roles.
Effective communicator, able to collaborate with cross-functional teams to achieve project goals.
Commit...
I applied via LinkedIn and was interviewed in Jul 2022. There were 2 interview rounds.
Edt configuration: Having more chains will cause less pattern compaction. IF you want to get data for a particular chain u have to send more patterns (Imagine at compressor you want to get data you have to mask all the other chains in the xor gate) hence more patterns needed. If we have single scan cell in a chain then less fault will be covered (only 2 patterns 1 and 0 can be sent). If high number of scan cells are th...
Yes, hold time/setup violation can occur at stuckat capture.
Stuck-at faults can cause hold time violations if the data is not held long enough for the capture register to sample it.
Similarly, setup violations can occur if the data is not stable before the capture register samples it.
These violations can be avoided by proper timing constraints and clocking strategies.
For example, adding a delay to the clock signal can e...
Coverage loss can occur due to test pattern compression, test pattern generation, and test application issues.
Test pattern compression can cause loss of coverage due to the reduction in the number of test patterns.
Test pattern generation can result in coverage loss if the generated patterns do not cover all the faults.
Test application issues such as timing violations or signal integrity problems can also lead to covera...
I applied via Naukri.com and was interviewed in Jun 2022. There were 9 interview rounds.
Data structures and algorithms
Problem were from leetcode and geek for geeks.
Coding round , questions from leetcode
Situation based questions and thought process
I appeared for an interview before Mar 2024, where I was asked the following questions.
I applied via Campus Placement and was interviewed before May 2023. There were 3 interview rounds.
C, C++, OS, aptitute test, OS concepts
Pointers are variables that store memory addresses of other variables. Double pointers store memory addresses of pointers.
Pointers are used to access and manipulate memory addresses of variables.
Double pointers are used to store memory addresses of pointers themselves, allowing for indirect access to variables.
Example: char *ptr; int **dptr;
I am considering pursuing a Master's degree to deepen my expertise and enhance my career opportunities in software testing.
A Master's degree can provide advanced knowledge in software testing methodologies.
It may open doors to leadership roles in quality assurance.
I am particularly interested in courses that focus on automation and performance testing.
Networking opportunities with industry professionals during a Master...
I applied via Naukri.com and was interviewed in Apr 2022. There were 3 interview rounds.
Written test based on data structures and operating systems
I applied via Naukri.com and was interviewed in Mar 2022. There were 3 interview rounds.
It would be test of 15 to 20 questions with one March each and 70% would be cutoff. Questions consits of Aptitude, Reasoning and Embedded figures.
Artificial Intelligence is the simulation of human intelligence in machines.
AI involves creating intelligent machines that can perform tasks without human intervention.
It includes machine learning, natural language processing, and robotics.
Examples include Siri, Alexa, and self-driving cars.
AI has applications in various fields such as healthcare, finance, and gaming.
IOS is a mobile operating system developed by Apple. Machine learning is a type of artificial intelligence that allows computers to learn from data.
IOS is used on Apple devices such as iPhones and iPads
Machine learning involves algorithms that can learn from data and make predictions or decisions based on that data
Examples of machine learning include image recognition, speech recognition, and recommendation systems
Mach...
Top trending discussions
Some of the top questions asked at the Nvidia interview for experienced candidates -
The duration of Nvidia interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 7 interview experiences
Difficulty level
Duration
based on 633 reviews
Rating in categories
Processing Executive
1k
salaries
| ₹2.3 L/yr - ₹4.3 L/yr |
Software Engineer
152
salaries
| ₹18.8 L/yr - ₹32.7 L/yr |
Quality Analyst
127
salaries
| ₹2.5 L/yr - ₹3.9 L/yr |
Senior Software Engineer
122
salaries
| ₹27.9 L/yr - ₹50.4 L/yr |
Data Analyst
114
salaries
| ₹2.4 L/yr - ₹5 L/yr |
Qualcomm
Intel
Indus Towers
Sterlite Technologies