Nvidia
70+ Luxoft Interview Questions and Answers
Given a string 'S' and a list 'wordList' that consists of 'N' distinct words. Let 'Wi' denote word at index 'i' in 'wordList'. For each word 'Wi' in 'wordList', you n...read more
There are ‘N’ people numbered from 0 to N - 1, standing in a queue. You are given two arrays ‘Height’ and ‘Infront‘ consisting of ‘N’ non-negative integers. ‘Height[i]’ gives the height o...read more
The task is to find the actual order of people in a queue based on their heights and the number of taller people in front of them.
Iterate through the given arrays and create a list of tuples containing the height and number of taller people for each person.
Sort the list of tuples in descending order of height and ascending order of the number of taller people.
Create an empty result list and insert each tuple into the result list at the index specified by the number of taller ...read more
Given two variables ‘X’ and ‘Y’. Your task is to swap the number without using a temporary variable or third variable.
Swap means the value of ‘X’ and ‘Y’ must be interchan...read more
You are given a positive integer 'N.' Your task is to find the number of ways to represent the given number 'N' as the sum of two or more consecutive natural numbers.
Input Format:
T...read more
Q5. What is Unique key,What are some common clauses used with SELECT query in SQL?
Unique key is a column or set of columns that uniquely identifies each row in a table. Common SELECT clauses include WHERE, ORDER BY, and GROUP BY.
A unique key is used to ensure data integrity and prevent duplicate rows.
SELECT WHERE clause is used to filter data based on a condition.
SELECT ORDER BY clause is used to sort data in ascending or descending order.
SELECT GROUP BY clause is used to group data based on a column or set of columns.
You have been given a Binary Search Tree and a key value ‘X’, find if a node with value ‘X’ is present in the BST or not.
Note:
You may assume that duplicates do not exist in the tree.
For e...read more
The task is to find if a given value is present in a Binary Search Tree (BST).
Start from the root node and compare the value with the target value.
If the value matches, return true.
If the target value is less than the current node value, move to the left child.
If the target value is greater than the current node value, move to the right child.
Repeat the process until a match is found or a leaf node is reached.
If a leaf node is reached and no match is found, return false.
Q7. 1)Introduce yourself2) what is artificial intelligence 3) what is database 4) what is GPU 5) what is CPU6) what is IP addresse etc
Answers to questions related to Process Executive role including AI, database, GPU, CPU, and IP address.
Artificial Intelligence is the simulation of human intelligence in machines that are programmed to think and learn like humans.
Database is a structured collection of data that can be accessed, managed, and updated easily.
GPU stands for Graphics Processing Unit, which is a specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creati...read more
Q8. a) To construct a 2^n :1 MUX. how many leat number of 2:1 MUXes are required. b) If propagation delay of each MUX is 1nsec what will be the propogation delay of the above built circuit. c) Can your circuit oper...
read moreQ9. Why can there be any coverage loss for 100% scan design.
Coverage loss can occur due to test pattern compression, test pattern generation, and test application issues.
Test pattern compression can cause loss of coverage due to the reduction in the number of test patterns.
Test pattern generation can result in coverage loss if the generated patterns do not cover all the faults.
Test application issues such as timing violations or signal integrity problems can also lead to coverage loss.
Coverage loss can also occur due to design changes...read more
Q10. What will you do when you get bad reviews about a game?
When receiving bad reviews about a game, I will analyze the feedback, identify areas of improvement, and take appropriate actions to address the issues.
Read and understand the reviews thoroughly
Identify common patterns or recurring issues mentioned in the reviews
Consider the validity and credibility of the feedback
Analyze the game objectively to identify areas that need improvement
Prioritize the issues based on their impact on gameplay or user experience
Communicate with the d...read more
Which feature of OS is used here
Why Nvidia?
What keeps you motivated?
Are you a team player?
Q13. Do you know about Labelling and annotations?
Labelling and annotations are used to provide additional information and context to data or objects.
Labelling involves assigning a name or tag to a data point or object.
Annotations provide additional information or context to a data point or object.
Labelling and annotations are commonly used in data visualization and machine learning.
Examples of labelling and annotations include labeling data points on a scatter plot, annotating an image with object detection results, and lab...read more
Q14. Can hold time/setup violation occur at stuckat capture.
Yes, hold time/setup violation can occur at stuckat capture.
Stuck-at faults can cause hold time violations if the data is not held long enough for the capture register to sample it.
Similarly, setup violations can occur if the data is not stable before the capture register samples it.
These violations can be avoided by proper timing constraints and clocking strategies.
For example, adding a delay to the clock signal can ensure that the data is stable before the capture register ...read more
Q15. What is polymorphism? What is virtual function…? How will you implement if I tell you to develop compiler?
Q16. Memory allocation in struct? Why it is like that….why continuous memory is not allocated to struct variables?
Q17. Min. size of buffer based on burst rate, input steam rate, output steam rate,latency rate, etc
The minimum size of buffer depends on burst rate, input/output stream rates, and latency rate.
Calculate the maximum amount of data that can be received during the latency period
Determine the maximum burst rate and the maximum input/output stream rates
Calculate the buffer size using the formula: buffer size = (maximum burst rate * latency period) + maximum input/output stream rates
Consider adding extra buffer space for safety margin
Q18. What is function template? Do you know what exactly happen when template is executed? If you don’t then tell how will you do that?
Q19. Given a complex diagram, find out maximum frequency of operation
To determine maximum frequency of operation from a complex diagram
Identify the critical path in the diagram
Calculate the propagation delay of each component in the path
Use the formula fmax = 1 / (2 * propagation delay) to determine maximum frequency
Consider any setup or hold time requirements for flip-flops or other components
Ensure that the frequency is within the specifications of the components used
Q20. Implement your own malloc function such that it will allocate memory of 16 bytes and starting address will always be divisible by 16…..was told to write code
Q21. Design Test cases for A Deseal Car Engine. Cover all test cases
Design test cases for a deseal car engine
Test for engine starting and stopping
Test for oil pressure and temperature
Test for fuel efficiency
Test for exhaust emissions
Test for engine noise and vibration
What is the use of a function pointer in C?
Q23. How was apti, coding test, and entire selection procedure?
The apti, coding test, and entire selection procedure were challenging but well-structured.
The aptitude test covered a wide range of topics and required logical thinking.
The coding test involved solving complex problems using programming languages.
The selection procedure included multiple rounds of interviews and assessments.
The overall process was rigorous but fair, allowing candidates to showcase their skills and abilities.
Q24. Can you find maximum stack memory available using above data structure
The maximum stack memory available cannot be determined using the given data structure.
The maximum stack memory available depends on the hardware and operating system.
It is not possible to determine the maximum stack memory based on the given data structure alone.
To determine the maximum stack memory, one would need to consider the hardware limitations and the operating system's stack size limit.
The data structure provided does not contain information about the maximum stack ...read more
Q25. Find whether no. is even or odd…(I gave mod2 solution)
The solution to determine whether a number is even or odd is to use the modulus operator with 2.
Use the modulus operator (%) to find the remainder when the number is divided by 2.
If the remainder is 0, the number is even. Otherwise, it is odd.
Example: 7 % 2 = 1, so 7 is an odd number.
Example: 10 % 2 = 0, so 10 is an even number.
Q26. What exactly happens as we free up dynamically allocated memory using free()
Q27. Would you rather buy a costly game or make a reasonably cheaper one?
I would rather make a reasonably cheaper game.
Making a reasonably cheaper game allows for more creative freedom and experimentation.
A cheaper game can still be successful if it offers unique gameplay or a compelling story.
Developing a game on a smaller budget can also lead to more efficient use of resources.
Examples of successful cheaper games include indie titles like Stardew Valley and Undertale.
Q28. Which browser we used in daily
We use different browsers depending on our personal preferences and work requirements.
Some popular browsers are Google Chrome, Mozilla Firefox, Safari, and Microsoft Edge.
Chrome is known for its speed and compatibility with Google services.
Firefox is known for its privacy features and customization options.
Safari is the default browser for Apple devices.
Edge is the default browser for Windows 10.
Some people also use alternative browsers like Opera or Brave.
Ultimately, the cho...read more
Q29. What are sockets, pipes, inter-process communication?
Sockets, pipes, and inter-process communication are mechanisms used for communication between processes.
Sockets are endpoints for sending and receiving data across a network. They enable communication between processes running on different machines.
Pipes are a form of inter-process communication that allows communication between processes running on the same machine. They provide a unidirectional flow of data.
Inter-process communication (IPC) refers to various methods used by...read more
Q30. What happens in recursive function calls? What are the drawbacks?
Types of Joins , answer: left outer,right outer join,inner join
Q32. Write a docker file to setup Nginx and expose it with port 8080
Dockerfile to setup Nginx and expose it with port 8080
Use the official Nginx image as the base image
Copy the custom Nginx configuration file to the container
Expose port 8080 in the Dockerfile
Start Nginx in the foreground using the CMD instruction
Q33. How does Open GL graphics Works in android
OpenGL is a graphics API used in Android to render 2D and 3D graphics.
OpenGL is a cross-platform API that allows developers to create high-performance graphics applications.
It uses a pipeline-based model to process graphics data.
OpenGL ES (Embedded Systems) is the version of OpenGL used in Android.
It supports features like texture mapping, lighting, and shading.
Developers can use OpenGL in Android to create games, visualizations, and other graphics-intensive applications.
What is Little and Big Endian?
What does a kernel do?
Q36. What is process, Thread? What is multi-threading?
Q37. What is the difference between mealy and Moore state machine?
Mealy and Moore state machines are two types of finite state machines used in hardware programming.
Mealy state machine outputs depend on both the current state and the inputs
Moore state machine outputs depend only on the current state
Mealy machines have more flexibility but are more complex to design and analyze
Moore machines are simpler but less flexible
Mealy machines are often used when the output depends on the input
Moore machines are often used when the output depends onl...read more
Q38. What is the code for camera reset in C# ?
The code for camera reset in C# typically involves resetting the camera's position and rotation to their default values.
Use the transform component of the camera to reset its position and rotation
Set the camera's position to the default position
Set the camera's rotation to the default rotation
Q39. Uses of function pointer…(I said to send a function as argument)….he asked more…(I told that I know only one)
Q40. What is IOS and What is Machine Learning
IOS is a mobile operating system developed by Apple. Machine learning is a type of artificial intelligence that allows computers to learn from data.
IOS is used on Apple devices such as iPhones and iPads
Machine learning involves algorithms that can learn from data and make predictions or decisions based on that data
Examples of machine learning include image recognition, speech recognition, and recommendation systems
Machine learning is used in a variety of industries, including...read more
Q41. Thread scheduling….difference between process and thread scheduling
Q42. Difference between List and Tuples? in python
List is mutable and Tuples are immutable in Python.
Lists are enclosed in square brackets [], while Tuples are enclosed in parentheses ().
Elements of a list can be changed, added or removed, while elements of a tuple cannot be changed.
Lists are slower than tuples due to their mutable nature.
Tuples are used for fixed data, while lists are used for dynamic data.
Lists are used for homogenous data, while tuples are used for heterogenous data.
Q44. What is Artificial intelligence?
Artificial intelligence is the simulation of human intelligence in machines that are programmed to think and learn like humans.
AI involves creating intelligent machines that can perform tasks without human intervention
It uses techniques like machine learning, natural language processing, and computer vision
Examples include virtual assistants like Siri and Alexa, self-driving cars, and facial recognition technology
Q45. WAP to determine whether your system is little endian or big endian?
Q46. How to identify a singly linked list that whether it is circular or not?
Q47. What is little endian and big endian?
Little endian and big endian are two ways of storing multi-byte data types in computer memory.
Little endian: least significant byte is stored first
Big endian: most significant byte is stored first
Example: In little endian, the number 0x1234 is stored as 0x34 0x12
Example: In big endian, the number 0x1234 is stored as 0x12 0x34
Program to determine if your system is little or big endian
Q49. Difference between T3 and T5 violation.
T3 and T5 violations are related to timing constraints in digital circuits.
T3 violation occurs when the data arrives too late at the destination register.
T5 violation occurs when the data arrives too early at the destination register.
T3 and T5 violations can cause setup and hold time violations.
T3 and T5 violations can be fixed by adjusting the timing constraints or by adding delay elements.
Examples of T3 and T5 violations can be found in high-speed digital designs such as mi...read more
What is a volatile keyword?
Q51. 1 technical puzzle, to print infinite series of a given pattern
Print infinite series of a given pattern
Use a loop to continuously print the pattern
Consider using a circular buffer to store the pattern for efficient printing
Ensure the pattern does not consume too much memory or cause overflow
Q52. Convert little endian to big endian in constant time
Q53. Design data structure to implement multi-threading
Design data structure to implement multi threading.
Q55. how would you test output of a graphic card
Test output of a graphic card
Check for resolution and refresh rate
Test different graphic-intensive applications
Check for artifacts or distortion in the output
Test with different cables and monitors
Benchmark the performance using software tools
Q56. What do you understand by AI?
Q57. Tell about NVIDIA
NVIDIA is a technology company that designs and manufactures graphics processing units (GPUs) and system-on-a-chip units (SoCs) for gaming, professional visualization, data center, and automotive markets.
Founded in 1993 by Jensen Huang, Chris Malachowsky, and Curtis Priem
Headquartered in Santa Clara, California
Known for its GeForce graphics cards and CUDA parallel computing platform
Provides hardware and software solutions for artificial intelligence and deep learning
Collabora...read more
Q58. Examples of Artificial Intelligence
Artificial Intelligence is the simulation of human intelligence processes by machines.
Natural Language Processing (NLP)
Machine Learning (ML)
Computer Vision
Expert Systems
Robotics
Speech Recognition
Virtual Agents
Autonomous Vehicles
Q59. What is malloc, calloc function?
Q60. difference between SRAM and DRAM, bloacking and non blocking statement
SRAM and DRAM are types of computer memory with different characteristics. Blocking and non-blocking statements are used in hardware design.
SRAM (Static Random Access Memory) is faster, more expensive, and consumes more power than DRAM (Dynamic Random Access Memory).
SRAM stores data in a flip-flop circuit, while DRAM stores data in a capacitor.
SRAM does not need to be refreshed, while DRAM requires periodic refreshing.
Blocking statements in hardware design halt the execution ...read more
Q61. How does AI content writing differ from academic writing?
AI content writing focuses on generating engaging and optimized content for online platforms, while academic writing is more formal and research-based.
AI content writing uses algorithms to create content that is tailored for online audiences and optimized for search engines.
Academic writing is more formal, structured, and research-based, focusing on presenting arguments and supporting evidence.
AI content writing may prioritize readability, SEO, and engagement metrics, while a...read more
Q62. Projects in your proffesional education
I have worked on various projects during my professional education.
Developed a mobile app for a local business as part of a team project
Conducted research on the impact of social media on consumer behavior
Created a marketing campaign for a new product launch
Designed and implemented a database system for a nonprofit organization
Collaborated with classmates to develop a website for a community event
Analyzed financial data to make recommendations for a hypothetical investment po...read more
Q63. Explain about android architecture system.
Android architecture system is a layered architecture consisting of four main layers.
The four main layers are Linux kernel, native libraries, application framework, and applications.
The Linux kernel provides low-level hardware abstraction and security.
Native libraries are written in C or C++ and provide access to hardware-specific features.
Application framework provides high-level services such as activity management, resource management, and content providers.
Applications ar...read more
Q64. What do you about Artificial Intelligence?
Artificial Intelligence refers to the simulation of human intelligence processes by machines, especially computer systems.
AI involves the development of algorithms that can perform tasks that typically require human intelligence, such as visual perception, speech recognition, decision-making, and language translation.
Machine learning is a subset of AI that focuses on the development of algorithms that allow computers to learn from and make predictions or decisions based on da...read more
Q65. What Android basic component
The basic components of Android are activities, services, broadcast receivers, and content providers.
Activities are the user interface components that allow users to interact with the app.
Services are background components that perform long-running operations.
Broadcast receivers are components that receive and respond to system-wide broadcast announcements.
Content providers are components that manage a shared set of app data that can be accessed by other apps.
Q66. algorithms to writing code and architecture and parallel programming
Q67. What is sequential logic?
Sequential logic refers to a type of digital circuit design that uses memory elements to store and process data sequentially.
Sequential logic circuits are used to build memory units, counters, shift registers, and other devices.
They rely on memory elements like flip-flops or latches to store and propagate data.
The output of a sequential logic circuit depends not only on the current inputs but also on the previous inputs and the current state of the memory elements.
Sequential ...read more
Q68. Explain CGC cell working with circuit and waveforms
CGC cell is a standard cell used in physical design with specific characteristics for circuit implementation.
CGC cell stands for Custom Gate Cell, which is a standard cell used in physical design for implementing logic functions.
CGC cells have specific characteristics like fixed height and width, predefined power and ground connections, and a set of pins for input and output signals.
When designing a circuit using CGC cells, designers place and connect these cells in a specifi...read more
Q69. Noise margin in Cmos ASIC design flow
Noise margin in CMOS refers to the difference between the minimum input voltage required to change the logic state of a gate and the maximum input voltage that can be applied without causing an incorrect output.
Noise margin is important for ensuring reliable operation of CMOS circuits
It is typically defined as the difference between the high and low logic levels of the input signal
Noise margin can be affected by factors such as process variations, temperature, and power suppl...read more
Q70. No. of patterns to detect fault on XOR gate
There are 3 patterns to detect faults on an XOR gate.
There are 3 possible fault patterns on an XOR gate: Stuck-At-0, Stuck-At-1, and Inversion.
Stuck-At-0 fault pattern occurs when one input is always 0, regardless of the other input.
Stuck-At-1 fault pattern occurs when one input is always 1, regardless of the other input.
Inversion fault pattern occurs when the output is inverted compared to the correct XOR gate output.
Q71. Draw tie cell diagram for both low/high cells
Tie cell diagram for low/high cells in physical design engineering.
Tie cell diagram is used in physical design to connect multiple power domains.
Low tie cells are used to connect low power domains, while high tie cells are used for high power domains.
Examples of tie cells include power switches and isolation cells.
Q72. concept of pointers,double pointers
Pointers are variables that store memory addresses of other variables. Double pointers store memory addresses of pointers.
Pointers are used to access and manipulate memory addresses of variables.
Double pointers are used to store memory addresses of pointers themselves, allowing for indirect access to variables.
Example: char *ptr; int **dptr;
Q73. Implement memcpy in a robust way.
Use a loop to copy data byte by byte, handle overlapping memory regions, and check for NULL pointers.
Use a loop to copy data byte by byte
Handle overlapping memory regions by checking the direction of copy and copying in the correct order
Check for NULL pointers before performing any operations
Q74. Digital design problems
Digital design problems involve challenges in designing and implementing digital circuits and systems.
Understanding and optimizing power consumption
Ensuring signal integrity and minimizing noise
Implementing efficient clocking strategies
Addressing timing issues and meeting performance requirements
Q75. What is Al
Al is the chemical symbol for the element Aluminum, a silvery-white, soft, nonmagnetic metal.
Aluminum is the third most abundant element in the Earth's crust.
It is widely used in the construction industry for making windows, doors, and building frames.
Aluminum is also used in the manufacturing of aircraft, automobiles, and electrical transmission lines.
It has a low density and is resistant to corrosion, making it a popular choice for packaging materials like cans and foil.
Alu...read more
Q76. Verilog code for D-Flip Flop
A D flip flop is a sequential logic circuit that stores a single bit of data.
A D flip flop has a data input (D), a clock input (CLK), and an output (Q).
The output (Q) of a D flip flop changes only when the clock input (CLK) transitions from low to high.
The output (Q) of a D flip flop follows the value of the data input (D) when the clock input (CLK) transitions from low to high.
The Verilog code for a D flip flop can be written as: 'always @(posedge CLK) Q <= D;'
Q77. ds implementation in python
Data structure implementation in Python
Use built-in data structures like lists, dictionaries, sets, etc.
Implement custom data structures like linked lists, stacks, queues, trees, etc.
Utilize libraries like NumPy for efficient array operations
Practice implementing algorithms using data structures
More about working at Nvidia
Top HR Questions asked in Luxoft
Interview Process at Luxoft
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month