Filter interviews by
Clear (1)
Planning is the process of setting goals, determining actions to achieve those goals, and allocating resources effectively.
Setting specific, measurable, achievable, relevant, and time-bound (SMART) goals
Creating a detailed plan of action to achieve the goals
Allocating resources such as time, money, and manpower efficiently
Monitoring progress and making adjustments as needed
Examples: Financial planning for a company's b...
A financial model is built to forecast future financial performance of a company or project.
Identify the purpose of the financial model (e.g. budgeting, valuation, forecasting)
Gather historical financial data and relevant assumptions
Create income statement, balance sheet, and cash flow statement projections
Perform sensitivity analysis to assess the impact of different variables
Validate the model by comparing actual res
Depreciation is the allocation of the cost of a tangible asset over its useful life.
Depreciation is a non-cash expense that reduces the value of an asset over time.
It reflects the wear and tear, obsolescence, or decrease in value of an asset.
Common methods of calculating depreciation include straight-line, double declining balance, and units of production.
Example: A company purchases a machine for $10,000 with a useful...
Budgeting is the process of creating a plan to manage income and expenses over a specific period of time.
Budgeting involves setting financial goals and creating a detailed plan to achieve them.
It helps in tracking income, expenses, and savings to ensure financial stability.
Budgeting can be done on a personal level, for businesses, or for specific projects.
Examples of budgeting tools include spreadsheets, budgeting apps
Top trending discussions
The Aptitude test was tough!
A confusion matrix is a table that is often used to describe the performance of a classification model.
It is a matrix with rows representing the actual class and columns representing the predicted class.
It helps in evaluating the performance of a classification model by showing the number of correct and incorrect predictions.
It consists of four quadrants: True Positive, False Positive, True Negative, and False Negative...
Principal component analysis is a statistical technique used to reduce the dimensionality of data while preserving important information.
PCA is used to identify patterns in data and express it in a more easily understandable form.
It works by finding the directions (principal components) along which the variance of the data is maximized.
These principal components are orthogonal to each other, meaning they are uncorrelat...
Inventory policy is a set of guidelines for managing inventory levels, while inventory control method is the process of implementing those guidelines.
Inventory policy determines when to order new inventory and how much to order
Inventory control method involves tracking inventory levels, forecasting demand, and optimizing order quantities
Examples of inventory policies include Just-in-Time (JIT) and Economic Order Quanti...
Reverse logistics is the process of moving goods from their final destination back to the manufacturer or point of origin for resale, recycling, or disposal.
Involves returning products from customers to the manufacturer or retailer
Includes activities such as returns, refurbishment, recycling, or disposal
Helps in reducing waste and maximizing value from returned products
Examples: returning a defective product to the man
I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.
UDP is preferred over TCP in this project due to its low latency and lightweight nature.
UDP is a connectionless protocol, which means it does not establish a direct connection between the sender and receiver.
UDP is faster than TCP as it does not have the overhead of establishing and maintaining a connection.
UDP is suitable for applications where real-time data transmission is crucial, such as video streaming or online ...
To clear the 7th bit in a 32-bit register, perform a bitwise AND operation with a mask that has all bits set to 1 except the 7th bit.
Create a mask with the 7th bit set to 0 and all other bits set to 1
Perform a bitwise AND operation between the register and the mask
Store the result back in the register
I was interviewed before May 2016.
I was interviewed before Apr 2021.
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions on OOPS and OS mainly.
Little Endian and Big Endian refer to the order in which bytes are stored in computer memory.
Little Endian stores the least significant byte first, while Big Endian stores the most significant byte first.
Little Endian is commonly used in x86 architecture, while Big Endian is used in architectures like SPARC and PowerPC.
Endianness can affect data transmission between systems with different byte orders.
Program to determine system's endianness
Check the endianness by storing a multi-byte integer and checking the byte order
Use bitwise operations to extract the least significant byte
If the least significant byte is at the lowest memory address, it's little-endian
If the least significant byte is at the highest memory address, it's big-endian
The volatile keyword in programming is used to indicate that a variable's value can be changed unexpectedly.
Volatile keyword is used in multithreaded programming to prevent compiler optimizations on variables that can be changed by other threads.
It tells the compiler not to cache the variable's value in a register, ensuring that every access is made to the variable's memory location.
Commonly used in embedded systems pr...
Function pointers in C are used to store the address of functions, allowing for dynamic function calls and callbacks.
Function pointers can be used to implement callbacks in event-driven programming.
They can be used to switch between different functions at runtime.
Function pointers are commonly used in implementing data structures like function pointers in an array of function pointers.
Example: void (*funcPtr)(int) = &a
Design a data structure for multi-threading
Use a thread-safe queue to manage tasks for each thread
Implement a lock or semaphore to control access to shared resources
Consider using condition variables for synchronization
Use atomic operations for shared variables to prevent race conditions
The kernel is the core component of an operating system that manages system resources and provides a bridge between software and hardware.
Manages system resources such as CPU, memory, and I/O devices
Provides a bridge between software applications and hardware components
Handles tasks such as process scheduling, memory management, and device drivers
Controls communication between hardware and software layers
A storage class in programming defines the scope and lifetime of variables.
Storage classes include auto, register, static, and extern.
Auto variables are created when a function is called and destroyed when the function ends.
Register variables are stored in CPU registers for faster access.
Static variables retain their value between function calls.
Extern variables are declared outside of any function and can be accessed
Round duration - 30 minutes
Round difficulty - Easy
HR round with typical behavioral problems.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.
Design logical circuits for arithmetic circuits in a blackbox.
Understand the functionality of the arithmetic circuits in the blackbox.
Identify the inputs and outputs of the blackbox.
Design logical circuits using logic gates to replicate the arithmetic operations.
Test the logical circuits to ensure they produce the same outputs as the arithmetic circuits.
Recursion in embedded C-code allows a function to call itself, useful for repetitive tasks or complex algorithms.
Ensure proper base case to avoid infinite recursion
Use stack space efficiently as embedded systems have limited resources
Avoid recursive functions with deep call stacks to prevent stack overflow
Example: Recursive function to calculate factorial of a number
I applied via Campus Placement and was interviewed in Dec 2016. There were 4 interview rounds.
I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.
I am a passionate software engineer with experience in developing web applications using various technologies.
Experienced in developing web applications using HTML, CSS, JavaScript, and frameworks like React and Angular
Proficient in backend development with Node.js and databases like MongoDB and MySQL
Familiar with version control systems like Git and project management tools like Jira
based on 1 interview
Interview experience
based on 5 reviews
Rating in categories
Senior Engineer
1.2k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
959
salaries
| ₹0 L/yr - ₹0 L/yr |
Engineer
888
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
611
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Leader Engineer
431
salaries
| ₹0 L/yr - ₹0 L/yr |
Nvidia
Intel
Mercedes-Benz Research and Development India
Broadcom