Filter interviews by
I applied via Approached by Company and was interviewed in Sep 2022. There were 4 interview rounds.
Scenario based programming questions?
General stuff about project and role which i have done
Memory leaks can be found and fixed using various tools and techniques.
Use memory profiling tools like Valgrind, LeakSanitizer, or AddressSanitizer to detect memory leaks.
Analyze the code to identify the root cause of the memory leak and fix it.
Ensure that all allocated memory is properly deallocated and avoid unnecessary memory allocations.
Use smart pointers and garbage collection techniques to manage memory automatic...
System call is a request made by a program to the operating system for performing a specific task.
System call provides an interface between the user program and the operating system.
It allows user programs to request services from the operating system.
Examples of system calls include read, write, open, close, fork, exec, etc.
System call is initiated by a software interrupt or trap instruction.
The operating system perfo...
Expression to clear nth bit in a number
Use bitwise AND operator with the complement of 2 raised to the nth power
Example: To clear 3rd bit of 1010, use 1010 & ~(1<<3) = 1000
Circular buffer program with producer and consumer scenario, detecting overflow and stopping producer.
Implement a circular buffer with a fixed size and two pointers for producer and consumer
Use semaphores to synchronize access to the buffer
When the buffer is full, stop the producer until the consumer reads from the buffer
When the buffer is empty, stop the consumer until the producer writes to the buffer
Use mutex locks ...
Program to delete a node in a singly linked list
Find the node to be deleted and its previous node
Update the previous node's next pointer to skip the node to be deleted
Free the memory occupied by the node to be deleted
Secure boot flow in Intel and NXP
Intel uses a firmware-based approach to secure boot, where the firmware verifies the digital signature of the bootloader and OS kernel before loading them
NXP uses a hardware-based approach to secure boot, where the boot ROM verifies the digital signature of the bootloader and OS kernel before loading them
Both Intel and NXP use Trusted Platform Module (TPM) to store and verify the digita...
Top trending discussions
Software Engineer
248
salaries
| ₹6 L/yr - ₹17 L/yr |
Lead Engineer
245
salaries
| ₹14 L/yr - ₹42.2 L/yr |
Senior Software Engineer
243
salaries
| ₹11 L/yr - ₹31 L/yr |
Staff Engineer
159
salaries
| ₹20.1 L/yr - ₹52 L/yr |
Senior Engineer
134
salaries
| ₹10.5 L/yr - ₹30.1 L/yr |
Intel
NXP Semiconductors
Texas Instruments
Analog Devices