Filter interviews by
Circular buffer program with producer and consumer scenario, detecting overflow and stopping producer.
Implement a circular buffer with a fixed size and two pointers for producer and consumer
Use semaphores to synchronize access to the buffer
When the buffer is full, stop the producer until the consumer reads from the buffer
When the buffer is empty, stop the consumer until the producer writes to the buffer
Use mutex l...
Secure boot flow in Intel and NXP
Intel uses a firmware-based approach to secure boot, where the firmware verifies the digital signature of the bootloader and OS kernel before loading them
NXP uses a hardware-based approach to secure boot, where the boot ROM verifies the digital signature of the bootloader and OS kernel before loading them
Both Intel and NXP use Trusted Platform Module (TPM) to store and verify the d...
Program to delete a node in a singly linked list
Find the node to be deleted and its previous node
Update the previous node's next pointer to skip the node to be deleted
Free the memory occupied by the node to be deleted
Expression to clear nth bit in a number
Use bitwise AND operator with the complement of 2 raised to the nth power
Example: To clear 3rd bit of 1010, use 1010 & ~(1<<3) = 1000
System call is a request made by a program to the operating system for performing a specific task.
System call provides an interface between the user program and the operating system.
It allows user programs to request services from the operating system.
Examples of system calls include read, write, open, close, fork, exec, etc.
System call is initiated by a software interrupt or trap instruction.
The operating system ...
Memory leaks can be found and fixed using various tools and techniques.
Use memory profiling tools like Valgrind, LeakSanitizer, or AddressSanitizer to detect memory leaks.
Analyze the code to identify the root cause of the memory leak and fix it.
Ensure that all allocated memory is properly deallocated and avoid unnecessary memory allocations.
Use smart pointers and garbage collection techniques to manage memory auto...
Mutexes and semaphores are synchronization primitives used to manage access to shared resources in concurrent programming.
Mutex (Mutual Exclusion) allows only one thread to access a resource at a time. Example: A printer shared by multiple users.
Semaphore is a signaling mechanism that controls access to a resource with a set number of permits. Example: A pool of database connections.
Mutex is binary (locked/unlocke...
I applied via Approached by Company and was interviewed in Sep 2022. There were 4 interview rounds.
Scenario based programming questions?
General stuff about project and role which i have done
Memory leaks can be found and fixed using various tools and techniques.
Use memory profiling tools like Valgrind, LeakSanitizer, or AddressSanitizer to detect memory leaks.
Analyze the code to identify the root cause of the memory leak and fix it.
Ensure that all allocated memory is properly deallocated and avoid unnecessary memory allocations.
Use smart pointers and garbage collection techniques to manage memory automatic...
Mutexes and semaphores are synchronization primitives used to manage access to shared resources in concurrent programming.
Mutex (Mutual Exclusion) allows only one thread to access a resource at a time. Example: A printer shared by multiple users.
Semaphore is a signaling mechanism that controls access to a resource with a set number of permits. Example: A pool of database connections.
Mutex is binary (locked/unlocked), w...
System call is a request made by a program to the operating system for performing a specific task.
System call provides an interface between the user program and the operating system.
It allows user programs to request services from the operating system.
Examples of system calls include read, write, open, close, fork, exec, etc.
System call is initiated by a software interrupt or trap instruction.
The operating system perfo...
Expression to clear nth bit in a number
Use bitwise AND operator with the complement of 2 raised to the nth power
Example: To clear 3rd bit of 1010, use 1010 & ~(1<<3) = 1000
Led multiple projects focusing on cloud infrastructure, CI/CD pipelines, and automation tools to enhance platform reliability and scalability.
Designed and implemented a CI/CD pipeline using Jenkins and Docker, reducing deployment time by 40%.
Managed a team of engineers to migrate legacy applications to AWS, improving system performance and reducing costs by 30%.
Developed automation scripts using Python and Terraform fo...
Circular buffer program with producer and consumer scenario, detecting overflow and stopping producer.
Implement a circular buffer with a fixed size and two pointers for producer and consumer
Use semaphores to synchronize access to the buffer
When the buffer is full, stop the producer until the consumer reads from the buffer
When the buffer is empty, stop the consumer until the producer writes to the buffer
Use mutex locks ...
Program to delete a node in a singly linked list
Find the node to be deleted and its previous node
Update the previous node's next pointer to skip the node to be deleted
Free the memory occupied by the node to be deleted
Secure boot flow in Intel and NXP
Intel uses a firmware-based approach to secure boot, where the firmware verifies the digital signature of the bootloader and OS kernel before loading them
NXP uses a hardware-based approach to secure boot, where the boot ROM verifies the digital signature of the bootloader and OS kernel before loading them
Both Intel and NXP use Trusted Platform Module (TPM) to store and verify the digita...
Top trending discussions
I applied via Recruitment Consultant
I will drive innovation through cross-functional collaboration, continuous learning, and data-driven decision-making.
Promote cross-functional collaboration to leverage diverse perspectives and expertise
Encourage continuous learning and development to stay ahead of industry trends
Utilize data-driven decision-making to identify opportunities for growth and optimization
I applied via Company Website and was interviewed in Oct 2024. There were 3 interview rounds.
1st round some apt qns,some prgramming qns are they asked
I applied via Referral and was interviewed before Jul 2023. There was 1 interview round.
It was JS question paper sheet.
Questions from C, Java, linux, C++, Sql were asked
I applied via Campus Placement and was interviewed in Oct 2023. There were 2 interview rounds.
Average level aptitude test which contains questions from topics like time and work, proportion, probability, Speed and distance etc.
GD was done with a group of 6.
I applied via Job Fair and was interviewed in Nov 2023. There were 2 interview rounds.
C,java,Sql and advanced Java and c also
I applied via Campus Placement and was interviewed before May 2023. There was 1 interview round.
Easy question were there for aptitude which was used to filter the candidate
Lead Engineer
277
salaries
| ₹22 L/yr - ₹36.7 L/yr |
Senior Software Engineer
266
salaries
| ₹15 L/yr - ₹27 L/yr |
Software Engineer
262
salaries
| ₹6 L/yr - ₹18 L/yr |
Staff Engineer
193
salaries
| ₹29.3 L/yr - ₹46.8 L/yr |
Senior Engineer
145
salaries
| ₹10.5 L/yr - ₹34 L/yr |
Motorola Solutions
HFCL Limited
Ciena
CommScope