RadiSys
30+ Talent Arabia Interview Questions and Answers
Ninja loves playing with numbers. So one day, he wants to arrange a few numbers in the ‘N’ number of rows. The first row contains 1 number, the second row has two numbers, the third row has ...read more
Q2. 18. How to find how much process are running on server
Use command line tools like 'ps' or 'top' to find the number of running processes on a server.
Use 'ps aux' command to list all running processes and count the number of lines
Use 'top' command and look for the 'Tasks' section which shows the number of running processes
Use 'htop' command which provides a more interactive and detailed view of running processes
You are given an array ‘ARR’ consisting of 'N' integers, and your task is to sort the given array in non-decreasing order using the Heap sort algorithm.
Input Format:
The first line of the input contai...read more
Q4. 19. For taking Wireshark logs which command we use
The command used for taking Wireshark logs is 'tcpdump'.
Wireshark is a network protocol analyzer tool
Tcpdump is a command-line tool used to capture network traffic
Tcpdump can be used to capture packets and save them as a file for analysis in Wireshark
Example command: tcpdump -i eth0 -w capture.pcap
Q5. 6. Which bandwidth are you using with RB's
RB's bandwidth usage depends on the specific product and its features.
RB's have different bandwidth usage depending on the product
The bandwidth usage also depends on the features of the product
Examples of RB's with different bandwidth usage are RB750Gr3 and RB4011iGS+RM
Q6. 5. Which numerology are you using
I am not using any numerology in my work as a Senior Software Engineer.
I do not believe in numerology and do not use it in my work.
My focus is on writing efficient and effective code.
Numerology has no place in software engineering.
Q7. A variation of number of connected islands from graph
Count the number of connected islands in a graph
Use Depth First Search (DFS) or Breadth First Search (BFS) to traverse the graph and mark visited nodes
Keep track of the number of islands encountered during traversal
An island is a group of connected 1s in a 2D grid, where '1' represents land and '0' represents water
Q8. Thread synchronisation, print alternate numbers using 5 different threads
Use 5 threads to print alternate numbers with thread synchronization
Create 5 threads, each responsible for printing a specific set of numbers
Use mutex or semaphore to synchronize the threads
Thread 1 prints odd numbers, Thread 2 prints even numbers, and so on
Ensure proper handling of thread creation and synchronization
Example: Thread 1 prints 1, 3, 5, ... Thread 2 prints 2, 4, 6, ...
Q9. Memory leaks how do you find them and fix them?
Memory leaks can be found and fixed using various tools and techniques.
Use memory profiling tools like Valgrind, LeakSanitizer, or AddressSanitizer to detect memory leaks.
Analyze the code to identify the root cause of the memory leak and fix it.
Ensure that all allocated memory is properly deallocated and avoid unnecessary memory allocations.
Use smart pointers and garbage collection techniques to manage memory automatically.
Regularly monitor and test the application to prevent...read more
Q10. Explain Linux system Process PKI Cryptography Secure Boot process
Linux system process, PKI, Cryptography, and Secure Boot process are all important components of secure computing.
Linux system process refers to the way in which the operating system manages and executes programs and applications.
PKI (Public Key Infrastructure) is a system for managing digital certificates and public-private key pairs to ensure secure communication.
Cryptography involves the use of mathematical algorithms to secure data and communications.
Secure Boot process i...read more
Q11. Write a program for Circular buffer implementation with producer and consumer scenario? Detect overflow and stop when detecting overflow and stop producer while consumer completes reading?
Circular buffer program with producer and consumer scenario, detecting overflow and stopping producer.
Implement a circular buffer with a fixed size and two pointers for producer and consumer
Use semaphores to synchronize access to the buffer
When the buffer is full, stop the producer until the consumer reads from the buffer
When the buffer is empty, stop the consumer until the producer writes to the buffer
Use mutex locks to prevent race conditions
Implement error handling for ove...read more
Q12. 13. Find loop in linked list
To find a loop in a linked list, use Floyd's cycle-finding algorithm.
Use two pointers, one moving at a rate of one node per iteration and the other moving at a rate of two nodes per iteration.
If there is a loop, the two pointers will eventually meet at the same node.
If there is no loop, the faster pointer will reach the end of the list.
Time complexity: O(n), Space complexity: O(1)
Q13. 16 .what is semaphore
Semaphore is a synchronization object used to control access to a shared resource.
Semaphore is a signaling mechanism used to control access to a shared resource
It maintains a count of available resources and blocks the thread if the count is zero
Semaphore can be used to implement critical sections, mutexes, and barriers
Examples include controlling access to a database or limiting the number of concurrent connections
Q14. Write an expression to clear a nth bit in a number?
Expression to clear nth bit in a number
Use bitwise AND operator with the complement of 2 raised to the nth power
Example: To clear 3rd bit of 1010, use 1010 & ~(1<<3) = 1000
Q15. Write a program to delete a node in the singly linked list?
Program to delete a node in a singly linked list
Find the node to be deleted and its previous node
Update the previous node's next pointer to skip the node to be deleted
Free the memory occupied by the node to be deleted
Q16. In a file which has opened a file, how do you move the cursor 5 characters ahead of current position?
To move the cursor 5 characters ahead of current position in an opened file.
Use fseek() function to move the cursor to the desired position.
Pass the current position and offset to fseek() function.
Use SEEK_CUR as the reference point for the offset.
Q17. 1. Bwp part concept
BWP part concept refers to the concept of breaking down a software system into smaller, more manageable parts.
BWP stands for Break-When-Problematic
It helps in identifying and isolating issues in the system
Each part should have a clear responsibility and interface with other parts
Q18. 12. What is cce
CCE stands for Continuous and Comprehensive Evaluation.
CCE is a system of evaluation in education that assesses students' progress continuously throughout the year.
It is a comprehensive approach that takes into account various aspects of a student's development, including academic, social, and emotional.
CCE aims to reduce the emphasis on rote learning and promote a more holistic approach to education.
It was introduced in India as part of the Right to Education Act in 2009.
Und...read more
Q19. 14 . WAP set bit or reset bit
WAP set bit or reset bit is a programming concept used to manipulate individual bits in a binary number.
Setting a bit involves changing its value from 0 to 1.
Resetting a bit involves changing its value from 1 to 0.
This concept is commonly used in low-level programming and hardware manipulation.
Example: Setting the 3rd bit of a binary number 1010 would result in 1110.
Example: Resetting the 2nd bit of a binary number 1101 would result in 1001.
Q20. 2. What is corset
Corset is a tight-fitting undergarment worn to shape and support the torso.
Corsets were popular in the Victorian era.
They were worn by women to achieve an hourglass figure.
Modern corsets are often used as fashion statements or for waist training.
Corsets can be made of various materials such as satin, leather, or lace.
They can be fastened with laces, hooks, or zippers.
Q21. 4. Ue attach procedure
UE attach procedure is a process in LTE network where a UE establishes a connection with the network.
UE sends RRC Connection Request message to eNodeB
eNodeB sends RRC Connection Setup message to UE
UE sends RRC Connection Setup Complete message to eNodeB
eNodeB sends RRC Connection Reconfiguration message to UE
UE sends RRC Connection Reconfiguration Complete message to eNodeB
UE is now attached to the network
Q22. 17. Array vs linkedlist
Arrays are faster for random access, while linked lists are better for frequent insertions and deletions.
Arrays have a fixed size, while linked lists can grow dynamically.
Arrays are stored in contiguous memory, while linked lists use pointers to connect nodes.
Accessing an element in an array is O(1), while in a linked list it is O(n).
Inserting or deleting an element in an array is O(n), while in a linked list it is O(1) if you have a reference to the node.
Arrays are better fo...read more
Q23. What is system call and how it works?
System call is a request made by a program to the operating system for performing a specific task.
System call provides an interface between the user program and the operating system.
It allows user programs to request services from the operating system.
Examples of system calls include read, write, open, close, fork, exec, etc.
System call is initiated by a software interrupt or trap instruction.
The operating system performs the requested task and returns the result to the user ...read more
Q24. Explain secure boot flow in Intel and NXP?
Secure boot flow in Intel and NXP
Intel uses a firmware-based approach to secure boot, where the firmware verifies the digital signature of the bootloader and OS kernel before loading them
NXP uses a hardware-based approach to secure boot, where the boot ROM verifies the digital signature of the bootloader and OS kernel before loading them
Both Intel and NXP use Trusted Platform Module (TPM) to store and verify the digital signature of the bootloader and OS kernel
Secure boot ens...read more
Q25. 3. Rach procedure
Rach procedure is a surgical procedure used to correct scoliosis.
Rach procedure involves placing screws and rods in the spine to straighten it.
It is typically used for patients with severe scoliosis.
The procedure can take several hours and requires a hospital stay.
Physical therapy is often necessary after the procedure to aid in recovery.
Q26. Which statement about a binary heap is false?
Answering which statement about a binary heap is false.
A binary heap is a complete binary tree where the parent node is always greater or smaller than its children.
A binary heap can be represented as an array.
A binary heap can be used to implement priority queues.
A binary heap can only be a max heap and not a min heap.
Q27. What is mutex? Explain your project.
Mutex is a synchronization mechanism used to prevent multiple threads from accessing shared resources simultaneously.
Mutex stands for mutual exclusion.
It is used to protect critical sections of code where multiple threads may try to access shared resources.
Mutex allows only one thread to access the shared resource at a time.
If another thread tries to access the resource while it is locked by a mutex, it will be blocked until the mutex is released.
Mutex can be used in conjunct...read more
Q28. Design thread safety singleton class
Designing a thread-safe singleton class
Use double-checked locking to ensure thread safety
Make the constructor private to prevent direct instantiation
Provide a static method to access the singleton instance
Use synchronized keyword or locks to handle concurrent access
Consider lazy initialization or eager initialization based on requirements
Q29. Project design the system
Designing a system involves creating a plan for how all components will work together to achieve the desired outcome.
Identify the requirements and goals of the project
Create a high-level design outlining the system architecture
Break down the system into smaller components and design each one individually
Consider scalability, reliability, and performance in the design
Test the design to ensure it meets the requirements and functions correctly
Q30. What is kubernetes. How does it make. Difference from docker. Why do I need it
Kubernetes is an open-source container orchestration platform that automates deployment, scaling, and management of containerized applications.
Kubernetes is used to manage containerized applications across multiple hosts.
It automates deployment, scaling, and management of containerized applications.
Kubernetes provides features like load balancing, self-healing, and rolling updates.
It makes it easier to manage and scale containerized applications.
Kubernetes is different from D...read more
Q31. What is virtual function?
Virtual function is a function in base class that is overridden in derived class.
Virtual function allows polymorphism in C++.
It is declared in base class with virtual keyword.
It is overridden in derived class with same signature.
It is called based on the object type at runtime.
Example: virtual void display() = 0; // pure virtual function
Q32. Convert Binary Tree to linked list
Convert a binary tree to a singly linked list.
Traverse the tree in-order and add each node to the linked list.
Use a stack to keep track of the nodes while traversing the tree.
Recursively merge the left and right subtrees into the linked list.
Use a queue to perform a level-order traversal and add nodes to the linked list.
Q33. Implement a linked list from scratch
Implementing a linked list involves creating a data structure that consists of nodes linked together.
Create a Node class with a value and a next pointer
Create a LinkedList class with a head pointer
Implement methods to add, remove, and traverse nodes
Consider edge cases such as adding to an empty list or removing the head node
Q34. How to normalize data
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Identify the primary key of the table
Eliminate repeating groups and create separate tables for them
Ensure each table has a single theme or subject
Create relationships between tables using foreign keys
Ensure data is consistent and follows a standard format
Q35. Link list programming implementation
Top HR Questions asked in Talent Arabia
Interview Process at Talent Arabia
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month