Filter interviews by
I applied via Naukri.com and was interviewed in May 2023. There were 5 interview rounds.
Rate your
company
🤫 100% anonymous
How was your last interview experience?
I applied via Recruitment Consulltant and was interviewed in Feb 2023. There were 3 interview rounds.
Linux system process, PKI, Cryptography, and Secure Boot process are all important components of secure computing.
Linux system process refers to the way in which the operating system manages and executes programs and applications.
PKI (Public Key Infrastructure) is a system for managing digital certificates and public-private key pairs to ensure secure communication.
Cryptography involves the use of mathematical algorith...
I applied via Referral and was interviewed in Nov 2022. There were 4 interview rounds.
I applied via Approached by Company and was interviewed in Sep 2022. There were 4 interview rounds.
Scenario based programming questions?
General stuff about project and role which i have done
Memory leaks can be found and fixed using various tools and techniques.
Use memory profiling tools like Valgrind, LeakSanitizer, or AddressSanitizer to detect memory leaks.
Analyze the code to identify the root cause of the memory leak and fix it.
Ensure that all allocated memory is properly deallocated and avoid unnecessary memory allocations.
Use smart pointers and garbage collection techniques to manage memory automatic...
System call is a request made by a program to the operating system for performing a specific task.
System call provides an interface between the user program and the operating system.
It allows user programs to request services from the operating system.
Examples of system calls include read, write, open, close, fork, exec, etc.
System call is initiated by a software interrupt or trap instruction.
The operating system perfo...
Expression to clear nth bit in a number
Use bitwise AND operator with the complement of 2 raised to the nth power
Example: To clear 3rd bit of 1010, use 1010 & ~(1<<3) = 1000
Circular buffer program with producer and consumer scenario, detecting overflow and stopping producer.
Implement a circular buffer with a fixed size and two pointers for producer and consumer
Use semaphores to synchronize access to the buffer
When the buffer is full, stop the producer until the consumer reads from the buffer
When the buffer is empty, stop the consumer until the producer writes to the buffer
Use mutex locks ...
Program to delete a node in a singly linked list
Find the node to be deleted and its previous node
Update the previous node's next pointer to skip the node to be deleted
Free the memory occupied by the node to be deleted
Secure boot flow in Intel and NXP
Intel uses a firmware-based approach to secure boot, where the firmware verifies the digital signature of the bootloader and OS kernel before loading them
NXP uses a hardware-based approach to secure boot, where the boot ROM verifies the digital signature of the bootloader and OS kernel before loading them
Both Intel and NXP use Trusted Platform Module (TPM) to store and verify the digita...
RadiSys interview questions for popular designations
I applied via Approached by Company and was interviewed in Nov 2022. There were 5 interview rounds.
C programming on array and linked list
Complex linked list and sorting questions
Embedded C and protocols
Get interview-ready with Top RadiSys Interview Questions
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
I applied via Recruitment Consulltant and was interviewed in Feb 2023. There were 3 interview rounds.
To move the cursor 5 characters ahead of current position in an opened file.
Use fseek() function to move the cursor to the desired position.
Pass the current position and offset to fseek() function.
Use SEEK_CUR as the reference point for the offset.
Answering which statement about a binary heap is false.
A binary heap is a complete binary tree where the parent node is always greater or smaller than its children.
A binary heap can be represented as an array.
A binary heap can be used to implement priority queues.
A binary heap can only be a max heap and not a min heap.
Virtual function is a function in base class that is overridden in derived class.
Virtual function allows polymorphism in C++.
It is declared in base class with virtual keyword.
It is overridden in derived class with same signature.
It is called based on the object type at runtime.
Example: virtual void display() = 0; // pure virtual function
Mutex is a synchronization mechanism used to prevent multiple threads from accessing shared resources simultaneously.
Mutex stands for mutual exclusion.
It is used to protect critical sections of code where multiple threads may try to access shared resources.
Mutex allows only one thread to access the shared resource at a time.
If another thread tries to access the resource while it is locked by a mutex, it will be blocked...
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Identify the primary key of the table
Eliminate repeating groups and create separate tables for them
Ensure each table has a single theme or subject
Create relationships between tables using foreign keys
Ensure data is consistent and follows a standard format
Kubernetes is an open-source container orchestration platform that automates deployment, scaling, and management of containerized applications.
Kubernetes is used to manage containerized applications across multiple hosts.
It automates deployment, scaling, and management of containerized applications.
Kubernetes provides features like load balancing, self-healing, and rolling updates.
It makes it easier to manage and scale...
Top trending discussions
The duration of RadiSys interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 33 interviews
Interview experience
Anonymously discuss salaries, work culture, and many more
Get Ambitionbox App
based on 421 reviews
Rating in categories
Lead Engineer
251
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
249
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
241
salaries
| ₹0 L/yr - ₹0 L/yr |
Staff Engineer
178
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Engineer
133
salaries
| ₹0 L/yr - ₹0 L/yr |
Intel
NXP Semiconductors
Texas Instruments
Analog Devices