Filter interviews by
I applied via Recruitment Consulltant and was interviewed in Aug 2024. There were 2 interview rounds.
Normal aptitude questions
C code for printing Fibonacci Series upto n elements
Declare three variables to store the current, previous and next numbers in the series
Initialize the previous and current variables to 0 and 1 respectively
Use a loop to print the next number in the series by adding the previous two numbers
Loop should run n times to print n elements in the series
I appeared for an interview before Sep 2016.
I have worked on various technologies including Java, Python, AWS, Docker, and Kubernetes.
Java
Python
AWS
Docker
Kubernetes
Daily operational activities case studies
Case study of optimizing production line for efficiency
Case study of implementing new safety protocols in a manufacturing plant
Case study of troubleshooting and resolving technical issues in a software development team
Case study of streamlining inventory management in a retail store
Case study of improving customer service processes in a call center
Project management is the process of planning, organizing, and overseeing the execution of a project from start to finish.
It involves defining project goals and objectives
Creating a project plan and timeline
Assigning tasks and responsibilities to team members
Monitoring progress and making adjustments as needed
Ensuring that the project is completed on time, within budget, and meets the desired quality standards
Examples ...
Financial and cost control is the process of monitoring and managing project expenses to ensure they stay within budget.
Developing a detailed budget plan
Tracking expenses and comparing them to the budget plan
Identifying and addressing cost overruns
Negotiating with vendors to get the best prices
Implementing cost-saving measures
Regularly reporting on financial status to stakeholders
Resource management is the process of planning, allocating, and optimizing resources to achieve organizational goals.
It involves identifying the resources needed for a project or task
Allocating those resources in an efficient manner
Monitoring and controlling resource usage to ensure optimal performance
Examples include managing personnel, finances, equipment, and time
Effective resource management can lead to increased p
2G, 3G, and 4G call flow are the processes involved in establishing and maintaining a mobile phone call.
2G call flow involves circuit-switched technology and uses Time Division Multiple Access (TDMA) for voice transmission.
3G call flow uses packet-switched technology and supports both voice and data transmission.
4G call flow uses Long-Term Evolution (LTE) technology and provides high-speed data transmission.
All call fl...
Single RAN is a network architecture that allows multiple wireless technologies to be supported on a single physical network.
Single RAN stands for Single Radio Access Network.
It enables multiple wireless technologies such as 2G, 3G, 4G, and 5G to be supported on a single physical network.
This reduces the need for multiple hardware and software components, resulting in cost savings and simplified network management.
Sing...
VOLTE stands for Voice over LTE. It is a technology that allows voice calls to be made over a 4G LTE network.
VOLTE uses IP packets to transmit voice calls over the LTE network
It provides better call quality and faster call setup times compared to traditional 2G/3G networks
VOLTE also allows for simultaneous voice and data usage on the same network
Examples of VOLTE-enabled devices include iPhone 6 and above, Samsung Gala...
LTE is a standard for wireless broadband communication while VoLTE is a technology that enables voice calls over LTE network.
LTE stands for Long-Term Evolution and is a standard for wireless broadband communication.
VoLTE stands for Voice over LTE and is a technology that enables voice calls over LTE network.
LTE is used for data transfer while VoLTE is used for voice calls.
VoLTE provides better call quality and faster c...
Transport network refers to the infrastructure that enables the movement of people, goods, and information.
Transport network includes roads, railways, airports, seaports, and communication networks.
It plays a crucial role in the economy by facilitating trade and commerce.
Examples of transport networks include the interstate highway system in the US and the European railway network.
Transport network planning involves op...
ABIS over IP and ABIS over TDM are two different methods of transmitting biometric data.
ABIS over IP uses internet protocol to transmit biometric data while ABIS over TDM uses time-division multiplexing.
ABIS over IP is more flexible and scalable than ABIS over TDM.
ABIS over TDM is more reliable and secure than ABIS over IP.
ABIS over IP is suitable for remote locations while ABIS over TDM is suitable for local networks.
...
2G, 3G, and 4G are mobile network technologies with different architectures.
2G uses circuit-switched technology and is primarily used for voice calls and text messaging.
3G uses packet-switched technology and offers faster data transfer rates than 2G.
4G uses all-IP packet-switched technology and provides even faster data transfer rates than 3G.
4G also supports advanced features like VoLTE and carrier aggregation.
Each ge...
I am a Senior engineer with 10+ years of experience in software development, specializing in backend systems and cloud technologies.
10+ years of experience in software development
Specialize in backend systems and cloud technologies
Strong problem-solving skills
Experience with large-scale distributed systems
Proficient in programming languages such as Java, Python, and Go
I have worked in various companies ranging from startups to large corporations, gaining experience in diverse technologies and industries.
Worked in a startup where I was responsible for developing a scalable backend system using Node.js and MongoDB.
At a mid-sized company, I led a team in implementing CI/CD pipelines for faster and more reliable software delivery.
In a large corporation, I worked on optimizing performanc...
I am impressed by the company's innovative projects and strong reputation in the industry.
Company's reputation for cutting-edge technology
Opportunity to work on challenging projects
Positive reviews from current employees
My notice period is currently 3 months, but it may be negotiable depending on the circumstances.
My current notice period is 3 months
I am open to negotiation depending on the circumstances
I can provide examples of when I have negotiated notice periods in the past
I appeared for an interview in Mar 2017.
I have the technical skills, experience, and passion to deliver high-quality software solutions.
I have a strong background in programming languages such as Java, Python, and C++.
I have experience working on complex software projects and collaborating with cross-functional teams.
I am passionate about staying up-to-date with the latest technologies and trends in software development.
I am a quick learner and have a strong...
Ericsson is a global leader in telecommunications technology with a strong focus on innovation and career development.
Global leader in telecommunications technology
Strong focus on innovation
Opportunities for career development
I appeared for an interview before Mar 2021.
Round duration - 15 minutes
Round difficulty - Easy
This was a group discussion round where we were divided into groups of 10 and we had 15 minutes for GD.
Round duration - 60 minutes
Round difficulty - Medium
This is all about how good you are with the fundamentals. Out of 10 I would give it a 6.5 on difficulty.
You are given a string STR
which contains alphabets, numbers, and special characters. Your task is to reverse the string.
STR = "abcde"
"e...
Reverse a given string containing alphabets, numbers, and special characters.
Iterate through the string from the end to the beginning and append each character to a new string.
Use built-in functions like reverse() or StringBuilder in languages like Python or Java for efficient reversal.
Handle special characters and numbers while reversing the string.
Ensure to consider the constraints on the length of the string and the
A deadlock is a situation in which two or more processes are unable to proceed because each is waiting for the other to release a resource.
Occurs in multitasking environments where processes compete for limited resources
Can be resolved using techniques like deadlock prevention, deadlock avoidance, and deadlock detection
Example: Process A holds Resource X and waits for Resource Y, while Process B holds Resource Y and wa
A thread is a lightweight sub-process that allows concurrent execution within a single process.
Threads share the same memory space within a process.
Threads are used to achieve parallelism and improve performance.
Examples of threads include the main thread in a program and worker threads in a multi-threaded application.
Multiprocessing involves multiple processors executing multiple tasks simultaneously, while multiprogramming involves multiple programs sharing a single processor by switching between them.
Multiprocessing utilizes multiple processors to execute multiple tasks concurrently.
Multiprogramming involves multiple programs sharing a single processor by switching between them.
Multiprocessing is more efficient in terms of perfor...
Process life cycle in an operating system involves creation, execution, termination, and resource management.
Creation: When a process is created, it is assigned a unique process ID and allocated necessary resources.
Execution: The process is then scheduled by the operating system to run on the CPU.
Termination: Once the process completes its task or is terminated by the user, it is removed from memory.
Resource Management...
Windows XP and Windows 7 are both operating systems developed by Microsoft, but they have several key differences.
User interface: Windows 7 has a more modern and user-friendly interface compared to Windows XP.
Performance: Windows 7 is generally faster and more stable than Windows XP.
Security: Windows 7 has more advanced security features and updates compared to Windows XP.
Hardware support: Windows 7 supports newer hard...
Round duration - 60 minutes
Round difficulty - Easy
Technical round with questions on DBMS and Networking mainly.
RDBMS is a type of DBMS that stores data in a structured format with relationships between tables.
RDBMS enforces referential integrity and allows for normalization of data.
DBMS is a general term for any system that manages databases, while RDBMS specifically refers to relational databases.
Examples of RDBMS include MySQL, Oracle, and SQL Server.
Examples of DBMS include MongoDB and Redis.
An Object-Oriented Database Management System (OODBMS) is a type of database management system that supports the creation and management of objects in a database.
OODBMS stores data in the form of objects, which can contain attributes and methods.
It allows for complex data structures and relationships to be represented more easily.
Examples of OODBMS include db4o, ObjectDB, and ObjectStore.
Use the COUNT DISTINCT function in SQL to find the number of unique values in a database.
Use the COUNT DISTINCT function along with the column name to count the number of unique values in that column.
For example, SELECT COUNT(DISTINCT column_name) FROM table_name;
You can also use GROUP BY to find the number of unique values for multiple columns.
A hub operates at the physical layer and broadcasts data to all devices on the network, while a switch operates at the data link layer and forwards data only to the intended recipient.
Hub operates at the physical layer, while switch operates at the data link layer
Hub broadcasts data to all devices on the network, while switch forwards data only to the intended recipient
Switch is more efficient and secure compared to a
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
Physical Layer: Deals with the physical connection between devices. Example: Ethernet cables.
Data Link Layer: Responsible for node-to-node communication. Example: MAC addresses.
Network Layer: Manages routing of data packets. Example: IP addresses.
T...
Different protocols supported at each OSI layer
Layer 1 (Physical): Ethernet, Wi-Fi, Bluetooth
Layer 2 (Data Link): MAC, PPP, HDLC
Layer 3 (Network): IP, ICMP, ARP
Layer 4 (Transport): TCP, UDP, SCTP
Layer 5 (Session): NetBIOS, PPTP
Layer 6 (Presentation): SSL, TLS
Layer 7 (Application): HTTP, FTP, SMTP
Round duration - 15 minutes
Round difficulty - Easy
IF you make it to the HR round you are selected. All 28 that attended got selected . It was more like stuff for formality. The usual questions.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I applied via Company Website and was interviewed before Mar 2020. There was 1 interview round.
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Start from the first element and compare it with the next element
If the first element is greater than the next element, swap them
Repeat this process for all elements in the list
Continue this process until no more swaps are needed
A Turing Machine is a theoretical device that can simulate any algorithmic computation.
It was proposed by Alan Turing in 1936 as a model for computation.
It consists of a tape, a head that can read and write symbols on the tape, and a set of rules for transitioning between states.
It can simulate any algorithmic computation, making it a powerful tool for theoretical computer science.
It is often used as a theoretical basi...
A hash function is a mathematical function that converts input data of arbitrary size into a fixed-size output.
Hash functions are used to index data in hash tables.
They are also used in cryptography to securely store passwords.
Examples of hash functions include MD5, SHA-1, and SHA-256.
I am a software developer with experience in multiple programming languages and a passion for problem-solving.
Experienced in Java, C++, and Python
Strong knowledge of data structures and algorithms
Proficient in web development using HTML, CSS, and JavaScript
Familiar with agile development methodologies
Excellent problem-solving and analytical skills
Automation framework is a set of guidelines, standards, and coding practices used to create automated test scripts.
It provides a structured way to develop and maintain automated tests
It includes tools, libraries, and reusable components
It helps in reducing the time and effort required for testing
Examples include Selenium, Appium, and Robot Framework
High severity refers to critical defects that impact the core functionality of the software, while low severity refers to minor issues that have minimal impact on functionality.
High severity issues can cause the software to crash or result in data loss.
Low severity issues are cosmetic or minor usability problems.
From a QA point of view, high severity issues are more critical as they can significantly impact the user ex...
Class is a blueprint for creating objects while interface defines a contract for classes to implement.
A class can have attributes and methods while an interface only has method signatures.
A class can be instantiated while an interface cannot.
A class can only inherit from one class while it can implement multiple interfaces.
Example: Class - Animal, Interface - Flyable
Animal can have attributes like name, age, etc. and m...
Static keyword is used to declare a variable or method that belongs to the class rather than an instance of the class.
Static variables are shared among all instances of a class
Static methods can be called without creating an instance of the class
Static blocks are used to initialize static variables
Static keyword can also be used to create nested classes
Example: public static int count;
Access modifiers control the visibility and accessibility of class members.
Public: accessible from anywhere
Private: accessible only within the class
Protected: accessible within the class and its subclasses
Default: accessible within the same package
Used to enforce encapsulation and prevent unauthorized access
Interface defines only method signatures while abstract class can have both method signatures and implementations.
An interface can be implemented by multiple classes while an abstract class can only be extended by one class.
An abstract class can have constructors while an interface cannot.
An abstract class can have instance variables while an interface cannot.
An abstract class can provide default implementations for so...
A program for login scenario using defined automation architecture.
Identify the elements on the login page such as username, password, and login button
Use automation tools like Selenium to interact with the elements and input data
Verify successful login by checking for expected elements on the landing page
Implement error handling for incorrect login credentials
Use a modular and scalable architecture for maintainability
To store and print numbers from an array using arrayList.
Create an arrayList object
Loop through the array and add each element to the arrayList using add() method
Print the arrayList using toString() method
Example: int[] arr = {1, 2, 3}; ArrayList
Test scenario for download functionality of a songs website
Verify that the download button is visible and clickable
Check that the downloaded file is in the correct format
Ensure that the downloaded file is not corrupted
Test the download speed for different file sizes
Verify that the download progress is displayed to the user
Cache stores data temporarily to reduce server load while cookies store user information for website personalization.
Cache stores frequently accessed data to reduce server load and improve website performance.
Cookies store user information such as login credentials, preferences, and shopping cart items.
Cache is temporary and can be cleared at any time, while cookies can have an expiration date.
Cache is stored on the us...
The question asks to input an array and print the repeating characters.
Iterate through the array and store each element in a hash table or dictionary.
If an element already exists in the hash table, it is a repeating character.
Print all the repeating characters found.
Program to find the second minimum in an array.
Sort the array and return the second element.
Initialize two variables to store minimum and second minimum values.
Loop through the array and update the variables accordingly.
To find the longest palindrome in a given string.
Iterate through the string and check for palindromes of odd and even lengths.
Keep track of the longest palindrome found so far.
Use two pointers to check if the substring is a palindrome.
If the substring is a palindrome and its length is greater than the current longest palindrome, update the longest palindrome.
Find the next higher number with equal number of ones in binary representation.
Convert input number to binary
Count number of ones in binary representation
Increment input number until binary representation has equal number of ones
Convert incremented number to decimal
Find the duplicate number in an array of 10 numbers with only 2 steps.
Use a hash set to keep track of visited numbers.
Iterate through the array and check if the number is already in the set.
If it is, then it is the duplicate number.
If not, add it to the set.
At the end, the duplicate number will be found.
Program to print elements of a linked list in reverse order using same single linked list
Traverse the linked list and push each element onto a stack
Pop elements from the stack and print them in reverse order
To check the occurrence and correctness of HTML tags, we can use various tools and techniques.
One way is to use a browser's developer tools to inspect the HTML code and see the tags and their frequency.
Another way is to use an online HTML validator tool that checks for correct syntax and tag usage.
We can also use programming languages like Python to parse HTML and count the occurrence of each tag.
Regular expressions ca...
based on 1 interview
Interview experience
based on 7 reviews
Rating in categories
Design Engineer
12
salaries
| ₹1.5 L/yr - ₹2 L/yr |
Senior Engineer
4
salaries
| ₹3.1 L/yr - ₹10 L/yr |
BYJU'S
Ericsson
Delhivery
Ekart Logistics