i
Synopsys
Filter interviews by
I applied via Campus Placement and was interviewed in Sep 2021. There were 4 interview rounds.
Verilog code for d-ff
Declare input and output ports
Use always block to implement the functionality
Use non-blocking assignment for output
Use blocking assignment for clock and reset
I applied via Campus Placement and was interviewed in Dec 2021. There were 3 interview rounds.
Cryptography is the practice and study of techniques for securing information and communication.
Cryptography is used to protect data from unauthorized access.
It involves techniques such as encryption and decryption.
Common encryption algorithms include DES, 3DES, AES, and RC4.
Asymmetric encryption uses different keys for encryption and decryption, while symmetric encryption uses the same key.
Cryptography is essential fo
Synopsys interview questions for popular designations
I applied via Referral and was interviewed before Aug 2020. There were 4 interview rounds.
The left view of a binary tree shows the nodes that are visible when the tree is viewed from the left side.
Traverse the tree recursively from left to right
Print the first node encountered at each level
Example: For tree with root node A, left view is A, B, D, G
C++ is an extension of C with object-oriented programming features.
C++ supports classes and objects while C does not.
C++ has better support for polymorphism and inheritance.
C++ has a standard template library (STL) for data structures and algorithms.
C++ allows function overloading while C does not.
C++ has exception handling while C does not.
To find the middle of a linked list, use two pointers - one moving at twice the speed of the other.
Use two pointers - slow and fast
Slow pointer moves one node at a time, fast pointer moves two nodes at a time
When fast pointer reaches the end, slow pointer will be at the middle
Semaphores, OSI layers, deadlock and ACID protocols in DBMS
Semaphores are used for process synchronization and communication
OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, Application
Deadlock protocols prevent processes from entering a deadlock state
ACID protocols ensure database transactions are reliable and consistent
Boundary traversal of a binary tree is the process of visiting the nodes on the boundary of the tree.
Start with the root node and traverse the left boundary nodes from top to bottom.
Traverse the leaf nodes from left to right.
Traverse the right boundary nodes from bottom to top.
Exclude the leaf nodes that are already traversed in the second step.
Repeat the above steps for all the subtrees of the binary tree.
Linear data structures have a sequential arrangement of elements while non-linear data structures have a hierarchical arrangement.
Linear data structures have a fixed number of elements and are easy to traverse.
Non-linear data structures have an arbitrary number of elements and are difficult to traverse.
Arrays, linked lists, and stacks are examples of linear data structures.
Trees, graphs, and heaps are examples of non-l
Steps for client server connection request.
Client sends a connection request to the server.
Server receives the request and sends a response.
Client receives the response and establishes a connection.
Connection is maintained until terminated by either party.
Producer and consumer problem is a synchronization problem in computer science where multiple processes share a common resource.
It occurs when multiple processes try to access a shared resource simultaneously.
The producer produces data and the consumer consumes it.
The problem is to ensure that the producer does not produce data when the buffer is full and the consumer does not consume data when the buffer is empty.
Exam...
Processes are independent programs while threads are lightweight processes within a program.
Processes have their own memory space while threads share memory space.
Processes communicate through inter-process communication while threads communicate directly.
Processes are slower to create and terminate than threads.
Examples of processes are web browsers, word processors, etc. while examples of threads are spell checkers,
Get interview-ready with Top Synopsys Interview Questions
I applied via LinkedIn and was interviewed in Jul 2020. There were 4 interview rounds.
I applied via LinkedIn and was interviewed before Sep 2020. There was 1 interview round.
I was interviewed in May 2019.
I applied via Referral and was interviewed before Mar 2020. There were 3 interview rounds.
I applied via Approached by Company and was interviewed in Nov 2018. There were 5 interview rounds.
Signing off using formal involves thorough verification and validation of the design against specifications.
Ensure all design properties are formally verified against specifications
Review and analyze formal verification results for completeness and correctness
Document the formal verification process and results for sign off
Obtain approval from stakeholders based on the formal verification results
Verilog code for counters
Use always blocks to create synchronous counters
Use reg data types to store the count values
Use if statements to implement the counting logic
Example: module counter (input clk, reset, output reg [3:0] count); always @(posedge clk) begin if (reset) count <= 4'b0000; else count <= count + 1; end endmodule
Top trending discussions
Some of the top questions asked at the Synopsys interview -
The duration of Synopsys interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 65 interviews
Interview experience
based on 353 reviews
Rating in categories
Hyderabad / Secunderabad,
Bangalore / Bengaluru
2-6 Yrs
Not Disclosed
Hyderabad / Secunderabad,
Bangalore / Bengaluru
12-20 Yrs
Not Disclosed
R&D Engineer
148
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior R&D Engineer
99
salaries
| ₹0 L/yr - ₹0 L/yr |
Staff Engineer
92
salaries
| ₹0 L/yr - ₹0 L/yr |
Security Consultant
60
salaries
| ₹0 L/yr - ₹0 L/yr |
Applications Engineer
58
salaries
| ₹0 L/yr - ₹0 L/yr |
Cadence Design Systems
Mentor Graphics
Ansys Software Private Limited
Infineon Technologies