Filter interviews by
I applied via Campus Placement and was interviewed before Dec 2022. There were 2 interview rounds.
A 4 to 1 multiplexer can be implemented using two 2 to 1 multiplexers.
Connect the select inputs of the two 2 to 1 multiplexers to the two most significant bits of the 4 to 1 multiplexer.
Connect the data inputs of the two 2 to 1 multiplexers to the corresponding data inputs of the 4 to 1 multiplexer.
Connect the outputs of the two 2 to 1 multiplexers to the two inputs of a third 2 to 1 multiplexer.
Connect the output of t...
I applied via Campus Placement and was interviewed in Sep 2022. There were 2 interview rounds.
PE can be applied in EVs for lightweighting, improved performance, and increased range.
PE can be used in the body and chassis of EVs to reduce weight and increase energy efficiency.
PE-based composites can be used in battery enclosures to improve safety and reduce weight.
PE foam can be used as insulation to improve thermal management and increase range.
PE-based adhesives can be used in the assembly of EV components for ...
Inverter converts DC to AC while rectifier converts AC to DC.
Inverter uses electronic switches to convert DC to AC.
Rectifier uses diodes to convert AC to DC.
Inverter is used in solar panels to convert DC to AC for household use.
Rectifier is used in power supplies to convert AC to DC for electronic devices.
Inverter and rectifier are opposite in function but can be used together in some applications.
I applied via Recruitment Consultant and was interviewed in Jul 2021. There was 1 interview round.
What is the ph .
Power of hydrogen
Chlorine atomic number .
17
Chlorine mass number
35
I applied via Recruitment Consultant and was interviewed in Jul 2021. There was 1 interview round.
System Level Solutions interview questions for popular designations
Top trending discussions
posted on 14 Dec 2024
I applied via Referral and was interviewed in Nov 2024. There were 4 interview rounds.
Social Media Intelligence, Crimes through social media , Digital risk protection, Executive and Brand logo infringement
Trademarks protect brand names and logos, copyrights protect creative works, and patents protect inventions.
Trademarks are used to protect brand names, logos, and slogans from being used by others in a way that could confuse consumers.
Copyrights protect original creative works such as books, music, and artwork from being copied or used without permission.
Patents protect inventions and grant the inventor exclusive right...
Threat is a potential danger, vulnerability is a weakness that can be exploited, and risk is the likelihood of a threat exploiting a vulnerability.
Threat: potential danger or harm that can exploit vulnerabilities
Vulnerability: weakness in a system that can be exploited by threats
Risk: likelihood of a threat exploiting a vulnerability
Example: A threat could be a cyber attack, a vulnerability could be outdated software, ...
I tackle fraudulent accounts on social media by using a combination of technology, data analysis, and manual review.
Utilize automated tools to detect suspicious activity and patterns
Analyze user behavior and engagement metrics to identify anomalies
Investigate flagged accounts manually to verify authenticity
Collaborate with security teams and law enforcement if necessary
Implement account verification processes to preven
In 5 years, I see myself as a seasoned Platform Operations Specialist leading a team and implementing innovative strategies.
Leading a team of platform operations specialists
Implementing innovative strategies to improve platform efficiency
Continuing to learn and grow in the field of platform operations
I am excited to join Zerofox because I am passionate about disaster recovery planning and believe in the company's mission.
I am drawn to the unique focus on DRP at Zerofox and see it as a valuable opportunity to expand my skills in a different area of cybersecurity.
I am impressed by Zerofox's innovative approach to protecting organizations from digital risks, and I am eager to contribute to their mission.
I believe that...
I applied via campus placement at BRACT's Vishwakarma Institute of Information Technology, Pune and was interviewed in Oct 2024. There was 1 interview round.
Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
It enables a single interface to be used for different data types or classes.
Examples include method overloading and method overriding in object-oriented programming.
Find missing number from nth number array.
Iterate through the array and calculate the sum of all numbers
Calculate the sum of numbers from 1 to n using the formula n*(n+1)/2
Subtract the sum of array from the sum of numbers from 1 to n to find the missing number
Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.
Inheritance allows a class to reuse code from another class.
Types of inheritance include single inheritance, where a class inherits from only one parent class, and multiple inheritance, where a class inherits from multiple parent classes.
Example: Class B inherits from Class A, so Class B can access
Find 2nd max element from array of strings
Sort the array in descending order
Skip the first element (max element)
Return the second element
posted on 11 Sep 2024
I applied via Approached by Company and was interviewed in Aug 2024. There was 1 interview round.
Different data formats in big data are used for various purposes like storage efficiency, data processing speed, and compatibility with different systems.
JSON: Lightweight, human-readable, and widely supported for web applications.
Parquet: Columnar storage format for efficient querying and processing of large datasets.
Avro: Schema-based serialization format with support for complex data types.
ORC: Optimized Row Columna...
Find the most frequent element in a list of strings.
Iterate through the list and count the frequency of each element using a dictionary.
Track the element with the highest frequency as you iterate.
Return the element with the highest frequency.
posted on 28 Sep 2024
posted on 25 Sep 2024
There were around 60 questions and negative marking was also there
I am a Full Stack Developer with experience in front-end and back-end technologies.
Proficient in HTML, CSS, JavaScript for front-end development
Skilled in Node.js, Express, MongoDB for back-end development
Experience with React.js and Angular for building interactive web applications
Diamond problem is a common issue in multiple inheritance where a class inherits from two classes that have a common ancestor.
Occurs in languages that support multiple inheritance like C++
Results in ambiguity when calling methods or accessing attributes from the common ancestor class
Can be resolved using virtual inheritance or interfaces
Run length encoding is a data compression technique that replaces repeated characters with a count and single character.
Iterate through the input array of strings
Count the number of consecutive characters in each string
Replace consecutive characters with count and character
Rotate an array of strings by d times
Create a new array and copy elements from original array based on rotation index
Use modulo operator to handle cases where d is greater than array length
Handle edge cases like empty array or d being negative
I applied via Approached by Company and was interviewed in Sep 2024. There was 1 interview round.
based on 49 reviews
Rating in categories
Embedded Software Engineer
23
salaries
| ₹1.7 L/yr - ₹7.3 L/yr |
Senior Software Engineer
22
salaries
| ₹4.8 L/yr - ₹7.4 L/yr |
Software Engineer
20
salaries
| ₹2.8 L/yr - ₹6 L/yr |
Project Lead
19
salaries
| ₹6.5 L/yr - ₹11 L/yr |
Embedded Software Developer
9
salaries
| ₹1.6 L/yr - ₹7.2 L/yr |
Wipro
HCLTech
TCS
Infosys