Tata Elxsi
100+ Interview Questions and Answers
Q1. What is Quality Assurance. Difference between Quality assurance and Quality control
Quality assurance is the process of ensuring that a product or service meets the desired level of quality.
Quality assurance involves the creation and implementation of processes and procedures to ensure that a product or service meets the desired level of quality.
Quality control involves the inspection and testing of a product or service to ensure that it meets the desired level of quality.
Quality assurance is a proactive process that focuses on preventing defects from occurr...read more
Q2. What are the examples of Memory leaks and how to solve them?
Memory leaks occur when a program fails to release memory after it is no longer needed.
Examples include: forgetting to free allocated memory, circular references, and not closing file handles.
To solve memory leaks, use tools like valgrind to detect leaks, ensure all allocated memory is freed, and avoid circular references.
Other solutions include using smart pointers, garbage collection, and avoiding global variables.
Q3. Tell me about FreeRTOS scheduling methods?
FreeRTOS uses priority-based preemptive scheduling with round-robin time slicing.
Tasks are assigned priorities and the scheduler always runs the highest priority task that is ready to run.
Preemption occurs when a higher priority task becomes ready to run.
Round-robin time slicing ensures that tasks with the same priority get equal CPU time.
FreeRTOS also supports co-operative scheduling where tasks yield control to other tasks voluntarily.
The scheduler is implemented as a part ...read more
Q4. What is bit arbitration & bit stuffing in CAN?
Bit arbitration is a process of resolving conflicts when multiple nodes try to transmit data simultaneously. Bit stuffing is a technique used to ensure data integrity.
Bit arbitration is used in CAN to determine which message has the highest priority and should be transmitted first.
During bit stuffing, a '0' is inserted after every five consecutive '1's in the data to avoid confusion with the frame delimiter.
Bit stuffing ensures that the receiver can distinguish between the ac...read more
Q5. 1. Truth table for AND and OR ? 2. Draw inverter diagram? 3. Explain your projects and draw the circuit diagram for it ? 4. Write any c program that you are familiar with ?
Answers to interview questions for a Software Engineer position.
AND truth table: 0 AND 0 = 0, 0 AND 1 = 0, 1 AND 0 = 0, 1 AND 1 = 1
OR truth table: 0 OR 0 = 0, 0 OR 1 = 1, 1 OR 0 = 1, 1 OR 1 = 1
Inverter diagram: A circle with a small bubble at the input side
Circuit diagram for a project: Provide a brief explanation of the project and draw the circuit diagram
Example C program: Write a program to calculate the factorial of a number
Q6. String reverse in C set/clear bit at a position of an integer
String reverse and bit manipulation in C
To reverse a string in C, use a loop to swap characters from start and end positions
To set a bit at a position in an integer, use bitwise OR operator with 1 shifted to that position
To clear a bit at a position in an integer, use bitwise AND operator with the complement of 1 shifted to that position
Q7. How to debug and solve crash issues?
To debug and solve crash issues, analyze crash logs, reproduce the issue, use debugging tools, isolate the problem, fix the issue, and test the solution.
Analyze crash logs to identify the cause of the crash
Reproduce the crash issue to understand its triggers
Use debugging tools like breakpoints, log statements, or memory analyzers
Isolate the problem by narrowing down the code or components involved
Fix the issue by addressing the root cause
Test the solution thoroughly to ensure...read more
Q8. What are the risk classes of Medical device according to EU MDR, FDA?
Risk classes of Medical devices according to EU MDR and FDA
EU MDR classifies medical devices into four risk classes: Class I, Class IIa, Class IIb, and Class III
FDA classifies medical devices into three risk classes: Class I, Class II, and Class III
The classification is based on the potential risks associated with the device and the level of regulatory control needed
Examples of Class I devices include tongue depressors and elastic bandages, while examples of Class III devices...read more
Q9. Why was it necessary to implement MDR when there was MDD present?
MDR was necessary due to advancements in technology, increased complexity of medical devices, and the need for stricter regulations.
Advancements in technology led to the development of more complex medical devices that required updated regulations.
MDR provides a more comprehensive framework for ensuring the safety and effectiveness of medical devices compared to MDD.
The regulatory landscape evolved, necessitating the implementation of MDR to align with international standards...read more
Q10. What technology you want to learn and how.
I want to learn about machine learning and AI.
Enroll in online courses and tutorials on platforms like Coursera and Udemy.
Attend workshops and conferences on machine learning and AI.
Read books and research papers on the subject.
Practice by working on personal projects and participating in hackathons.
Collaborate with experts in the field and seek mentorship.
Experiment with open-source machine learning frameworks like TensorFlow and PyTorch.
Q11. What is six sigma process
Six Sigma is a data-driven methodology for process improvement that aims to reduce defects and variability.
Six Sigma uses statistical analysis to identify and eliminate sources of variation in a process
It follows a structured approach called DMAIC (Define, Measure, Analyze, Improve, Control)
The goal is to achieve a process capability of 6 standard deviations from the mean, which equates to a defect rate of 3.4 parts per million
Six Sigma has been widely adopted in industries s...read more
Q12. 1) How to produce xml or json format response during creation of an API 2) what does $1 represents in shell script(how do you read/get arguments in shell scripting)
To produce XML or JSON format response in API creation, use appropriate libraries or frameworks. In shell scripting, $1 represents the first argument passed to the script.
For XML format response, use libraries like JAXB in Java or lxml in Python.
For JSON format response, use libraries like Jackson in Java or json in Python.
In shell scripting, $1 represents the first argument passed to the script. Use $2, $3, and so on for subsequent arguments.
To read arguments in shell script...read more
Q13. What is difference between class based vs functional components in react
Class based components use ES6 classes while functional components are just JavaScript functions.
Class based components use ES6 classes to define a component
Functional components are just JavaScript functions that return JSX
Class based components have access to lifecycle methods like componentDidMount, componentDidUpdate, etc.
Functional components are simpler and easier to read and test
With the introduction of hooks in React, functional components can now have state and lifec...read more
Q14. What is the latest timeline for EU MDR implementation?
The latest timeline for EU MDR implementation is May 26, 2021.
EU MDR (Medical Device Regulation) implementation deadline is May 26, 2021.
The regulation aims to ensure the safety and performance of medical devices in the EU market.
Manufacturers need to comply with new requirements for product registration, clinical evaluations, and post-market surveillance.
Non-compliance can result in market access restrictions or penalties.
Q15. What is better Developement or Testing?
Both development and testing are equally important for delivering quality software.
Development and testing are two sides of the same coin.
Development creates the software while testing ensures its quality.
Testing helps identify and fix bugs, improving the overall quality of the software.
Without testing, software can have critical bugs that can lead to disastrous consequences.
Both development and testing require different skill sets and are equally important for delivering qua...read more
Q16. What is Quality assurance
Quality assurance is the process of ensuring that a product or service meets the desired level of quality.
It involves creating and implementing quality standards and procedures
It includes testing and inspecting products or services to ensure they meet the standards
It also involves identifying and addressing any issues or defects
Examples include software testing, product inspections, and customer satisfaction surveys
Q17. Metrics used for trend analysis
Metrics such as cycle time, lead time, throughput, defect rate, and customer satisfaction are used for trend analysis.
Cycle time measures the time taken to complete a task or process.
Lead time measures the time taken from the start of a process to its completion.
Throughput measures the amount of work completed in a given time period.
Defect rate measures the number of defects found in a product or process.
Customer satisfaction measures the level of satisfaction of customers wi...read more
Q18. What are OOPS Concepts, explain them.
OOPS Concepts are the principles of Object-Oriented Programming that help in designing and implementing software systems.
Abstraction: Hiding the implementation details and showing only the necessary information.
Encapsulation: Binding data and functions together to protect data from outside interference.
Inheritance: Creating new classes from existing ones, inheriting properties and methods.
Polymorphism: Ability of objects to take on multiple forms or behaviors.
Example: A car i...read more
Q19. what is AIDL. How to create inter process communicaion?
AIDL is Android Interface Definition Language used for inter-process communication.
AIDL is used to define the interface between client and service in Android.
It allows communication between different processes in Android.
To create inter-process communication using AIDL, we need to define the interface in AIDL file, implement the interface in service, and bind the service to the client.
AIDL supports passing complex data types like arrays and objects between processes.
Example: ...read more
Q20. Program to multiply two matrices using CUDA
Using CUDA to multiply two matrices efficiently.
Allocate memory on GPU for matrices A, B, and C
Copy matrices A and B from host to device
Launch CUDA kernel to perform matrix multiplication
Copy result matrix C from device to host
Free memory on GPU
Q21. What is the difference between streams and parallel streams ?
Streams process elements sequentially while parallel streams process them concurrently.
Streams are single-threaded while parallel streams use multiple threads.
Parallel streams are useful for large datasets that can be divided into smaller chunks.
Streams can be converted to parallel streams using the parallel() method.
Parallel streams can be converted back to sequential streams using the sequential() method.
Example: List
numbers = Arrays.asList(1, 2, 3, 4, 5); numbers.stream()...read more
Q22. What are some of the vulnerabilities during web application penetration testing?
Vulnerabilities in web application penetration testing
Injection flaws (SQL, LDAP, etc.)
Cross-site scripting (XSS)
Broken authentication and session management
Insecure direct object references
Security misconfiguration
Sensitive data exposure
Insufficient logging and monitoring
Q23. Tell me how do you use ISO 10993-1 in your day to day work.
ISO 10993-1 is used to evaluate the biological safety of medical devices.
I use ISO 10993-1 to determine the appropriate biological tests to perform on medical devices.
I ensure that the medical devices I work on comply with the biological safety requirements outlined in ISO 10993-1.
I review and interpret the results of biological tests performed on medical devices according to ISO 10993-1.
I collaborate with other departments to ensure that all aspects of the medical device, in...read more
Q24. If 22 kv line fuse blows up u and another Operator present at site how u will replace the fuse and what safety measures will you take to replace fuse , what are the safety PPE (personal protection Equipment) u ...
read moreTo replace a blown 22 kv line fuse, safety measures include de-energizing the line, using proper PPE, and following proper procedures.
De-energize the line before attempting to replace the fuse
Use insulated tools to avoid electrical shock
Wear appropriate PPE such as rubber gloves, safety glasses, and flame-resistant clothing
Follow proper lockout/tagout procedures to ensure the line remains de-energized during the replacement
Check for any signs of damage or wear on the fuse hol...read more
Q25. What is EU-MDR? What is a medical device? How are they classified? On what basis the medical devices are classified (diagnostic vs therapeutic)?
EU-MDR stands for European Union Medical Device Regulation.
EU-MDR is a set of regulations that govern the safety and performance of medical devices in the European Union.
It replaces the previous Medical Device Directive (MDD) and Active Implantable Medical Device Directive (AIMDD).
EU-MDR aims to enhance patient safety, improve transparency, and strengthen the regulatory framework for medical devices.
It introduces new requirements for clinical evidence, post-market surveillanc...read more
Q26. How will generate the C code in MATLAB?
C code can be generated in MATLAB using the MATLAB Coder app or by using the 'codegen' function.
MATLAB Coder app allows users to generate C code from MATLAB code
The 'codegen' function can be used to generate C code programmatically
Generated C code can be optimized for specific hardware platforms
C code can be integrated with other programming languages or software tools
Example: codegen myFunction -args {arg1,arg2} -config:lib -report
Q27. what is Macro?, how to store just 5 bits inside of a charecter? Dangling Pointers? Inline function?
Macro is a preprocessor directive that performs text substitution. Storing 5 bits in a character can be done using bit manipulation. Dangling pointers are pointers that point to invalid memory locations. Inline functions are functions that are expanded by the compiler at the point of call.
Macros are used to define constants or to perform text substitution
To store 5 bits in a character, we can use bit manipulation operators like bitwise AND and OR
Dangling pointers can cause me...read more
Q28. What is run-time polymorphism? what is SQL and RDBMS? What is the concept of inheritance and real time examples? code for a program to reverse a string
Run-time polymorphism is the ability of a method to do different things based on the object it is acting upon.
Run-time polymorphism is achieved through method overriding in Java.
It allows a subclass to provide a specific implementation of a method that is already provided by its superclass.
Example: Animal class has a method 'makeSound'. Dog and Cat classes can override this method to make different sounds.
Q29. What is the difference between vulnerability assessment and penetration testing?
Vulnerability assessment identifies vulnerabilities, while penetration testing exploits them to determine the impact.
Vulnerability assessment is a non-intrusive process that identifies vulnerabilities in a system or network.
Penetration testing is an intrusive process that exploits vulnerabilities to determine the impact on the system or network.
Vulnerability assessment is usually automated and performed regularly to identify new vulnerabilities.
Penetration testing is usually ...read more
Q30. Explain Quantization, Convolution
Quantization is the process of mapping input values from a continuous range to a discrete set of values. Convolution is a mathematical operation that combines two functions to produce a third function.
Quantization reduces the precision of data by mapping it to a smaller set of values. For example, converting a grayscale image from 256 levels to 8 levels.
Convolution involves sliding one function over another and multiplying the overlapping values to produce a new function. It ...read more
Q31. Explain Transformer architecture
Transformer architecture is a deep learning model that uses self-attention mechanism to process sequential data.
Transformer architecture consists of an encoder and a decoder.
Self-attention mechanism allows the model to weigh the importance of different input tokens when making predictions.
Transformer models have been widely used in natural language processing tasks such as machine translation and text generation.
Q32. Swap without using 3rd variable
Swapping two numbers without using a third variable
Use arithmetic operations to swap values
Example: a = 5, b = 10; a = a + b; b = a - b; a = a - b;
Ensure no overflow or underflow occurs
Q33. What is the difference between embedded testing and software testing
Embedded testing is testing of software on hardware devices while software testing is testing of software on virtual or real machines.
Embedded testing involves testing of software on hardware devices like microcontrollers, sensors, etc.
Software testing involves testing of software on virtual or real machines like desktops, laptops, servers, etc.
Embedded testing requires knowledge of hardware and software interaction while software testing requires knowledge of software functi...read more
Q34. write a program on finding little or big endian,no of bits set in bit magic,
Program to find endianness and number of bits set in bit magic.
Use bitwise operators to check endianness
Count number of set bits using bitwise AND and right shift
Use pre-defined functions for endianness in some programming languages
Endianness can affect network communication and file formats
Q35. Swap two variables without temp
Use XOR operation to swap two variables without using a temporary variable
Use XOR operation to swap two variables without using a temporary variable
Example: a = 5, b = 10. a = a XOR b, b = a XOR b, a = a XOR b. Now a = 10, b = 5
Q36. What is Model in Loop ?
Model in Loop is a simulation technique where a physical system is connected to a computer model for testing and validation.
Model in Loop (MiL) is a part of the V-Model of software development.
It involves connecting a physical system to a computer model to test and validate the model.
MiL is used in various industries such as automotive, aerospace, and defense.
It helps in identifying and fixing errors in the model before implementing it in the physical system.
Examples of MiL i...read more
Q37. Merge 2 Sorted arrays
Merge two sorted arrays into a single sorted array.
Create a new array to store the merged result
Use two pointers to iterate through the two input arrays and compare elements
Add the smaller element to the new array and move the pointer for that array forward
Repeat until all elements from both arrays are merged
Q38. Brief of MDR 2017/745
MDR 2017/745 is a regulation that governs the safety and performance of medical devices in the European Union.
MDR stands for Medical Device Regulation
It replaces the previous Medical Device Directive (MDD)
It requires stricter conformity assessments and clinical evaluations for medical devices
It also establishes a central database (EUDAMED) for medical devices
It applies to all medical devices sold in the EU, including those manufactured outside the EU
It came into effect on May...read more
Q39. Brief of Labeling information
Labeling information provides important details about a product.
Labeling information includes ingredients, dosage instructions, warnings, and expiration dates.
It is required by law for most products to have labeling information.
Labeling information can be found on the packaging or on an insert inside the packaging.
It is important to read and understand labeling information before using a product.
Q40. Design patterns which you have worked ?
I have worked with several design patterns including Singleton, Factory, Observer, and Decorator.
Implemented Singleton pattern to ensure only one instance of a class is created.
Used Factory pattern to create objects without exposing the instantiation logic to the client.
Implemented Observer pattern to notify dependent objects of any state changes.
Used Decorator pattern to add functionality to an object dynamically.
Q41. Criteria for setting up HIL environment.
Criteria for setting up HIL environment
Identify the system under test and its interfaces
Select appropriate hardware and software components
Develop test cases and test scripts
Configure the HIL system and integrate with other tools
Verify and validate the HIL environment
Q42. Explain the difference datatypes in python
Python has several built-in datatypes including numeric, sequence, and mapping types.
Numeric types include integers, floats, and complex numbers.
Sequence types include lists, tuples, and strings.
Mapping types include dictionaries.
Python also has boolean and None datatypes.
Datatypes can be converted using built-in functions like int(), str(), and float().
Q43. Multiply two matrices in CUDA
Matrix multiplication in CUDA involves parallelizing the computation across multiple threads on the GPU.
Use CUDA kernels to launch parallel threads for matrix multiplication.
Divide the matrices into blocks and load them into shared memory for faster access.
Implement the matrix multiplication algorithm in CUDA C/C++.
Ensure proper memory management and synchronization between threads.
Q44. Merge two sorted arrays
Merge two sorted arrays into a single sorted array
Create a new array to store the merged result
Iterate through both arrays simultaneously and compare elements
Add the smaller element to the new array and move to the next element in that array
Continue until all elements from both arrays are merged
Q45. What is array dvfg grbfri fhrifhri fhrofhr hfrohfro hfhorhf hefoehf iluiewfihr?
The question is not valid or coherent.
There is no clear meaning or context to the question.
It appears to be a random string of characters.
Without more information, it is impossible to provide a meaningful answer.
Q46. Why string is immutable?
String is immutable because it cannot be changed once created.
Immutable objects are safer to use in multi-threaded environments.
String pool in Java is possible because of immutability.
StringBuffer and StringBuilder are mutable alternatives to String.
Q47. What is upgradation method of NSX-V/T. What's the difference among them
NSX-V/T can be upgraded using in-place upgrade, side-by-side upgrade, or hybrid upgrade methods.
In-place upgrade involves upgrading the existing NSX-V/T deployment without replacing the hardware or virtual machines.
Side-by-side upgrade involves deploying a new NSX-V/T instance alongside the existing one and migrating workloads.
Hybrid upgrade combines elements of in-place and side-by-side upgrades, allowing for a phased migration.
In-place upgrade is simpler but may have downti...read more
Q48. What is VxRail, Vsan, NSX command ti verify the Ipsec tunnel
VxRail, Vsan, NSX commands to verify IPsec tunnel
For VxRail, use 'show ipsec sa' command to verify IPsec tunnel status
For Vsan, use 'esxcli network ip connection list' command to check IPsec tunnel connections
For NSX, use 'get vpn ipsec sa' command to view IPsec tunnel information
Q49. Find distinct chars in string
Count distinct characters in a given string
Iterate through the string and store each character in a set to ensure uniqueness
Return the size of the set as the count of distinct characters
Example: Input 'hello' -> Output 4 (h, e, l, o)
Q50. What is area of spectrum for scrum master ?
The area of spectrum for a Scrum Master is the facilitation of the Scrum process and ensuring the team adheres to Agile principles.
Facilitating the Scrum events (e.g., Daily Stand-ups, Sprint Planning, Retrospectives)
Coaching the team on Agile principles and practices
Removing impediments and ensuring the team has a productive work environment
Helping the team to self-organize and make decisions collectively
Promoting continuous improvement and learning within the team
Acting as ...read more
Q51. How do you document risk in a Risk Management File.
Risk in a Risk Management File is documented through a structured process of identification, analysis, evaluation, and control.
Identify potential hazards and risks associated with the product or process
Analyze the likelihood and severity of each identified risk
Evaluate the risk and determine if it is acceptable or requires further control measures
Document the risk management process and results in a Risk Management File
Update the Risk Management File as necessary throughout t...read more
Q52. swapping of numbers without using 3rd var
Swapping numbers without using a third variable
Use arithmetic operations like addition and subtraction
XOR operation can also be used for swapping numbers
Example: a = 5, b = 10; a = a + b; b = a - b; a = a - b; // Now a = 10, b = 5
Q53. What do you understand by risk and intended purpose?
Risk refers to the potential harm that may arise from the use of a medical device or drug. Intended purpose is the intended use of the device or drug.
Risk is the potential harm that may arise from the use of a medical device or drug
Intended purpose is the intended use of the device or drug
Risk assessment is an important part of regulatory affairs
Intended purpose is determined by the manufacturer and approved by regulatory agencies
Examples of intended purpose include treatment...read more
Q54. What is Software in Loop?
Software in Loop (SIL) is a testing technique where software is tested in a simulated environment.
SIL is used to test software components before integrating them into a larger system.
It involves creating a simulated environment that mimics the real-world environment in which the software will operate.
SIL can help identify and fix software defects early in the development process.
Examples of SIL tools include Simulink, LabVIEW, and dSPACE.
SIL is often used in the automotive an...read more
Q55. what is the difference between hub and router?
A hub is a simple networking device that connects multiple devices in a network, while a router is a more advanced device that connects multiple networks together.
Hub operates at physical layer, while router operates at network layer.
Hub broadcasts data to all devices in the network, while router forwards data to specific devices based on IP addresses.
Hub does not have intelligence to determine the best path for data transmission, while router can make decisions based on rout...read more
Q56. Your special quality
My special quality is my ability to think creatively and find innovative solutions to complex problems.
I have a strong analytical mind and can break down problems into smaller components
I am able to think outside the box and come up with unique solutions
I am not afraid to take risks and try new approaches
I have a track record of successfully implementing innovative solutions in my previous roles
Q57. Basic IPC concepts used in operating system
IPC stands for Inter-Process Communication and is used for communication between processes in an operating system.
Shared memory
Message passing
Pipes
Sockets
Remote Procedure Calls (RPC)
Semaphores
Mutexes
Q58. write a query in sql for creating a table, inserting and deleting a row in a table.
SQL query for creating, inserting, and deleting rows in a table.
Use CREATE TABLE statement to create a table.
Use INSERT INTO statement to insert a row into the table.
Use DELETE FROM statement to delete a row from the table.
Q59. What is transformers working principle of transformers
Transformers work on the principle of electromagnetic induction to transfer electrical energy between two or more circuits.
Transformers have two coils of wire, known as primary and secondary coils, which are magnetically coupled.
When an alternating current flows through the primary coil, it creates a changing magnetic field which induces a voltage in the secondary coil.
The ratio of the number of turns in the primary and secondary coils determines the voltage transformation ra...read more
Q60. Oops concepts- define abstraction, encapsulation
Abstraction is the concept of hiding complex implementation details and showing only the necessary information. Encapsulation is the bundling of data and methods that operate on the data into a single unit.
Abstraction focuses on what an object does rather than how it does it
Encapsulation restricts access to certain components of an object, protecting the data from outside interference
Abstraction allows for creating simple interfaces for complex systems
Encapsulation helps in a...read more
Q61. relocation to pune is fine or not?
Relocation to Pune is fine if the candidate is open to moving for the job.
Consider the candidate's willingness to relocate
Evaluate the benefits of working in Pune
Discuss any potential challenges or concerns with relocation
Q62. Write a code to swap two numbers
Simple code to swap two numbers using a temporary variable
Declare two variables a and b with values
Create a temporary variable to store one of the numbers
Assign the value of a to b and temporary to a
Print the swapped values of a and b
Q63. What is difference between C and C++programming?
C is a procedural programming language while C++ is an object-oriented programming language.
C is a procedural programming language, while C++ is a combination of procedural and object-oriented programming.
C does not support classes and objects, while C++ does.
C does not have built-in support for exception handling, while C++ does.
C does not have namespaces, while C++ does.
C does not have function overloading, while C++ does.
Q64. What is Database
A database is a collection of data that is organized in a way that allows for efficient retrieval and manipulation.
A database can be relational or non-relational
Examples of databases include MySQL, Oracle, MongoDB
Data is stored in tables or documents
Queries can be used to retrieve specific data
Q65. What is OWASP top 10?
OWASP top 10 is a list of the most critical web application security risks.
It is published by the Open Web Application Security Project (OWASP)
It includes risks such as injection, broken authentication and session management, cross-site scripting (XSS), and more
It is updated every few years to reflect new threats and vulnerabilities
It is used by security professionals to prioritize their efforts and focus on the most important risks
Q66. What is software development lifecycle?
Software development lifecycle is a process used to design, develop, test, and deploy software applications.
It includes phases like planning, analysis, design, implementation, testing, and maintenance.
Each phase has specific goals and deliverables to ensure the successful completion of the project.
Examples of SDLC models include Waterfall, Agile, and DevOps.
SDLC helps in managing the software development process efficiently and effectively.
Q67. Tell me about EUMDR 2017/745, annex I and II.
EUMDR 2017/745 is a regulation that governs medical devices in the European Union.
Annex I lists the general safety and performance requirements for medical devices.
Annex II outlines the technical documentation that must be provided for conformity assessment.
The regulation replaces the previous Medical Device Directive (MDD) and introduces new requirements for manufacturers.
It also includes a unique device identification (UDI) system to improve traceability and transparency.
Th...read more
Q68. Explain about the databases and difference between cosmos db and other Databases?
Cosmos DB is a globally distributed, multi-model database service provided by Microsoft Azure, offering high availability and scalability.
Cosmos DB is a NoSQL database, while other databases like MySQL, PostgreSQL, and SQL Server are relational databases.
Cosmos DB offers global distribution and automatic scaling, making it suitable for globally distributed applications.
Cosmos DB supports multiple data models like document, key-value, graph, and column-family, providing flexib...read more
Q69. explain the use of public static void main
The public static void main method is the entry point of a Java program.
It is a mandatory method in Java programs, as it is the starting point of execution.
The 'public' keyword allows the main method to be accessed from outside the class.
The 'static' keyword allows the main method to be called without creating an instance of the class.
The 'void' keyword indicates that the main method does not return any value.
The 'main' method accepts an array of strings as arguments, which c...read more
Q70. what are structures and unions in c
Structures and unions are used in C to define custom data types that can hold multiple variables of different data types.
Structures allow grouping variables of different data types under a single name.
Unions are similar to structures but they share the same memory location for all its members.
Structures are used to represent complex data structures like linked lists, trees, etc.
Unions are used when only one of the members needs to be accessed at a time.
Example of a structure:...read more
Q71. Maintenance - Any damages or repairing byvendor through.
Q72. 2. Technical skills in recruitment
Technical skills in recruitment involve proficiency in using recruitment software, conducting candidate sourcing, and utilizing data analytics.
Proficiency in using recruitment software such as Applicant Tracking Systems (ATS) and Customer Relationship Management (CRM) tools.
Ability to conduct candidate sourcing through various channels like job boards, social media platforms, and professional networking sites.
Knowledge of data analytics to analyze recruitment metrics, track p...read more
Q73. What is an inline function?
An inline function is a function that is expanded in line when it is called, rather than executing a call to the function.
Inline functions are defined with the 'inline' keyword.
They are used to improve performance by reducing the overhead of function calls.
They are typically small functions that are called frequently.
Inline functions can be defined in header files.
Example: inline int add(int a, int b) { return a + b; }
Q74. ready for reallocation?
Question about willingness to relocate for the job
Be honest about your willingness to relocate for the job
Consider the potential benefits of relocating, such as career growth opportunities
Discuss any concerns you may have about relocating, such as family or personal commitments
Q75. CAPL Program to read DTC
CAPL program can be used to read Diagnostic Trouble Codes (DTC) from a vehicle's Electronic Control Unit (ECU).
Use the OnDiagnostics event to receive DTCs from the ECU
Use the DiagRead function to read DTCs from the ECU
Use the DiagGetNextDTC function to get the next DTC from the ECU
Use the DiagClearDTC function to clear DTCs from the ECU
Q76. Middleware in Nodejs
Middleware in Nodejs is a function that sits between the request and response objects and performs some operations.
Middleware functions can be used to handle authentication, logging, error handling, etc.
They can be added to the application using the 'use' method of the 'app' object.
Middleware functions can be chained together using the 'next' function.
They can also be used to modify the request or response objects before passing them to the next middleware function.
Some popul...read more
Q77. How to develop harness from scratch?
Developing a harness from scratch involves designing, prototyping, testing, and refining the harness to meet specific requirements.
Start by defining the requirements and constraints of the harness
Design the layout and components of the harness using CAD software
Create prototypes to test the functionality and fit of the harness
Conduct thorough testing to ensure the harness meets safety and performance standards
Refine the design based on testing feedback and make any necessary ...read more
Q78. 3 strengths and 3 weakness
Strengths: Problem-solving skills, strong technical knowledge, effective communication. Weaknesses: Impatience, perfectionism, public speaking.
Strength: Problem-solving skills - Able to analyze complex problems and come up with effective solutions.
Strength: Strong technical knowledge - Proficient in various programming languages and technologies.
Strength: Effective communication - Able to clearly convey ideas and collaborate with team members.
Weakness: Impatience - Sometimes ...read more
Q79. How many customers or projects handle
I have handled over 20 projects and worked with numerous customers in my role as Lead Design Engineer.
Managed 20+ projects from start to finish
Collaborated with various customers to understand their needs and requirements
Implemented design solutions for different industries such as automotive, aerospace, and consumer electronics
Q80. How many uplinks and downlinks in cmts
The number of uplinks and downlinks in CMTS varies depending on the model and configuration.
The number of uplinks and downlinks in CMTS can range from 1 to 16 or more.
The number of uplinks and downlinks can also depend on the type of interface used, such as Gigabit Ethernet or DOCSIS.
Some CMTS models may have dedicated uplink and downlink ports, while others may use shared ports.
The number of uplinks and downlinks can also affect the maximum number of cable modems that can be...read more
Q81. What design pattern you used
I have used the Singleton design pattern in my previous projects.
Used to ensure a class has only one instance and provides a global point of access to it
Helps in managing global resources efficiently
Example: Database connection manager in a web application
Q82. program to count the number of words in a string
Program to count the number of words in a string using array of strings.
Split the string into an array of strings using a delimiter like space.
Iterate through the array and count the number of elements.
Handle edge cases like multiple spaces between words.
Q83. What is PPB and explain detailed
PPB stands for Parts Per Billion, a unit of measurement used to describe extremely small concentrations of substances in a mixture.
PPB is used to express the ratio of the mass of a contaminant to the total mass of the mixture, multiplied by one billion.
It is commonly used in environmental science, chemistry, and toxicology to measure trace amounts of pollutants in air, water, soil, and food.
For example, if a water sample contains 1 microgram of lead in 1,000,000 micrograms of...read more
Q84. How well can you manage time?
I excel at time management by prioritizing tasks, setting deadlines, and utilizing tools like calendars and to-do lists.
Prioritize tasks based on importance and deadlines
Set realistic deadlines for each task
Utilize tools like calendars, to-do lists, and project management software
Regularly review and adjust schedule as needed
Delegate tasks when necessary to ensure efficient use of time
Q85. Explain about Different Databases used for OTT?
Different databases used for OTT include MySQL, MongoDB, Cassandra, and Amazon DynamoDB.
MySQL is a popular relational database management system used for storing structured data in OTT platforms.
MongoDB is a NoSQL database that is commonly used for handling large volumes of unstructured data in OTT applications.
Cassandra is a distributed database system known for its scalability and high availability, making it suitable for OTT services with a large user base.
Amazon DynamoDB ...read more
Q86. What is merge block?
A merge block is a component used in programming or engineering to combine multiple inputs into a single output.
Merge blocks are commonly used in programming to combine branches of code.
In engineering, merge blocks are used in control systems to combine multiple signals or inputs.
Merge blocks can be found in software applications like Simulink for modeling complex systems.
Q87. Explain about TMF Open API with an exaple
TMF Open API is a set of APIs provided by TM Forum for accessing and integrating with their platform.
TMF Open API allows developers to access TM Forum's platform for various purposes such as data retrieval, service provisioning, and network management.
Developers can use TMF Open API to integrate their own applications with TM Forum's platform, enabling seamless communication and data exchange.
An example of using TMF Open API is a telecom company integrating their billing syst...read more
Q88. C code for finding 2nd smalleset and 2nd largest
Use C code to find the 2nd smallest and 2nd largest elements in an array.
Sort the array in ascending order to find the 2nd smallest element.
Sort the array in descending order to find the 2nd largest element.
Q89. Swap two numbers without using temp variable
Swap two numbers without using a temp variable
Use arithmetic operations like addition and subtraction to swap the numbers
Example: a = 5, b = 10. a = a + b (a = 15), b = a - b (b = 5), a = a - b (a = 10)
Another example: a = 3, b = 7. a = a + b (a = 10), b = a - b (b = 3), a = a - b (a = 7)
Q90. Write code of Diagonals sum in 2 d matrix
Code to calculate the sum of diagonals in a 2D matrix.
Iterate through the rows and columns of the matrix.
Add the values of the diagonal elements to a variable.
Return the sum of the diagonal elements.
Q91. write a code for circular linked list
Code for circular linked list implementation in C++
Define a Node struct with data and next pointer
Implement functions for insertion, deletion, and traversal
Make sure the last node points back to the first node
Q92. What's your aera of intrest
My area of interest is computer programming and software development.
I enjoy learning new programming languages and frameworks.
I have experience in developing web applications using HTML, CSS, JavaScript, and React.
I am also interested in mobile app development using Java and Kotlin for Android and Swift for iOS.
I am always looking for opportunities to improve my skills and contribute to open-source projects.
Q93. What is ISR?
ISR stands for Interrupt Service Routine. It is a function that is executed in response to an interrupt signal.
ISR is a type of callback function that is used in embedded systems.
It is used to handle hardware interrupts, such as button presses or sensor readings.
ISR is executed asynchronously and takes priority over other tasks.
It is important to keep ISR functions short and efficient to prevent delays in other system operations.
Examples of ISR include handling interrupts fro...read more
Q94. Write code for max and min element in array
Code for finding max and min element in an array
Initialize max and min variables with first element of array
Loop through the array and compare each element with max and min variables
Update max and min variables accordingly
Return max and min variables
Q95. What is stateflow
Stateflow is a graphical tool used for modeling and simulating decision logic in complex systems.
Stateflow is a part of MATLAB/Simulink software
It allows for modeling of finite state machines and flow charts
Stateflow can be used for designing control logic in automotive systems, aerospace, and industrial automation
It provides a visual representation of system behavior and logic transitions
Q96. What is C programming?
C programming is a powerful and efficient programming language used for system programming, embedded systems, and more.
C programming is a procedural language with a rich set of built-in functions.
It allows for low-level memory manipulation and direct access to hardware.
C is widely used for developing operating systems, compilers, and other system software.
Example: Writing a program to calculate the factorial of a number in C.
Q97. What is primary key
Primary key is a unique identifier for each record in a database table.
Primary key ensures each record in a table is unique
It can be a single column or a combination of columns
Primary key values cannot be NULL
Example: 'ID' column in a 'Users' table
Q98. What is foreign key
Foreign key is a field in a database table that links to a primary key in another table.
Foreign key ensures referential integrity between related tables
It helps maintain relationships between tables
Foreign key constraints can be used to enforce data integrity
Q99. What is unique key
A unique key is a field or combination of fields in a database table that uniquely identifies each record in the table.
A unique key ensures that no two records in a table have the same values for the specified key fields.
It can be a single field or a combination of multiple fields.
Unique keys are used to enforce data integrity and prevent duplicate records.
Examples: Primary key, Unique constraint
Q100. What is engineering?
Engineering is the application of scientific and mathematical principles to design and build machines, structures, systems, and processes.
Engineering involves problem-solving and innovation.
Engineers use creativity and critical thinking to design solutions.
Examples of engineering disciplines include civil, mechanical, electrical, and chemical engineering.
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month