Add office photos
Engaged Employer

Tata Elxsi

3.9
based on 2k Reviews
Filter interviews by

100+ Interview Questions and Answers

Updated 26 Nov 2024
Popular Designations

Q1. What is Quality Assurance. Difference between Quality assurance and Quality control

Ans.

Quality assurance is the process of ensuring that a product or service meets the desired level of quality.

  • Quality assurance involves the creation and implementation of processes and procedures to ensure that a product or service meets the desired level of quality.

  • Quality control involves the inspection and testing of a product or service to ensure that it meets the desired level of quality.

  • Quality assurance is a proactive process that focuses on preventing defects from occurr...read more

View 5 more answers

Q2. What are the examples of Memory leaks and how to solve them?

Ans.

Memory leaks occur when a program fails to release memory after it is no longer needed.

  • Examples include: forgetting to free allocated memory, circular references, and not closing file handles.

  • To solve memory leaks, use tools like valgrind to detect leaks, ensure all allocated memory is freed, and avoid circular references.

  • Other solutions include using smart pointers, garbage collection, and avoiding global variables.

Add your answer

Q3. Tell me about FreeRTOS scheduling methods?

Ans.

FreeRTOS uses priority-based preemptive scheduling with round-robin time slicing.

  • Tasks are assigned priorities and the scheduler always runs the highest priority task that is ready to run.

  • Preemption occurs when a higher priority task becomes ready to run.

  • Round-robin time slicing ensures that tasks with the same priority get equal CPU time.

  • FreeRTOS also supports co-operative scheduling where tasks yield control to other tasks voluntarily.

  • The scheduler is implemented as a part ...read more

Add your answer

Q4. What is bit arbitration & bit stuffing in CAN?

Ans.

Bit arbitration is a process of resolving conflicts when multiple nodes try to transmit data simultaneously. Bit stuffing is a technique used to ensure data integrity.

  • Bit arbitration is used in CAN to determine which message has the highest priority and should be transmitted first.

  • During bit stuffing, a '0' is inserted after every five consecutive '1's in the data to avoid confusion with the frame delimiter.

  • Bit stuffing ensures that the receiver can distinguish between the ac...read more

Add your answer
Discover null interview dos and don'ts from real experiences

Q5. 1. Truth table for AND and OR ? 2. Draw inverter diagram? 3. Explain your projects and draw the circuit diagram for it ? 4. Write any c program that you are familiar with ?

Ans.

Answers to interview questions for a Software Engineer position.

  • AND truth table: 0 AND 0 = 0, 0 AND 1 = 0, 1 AND 0 = 0, 1 AND 1 = 1

  • OR truth table: 0 OR 0 = 0, 0 OR 1 = 1, 1 OR 0 = 1, 1 OR 1 = 1

  • Inverter diagram: A circle with a small bubble at the input side

  • Circuit diagram for a project: Provide a brief explanation of the project and draw the circuit diagram

  • Example C program: Write a program to calculate the factorial of a number

View 4 more answers

Q6. String reverse in C set/clear bit at a position of an integer

Ans.

String reverse and bit manipulation in C

  • To reverse a string in C, use a loop to swap characters from start and end positions

  • To set a bit at a position in an integer, use bitwise OR operator with 1 shifted to that position

  • To clear a bit at a position in an integer, use bitwise AND operator with the complement of 1 shifted to that position

Add your answer
Are these interview questions helpful?

Q7. How to debug and solve crash issues?

Ans.

To debug and solve crash issues, analyze crash logs, reproduce the issue, use debugging tools, isolate the problem, fix the issue, and test the solution.

  • Analyze crash logs to identify the cause of the crash

  • Reproduce the crash issue to understand its triggers

  • Use debugging tools like breakpoints, log statements, or memory analyzers

  • Isolate the problem by narrowing down the code or components involved

  • Fix the issue by addressing the root cause

  • Test the solution thoroughly to ensure...read more

View 1 answer

Q8. What are the risk classes of Medical device according to EU MDR, FDA?

Ans.

Risk classes of Medical devices according to EU MDR and FDA

  • EU MDR classifies medical devices into four risk classes: Class I, Class IIa, Class IIb, and Class III

  • FDA classifies medical devices into three risk classes: Class I, Class II, and Class III

  • The classification is based on the potential risks associated with the device and the level of regulatory control needed

  • Examples of Class I devices include tongue depressors and elastic bandages, while examples of Class III devices...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Why was it necessary to implement MDR when there was MDD present?

Ans.

MDR was necessary due to advancements in technology, increased complexity of medical devices, and the need for stricter regulations.

  • Advancements in technology led to the development of more complex medical devices that required updated regulations.

  • MDR provides a more comprehensive framework for ensuring the safety and effectiveness of medical devices compared to MDD.

  • The regulatory landscape evolved, necessitating the implementation of MDR to align with international standards...read more

Add your answer

Q10. What technology you want to learn and how.

Ans.

I want to learn about machine learning and AI.

  • Enroll in online courses and tutorials on platforms like Coursera and Udemy.

  • Attend workshops and conferences on machine learning and AI.

  • Read books and research papers on the subject.

  • Practice by working on personal projects and participating in hackathons.

  • Collaborate with experts in the field and seek mentorship.

  • Experiment with open-source machine learning frameworks like TensorFlow and PyTorch.

Add your answer

Q11. What is six sigma process

Ans.

Six Sigma is a data-driven methodology for process improvement that aims to reduce defects and variability.

  • Six Sigma uses statistical analysis to identify and eliminate sources of variation in a process

  • It follows a structured approach called DMAIC (Define, Measure, Analyze, Improve, Control)

  • The goal is to achieve a process capability of 6 standard deviations from the mean, which equates to a defect rate of 3.4 parts per million

  • Six Sigma has been widely adopted in industries s...read more

Add your answer

Q12. 1) How to produce xml or json format response during creation of an API 2) what does $1 represents in shell script(how do you read/get arguments in shell scripting)

Ans.

To produce XML or JSON format response in API creation, use appropriate libraries or frameworks. In shell scripting, $1 represents the first argument passed to the script.

  • For XML format response, use libraries like JAXB in Java or lxml in Python.

  • For JSON format response, use libraries like Jackson in Java or json in Python.

  • In shell scripting, $1 represents the first argument passed to the script. Use $2, $3, and so on for subsequent arguments.

  • To read arguments in shell script...read more

Add your answer

Q13. What is difference between class based vs functional components in react

Ans.

Class based components use ES6 classes while functional components are just JavaScript functions.

  • Class based components use ES6 classes to define a component

  • Functional components are just JavaScript functions that return JSX

  • Class based components have access to lifecycle methods like componentDidMount, componentDidUpdate, etc.

  • Functional components are simpler and easier to read and test

  • With the introduction of hooks in React, functional components can now have state and lifec...read more

Add your answer

Q14. What is the latest timeline for EU MDR implementation?

Ans.

The latest timeline for EU MDR implementation is May 26, 2021.

  • EU MDR (Medical Device Regulation) implementation deadline is May 26, 2021.

  • The regulation aims to ensure the safety and performance of medical devices in the EU market.

  • Manufacturers need to comply with new requirements for product registration, clinical evaluations, and post-market surveillance.

  • Non-compliance can result in market access restrictions or penalties.

Add your answer

Q15. What is better Developement or Testing?

Ans.

Both development and testing are equally important for delivering quality software.

  • Development and testing are two sides of the same coin.

  • Development creates the software while testing ensures its quality.

  • Testing helps identify and fix bugs, improving the overall quality of the software.

  • Without testing, software can have critical bugs that can lead to disastrous consequences.

  • Both development and testing require different skill sets and are equally important for delivering qua...read more

Add your answer

Q16. What is Quality assurance

Ans.

Quality assurance is the process of ensuring that a product or service meets the desired level of quality.

  • It involves creating and implementing quality standards and procedures

  • It includes testing and inspecting products or services to ensure they meet the standards

  • It also involves identifying and addressing any issues or defects

  • Examples include software testing, product inspections, and customer satisfaction surveys

Add your answer

Q17. Metrics used for trend analysis

Ans.

Metrics such as cycle time, lead time, throughput, defect rate, and customer satisfaction are used for trend analysis.

  • Cycle time measures the time taken to complete a task or process.

  • Lead time measures the time taken from the start of a process to its completion.

  • Throughput measures the amount of work completed in a given time period.

  • Defect rate measures the number of defects found in a product or process.

  • Customer satisfaction measures the level of satisfaction of customers wi...read more

Add your answer

Q18. What are OOPS Concepts, explain them.

Ans.

OOPS Concepts are the principles of Object-Oriented Programming that help in designing and implementing software systems.

  • Abstraction: Hiding the implementation details and showing only the necessary information.

  • Encapsulation: Binding data and functions together to protect data from outside interference.

  • Inheritance: Creating new classes from existing ones, inheriting properties and methods.

  • Polymorphism: Ability of objects to take on multiple forms or behaviors.

  • Example: A car i...read more

View 1 answer

Q19. what is AIDL. How to create inter process communicaion?

Ans.

AIDL is Android Interface Definition Language used for inter-process communication.

  • AIDL is used to define the interface between client and service in Android.

  • It allows communication between different processes in Android.

  • To create inter-process communication using AIDL, we need to define the interface in AIDL file, implement the interface in service, and bind the service to the client.

  • AIDL supports passing complex data types like arrays and objects between processes.

  • Example: ...read more

Add your answer

Q20. Program to multiply two matrices using CUDA

Ans.

Using CUDA to multiply two matrices efficiently.

  • Allocate memory on GPU for matrices A, B, and C

  • Copy matrices A and B from host to device

  • Launch CUDA kernel to perform matrix multiplication

  • Copy result matrix C from device to host

  • Free memory on GPU

Add your answer

Q21. What is the difference between streams and parallel streams ?

Ans.

Streams process elements sequentially while parallel streams process them concurrently.

  • Streams are single-threaded while parallel streams use multiple threads.

  • Parallel streams are useful for large datasets that can be divided into smaller chunks.

  • Streams can be converted to parallel streams using the parallel() method.

  • Parallel streams can be converted back to sequential streams using the sequential() method.

  • Example: List numbers = Arrays.asList(1, 2, 3, 4, 5); numbers.stream()...read more

Add your answer

Q22. What are some of the vulnerabilities during web application penetration testing?

Ans.

Vulnerabilities in web application penetration testing

  • Injection flaws (SQL, LDAP, etc.)

  • Cross-site scripting (XSS)

  • Broken authentication and session management

  • Insecure direct object references

  • Security misconfiguration

  • Sensitive data exposure

  • Insufficient logging and monitoring

Add your answer

Q23. Tell me how do you use ISO 10993-1 in your day to day work.

Ans.

ISO 10993-1 is used to evaluate the biological safety of medical devices.

  • I use ISO 10993-1 to determine the appropriate biological tests to perform on medical devices.

  • I ensure that the medical devices I work on comply with the biological safety requirements outlined in ISO 10993-1.

  • I review and interpret the results of biological tests performed on medical devices according to ISO 10993-1.

  • I collaborate with other departments to ensure that all aspects of the medical device, in...read more

Add your answer

Q24. If 22 kv line fuse blows up u and another Operator present at site how u will replace the fuse and what safety measures will you take to replace fuse , what are the safety PPE (personal protection Equipment) u ...

read more
Ans.

To replace a blown 22 kv line fuse, safety measures include de-energizing the line, using proper PPE, and following proper procedures.

  • De-energize the line before attempting to replace the fuse

  • Use insulated tools to avoid electrical shock

  • Wear appropriate PPE such as rubber gloves, safety glasses, and flame-resistant clothing

  • Follow proper lockout/tagout procedures to ensure the line remains de-energized during the replacement

  • Check for any signs of damage or wear on the fuse hol...read more

Add your answer

Q25. What is EU-MDR? What is a medical device? How are they classified? On what basis the medical devices are classified (diagnostic vs therapeutic)?

Ans.

EU-MDR stands for European Union Medical Device Regulation.

  • EU-MDR is a set of regulations that govern the safety and performance of medical devices in the European Union.

  • It replaces the previous Medical Device Directive (MDD) and Active Implantable Medical Device Directive (AIMDD).

  • EU-MDR aims to enhance patient safety, improve transparency, and strengthen the regulatory framework for medical devices.

  • It introduces new requirements for clinical evidence, post-market surveillanc...read more

Add your answer

Q26. How will generate the C code in MATLAB?

Ans.

C code can be generated in MATLAB using the MATLAB Coder app or by using the 'codegen' function.

  • MATLAB Coder app allows users to generate C code from MATLAB code

  • The 'codegen' function can be used to generate C code programmatically

  • Generated C code can be optimized for specific hardware platforms

  • C code can be integrated with other programming languages or software tools

  • Example: codegen myFunction -args {arg1,arg2} -config:lib -report

View 1 answer

Q27. what is Macro?, how to store just 5 bits inside of a charecter? Dangling Pointers? Inline function?

Ans.

Macro is a preprocessor directive that performs text substitution. Storing 5 bits in a character can be done using bit manipulation. Dangling pointers are pointers that point to invalid memory locations. Inline functions are functions that are expanded by the compiler at the point of call.

  • Macros are used to define constants or to perform text substitution

  • To store 5 bits in a character, we can use bit manipulation operators like bitwise AND and OR

  • Dangling pointers can cause me...read more

Add your answer

Q28. What is run-time polymorphism? what is SQL and RDBMS? What is the concept of inheritance and real time examples? code for a program to reverse a string

Ans.

Run-time polymorphism is the ability of a method to do different things based on the object it is acting upon.

  • Run-time polymorphism is achieved through method overriding in Java.

  • It allows a subclass to provide a specific implementation of a method that is already provided by its superclass.

  • Example: Animal class has a method 'makeSound'. Dog and Cat classes can override this method to make different sounds.

Add your answer

Q29. What is the difference between vulnerability assessment and penetration testing?

Ans.

Vulnerability assessment identifies vulnerabilities, while penetration testing exploits them to determine the impact.

  • Vulnerability assessment is a non-intrusive process that identifies vulnerabilities in a system or network.

  • Penetration testing is an intrusive process that exploits vulnerabilities to determine the impact on the system or network.

  • Vulnerability assessment is usually automated and performed regularly to identify new vulnerabilities.

  • Penetration testing is usually ...read more

Add your answer

Q30. Explain Quantization, Convolution

Ans.

Quantization is the process of mapping input values from a continuous range to a discrete set of values. Convolution is a mathematical operation that combines two functions to produce a third function.

  • Quantization reduces the precision of data by mapping it to a smaller set of values. For example, converting a grayscale image from 256 levels to 8 levels.

  • Convolution involves sliding one function over another and multiplying the overlapping values to produce a new function. It ...read more

Add your answer

Q31. Explain Transformer architecture

Ans.

Transformer architecture is a deep learning model that uses self-attention mechanism to process sequential data.

  • Transformer architecture consists of an encoder and a decoder.

  • Self-attention mechanism allows the model to weigh the importance of different input tokens when making predictions.

  • Transformer models have been widely used in natural language processing tasks such as machine translation and text generation.

Add your answer

Q32. Swap without using 3rd variable

Ans.

Swapping two numbers without using a third variable

  • Use arithmetic operations to swap values

  • Example: a = 5, b = 10; a = a + b; b = a - b; a = a - b;

  • Ensure no overflow or underflow occurs

Add your answer

Q33. What is the difference between embedded testing and software testing

Ans.

Embedded testing is testing of software on hardware devices while software testing is testing of software on virtual or real machines.

  • Embedded testing involves testing of software on hardware devices like microcontrollers, sensors, etc.

  • Software testing involves testing of software on virtual or real machines like desktops, laptops, servers, etc.

  • Embedded testing requires knowledge of hardware and software interaction while software testing requires knowledge of software functi...read more

Add your answer

Q34. write a program on finding little or big endian,no of bits set in bit magic,

Ans.

Program to find endianness and number of bits set in bit magic.

  • Use bitwise operators to check endianness

  • Count number of set bits using bitwise AND and right shift

  • Use pre-defined functions for endianness in some programming languages

  • Endianness can affect network communication and file formats

Add your answer

Q35. Swap two variables without temp

Ans.

Use XOR operation to swap two variables without using a temporary variable

  • Use XOR operation to swap two variables without using a temporary variable

  • Example: a = 5, b = 10. a = a XOR b, b = a XOR b, a = a XOR b. Now a = 10, b = 5

Add your answer

Q36. What is Model in Loop ?

Ans.

Model in Loop is a simulation technique where a physical system is connected to a computer model for testing and validation.

  • Model in Loop (MiL) is a part of the V-Model of software development.

  • It involves connecting a physical system to a computer model to test and validate the model.

  • MiL is used in various industries such as automotive, aerospace, and defense.

  • It helps in identifying and fixing errors in the model before implementing it in the physical system.

  • Examples of MiL i...read more

Add your answer

Q37. Merge 2 Sorted arrays

Ans.

Merge two sorted arrays into a single sorted array.

  • Create a new array to store the merged result

  • Use two pointers to iterate through the two input arrays and compare elements

  • Add the smaller element to the new array and move the pointer for that array forward

  • Repeat until all elements from both arrays are merged

Add your answer

Q38. Brief of MDR 2017/745

Ans.

MDR 2017/745 is a regulation that governs the safety and performance of medical devices in the European Union.

  • MDR stands for Medical Device Regulation

  • It replaces the previous Medical Device Directive (MDD)

  • It requires stricter conformity assessments and clinical evaluations for medical devices

  • It also establishes a central database (EUDAMED) for medical devices

  • It applies to all medical devices sold in the EU, including those manufactured outside the EU

  • It came into effect on May...read more

Add your answer

Q39. Brief of Labeling information

Ans.

Labeling information provides important details about a product.

  • Labeling information includes ingredients, dosage instructions, warnings, and expiration dates.

  • It is required by law for most products to have labeling information.

  • Labeling information can be found on the packaging or on an insert inside the packaging.

  • It is important to read and understand labeling information before using a product.

Add your answer

Q40. Design patterns which you have worked ?

Ans.

I have worked with several design patterns including Singleton, Factory, Observer, and Decorator.

  • Implemented Singleton pattern to ensure only one instance of a class is created.

  • Used Factory pattern to create objects without exposing the instantiation logic to the client.

  • Implemented Observer pattern to notify dependent objects of any state changes.

  • Used Decorator pattern to add functionality to an object dynamically.

Add your answer

Q41. Criteria for setting up HIL environment.

Ans.

Criteria for setting up HIL environment

  • Identify the system under test and its interfaces

  • Select appropriate hardware and software components

  • Develop test cases and test scripts

  • Configure the HIL system and integrate with other tools

  • Verify and validate the HIL environment

View 1 answer

Q42. Explain the difference datatypes in python

Ans.

Python has several built-in datatypes including numeric, sequence, and mapping types.

  • Numeric types include integers, floats, and complex numbers.

  • Sequence types include lists, tuples, and strings.

  • Mapping types include dictionaries.

  • Python also has boolean and None datatypes.

  • Datatypes can be converted using built-in functions like int(), str(), and float().

Add your answer

Q43. Multiply two matrices in CUDA

Ans.

Matrix multiplication in CUDA involves parallelizing the computation across multiple threads on the GPU.

  • Use CUDA kernels to launch parallel threads for matrix multiplication.

  • Divide the matrices into blocks and load them into shared memory for faster access.

  • Implement the matrix multiplication algorithm in CUDA C/C++.

  • Ensure proper memory management and synchronization between threads.

Add your answer

Q44. Merge two sorted arrays

Ans.

Merge two sorted arrays into a single sorted array

  • Create a new array to store the merged result

  • Iterate through both arrays simultaneously and compare elements

  • Add the smaller element to the new array and move to the next element in that array

  • Continue until all elements from both arrays are merged

Add your answer

Q45. What is array dvfg grbfri fhrifhri fhrofhr hfrohfro hfhorhf hefoehf iluiewfihr?

Ans.

The question is not valid or coherent.

  • There is no clear meaning or context to the question.

  • It appears to be a random string of characters.

  • Without more information, it is impossible to provide a meaningful answer.

Add your answer

Q46. Why string is immutable?

Ans.

String is immutable because it cannot be changed once created.

  • Immutable objects are safer to use in multi-threaded environments.

  • String pool in Java is possible because of immutability.

  • StringBuffer and StringBuilder are mutable alternatives to String.

Add your answer

Q47. What is upgradation method of NSX-V/T. What's the difference among them

Ans.

NSX-V/T can be upgraded using in-place upgrade, side-by-side upgrade, or hybrid upgrade methods.

  • In-place upgrade involves upgrading the existing NSX-V/T deployment without replacing the hardware or virtual machines.

  • Side-by-side upgrade involves deploying a new NSX-V/T instance alongside the existing one and migrating workloads.

  • Hybrid upgrade combines elements of in-place and side-by-side upgrades, allowing for a phased migration.

  • In-place upgrade is simpler but may have downti...read more

Add your answer

Q48. What is VxRail, Vsan, NSX command ti verify the Ipsec tunnel

Ans.

VxRail, Vsan, NSX commands to verify IPsec tunnel

  • For VxRail, use 'show ipsec sa' command to verify IPsec tunnel status

  • For Vsan, use 'esxcli network ip connection list' command to check IPsec tunnel connections

  • For NSX, use 'get vpn ipsec sa' command to view IPsec tunnel information

Add your answer

Q49. Find distinct chars in string

Ans.

Count distinct characters in a given string

  • Iterate through the string and store each character in a set to ensure uniqueness

  • Return the size of the set as the count of distinct characters

  • Example: Input 'hello' -> Output 4 (h, e, l, o)

Add your answer

Q50. What is area of spectrum for scrum master ?

Ans.

The area of spectrum for a Scrum Master is the facilitation of the Scrum process and ensuring the team adheres to Agile principles.

  • Facilitating the Scrum events (e.g., Daily Stand-ups, Sprint Planning, Retrospectives)

  • Coaching the team on Agile principles and practices

  • Removing impediments and ensuring the team has a productive work environment

  • Helping the team to self-organize and make decisions collectively

  • Promoting continuous improvement and learning within the team

  • Acting as ...read more

View 1 answer

Q51. How do you document risk in a Risk Management File.

Ans.

Risk in a Risk Management File is documented through a structured process of identification, analysis, evaluation, and control.

  • Identify potential hazards and risks associated with the product or process

  • Analyze the likelihood and severity of each identified risk

  • Evaluate the risk and determine if it is acceptable or requires further control measures

  • Document the risk management process and results in a Risk Management File

  • Update the Risk Management File as necessary throughout t...read more

Add your answer

Q52. swapping of numbers without using 3rd var

Ans.

Swapping numbers without using a third variable

  • Use arithmetic operations like addition and subtraction

  • XOR operation can also be used for swapping numbers

  • Example: a = 5, b = 10; a = a + b; b = a - b; a = a - b; // Now a = 10, b = 5

Add your answer

Q53. What do you understand by risk and intended purpose?

Ans.

Risk refers to the potential harm that may arise from the use of a medical device or drug. Intended purpose is the intended use of the device or drug.

  • Risk is the potential harm that may arise from the use of a medical device or drug

  • Intended purpose is the intended use of the device or drug

  • Risk assessment is an important part of regulatory affairs

  • Intended purpose is determined by the manufacturer and approved by regulatory agencies

  • Examples of intended purpose include treatment...read more

Add your answer

Q54. What is Software in Loop?

Ans.

Software in Loop (SIL) is a testing technique where software is tested in a simulated environment.

  • SIL is used to test software components before integrating them into a larger system.

  • It involves creating a simulated environment that mimics the real-world environment in which the software will operate.

  • SIL can help identify and fix software defects early in the development process.

  • Examples of SIL tools include Simulink, LabVIEW, and dSPACE.

  • SIL is often used in the automotive an...read more

Add your answer

Q55. what is the difference between hub and router?

Ans.

A hub is a simple networking device that connects multiple devices in a network, while a router is a more advanced device that connects multiple networks together.

  • Hub operates at physical layer, while router operates at network layer.

  • Hub broadcasts data to all devices in the network, while router forwards data to specific devices based on IP addresses.

  • Hub does not have intelligence to determine the best path for data transmission, while router can make decisions based on rout...read more

Add your answer

Q56. Your special quality

Ans.

My special quality is my ability to think creatively and find innovative solutions to complex problems.

  • I have a strong analytical mind and can break down problems into smaller components

  • I am able to think outside the box and come up with unique solutions

  • I am not afraid to take risks and try new approaches

  • I have a track record of successfully implementing innovative solutions in my previous roles

View 1 answer

Q57. Basic IPC concepts used in operating system

Ans.

IPC stands for Inter-Process Communication and is used for communication between processes in an operating system.

  • Shared memory

  • Message passing

  • Pipes

  • Sockets

  • Remote Procedure Calls (RPC)

  • Semaphores

  • Mutexes

Add your answer

Q58. write a query in sql for creating a table, inserting and deleting a row in a table.

Ans.

SQL query for creating, inserting, and deleting rows in a table.

  • Use CREATE TABLE statement to create a table.

  • Use INSERT INTO statement to insert a row into the table.

  • Use DELETE FROM statement to delete a row from the table.

Add your answer

Q59. What is transformers working principle of transformers

Ans.

Transformers work on the principle of electromagnetic induction to transfer electrical energy between two or more circuits.

  • Transformers have two coils of wire, known as primary and secondary coils, which are magnetically coupled.

  • When an alternating current flows through the primary coil, it creates a changing magnetic field which induces a voltage in the secondary coil.

  • The ratio of the number of turns in the primary and secondary coils determines the voltage transformation ra...read more

Add your answer

Q60. Oops concepts- define abstraction, encapsulation

Ans.

Abstraction is the concept of hiding complex implementation details and showing only the necessary information. Encapsulation is the bundling of data and methods that operate on the data into a single unit.

  • Abstraction focuses on what an object does rather than how it does it

  • Encapsulation restricts access to certain components of an object, protecting the data from outside interference

  • Abstraction allows for creating simple interfaces for complex systems

  • Encapsulation helps in a...read more

Add your answer

Q61. relocation to pune is fine or not?

Ans.

Relocation to Pune is fine if the candidate is open to moving for the job.

  • Consider the candidate's willingness to relocate

  • Evaluate the benefits of working in Pune

  • Discuss any potential challenges or concerns with relocation

Add your answer

Q62. Write a code to swap two numbers

Ans.

Simple code to swap two numbers using a temporary variable

  • Declare two variables a and b with values

  • Create a temporary variable to store one of the numbers

  • Assign the value of a to b and temporary to a

  • Print the swapped values of a and b

Add your answer

Q63. What is difference between C and C++programming?

Ans.

C is a procedural programming language while C++ is an object-oriented programming language.

  • C is a procedural programming language, while C++ is a combination of procedural and object-oriented programming.

  • C does not support classes and objects, while C++ does.

  • C does not have built-in support for exception handling, while C++ does.

  • C does not have namespaces, while C++ does.

  • C does not have function overloading, while C++ does.

Add your answer

Q64. What is Database

Ans.

A database is a collection of data that is organized in a way that allows for efficient retrieval and manipulation.

  • A database can be relational or non-relational

  • Examples of databases include MySQL, Oracle, MongoDB

  • Data is stored in tables or documents

  • Queries can be used to retrieve specific data

Add your answer

Q65. What is OWASP top 10?

Ans.

OWASP top 10 is a list of the most critical web application security risks.

  • It is published by the Open Web Application Security Project (OWASP)

  • It includes risks such as injection, broken authentication and session management, cross-site scripting (XSS), and more

  • It is updated every few years to reflect new threats and vulnerabilities

  • It is used by security professionals to prioritize their efforts and focus on the most important risks

Add your answer

Q66. What is software development lifecycle?

Ans.

Software development lifecycle is a process used to design, develop, test, and deploy software applications.

  • It includes phases like planning, analysis, design, implementation, testing, and maintenance.

  • Each phase has specific goals and deliverables to ensure the successful completion of the project.

  • Examples of SDLC models include Waterfall, Agile, and DevOps.

  • SDLC helps in managing the software development process efficiently and effectively.

Add your answer

Q67. Tell me about EUMDR 2017/745, annex I and II.

Ans.

EUMDR 2017/745 is a regulation that governs medical devices in the European Union.

  • Annex I lists the general safety and performance requirements for medical devices.

  • Annex II outlines the technical documentation that must be provided for conformity assessment.

  • The regulation replaces the previous Medical Device Directive (MDD) and introduces new requirements for manufacturers.

  • It also includes a unique device identification (UDI) system to improve traceability and transparency.

  • Th...read more

Add your answer

Q68. Explain about the databases and difference between cosmos db and other Databases?

Ans.

Cosmos DB is a globally distributed, multi-model database service provided by Microsoft Azure, offering high availability and scalability.

  • Cosmos DB is a NoSQL database, while other databases like MySQL, PostgreSQL, and SQL Server are relational databases.

  • Cosmos DB offers global distribution and automatic scaling, making it suitable for globally distributed applications.

  • Cosmos DB supports multiple data models like document, key-value, graph, and column-family, providing flexib...read more

Add your answer

Q69. explain the use of public static void main

Ans.

The public static void main method is the entry point of a Java program.

  • It is a mandatory method in Java programs, as it is the starting point of execution.

  • The 'public' keyword allows the main method to be accessed from outside the class.

  • The 'static' keyword allows the main method to be called without creating an instance of the class.

  • The 'void' keyword indicates that the main method does not return any value.

  • The 'main' method accepts an array of strings as arguments, which c...read more

View 1 answer

Q70. what are structures and unions in c

Ans.

Structures and unions are used in C to define custom data types that can hold multiple variables of different data types.

  • Structures allow grouping variables of different data types under a single name.

  • Unions are similar to structures but they share the same memory location for all its members.

  • Structures are used to represent complex data structures like linked lists, trees, etc.

  • Unions are used when only one of the members needs to be accessed at a time.

  • Example of a structure:...read more

Add your answer

Q71. Maintenance - Any damages or repairing byvendor through.

Add your answer

Q72. 2. Technical skills in recruitment

Ans.

Technical skills in recruitment involve proficiency in using recruitment software, conducting candidate sourcing, and utilizing data analytics.

  • Proficiency in using recruitment software such as Applicant Tracking Systems (ATS) and Customer Relationship Management (CRM) tools.

  • Ability to conduct candidate sourcing through various channels like job boards, social media platforms, and professional networking sites.

  • Knowledge of data analytics to analyze recruitment metrics, track p...read more

View 1 answer

Q73. What is an inline function?

Ans.

An inline function is a function that is expanded in line when it is called, rather than executing a call to the function.

  • Inline functions are defined with the 'inline' keyword.

  • They are used to improve performance by reducing the overhead of function calls.

  • They are typically small functions that are called frequently.

  • Inline functions can be defined in header files.

  • Example: inline int add(int a, int b) { return a + b; }

Add your answer

Q74. ready for reallocation?

Ans.

Question about willingness to relocate for the job

  • Be honest about your willingness to relocate for the job

  • Consider the potential benefits of relocating, such as career growth opportunities

  • Discuss any concerns you may have about relocating, such as family or personal commitments

Add your answer

Q75. CAPL Program to read DTC

Ans.

CAPL program can be used to read Diagnostic Trouble Codes (DTC) from a vehicle's Electronic Control Unit (ECU).

  • Use the OnDiagnostics event to receive DTCs from the ECU

  • Use the DiagRead function to read DTCs from the ECU

  • Use the DiagGetNextDTC function to get the next DTC from the ECU

  • Use the DiagClearDTC function to clear DTCs from the ECU

Add your answer

Q76. Middleware in Nodejs

Ans.

Middleware in Nodejs is a function that sits between the request and response objects and performs some operations.

  • Middleware functions can be used to handle authentication, logging, error handling, etc.

  • They can be added to the application using the 'use' method of the 'app' object.

  • Middleware functions can be chained together using the 'next' function.

  • They can also be used to modify the request or response objects before passing them to the next middleware function.

  • Some popul...read more

Add your answer

Q77. How to develop harness from scratch?

Ans.

Developing a harness from scratch involves designing, prototyping, testing, and refining the harness to meet specific requirements.

  • Start by defining the requirements and constraints of the harness

  • Design the layout and components of the harness using CAD software

  • Create prototypes to test the functionality and fit of the harness

  • Conduct thorough testing to ensure the harness meets safety and performance standards

  • Refine the design based on testing feedback and make any necessary ...read more

Add your answer

Q78. 3 strengths and 3 weakness

Ans.

Strengths: Problem-solving skills, strong technical knowledge, effective communication. Weaknesses: Impatience, perfectionism, public speaking.

  • Strength: Problem-solving skills - Able to analyze complex problems and come up with effective solutions.

  • Strength: Strong technical knowledge - Proficient in various programming languages and technologies.

  • Strength: Effective communication - Able to clearly convey ideas and collaborate with team members.

  • Weakness: Impatience - Sometimes ...read more

Add your answer

Q79. How many customers or projects handle

Ans.

I have handled over 20 projects and worked with numerous customers in my role as Lead Design Engineer.

  • Managed 20+ projects from start to finish

  • Collaborated with various customers to understand their needs and requirements

  • Implemented design solutions for different industries such as automotive, aerospace, and consumer electronics

Add your answer

Q80. How many uplinks and downlinks in cmts

Ans.

The number of uplinks and downlinks in CMTS varies depending on the model and configuration.

  • The number of uplinks and downlinks in CMTS can range from 1 to 16 or more.

  • The number of uplinks and downlinks can also depend on the type of interface used, such as Gigabit Ethernet or DOCSIS.

  • Some CMTS models may have dedicated uplink and downlink ports, while others may use shared ports.

  • The number of uplinks and downlinks can also affect the maximum number of cable modems that can be...read more

Add your answer

Q81. What design pattern you used

Ans.

I have used the Singleton design pattern in my previous projects.

  • Used to ensure a class has only one instance and provides a global point of access to it

  • Helps in managing global resources efficiently

  • Example: Database connection manager in a web application

Add your answer

Q82. program to count the number of words in a string

Ans.

Program to count the number of words in a string using array of strings.

  • Split the string into an array of strings using a delimiter like space.

  • Iterate through the array and count the number of elements.

  • Handle edge cases like multiple spaces between words.

Add your answer

Q83. What is PPB and explain detailed

Ans.

PPB stands for Parts Per Billion, a unit of measurement used to describe extremely small concentrations of substances in a mixture.

  • PPB is used to express the ratio of the mass of a contaminant to the total mass of the mixture, multiplied by one billion.

  • It is commonly used in environmental science, chemistry, and toxicology to measure trace amounts of pollutants in air, water, soil, and food.

  • For example, if a water sample contains 1 microgram of lead in 1,000,000 micrograms of...read more

Add your answer

Q84. How well can you manage time?

Ans.

I excel at time management by prioritizing tasks, setting deadlines, and utilizing tools like calendars and to-do lists.

  • Prioritize tasks based on importance and deadlines

  • Set realistic deadlines for each task

  • Utilize tools like calendars, to-do lists, and project management software

  • Regularly review and adjust schedule as needed

  • Delegate tasks when necessary to ensure efficient use of time

Add your answer

Q85. Explain about Different Databases used for OTT?

Ans.

Different databases used for OTT include MySQL, MongoDB, Cassandra, and Amazon DynamoDB.

  • MySQL is a popular relational database management system used for storing structured data in OTT platforms.

  • MongoDB is a NoSQL database that is commonly used for handling large volumes of unstructured data in OTT applications.

  • Cassandra is a distributed database system known for its scalability and high availability, making it suitable for OTT services with a large user base.

  • Amazon DynamoDB ...read more

Add your answer

Q86. What is merge block?

Ans.

A merge block is a component used in programming or engineering to combine multiple inputs into a single output.

  • Merge blocks are commonly used in programming to combine branches of code.

  • In engineering, merge blocks are used in control systems to combine multiple signals or inputs.

  • Merge blocks can be found in software applications like Simulink for modeling complex systems.

Add your answer

Q87. Explain about TMF Open API with an exaple

Ans.

TMF Open API is a set of APIs provided by TM Forum for accessing and integrating with their platform.

  • TMF Open API allows developers to access TM Forum's platform for various purposes such as data retrieval, service provisioning, and network management.

  • Developers can use TMF Open API to integrate their own applications with TM Forum's platform, enabling seamless communication and data exchange.

  • An example of using TMF Open API is a telecom company integrating their billing syst...read more

Add your answer

Q88. C code for finding 2nd smalleset and 2nd largest

Ans.

Use C code to find the 2nd smallest and 2nd largest elements in an array.

  • Sort the array in ascending order to find the 2nd smallest element.

  • Sort the array in descending order to find the 2nd largest element.

Add your answer

Q89. Swap two numbers without using temp variable

Ans.

Swap two numbers without using a temp variable

  • Use arithmetic operations like addition and subtraction to swap the numbers

  • Example: a = 5, b = 10. a = a + b (a = 15), b = a - b (b = 5), a = a - b (a = 10)

  • Another example: a = 3, b = 7. a = a + b (a = 10), b = a - b (b = 3), a = a - b (a = 7)

Add your answer

Q90. Write code of Diagonals sum in 2 d matrix

Ans.

Code to calculate the sum of diagonals in a 2D matrix.

  • Iterate through the rows and columns of the matrix.

  • Add the values of the diagonal elements to a variable.

  • Return the sum of the diagonal elements.

Add your answer

Q91. write a code for circular linked list

Ans.

Code for circular linked list implementation in C++

  • Define a Node struct with data and next pointer

  • Implement functions for insertion, deletion, and traversal

  • Make sure the last node points back to the first node

Add your answer

Q92. What's your aera of intrest

Ans.

My area of interest is computer programming and software development.

  • I enjoy learning new programming languages and frameworks.

  • I have experience in developing web applications using HTML, CSS, JavaScript, and React.

  • I am also interested in mobile app development using Java and Kotlin for Android and Swift for iOS.

  • I am always looking for opportunities to improve my skills and contribute to open-source projects.

Add your answer

Q93. What is ISR?

Ans.

ISR stands for Interrupt Service Routine. It is a function that is executed in response to an interrupt signal.

  • ISR is a type of callback function that is used in embedded systems.

  • It is used to handle hardware interrupts, such as button presses or sensor readings.

  • ISR is executed asynchronously and takes priority over other tasks.

  • It is important to keep ISR functions short and efficient to prevent delays in other system operations.

  • Examples of ISR include handling interrupts fro...read more

Add your answer

Q94. Write code for max and min element in array

Ans.

Code for finding max and min element in an array

  • Initialize max and min variables with first element of array

  • Loop through the array and compare each element with max and min variables

  • Update max and min variables accordingly

  • Return max and min variables

Add your answer

Q95. What is stateflow

Ans.

Stateflow is a graphical tool used for modeling and simulating decision logic in complex systems.

  • Stateflow is a part of MATLAB/Simulink software

  • It allows for modeling of finite state machines and flow charts

  • Stateflow can be used for designing control logic in automotive systems, aerospace, and industrial automation

  • It provides a visual representation of system behavior and logic transitions

Add your answer

Q96. What is C programming?

Ans.

C programming is a powerful and efficient programming language used for system programming, embedded systems, and more.

  • C programming is a procedural language with a rich set of built-in functions.

  • It allows for low-level memory manipulation and direct access to hardware.

  • C is widely used for developing operating systems, compilers, and other system software.

  • Example: Writing a program to calculate the factorial of a number in C.

Add your answer

Q97. What is primary key

Ans.

Primary key is a unique identifier for each record in a database table.

  • Primary key ensures each record in a table is unique

  • It can be a single column or a combination of columns

  • Primary key values cannot be NULL

  • Example: 'ID' column in a 'Users' table

Add your answer

Q98. What is foreign key

Ans.

Foreign key is a field in a database table that links to a primary key in another table.

  • Foreign key ensures referential integrity between related tables

  • It helps maintain relationships between tables

  • Foreign key constraints can be used to enforce data integrity

Add your answer

Q99. What is unique key

Ans.

A unique key is a field or combination of fields in a database table that uniquely identifies each record in the table.

  • A unique key ensures that no two records in a table have the same values for the specified key fields.

  • It can be a single field or a combination of multiple fields.

  • Unique keys are used to enforce data integrity and prevent duplicate records.

  • Examples: Primary key, Unique constraint

Add your answer

Q100. What is engineering?

Ans.

Engineering is the application of scientific and mathematical principles to design and build machines, structures, systems, and processes.

  • Engineering involves problem-solving and innovation.

  • Engineers use creativity and critical thinking to design solutions.

  • Examples of engineering disciplines include civil, mechanical, electrical, and chemical engineering.

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 120 interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 3.8k Interview Questions
4.1
 • 359 Interview Questions
4.2
 • 177 Interview Questions
3.4
 • 159 Interview Questions
3.9
 • 135 Interview Questions
3.8
 • 129 Interview Questions
View all
Top Tata Elxsi Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter