Premium Employer

Tejas Networks

4.0
based on 414 Reviews
Filter interviews by

70+ Kellton Interview Questions and Answers

Updated 12 Feb 2025

Q1. What are the requirements for the implementation of stm-1 link and what is the capacity of stm-1 link

Ans.

Requirements and capacity of stm-1 link implementation

  • Requirements include fiber optic cables, SDH equipment, and proper configuration

  • Capacity of stm-1 link is 155.52 Mbps

  • STM-1 link is commonly used in telecommunications for high-speed data transmission

Add your answer

Q2. What is subnet mask and how to calculate the no. Of usable ip's. What is network host ip and broadcast ip

Ans.

Subnet mask is used to divide an IP network into subnetworks, determining the network and host portions of an IP address.

  • Subnet mask is a 32-bit number that separates the network and host portions of an IP address.

  • To calculate the number of usable IPs in a subnet, subtract 2 from the total number of IPs in the subnet.

  • Network host IP is the first IP address in a subnet, while broadcast IP is the last IP address in a subnet.

  • For example, in a subnet with a subnet mask of 255.255...read more

Add your answer

Q3. Consider we have large amount of physical memory.Do we still need virtual memory?What is the use of paging in that situation

Ans.

Virtual memory is still necessary even with large physical memory. Paging helps manage memory usage.

  • Virtual memory allows for efficient use of physical memory by swapping data between RAM and storage devices.

  • Paging helps manage memory usage by dividing memory into smaller chunks called pages, which can be swapped in and out of physical memory as needed.

  • Even with large physical memory, virtual memory can still be useful for running multiple applications simultaneously or for h...read more

Add your answer

Q4. What is OSI model, Create a linked list

Ans.

OSI model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system.

  • OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has a specific function and communicates with the layers above and below it.

  • Linked list is a data structure that consists of nodes linked together in a sequence.

  • Each node contains data and a pointer to the next node in the lis...read more

Add your answer
Discover Kellton interview dos and don'ts from real experiences

Q5. How to upgrade software in olt, ont and tejas 1400 locally and from nms?

Ans.

To upgrade software in OLT, ONT, and Tejas 1400 locally and from NMS, follow these steps.

  • Locally: Use a USB drive to transfer the software update file to the device. Access the device's management interface and initiate the upgrade process.

  • From NMS: Use the Network Management System (NMS) to remotely push the software update to the devices. Schedule the upgrade during off-peak hours to minimize disruption.

  • Ensure compatibility: Check the release notes of the software update to...read more

Add your answer

Q6. Write the code for producer-consumer problem using mutex

Ans.

Code for producer-consumer problem using mutex

  • Create a shared buffer between producer and consumer

  • Use mutex to lock the buffer while accessing it

  • Producer adds data to buffer and signals consumer

  • Consumer waits for signal and consumes data from buffer

  • Repeat until all data is produced and consumed

Add your answer
Are these interview questions helpful?

Q7. What is ipmpls? What are the advantages of MPLS? Which one is better mpls or traditional routing.

Ans.

MPLS stands for Multiprotocol Label Switching. It is a protocol used in high-performance telecommunications networks.

  • Advantages of MPLS include improved performance, scalability, quality of service, and traffic engineering capabilities

  • MPLS allows for efficient packet forwarding based on labels instead of IP addresses

  • MPLS can support different types of traffic, such as voice, video, and data, with different service levels

  • MPLS is often preferred for large networks with high tra...read more

Add your answer

Q8. What are different kinds of cards used in tejas 1400 and 1600 mux.

Ans.

Different kinds of cards used in Tejas 1400 and 1600 mux include line cards, switch cards, and power cards.

  • Line cards: used for connecting the mux to external devices

  • Switch cards: used for routing data within the mux

  • Power cards: used for providing power to the mux

  • Examples: STM-1 line card, STM-4 switch card, power supply card

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is layer-2 and layer-3 services. Also what is the difference between them.

Ans.

Layer-2 and layer-3 services refer to different levels of network services in the OSI model.

  • Layer-2 services operate at the data link layer and include functions like MAC address assignment and Ethernet switching.

  • Layer-3 services operate at the network layer and include functions like IP address assignment and routing.

  • The main difference between layer-2 and layer-3 services is the level at which they operate in the OSI model.

  • Layer-2 services are more focused on local network ...read more

Add your answer

Q10. What is ip address and difference between ipv4 and ipv6?

Ans.

An IP address is a unique numerical label assigned to each device connected to a computer network. IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses.

  • IP address is a unique identifier for devices on a network.

  • IPv4 uses 32-bit addresses, represented in decimal format (e.g. 192.168.1.1).

  • IPv6 uses 128-bit addresses, represented in hexadecimal format (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334).

Add your answer

Q11. What is gpon technology? Also explain briefly gpon architecture?

Ans.

GPON technology is a type of passive optical network that uses fiber-optic cables to deliver high-speed internet, TV, and phone services.

  • GPON stands for Gigabit Passive Optical Network

  • It uses a point-to-multipoint architecture, where a single optical fiber serves multiple users

  • GPON architecture includes an Optical Line Terminal (OLT) at the service provider's central office and Optical Network Terminals (ONTs) at the customer premises

  • Data is transmitted using time-division mu...read more

Add your answer

Q12. 1 ospf broadcast domain broken into 2 and back to 1, how DR and BDR election will work.

Ans.

When an OSPF broadcast domain is broken into 2 and then back to 1, the DR and BDR election process will be triggered again.

  • When the broadcast domain is split, each segment will have its own DR and BDR elected based on priority and router ID.

  • When the broadcast domain is merged back into one, a new DR and BDR election will take place among all routers in the domain.

  • The election process considers the priority value set on each router, with higher priority routers having a better...read more

Add your answer

Q13. Write a program to find the duplicate in the array(only one duplicate is present in the array).ANS: best way-using binary tree on hash table

Ans.

Program to find the duplicate in an array using binary tree or hash table

  • Create a binary tree or hash table

  • Iterate through the array and insert each element into the tree or table

  • If an element already exists, it is a duplicate

Add your answer

Q14. What are different types of alarms occuring in tejas equipments

Ans.

Different types of alarms in Tejas equipments include power alarms, temperature alarms, and communication alarms.

  • Power alarms: indicate issues with power supply or voltage levels

  • Temperature alarms: alert when equipment temperature exceeds safe limits

  • Communication alarms: signal problems with data transmission or network connectivity

Add your answer

Q15. What is segmentation

Ans.

Segmentation is the process of dividing a larger entity into smaller parts or segments.

  • It is commonly used in image processing to separate objects from the background.

  • Segmentation can also refer to dividing a market into smaller groups based on demographics or behavior.

  • In computer science, segmentation refers to dividing memory into smaller parts for more efficient use.

  • Segmentation can also be used in biology to divide cells or tissues into smaller parts for analysis.

Add your answer

Q16. Explain the concept of virtual addressing and the allocation of virtual addresses during the execution of program

Ans.

Virtual addressing is a memory management technique that allows a program to use more memory than physically available.

  • Virtual addresses are mapped to physical addresses by the operating system.

  • Virtual addresses are allocated to a program during its execution.

  • Virtual addressing allows for efficient use of memory resources.

  • Virtual addressing enables the use of shared memory and memory protection.

  • Examples of virtual addressing include paging and segmentation.

Add your answer

Q17. what is ipv4 and ipv6 address of google dns server

Ans.

IPv4 address of Google DNS server is 8.8.8.8 and IPv6 address is 2001:4860:4860::8888.

  • IPv4 address: 8.8.8.8

  • IPv6 address: 2001:4860:4860::8888

Add your answer

Q18. What is difference between xa60g and xa20g card.

Ans.

The main difference between xa60g and xa20g cards is the processing power and memory capacity.

  • xa60g card has higher processing power and memory capacity compared to xa20g card

  • xa60g card is more suitable for high-performance computing tasks

  • xa20g card may be more cost-effective for less demanding applications

Add your answer

Q19. What is OSI model explain , OSPF , DNS , DHCP , SDH , DWDM Basics

Ans.

OSI model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system.

  • OSPF (Open Shortest Path First) is a routing protocol used for Internet Protocol (IP) networks.

  • DNS (Domain Name System) is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet.

  • DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assig...read more

Add your answer

Q20. How do you find the middle of the linked list

Ans.

To find the middle of a linked list, use two pointers - one moving at twice the speed of the other.

  • Initialize two pointers - slow and fast

  • Move the slow pointer one step at a time and the fast pointer two steps at a time

  • When the fast pointer reaches the end of the list, the slow pointer will be at the middle

  • If the list has even number of nodes, there will be two middle nodes. In that case, return the second middle node

Add your answer

Q21. Why do we need Mutex if we have Semophers

Ans.

Mutex and Semaphores serve different purposes in managing concurrent access to shared resources.

  • Mutex is used to provide exclusive access to a shared resource, while Semaphores can be used to control access to a shared resource by multiple threads.

  • Mutex is binary in nature, meaning it can only be in two states - locked or unlocked, while Semaphores can have multiple states.

  • Mutex is typically used for protecting critical sections of code, while Semaphores can be used for synch...read more

Add your answer

Q22. What is different types of networkinfg devices

Ans.

Different types of networking devices include routers, switches, hubs, modems, access points, and firewalls.

  • Routers: Used to connect multiple networks together and route data between them.

  • Switches: Used to connect devices within a network and manage traffic efficiently.

  • Hubs: Used to connect multiple devices in a network, but they operate at a lower level than switches.

  • Modems: Used to modulate and demodulate digital data for transmission over analog communication lines.

  • Access ...read more

Add your answer

Q23. How to add and delete nodes in NMS?

Ans.

Nodes can be added and deleted in NMS by using the management interface or command line interface.

  • Nodes can be added through the management interface by selecting the 'Add Node' option and providing the necessary information such as IP address, hostname, and SNMP credentials.

  • Nodes can also be added through the command line interface by using specific commands to add a new node to the network management system.

  • To delete a node, navigate to the 'Delete Node' option in the manag...read more

Add your answer

Q24. Explain the roles of linker and loader during the execution of the program

Ans.

Linker links object files and libraries to create an executable file. Loader loads the executable file into memory and executes it.

  • Linker resolves external references and generates an executable file

  • Loader loads the executable file into memory and performs relocation

  • Linker and loader are part of the toolchain used to build and run programs

  • Example: gcc uses linker and loader to compile and run C programs

Add your answer

Q25. Time complexity of building a heap using linked list and arrays

Ans.

Time complexity of building a heap using linked list and arrays

  • Building a heap using a linked list takes O(nlogn) time complexity

  • Building a heap using an array takes O(n) time complexity

  • Linked list implementation is slower than array implementation

  • Arrays are better for random access while linked lists are better for insertion and deletion

Add your answer

Q26. What is Ip address and subnet mask

Ans.

An IP address is a unique numerical label assigned to each device connected to a computer network, while a subnet mask is used to divide an IP network into subnetworks.

  • IP address identifies a device on a network, like 192.168.1.1

  • Subnet mask determines the network portion of an IP address, like 255.255.255.0

  • Subnet mask is used to separate the network and host portions of an IP address

Add your answer

Q27. What is the code to check whether a string is a palindrome?

Ans.

Use two pointers to compare characters from start and end of the string.

  • Initialize two pointers, one at the start of the string and one at the end.

  • Compare characters at both pointers, move towards the center while checking for equality.

  • If all characters match, the string is a palindrome.

Add your answer

Q28. What is the code to rotate a 3x3 matrix 270 degrees anti-clockwise?

Ans.

To rotate a 3x3 matrix 270 degrees anti-clockwise, transpose the matrix and then reverse the rows.

  • Transpose the matrix by swapping elements across the diagonal

  • Reverse the rows of the transposed matrix

Add your answer

Q29. What is the code to remove duplicate elements from an array?

Ans.

Use a Set to remove duplicate elements from an array of strings.

  • Create a Set from the array to automatically remove duplicates

  • Convert the Set back to an array to get the unique elements

  • Example: const array = ['apple', 'banana', 'apple', 'orange']; const uniqueArray = [...new Set(array)];

Add your answer

Q30. Write the program to merge to sorted linked lists in sorted order

Ans.

Program to merge two sorted linked lists in sorted order

  • Create a new linked list to store the merged result

  • Compare the first nodes of both lists and add the smaller one to the result list

  • Move the pointer of the list with the smaller node to the next node

  • Repeat until one of the lists is empty, then add the remaining nodes of the other list to the result

  • Return the merged list

Add your answer

Q31. What is the difference between multiprogramming and multitasking?

Ans.

Multiprogramming involves running multiple programs on a single processor, while multitasking involves executing multiple tasks within a single program.

  • Multiprogramming allows multiple programs to be loaded into memory and executed concurrently.

  • Multitasking involves switching between different tasks within a single program, giving the illusion of parallel execution.

  • Examples of multiprogramming include time-sharing systems where multiple users can run different programs simult...read more

Add your answer

Q32. What is your understanding of threads in programming?

Ans.

Threads in programming are independent paths of execution within a program.

  • Threads allow for concurrent execution of tasks within a program.

  • Threads share the same memory space, allowing for communication and data sharing between them.

  • Examples of using threads include multi-threaded web servers, parallel processing, and background tasks in applications.

Add your answer

Q33. What conventions are typically followed when writing a program?

Ans.

Conventions like naming variables, using comments, and following indentation are typically followed when writing a program.

  • Use meaningful variable names to improve code readability

  • Include comments to explain complex sections of code

  • Follow consistent indentation for better code organization

Add your answer

Q34. What is the purpose of a subnet mask in networking?

Ans.

A subnet mask is used to divide an IP address into network and host portions.

  • Defines the network portion of an IP address

  • Helps determine which part of the IP address is the network ID and which part is the host ID

  • Used in conjunction with IP addresses to route traffic within a network

  • Common subnet masks include 255.255.255.0 for a Class C network

Add your answer

Q35. What is your knowledge of Virtual Private Networks (VPNs)?

Ans.

VPNs are secure networks that allow users to access the internet privately and securely.

  • VPNs encrypt internet traffic to protect data from hackers and surveillance.

  • They can be used to access region-restricted websites or bypass censorship.

  • Common VPN protocols include OpenVPN, L2TP/IPsec, and IKEv2.

  • VPN services like NordVPN, ExpressVPN, and CyberGhost offer secure connections.

  • Businesses often use VPNs to allow remote employees to access company resources securely.

Add your answer

Q36. What are the reasons for your interest in Tejas Networks?

Ans.

I am interested in Tejas Networks due to their innovative technology and strong reputation in the industry.

  • Innovative technology: Tejas Networks is known for their cutting-edge solutions in the field of optical networking.

  • Strong reputation: Tejas Networks has a proven track record of delivering high-quality products and services to their customers.

  • Career growth opportunities: I believe that working at Tejas Networks will provide me with the chance to grow and develop my skill...read more

Add your answer

Q37. What all processes, tools, applications used

Add your answer

Q38. What is OSI and TCP/IP Model

Ans.

OSI and TCP/IP models are networking models that define how data is transmitted over a network.

  • OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, Application.

  • TCP/IP model has 4 layers: Network Interface, Internet, Transport, Application.

  • OSI model is theoretical while TCP/IP model is practical and widely used.

  • OSI model is a reference model while TCP/IP model is a protocol stack.

  • Example: OSI model helps in understanding how data flows in a n...read more

Add your answer

Q39. What is DCCR and DCCM?

Ans.

DCCR stands for Data Center Control Room and DCCM stands for Data Center Construction Manager.

  • DCCR is a centralized location within a data center where operators monitor the performance of servers, networks, and other equipment.

  • DCCM is responsible for overseeing the construction and maintenance of data center facilities.

  • Examples: DCCR helps in ensuring smooth operations of data centers by monitoring and managing resources efficiently. DCCM ensures that data center constructio...read more

Add your answer

Q40. Explain sdh structure and sdh frame

Ans.

SDH structure refers to the hierarchy of synchronous digital signals, while SDH frame is the basic unit of data transmission in SDH networks.

  • SDH structure includes various levels such as STM-1, STM-4, STM-16, etc.

  • SDH frame consists of a fixed number of bytes, with overhead for management and error correction.

  • SDH frame structure includes sections, lines, and paths for data transmission.

  • Example: STM-1 is a common level in SDH structure, with a data rate of 155.52 Mbps.

Add your answer

Q41. How can we prevent Deadlock?

Ans.

Deadlock can be prevented by using techniques like resource allocation, avoidance, and detection.

  • Use a resource allocation algorithm to ensure resources are allocated in a safe manner.

  • Avoidance can be achieved by ensuring that resources are only requested when they are available.

  • Detection involves periodically checking for deadlock and taking action to resolve it if it is detected.

  • Implementing timeouts can also help prevent deadlock by releasing resources that are not being u...read more

Add your answer

Q42. What is vlan and vlan-id

Ans.

VLAN stands for Virtual Local Area Network. VLAN ID is a unique identifier assigned to a VLAN.

  • VLAN is a logical grouping of devices on the same network segment.

  • VLANs help in segmenting network traffic for security and performance reasons.

  • VLAN ID is a number assigned to each VLAN to differentiate it from others.

  • For example, VLAN 10 might be used for finance department while VLAN 20 for marketing.

Add your answer

Q43. What are lists, sets, and tuples in Python?

Ans.

Lists, sets, and tuples are data structures in Python used to store collections of items.

  • Lists are ordered, mutable, and allow duplicate elements. Example: [1, 2, 3]

  • Sets are unordered, mutable, and do not allow duplicate elements. Example: {1, 2, 3}

  • Tuples are ordered, immutable, and allow duplicate elements. Example: (1, 2, 3)

Add your answer

Q44. What are the different layers of the OSI model?

Ans.

The OSI model consists of seven layers that define the different functions of a network communication system.

  • Physical layer: Deals with physical connections and transmission of raw data.

  • Data link layer: Manages data transfer between devices on the same network.

  • Network layer: Handles routing and forwarding of data packets.

  • Transport layer: Ensures reliable data transfer between end systems.

  • Session layer: Manages communication sessions between applications.

  • Presentation layer: Tr...read more

Add your answer

Q45. What is an IP address and what are its classes?

Ans.

An IP address is a unique numerical label assigned to each device connected to a computer network.

  • IP address stands for Internet Protocol address.

  • It is used to identify and locate devices on a network.

  • There are 5 classes of IP addresses: A, B, C, D, and E.

  • Each class has a different range of possible addresses.

  • For example, Class A addresses range from 1.0.0.0 to 126.255.255.255.

Add your answer

Q46. What is the function of a router gateway?

Ans.

A router gateway is a device that connects different networks and routes data between them.

  • Acts as an entry and exit point for data traffic between networks

  • Provides security by filtering incoming and outgoing traffic

  • Assigns IP addresses to devices on the network

  • Controls the flow of data packets between networks

Add your answer

Q47. Differences between Mutex and Semaphore

Ans.

Mutex is used for mutual exclusion while Semaphore is used for signaling and synchronization.

  • Mutex is used to protect a shared resource from simultaneous access by multiple threads.

  • Semaphore is used to signal between threads or to limit the number of threads accessing a shared resource.

  • Mutex can only be locked and unlocked by the thread that locked it.

  • Semaphore can be signaled and waited on by different threads.

  • Mutex is binary, meaning it has only two states: locked and unloc...read more

Add your answer

Q48. What is OSPF ? Why we use OSPF ? Ad Value?

Ans.

OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.

  • OSPF is used to efficiently route traffic in large networks by calculating the shortest path between routers.

  • It is a link-state routing protocol that uses Dijkstra's algorithm to determine the best path.

  • OSPF is preferred over other routing protocols like RIP due to its faster convergence time and scalability.

  • It supports VLSM (Variable Length Subnet Masking) and ...read more

Add your answer

Q49. Find a duplicate in a String OOPs concept Java 8 features

Ans.

The question is about finding a duplicate in a string.

  • Convert the string into an array of characters

  • Create a HashSet to store unique characters

  • Iterate through the array and check if each character is already present in the HashSet

  • If a character is already present, it is a duplicate

Add your answer

Q50. how l2vpn, vpls, vpws work

Ans.

L2VPN, VPLS, and VPWS are technologies used in networking to provide virtualized Layer 2 connectivity.

  • L2VPN (Layer 2 Virtual Private Network) is a technology that allows for the extension of a Layer 2 network over a Layer 3 network.

  • VPLS (Virtual Private LAN Service) is a type of L2VPN that connects multiple sites in a single bridged domain.

  • VPWS (Virtual Private Wire Service) is a point-to-point L2VPN service that provides a dedicated connection between two sites.

  • These technol...read more

Add your answer

Q51. How AC works and how can we improve efficiency?

Ans.

AC works by converting electrical energy into mechanical energy to create a cooling effect. Efficiency can be improved by using energy-efficient components and regular maintenance.

  • AC works by using a compressor to convert electrical energy into mechanical energy, which is used to pump refrigerant through the system to create a cooling effect.

  • Efficiency can be improved by using energy-efficient components such as high SEER rated units, proper insulation, and regular maintenanc...read more

Add your answer

Q52. What is stm-1 link

Ans.

STM-1 link refers to a Synchronous Transport Module level 1 link used in telecommunications for transmitting data.

  • STM-1 link operates at a data rate of 155.52 Mbps.

  • It is commonly used in SDH (Synchronous Digital Hierarchy) networks.

  • STM-1 link can carry multiple DS3 or E3 circuits.

  • It is equivalent to 63 E1 channels or 28 DS1 channels.

Add your answer

Q53. Java OOPs concept Comparator vs Comparable Streams Lambda Expression

Ans.

Comparator vs Comparable, Streams, Lambda Expression

  • Comparator and Comparable are interfaces used for sorting objects in Java

  • Comparator is used for custom sorting logic, while Comparable is used for natural sorting order

  • Streams are a sequence of elements that can be processed in parallel or sequentially

  • Lambda expressions are used to write concise and functional code in Java

Add your answer

Q54. Expected CTC and take home

Ans.

Expected CTC and take home should be based on industry standards and the candidate's experience and skills.

  • Expected CTC should be in line with industry standards for the position and the candidate's experience level.

  • Take home pay should be calculated after deductions like taxes and insurance.

  • Candidates can research average salaries for similar roles in the industry to get an idea of what to expect.

  • Negotiation is common during salary discussions, so be prepared to justify your...read more

Add your answer

Q55. What is Deadlock

Ans.

Deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.

  • Occurs in multi-threaded or multi-process environments

  • Can lead to system freeze or crash

  • Prevention techniques include resource ordering and timeouts

  • Example: Process A holds resource X and waits for resource Y, while Process B holds resource Y and waits for resource X

Add your answer

Q56. What is difference between 4g and 5g

Ans.

5G is the next generation of wireless technology, offering faster speeds, lower latency, and increased capacity compared to 4G.

  • 5G offers faster speeds than 4G, with potential download speeds of up to 10 Gbps compared to 4G's 100 Mbps.

  • 5G has lower latency, meaning faster response times for applications like gaming and video streaming.

  • 5G has increased capacity to support more devices and data traffic compared to 4G.

  • 5G technology uses higher frequency bands than 4G, which allows...read more

View 1 answer

Q57. System Desing of Network Management System

Ans.

A network management system is designed to monitor and control network devices and ensure their efficient operation.

  • The system should have a centralized dashboard to display real-time network status and performance metrics.

  • It should support automated network discovery and device configuration management.

  • The system should provide alerts and notifications for network events and failures.

  • It should have the ability to generate reports and analyze network data for troubleshooting ...read more

Add your answer

Q58. Write the Test_and_Set program

Ans.

Test_and_Set program is used to ensure mutual exclusion in concurrent systems.

  • Test_and_Set is a hardware instruction that sets a memory location to a value and returns its old value.

  • The program uses a loop to repeatedly execute the Test_and_Set instruction until it returns 0.

  • The program then enters the critical section and sets the memory location back to 0 when done.

  • Example code: while(Test_and_Set(&lock)); //critical section lock = 0;

Add your answer

Q59. Explain VCG, VCAT

Ans.

VCG stands for Voltage Controlled Gain and VCAT stands for Voltage Controlled Attenuator.

  • VCG is a circuit that adjusts the gain of an amplifier based on a control voltage.

  • VCAT is a circuit that adjusts the attenuation of a signal based on a control voltage.

  • Both VCG and VCAT are commonly used in electronic devices to control signal levels.

  • Example: VCG can be used in audio amplifiers to adjust the volume based on user input.

  • Example: VCAT can be used in RF communication systems ...read more

Add your answer

Q60. What is NumPy in Python?

Ans.

NumPy is a library in Python used for numerical computing, providing support for large, multi-dimensional arrays and matrices.

  • NumPy stands for Numerical Python.

  • It is widely used for scientific computing and data analysis.

  • NumPy arrays are more efficient than Python lists for numerical operations.

  • Example: import numpy as np

  • Example: arr = np.array([1, 2, 3])

Add your answer

Q61. What is job back and if field

Ans.

Job back and if field refers to the tasks and responsibilities of a network field engineer.

  • Job back involves troubleshooting network issues in the field

  • Field work includes installing and configuring network equipment

  • Network field engineers may also perform maintenance and upgrades on existing networks

Add your answer

Q62. Main parameters of all active electronics components

Ans.

Main parameters of active electronics components include voltage, current, power, frequency, and temperature.

  • Voltage: The operating voltage range of the component.

  • Current: The maximum current that can flow through the component.

  • Power: The power dissipation capability of the component.

  • Frequency: The frequency response of the component.

  • Temperature: The operating temperature range of the component.

Add your answer

Q63. What is es6 in javascript language

Ans.

ES6, also known as ECMAScript 2015, is the sixth major release of the JavaScript language that introduced new features and syntax improvements.

  • Introduced let and const for variable declarations

  • Added arrow functions for more concise syntax

  • Included classes for object-oriented programming

  • Introduced template literals for easier string interpolation

  • Added default parameters and rest parameters for functions

Add your answer

Q64. What is conductor, capacitor, resistor..

Ans.

Conductor, capacitor, and resistor are basic components used in electronic circuits.

  • Conductor: Allows the flow of electric current. Example: Copper wire.

  • Capacitor: Stores and releases electrical energy. Example: Ceramic capacitor.

  • Resistor: Limits the flow of electric current. Example: Carbon film resistor.

Add your answer

Q65. What is the 5G in telecom.

Ans.

5G in telecom refers to the fifth generation of wireless technology, promising faster speeds, lower latency, and increased capacity for mobile networks.

  • 5G is the next generation of mobile network technology after 4G LTE.

  • It promises faster download and upload speeds, lower latency, and increased capacity for more connected devices.

  • 5G uses higher frequency bands to achieve these improvements, but with shorter range compared to 4G.

  • It enables technologies like Internet of Things ...read more

Add your answer

Q66. What is sellary

Ans.

Salary is the payment or compensation an employee receives from an employer in exchange for work performed.

  • Salary is typically paid on a regular basis, such as monthly or bi-weekly.

  • It can be a fixed amount or vary based on factors like performance or seniority.

  • Salaries can include additional benefits such as health insurance, retirement contributions, and bonuses.

Add your answer

Q67. What is LTE in telecom.

Ans.

LTE stands for Long-Term Evolution and is a standard for wireless broadband communication.

  • LTE is a 4G wireless communication standard used for high-speed data transmission.

  • It provides faster data speeds and lower latency compared to previous generations like 3G.

  • LTE is commonly used for mobile internet access, video streaming, and VoIP services.

  • Examples of LTE networks include Verizon, AT&T, and T-Mobile in the United States.

Add your answer

Q68. Golden rules of accouing

Ans.

Golden rules of accounting include consistency, relevance, reliability, comparability, and understandability.

  • Consistency: using the same accounting methods and principles consistently over time

  • Relevance: ensuring that financial information is relevant to the decision-making needs of users

  • Reliability: ensuring that financial information is accurate and can be relied upon

  • Comparability: ensuring that financial information can be compared across different periods and companies

  • Und...read more

Add your answer

Q69. OSI model explaination

Ans.

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • The OSI model stands for Open Systems Interconnection model.

  • It divides network communication into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has specific functions and interacts with adjacent layers for data transmission.

  • Example: The Physical layer deals with the physical connection b...read more

Add your answer

Q70. host to host communication

Ans.

Host to host communication refers to the process of data exchange between two devices on a network.

  • Host to host communication involves the transmission of data packets between two devices connected to a network.

  • It can be achieved through various protocols such as TCP/IP, UDP, HTTP, etc.

  • Each device on the network is identified by an IP address, which is used to route the data packets to the correct destination.

  • Examples of host to host communication include sending emails, brow...read more

Add your answer

Q71. Explain fiber optics

Ans.

Fiber optics is a technology that uses thin strands of glass or plastic to transmit data as light signals.

  • Fiber optics is used for high-speed internet, cable TV, and telephone communication.

  • The technology is based on the principle of total internal reflection, which allows light to travel through the fiber without escaping.

  • Fiber optic cables are immune to electromagnetic interference and can transmit data over long distances without loss of signal strength.

  • Fiber optics is als...read more

Add your answer

Q72. What is hoisting

Ans.

Hoisting is a JavaScript mechanism where variable and function declarations are moved to the top of their containing scope during compilation.

  • Variable and function declarations are hoisted to the top of their scope.

  • Only declarations are hoisted, not initializations.

  • Function declarations take precedence over variable declarations.

Add your answer

Q73. Design a counter

Ans.

Design a counter using flip-flops to count up or down based on the input signal.

  • Use D flip-flops to store the count value

  • Connect the output of one flip-flop to the input of the next flip-flop to create a ripple effect

  • Use additional logic gates to control the direction of counting (up or down)

  • Implement a reset signal to initialize the counter to a specific value

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Kellton

based on 82 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.4
 • 791 Interview Questions
4.0
 • 376 Interview Questions
3.9
 • 255 Interview Questions
3.9
 • 246 Interview Questions
4.1
 • 212 Interview Questions
3.9
 • 152 Interview Questions
View all
Top Tejas Networks Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter