Filter interviews by
I applied via Approached by Company and was interviewed before Dec 2023. There were 2 interview rounds.
Top trending discussions
I applied via Walk-in and was interviewed in May 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
Function pointers in C are pointers that point to functions instead of data.
Function pointers are used to pass functions as arguments to other functions.
They can be used to implement callbacks and event handlers.
Syntax: return_type (*ptr_name)(parameters);
Example: int (*funcPtr)(int, int);
DCM module in BSW is responsible for managing diagnostic communication between the vehicle and external diagnostic tools.
DCM stands for Diagnostic Communication Manager
It handles communication protocols such as UDS, KWP2000, and OBD
DCM manages diagnostic sessions, communication parameters, and diagnostic trouble codes
It provides APIs for diagnostic services like reading and clearing DTCs
Example: DCM module in BSW facil...
I applied via Naukri.com and was interviewed in Jul 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed before Jun 2020. There were 3 interview rounds.
I applied via Referral and was interviewed before Oct 2019. There was 1 interview round.
I applied via Campus Placement and was interviewed before Aug 2020. There were 4 interview rounds.
The latest embedded systems are focused on IoT, AI, and machine learning.
Embedded systems are becoming more connected to the internet of things (IoT)
AI and machine learning are being integrated into embedded systems for improved performance
Low-power consumption and high-performance processors are being developed for embedded systems
Examples include Amazon Echo, Nest Thermostat, and Fitbit
I was interviewed before May 2020.
I am a highly motivated individual with a passion for learning and a strong work ethic.
I have a Bachelor's degree in Computer Science from XYZ University.
I have completed several internships in software development, including one at ABC Company where I worked on a team to develop a mobile app.
I am proficient in several programming languages, including Java, Python, and C++.
I am a quick learner and enjoy taking on new c...
I have completed additional training in project management and have experience in multiple roles within the field.
Completed a project management certification course
Served as a project coordinator for a major client project
Managed a team of junior associates in a previous role
I enjoy the problem-solving aspect of my job the most. An interesting day at the office involves collaborating with colleagues to find creative solutions.
Collaborating with colleagues to brainstorm solutions
Using critical thinking skills to analyze complex problems
Implementing innovative solutions to improve processes
Celebrating successful outcomes with team members
I applied via Recruitment Consultant and was interviewed in Dec 2018. There were 3 interview rounds.
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted, secure internal network and another network, such as the Internet.
It examines each packet of data that passes through it and determines whether to allow or block the traffic based on the set of rules.
Firewalls can be hardware or softwa...
BGP attributes are used to determine the best path for routing traffic between networks.
BGP attributes include: AS Path, Next Hop, Local Preference, MED, Origin, and Community
AS Path is a list of autonomous systems that the route has passed through
Next Hop is the IP address of the next router on the path
Local Preference is used to indicate the preferred path for outbound traffic
MED (Multi-Exit Discriminator) is used to...
VPN stands for Virtual Private Network. It allows secure remote access to a private network over the internet.
VPN creates a secure and encrypted connection between the user's device and the private network.
It masks the user's IP address and location, providing anonymity and privacy.
VPN uses different protocols such as PPTP, L2TP, IPSec, and OpenVPN.
It can be used to access geographically restricted content, bypass cens...
Routing protocols are used to determine the best path for data to travel in a network.
Distance Vector protocols: RIP, IGRP, EIGRP
Link State protocols: OSPF, IS-IS
Hybrid protocols: BGP
Path Vector protocols: BGP
IGP vs EGP
VTP stands for VLAN Trunking Protocol, used to manage VLANs in a switched network.
VTP is a Cisco proprietary protocol.
It allows for easy VLAN management by propagating VLAN information across the network.
VTP operates in three modes: server, client, and transparent.
Server mode allows for VLAN creation, deletion, and modification.
Client mode receives and stores VLAN information.
Transparent mode forwards VTP messages but ...
Routers connect networks while firewalls protect networks from unauthorized access.
Routers direct traffic between networks while firewalls filter traffic based on predefined rules.
Routers operate at layer 3 of the OSI model while firewalls operate at layer 4 or higher.
Examples of routers include Cisco routers, while examples of firewalls include Fortinet firewalls.
Routers can be used to segment networks while firewalls...
based on 1 interview
Interview experience
based on 4 reviews
Rating in categories
Line Engineer
670
salaries
| ₹0 L/yr - ₹0 L/yr |
Production Engineer
96
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior line engineer
94
salaries
| ₹0 L/yr - ₹0 L/yr |
Lead Engineer
85
salaries
| ₹0 L/yr - ₹0 L/yr |
Line Engineer Trainee
81
salaries
| ₹0 L/yr - ₹0 L/yr |
Schaeffler India
SKF
Bharat Forge
L&T Technology Services