Associate Engineer

90+ Associate Engineer Interview Questions and Answers for Freshers

Updated 31 Jan 2025
search-icon

Q1. Count Ways To Reach The N-th Stair Problem Statement

You are given a number of stairs, N. Starting at the 0th stair, you need to reach the Nth stair. Each time you can either climb one step or two steps. You ha...read more

Frequently asked in, ,

Q2. Trailing Zeros in Factorial Problem

Find the number of trailing zeroes in the factorial of a given number N.

Input:

The first line contains an integer T representing the number of test cases.
Each of the followi...read more

Q3. How do you manage priorities or request? Create a to-do list for prioritising your work.

Ans.

Prioritizing work is crucial for efficient time management. A to-do list can help in managing priorities and requests.

  • Create a to-do list with all the tasks that need to be completed

  • Assign a priority level to each task based on its urgency and importance

  • Re-evaluate the list regularly and make necessary adjustments

  • Communicate with team members and stakeholders to ensure alignment of priorities

  • Use tools like calendars and reminders to stay on track

  • Delegate tasks when appropriat...read more

Q4. Which gas is most harmful of all emissions

Ans.

The most harmful gas emission is carbon dioxide (CO2).

  • CO2 is a greenhouse gas that contributes to global warming and climate change.

  • It is released by burning fossil fuels like coal, oil, and gas.

  • Other harmful emissions include sulfur dioxide (SO2), nitrogen oxides (NOx), and particulate matter (PM).

Are these interview questions helpful?

Q5. What are various heat treatments to lower stresses,

Ans.

Heat treatments like annealing, tempering, and stress relieving can lower stresses in materials.

  • Annealing involves heating the material to a high temperature and then slowly cooling it to reduce internal stresses.

  • Tempering involves heating the material to a specific temperature and then cooling it quickly to reduce stresses.

  • Stress relieving involves heating the material to a specific temperature and then cooling it slowly to reduce stresses.

  • Other heat treatments like quenchin...read more

Q6. Which is difficult program that you wrote in python Which is difficult program wrote in c Dictionary use with code implications

Ans.

Difficult program in Python: A web scraper to extract data from dynamic websites. Difficult program in C: A program to implement a custom data structure.

  • Python program required knowledge of web scraping libraries like BeautifulSoup and Selenium

  • C program required understanding of memory management and pointers

  • Python program had to handle dynamic website elements and login authentication

  • C program had to implement a custom data structure like a linked list or binary tree

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Q7. 1) What is networking ? 2) what is DHCP and it's range) 3) tell me the use of apipa with it's range? 4) what is Defragmentation? 5) what is virtual memory? 6) types of os installation 7) how will you backup you...

read more
Ans.

Networking is the practice of connecting computers and other devices to share resources and information.

  • DHCP is a network protocol that assigns IP addresses automatically to devices on a network.

  • APIPA (Automatic Private IP Addressing) is used when a DHCP server is not available, with a range of 169.254.0.1 to 169.254.255.254.

  • Defragmentation is the process of reorganizing data on a hard drive to improve efficiency and speed.

  • Virtual memory is a memory management technique that ...read more

Q8. 1)What is outlook? 2)What is .pst and .ost ? 3)Tell me the process of outlook configuration 4)How will you troubleshoot outlook if it shows offline, How will you turn it online ? 5) What is POP IMAP and SMTP?

Ans.

Outlook is an email client developed by Microsoft for managing emails, calendars, contacts, and tasks.

  • Outlook is a popular email client used for sending and receiving emails.

  • .pst is a personal storage file used to store emails, contacts, and other data locally.

  • .ost is an offline storage file used by Outlook to store a copy of mailbox data from an Exchange server.

  • Outlook configuration involves setting up email accounts, server settings, and personal preferences.

  • To troubleshoot...read more

Associate Engineer Jobs

Engineering Associate 3-4 years
Marriott
4.2
Sriperumbudur
Associate Engineer 1-4 years
Ericsson India Global Services Pvt. Ltd.
4.1
Bangalore / Bengaluru
Engineering Associate - Electrical 1-3 years
Marriott
4.2
Kolkata

Q9. Program to count spaces in string Program to print only digits in string

Ans.

Program to count spaces and print digits in string

  • For counting spaces, loop through the string and check for ' ' character

  • For printing digits, loop through the string and check for '0' to '9' characters

  • Use isdigit() function in Python to check for digits

  • Use a counter variable to keep track of spaces

  • Use a separate string variable to store digits and print it at the end

Q10. 1)What is IP? 2)Types of IP? 3)How many classes are in ipv4 ? 4)Tell me all class ranges of ipv4 ? 5) How many bits are in ipv4? 6) tell me difference between IPv4 and IPv6? 7) how will you give manual IP ?

Ans.

IP stands for Internet Protocol. It is a set of rules governing the format of data sent over the internet.

  • Types of IP include IPv4 and IPv6.

  • There are 5 classes in IPv4: A, B, C, D, and E.

  • IPv4 has 32 bits, while IPv6 has 128 bits.

  • IPv4 ranges: Class A (1-126), Class B (128-191), Class C (192-223), Class D (224-239), Class E (240-255).

  • Difference between IPv4 and IPv6: IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses.

  • To give manual IP, go to network settings, select ...read more

Q11. Adaptability problem?

Ans.

Adaptability problem refers to difficulty in adjusting to new situations or changes.

  • Adaptability problem can arise due to lack of experience or exposure to new situations.

  • It can also be caused by fear of the unknown or fear of failure.

  • Adaptability problem can be overcome by developing a growth mindset and being open to learning and trying new things.

  • Examples of adaptability problem include difficulty in adjusting to a new job, new environment, or new technology.

Q12. 1) What is network printer and shared printer ? 2) how will you configure network printer or shared printer? 3) what will you do if printer is not giving a print? 4) tell me types of printer ?

Ans.

A network printer is a printer that is connected to a network and can be accessed by multiple users. A shared printer is a printer that is connected to a single computer and can be accessed by other devices on the same network.

  • Network printer is connected to a network and can be accessed by multiple users.

  • Shared printer is connected to a single computer and can be accessed by other devices on the same network.

  • To configure a network printer, you need to connect it to the netwo...read more

Q13. how call transfers to a different operator

Ans.

Call transfers to a different operator involve redirecting the call from one operator to another.

  • Call transfer can be initiated by the caller or the current operator.

  • The caller can request a transfer by providing the desired operator's extension or department.

  • The current operator can transfer the call by using a transfer button or dialing the desired operator's extension.

  • During the transfer, the caller may be put on hold or hear a transfer announcement.

  • Once the call is transf...read more

Q14. What is the list and list are mutable or immutable?

Ans.

Lists are a data structure in Python that can hold multiple items. They are mutable, meaning their elements can be changed.

  • Lists are enclosed in square brackets []

  • Elements in a list can be of different data types

  • Lists can be modified by adding, removing, or changing elements

  • Example: my_list = ['apple', 'banana', 'cherry']

Q15. 1)What is acceptance criteria of stripping and crimping. and how to do. 2)What is the acceptance criteria of splice and how to do. 3)what is the acceptance criteria of booting and how to do. 4) what is the acce...

read more
Ans.

Acceptance criteria and methods for stripping, crimping, splicing, booting, and soldering.

  • Acceptance criteria for stripping and crimping involve proper removal of insulation and secure attachment of connectors.

  • Acceptance criteria for splicing include proper alignment, insulation, and mechanical strength.

  • Acceptance criteria for booting involve proper fit, protection, and strain relief.

  • Acceptance criteria for soldering include proper joint formation, cleanliness, and electrical...read more

Q16. 1)What is server ? 2)How will you add a pc in domain? 3)On which you was doing work like workgroup or domain ?

Ans.

A server is a computer or software that provides functionality for other programs or devices, known as clients.

  • A server is a computer or software that serves requests from clients.

  • Servers can provide various services such as file storage, email, web hosting, etc.

  • Adding a PC to a domain involves joining the PC to a network controlled by a domain controller.

  • Work can be done in a workgroup environment where each computer is independent or in a domain where a central server contr...read more

Q17. Maximal Ratio Combining in MIMO, Quantization Noise power

Ans.

Maximal Ratio Combining (MRC) is a technique used in MIMO systems to improve signal quality by combining multiple received signals.

  • MRC combines the received signals from multiple antennas to maximize the signal-to-noise ratio (SNR)

  • Quantization noise power refers to the noise introduced during the process of converting analog signals to digital signals

  • In MIMO systems, MRC can be used to mitigate the effects of quantization noise

  • MRC calculates the weights for each received sign...read more

Q18. 1)What is BSOD ? 2)How will you troubleshoot bsod ? 3)What causes BSOD problem occurs ? 4) tell me example of BSOD and how will you troubleshoot it ?

Ans.

BSOD stands for Blue Screen of Death. It is a Windows operating system error screen that appears when a system encounters a critical error.

  • BSOD is a stop error screen that appears when the Windows operating system encounters a critical error and cannot recover.

  • To troubleshoot BSOD, one can start by checking for recently installed hardware or software, updating drivers, running system diagnostics, and checking for overheating.

  • Common causes of BSOD include hardware failures, dr...read more

Q19. Quick and merge time complexity and when worst case happens in quick sort

Ans.

Quick sort has O(n log n) time complexity on average, O(n^2) worst case. Merge sort has O(n log n) time complexity always.

  • Quick sort has an average time complexity of O(n log n) due to its divide-and-conquer approach.

  • Worst case for quick sort occurs when the pivot element is either the smallest or largest element in the array, leading to O(n^2) time complexity.

  • Merge sort always has a time complexity of O(n log n) due to its consistent splitting and merging of subarrays.

Q20. Where is maximum stress?

Ans.

Maximum stress occurs at the point where the force is applied or concentrated.

  • Maximum stress occurs at the point of highest force concentration.

  • It can also occur at points of sudden change in geometry or material properties.

  • Examples include corners, edges, and holes in a structure.

  • Stress concentration factors can be calculated to determine the maximum stress.

  • Proper design and material selection can help minimize stress concentrations.

Q21. Which command is use to grab the text or work in linux?

Ans.

The command used to grab text or work in Linux is 'grep'.

  • Grep stands for 'global regular expression print'.

  • It is used to search for a specific pattern or text in a file or output.

  • It can be used with various options to refine the search.

  • Example: 'grep hello file.txt' will search for the word 'hello' in the file 'file.txt'.

Q22. Implement 2 stage xor gate by using 2 stage nand gate

Ans.

Implement 2 stage XOR gate using 2 stage NAND gate.

  • Construct 2 stage NAND gate using 4 NAND gates.

  • Connect the output of first stage NAND gate to the input of second stage NAND gate.

  • Connect the output of second stage NAND gate to the input of first stage NAND gate.

  • The output of second stage NAND gate is the output of the XOR gate.

Q23. two containers 2ltr and 5ltr filled with water, how to fill exact 4ltrs in one?

Ans.

Fill the 5ltr container, pour it into the 2ltr container until it's full, leaving 3ltrs in the 5ltr container. Empty the 2ltr container, pour the remaining 3ltrs from the 5ltr container into the 2ltr container. Fill the 5ltr container again, pour water into the 2ltr container until it's full, which will leave exactly 4ltrs in the 5ltr container.

  • Fill the 5ltr container

  • Pour it into the 2ltr container until it's full, leaving 3ltrs in the 5ltr container

  • Empty the 2ltr container

  • Po...read more

Q24. 3: Programing languages you're favour with , C or C++ or Java or Python.

Ans.

I am proficient in C++, Java, and Python.

  • Strong understanding of object-oriented programming concepts

  • Experience with data structures and algorithms

  • Proficient in using IDEs such as Eclipse and Visual Studio

Q25. Remove a linked list node without head or tail pointer given

Ans.

Removing a node from a linked list without head or tail pointer

  • Use the node to be removed's next node to copy its data and then delete the next node

  • Update the current node's next pointer to skip the next node

Q26. Strength of materials

Ans.

Strength of materials is the study of how materials withstand external forces and stresses.

  • It involves analyzing the behavior of materials under different loads and conditions.

  • Factors such as elasticity, plasticity, and fracture mechanics are considered.

  • Examples include calculating the maximum weight a bridge can support or designing a building to withstand earthquakes.

  • Testing methods such as tensile testing and compression testing are used to determine material properties.

  • Kn...read more

Q27. What init used in python Sudo program on ascending order of list items as given

Ans.

The init used in Python is __init__ which is a constructor method for initializing objects.

  • The __init__ method is called automatically when an object is created.

  • It takes self as the first parameter and can take additional parameters for initialization.

  • Example: class Car: def __init__(self, make, model): self.make = make self.model = model

  • In the above example, the __init__ method initializes the make and model attributes of the Car object.

Q28. Explain garbage collection in java? Diff between JVM, JRE, JDK? comparable vs comparator how spring boot app starts? mapping in hibernate? sql joins

Ans.

Garbage collection in Java is a process of automatically reclaiming memory by destroying unused objects.

  • Garbage collection in Java is performed by the JVM to reclaim memory occupied by objects that are no longer in use.

  • JVM stands for Java Virtual Machine, JRE stands for Java Runtime Environment, and JDK stands for Java Development Kit.

  • Comparable interface is used to define the natural ordering of objects, while Comparator interface is used to define custom ordering logic.

  • Spri...read more

Q29. What is docker command to list the containers?

Ans.

The docker command to list the containers is 'docker ps'.

  • The 'docker ps' command lists all the running containers.

  • To list all the containers (including the stopped ones), use 'docker ps -a'.

  • To display the container IDs in a short format, use 'docker ps -q'.

  • To display the container names instead of IDs, use 'docker ps --format '{{.Names}}'.'

Q30. 1. What is owasp top 10 web? 2. Types of injection attack?. 3. Java based questions?. 4. Projects and internship?.

Ans.

OWASP Top 10 is a list of the top 10 most critical web application security risks.

  • Injection attacks include SQL injection, LDAP injection, and XPath injection.

  • Java based questions may include topics like object-oriented programming, exception handling, and multithreading.

  • Projects and internships can showcase practical application of skills and knowledge gained in a real-world setting.

Q31. Your favorite programming language and why

Ans.

My favorite programming language is Python because of its simplicity, readability, and versatility.

  • Python is known for its clean and readable syntax, making it easy to learn and understand.

  • Python has a large standard library and many third-party libraries, allowing for rapid development of a wide range of applications.

  • Python is versatile and can be used for web development, data analysis, machine learning, automation, and more.

Q32. Gaussian mixture, pdf of sum of 2 RV

Ans.

The question is about calculating the probability density function (pdf) of the sum of two random variables (RV) following a Gaussian mixture distribution.

  • A Gaussian mixture distribution is a combination of multiple Gaussian distributions.

  • To calculate the pdf of the sum of two RVs, convolve the pdfs of the individual RVs.

  • Convolution involves integrating the product of the pdfs over the entire range of possible values.

  • The resulting pdf will also follow a Gaussian mixture distr...read more

Q33. Can you handle 2hrs of pointless questions?

Ans.

Yes, I am able to handle 2hrs of pointless questions with patience and professionalism.

  • I have a strong ability to stay focused and maintain composure in challenging situations.

  • I understand the importance of active listening and responding thoughtfully to all questions.

  • I can use humor and positivity to navigate through tedious or repetitive questioning.

  • I am skilled at redirecting conversations back to relevant topics if needed.

Q34. Why string is immutable

Ans.

String is immutable because it cannot be changed once created.

  • Immutable objects are safer to use in multi-threaded environments

  • String pool in Java is possible because of immutability

  • StringBuffer and StringBuilder are mutable alternatives to String

Frequently asked in,

Q35. what are oops concept what is encapsulation what is dbms

Ans.

OOPs concepts are principles in object-oriented programming, encapsulation is the bundling of data and methods within a class, and DBMS stands for Database Management System.

  • OOPs concepts include inheritance, polymorphism, encapsulation, and abstraction

  • Encapsulation is the concept of bundling data and methods that operate on the data within a single unit, such as a class

  • DBMS is a software system that manages databases, allowing users to interact with the data stored in them

  • Ex...read more

Q36. Difference between step down and step up transformer

Ans.

Step up transformer increases voltage while step down transformer decreases voltage.

  • Step up transformer has more turns in secondary coil than primary coil while step down transformer has less turns in secondary coil than primary coil.

  • Step up transformer is used in power transmission while step down transformer is used in power distribution.

  • Examples of step up transformer include neon sign transformers and microwave oven transformers while examples of step down transformer inc...read more

Q37. what is VPN and how it works explain?

Ans.

VPN stands for Virtual Private Network, which allows users to securely access a private network over a public network.

  • VPN creates a secure and encrypted connection between the user's device and the private network, ensuring privacy and security.

  • It masks the user's IP address and location, making it difficult for third parties to track their online activities.

  • VPN can be used to access geo-restricted content, bypass censorship, and enhance online security when using public Wi-F...read more

Q38. Have you know about AI related softwares.

Ans.

Yes, I am familiar with AI related softwares such as TensorFlow, PyTorch, and OpenCV.

  • Familiar with TensorFlow for deep learning applications

  • Experience with PyTorch for neural network development

  • Knowledge of OpenCV for computer vision tasks

Q39. What is Transformers and how it works?

Ans.

Transformers are devices that transfer electrical energy between two or more circuits through electromagnetic induction.

  • Transformers consist of two coils of wire, known as the primary and secondary coils, wrapped around a core made of iron or other magnetic materials.

  • When an alternating current flows through the primary coil, it creates a changing magnetic field which induces a voltage in the secondary coil.

  • The ratio of the number of turns in the primary coil to the number of...read more

Q40. Different between if loop and while loop Types of pointers

Ans.

If loop is used for conditional execution while while loop is used for repetitive execution.

  • If loop executes the code block only if the condition is true, while loop executes the code block repeatedly until the condition becomes false.

  • If loop is used when the number of iterations is known, while loop is used when the number of iterations is unknown.

  • Example of if loop: if(x > 0) { //code block }

  • Example of while loop: while(x > 0) { //code block }

Q41. Draw stress diagram

Ans.

A stress diagram shows the distribution of stress in a structure or component.

  • Stress diagrams are typically drawn using a graphical method, such as the Mohr's circle.

  • They can be used to determine the maximum stress and the location of stress concentrations.

  • Stress diagrams can also be used to analyze the effects of loads on a structure or component.

  • They are commonly used in engineering and mechanics to design and test structures.

  • Stress diagrams can be drawn for various types o...read more

Q42. What are pointers and related topics

Ans.

Pointers are variables that store memory addresses. They are used to manipulate data and create dynamic data structures.

  • Pointers are used to pass memory addresses as arguments to functions

  • They can be used to dynamically allocate memory

  • Pointers can be used to create linked lists and trees

  • They can also be used to access hardware directly

  • Null pointers are used to indicate that a pointer does not point to a valid memory address

Q43. How to configuration outlook

Ans.

Configuring Outlook involves setting up email accounts, server settings, and personal preferences.

  • Open Outlook and click on 'File' in the top left corner.

  • Select 'Add Account' to add a new email account.

  • Enter your email address and password, then follow the prompts to complete the setup.

  • To configure server settings, go to 'File' > 'Account Settings' > 'Account Settings' again.

  • Select your email account and click on 'Change'. Here you can modify incoming and outgoing server sett...read more

Q44. Probability of fracture in rod

Ans.

Probability of fracture in rod depends on various factors such as material, stress, and manufacturing process.

  • The material of the rod plays a crucial role in determining its fracture probability.

  • Higher stress levels increase the probability of fracture.

  • The manufacturing process can also affect the probability of fracture.

  • Factors such as temperature, corrosion, and fatigue can also impact the probability of fracture.

  • Probability of fracture can be calculated using fracture mech...read more

Q45. what is an environment variable example?

Ans.

Environment variables are dynamic values that can affect the behavior of running processes.

  • Environment variables are set in the operating system or shell environment

  • They are accessed by programs to retrieve information about the environment

  • Examples include PATH, HOME, and USER

Q46. What is the function?

Ans.

A function is a block of code that performs a specific task and can be called multiple times throughout a program.

  • Functions can take in parameters and return values

  • Functions can be defined by the programmer or built-in to the programming language

  • Functions can be used to modularize code and make it more organized

  • Examples of built-in functions include print() in Python and Math.random() in JavaScript

Q47. Antennas, Types, and working

Ans.

Antennas are devices used to transmit and receive electromagnetic waves. They come in various types and have different working principles.

  • Antennas are used in various applications such as radio and television broadcasting, wireless communication, radar systems, and satellite communication.

  • Types of antennas include dipole antennas, loop antennas, patch antennas, parabolic antennas, and Yagi-Uda antennas.

  • Antennas work by converting electrical signals into electromagnetic waves ...read more

Q48. Difference between DC generator and Alternator

Ans.

DC generator produces direct current while alternator produces alternating current.

  • DC generator uses a commutator to convert mechanical energy into direct current, while alternator uses slip rings and brushes to convert mechanical energy into alternating current.

  • DC generator has a stationary magnetic field and rotating armature, while alternator has a rotating magnetic field and stationary armature.

  • DC generator is commonly used in automotive applications, while alternator is ...read more

Q49. Difference between remote and local client copy

Ans.

Remote client copy is done from one system to another system, while local client copy is done within the same system.

  • Remote client copy involves transferring data from one SAP system to another SAP system.

  • Local client copy involves copying data within the same SAP system.

  • Remote client copy is typically used for copying data between different landscapes or systems.

  • Local client copy is used for creating a copy of client data within the same system for testing or development pur...read more

Q50. How to find a prime number?

Ans.

A prime number is a number greater than 1 that is divisible only by 1 and itself.

  • Start by checking if the number is divisible by any number less than itself.

  • If it is divisible by any number other than 1 and itself, it is not prime.

  • Use a loop to iterate through numbers from 2 to the square root of the number being checked.

  • If the number is divisible by any of these numbers, it is not prime.

  • If the number is not divisible by any of these numbers, it is prime.

1
2
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.7
 • 10.4k Interviews
3.8
 • 8.2k Interviews
3.8
 • 5.6k Interviews
4.1
 • 832 Interviews
3.7
 • 808 Interviews
4.0
 • 777 Interviews
3.8
 • 274 Interviews
4.3
 • 178 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Associate Engineer Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter