Member Technical Staff
100+ Member Technical Staff Interview Questions and Answers
Q51. WHAT Is a machine how can use machine and it's Components and technical Parts of machine?
A machine is a device that uses energy to perform a specific task by utilizing various components and technical parts.
Machines consist of components such as gears, motors, sensors, and actuators.
They operate based on principles of physics and engineering.
Examples include cars, computers, and industrial robots.
Q52. Write a program to find number of bits in a number.
Program to find number of bits in a number
Use bitwise operations to count the number of bits in a number
Iterate through each bit and count the set bits
Use log base 2 to find the number of bits in a number
How does C++ support Polymorphism?
What is thrashing in OS?
Q55. Link up all nodes present in same level of BST using next pointer
The question asks to link up all nodes present in the same level of a binary search tree using the next pointer.
Traverse the tree level by level using a queue
For each level, create a linked list by connecting the nodes using the next pointer
Use a dummy node to keep track of the start of the linked list for each level
Q56. What is Difference between API and Webservice
API is a set of protocols for building software while Webservice is a type of API that uses HTTP for communication.
API is a set of protocols for building software applications
Webservice is a type of API that uses HTTP for communication
API can be used for both internal and external communication
Webservice is typically used for external communication over the internet
API can be in any form like REST, SOAP, etc.
Webservice is always in the form of SOAP
Share interview questions and help millions of jobseekers 🌟
What are the various types of inheritance?
What is a thread in OS?
Member Technical Staff Jobs
Which data structure is used by Map?
Q60. What is singleton class ? How to break it.
A singleton class is a class that can only have one instance at a time.
To break a singleton class, one can create multiple instances of the class.
Another way to break it is by using reflection to access the private constructor and create a new instance.
In some cases, serialization and deserialization can also break the singleton pattern.
Q61. What is the difference between instance and a class in real time ?
An instance is a specific object created from a class, while a class is a blueprint or template for creating objects.
An instance is created from a class using the 'new' keyword.
Classes define the properties and behaviors of objects, while instances represent specific objects with their own unique data.
Multiple instances can be created from the same class.
Classes can be thought of as a cookie cutter, while instances are the cookies cut out from the dough.
Example: Class 'Car' d...read more
Q62. Given a map of coffee shops and a person on the map give the closest n coffee shops to him
Given a map of coffee shops and a person, find the closest n coffee shops to him.
Use the person's location and calculate the distance to each coffee shop on the map.
Sort the coffee shops by distance and return the closest n.
Consider using a data structure like a priority queue to efficiently find the closest coffee shops.
Q63. what is the difference between docker add and copy command?
Docker add command can fetch a file from a URL and add it to the image, while copy command copies files from the host machine to the image.
Docker add command can fetch files from URLs and add them to the image
Copy command copies files from the host machine to the image
Add command can also automatically extract compressed files during the build process
Copy command is more commonly used for copying local files
Q64. Give the length of longest absolute directory path string Discuss the DS used Optimize it
The question asks for the length of the longest absolute directory path string and how to optimize it.
Use a depth-first search (DFS) algorithm to traverse the directory structure
Maintain a stack to keep track of the current path length
Keep updating the maximum path length encountered
Consider the length of each directory/file name and the length of the path separators
Q65. Implement one function which can connect to the server socket in javascript
Use the WebSocket API in JavaScript to connect to a server socket
Use the WebSocket constructor to create a new WebSocket object
Pass the server URL as the first argument to the WebSocket constructor
Handle the WebSocket events like onopen, onmessage, onerror, and onclose
Design a Whatsapp Chat System
Q67. How would you design a binary tree, write a snippet to print all nodes.
Design and print all nodes of a binary tree.
Design a binary tree structure with left and right child pointers for each node.
Implement a recursive function to print all nodes of the binary tree.
Start from the root node and recursively print the left subtree, then the root, and finally the right subtree.
Q68. A horse is bind to corner of square of 5 cm with a rope of 15m.Calculate the grazing area.
The grazing area of the horse can be calculated by finding the area of the circle formed by the rope.
Calculate the radius of the circle formed by the rope (15m).
Use the formula for the area of a circle (A = πr^2) to find the grazing area.
Subtract the area of the square (5cm x 5cm) from the grazing area to get the final result.
Q69. Design a system to find the millionth person liking particular comment. Many constraints
Design a system to find the millionth person liking a particular comment.
Use a database to store the likes for each comment
Implement a counter to keep track of the number of likes for each comment
Use a caching mechanism to improve performance
Consider sharding or partitioning the data for scalability
Implement a search algorithm to find the millionth person
Q70. Consider scheduler as an function, tell its inputs and output and functioning
A scheduler is a function that manages the execution of tasks or processes.
Inputs: tasks or processes to be scheduled, priority or order of execution
Output: schedule or order in which tasks or processes will be executed
Functioning: determines the order of execution based on predefined criteria or algorithms
Q71. What do you mean by copy constructor
A copy constructor is a special type of constructor in C++ that creates a new object as a copy of an existing object.
Copy constructor is used to initialize a new object as a copy of an existing object.
It is invoked when an object is passed by value, returned by value, or explicitly called.
Example: class MyClass { public: MyClass(const MyClass& obj) { // copy constructor logic } };
Example: MyClass obj1; MyClass obj2 = obj1; // copy constructor is invoked to create obj2 as a co...read more
Q72. What do you mean by virtual Destructor.
A virtual destructor is a destructor declared as virtual in a base class to ensure proper destruction of derived class objects.
Virtual destructors are used in polymorphic base classes to ensure that the destructor of the derived class is called when deleting a base class pointer.
They allow proper cleanup of resources allocated in the derived class.
Example: class Base { virtual ~Base() {} }; class Derived : public Base { virtual ~Derived() {} };
Deleting a Base pointer pointing...read more
Q73. Do you know about the standard requirements of risk management for medical devices ?
Yes, the standard requirements of risk management for medical devices include ISO 14971 and FDA regulations.
ISO 14971 is an international standard for risk management of medical devices.
FDA regulations require medical device manufacturers to establish and maintain a risk management process.
Risk management for medical devices involves identifying hazards, estimating risks, and implementing controls to mitigate risks.
Examples of risk management activities include risk assessmen...read more
Q74. What is a asynchronous in js means
Asynchronous in JS means executing code without blocking the main thread.
Asynchronous code allows other code to run while waiting for a task to complete.
It is commonly used for network requests, file I/O, and other time-consuming operations.
Callbacks, Promises, and Async/Await are common ways to handle asynchronous code in JS.
Q75. Which is greater 1+√2 or √5 .draw graphically
1+√2 is greater than √5 graphically.
Plot the points on a number line or graph.
1+√2 is approximately 2.41, while √5 is approximately 2.24.
Therefore, 1+√2 is greater than √5.
Q76. How would you handle terraform state in file system?
Terraform state in file system can be managed using remote backends or local state files.
Use remote backends like S3, Azure Blob Storage, or Google Cloud Storage for better collaboration and security.
If using local state files, store them in a version-controlled directory to track changes and prevent conflicts.
Consider using Terraform Cloud for centralized state management and collaboration among team members.
Q77. How does CQI play a role in downlink mcs selection
CQI plays a crucial role in downlink MCS selection.
CQI stands for Channel Quality Indicator.
It is a measurement of the quality of the wireless channel between the base station and the user equipment.
Based on the CQI, the base station determines the appropriate modulation and coding scheme (MCS) for downlink transmission.
Higher CQI values indicate better channel conditions and allow for higher MCS with higher data rates.
Lower CQI values indicate poorer channel conditions and r...read more
What is a page fault?
Q79. How to create image out of running container ?
To create an image out of a running container, you can use the 'docker commit' command.
Use 'docker commit' command to create an image from a running container
Syntax: docker commit [OPTIONS] CONTAINER [REPOSITORY[:TAG]]
Example: docker commit container_id repository_name:tag
Explain zombie process?
Q81. Develop and implement security and cloud controls for Cloud Engineering
Develop and implement security and cloud controls for Cloud Engineering
Conduct a thorough risk assessment to identify potential security threats
Implement encryption protocols to protect data in transit and at rest
Utilize multi-factor authentication to enhance access control
Regularly monitor and audit cloud infrastructure for security vulnerabilities
Implement automated security controls to quickly respond to threats
Train employees on security best practices to prevent human er...read more
Q82. Finding whether the brackets are valid by looking at the string using an efficient data structure
Use stack data structure to efficiently check validity of brackets in a string.
Create an empty stack
Traverse the string character by character
If the character is an opening bracket, push it onto the stack
If the character is a closing bracket, check if it matches the top of the stack
If it matches, pop the top element from the stack
If it doesn't match or the stack is empty, return false
After traversing the entire string, if the stack is empty, return true
Otherwise, return false
Q83. Given 2 arrays one of n elements and another of n - 1 elements
Given 2 arrays, one with n elements and another with n-1 elements, answer the question.
Compare the elements of both arrays to find the missing element.
Use a loop or a built-in function to iterate through the arrays.
Consider edge cases where the missing element is at the beginning or end of the array.
What is segmentation?
Q85. Design Thread Safe implementation of HashMap
Design a thread-safe implementation of HashMap.
Use synchronized methods or locks to ensure mutual exclusion.
Consider using ConcurrentHashMap instead of HashMap.
Use volatile keyword for variables accessed by multiple threads.
Avoid using iterators as they may cause ConcurrentModificationException.
Use atomic operations for read-modify-write operations.
Consider using immutable keys to avoid synchronization issues.
Q86. How to convert string to numbers without predefined functions
Convert string to numbers without predefined functions
Iterate through each character of the string
Subtract the ASCII value of '0' from the character to get the numerical value
Multiply the numerical value by the appropriate power of 10 based on its position in the string
Add the resulting number to a running total
Q87. Maximum number of distinct elements in every sliding window of size k
Find maximum distinct elements in every sliding window of size k.
Create a hash table to store the frequency of each element in the current window.
Use two pointers to maintain the current window and slide it over the array.
Update the hash table for each new element in the window and remove the old element.
Keep track of the maximum number of distinct elements seen so far.
Repeat until all windows of size k have been processed.
Classful vs Classless Addressing
Difference between TCP and UDP
Q90. What is a mobile first design
Mobile first design is an approach where the design and development of a website or application starts with the mobile version.
Designing for smaller screens first
Prioritizing content and functionality for mobile users
Adapting the design for larger screens
Focusing on speed and performance
Examples: Instagram, Twitter, and Facebook
Q91. What is pesticide paradox in testing
Pesticide paradox refers to the phenomenon where pests develop resistance to pesticides over time.
Pesticides are used to kill pests, but over time pests develop resistance to them
This happens because the pests that are resistant to the pesticide survive and reproduce, passing on their resistance to their offspring
This can lead to the need for stronger and more toxic pesticides, which can have negative environmental and health effects
Integrated pest management strategies can h...read more
Q92. what is CICD pipeline and its stages ?
CICD pipeline is a process that automates the building, testing, and deployment of software.
Continuous Integration (CI) - code changes are integrated into a shared repository multiple times a day.
Continuous Testing - automated tests are run to ensure code quality.
Continuous Deployment - code changes are automatically deployed to production.
Stages include: build, test, deploy, and monitor.
Tools like Jenkins, GitLab, and CircleCI are commonly used in CICD pipelines.
Q93. what is freestyle project and pipeline ?
A freestyle project is a type of project in Jenkins that allows users to configure the build process in any way they want. A pipeline is a set of automated steps that define the process for building, testing, and deploying code.
Freestyle project in Jenkins allows users to configure build process manually
Pipeline in Jenkins is a set of automated steps for building, testing, and deploying code
Freestyle projects are more flexible but pipelines are more scalable and maintainable
E...read more
Q94. Difference between blocking and non blocking assignments?
Blocking assignments wait for the assigned statement to complete before moving on, while non-blocking assignments allow for concurrent execution.
Blocking assignments use '=' operator and execute sequentially.
Non-blocking assignments use '<=' operator and allow for concurrent execution.
Blocking assignments are used for combinational logic.
Non-blocking assignments are used for sequential logic.
Example: blocking assignment - A = B + C; non-blocking assignment - D <= E + F;
Q95. Write a program to add two linked list.
Program to add two linked lists
Create a function that takes two linked lists as input
Traverse both lists simultaneously and add corresponding nodes
Handle cases where one list is longer than the other
Q96. sort the array, string manipulation and searching
Sorting an array and manipulating/searching strings are important skills for a Member Technical Staff.
Sorting an array can be done using built-in functions like sort() or by implementing sorting algorithms like bubble sort, merge sort, quick sort, etc.
String manipulation involves operations like concatenation, substring extraction, character replacement, etc. and can be done using built-in functions or by implementing custom functions.
Searching in strings can be done using bu...read more
Q97. How do you mock API if backend is not ready.
Use tools like Postman, Swagger, or libraries like Mockito to mock API responses.
Use tools like Postman to manually mock API responses by creating mock endpoints.
Use Swagger to generate mock server code based on API specifications.
Use libraries like Mockito in Java to mock API responses in unit tests.
Create sample JSON responses and serve them using tools like JSON Server.
Q98. How find second largest element in o(log n).
Use binary search to find the second largest element in O(log n) time complexity.
Sort the array in descending order.
Return the second element in the sorted array.
Example: Input [5, 2, 8, 10, 3], Output: 8
Q99. How to get individual character from string
Use indexing to access individual characters from a string.
Use square brackets and the index number to access a specific character in the string.
Remember that indexing starts at 0 in most programming languages.
Example: str = 'hello', to get the first character 'h', use str[0].
Q100. Stale element exception and how to handle it
Stale element exception occurs when an element is no longer attached to the DOM. It can be handled by refreshing the page or waiting for the element to become available again.
Refresh the page before interacting with the element
Wait for the element to become available again using explicit or implicit waits
Handle the exception using try-catch block
Interview Questions of Similar Designations
Top Interview Questions for Member Technical Staff Related Skills
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month