Member Technical Staff

100+ Member Technical Staff Interview Questions and Answers

Updated 3 Jan 2025

Q51. WHAT Is a machine how can use machine and it's Components and technical Parts of machine?

Ans.

A machine is a device that uses energy to perform a specific task by utilizing various components and technical parts.

  • Machines consist of components such as gears, motors, sensors, and actuators.

  • They operate based on principles of physics and engineering.

  • Examples include cars, computers, and industrial robots.

Q52. Write a program to find number of bits in a number.

Ans.

Program to find number of bits in a number

  • Use bitwise operations to count the number of bits in a number

  • Iterate through each bit and count the set bits

  • Use log base 2 to find the number of bits in a number

Q53. OOPS Question

How does C++ support Polymorphism?

Q54. Operating System Question

What is thrashing in OS?

Are these interview questions helpful?

Q55. Link up all nodes present in same level of BST using next pointer

Ans.

The question asks to link up all nodes present in the same level of a binary search tree using the next pointer.

  • Traverse the tree level by level using a queue

  • For each level, create a linked list by connecting the nodes using the next pointer

  • Use a dummy node to keep track of the start of the linked list for each level

Q56. What is Difference between API and Webservice

Ans.

API is a set of protocols for building software while Webservice is a type of API that uses HTTP for communication.

  • API is a set of protocols for building software applications

  • Webservice is a type of API that uses HTTP for communication

  • API can be used for both internal and external communication

  • Webservice is typically used for external communication over the internet

  • API can be in any form like REST, SOAP, etc.

  • Webservice is always in the form of SOAP

Share interview questions and help millions of jobseekers 🌟

man-with-laptop
Q57. OOPS Question

What are the various types of inheritance?

Q58. Operating System Question

What is a thread in OS?

Member Technical Staff Jobs

Member Technical Staff 3-5 years
Oracle India Pvt. Ltd.
3.7
Bangalore / Bengaluru
Member Technical Staff 0-6 years
Oracle India Pvt. Ltd.
3.7
Bangalore / Bengaluru
Member of Technical Staff 0-6 years
Oracle India Pvt. Ltd.
3.7
Kolkata
Q59. STL Question

Which data structure is used by Map?

Q60. What is singleton class ? How to break it.

Ans.

A singleton class is a class that can only have one instance at a time.

  • To break a singleton class, one can create multiple instances of the class.

  • Another way to break it is by using reflection to access the private constructor and create a new instance.

  • In some cases, serialization and deserialization can also break the singleton pattern.

Q61. What is the difference between instance and a class in real time ?

Ans.

An instance is a specific object created from a class, while a class is a blueprint or template for creating objects.

  • An instance is created from a class using the 'new' keyword.

  • Classes define the properties and behaviors of objects, while instances represent specific objects with their own unique data.

  • Multiple instances can be created from the same class.

  • Classes can be thought of as a cookie cutter, while instances are the cookies cut out from the dough.

  • Example: Class 'Car' d...read more

Q62. Given a map of coffee shops and a person on the map give the closest n coffee shops to him

Ans.

Given a map of coffee shops and a person, find the closest n coffee shops to him.

  • Use the person's location and calculate the distance to each coffee shop on the map.

  • Sort the coffee shops by distance and return the closest n.

  • Consider using a data structure like a priority queue to efficiently find the closest coffee shops.

Q63. what is the difference between docker add and copy command?

Ans.

Docker add command can fetch a file from a URL and add it to the image, while copy command copies files from the host machine to the image.

  • Docker add command can fetch files from URLs and add them to the image

  • Copy command copies files from the host machine to the image

  • Add command can also automatically extract compressed files during the build process

  • Copy command is more commonly used for copying local files

Q64. Give the length of longest absolute directory path string Discuss the DS used Optimize it

Ans.

The question asks for the length of the longest absolute directory path string and how to optimize it.

  • Use a depth-first search (DFS) algorithm to traverse the directory structure

  • Maintain a stack to keep track of the current path length

  • Keep updating the maximum path length encountered

  • Consider the length of each directory/file name and the length of the path separators

Q65. Implement one function which can connect to the server socket in javascript

Ans.

Use the WebSocket API in JavaScript to connect to a server socket

  • Use the WebSocket constructor to create a new WebSocket object

  • Pass the server URL as the first argument to the WebSocket constructor

  • Handle the WebSocket events like onopen, onmessage, onerror, and onclose

Q66. System Design Question

Design a Whatsapp Chat System

Q67. How would you design a binary tree, write a snippet to print all nodes.

Ans.

Design and print all nodes of a binary tree.

  • Design a binary tree structure with left and right child pointers for each node.

  • Implement a recursive function to print all nodes of the binary tree.

  • Start from the root node and recursively print the left subtree, then the root, and finally the right subtree.

Q68. A horse is bind to corner of square of 5 cm with a rope of 15m.Calculate the grazing area.

Ans.

The grazing area of the horse can be calculated by finding the area of the circle formed by the rope.

  • Calculate the radius of the circle formed by the rope (15m).

  • Use the formula for the area of a circle (A = πr^2) to find the grazing area.

  • Subtract the area of the square (5cm x 5cm) from the grazing area to get the final result.

Q69. Design a system to find the millionth person liking particular comment. Many constraints

Ans.

Design a system to find the millionth person liking a particular comment.

  • Use a database to store the likes for each comment

  • Implement a counter to keep track of the number of likes for each comment

  • Use a caching mechanism to improve performance

  • Consider sharding or partitioning the data for scalability

  • Implement a search algorithm to find the millionth person

Q70. Consider scheduler as an function, tell its inputs and output and functioning

Ans.

A scheduler is a function that manages the execution of tasks or processes.

  • Inputs: tasks or processes to be scheduled, priority or order of execution

  • Output: schedule or order in which tasks or processes will be executed

  • Functioning: determines the order of execution based on predefined criteria or algorithms

Q71. What do you mean by copy constructor

Ans.

A copy constructor is a special type of constructor in C++ that creates a new object as a copy of an existing object.

  • Copy constructor is used to initialize a new object as a copy of an existing object.

  • It is invoked when an object is passed by value, returned by value, or explicitly called.

  • Example: class MyClass { public: MyClass(const MyClass& obj) { // copy constructor logic } };

  • Example: MyClass obj1; MyClass obj2 = obj1; // copy constructor is invoked to create obj2 as a co...read more

Q72. What do you mean by virtual Destructor.

Ans.

A virtual destructor is a destructor declared as virtual in a base class to ensure proper destruction of derived class objects.

  • Virtual destructors are used in polymorphic base classes to ensure that the destructor of the derived class is called when deleting a base class pointer.

  • They allow proper cleanup of resources allocated in the derived class.

  • Example: class Base { virtual ~Base() {} }; class Derived : public Base { virtual ~Derived() {} };

  • Deleting a Base pointer pointing...read more

Q73. Do you know about the standard requirements of risk management for medical devices ?

Ans.

Yes, the standard requirements of risk management for medical devices include ISO 14971 and FDA regulations.

  • ISO 14971 is an international standard for risk management of medical devices.

  • FDA regulations require medical device manufacturers to establish and maintain a risk management process.

  • Risk management for medical devices involves identifying hazards, estimating risks, and implementing controls to mitigate risks.

  • Examples of risk management activities include risk assessmen...read more

Q74. What is a asynchronous in js means

Ans.

Asynchronous in JS means executing code without blocking the main thread.

  • Asynchronous code allows other code to run while waiting for a task to complete.

  • It is commonly used for network requests, file I/O, and other time-consuming operations.

  • Callbacks, Promises, and Async/Await are common ways to handle asynchronous code in JS.

Q75. Which is greater 1+√2 or √5 .draw graphically

Ans.

1+√2 is greater than √5 graphically.

  • Plot the points on a number line or graph.

  • 1+√2 is approximately 2.41, while √5 is approximately 2.24.

  • Therefore, 1+√2 is greater than √5.

Q76. How would you handle terraform state in file system?

Ans.

Terraform state in file system can be managed using remote backends or local state files.

  • Use remote backends like S3, Azure Blob Storage, or Google Cloud Storage for better collaboration and security.

  • If using local state files, store them in a version-controlled directory to track changes and prevent conflicts.

  • Consider using Terraform Cloud for centralized state management and collaboration among team members.

Q77. How does CQI play a role in downlink mcs selection

Ans.

CQI plays a crucial role in downlink MCS selection.

  • CQI stands for Channel Quality Indicator.

  • It is a measurement of the quality of the wireless channel between the base station and the user equipment.

  • Based on the CQI, the base station determines the appropriate modulation and coding scheme (MCS) for downlink transmission.

  • Higher CQI values indicate better channel conditions and allow for higher MCS with higher data rates.

  • Lower CQI values indicate poorer channel conditions and r...read more

Q78. OS Question

What is a page fault?

Q79. How to create image out of running container ?

Ans.

To create an image out of a running container, you can use the 'docker commit' command.

  • Use 'docker commit' command to create an image from a running container

  • Syntax: docker commit [OPTIONS] CONTAINER [REPOSITORY[:TAG]]

  • Example: docker commit container_id repository_name:tag

Q80. Operating System Question

Explain zombie process?

Q81. Develop and implement security and cloud controls for Cloud Engineering

Ans.

Develop and implement security and cloud controls for Cloud Engineering

  • Conduct a thorough risk assessment to identify potential security threats

  • Implement encryption protocols to protect data in transit and at rest

  • Utilize multi-factor authentication to enhance access control

  • Regularly monitor and audit cloud infrastructure for security vulnerabilities

  • Implement automated security controls to quickly respond to threats

  • Train employees on security best practices to prevent human er...read more

Q82. Finding whether the brackets are valid by looking at the string using an efficient data structure

Ans.

Use stack data structure to efficiently check validity of brackets in a string.

  • Create an empty stack

  • Traverse the string character by character

  • If the character is an opening bracket, push it onto the stack

  • If the character is a closing bracket, check if it matches the top of the stack

  • If it matches, pop the top element from the stack

  • If it doesn't match or the stack is empty, return false

  • After traversing the entire string, if the stack is empty, return true

  • Otherwise, return false

Q83. Given 2 arrays one of n elements and another of n - 1 elements

Ans.

Given 2 arrays, one with n elements and another with n-1 elements, answer the question.

  • Compare the elements of both arrays to find the missing element.

  • Use a loop or a built-in function to iterate through the arrays.

  • Consider edge cases where the missing element is at the beginning or end of the array.

Q84. OS Question

What is segmentation?

Q85. Design Thread Safe implementation of HashMap

Ans.

Design a thread-safe implementation of HashMap.

  • Use synchronized methods or locks to ensure mutual exclusion.

  • Consider using ConcurrentHashMap instead of HashMap.

  • Use volatile keyword for variables accessed by multiple threads.

  • Avoid using iterators as they may cause ConcurrentModificationException.

  • Use atomic operations for read-modify-write operations.

  • Consider using immutable keys to avoid synchronization issues.

Q86. How to convert string to numbers without predefined functions

Ans.

Convert string to numbers without predefined functions

  • Iterate through each character of the string

  • Subtract the ASCII value of '0' from the character to get the numerical value

  • Multiply the numerical value by the appropriate power of 10 based on its position in the string

  • Add the resulting number to a running total

Q87. Maximum number of distinct elements in every sliding window of size k

Ans.

Find maximum distinct elements in every sliding window of size k.

  • Create a hash table to store the frequency of each element in the current window.

  • Use two pointers to maintain the current window and slide it over the array.

  • Update the hash table for each new element in the window and remove the old element.

  • Keep track of the maximum number of distinct elements seen so far.

  • Repeat until all windows of size k have been processed.

Q88. Computer Network Question

Classful vs Classless Addressing

Q89. Computer Network Question

Difference between TCP and UDP

Q90. What is a mobile first design

Ans.

Mobile first design is an approach where the design and development of a website or application starts with the mobile version.

  • Designing for smaller screens first

  • Prioritizing content and functionality for mobile users

  • Adapting the design for larger screens

  • Focusing on speed and performance

  • Examples: Instagram, Twitter, and Facebook

Q91. What is pesticide paradox in testing

Ans.

Pesticide paradox refers to the phenomenon where pests develop resistance to pesticides over time.

  • Pesticides are used to kill pests, but over time pests develop resistance to them

  • This happens because the pests that are resistant to the pesticide survive and reproduce, passing on their resistance to their offspring

  • This can lead to the need for stronger and more toxic pesticides, which can have negative environmental and health effects

  • Integrated pest management strategies can h...read more

Q92. what is CICD pipeline and its stages ?

Ans.

CICD pipeline is a process that automates the building, testing, and deployment of software.

  • Continuous Integration (CI) - code changes are integrated into a shared repository multiple times a day.

  • Continuous Testing - automated tests are run to ensure code quality.

  • Continuous Deployment - code changes are automatically deployed to production.

  • Stages include: build, test, deploy, and monitor.

  • Tools like Jenkins, GitLab, and CircleCI are commonly used in CICD pipelines.

Q93. what is freestyle project and pipeline ?

Ans.

A freestyle project is a type of project in Jenkins that allows users to configure the build process in any way they want. A pipeline is a set of automated steps that define the process for building, testing, and deploying code.

  • Freestyle project in Jenkins allows users to configure build process manually

  • Pipeline in Jenkins is a set of automated steps for building, testing, and deploying code

  • Freestyle projects are more flexible but pipelines are more scalable and maintainable

  • E...read more

Q94. Difference between blocking and non blocking assignments?

Ans.

Blocking assignments wait for the assigned statement to complete before moving on, while non-blocking assignments allow for concurrent execution.

  • Blocking assignments use '=' operator and execute sequentially.

  • Non-blocking assignments use '<=' operator and allow for concurrent execution.

  • Blocking assignments are used for combinational logic.

  • Non-blocking assignments are used for sequential logic.

  • Example: blocking assignment - A = B + C; non-blocking assignment - D <= E + F;

Q95. Write a program to add two linked list.

Ans.

Program to add two linked lists

  • Create a function that takes two linked lists as input

  • Traverse both lists simultaneously and add corresponding nodes

  • Handle cases where one list is longer than the other

Q96. sort the array, string manipulation and searching

Ans.

Sorting an array and manipulating/searching strings are important skills for a Member Technical Staff.

  • Sorting an array can be done using built-in functions like sort() or by implementing sorting algorithms like bubble sort, merge sort, quick sort, etc.

  • String manipulation involves operations like concatenation, substring extraction, character replacement, etc. and can be done using built-in functions or by implementing custom functions.

  • Searching in strings can be done using bu...read more

Q97. How do you mock API if backend is not ready.

Ans.

Use tools like Postman, Swagger, or libraries like Mockito to mock API responses.

  • Use tools like Postman to manually mock API responses by creating mock endpoints.

  • Use Swagger to generate mock server code based on API specifications.

  • Use libraries like Mockito in Java to mock API responses in unit tests.

  • Create sample JSON responses and serve them using tools like JSON Server.

Q98. How find second largest element in o(log n).

Ans.

Use binary search to find the second largest element in O(log n) time complexity.

  • Sort the array in descending order.

  • Return the second element in the sorted array.

  • Example: Input [5, 2, 8, 10, 3], Output: 8

Q99. How to get individual character from string

Ans.

Use indexing to access individual characters from a string.

  • Use square brackets and the index number to access a specific character in the string.

  • Remember that indexing starts at 0 in most programming languages.

  • Example: str = 'hello', to get the first character 'h', use str[0].

Q100. Stale element exception and how to handle it

Ans.

Stale element exception occurs when an element is no longer attached to the DOM. It can be handled by refreshing the page or waiting for the element to become available again.

  • Refresh the page before interacting with the element

  • Wait for the element to become available again using explicit or implicit waits

  • Handle the exception using try-catch block

Previous
1
2
3
4
Next
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.5
 • 3.7k Interviews
3.7
 • 874 Interviews
4.3
 • 495 Interviews
4.0
 • 246 Interviews
4.4
 • 152 Interviews
3.8
 • 71 Interviews
View all

Calculate your in-hand salary

Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary

Member Technical Staff Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
65 L+

Reviews

4 L+

Interviews

4 Cr+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter