Member Technical Staff
200+ Member Technical Staff Interview Questions and Answers
Q101. How to get individual character from string
Use indexing to access individual characters from a string.
Use square brackets and the index number to access a specific character in the string.
Remember that indexing starts at 0 in most programming languages.
Example: str = 'hello', to get the first character 'h', use str[0].
Segmentation is the process of dividing a larger entity into smaller parts or segments.
Segmentation is commonly used in image processing to separate objects of interest from the background.
It is also used in marketing to divide a target market into smaller groups based on demographics, behavior, or other factors.
In networking, segmentation refers to dividing a network into smaller subnetworks to improve performance and security.
Q103. What is static variable
Static variable is a variable that retains its value between function calls.
Static variables are declared using the 'static' keyword.
They are initialized only once and retain their value throughout the program execution.
They have a local scope within the function where they are declared.
Example: static int count = 0; // retains its value between function calls
Q104. Explain what is SPS and its scheduling mechamism
SPS stands for Scheduling Policy Subsystem. It is responsible for managing the scheduling of processes in an operating system.
SPS is a component of the operating system that handles process scheduling.
It determines the order in which processes are executed on the CPU.
SPS uses various scheduling algorithms to make decisions.
Some common scheduling algorithms include First-Come, First-Served (FCFS), Round Robin, and Priority Scheduling.
The scheduling mechanism of SPS involves ma...read more
A page fault occurs when a program tries to access a page of memory that is not currently in physical RAM.
Occurs when a program tries to access a page of memory not in physical RAM
Results in the operating system needing to retrieve the page from disk
Can lead to a temporary pause in program execution
Q106. What is producer consumer problem?
Producer consumer problem is a synchronization problem in which a producer produces data and a consumer consumes it.
It involves two processes, producer and consumer, sharing a common buffer.
The producer produces data and puts it into the buffer.
The consumer consumes data from the buffer.
The problem arises when the producer produces data faster than the consumer can consume it, leading to buffer overflow.
Solutions include using semaphores, mutexes, and monitors to synchronize ...read more
Share interview questions and help millions of jobseekers 🌟
Q107. Find largest increasing subsequence count from an array of numbers
The largest increasing subsequence count from an array of numbers is to find the length of the longest increasing subsequence.
Iterate through the array and keep track of the length of the longest increasing subsequence encountered so far.
Use dynamic programming to solve the problem efficiently.
Example: For the array [10, 22, 9, 33, 21, 50, 41, 60, 80], the longest increasing subsequence count is 6.
Q108. Difference between Compile time and runtime polimorphysm.
Compile time polymorphism is achieved through function overloading and operator overloading, while runtime polymorphism is achieved through function overriding using virtual functions.
Compile time polymorphism is resolved during compile time based on the number and types of arguments passed to a function.
Runtime polymorphism is resolved during runtime based on the actual object type being referred to.
Compile time polymorphism is faster as the binding of function call is done ...read more
Member Technical Staff Jobs
Q109. Difference between session and workflow in informatica
Session is a unit of work that extracts, transforms and loads data. Workflow is a collection of sessions that run in a specific order.
Session is a single task that performs ETL operations on data
Workflow is a collection of sessions that are executed in a specific order
Sessions can be reused in multiple workflows
Workflows can have multiple sessions
Sessions can have multiple tasks
Workflows can have multiple sessions with dependencies between them
Q110. Define Process &thread
Process is an instance of a program while thread is a subset of a process that can run concurrently with other threads.
A process is a program in execution
A process can have multiple threads
Threads share the same memory space as the process
Threads can run concurrently with other threads within the same process
Examples of processes include web browsers, word processors, and media players
Examples of threads include GUI thread, network thread, and background thread
Q111. Rotate an array with the given number of times.
Rotate an array with given number of times.
Use a temporary array to store elements to be rotated
Loop through the original array and copy elements to the temporary array
Copy the rotated elements from the temporary array back to the original array
Q112. How do structs and pointers store data
Structs store data in a contiguous block of memory, while pointers store memory addresses.
Structs store data in a sequential manner in memory
Pointers store memory addresses of variables
Example: struct Person { char name[20]; int age; }; Person p; int *ptr = &p.age;
Q113. When and why Smartflexi Pro launched ?
Smartflexi Pro was launched in 2018 to provide a flexible and customizable solution for businesses.
Smartflexi Pro was launched in 2018 by a team of software developers.
The launch was in response to the growing demand for a more flexible and customizable software solution for businesses.
Smartflexi Pro offers a range of features such as customizable workflows, advanced reporting, and integration capabilities.
The launch of Smartflexi Pro has helped businesses streamline their op...read more
Q114. Xpath and css for web elements
Xpath and CSS are used to locate web elements on a webpage.
Xpath is a language used to navigate through the XML structure of a webpage.
CSS selectors are used to target specific HTML elements on a webpage.
Xpath can be used to locate elements based on their attributes, text content, or position on the page.
CSS selectors can be used to locate elements based on their tag name, class, ID, or attributes.
Both Xpath and CSS can be used in automated testing frameworks like Selenium to...read more
Q115. class diagram and system design for any fintech app
A fintech app class diagram and system design involves modeling classes, relationships, and interactions for financial services.
Identify key classes such as User, Account, Transaction, and Payment
Define relationships between classes (e.g. User has many Accounts, Account has many Transactions)
Consider security measures for sensitive financial data
Include features like authentication, authorization, and encryption
Design a scalable and efficient system architecture to handle hig...read more
Q116. call flows of detailed telecom linux environment flows
Understanding call flows in a detailed telecom Linux environment.
Study the signaling protocols used in telecom networks such as SIP, H.323, or SS7.
Understand the role of various network elements like gateways, proxies, and servers in call setup and teardown.
Learn about the Linux tools and commands used for monitoring and troubleshooting telecom services.
Practice analyzing packet captures to understand the flow of data during a call.
Familiarize yourself with common issues and ...read more
Q117. Explain Ue attach Procedure?
The Ue attach procedure is a process in cellular networks where a user equipment (UE) establishes a connection with the network.
The UE sends an attach request to the network.
The network validates the request and assigns a temporary identifier to the UE.
The network updates its location information for the UE.
The network sends an attach accept message to the UE.
The UE acknowledges the attach accept message.
The network updates the UE's status as attached.
The UE can now access ne...read more
Q118. Implement stack using queue
Implementing stack using queue involves using two queues to simulate stack behavior.
Create two queues, q1 and q2.
Push operation: Enqueue the element to q1.
Pop operation: Dequeue all elements from q1 to q2 except the last element. Dequeue and return the last element.
Swap the names of q1 and q2 after each pop operation.
Top operation: Return the last element of q1 without dequeuing it.
isEmpty operation: Check if both q1 and q2 are empty.
Q119. New opportunities to grow in Cloud
Cloud offers endless opportunities for growth through continuous innovation and scalability.
Continuous learning and upskilling in cloud technologies such as AWS, Azure, and Google Cloud
Exploring new services and features offered by cloud providers to enhance productivity and efficiency
Utilizing cloud-native tools for automation, monitoring, and optimization
Developing expertise in areas like serverless computing, containers, and microservices architecture
Collaborating with cro...read more
Q120. building an application similar to Swiggy using Tomcat
Building a Swiggy-like application using Tomcat
Utilize Tomcat as the web server to handle HTTP requests
Implement a database to store user information, restaurant details, and orders
Develop a user-friendly interface for customers to browse restaurants and place orders
Integrate payment gateway for secure transactions
Implement features like order tracking, reviews, and ratings for restaurants
Ensure scalability and performance by optimizing code and server configurations
Q121. Java Reflection and how it works
Java Reflection is a feature that allows a program to examine or modify its own structure at runtime.
Java Reflection provides a way to inspect and manipulate classes, methods, fields, and constructors at runtime.
It allows you to access private fields and methods, bypassing encapsulation.
You can dynamically create instances of classes, invoke methods, and access fields using Reflection.
Example: Class clazz = Class.forName("com.example.MyClass");
Example: Method method = clazz.g...read more
Q122. Architecture diagram of projects you did
I have designed architecture diagrams for various projects including a cloud-based e-commerce platform and a mobile app for a healthcare provider.
Designed architecture diagrams for a cloud-based e-commerce platform using AWS services such as EC2, S3, and RDS
Created architecture diagrams for a mobile app for a healthcare provider using Firebase for backend services
Collaborated with development teams to ensure architecture diagrams aligned with project requirements
Design a WhatsApp chat system for real-time messaging.
Use WebSocket for real-time communication
Implement end-to-end encryption for security
Allow users to send text, images, videos, and documents
Include features like group chats, read receipts, and message forwarding
Q124. Explain CICD process in a cloud environment.
CICD process in a cloud environment involves automating the build, test, and deployment of applications in the cloud.
Automate the process of building, testing, and deploying code changes
Integrate code changes into a shared repository
Automatically trigger builds and tests upon code changes
Deploy applications to cloud environments using automation tools like Jenkins, GitLab CI/CD, or AWS CodePipeline
Q125. Explain statefulset in terms of kubenetes
StatefulSet in Kubernetes manages stateful applications by providing stable, unique network identifiers and persistent storage.
StatefulSet ensures that each pod in the set has a unique identity and stable network hostname
StatefulSet pods are created and managed in a predictable order, with each pod having a persistent identifier
StatefulSet is useful for stateful applications like databases where data persistence and unique identities are important
Q126. what happens when you search google
When you search Google, it retrieves relevant information from its index and displays results based on the search query.
Google retrieves information from its index of web pages
Results are displayed based on relevance to the search query
Search results may include websites, images, videos, news articles, and more
Q127. What is hash map and how it works
A hash map is a data structure that stores key-value pairs and allows for efficient retrieval of values based on keys.
Hash map uses a hash function to map keys to indices in an array.
It allows for constant time average case complexity for insertion, deletion, and lookup operations.
Collisions can occur when multiple keys hash to the same index, which can be resolved using techniques like chaining or open addressing.
Example: Java's HashMap class implements a hash map using an a...read more
Q128. What is dynamic programming?
Dynamic programming is a technique to solve complex problems by breaking them down into smaller subproblems.
It involves solving subproblems only once and storing their solutions for future use.
It is used in optimization problems, such as finding the shortest path or maximizing profit.
Examples include the knapsack problem and the Fibonacci sequence.
It can be implemented using either a top-down or bottom-up approach.
Dynamic programming requires both optimal substructure and ove...read more
Q129. Design a system for Configuration Management
Configuration Management system design involves version control, change tracking, and deployment automation.
Implement version control to track changes in configuration files
Use a centralized repository for storing configuration files
Automate deployment processes to ensure consistency and efficiency
Implement access control to manage permissions for making changes
Utilize tools like Git, Ansible, Puppet, or Chef for configuration management
Q130. structure vs union protocols pointers arrays
Structure and union are used to group related data. Pointers are used to store memory addresses. Arrays are used to store multiple values of the same data type.
Structures and unions can be accessed using pointers.
Arrays can be accessed using pointers as well.
Pointers can be used to dynamically allocate memory for structures, unions, and arrays.
Q131. Minimum Swaps to make it palindrome
Minimum number of swaps required to make a given array of strings a palindrome.
Create a hash table to store the frequency of each character in the array.
Iterate through the array and count the number of characters with odd frequency.
If the count is greater than 1, the array cannot be rearranged into a palindrome.
Otherwise, use two pointers to swap characters and count the number of swaps required to make the array a palindrome.
Q132. Verilog coding of various flip flops and fsm
Verilog coding of flip flops and FSM involves designing sequential circuits using Verilog HDL.
Understand the functionality of different flip flops like D flip flop, JK flip flop, etc.
Implement flip flops using Verilog syntax, specifying input and output ports.
Design Finite State Machines (FSM) using Verilog, defining states, transitions, and outputs.
Use Verilog constructs like always blocks, case statements, and state registers for FSM implementation.
Q133. How do we estimate a task.
Estimating a task involves breaking it down into smaller components, considering past experiences, and accounting for potential risks.
Break down the task into smaller sub-tasks
Consider past experiences and similar tasks for reference
Account for potential risks and uncertainties
Use estimation techniques like bottom-up, top-down, or analogous estimation
Involve team members in the estimation process for more accurate results
Q134. Design a URL Shortener
A URL shortener is a tool that takes a long URL and creates a shorter, easier-to-share link.
Generate a unique short code for each URL
Store the short code and original URL in a database
Redirect users from the short URL to the original URL
Track clicks and analytics for each short URL
Q135. What is webservice?
A webservice is a software system designed to support interoperable machine-to-machine interaction over a network.
Webservices use standardized protocols such as HTTP, XML, SOAP, and REST.
They allow different applications to communicate with each other regardless of the programming language or platform used.
Webservices can be used for a variety of purposes such as data exchange, business process integration, and application integration.
Examples of webservices include Google Ma...read more
Q136. Share your screen for coding and problem-solving.
I am able to share my screen for coding and problem-solving during interviews.
Prepare a coding environment with a code editor and compiler ready to go
Share your screen with the interviewer using a screen sharing tool like Zoom or Google Meet
Explain your thought process and coding approach as you work through the problem
Ask for clarification if needed and communicate effectively with the interviewer
Q137. find duplicate numbers, prime num er program
Program to find duplicate numbers and prime numbers in an array of strings.
Iterate through the array to find duplicate numbers using a hashmap or set.
Check each number in the array for primality using a function that checks divisibility.
Store the duplicate numbers and prime numbers in separate arrays for further processing.
Q138. What is garbage collection?
Garbage collection is an automatic memory management process.
It frees up memory that is no longer being used by the program.
It helps prevent memory leaks and crashes caused by running out of memory.
Examples include Java's garbage collector and Python's reference counting.
Garbage collection can have an impact on performance and should be tuned accordingly.
Q139. What is structure padding
Structure padding is the insertion of empty bytes between structure members to ensure proper alignment.
Padding is added to align data types on memory boundaries for efficiency.
It helps in optimizing memory access and improving performance.
For example, a structure with int, char, and double members may have padding to align them properly.
Q140. Create a database for given condition
Design a database schema for a given condition
Identify the entities and their relationships
Define the attributes for each entity
Create tables for each entity with appropriate primary and foreign keys
Q141. synchronization using semaphore and mutexes
Semaphores and mutexes are synchronization mechanisms used in multi-threaded programming to control access to shared resources.
Semaphores are used to control access to a shared resource by counting the number of available resources.
Mutexes are used to provide mutual exclusion to shared resources by allowing only one thread to access the resource at a time.
Semaphores can be used to implement producer-consumer problem, while mutexes are typically used for critical sections.
Exam...read more
Q142. What is java and OOPS CONCEPT
Java is a popular programming language known for its platform independence. OOPs concepts include encapsulation, inheritance, polymorphism, and abstraction.
Java is a high-level, object-oriented programming language.
OOPs concepts in Java include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation refers to bundling data and methods that operate on the data into a single unit.
Inheritance allows a class to inherit properties and behavior from another class.
Po...read more
Q143. What is work of capacitor?
Capacitor stores and releases electrical energy.
Capacitors store electrical energy in an electric field
They are used in electronic circuits to filter, smooth, or bypass signals
Capacitors can be polarized or non-polarized
Examples include decoupling capacitors, timing capacitors, and power factor correction capacitors
Q144. What is work of coil?
A coil is a device used to create a magnetic field when an electric current flows through it.
Coils are commonly used in electromagnets, transformers, inductors, and electric motors.
The magnetic field generated by a coil can be used for various applications such as data storage in hard drives or wireless charging in smartphones.
Coils are made by winding wire around a core material such as iron or air to concentrate the magnetic field.
The number of turns in the coil, the curren...read more
Q145. What is work of diode?
A diode is a semiconductor device that allows current to flow in one direction only.
Diodes are commonly used in rectifier circuits to convert AC to DC.
They are also used in signal processing, voltage regulation, and protection circuits.
Examples of diodes include silicon diodes, Schottky diodes, and light-emitting diodes (LEDs).
Q146. What is work of resister?
A resistor is an electronic component that resists the flow of electrical current.
Resistors are used to control the amount of current flowing in a circuit.
They are measured in ohms (Ω) and have color-coded bands to indicate their resistance value.
Resistors can be fixed or variable, with variable resistors allowing for adjustment of resistance.
Examples of resistor applications include voltage dividers, current limiting, and signal conditioning.
Q147. What is work of transformer?
A transformer is a device that transfers electrical energy between two or more circuits through electromagnetic induction.
Transforms voltage levels from high to low or vice versa
Isolation of circuits for safety
Efficient energy transfer with minimal losses
Commonly used in power distribution systems
Examples: step-up transformer, step-down transformer
Q148. Define class in a real time scenario
A class in a real time scenario is like a blueprint for creating objects with similar properties and behaviors.
Classes are used to define the structure and behavior of objects in object-oriented programming.
They encapsulate data and methods that operate on that data.
For example, in a banking system, a 'Customer' class can have properties like name, account number, and methods like deposit, withdraw.
Classes help in organizing code, promoting reusability, and maintaining code c...read more
Q149. Get all options from a drop down
Use JavaScript to get all options from a drop down menu
Use document.getElementById() to select the drop down element
Access the options property of the element to get all options
Loop through the options to extract the text values
Q150. Coding in machine with complex problemns
Coding in machine with complex problems requires strong problem-solving skills and knowledge of algorithms.
Understand the problem thoroughly before starting to code
Break down the problem into smaller subproblems
Use appropriate data structures and algorithms to solve the problem efficiently
Test your code thoroughly to ensure it works correctly
Optimize your code for performance if necessary
Interview Questions of Similar Designations
Top Interview Questions for Member Technical Staff Related Skills
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month