Member Technical Staff

200+ Member Technical Staff Interview Questions and Answers

Updated 15 Jul 2025

Asked in Adobe

2w ago
Q. What are Vtable and VPTR in C++?
Ans.

Vtable and VPTR are used in C++ for implementing polymorphism through virtual functions.

  • Vtable (Virtual Table) is a table of function pointers used to implement dynamic dispatch in C++ for virtual functions.

  • VPTR (Virtual Pointer) is a pointer that points to the Vtable of an object, allowing dynamic binding of virtual functions at runtime.

  • Vtable is created for each class that has virtual functions, containing pointers to the virtual functions of that class.

  • VPTR is a hidden mem...read more

Asked in Oracle

2w ago

Q. What is the process for designing a thread-safe concurrent transaction application?

Ans.

Designing a thread-safe concurrent transaction application involves careful consideration of synchronization, locking mechanisms, and data consistency.

  • Identify critical sections of code that need to be synchronized to prevent race conditions

  • Use synchronization mechanisms such as locks, semaphores, or atomic operations to ensure mutual exclusion

  • Consider using transactional memory or software transactional memory for managing concurrent transactions

  • Implement data structures tha...read more

Asked in CCTech

1w ago

Q. A horse is tied to a corner of a square with sides of 5 cm using a 15m rope. Calculate the grazing area.

Ans.

The grazing area of the horse can be calculated by finding the area of the circle formed by the rope.

  • Calculate the radius of the circle formed by the rope (15m).

  • Use the formula for the area of a circle (A = πr^2) to find the grazing area.

  • Subtract the area of the square (5cm x 5cm) from the grazing area to get the final result.

Q. How would you design a binary tree? Write a snippet to print all nodes.

Ans.

Design and print all nodes of a binary tree.

  • Design a binary tree structure with left and right child pointers for each node.

  • Implement a recursive function to print all nodes of the binary tree.

  • Start from the root node and recursively print the left subtree, then the root, and finally the right subtree.

Are these interview questions helpful?

Asked in Oracle

1d ago
Q. Can you explain what a zombie process is?
Ans.

A zombie process is a process that has completed execution but still has an entry in the process table.

  • Zombie processes occur when a child process finishes execution before the parent process can collect its exit status.

  • The zombie process remains in the process table until the parent process calls wait() system call to read its exit status.

  • Zombie processes do not consume any system resources but can clutter the process table if not properly handled.

Asked in Nutanix

2w ago

Q. Design a system to find the millionth person liking a particular comment, considering various constraints.

Ans.

Design a system to find the millionth person liking a particular comment.

  • Use a database to store the likes for each comment

  • Implement a counter to keep track of the number of likes for each comment

  • Use a caching mechanism to improve performance

  • Consider sharding or partitioning the data for scalability

  • Implement a search algorithm to find the millionth person

Member Technical Staff Jobs

NEC Corporation  logo
Member Technical Staff 2-4 years
NEC Corporation
4.3
₹ 3 L/yr - ₹ 9 L/yr
(AmbitionBox estimate)
Noida
Siemens Limited logo
Member Technical Staff 1-4 years
Siemens Limited
4.0
Noida
Adobe Systems India Pvt. Ltd. logo
Member of Technical Staff - II 2-4 years
Adobe Systems India Pvt. Ltd.
3.9
₹ 14 L/yr - ₹ 20 L/yr
(AmbitionBox estimate)
Noida

Asked in Nutanix

1w ago

Q. Give the length of longest absolute directory path string Discuss the DS used Optimize it

Ans.

The question asks for the length of the longest absolute directory path string and how to optimize it.

  • Use a depth-first search (DFS) algorithm to traverse the directory structure

  • Maintain a stack to keep track of the current path length

  • Keep updating the maximum path length encountered

  • Consider the length of each directory/file name and the length of the path separators

Asked in Infosys

2d ago
Q. What is thrashing in an operating system?
Ans.

Thrashing in an operating system occurs when the system is spending more time swapping data between memory and disk than actually executing tasks.

  • Occurs when the system is overwhelmed with too many processes demanding memory

  • Results in excessive swapping of data between RAM and disk

  • Leads to a decrease in system performance as CPU spends more time on swapping than executing tasks

  • Can be alleviated by optimizing memory usage or adding more physical memory

  • Example: A system running...read more

Share interview questions and help millions of jobseekers 🌟

man-with-laptop

Asked in Akhila Labs

2w ago

Q. Implement a function in JavaScript that connects to a server socket.

Ans.

Use the WebSocket API in JavaScript to connect to a server socket

  • Use the WebSocket constructor to create a new WebSocket object

  • Pass the server URL as the first argument to the WebSocket constructor

  • Handle the WebSocket events like onopen, onmessage, onerror, and onclose

Asked in CCTech

3d ago

Q. Which is greater, 1+√2 or √5? Explain graphically.

Ans.

1+√2 is greater than √5 graphically.

  • Plot the points on a number line or graph.

  • 1+√2 is approximately 2.41, while √5 is approximately 2.24.

  • Therefore, 1+√2 is greater than √5.

Asked in Wind River

2w ago

Q. How would you handle Terraform state in a file system?

Ans.

Terraform state in file system can be managed using remote backends or local state files.

  • Use remote backends like S3, Azure Blob Storage, or Google Cloud Storage for better collaboration and security.

  • If using local state files, store them in a version-controlled directory to track changes and prevent conflicts.

  • Consider using Terraform Cloud for centralized state management and collaboration among team members.

Asked in TCS

2w ago
Q. What is the difference between TCP and UDP?
Ans.

TCP is a connection-oriented protocol that provides reliable data delivery, while UDP is a connectionless protocol that offers faster but less reliable data transmission.

  • TCP is reliable as it ensures all data packets are received in order and retransmits any lost packets.

  • UDP is faster as it does not establish a connection before sending data and does not guarantee delivery of packets.

  • TCP is used for applications that require high reliability and accuracy, such as web browsing...read more

1w ago

Q. Can you provide more details about your debugging experience as mentioned in your resume profile?

Ans.

I have extensive debugging experience, utilizing various tools and methodologies to identify and resolve complex software issues.

  • Utilized GDB for debugging C/C++ applications, allowing me to step through code and inspect variables in real-time.

  • Implemented logging frameworks like Log4j to capture detailed application logs, which helped trace issues in production environments.

  • Conducted code reviews to identify potential bugs before they reached production, improving overall cod...read more

Asked in Zoho

1w ago

Q. What is the internal flow of garbage collection in CMS and G1 garbage collectors?

Ans.

CMS and G1 are Java garbage collectors with distinct internal processes for memory management.

  • CMS (Concurrent Mark-Sweep) uses a concurrent approach to minimize pause times, focusing on marking live objects while the application is running.

  • G1 (Garbage-First) divides the heap into regions and prioritizes garbage collection based on the amount of reclaimable space, aiming for predictable pause times.

  • In CMS, the process includes initial marking, concurrent marking, and sweeping ...read more

Asked in Zoho

2w ago

Q. What is the memory model in the Java Virtual Machine (JVM)?

Ans.

The JVM memory model defines how memory is organized, accessed, and managed in Java applications.

  • Memory is divided into several regions: Heap, Stack, Method Area, and others.

  • Heap: Used for dynamic memory allocation for Java objects.

  • Stack: Stores method frames, local variables, and partial results.

  • Method Area: Holds class structures like metadata, constant pool, and static variables.

  • Garbage Collection: Automatic memory management to reclaim memory from unused objects.

Asked in Altiostar

1w ago

Q. Considering the scheduler as a function, what are its inputs, outputs, and functionality?

Ans.

A scheduler is a function that manages the execution of tasks or processes.

  • Inputs: tasks or processes to be scheduled, priority or order of execution

  • Output: schedule or order in which tasks or processes will be executed

  • Functioning: determines the order of execution based on predefined criteria or algorithms

1w ago

Q. What do you mean by virtual Destructor?

Ans.

A virtual destructor is a destructor declared as virtual in a base class to ensure proper destruction of derived class objects.

  • Virtual destructors are used in polymorphic base classes to ensure that the destructor of the derived class is called when deleting a base class pointer.

  • They allow proper cleanup of resources allocated in the derived class.

  • Example: class Base { virtual ~Base() {} }; class Derived : public Base { virtual ~Derived() {} };

  • Deleting a Base pointer pointing...read more

Asked in ICICI Bank

2w ago

Q. What is a copy constructor?

Ans.

A copy constructor is a special type of constructor in C++ that creates a new object as a copy of an existing object.

  • Copy constructor is used to initialize a new object as a copy of an existing object.

  • It is invoked when an object is passed by value, returned by value, or explicitly called.

  • Example: class MyClass { public: MyClass(const MyClass& obj) { // copy constructor logic } };

  • Example: MyClass obj1; MyClass obj2 = obj1; // copy constructor is invoked to create obj2 as a co...read more

Asked in HCLTech

2w ago

Q. Do you know about the standard requirements of risk management for medical devices?

Ans.

Yes, the standard requirements of risk management for medical devices include ISO 14971 and FDA regulations.

  • ISO 14971 is an international standard for risk management of medical devices.

  • FDA regulations require medical device manufacturers to establish and maintain a risk management process.

  • Risk management for medical devices involves identifying hazards, estimating risks, and implementing controls to mitigate risks.

  • Examples of risk management activities include risk assessmen...read more

Asked in Oracle

2w ago

Q. How do you decouple a monolithic service, and how do the decoupled services interact?

Ans.

Decoupling a monolith involves breaking it into smaller, independent services for better scalability and maintainability.

  • Identify bounded contexts: Analyze the monolith to find distinct areas of functionality that can be separated.

  • Use APIs for communication: Implement RESTful APIs or gRPC for services to interact without tight coupling.

  • Adopt event-driven architecture: Utilize message brokers (e.g., RabbitMQ, Kafka) to enable asynchronous communication between services.

  • Impleme...read more

Asked in Zoho

1w ago

Q. What does asynchronous mean in JavaScript?

Ans.

Asynchronous in JS means executing code without blocking the main thread.

  • Asynchronous code allows other code to run while waiting for a task to complete.

  • It is commonly used for network requests, file I/O, and other time-consuming operations.

  • Callbacks, Promises, and Async/Await are common ways to handle asynchronous code in JS.

Asked in DataMetica

3d ago

Q. How do you create an image from a running container?

Ans.

To create an image out of a running container, you can use the 'docker commit' command.

  • Use 'docker commit' command to create an image from a running container

  • Syntax: docker commit [OPTIONS] CONTAINER [REPOSITORY[:TAG]]

  • Example: docker commit container_id repository_name:tag

Asked in Oracle

1w ago

Q. What are the key components and considerations for low-level design in a healthcare system?

Ans.

Key components and considerations for low-level design in a healthcare system

  • Identifying the different modules and components of the system such as patient management, appointment scheduling, billing, etc.

  • Defining the interactions between these components and how data flows between them

  • Ensuring data security and privacy measures are in place to protect sensitive patient information

  • Optimizing performance and scalability to handle a large volume of data and users

  • Implementing fa...read more

Asked in Altiostar

5d ago

Q. How does CQI play a role in downlink MCS selection?

Ans.

CQI plays a crucial role in downlink MCS selection.

  • CQI stands for Channel Quality Indicator.

  • It is a measurement of the quality of the wireless channel between the base station and the user equipment.

  • Based on the CQI, the base station determines the appropriate modulation and coding scheme (MCS) for downlink transmission.

  • Higher CQI values indicate better channel conditions and allow for higher MCS with higher data rates.

  • Lower CQI values indicate poorer channel conditions and r...read more

Q. Explain Dynamic Programming (DP) with brute force and memoization approaches.

Ans.

Dynamic Programming (DP) uses brute force and memoization to optimize recursive solutions for complex problems.

  • Brute Force: Solve the problem by exploring all possible solutions, which can be inefficient.

  • Memoization: Store results of expensive function calls and reuse them when the same inputs occur again.

  • Example: Fibonacci sequence can be computed using brute force (exponential time) or memoization (linear time).

  • DP is often used in problems like knapsack, longest common subs...read more

2w ago

Q. How can you detect a loop in a linked list?

Ans.

Detecting a loop in a linked list can be efficiently done using Floyd's Cycle-Finding Algorithm.

  • Use two pointers: slow and fast. Initialize both at the head of the list.

  • Move slow pointer one step at a time and fast pointer two steps at a time.

  • If there is a loop, the fast pointer will eventually meet the slow pointer.

  • If the fast pointer reaches the end of the list (null), there is no loop.

  • Example: In a list 1 -> 2 -> 3 -> 4 -> 2 (loop back to 2), slow and fast will meet at 2.

Asked in Oracle

1w ago

Q. What is thrashing in operating systems (OS)?

Ans.

Thrashing occurs when an OS spends more time swapping pages in and out of memory than executing processes.

  • Thrashing happens when there is insufficient physical memory to hold all active processes.

  • It leads to a significant decrease in system performance due to excessive paging.

  • Example: A system running multiple memory-intensive applications may thrash if RAM is insufficient.

  • To mitigate thrashing, the OS may implement page replacement algorithms or increase physical memory.

Q. How would you develop and implement security and cloud controls for Cloud Engineering?

Ans.

Develop and implement security and cloud controls for Cloud Engineering

  • Conduct a thorough risk assessment to identify potential security threats

  • Implement encryption protocols to protect data in transit and at rest

  • Utilize multi-factor authentication to enhance access control

  • Regularly monitor and audit cloud infrastructure for security vulnerabilities

  • Implement automated security controls to quickly respond to threats

  • Train employees on security best practices to prevent human er...read more

Asked in Adobe

5d ago

Q. Given a string containing just the characters '(', ')', '{', '}', '[' and ']', determine if the input string is valid. An input string is valid if: Open brackets must be closed by the same type of brackets. Ope...

read more
Ans.

Use stack data structure to efficiently check validity of brackets in a string.

  • Create an empty stack

  • Traverse the string character by character

  • If the character is an opening bracket, push it onto the stack

  • If the character is a closing bracket, check if it matches the top of the stack

  • If it matches, pop the top element from the stack

  • If it doesn't match or the stack is empty, return false

  • After traversing the entire string, if the stack is empty, return true

  • Otherwise, return false

Asked in Oracle

2w ago

Q. Given two arrays, one with n elements and another with n-1 elements...

Ans.

Given 2 arrays, one with n elements and another with n-1 elements, answer the question.

  • Compare the elements of both arrays to find the missing element.

  • Use a loop or a built-in function to iterate through the arrays.

  • Consider edge cases where the missing element is at the beginning or end of the array.

Previous
1
2
3
4
5
6
7
Next

Interview Experiences of Popular Companies

HCLTech Logo
3.5
 • 4.1k Interviews
Oracle Logo
3.7
 • 896 Interviews
Zoho Logo
4.2
 • 540 Interviews
Adobe Logo
3.9
 • 248 Interviews
Salesforce Logo
4.0
 • 234 Interviews
View all
Interview Tips & Stories
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories
Member Technical Staff Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Trusted by over 1.5 Crore job seekers to find their right fit company
80 L+

Reviews

10L+

Interviews

4 Cr+

Salaries

1.5 Cr+

Users

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2025 Info Edge (India) Ltd.

Follow Us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter
Profile Image
Hello, Guest
AmbitionBox Employee Choice Awards 2025
Winners announced!
awards-icon
Contribute to help millions!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos
Add office benefits
Add office benefits