Member Technical Staff
200+ Member Technical Staff Interview Questions and Answers

Asked in Adobe

Vtable and VPTR are used in C++ for implementing polymorphism through virtual functions.
Vtable (Virtual Table) is a table of function pointers used to implement dynamic dispatch in C++ for virtual functions.
VPTR (Virtual Pointer) is a pointer that points to the Vtable of an object, allowing dynamic binding of virtual functions at runtime.
Vtable is created for each class that has virtual functions, containing pointers to the virtual functions of that class.
VPTR is a hidden mem...read more

Asked in Oracle

Q. What is the process for designing a thread-safe concurrent transaction application?
Designing a thread-safe concurrent transaction application involves careful consideration of synchronization, locking mechanisms, and data consistency.
Identify critical sections of code that need to be synchronized to prevent race conditions
Use synchronization mechanisms such as locks, semaphores, or atomic operations to ensure mutual exclusion
Consider using transactional memory or software transactional memory for managing concurrent transactions
Implement data structures tha...read more

Asked in CCTech

Q. A horse is tied to a corner of a square with sides of 5 cm using a 15m rope. Calculate the grazing area.
The grazing area of the horse can be calculated by finding the area of the circle formed by the rope.
Calculate the radius of the circle formed by the rope (15m).
Use the formula for the area of a circle (A = πr^2) to find the grazing area.
Subtract the area of the square (5cm x 5cm) from the grazing area to get the final result.

Asked in Athenahealth Technology

Q. How would you design a binary tree? Write a snippet to print all nodes.
Design and print all nodes of a binary tree.
Design a binary tree structure with left and right child pointers for each node.
Implement a recursive function to print all nodes of the binary tree.
Start from the root node and recursively print the left subtree, then the root, and finally the right subtree.

Asked in Oracle

A zombie process is a process that has completed execution but still has an entry in the process table.
Zombie processes occur when a child process finishes execution before the parent process can collect its exit status.
The zombie process remains in the process table until the parent process calls wait() system call to read its exit status.
Zombie processes do not consume any system resources but can clutter the process table if not properly handled.

Asked in Nutanix

Q. Design a system to find the millionth person liking a particular comment, considering various constraints.
Design a system to find the millionth person liking a particular comment.
Use a database to store the likes for each comment
Implement a counter to keep track of the number of likes for each comment
Use a caching mechanism to improve performance
Consider sharding or partitioning the data for scalability
Implement a search algorithm to find the millionth person
Member Technical Staff Jobs




Asked in Nutanix

Q. Give the length of longest absolute directory path string Discuss the DS used Optimize it
The question asks for the length of the longest absolute directory path string and how to optimize it.
Use a depth-first search (DFS) algorithm to traverse the directory structure
Maintain a stack to keep track of the current path length
Keep updating the maximum path length encountered
Consider the length of each directory/file name and the length of the path separators

Asked in Infosys

Thrashing in an operating system occurs when the system is spending more time swapping data between memory and disk than actually executing tasks.
Occurs when the system is overwhelmed with too many processes demanding memory
Results in excessive swapping of data between RAM and disk
Leads to a decrease in system performance as CPU spends more time on swapping than executing tasks
Can be alleviated by optimizing memory usage or adding more physical memory
Example: A system running...read more
Share interview questions and help millions of jobseekers 🌟
Asked in Akhila Labs

Q. Implement a function in JavaScript that connects to a server socket.
Use the WebSocket API in JavaScript to connect to a server socket
Use the WebSocket constructor to create a new WebSocket object
Pass the server URL as the first argument to the WebSocket constructor
Handle the WebSocket events like onopen, onmessage, onerror, and onclose

Asked in CCTech

Q. Which is greater, 1+√2 or √5? Explain graphically.
1+√2 is greater than √5 graphically.
Plot the points on a number line or graph.
1+√2 is approximately 2.41, while √5 is approximately 2.24.
Therefore, 1+√2 is greater than √5.

Asked in Wind River

Q. How would you handle Terraform state in a file system?
Terraform state in file system can be managed using remote backends or local state files.
Use remote backends like S3, Azure Blob Storage, or Google Cloud Storage for better collaboration and security.
If using local state files, store them in a version-controlled directory to track changes and prevent conflicts.
Consider using Terraform Cloud for centralized state management and collaboration among team members.

Asked in TCS

TCP is a connection-oriented protocol that provides reliable data delivery, while UDP is a connectionless protocol that offers faster but less reliable data transmission.
TCP is reliable as it ensures all data packets are received in order and retransmits any lost packets.
UDP is faster as it does not establish a connection before sending data and does not guarantee delivery of packets.
TCP is used for applications that require high reliability and accuracy, such as web browsing...read more

Asked in Mirafra Technologies

Q. Can you provide more details about your debugging experience as mentioned in your resume profile?
I have extensive debugging experience, utilizing various tools and methodologies to identify and resolve complex software issues.
Utilized GDB for debugging C/C++ applications, allowing me to step through code and inspect variables in real-time.
Implemented logging frameworks like Log4j to capture detailed application logs, which helped trace issues in production environments.
Conducted code reviews to identify potential bugs before they reached production, improving overall cod...read more

Asked in Zoho

Q. What is the internal flow of garbage collection in CMS and G1 garbage collectors?
CMS and G1 are Java garbage collectors with distinct internal processes for memory management.
CMS (Concurrent Mark-Sweep) uses a concurrent approach to minimize pause times, focusing on marking live objects while the application is running.
G1 (Garbage-First) divides the heap into regions and prioritizes garbage collection based on the amount of reclaimable space, aiming for predictable pause times.
In CMS, the process includes initial marking, concurrent marking, and sweeping ...read more

Asked in Zoho

Q. What is the memory model in the Java Virtual Machine (JVM)?
The JVM memory model defines how memory is organized, accessed, and managed in Java applications.
Memory is divided into several regions: Heap, Stack, Method Area, and others.
Heap: Used for dynamic memory allocation for Java objects.
Stack: Stores method frames, local variables, and partial results.
Method Area: Holds class structures like metadata, constant pool, and static variables.
Garbage Collection: Automatic memory management to reclaim memory from unused objects.
Asked in Altiostar

Q. Considering the scheduler as a function, what are its inputs, outputs, and functionality?
A scheduler is a function that manages the execution of tasks or processes.
Inputs: tasks or processes to be scheduled, priority or order of execution
Output: schedule or order in which tasks or processes will be executed
Functioning: determines the order of execution based on predefined criteria or algorithms
Asked in Aankhen Technology

Q. What do you mean by virtual Destructor?
A virtual destructor is a destructor declared as virtual in a base class to ensure proper destruction of derived class objects.
Virtual destructors are used in polymorphic base classes to ensure that the destructor of the derived class is called when deleting a base class pointer.
They allow proper cleanup of resources allocated in the derived class.
Example: class Base { virtual ~Base() {} }; class Derived : public Base { virtual ~Derived() {} };
Deleting a Base pointer pointing...read more

Asked in ICICI Bank

Q. What is a copy constructor?
A copy constructor is a special type of constructor in C++ that creates a new object as a copy of an existing object.
Copy constructor is used to initialize a new object as a copy of an existing object.
It is invoked when an object is passed by value, returned by value, or explicitly called.
Example: class MyClass { public: MyClass(const MyClass& obj) { // copy constructor logic } };
Example: MyClass obj1; MyClass obj2 = obj1; // copy constructor is invoked to create obj2 as a co...read more

Asked in HCLTech

Q. Do you know about the standard requirements of risk management for medical devices?
Yes, the standard requirements of risk management for medical devices include ISO 14971 and FDA regulations.
ISO 14971 is an international standard for risk management of medical devices.
FDA regulations require medical device manufacturers to establish and maintain a risk management process.
Risk management for medical devices involves identifying hazards, estimating risks, and implementing controls to mitigate risks.
Examples of risk management activities include risk assessmen...read more

Asked in Oracle

Q. How do you decouple a monolithic service, and how do the decoupled services interact?
Decoupling a monolith involves breaking it into smaller, independent services for better scalability and maintainability.
Identify bounded contexts: Analyze the monolith to find distinct areas of functionality that can be separated.
Use APIs for communication: Implement RESTful APIs or gRPC for services to interact without tight coupling.
Adopt event-driven architecture: Utilize message brokers (e.g., RabbitMQ, Kafka) to enable asynchronous communication between services.
Impleme...read more

Asked in Zoho

Q. What does asynchronous mean in JavaScript?
Asynchronous in JS means executing code without blocking the main thread.
Asynchronous code allows other code to run while waiting for a task to complete.
It is commonly used for network requests, file I/O, and other time-consuming operations.
Callbacks, Promises, and Async/Await are common ways to handle asynchronous code in JS.

Asked in DataMetica

Q. How do you create an image from a running container?
To create an image out of a running container, you can use the 'docker commit' command.
Use 'docker commit' command to create an image from a running container
Syntax: docker commit [OPTIONS] CONTAINER [REPOSITORY[:TAG]]
Example: docker commit container_id repository_name:tag

Asked in Oracle

Q. What are the key components and considerations for low-level design in a healthcare system?
Key components and considerations for low-level design in a healthcare system
Identifying the different modules and components of the system such as patient management, appointment scheduling, billing, etc.
Defining the interactions between these components and how data flows between them
Ensuring data security and privacy measures are in place to protect sensitive patient information
Optimizing performance and scalability to handle a large volume of data and users
Implementing fa...read more
Asked in Altiostar

Q. How does CQI play a role in downlink MCS selection?
CQI plays a crucial role in downlink MCS selection.
CQI stands for Channel Quality Indicator.
It is a measurement of the quality of the wireless channel between the base station and the user equipment.
Based on the CQI, the base station determines the appropriate modulation and coding scheme (MCS) for downlink transmission.
Higher CQI values indicate better channel conditions and allow for higher MCS with higher data rates.
Lower CQI values indicate poorer channel conditions and r...read more

Asked in Athenahealth Technology

Q. Explain Dynamic Programming (DP) with brute force and memoization approaches.
Dynamic Programming (DP) uses brute force and memoization to optimize recursive solutions for complex problems.
Brute Force: Solve the problem by exploring all possible solutions, which can be inefficient.
Memoization: Store results of expensive function calls and reuse them when the same inputs occur again.
Example: Fibonacci sequence can be computed using brute force (exponential time) or memoization (linear time).
DP is often used in problems like knapsack, longest common subs...read more

Asked in American Express

Q. How can you detect a loop in a linked list?
Detecting a loop in a linked list can be efficiently done using Floyd's Cycle-Finding Algorithm.
Use two pointers: slow and fast. Initialize both at the head of the list.
Move slow pointer one step at a time and fast pointer two steps at a time.
If there is a loop, the fast pointer will eventually meet the slow pointer.
If the fast pointer reaches the end of the list (null), there is no loop.
Example: In a list 1 -> 2 -> 3 -> 4 -> 2 (loop back to 2), slow and fast will meet at 2.

Asked in Oracle

Q. What is thrashing in operating systems (OS)?
Thrashing occurs when an OS spends more time swapping pages in and out of memory than executing processes.
Thrashing happens when there is insufficient physical memory to hold all active processes.
It leads to a significant decrease in system performance due to excessive paging.
Example: A system running multiple memory-intensive applications may thrash if RAM is insufficient.
To mitigate thrashing, the OS may implement page replacement algorithms or increase physical memory.

Asked in Metric Stream Infotech

Q. How would you develop and implement security and cloud controls for Cloud Engineering?
Develop and implement security and cloud controls for Cloud Engineering
Conduct a thorough risk assessment to identify potential security threats
Implement encryption protocols to protect data in transit and at rest
Utilize multi-factor authentication to enhance access control
Regularly monitor and audit cloud infrastructure for security vulnerabilities
Implement automated security controls to quickly respond to threats
Train employees on security best practices to prevent human er...read more

Asked in Adobe

Q. Given a string containing just the characters '(', ')', '{', '}', '[' and ']', determine if the input string is valid. An input string is valid if: Open brackets must be closed by the same type of brackets. Ope...
read moreUse stack data structure to efficiently check validity of brackets in a string.
Create an empty stack
Traverse the string character by character
If the character is an opening bracket, push it onto the stack
If the character is a closing bracket, check if it matches the top of the stack
If it matches, pop the top element from the stack
If it doesn't match or the stack is empty, return false
After traversing the entire string, if the stack is empty, return true
Otherwise, return false

Asked in Oracle

Q. Given two arrays, one with n elements and another with n-1 elements...
Given 2 arrays, one with n elements and another with n-1 elements, answer the question.
Compare the elements of both arrays to find the missing element.
Use a loop or a built-in function to iterate through the arrays.
Consider edge cases where the missing element is at the beginning or end of the array.
Interview Questions of Similar Designations
Interview Experiences of Popular Companies





Top Interview Questions for Member Technical Staff Related Skills



Reviews
Interviews
Salaries
Users

