System Engineer
1500+ System Engineer Interview Questions and Answers

Asked in Infosys

Q. Since your major is mechanical engineering, can you explain how a turbine works and describe its parts?
A turbine is a mechanical device that converts the energy from a fluid flow into useful work.
Turbines are commonly used in power generation, aviation, and marine applications.
They consist of several key parts including the rotor, stator, blades, and shaft.
The rotor is the rotating part of the turbine, while the stator is the stationary part.
Blades are attached to the rotor and are designed to capture the energy of the fluid flow.
The shaft connects the rotor to the external lo...read more

Asked in TCS

Q. What do you know about Protocols? Explain Different types of Protocols?
Protocols are a set of rules that govern the communication between devices or systems.
Protocols define the format, timing, sequencing, and error checking of messages exchanged between devices.
Different types of protocols include network protocols (TCP/IP, HTTP, FTP), communication protocols (RS-232, USB, Bluetooth), and application protocols (SMTP, POP3, IMAP).
Network protocols govern the communication between devices on a network, while communication protocols govern the com...read more

Asked in Infosys

Q. 1)what is constructor. 2)Difference between method overriding and overloading 3) Write a program for print prime number between two given ranges 4)What is dangling pointer
Interview questions for System Engineer position
Constructor is a special method that is used to initialize an object
Method overriding is when a subclass provides its own implementation of a method that is already present in the parent class, while method overloading is when multiple methods have the same name but different parameters
Program to print prime numbers between two given ranges can be achieved using nested loops and checking for prime numbers using modulus operator
A...read more

Asked in Precision Infomatic M Pvt Ltd

Q. Difference between HTTP and HTTPS, What is UDP and TCP, Port numbers of network protocols, What is Bitlocker , Outlook Configuration step by step etc
Questions related to networking and security protocols, Bitlocker and Outlook configuration.
HTTP is unsecured while HTTPS is secured with SSL/TLS encryption
TCP is a connection-oriented protocol while UDP is connectionless
Common port numbers include 80 for HTTP, 443 for HTTPS, 25 for SMTP, and 110 for POP3
Bitlocker is a full disk encryption feature in Windows
Outlook configuration involves setting up email accounts, server settings, and security options

Asked in Infosys

Q. How can the process of coordinating different buses to travel a route be automated when there is no direct bus available?
Yes, we can automate the process of coordinating timing of different busses for a particular route.
We can use GPS tracking to monitor the location of busses in real-time.
We can develop a software that can analyze the data and suggest the best route and timing for the passenger.
We can also use machine learning algorithms to predict the traffic and suggest the best route and timing for the passenger.
We can integrate this system with a mobile app that can provide real-time infor...read more

Asked in Amdocs

DELETE removes specific rows from a table, while TRUNCATE removes all rows from a table.
DELETE is a DML command, while TRUNCATE is a DDL command.
DELETE can be rolled back, while TRUNCATE cannot be rolled back.
DELETE triggers the delete trigger for each row, while TRUNCATE does not trigger any delete triggers.
DELETE is slower as it maintains logs, while TRUNCATE is faster as it does not maintain logs.
Example: DELETE FROM table_name WHERE condition; TRUNCATE table_name;
System Engineer Jobs




Asked in Infosys

Q. If a colleague is having a problem with their system and asks for your help, how would you approach solving it? If you don't know how to solve it, what steps would you take to resolve the problem?
To assist a colleague with a system issue, I would diagnose the problem, research solutions, and implement fixes or escalate as needed.
Listen carefully to the colleague's description of the problem to understand the symptoms.
Ask clarifying questions to gather more details, such as when the issue started and any error messages.
Check for common issues, like connectivity problems or software updates that may have caused the issue.
If I can't resolve it, I would research the probl...read more

Asked in Infosys

Q. Is there any diversification going to happen in infosys from services to product development like Google?
Yes, Infosys has already diversified into product development with offerings like Finacle and EdgeVerve.
Infosys has already developed products like Finacle, a banking software, and EdgeVerve, an AI-powered automation platform.
The company has also acquired product-based companies like Panaya and Skava.
Infosys has a dedicated Product Engineering Services unit that focuses on developing and maintaining software products.
However, services still remain the primary focus of Infosys...read more
Share interview questions and help millions of jobseekers 🌟

Asked in Oracle Cerner

DDL is used to define the structure of database objects, while DML is used to manipulate data within those objects.
DDL includes commands like CREATE, ALTER, DROP to define database objects like tables, indexes, etc.
DML includes commands like INSERT, UPDATE, DELETE to manipulate data within tables.
Example of DDL: CREATE TABLE employees (id INT, name VARCHAR(50));
Example of DML: INSERT INTO employees VALUES (1, 'John Doe');

Asked in TCS

Permutations of a string with fixed characters.
For 1st character fixed: Generate permutations for the remaining characters.
For 1st and 2nd characters fixed: Generate permutations for the remaining characters.
For 1st, 2nd, and 3rd characters fixed: Generate permutations for the remaining characters.

Asked in Amdocs

Garbage collector in Java is a built-in mechanism that automatically manages memory by reclaiming unused objects.
Garbage collector runs in the background to identify and delete objects that are no longer needed.
It helps in preventing memory leaks and optimizing memory usage.
Examples of garbage collectors in Java include Serial, Parallel, CMS, and G1.

Asked in VRL Logistics

Q. Which programming language is best for interviews?
Python is often considered the best programming language for interviews due to its simplicity and versatility.
Python's syntax is clean and easy to read, making it ideal for demonstrating coding skills.
It has a vast ecosystem of libraries and frameworks, useful for various applications (e.g., Flask for web development).
Python is widely used in data science and machine learning, making it relevant for many tech roles.
Many companies, including Google and Facebook, use Python, so...read more

Asked in Infosys

Q. You belong to the mechanical domain, why do you want to switch?
I want to switch to system engineering as it aligns with my interests and skills.
I have always been interested in technology and how systems work
I have gained experience in programming and software development
I believe my skills in problem-solving and critical thinking will be valuable in system engineering
I am excited about the opportunity to work on complex systems and contribute to their design and development

Asked in Infosys

Q. Why you use Java, What are the features of java, How it is different with others?
Java is a popular programming language known for its platform independence, object-oriented approach, and robustness.
Java is platform independent, meaning it can run on any platform that has a Java Virtual Machine (JVM).
It is object-oriented, allowing for modular and reusable code.
Java is known for its robustness and reliability, with features like automatic memory management and exception handling.
Java has a rich set of APIs and libraries, making it versatile for various app...read more

Asked in Samsung

The Diamond Problem in C++ occurs when a class inherits from two classes that have a common base class, leading to ambiguity in method resolution.
Diamond Problem arises in multiple inheritance in C++ when a class inherits from two classes that have a common base class.
Ambiguity occurs when the derived class tries to access a method or attribute from the common base class.
To resolve the Diamond Problem, virtual inheritance can be used to ensure that only one instance of the co...read more

Asked in Infosys

Call by Value passes a copy of the actual parameter, while Call by Reference passes the address of the actual parameter.
Call by Value: Changes made to the formal parameter inside the function do not affect the actual parameter.
Call by Reference: Changes made to the formal parameter inside the function affect the actual parameter.
Example: void swap(int a, int b) vs void swap(int &a, int &b)

Asked in Infosys BPM

Q. Examples of encapsulation and polymorphism,types of classes,what requirements we need to write a good code.
Encapsulation and polymorphism examples, class types, and requirements for good code.
Encapsulation: hiding implementation details, e.g. private variables in a class
Polymorphism: using a single interface to represent multiple types, e.g. method overloading
Class types: abstract, final, static, inner, anonymous, etc.
Requirements for good code: readability, maintainability, efficiency, scalability, etc.

Asked in Infosys

Q. At what scale did you choose yourself in the programming language?
I chose myself in the programming language at a small scale and gradually increased it.
Started with basic syntax and gradually moved to more complex concepts
Practiced on small projects before moving to larger ones
Learned from online resources and collaborated with peers
Continuously updated skills and learned new languages as needed

Asked in FreshersNow

Q. What are the features of JAVA?
Java is a versatile programming language known for its platform independence and rich set of features.
Platform independence: Java programs can run on any operating system or device with a Java Virtual Machine (JVM)
Object-oriented: Java supports the principles of object-oriented programming, allowing for modular and reusable code
Garbage collection: Java automatically manages memory allocation and deallocation, reducing the risk of memory leaks
Exception handling: Java provides ...read more

Asked in Infosys

Q. Write a program to check if a given string is a palindrome or not.
A program to check if a given string is a palindrome or not.
A palindrome is a word, phrase, number, or other sequence of characters that reads the same forward and backward.
To check if a string is a palindrome, we can compare the characters from the beginning and end of the string.
If the characters match at each position, the string is a palindrome.
We can use two pointers, one starting from the beginning and the other from the end, and compare the characters at each position....read more

Asked in TCS

Q. How charging protocol works in electric vehicle and what is purpose of charging pin at charging inlet
Charging protocol in EVs and purpose of charging pin at inlet
Charging protocol determines how the battery is charged and how much power is delivered
Charging pin is used to connect the charging cable to the vehicle's charging inlet
Charging protocols include AC charging, DC charging, and wireless charging
Charging protocols also include different charging levels such as Level 1, Level 2, and Level 3
Purpose of charging pin is to ensure safe and reliable transfer of power from the...read more

Asked in Infosys

Q. If you were responsible for parking 500 cars on campus during a college festival, how would you manage it?
I would create designated parking areas, implement a parking management system, and utilize efficient parking strategies.
Create designated parking areas based on the capacity and layout of the campus.
Implement a parking management system to track and manage the parking spaces.
Utilize efficient parking strategies such as valet parking, shuttle services, and carpooling.
Ensure proper signage and directions to guide the drivers to available parking spaces.
Coordinate with event or...read more

Asked in TCS

Q. What is the difference between assignment and initialization?
Assignment is assigning a value to a variable, while initialization is declaring and assigning a value to a variable.
Assignment changes the value of an existing variable, while initialization creates a new variable and assigns a value to it.
Initialization is done only once, while assignment can be done multiple times.
Example of initialization: int x = 5; Example of assignment: x = 10;
Initialization can also be done using constructors in object-oriented programming.
In C++, uni...read more

Asked in Indiamart Intermesh

Types of inheritance in OOP include single, multiple, multilevel, hierarchical, hybrid, and multipath inheritance.
Single inheritance: A class inherits from only one base class.
Multiple inheritance: A class inherits from more than one base class.
Multilevel inheritance: A class inherits from a class which in turn inherits from another class.
Hierarchical inheritance: Multiple classes inherit from a single base class.
Hybrid inheritance: Combination of multiple and multilevel inhe...read more

Asked in Baker Hughes

Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
Abstract class can have constructors, member variables, and methods with implementation.
Interface can only have abstract methods and constants.
A class can implement multiple interfaces but can only extend one abstract class.
Example: abstract class Animal { abstract void sound(); void eat() { // implementation } }
Example: interface Shape { void draw(); }

Asked in iOPEX Technologies

Q. What is Vlan, Inter Vlan or how to work VTP and STP or RSTP.
VLAN is a logical grouping of network devices, Inter VLAN allows communication between VLANs, VTP manages VLAN configuration, STP/RSTP prevent network loops.
VLAN separates a physical network into multiple logical networks
Inter VLAN routing allows communication between VLANs
VTP manages VLAN configuration across multiple switches
STP/RSTP prevent network loops by disabling redundant links
Example: VLAN 10 for finance, VLAN 20 for marketing
Example: Inter VLAN routing allows a fina...read more

Asked in Intellect Design Arena

Yes, static methods can be used in interfaces in Java.
Static methods in interfaces were introduced in Java 8.
Static methods can be called using the interface name.
Static methods in interfaces are used for providing utility methods.
Example: interface MyInterface { static void myMethod() { System.out.println("Static method in interface"); }}

Asked in TCS

Q. We work at the intersection of engineering and IT, so sometimes we might need to do programming and develop/improve algorithms. Are you ok with that?
Yes, I am comfortable with programming and algorithm development.
I have experience in programming languages such as Python, Java, and C++.
I have developed algorithms for various projects in my previous roles.
I am always willing to learn new programming languages and improve my skills.
I understand the importance of engineering and IT working together to achieve project goals.

Asked in TCS

Q. What do you mean by experience certainty?
Experience certainty refers to the level of confidence and assurance gained through repeated exposure to a particular task or situation.
Experience certainty is achieved through repetition and familiarity.
It allows individuals to perform tasks with greater ease and efficiency.
For example, a pilot who has flown the same route multiple times will have a higher level of experience certainty compared to a pilot who is flying the route for the first time.
Experience certainty can al...read more

Asked in Cisco

Thrashing in operating systems occurs when a system is spending more time swapping data between memory and disk than actually executing tasks.
Occurs when the system is overwhelmed with too many processes competing for limited resources
Results in a decrease in system performance as the CPU is constantly switching between processes
Can be alleviated by optimizing resource allocation and reducing the number of active processes
Example: A system running multiple memory-intensive ap...read more
Interview Questions of Similar Designations
Interview Experiences of Popular Companies





Top Interview Questions for System Engineer Related Skills



Reviews
Interviews
Salaries
Users

