Tuesday, June 30, 2015

Alcatel Lucent Third Round F-2-F




Third ROUND F-2-F 
================= 

1. Briefly described the current project. Given the marker and board to draw the architecture and explain each phase.
2. There were some project specific questions.
3. what is difference in int *a[100] & int (*a)[100] .
4.
int *a[10];
int (*b)[10]; 
int c[10] = {1,2,3,4,5,6,7,8,9}

    a. is the below statement correct ?
        a[0]=&c[0]; a[1]=&c[1]; ...... a[9]=&c[9];
        b=c;
    b. How to print the value using a and c ;
    c. what will be the sizeof(a), sizeof(b), sizeof(c);
    d. which operation is valid
        1. a++ 2. b++ 3. c++
5.
  char *x = "alcatel"
  char y[18] = "alcatel"
 
  a. what will the the sizeof (x) and sizeof (y), strlen(x),strlen(y)
  b. whether the below statement is correct.
    x++,y++
  c. whether the below statement is correct.
       x[0]='L'
       y[0]='L'
  d. what if we allocate the memory and then
     x=malloc(10)
     y=malloc(10)
    now perform the step b.
  e. after the step c what will be the sizeof (x),sizeof(y)
  f. what will be strlen(x), strlen(y);

6. lets 32bit no. write a program to circular rotate 1 byte.
   int y=0x01020304;
   output y=0x04010203;
  
7. write a program to check the bit is set or not.
8. Write a program to find the loop in linklist and remove the loop in linklist.

   

If you would like to contribute, mail us your interview experience at "q4interview@gmail.com"We will like to publish it on "q4interview.blogspot.in" and let's help other job seekers.

Wednesday, June 17, 2015

Radisys Interview Questions





1. introduce your self and about project.
2. some question from project specific.
3. what are different memory segment in os.
4. what is static variable, with example.




19. how pkt is forwarded in h/w.
20. stack implementation (pop/push).



We heartily thanks to Ankit for contributing his interview experience with Q-4-Interview.



If you would like to contribute, mail us your interview experience at "q4interview@gmail.com"We will like to publish it on "q4interview.blogspot.in" and let's help other job seekers.






Tuesday, June 16, 2015

Alcatel Lucent Second Round F-2-F



SECOND ROUND F-2-F 
=================== 


1.Can you write a program to implement memcpy. copy must be successful even source and destination address overlap.
2. puzzel:
There are 100 doors, all closed. In a nearby cage are 100 monkeys. The first monkey is let out, and runs along the doors opening every one.
The second monkey is then let out, and runs along the doors closing the 2nd, 4th, 6th,... all the even-numbered doors.
The third monkey is let out. He attends only to the 3rd, 6th, 9th,... doors (every third door, in other words), closing any that is open and opening any
that is closed, and so on. After all 100 monkeys have done their work in this way, what state are the doors in after the last pass,which doors are left open and which are closed? 





9.  Can you implement a memory manager, which will detect the memory corruption.



If you would like to contribute, mail us your interview experience at "q4interview@gmail.com"We will like to publish it on "q4interview.blogspot.in" and let's help other job seekers.

Monday, June 8, 2015

TCS Telephonic Interview Questions






  Telephonic interview recently held for TCS for the position of L2/L3 developer.

1.    Briefly introduce yourself and about current project.
2.    Let’s we have topology where host is moving (mac), so how we can manage and control it.
3.    While implementing the feature <I just mention about the feature implementation> what are the basic issue you faced, and how you resolve it.
4.    If in mac address table mac entry for host A is exist as both static and dynamic, what will happen when pkt will receive at switch. Have you observed such scenario?
5.    What all are the step will performed when switch received first pkt from Host A.
6.    Do you know LACP. What is difference in LACP/LAG.
7.    Can you tell me how link aggregation mention in Broadcom.
8.    What are the type of IPC used in your project?
9.    How to create message queue, what are the field will be required. Then how to protect. Can we not achieve it by pipe.
10.    Can you tell me process memory layout in linux.
11.    How do u rate yourself in c in scale of 5.
12.    Which one is efficient in 2D array or array of pointer.
13.    Can you just tell how to write “Const char pointer”. If I want to have const data.
14.    Can you give example of stack overflow, another example then calling main function inside main().
15.    Have you used call back function, what will be the prototype of it.
16.    Can you just tell me how to write Array of function pointer returning int pointer.
17.    What is dangling pointer.
18.    If ptr is pointer and pointing to some memory, doing ptr++ five time and then freeing the ptr what will be the issue here.