What work have you done on full chip Clock and Power distribution? What process technology and budgets were used?
2814What transistor level design tools are you proficient with? What types of designs were they used on?
1 4115If not into production, how far did you follow the design and why did not you see it into production?
2222Write, efficient code for extracting unique elements from a sorted list of array. e.g. (1, 1, 3, 3, 3, 5, 5, 5, 9, 9, 9, 9) -> (1, 3, 5, 9).
13 40573What are the total number of lines written by you in C/C++? What is the most complicated or valuable program written in C/C++?
2 10278Have you studied pipelining? List the 5 stages of a 5 stage pipeline. Assuming 1 clock per stage, what is the latency of an instruction in a 5 stage machine? What is the throughput of this machine ?
3 12641For a single computer processor computer system, what is the purpose of a processor cache and describe its operation?
2449Post New Intel Interview Questions
What are the differences between FTP , NFS , SAMBA servers explain separately.
What is the difference between SVG and
How to decide/consider the grade of bitumen for dbm.
Explain what is the difference between simulator and emulator?
why and where we use early make & late break contacts in protection?
How are queries run in ms access? List different ways.
Describe substr() in r string manipulation?
You need to search for the string “tecmint” in all the “.txt” files in the current directory. How will you do it?
What is the purpose of the linux?
What is perl programming?
what is the use of super function in ruby on rails?
Does objective-c contain private strategies?
How to check whether user has access to a particular record or not? : salesforce sharing and security
Why is it important?
why we use aggregate,sand with cement in concrete?