Adobe
300+ Om Sweets Interview Questions and Answers
Q201. getMax() function for a stack in O(1)
To get max value from a stack in O(1), maintain a separate stack to keep track of maximum values.
Create a separate stack to keep track of maximum values
Push the maximum value onto the stack whenever a new maximum is encountered
Pop the maximum value stack whenever the top element of the main stack is popped
Return the top element of the maximum value stack to get the maximum value in O(1)
Q202. How do you approach budgeting and forecasting in a Software as a Service (SaaS) environment?
I utilize data-driven insights and strategic planning for effective budgeting and forecasting in a SaaS environment.
Understand key metrics: Focus on MRR (Monthly Recurring Revenue) and ARR (Annual Recurring Revenue) to gauge financial health.
Customer acquisition costs: Analyze CAC to ensure sustainable growth and profitability.
Churn rate analysis: Monitor and forecast churn to adjust budgets and strategies accordingly.
Scenario planning: Create multiple forecasts based on diff...read more
Q203. What are the key variables to consider before building a forecasting model?
Key variables for forecasting models include historical data, market trends, seasonality, and external factors.
Historical Data: Analyze past performance to identify trends (e.g., sales data from previous years).
Market Trends: Consider industry growth rates and economic indicators (e.g., GDP growth, inflation rates).
Seasonality: Account for seasonal fluctuations in demand (e.g., holiday sales spikes).
External Factors: Evaluate potential impacts from regulations, competition, a...read more
Q204. Which data structure you will use.
It depends on the specific use case and requirements.
Consider the type of data being stored and the operations that need to be performed on it.
Common data structures include arrays, linked lists, stacks, queues, trees, and graphs.
For example, if the data needs to be accessed randomly and quickly, an array may be the best choice.
If the data needs to be sorted or searched frequently, a tree or hash table may be more appropriate.
Ultimately, the choice of data structure will depe...read more
Q205. Write a program to convert a binary tree to binary search tree
A program to convert a binary tree to binary search tree.
Perform an inorder traversal of the binary tree to get the sorted elements.
Create a new binary search tree and insert the sorted elements in the correct order.
The resulting binary search tree will have the same elements as the original binary tree, but in sorted order.
Q206. Write a function to find 2nd largest element in an array
A function to find the second largest element in an array.
Sort the array in descending order
Return the element at index 1
Q207. What is threading? Explain in deep
Threading is a programming technique that allows multiple tasks to run concurrently within a single process.
Threading involves creating multiple threads within a process to execute tasks simultaneously.
Threads share the same memory space and resources, allowing for efficient communication and coordination.
Examples of threading include multi-threaded web servers, video games, and parallel processing applications.
Q208. Any base to any base conversion i.e base 11 to base 7
Converting a number from base 11 to base 7 involves dividing the number by 7 and keeping track of remainders.
Divide the number in base 11 by 7 and keep track of remainders
Repeat the process with the quotient until it becomes 0
The remainders obtained in reverse order will give the number in base 7
Q209. Write complete code for the number of ways a frog can reach nth step by jumping 1 or 2 steps
Q210. Write a C/C++ function for removing extra spaces in given sentence
C/C++ function to remove extra spaces in a sentence
Use a loop to iterate through each character in the sentence
If a space is encountered, check if the next character is also a space
If yes, remove the extra space and shift the remaining characters to the left
Return the modified sentence
Q211. WHAT IS SIEVE OF ERATOSTHENESE
Sieve of Eratosthenes is an algorithm for finding all prime numbers up to a given limit.
Algorithm eliminates multiples of each prime number starting from 2
Remaining numbers are prime
Example: Finding prime numbers up to 30 - 2, 3, 5, 7, 11, 13, 17, 19, 23, 29
Q212. Intersection of two lines in a plane, if they intersect- determine the point of intersection
Intersection of two lines in a plane can be determined by solving the equations of the lines simultaneously.
To find the point of intersection, set the equations of the two lines equal to each other and solve for the variables.
If the lines are in slope-intercept form (y = mx + b), set the two equations equal to each other and solve for x and y.
If the lines are in standard form (Ax + By = C), solve the system of equations to find the point of intersection.
Q213. breaking a sentence into array of words and returning the base address
The task is to break a sentence into an array of words and return the base address.
Use a loop to iterate through the sentence character by character
Identify word boundaries based on spaces or punctuation marks
Allocate memory for each word and copy the characters into the corresponding array element
Return the base address of the array
Q214. How google handles 1 billion request in 1msec
Q215. Replace a string with another string in a paragraph
This function replaces a specified string with another string in a given paragraph.
Use the replace() method to replace the string.
Pass the original string, the string to be replaced, and the replacement string as arguments to the replace() method.
The replace() method returns a new string with the replacements made.
Q216. Write code for inverted index for MapReduce. Mapper and Reducer Functions
Q217. why are you increasing fast pointer by 2 only
Q218. Adobe product integration experience if any
Yes, I have extensive experience in integrating Adobe products.
I have worked on integrating Adobe Analytics with various websites to track user behavior and improve user experience.
I have also integrated Adobe Campaign with Salesforce to streamline marketing campaigns and improve lead generation.
In addition, I have experience integrating Adobe Experience Manager with other content management systems to improve content delivery and management.
I am familiar with Adobe's APIs an...read more
Q219. What is a graphic card and its use?
A graphic card is a hardware component that enhances the visual performance of a computer by rendering images and videos.
It is responsible for rendering and displaying images on the monitor.
It has its own processor and memory to handle graphics-intensive tasks.
It is used in gaming, video editing, and other graphic-intensive applications.
Examples include NVIDIA GeForce and AMD Radeon graphics cards.
Q220. Merge K-Sorted Linked List
Merge K-Sorted Linked List
Create a min heap of size k
Insert the first element of each linked list into the heap
Pop the minimum element from the heap and add it to the result list
Insert the next element from the linked list of the popped element into the heap
Repeat until all elements are processed
Q221. Implement a stack such that push,pop and find_max functions have O(1) time complexity
Implement a stack with O(1) push, pop and find_max functions.
Use two stacks, one for storing the elements and the other for storing the maximum element at each level
When pushing an element, compare it with the top element of the maximum stack and push the maximum of the two
When popping an element, pop from both stacks
When finding the maximum element, return the top element of the maximum stack
Q222. How does fbpropher forecasting model works and how is can be used to forecsst trafffic
fbprophet is a forecasting model developed by Facebook that uses time series data to make predictions.
fbprophet is an open-source forecasting tool developed by Facebook's Core Data Science team.
It is based on an additive model where non-linear trends are fit with yearly, weekly, and daily seasonality, plus holiday effects.
fbprophet can be used to forecast traffic by providing historical data on traffic patterns and using the model to predict future trends.
It allows users to e...read more
Q223. 35)Size of structure. Small c outputs on union , enums etc
The size of a structure in C depends on the size of its members, including unions and enums.
The size of a structure is determined by the sum of the sizes of its members.
Unions share the same memory space, so the size of a union is equal to the size of its largest member.
Enums are typically represented as integers, so their size depends on the size of an integer in the system.
Q224. What are the risks in fixed income?
Risks in fixed income include interest rate risk, credit risk, inflation risk, and liquidity risk.
Interest rate risk: Fluctuations in interest rates can impact the value of fixed income securities.
Credit risk: The risk of the issuer defaulting on their debt obligations.
Inflation risk: The risk that inflation will erode the purchasing power of fixed income investments.
Liquidity risk: The risk that you may not be able to sell a fixed income security quickly without incurring a ...read more
Q225. Explain cross sell specific examples in adobe
Cross-selling in Adobe refers to offering additional products or services to customers based on their previous purchases or interests.
Cross-selling can be done through personalized recommendations on the website or in email campaigns.
For example, if a customer purchases Adobe Photoshop, they may be offered a discount on Adobe Illustrator.
Another example is offering a bundle deal for multiple Adobe products based on the customer's interests.
Cross-selling can also be done throu...read more
Q226. Solution for solving problems generated by virtual functions
Virtual functions can cause problems due to their dynamic nature, but can be solved using various techniques.
Use pure virtual functions to ensure all derived classes implement the function
Use interface classes to define a common interface for all derived classes
Use smart pointers to manage memory and avoid memory leaks
Use virtual destructors to ensure proper destruction of objects
Avoid excessive use of virtual functions to improve performance
Q227. Advantages and disadvantages of quick sort and merge sort
Quick sort is faster on average but merge sort is more stable and guarantees O(n log n) time complexity.
Quick sort has an average time complexity of O(n log n) and is in-place, but worst-case time complexity of O(n^2).
Merge sort has a stable time complexity of O(n log n) but requires extra space for merging.
Quick sort is not stable, while merge sort is stable.
Quick sort is often preferred for arrays with a large number of elements, while merge sort is preferred for linked lis...read more
Q228. getMax() function for a queue in O(1)
To get max element from a queue in O(1) time complexity
Maintain a separate variable to keep track of the maximum element in the queue
Update the maximum element variable whenever a new element is added or removed from the queue
Return the maximum element variable when getMax() function is called
Q229. 1.Blue screen of death 2. Difference between ipv4 and ipv6 3. Mac address 4. Ip address 5. Virtualisation 6. What do you understand by cookies on website
Technical support interview questions on Blue screen of death, IPv4 vs IPv6, MAC address, IP address, virtualisation, and cookies on websites.
Blue screen of death is an error screen displayed on Windows operating systems when a system error occurs.
IPv4 and IPv6 are both internet protocol versions used to identify devices on a network, but IPv6 has a larger address space and better security features.
MAC address is a unique identifier assigned to network interfaces for communic...read more
Q230. two candles which were of random size, and what is the time to burn one candle completely
The time to burn one candle completely depends on the size of the candles and the rate at which they burn.
The time to burn one candle completely is directly proportional to the size of the candle.
The rate at which a candle burns can vary based on factors like the material of the candle, the wick, and the environment.
For example, a larger candle may take longer to burn completely compared to a smaller candle, even if they are both made of the same material.
Q231. Explain how you can improve a b2b and b2c product of your choice
To improve a B2B and B2C product, focus on enhancing user experience, adding new features, and optimizing pricing strategies.
Conduct user research to understand pain points and preferences of both B2B and B2C customers.
Implement user-friendly interfaces and streamline processes to improve overall user experience.
Introduce new features or functionalities based on customer feedback and market trends.
Optimize pricing strategies to attract and retain customers from both B2B and B...read more
Q232. there is array of n numbers & u hv to find sum(=0) of m numbers
Given an array of numbers, find a subset of numbers whose sum is zero.
Use a combination of numbers from the array to find subsets whose sum is zero.
Iterate through all possible combinations of numbers and check if their sum is zero.
Consider using recursion or backtracking to generate all possible combinations.
Optimize the solution by using memoization or dynamic programming to avoid redundant calculations.
Q233. Explain virtual memory and how mapping is done
Q234. What do you review in sow
SOW review includes scope, deliverables, timelines, milestones, payment terms, and legal terms.
Scope of work
Deliverables
Timelines
Milestones
Payment terms
Legal terms
Q235. given two nodes of a binary tree, find their first common ancestor
Find the first common ancestor of two nodes in a binary tree.
Traverse the tree from the root node and check if both nodes are in the left or right subtree of the current node.
If they are in different subtrees, then the current node is the first common ancestor.
If they are in the same subtree, continue traversing that subtree until they are in different subtrees.
If one of the nodes is the ancestor of the other, return the ancestor node.
If one of the nodes is not in the tree, r...read more
Q236. 1. Binary tree traversal 2. Multiply 2 big numbers represented in the form of string. 3. Detect the k-th node from the back of a linked list.
Questions on binary tree traversal, multiplying big numbers represented as strings, and detecting k-th node from the back of a linked list.
Binary tree traversal can be done in three ways: in-order, pre-order, and post-order.
To multiply two big numbers represented as strings, you can use the grade-school algorithm or Karatsuba algorithm.
To detect the k-th node from the back of a linked list, you can use two pointers approach or find the length of the list first.
Q237. given a directory, list all unique filenames inside that directory, in minimum time
To list all unique filenames in a directory in minimum time.
Use a hash set to store unique filenames
Iterate through each file in the directory
Check if the filename is already in the hash set, if not, add it
Return the hash set as an array of strings
Q238. What happened in Microsoft last round?
Q239. Explain insertion sort,quicksort
Insertion sort and quicksort are sorting algorithms used to sort arrays of data.
Insertion sort: iterates through the array and inserts each element into its proper position.
Quicksort: selects a pivot element and partitions the array into two sub-arrays, one with elements less than the pivot and one with elements greater than the pivot.
Insertion sort is best for small arrays, while quicksort is best for large arrays.
Both algorithms have an average time complexity of O(n log n)...read more
Q240. Optimize a program to find duplicate no in array of n numbrs
Q241. What is virtual memory and thrashing
Virtual memory is a memory management technique that allows the computer to use secondary storage as an extension of RAM.
Virtual memory is a combination of RAM and disk space.
It allows the computer to run more programs than it has physical RAM for.
When a program needs more memory than is available in RAM, the operating system moves some data from RAM to disk, freeing up space for other programs.
This swapping of data between RAM and disk is known as paging.
Thrashing occurs whe...read more
Q242. SEARCH AN ELEMENT IN ROTATED SORTED LINKLIST .
Search for an element in a rotated sorted linked list.
Find the pivot point where the list is rotated.
Divide the list into two sublists based on the pivot point.
Perform binary search on the appropriate sublist.
Handle edge cases such as empty list and list with only one element.
Q243. Operating on images in parallel
Operating on images in parallel involves dividing the image into smaller parts and processing them simultaneously.
Divide the image into smaller parts using techniques like tiling or splitting
Use parallel processing techniques like multi-threading or GPU acceleration
Combine the processed parts to form the final image
Examples: image segmentation, object detection, image enhancement
Q244. Hardware engines support for parallelism
Hardware engines support parallelism through multiple cores and threads.
Hardware engines can have multiple cores and threads to execute tasks simultaneously.
Parallelism can improve performance and efficiency in hardware-based tasks.
Examples include GPUs, FPGAs, and ASICs that have parallel processing capabilities.
Hardware parallelism can also be achieved through distributed computing and clustering.
Programming languages and frameworks like OpenCL and CUDA can be used to lever...read more
Q245. Find least common ancestor in BST and then in binary tree
The least common ancestor (LCA) is the lowest node that has both given nodes as descendants.
For a binary search tree (BST), the LCA can be found by comparing the values of the nodes with the given nodes.
For a binary tree, the LCA can be found by recursively searching for the nodes in the left and right subtrees.
If one of the given nodes is the ancestor of the other, it is considered as the LCA.
Q246. Loop in a list and how to find out
Q247. 3)Reversing a singly linked list and double linked list
Reversing a singly linked list involves changing the direction of pointers, while reversing a doubly linked list involves swapping the previous and next pointers.
For singly linked list: iterate through the list and change the direction of pointers to reverse the list.
For doubly linked list: swap the previous and next pointers of each node to reverse the list.
Example for singly linked list: 1 -> 2 -> 3 -> 4 -> null, after reversing: 4 -> 3 -> 2 -> 1 -> null
Example for doubly l...read more
Q248. 27) Producer Consumer semaphore code using semwait and semsignal
Producer Consumer semaphore code using semwait and semsignal
Use semaphores to control access to shared buffer between producer and consumer
Producer signals when it adds an item to the buffer using semsignal
Consumer waits for signal from producer before consuming item using semwait
Q249. Any upsell or cross sell experience
Yes, I have experience in upselling and cross-selling.
I have successfully upsold additional services to existing clients, resulting in increased revenue.
I have cross-sold complementary products to customers, resulting in higher customer satisfaction and repeat business.
I have trained sales teams on effective upselling and cross-selling techniques.
I have analyzed customer data to identify opportunities for upselling and cross-selling.
For example, at my previous company, I iden...read more
Q250. Copy a stack into another stack without using an intermediate stack or array
Q251. Find max 3 digits from an array consist of both negative and positive number
Find the maximum 3-digit number from an array of both negative and positive numbers.
Iterate through the array and keep track of the 3 largest positive numbers.
Iterate through the array and keep track of the 3 smallest negative numbers.
Compare the largest positive numbers with the smallest negative numbers to find the maximum 3-digit number.
Q252. Puzzles like find 3 hat problem guess the color of hat.
The 3 hat problem involves guessing the color of your own hat based on the colors of hats worn by others.
Each person can see the colors of the hats of the people in front of them, but not their own hat color.
By analyzing the guesses and hat colors of others, one can deduce their own hat color.
Communication and logical reasoning are key to solving this puzzle.
Q253. convert a binary number into base 64 integer
Convert binary number to base 64 integer
Divide the binary number into groups of 6 bits
Convert each group of 6 bits to decimal
Map the decimal value to the corresponding base 64 character
Concatenate the base 64 characters to form the final integer
Q254. List Balance sheet items for a Tech company.
Balance sheet items for a Tech company include cash, accounts receivable, inventory, property, plant, and equipment, and intangible assets.
Cash
Accounts receivable
Inventory
Property, plant, and equipment
Intangible assets
Q255. How can Logistic regression be applied for multiclasstext classification
Logistic regression can be applied for multiclasstext classification by using one-vs-rest or softmax approach.
One-vs-rest approach: Train a binary logistic regression model for each class, treating it as the positive class and the rest as the negative class.
Softmax approach: Use the softmax function to transform the output of the logistic regression into probabilities for each class.
Evaluate the model using appropriate metrics such as accuracy, precision, recall, and F1 score...read more
Q256. 3Sum (no. of triplets whose sum is <= target)
Find number of triplets in array whose sum is less than or equal to target.
Sort the array in ascending order.
Use three pointers to iterate through the array and find triplets.
Update pointers based on sum of triplets and target value.
Q257. Where are static variables stored?
Q258. Given a series of pictorial figures, find the next figure
The answer cannot be determined without additional information.
There must be a pattern or rule to follow in the series of pictorial figures
Without knowing the pattern or rule, it is impossible to determine the next figure
Examples of patterns could include rotation, reflection, or addition of elements
Q259. Implement a contiguous 2-d matrix dynamically in C
To implement a contiguous 2-d matrix dynamically in C, you can use a single-dimensional array and calculate the index based on row and column.
Allocate memory for the matrix using malloc or calloc
Access elements using a formula: index = (row * numColumns) + column
Free the memory after use to avoid memory leaks
Q260. Complete code and he ran it for a 4×4 matrix
The interviewee was asked to complete code for a 4x4 matrix and run it.
Ensure the code initializes a 4x4 matrix
Check for any syntax errors or logical mistakes
Run the code to verify the output
Q261. CM of some states and latest android version
The question is about the Chief Ministers of some states and the latest Android version.
The Chief Minister of Maharashtra is Uddhav Thackeray.
The Chief Minister of Tamil Nadu is M.K. Stalin.
The latest Android version is Android 12.
Q262. Declare a 2D array using pointer notation
Q263. Memory protection in OS?
Memory protection is a feature of an operating system that prevents unauthorized access to memory locations.
Memory protection is achieved through the use of memory management units (MMUs) and virtual memory.
MMUs map virtual addresses to physical addresses and enforce access permissions.
Virtual memory allows the OS to allocate memory to processes in a way that isolates them from each other.
Examples of memory protection mechanisms include segmentation, paging, and access contro...read more
Q264. Difference between process and thread
A process is an instance of a program, while a thread is a unit of execution within a process.
A process is an independent entity that runs in its own memory space, while threads share the same memory space within a process.
Processes have their own resources, such as file handles and memory, while threads share these resources.
Processes are heavyweight and have higher overhead, while threads are lightweight and have lower overhead.
Processes provide better isolation and securit...read more
Q265. Write a Recursive function to reverse a link list
Q266. make api flow and create with help of design pattern for ui and ux testing
The answer to the question is provided below.
To create an API flow, start by identifying the endpoints and their functionalities.
Design the UI and UX testing by using appropriate design patterns like MVC or MVVM.
Implement the API calls and handle the responses using networking libraries like Alamofire.
Use XCTest or UI Testing frameworks for automated UI and UX testing.
Mock the API responses for testing purposes using tools like OHHTTPStubs or Swifter.
Ensure proper error handl...read more
Q267. What is cookies? and how to implement OAuth
Cookies are small pieces of data stored on a user's device by a website, used for tracking and authentication. OAuth is a protocol for authorization.
Cookies are used to store user information on the client side, such as login credentials or preferences
OAuth is implemented by registering an application with the OAuth provider, obtaining client credentials, and redirecting users to the provider for authentication
After authentication, the provider issues an access token to the a...read more
Q268. design a class to implement search & insert for it
Design a class to implement search & insert for an array of strings
Create a class with methods for search and insert
Use an array to store the strings
Implement a search method that iterates through the array and returns the index of the found string
Implement an insert method that adds a new string to the array
Q269. Implement a push pop operations in a stack
Q270. 25) Merge two sorted linked list without using extra memory
Q271. Write a pseudo code for Singleton Pattern
Q272. what are the tools you have used?
I have used a variety of tools including project management software, communication tools, and data analysis tools.
Project management software (e.g. Microsoft Project, Asana)
Communication tools (e.g. Slack, Microsoft Teams)
Data analysis tools (e.g. Excel, Tableau)
Q273. OS support for parallelism
Modern OSes support parallelism through multi-core processors and threading.
Modern OSes like Windows, macOS, and Linux support parallelism through multi-core processors and threading.
Parallelism can be achieved through processes or threads.
Parallelism can improve performance and efficiency of software.
Examples of parallel programming frameworks include OpenMP and MPI.
Q274. 29) Allocate two dimensional matrix using new
Allocate a two-dimensional matrix using the 'new' keyword.
Use the 'new' keyword to dynamically allocate memory for the matrix.
Specify the number of rows and columns in the matrix.
Access elements using the row and column indices.
Remember to deallocate the memory using 'delete' when done.
Q275. Random Pointer in Linked list. Clone it
Cloning a linked list with random pointers.
Create a copy of each node and insert it next to the original node.
Update the random pointers of the copied nodes to point to the corresponding copied nodes.
Separate the original and copied nodes to get the cloned linked list.
Q276. 7) Maximum of three numbers using ternary operator
Using ternary operator to find the maximum of three numbers
Use ternary operator to compare the first two numbers, then compare the result with the third number
Example: int max = (a > b) ? ((a > c) ? a : c) : ((b > c) ? b : c);
Q277. 31)Second largest element in a given array
Find the second largest element in a given array of strings.
Sort the array in descending order.
Access the element at index 1 to get the second largest element.
Handle cases where there may be duplicates or less than 2 elements in the array.
Q278. Difficult scenarios and how to tackle them
Handling difficult scenarios is crucial in sales management. It requires quick thinking and problem-solving skills.
Stay calm and composed
Listen actively to understand the issue
Offer solutions or alternatives
Seek feedback and learn from the experience
Q279. What's the formula for WACC?
WACC is calculated by taking the weighted average of the cost of equity and the cost of debt, with weights representing the proportion of equity and debt in the company's capital structure.
WACC = (E/V) * Re + (D/V) * Rd * (1 - Tc)
E/V represents the proportion of equity in the company's capital structure
Re is the cost of equity
D/V represents the proportion of debt in the company's capital structure
Rd is the cost of debt
Tc is the corporate tax rate
Example: If a company has 70% ...read more
Q280. Find a 3 digit Number abc such that abc=a!+b!+c!
A 3 digit number abc is to be found such that abc=a!+b!+c!
The maximum value of a!+b!+c! for a 3 digit number is 9!+9!+9!= 2,177,280
Therefore, we can start by checking all numbers from 100 to 999
Calculate the factorials of each digit and check if their sum equals the number itself
The only solution is 145, as 1!+4!+5!=145
Q281. Diamond heirarchy problem
Diamond hierarchy problem is a problem in object-oriented programming where a class inherits from multiple classes in a diamond-shaped hierarchy.
Occurs when a class inherits from two classes that share a common base class
Can lead to ambiguity in method calls and data members
Solved using virtual inheritance or by using interfaces
Q282. Length and breadth about the respective Adobe product
Adobe product refers to a range of software solutions developed by Adobe Inc. for creative professionals and businesses.
Adobe Creative Cloud includes popular products like Photoshop, Illustrator, and InDesign.
Adobe Experience Cloud offers solutions for marketing, analytics, and advertising.
Adobe Document Cloud includes tools like Adobe Acrobat and Adobe Sign for document management and e-signatures.
Q283. Define Process &thread
Process is an instance of a program while thread is a subset of a process that can run concurrently with other threads.
A process is a program in execution
A process can have multiple threads
Threads share the same memory space as the process
Threads can run concurrently with other threads within the same process
Examples of processes include web browsers, word processors, and media players
Examples of threads include GUI thread, network thread, and background thread
Q284. Finish the react application with the given functionalities
The react application needs to be completed with given functionalities.
Implement state management using Redux or Context API
Create components for different sections of the application
Fetch data from an API and display it in the application
Add routing using React Router for navigation
Implement form handling for user input
Q285. encode and decode string without using any delimiter
Encode and decode a string without using any delimiter.
Use a unique character to represent the start and end of each string in the array.
Keep track of the length of each string to properly decode it.
Example: ['hello', 'world'] can be encoded as '#hello#world#' without using delimiters.
Q286. first occurence of given number in sorted array
Find the first occurrence of a given number in a sorted array.
Use binary search to efficiently find the first occurrence of the number.
Keep track of the index of the first occurrence as you search through the array.
Return the index of the first occurrence once found.
Q287. What is Load Balancer?
Q288. Spiral order traversal of a matrix.
Spiral order traversal of a matrix is a way to visit all elements in a matrix in a spiral pattern.
Start by traversing the outermost layer of the matrix from left to right, top to bottom, right to left, and bottom to top.
Continue this pattern for each inner layer until all elements are visited.
Keep track of the boundaries of the matrix to know when to stop.
Q289. How can photoshop increase market share
Photoshop can increase market share by expanding into new industries, offering more affordable pricing options, and improving user experience.
Expand into new industries such as web design, digital marketing, and e-commerce to reach a wider audience.
Offer more affordable pricing options for individual users, small businesses, and educational institutions to attract new customers.
Improve user experience by simplifying the interface, adding new features based on user feedback, a...read more
Q290. Creating flow of api implementation using design patterns and unittesting
The flow of API implementation can be designed using design patterns and unit testing.
Identify the design patterns suitable for the API implementation
Create a flow diagram to visualize the steps involved
Implement the API using the chosen design patterns
Write unit tests to ensure the functionality and reliability of the API
Refactor and optimize the code as needed
Q291. Tower of hanoi?
Tower of Hanoi is a mathematical puzzle that involves moving a stack of disks from one peg to another.
The puzzle consists of three pegs and a number of disks of different sizes.
The objective is to move the entire stack to another peg, obeying the following simple rules:
- Only one disk can be moved at a time.
- Each move consists of taking the upper disk from one of the stacks and placing it on top of another stack or on an empty peg.
- No disk may be placed on top of a smaller ...read more
Q292. Find left view of binary tree. Two sum problem
Left view of a binary tree is the set of nodes visible when the tree is viewed from the left side.
Traverse the binary tree level by level using BFS or DFS.
Keep track of the first node encountered at each level (leftmost node).
Store the leftmost nodes in an array to get the left view of the binary tree.
Q293. Implement stack using queue
Implementing stack using queue involves using two queues to simulate stack behavior.
Create two queues, q1 and q2.
Push operation: Enqueue the element to q1.
Pop operation: Dequeue all elements from q1 to q2 except the last element. Dequeue and return the last element.
Swap the names of q1 and q2 after each pop operation.
Top operation: Return the last element of q1 without dequeuing it.
isEmpty operation: Check if both q1 and q2 are empty.
Q294. WRITE A GENERIC SWAP FUNCTION
A generic swap function swaps two values of any data type.
The function should take two parameters of any data type.
Use a temporary variable to store the value of one parameter.
Assign the value of the second parameter to the first parameter.
Assign the value of the temporary variable to the second parameter.
Q295. Why inheritance is used.
Q296. 2)Lowest common ancestor of a BST
The lowest common ancestor of a Binary Search Tree (BST) is the node that is the closest common ancestor of two given nodes.
Traverse the BST starting from the root node
Compare the values of the two given nodes with the current node's value
If both nodes are on the same side of the current node, move to that side
If the nodes are on different sides, the current node is the lowest common ancestor
Q297. 9)Middle of linked list in one traversal
To find the middle of a linked list in one traversal, use two pointers - one moving at double the speed of the other.
Use two pointers - slow and fast, with fast moving twice as fast as slow
When fast reaches the end, slow will be at the middle of the linked list
Q298. 10) evaluation of a prefix expression
Evaluation of a prefix expression involves evaluating operators before operands.
Start from the rightmost element and move towards the left.
When encountering an operator, apply it to the next two elements in the expression.
Repeat until the entire expression is evaluated.
Example: + * 2 3 4 would be evaluated as (2 * 3) + 4 = 10.
Q299. 32) Implement queue using two stacks
Implement a queue using two stacks
Use two stacks to simulate the behavior of a queue
One stack for enqueue operation and another for dequeue operation
When dequeue is called, check if the second stack is empty, if so, transfer elements from the first stack
Q300. Calculate Fibonacci for nth term
The Fibonacci sequence is a series of numbers in which each number is the sum of the two preceding ones.
The Fibonacci sequence starts with 0 and 1.
Each subsequent number is the sum of the two preceding numbers.
The formula to calculate the nth term of the Fibonacci sequence is F(n) = F(n-1) + F(n-2).
For example, the 6th term of the Fibonacci sequence is 8, as 0 + 1 + 1 + 2 + 3 + 5 = 8.
More about working at Adobe
Top HR Questions asked in Om Sweets
Interview Process at Om Sweets
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month