Add office photos
Employer?
Claim Account for FREE

Adobe

3.9
based on 1.1k Reviews
Video summary
Filter interviews by

300+ Om Sweets Interview Questions and Answers

Updated 5 Mar 2025
Popular Designations

Q201. getMax() function for a stack in O(1)

Ans.

To get max value from a stack in O(1), maintain a separate stack to keep track of maximum values.

  • Create a separate stack to keep track of maximum values

  • Push the maximum value onto the stack whenever a new maximum is encountered

  • Pop the maximum value stack whenever the top element of the main stack is popped

  • Return the top element of the maximum value stack to get the maximum value in O(1)

Add your answer

Q202. How do you approach budgeting and forecasting in a Software as a Service (SaaS) environment?

Ans.

I utilize data-driven insights and strategic planning for effective budgeting and forecasting in a SaaS environment.

  • Understand key metrics: Focus on MRR (Monthly Recurring Revenue) and ARR (Annual Recurring Revenue) to gauge financial health.

  • Customer acquisition costs: Analyze CAC to ensure sustainable growth and profitability.

  • Churn rate analysis: Monitor and forecast churn to adjust budgets and strategies accordingly.

  • Scenario planning: Create multiple forecasts based on diff...read more

Add your answer

Q203. What are the key variables to consider before building a forecasting model?

Ans.

Key variables for forecasting models include historical data, market trends, seasonality, and external factors.

  • Historical Data: Analyze past performance to identify trends (e.g., sales data from previous years).

  • Market Trends: Consider industry growth rates and economic indicators (e.g., GDP growth, inflation rates).

  • Seasonality: Account for seasonal fluctuations in demand (e.g., holiday sales spikes).

  • External Factors: Evaluate potential impacts from regulations, competition, a...read more

Add your answer

Q204. Which data structure you will use.

Ans.

It depends on the specific use case and requirements.

  • Consider the type of data being stored and the operations that need to be performed on it.

  • Common data structures include arrays, linked lists, stacks, queues, trees, and graphs.

  • For example, if the data needs to be accessed randomly and quickly, an array may be the best choice.

  • If the data needs to be sorted or searched frequently, a tree or hash table may be more appropriate.

  • Ultimately, the choice of data structure will depe...read more

View 2 more answers
Discover Om Sweets interview dos and don'ts from real experiences

Q205. Write a program to convert a binary tree to binary search tree

Ans.

A program to convert a binary tree to binary search tree.

  • Perform an inorder traversal of the binary tree to get the sorted elements.

  • Create a new binary search tree and insert the sorted elements in the correct order.

  • The resulting binary search tree will have the same elements as the original binary tree, but in sorted order.

Add your answer

Q206. Write a function to find 2nd largest element in an array

Ans.

A function to find the second largest element in an array.

  • Sort the array in descending order

  • Return the element at index 1

Add your answer
Are these interview questions helpful?

Q207. What is threading? Explain in deep

Ans.

Threading is a programming technique that allows multiple tasks to run concurrently within a single process.

  • Threading involves creating multiple threads within a process to execute tasks simultaneously.

  • Threads share the same memory space and resources, allowing for efficient communication and coordination.

  • Examples of threading include multi-threaded web servers, video games, and parallel processing applications.

Add your answer

Q208. Any base to any base conversion i.e base 11 to base 7

Ans.

Converting a number from base 11 to base 7 involves dividing the number by 7 and keeping track of remainders.

  • Divide the number in base 11 by 7 and keep track of remainders

  • Repeat the process with the quotient until it becomes 0

  • The remainders obtained in reverse order will give the number in base 7

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q209. Write complete code for the number of ways a frog can reach nth step by jumping 1 or 2 steps

Add your answer

Q210. Write a C/C++ function for removing extra spaces in given sentence

Ans.

C/C++ function to remove extra spaces in a sentence

  • Use a loop to iterate through each character in the sentence

  • If a space is encountered, check if the next character is also a space

  • If yes, remove the extra space and shift the remaining characters to the left

  • Return the modified sentence

Add your answer

Q211. WHAT IS SIEVE OF ERATOSTHENESE

Ans.

Sieve of Eratosthenes is an algorithm for finding all prime numbers up to a given limit.

  • Algorithm eliminates multiples of each prime number starting from 2

  • Remaining numbers are prime

  • Example: Finding prime numbers up to 30 - 2, 3, 5, 7, 11, 13, 17, 19, 23, 29

Add your answer

Q212. Intersection of two lines in a plane, if they intersect- determine the point of intersection

Ans.

Intersection of two lines in a plane can be determined by solving the equations of the lines simultaneously.

  • To find the point of intersection, set the equations of the two lines equal to each other and solve for the variables.

  • If the lines are in slope-intercept form (y = mx + b), set the two equations equal to each other and solve for x and y.

  • If the lines are in standard form (Ax + By = C), solve the system of equations to find the point of intersection.

Add your answer

Q213. breaking a sentence into array of words and returning the base address

Ans.

The task is to break a sentence into an array of words and return the base address.

  • Use a loop to iterate through the sentence character by character

  • Identify word boundaries based on spaces or punctuation marks

  • Allocate memory for each word and copy the characters into the corresponding array element

  • Return the base address of the array

Add your answer

Q214. How google handles 1 billion request in 1msec

Add your answer

Q215. Replace a string with another string in a paragraph

Ans.

This function replaces a specified string with another string in a given paragraph.

  • Use the replace() method to replace the string.

  • Pass the original string, the string to be replaced, and the replacement string as arguments to the replace() method.

  • The replace() method returns a new string with the replacements made.

Add your answer

Q216. Write code for inverted index for MapReduce. Mapper and Reducer Functions

Add your answer

Q217. why are you increasing fast pointer by 2 only

Add your answer

Q218. Adobe product integration experience if any

Ans.

Yes, I have extensive experience in integrating Adobe products.

  • I have worked on integrating Adobe Analytics with various websites to track user behavior and improve user experience.

  • I have also integrated Adobe Campaign with Salesforce to streamline marketing campaigns and improve lead generation.

  • In addition, I have experience integrating Adobe Experience Manager with other content management systems to improve content delivery and management.

  • I am familiar with Adobe's APIs an...read more

Add your answer

Q219. What is a graphic card and its use?

Ans.

A graphic card is a hardware component that enhances the visual performance of a computer by rendering images and videos.

  • It is responsible for rendering and displaying images on the monitor.

  • It has its own processor and memory to handle graphics-intensive tasks.

  • It is used in gaming, video editing, and other graphic-intensive applications.

  • Examples include NVIDIA GeForce and AMD Radeon graphics cards.

Add your answer

Q220. Merge K-Sorted Linked List

Ans.

Merge K-Sorted Linked List

  • Create a min heap of size k

  • Insert the first element of each linked list into the heap

  • Pop the minimum element from the heap and add it to the result list

  • Insert the next element from the linked list of the popped element into the heap

  • Repeat until all elements are processed

Add your answer

Q221. Implement a stack such that push,pop and find_max functions have O(1) time complexity

Ans.

Implement a stack with O(1) push, pop and find_max functions.

  • Use two stacks, one for storing the elements and the other for storing the maximum element at each level

  • When pushing an element, compare it with the top element of the maximum stack and push the maximum of the two

  • When popping an element, pop from both stacks

  • When finding the maximum element, return the top element of the maximum stack

Add your answer

Q222. How does fbpropher forecasting model works and how is can be used to forecsst trafffic

Ans.

fbprophet is a forecasting model developed by Facebook that uses time series data to make predictions.

  • fbprophet is an open-source forecasting tool developed by Facebook's Core Data Science team.

  • It is based on an additive model where non-linear trends are fit with yearly, weekly, and daily seasonality, plus holiday effects.

  • fbprophet can be used to forecast traffic by providing historical data on traffic patterns and using the model to predict future trends.

  • It allows users to e...read more

Add your answer

Q223. 35)Size of structure. Small c outputs on union , enums etc

Ans.

The size of a structure in C depends on the size of its members, including unions and enums.

  • The size of a structure is determined by the sum of the sizes of its members.

  • Unions share the same memory space, so the size of a union is equal to the size of its largest member.

  • Enums are typically represented as integers, so their size depends on the size of an integer in the system.

Add your answer

Q224. What are the risks in fixed income?

Ans.

Risks in fixed income include interest rate risk, credit risk, inflation risk, and liquidity risk.

  • Interest rate risk: Fluctuations in interest rates can impact the value of fixed income securities.

  • Credit risk: The risk of the issuer defaulting on their debt obligations.

  • Inflation risk: The risk that inflation will erode the purchasing power of fixed income investments.

  • Liquidity risk: The risk that you may not be able to sell a fixed income security quickly without incurring a ...read more

Add your answer

Q225. Explain cross sell specific examples in adobe

Ans.

Cross-selling in Adobe refers to offering additional products or services to customers based on their previous purchases or interests.

  • Cross-selling can be done through personalized recommendations on the website or in email campaigns.

  • For example, if a customer purchases Adobe Photoshop, they may be offered a discount on Adobe Illustrator.

  • Another example is offering a bundle deal for multiple Adobe products based on the customer's interests.

  • Cross-selling can also be done throu...read more

Add your answer
Asked in
SDE Interview

Q226. Solution for solving problems generated by virtual functions

Ans.

Virtual functions can cause problems due to their dynamic nature, but can be solved using various techniques.

  • Use pure virtual functions to ensure all derived classes implement the function

  • Use interface classes to define a common interface for all derived classes

  • Use smart pointers to manage memory and avoid memory leaks

  • Use virtual destructors to ensure proper destruction of objects

  • Avoid excessive use of virtual functions to improve performance

Add your answer

Q227. Advantages and disadvantages of quick sort and merge sort

Ans.

Quick sort is faster on average but merge sort is more stable and guarantees O(n log n) time complexity.

  • Quick sort has an average time complexity of O(n log n) and is in-place, but worst-case time complexity of O(n^2).

  • Merge sort has a stable time complexity of O(n log n) but requires extra space for merging.

  • Quick sort is not stable, while merge sort is stable.

  • Quick sort is often preferred for arrays with a large number of elements, while merge sort is preferred for linked lis...read more

Add your answer

Q228. getMax() function for a queue in O(1)

Ans.

To get max element from a queue in O(1) time complexity

  • Maintain a separate variable to keep track of the maximum element in the queue

  • Update the maximum element variable whenever a new element is added or removed from the queue

  • Return the maximum element variable when getMax() function is called

Add your answer

Q229. 1.Blue screen of death 2. Difference between ipv4 and ipv6 3. Mac address 4. Ip address 5. Virtualisation 6. What do you understand by cookies on website

Ans.

Technical support interview questions on Blue screen of death, IPv4 vs IPv6, MAC address, IP address, virtualisation, and cookies on websites.

  • Blue screen of death is an error screen displayed on Windows operating systems when a system error occurs.

  • IPv4 and IPv6 are both internet protocol versions used to identify devices on a network, but IPv6 has a larger address space and better security features.

  • MAC address is a unique identifier assigned to network interfaces for communic...read more

Add your answer

Q230. two candles which were of random size, and what is the time to burn one candle completely

Ans.

The time to burn one candle completely depends on the size of the candles and the rate at which they burn.

  • The time to burn one candle completely is directly proportional to the size of the candle.

  • The rate at which a candle burns can vary based on factors like the material of the candle, the wick, and the environment.

  • For example, a larger candle may take longer to burn completely compared to a smaller candle, even if they are both made of the same material.

Add your answer

Q231. Explain how you can improve a b2b and b2c product of your choice

Ans.

To improve a B2B and B2C product, focus on enhancing user experience, adding new features, and optimizing pricing strategies.

  • Conduct user research to understand pain points and preferences of both B2B and B2C customers.

  • Implement user-friendly interfaces and streamline processes to improve overall user experience.

  • Introduce new features or functionalities based on customer feedback and market trends.

  • Optimize pricing strategies to attract and retain customers from both B2B and B...read more

Add your answer

Q232. there is array of n numbers & u hv to find sum(=0) of m numbers

Ans.

Given an array of numbers, find a subset of numbers whose sum is zero.

  • Use a combination of numbers from the array to find subsets whose sum is zero.

  • Iterate through all possible combinations of numbers and check if their sum is zero.

  • Consider using recursion or backtracking to generate all possible combinations.

  • Optimize the solution by using memoization or dynamic programming to avoid redundant calculations.

Add your answer

Q233. Explain virtual memory and how mapping is done

Add your answer

Q234. What do you review in sow

Ans.

SOW review includes scope, deliverables, timelines, milestones, payment terms, and legal terms.

  • Scope of work

  • Deliverables

  • Timelines

  • Milestones

  • Payment terms

  • Legal terms

Add your answer

Q235. given two nodes of a binary tree, find their first common ancestor

Ans.

Find the first common ancestor of two nodes in a binary tree.

  • Traverse the tree from the root node and check if both nodes are in the left or right subtree of the current node.

  • If they are in different subtrees, then the current node is the first common ancestor.

  • If they are in the same subtree, continue traversing that subtree until they are in different subtrees.

  • If one of the nodes is the ancestor of the other, return the ancestor node.

  • If one of the nodes is not in the tree, r...read more

Add your answer

Q236. 1. Binary tree traversal 2. Multiply 2 big numbers represented in the form of string. 3. Detect the k-th node from the back of a linked list.

Ans.

Questions on binary tree traversal, multiplying big numbers represented as strings, and detecting k-th node from the back of a linked list.

  • Binary tree traversal can be done in three ways: in-order, pre-order, and post-order.

  • To multiply two big numbers represented as strings, you can use the grade-school algorithm or Karatsuba algorithm.

  • To detect the k-th node from the back of a linked list, you can use two pointers approach or find the length of the list first.

Add your answer

Q237. given a directory, list all unique filenames inside that directory, in minimum time

Ans.

To list all unique filenames in a directory in minimum time.

  • Use a hash set to store unique filenames

  • Iterate through each file in the directory

  • Check if the filename is already in the hash set, if not, add it

  • Return the hash set as an array of strings

Add your answer

Q238. What happened in Microsoft last round?

Add your answer

Q239. Explain insertion sort,quicksort

Ans.

Insertion sort and quicksort are sorting algorithms used to sort arrays of data.

  • Insertion sort: iterates through the array and inserts each element into its proper position.

  • Quicksort: selects a pivot element and partitions the array into two sub-arrays, one with elements less than the pivot and one with elements greater than the pivot.

  • Insertion sort is best for small arrays, while quicksort is best for large arrays.

  • Both algorithms have an average time complexity of O(n log n)...read more

Add your answer

Q240. Optimize a program to find duplicate no in array of n numbrs

Add your answer

Q241. What is virtual memory and thrashing

Ans.

Virtual memory is a memory management technique that allows the computer to use secondary storage as an extension of RAM.

  • Virtual memory is a combination of RAM and disk space.

  • It allows the computer to run more programs than it has physical RAM for.

  • When a program needs more memory than is available in RAM, the operating system moves some data from RAM to disk, freeing up space for other programs.

  • This swapping of data between RAM and disk is known as paging.

  • Thrashing occurs whe...read more

Add your answer

Q242. SEARCH AN ELEMENT IN ROTATED SORTED LINKLIST .

Ans.

Search for an element in a rotated sorted linked list.

  • Find the pivot point where the list is rotated.

  • Divide the list into two sublists based on the pivot point.

  • Perform binary search on the appropriate sublist.

  • Handle edge cases such as empty list and list with only one element.

Add your answer

Q243. Operating on images in parallel

Ans.

Operating on images in parallel involves dividing the image into smaller parts and processing them simultaneously.

  • Divide the image into smaller parts using techniques like tiling or splitting

  • Use parallel processing techniques like multi-threading or GPU acceleration

  • Combine the processed parts to form the final image

  • Examples: image segmentation, object detection, image enhancement

Add your answer

Q244. Hardware engines support for parallelism

Ans.

Hardware engines support parallelism through multiple cores and threads.

  • Hardware engines can have multiple cores and threads to execute tasks simultaneously.

  • Parallelism can improve performance and efficiency in hardware-based tasks.

  • Examples include GPUs, FPGAs, and ASICs that have parallel processing capabilities.

  • Hardware parallelism can also be achieved through distributed computing and clustering.

  • Programming languages and frameworks like OpenCL and CUDA can be used to lever...read more

Add your answer

Q245. Find least common ancestor in BST and then in binary tree

Ans.

The least common ancestor (LCA) is the lowest node that has both given nodes as descendants.

  • For a binary search tree (BST), the LCA can be found by comparing the values of the nodes with the given nodes.

  • For a binary tree, the LCA can be found by recursively searching for the nodes in the left and right subtrees.

  • If one of the given nodes is the ancestor of the other, it is considered as the LCA.

Add your answer

Q246. Loop in a list and how to find out

Add your answer

Q247. 3)Reversing a singly linked list and double linked list

Ans.

Reversing a singly linked list involves changing the direction of pointers, while reversing a doubly linked list involves swapping the previous and next pointers.

  • For singly linked list: iterate through the list and change the direction of pointers to reverse the list.

  • For doubly linked list: swap the previous and next pointers of each node to reverse the list.

  • Example for singly linked list: 1 -> 2 -> 3 -> 4 -> null, after reversing: 4 -> 3 -> 2 -> 1 -> null

  • Example for doubly l...read more

Add your answer

Q248. 27) Producer Consumer semaphore code using semwait and semsignal

Ans.

Producer Consumer semaphore code using semwait and semsignal

  • Use semaphores to control access to shared buffer between producer and consumer

  • Producer signals when it adds an item to the buffer using semsignal

  • Consumer waits for signal from producer before consuming item using semwait

Add your answer

Q249. Any upsell or cross sell experience

Ans.

Yes, I have experience in upselling and cross-selling.

  • I have successfully upsold additional services to existing clients, resulting in increased revenue.

  • I have cross-sold complementary products to customers, resulting in higher customer satisfaction and repeat business.

  • I have trained sales teams on effective upselling and cross-selling techniques.

  • I have analyzed customer data to identify opportunities for upselling and cross-selling.

  • For example, at my previous company, I iden...read more

Add your answer

Q250. Copy a stack into another stack without using an intermediate stack or array

Add your answer

Q251. Find max 3 digits from an array consist of both negative and positive number

Ans.

Find the maximum 3-digit number from an array of both negative and positive numbers.

  • Iterate through the array and keep track of the 3 largest positive numbers.

  • Iterate through the array and keep track of the 3 smallest negative numbers.

  • Compare the largest positive numbers with the smallest negative numbers to find the maximum 3-digit number.

Add your answer

Q252. Puzzles like find 3 hat problem guess the color of hat.

Ans.

The 3 hat problem involves guessing the color of your own hat based on the colors of hats worn by others.

  • Each person can see the colors of the hats of the people in front of them, but not their own hat color.

  • By analyzing the guesses and hat colors of others, one can deduce their own hat color.

  • Communication and logical reasoning are key to solving this puzzle.

Add your answer

Q253. convert a binary number into base 64 integer

Ans.

Convert binary number to base 64 integer

  • Divide the binary number into groups of 6 bits

  • Convert each group of 6 bits to decimal

  • Map the decimal value to the corresponding base 64 character

  • Concatenate the base 64 characters to form the final integer

Add your answer

Q254. List Balance sheet items for a Tech company.

Ans.

Balance sheet items for a Tech company include cash, accounts receivable, inventory, property, plant, and equipment, and intangible assets.

  • Cash

  • Accounts receivable

  • Inventory

  • Property, plant, and equipment

  • Intangible assets

Add your answer

Q255. How can Logistic regression be applied for multiclasstext classification

Ans.

Logistic regression can be applied for multiclasstext classification by using one-vs-rest or softmax approach.

  • One-vs-rest approach: Train a binary logistic regression model for each class, treating it as the positive class and the rest as the negative class.

  • Softmax approach: Use the softmax function to transform the output of the logistic regression into probabilities for each class.

  • Evaluate the model using appropriate metrics such as accuracy, precision, recall, and F1 score...read more

Add your answer

Q256. 3Sum (no. of triplets whose sum is <= target)

Ans.

Find number of triplets in array whose sum is less than or equal to target.

  • Sort the array in ascending order.

  • Use three pointers to iterate through the array and find triplets.

  • Update pointers based on sum of triplets and target value.

Add your answer

Q257. Where are static variables stored?

Add your answer

Q258. Given a series of pictorial figures, find the next figure

Ans.

The answer cannot be determined without additional information.

  • There must be a pattern or rule to follow in the series of pictorial figures

  • Without knowing the pattern or rule, it is impossible to determine the next figure

  • Examples of patterns could include rotation, reflection, or addition of elements

Add your answer

Q259. Implement a contiguous 2-d matrix dynamically in C

Ans.

To implement a contiguous 2-d matrix dynamically in C, you can use a single-dimensional array and calculate the index based on row and column.

  • Allocate memory for the matrix using malloc or calloc

  • Access elements using a formula: index = (row * numColumns) + column

  • Free the memory after use to avoid memory leaks

Add your answer

Q260. Complete code and he ran it for a 4×4 matrix

Ans.

The interviewee was asked to complete code for a 4x4 matrix and run it.

  • Ensure the code initializes a 4x4 matrix

  • Check for any syntax errors or logical mistakes

  • Run the code to verify the output

Add your answer

Q261. CM of some states and latest android version

Ans.

The question is about the Chief Ministers of some states and the latest Android version.

  • The Chief Minister of Maharashtra is Uddhav Thackeray.

  • The Chief Minister of Tamil Nadu is M.K. Stalin.

  • The latest Android version is Android 12.

Add your answer

Q262. Declare a 2D array using pointer notation

Add your answer

Q263. Memory protection in OS?

Ans.

Memory protection is a feature of an operating system that prevents unauthorized access to memory locations.

  • Memory protection is achieved through the use of memory management units (MMUs) and virtual memory.

  • MMUs map virtual addresses to physical addresses and enforce access permissions.

  • Virtual memory allows the OS to allocate memory to processes in a way that isolates them from each other.

  • Examples of memory protection mechanisms include segmentation, paging, and access contro...read more

Add your answer

Q264. Difference between process and thread

Ans.

A process is an instance of a program, while a thread is a unit of execution within a process.

  • A process is an independent entity that runs in its own memory space, while threads share the same memory space within a process.

  • Processes have their own resources, such as file handles and memory, while threads share these resources.

  • Processes are heavyweight and have higher overhead, while threads are lightweight and have lower overhead.

  • Processes provide better isolation and securit...read more

Add your answer

Q265. Write a Recursive function to reverse a link list

Add your answer

Q266. make api flow and create with help of design pattern for ui and ux testing

Ans.

The answer to the question is provided below.

  • To create an API flow, start by identifying the endpoints and their functionalities.

  • Design the UI and UX testing by using appropriate design patterns like MVC or MVVM.

  • Implement the API calls and handle the responses using networking libraries like Alamofire.

  • Use XCTest or UI Testing frameworks for automated UI and UX testing.

  • Mock the API responses for testing purposes using tools like OHHTTPStubs or Swifter.

  • Ensure proper error handl...read more

Add your answer

Q267. What is cookies? and how to implement OAuth

Ans.

Cookies are small pieces of data stored on a user's device by a website, used for tracking and authentication. OAuth is a protocol for authorization.

  • Cookies are used to store user information on the client side, such as login credentials or preferences

  • OAuth is implemented by registering an application with the OAuth provider, obtaining client credentials, and redirecting users to the provider for authentication

  • After authentication, the provider issues an access token to the a...read more

Add your answer

Q268. design a class to implement search & insert for it

Ans.

Design a class to implement search & insert for an array of strings

  • Create a class with methods for search and insert

  • Use an array to store the strings

  • Implement a search method that iterates through the array and returns the index of the found string

  • Implement an insert method that adds a new string to the array

Add your answer

Q269. Implement a push pop operations in a stack

Add your answer

Q270. 25) Merge two sorted linked list without using extra memory

Add your answer

Q271. Write a pseudo code for Singleton Pattern

Add your answer

Q272. what are the tools you have used?

Ans.

I have used a variety of tools including project management software, communication tools, and data analysis tools.

  • Project management software (e.g. Microsoft Project, Asana)

  • Communication tools (e.g. Slack, Microsoft Teams)

  • Data analysis tools (e.g. Excel, Tableau)

Add your answer

Q273. OS support for parallelism

Ans.

Modern OSes support parallelism through multi-core processors and threading.

  • Modern OSes like Windows, macOS, and Linux support parallelism through multi-core processors and threading.

  • Parallelism can be achieved through processes or threads.

  • Parallelism can improve performance and efficiency of software.

  • Examples of parallel programming frameworks include OpenMP and MPI.

Add your answer

Q274. 29) Allocate two dimensional matrix using new

Ans.

Allocate a two-dimensional matrix using the 'new' keyword.

  • Use the 'new' keyword to dynamically allocate memory for the matrix.

  • Specify the number of rows and columns in the matrix.

  • Access elements using the row and column indices.

  • Remember to deallocate the memory using 'delete' when done.

Add your answer

Q275. Random Pointer in Linked list. Clone it

Ans.

Cloning a linked list with random pointers.

  • Create a copy of each node and insert it next to the original node.

  • Update the random pointers of the copied nodes to point to the corresponding copied nodes.

  • Separate the original and copied nodes to get the cloned linked list.

Add your answer

Q276. 7) Maximum of three numbers using ternary operator

Ans.

Using ternary operator to find the maximum of three numbers

  • Use ternary operator to compare the first two numbers, then compare the result with the third number

  • Example: int max = (a > b) ? ((a > c) ? a : c) : ((b > c) ? b : c);

Add your answer

Q277. 31)Second largest element in a given array

Ans.

Find the second largest element in a given array of strings.

  • Sort the array in descending order.

  • Access the element at index 1 to get the second largest element.

  • Handle cases where there may be duplicates or less than 2 elements in the array.

Add your answer

Q278. Difficult scenarios and how to tackle them

Ans.

Handling difficult scenarios is crucial in sales management. It requires quick thinking and problem-solving skills.

  • Stay calm and composed

  • Listen actively to understand the issue

  • Offer solutions or alternatives

  • Seek feedback and learn from the experience

Add your answer

Q279. What's the formula for WACC?

Ans.

WACC is calculated by taking the weighted average of the cost of equity and the cost of debt, with weights representing the proportion of equity and debt in the company's capital structure.

  • WACC = (E/V) * Re + (D/V) * Rd * (1 - Tc)

  • E/V represents the proportion of equity in the company's capital structure

  • Re is the cost of equity

  • D/V represents the proportion of debt in the company's capital structure

  • Rd is the cost of debt

  • Tc is the corporate tax rate

  • Example: If a company has 70% ...read more

Add your answer

Q280. Find a 3 digit Number abc such that abc=a!+b!+c!

Ans.

A 3 digit number abc is to be found such that abc=a!+b!+c!

  • The maximum value of a!+b!+c! for a 3 digit number is 9!+9!+9!= 2,177,280

  • Therefore, we can start by checking all numbers from 100 to 999

  • Calculate the factorials of each digit and check if their sum equals the number itself

  • The only solution is 145, as 1!+4!+5!=145

Add your answer

Q281. Diamond heirarchy problem

Ans.

Diamond hierarchy problem is a problem in object-oriented programming where a class inherits from multiple classes in a diamond-shaped hierarchy.

  • Occurs when a class inherits from two classes that share a common base class

  • Can lead to ambiguity in method calls and data members

  • Solved using virtual inheritance or by using interfaces

Add your answer

Q282. Length and breadth about the respective Adobe product

Ans.

Adobe product refers to a range of software solutions developed by Adobe Inc. for creative professionals and businesses.

  • Adobe Creative Cloud includes popular products like Photoshop, Illustrator, and InDesign.

  • Adobe Experience Cloud offers solutions for marketing, analytics, and advertising.

  • Adobe Document Cloud includes tools like Adobe Acrobat and Adobe Sign for document management and e-signatures.

Add your answer

Q283. Define Process &thread

Ans.

Process is an instance of a program while thread is a subset of a process that can run concurrently with other threads.

  • A process is a program in execution

  • A process can have multiple threads

  • Threads share the same memory space as the process

  • Threads can run concurrently with other threads within the same process

  • Examples of processes include web browsers, word processors, and media players

  • Examples of threads include GUI thread, network thread, and background thread

Add your answer

Q284. Finish the react application with the given functionalities

Ans.

The react application needs to be completed with given functionalities.

  • Implement state management using Redux or Context API

  • Create components for different sections of the application

  • Fetch data from an API and display it in the application

  • Add routing using React Router for navigation

  • Implement form handling for user input

Add your answer

Q285. encode and decode string without using any delimiter

Ans.

Encode and decode a string without using any delimiter.

  • Use a unique character to represent the start and end of each string in the array.

  • Keep track of the length of each string to properly decode it.

  • Example: ['hello', 'world'] can be encoded as '#hello#world#' without using delimiters.

Add your answer

Q286. first occurence of given number in sorted array

Ans.

Find the first occurrence of a given number in a sorted array.

  • Use binary search to efficiently find the first occurrence of the number.

  • Keep track of the index of the first occurrence as you search through the array.

  • Return the index of the first occurrence once found.

Add your answer

Q287. What is Load Balancer?

Add your answer

Q288. Spiral order traversal of a matrix.

Ans.

Spiral order traversal of a matrix is a way to visit all elements in a matrix in a spiral pattern.

  • Start by traversing the outermost layer of the matrix from left to right, top to bottom, right to left, and bottom to top.

  • Continue this pattern for each inner layer until all elements are visited.

  • Keep track of the boundaries of the matrix to know when to stop.

Add your answer

Q289. How can photoshop increase market share

Ans.

Photoshop can increase market share by expanding into new industries, offering more affordable pricing options, and improving user experience.

  • Expand into new industries such as web design, digital marketing, and e-commerce to reach a wider audience.

  • Offer more affordable pricing options for individual users, small businesses, and educational institutions to attract new customers.

  • Improve user experience by simplifying the interface, adding new features based on user feedback, a...read more

Add your answer

Q290. Creating flow of api implementation using design patterns and unittesting

Ans.

The flow of API implementation can be designed using design patterns and unit testing.

  • Identify the design patterns suitable for the API implementation

  • Create a flow diagram to visualize the steps involved

  • Implement the API using the chosen design patterns

  • Write unit tests to ensure the functionality and reliability of the API

  • Refactor and optimize the code as needed

Add your answer

Q291. Tower of hanoi?

Ans.

Tower of Hanoi is a mathematical puzzle that involves moving a stack of disks from one peg to another.

  • The puzzle consists of three pegs and a number of disks of different sizes.

  • The objective is to move the entire stack to another peg, obeying the following simple rules:

  • - Only one disk can be moved at a time.

  • - Each move consists of taking the upper disk from one of the stacks and placing it on top of another stack or on an empty peg.

  • - No disk may be placed on top of a smaller ...read more

Add your answer

Q292. Find left view of binary tree. Two sum problem

Ans.

Left view of a binary tree is the set of nodes visible when the tree is viewed from the left side.

  • Traverse the binary tree level by level using BFS or DFS.

  • Keep track of the first node encountered at each level (leftmost node).

  • Store the leftmost nodes in an array to get the left view of the binary tree.

Add your answer

Q293. Implement stack using queue

Ans.

Implementing stack using queue involves using two queues to simulate stack behavior.

  • Create two queues, q1 and q2.

  • Push operation: Enqueue the element to q1.

  • Pop operation: Dequeue all elements from q1 to q2 except the last element. Dequeue and return the last element.

  • Swap the names of q1 and q2 after each pop operation.

  • Top operation: Return the last element of q1 without dequeuing it.

  • isEmpty operation: Check if both q1 and q2 are empty.

Add your answer

Q294. WRITE A GENERIC SWAP FUNCTION

Ans.

A generic swap function swaps two values of any data type.

  • The function should take two parameters of any data type.

  • Use a temporary variable to store the value of one parameter.

  • Assign the value of the second parameter to the first parameter.

  • Assign the value of the temporary variable to the second parameter.

Add your answer

Q295. Why inheritance is used.

Add your answer

Q296. 2)Lowest common ancestor of a BST

Ans.

The lowest common ancestor of a Binary Search Tree (BST) is the node that is the closest common ancestor of two given nodes.

  • Traverse the BST starting from the root node

  • Compare the values of the two given nodes with the current node's value

  • If both nodes are on the same side of the current node, move to that side

  • If the nodes are on different sides, the current node is the lowest common ancestor

Add your answer

Q297. 9)Middle of linked list in one traversal

Ans.

To find the middle of a linked list in one traversal, use two pointers - one moving at double the speed of the other.

  • Use two pointers - slow and fast, with fast moving twice as fast as slow

  • When fast reaches the end, slow will be at the middle of the linked list

Add your answer

Q298. 10) evaluation of a prefix expression

Ans.

Evaluation of a prefix expression involves evaluating operators before operands.

  • Start from the rightmost element and move towards the left.

  • When encountering an operator, apply it to the next two elements in the expression.

  • Repeat until the entire expression is evaluated.

  • Example: + * 2 3 4 would be evaluated as (2 * 3) + 4 = 10.

Add your answer

Q299. 32) Implement queue using two stacks

Ans.

Implement a queue using two stacks

  • Use two stacks to simulate the behavior of a queue

  • One stack for enqueue operation and another for dequeue operation

  • When dequeue is called, check if the second stack is empty, if so, transfer elements from the first stack

Add your answer

Q300. Calculate Fibonacci for nth term

Ans.

The Fibonacci sequence is a series of numbers in which each number is the sum of the two preceding ones.

  • The Fibonacci sequence starts with 0 and 1.

  • Each subsequent number is the sum of the two preceding numbers.

  • The formula to calculate the nth term of the Fibonacci sequence is F(n) = F(n-1) + F(n-2).

  • For example, the 6th term of the Fibonacci sequence is 8, as 0 + 1 + 1 + 2 + 3 + 5 = 8.

Add your answer
1
2
3
4
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Om Sweets

based on 156 interviews
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 833 Interview Questions
3.9
 • 396 Interview Questions
3.8
 • 354 Interview Questions
4.1
 • 281 Interview Questions
4.1
 • 216 Interview Questions
3.4
 • 178 Interview Questions
View all
Top Adobe Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter