i
Advanced Micro Devices
Filter interviews by
Clear (1)
I applied via Naukri.com and was interviewed in Jun 2021. There were 3 interview rounds.
Top trending discussions
I was interviewed before Apr 2021.
Round duration - 60 minutes
Round difficulty - Easy
Technical Interview round with questions on OOPS and OS mainly.
Little Endian and Big Endian refer to the order in which bytes are stored in computer memory.
Little Endian stores the least significant byte first, while Big Endian stores the most significant byte first.
Little Endian is commonly used in x86 architecture, while Big Endian is used in architectures like SPARC and PowerPC.
Endianness can affect data transmission between systems with different byte orders.
Program to determine system's endianness
Check the endianness by storing a multi-byte integer and checking the byte order
Use bitwise operations to extract the least significant byte
If the least significant byte is at the lowest memory address, it's little-endian
If the least significant byte is at the highest memory address, it's big-endian
The volatile keyword in programming is used to indicate that a variable's value can be changed unexpectedly.
Volatile keyword is used in multithreaded programming to prevent compiler optimizations on variables that can be changed by other threads.
It tells the compiler not to cache the variable's value in a register, ensuring that every access is made to the variable's memory location.
Commonly used in embedded systems pr...
Function pointers in C are used to store the address of functions, allowing for dynamic function calls and callbacks.
Function pointers can be used to implement callbacks in event-driven programming.
They can be used to switch between different functions at runtime.
Function pointers are commonly used in implementing data structures like function pointers in an array of function pointers.
Example: void (*funcPtr)(int) = &a
Design a data structure for multi-threading
Use a thread-safe queue to manage tasks for each thread
Implement a lock or semaphore to control access to shared resources
Consider using condition variables for synchronization
Use atomic operations for shared variables to prevent race conditions
The kernel is the core component of an operating system that manages system resources and provides a bridge between software and hardware.
Manages system resources such as CPU, memory, and I/O devices
Provides a bridge between software applications and hardware components
Handles tasks such as process scheduling, memory management, and device drivers
Controls communication between hardware and software layers
A storage class in programming defines the scope and lifetime of variables.
Storage classes include auto, register, static, and extern.
Auto variables are created when a function is called and destroyed when the function ends.
Register variables are stored in CPU registers for faster access.
Static variables retain their value between function calls.
Extern variables are declared outside of any function and can be accessed
Round duration - 30 minutes
Round difficulty - Easy
HR round with typical behavioral problems.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I was interviewed before May 2016.
I was interviewed in Sep 2016.
I applied via Campus Placement
A program is a set of instructions that tells a computer what to do. A task is a unit of work performed by a program. A thread is a sequence of instructions within a task.
A program is a collection of instructions that are executed by a computer to perform a specific task.
A task is a unit of work that is performed by a program. It can be a specific action or a set of actions.
A thread is a sequence of instructions within...
To delete a node in a linked list, we need to adjust the pointers of the previous and next nodes.
Find the node to be deleted by traversing the linked list
Adjust the pointers of the previous and next nodes to skip the node to be deleted
Free the memory occupied by the node to be deleted
A function pointer is a variable that stores the address of a function. Volatile type is used to declare variables that can be modified by external factors.
Function pointers are used to pass functions as arguments to other functions.
Volatile type is used when a variable's value can be changed unexpectedly by external factors.
Function pointers can be used to implement callbacks or event handling mechanisms.
Volatile type...
Experienced software developer with expertise in Java, Python, and SQL
Proficient in Java, Python, and SQL programming languages
Developed web applications using Java Spring framework
Experience with database management and optimization using SQL
Worked on various software projects in a team environment
Swap even and odd bits in a given number
Create a mask for even bits and odd bits
Shift even bits to right and odd bits to left
Combine even and odd bits using bitwise OR operator
I was interviewed before May 2021.
Round duration - 60 Minutes
Round difficulty - Medium
Timing: Morning
How was the environment? It happened in the Computer Lab of my institution
All students were assigned a computer and we had to solve questions on hackerrank
Consider 'N' individuals numbered from 0 to N-1 standing in a queue. You are provided with two arrays: Height
and Infront
, each consisting of 'N' non-negative int...
The task is to find the actual order of people in a queue based on their heights and the number of taller people in front of them.
Iterate through the given arrays and create a list of tuples containing the height and number of taller people for each person.
Sort the list of tuples in descending order of height and ascending order of the number of taller people.
Create an empty result list and insert each tuple into the r...
Round duration - 60 Minutes
Round difficulty - Medium
Round was a mix of concepts from OOPS, OS and Problem Solving
Given a Binary Search Tree (BST) and a key value 'X', determine if there exists a node within the BST containing the value 'X'.
Consider the tree represe...
The task is to find if a given value is present in a Binary Search Tree (BST).
Start from the root node and compare the value with the target value.
If the value matches, return true.
If the target value is less than the current node value, move to the left child.
If the target value is greater than the current node value, move to the right child.
Repeat the process until a match is found or a leaf node is reached.
If a leaf...
Tip 1 : Try to code the data structures that you have learned to understand things better
Tip 2 : Try to solve the problem even if it is the worst possible solution you think and then try to optimize don't jump to get the
best possible solution
Tip 3 : Discuss things among peers it helps to improve the understanding, even try to teach someone anything new you learn, this is very helpful during the interviews as you will have habit of explaining things
Tip 1 : Try to be honest in the resume don't write something you don't know, most of the time it backfires.
Tip 2 : Try to make 2 good projects for cv and know about the challenges you can face on the project and think about how you can solve that challenge.
I applied via Company Website and was interviewed before May 2023. There was 1 interview round.
Questions related to digital and Analog electronics were asked
I applied via Approached by Company and was interviewed in Feb 2024. There were 3 interview rounds.
I have worked on projects related to developing software for autonomous vehicles and implementing machine learning algorithms for predictive maintenance.
Developed software for autonomous vehicles to improve navigation and obstacle avoidance
Implemented machine learning algorithms for predictive maintenance in manufacturing plants
Collaborated with cross-functional teams to integrate new technologies into existing systems
I have experience with Java, Python, SQL, AWS, Docker, and Kubernetes in my previous projects.
Java
Python
SQL
AWS
Docker
Kubernetes
Docker is a platform for developing, shipping, and running applications in containers.
Docker allows applications to be isolated in containers, making them portable and easy to deploy across different environments.
Containers share the host OS kernel but run as isolated processes, providing lightweight and efficient virtualization.
Docker simplifies the process of packaging applications and their dependencies, ensuring co...
Database normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Database normalization involves breaking down data into smaller, more manageable tables and defining relationships between them.
It helps in reducing data redundancy, improving data integrity, and making the database more efficient.
For example, in a project I worked on, we normalized the database by spl...
I have extensive experience working on challenging projects in various industries.
Led a team in developing a complex software solution for a major client
Managed a project with tight deadlines and limited resources
Implemented innovative solutions to overcome technical obstacles
Collaborated with cross-functional teams to deliver successful outcomes
I would approach learning about new domain and technologies with a different background by leveraging my existing skills, seeking out resources, and collaborating with experts in the field.
Identify key concepts and terminology in the new domain
Seek out online courses, tutorials, and books to gain foundational knowledge
Collaborate with colleagues or mentors who have experience in the new domain
Experiment with hands-on p...
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization is used to eliminate data redundancy by breaking up tables into smaller, related tables.
It helps in reducing data anomalies such as insertion, update, and deletion anomalies.
Normalization is achieved through a series of stages called normal forms, with the most common being First Normal Form (1NF)...
Armstrong algorithm is used to find Armstrong numbers in a given range.
Iterate through the numbers in the given range
Calculate the sum of cubes of each digit in the number
Check if the sum is equal to the original number
Senior Software Engineer
115
salaries
| ₹0 L/yr - ₹0 L/yr |
Member Technical Staff
82
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
71
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Development Engineer II
51
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Development Engineer
47
salaries
| ₹0 L/yr - ₹0 L/yr |
Intel
Nvidia
Broadcom
Micron Technology