i
Lam Research
Filter interviews by
I applied via Campus Placement and was interviewed in Sep 2022. There were 3 interview rounds.
Top trending discussions
I applied via Approached by Company and was interviewed before Apr 2023. There were 5 interview rounds.
Hacker rank test with easy level testing questions
Writing test cases for scenario and bug life cycle
Create test cases to cover all possible scenarios in the application
Include positive and negative test cases to ensure thorough testing
Document bug life cycle stages such as New, Assigned, In Progress, Resolved, Closed
Verify bug fixes and retest to ensure they are resolved properly
I applied via Referral and was interviewed in Jul 2024. There was 1 interview round.
Shared memory is a memory space that multiple processes can access and use to communicate with each other.
Shared memory allows multiple processes to share data without the need for inter-process communication mechanisms like pipes or sockets.
It is commonly used in parallel computing to improve performance by allowing processes to share data quickly.
Shared memory can be implemented using techniques like memory mapping o...
Write a member function to find the second largest number in an array.
Iterate through the array and keep track of the largest and second largest numbers.
Handle edge cases like when the array has less than 2 elements.
Consider sorting the array and returning the second last element for a simpler solution.
Core is the central or most important part of something. Determining the core involves identifying the key components or elements.
Core is the central or essential part of a system or object
To determine the core, identify the key components or elements that are crucial for the functionality or purpose of the system
In software QA, determining the core may involve identifying the critical features or functionalities that ...
Defect management systems track, prioritize, and resolve software issues throughout the development lifecycle.
Defects are reported by testers or users and logged into the system.
Each defect is assigned a priority level based on its impact on the software.
Defects are tracked from discovery to resolution, with status updates along the way.
Defect management systems help teams prioritize and allocate resources efficiently.
...
To add a file to Bitbucket, you can use the web interface or command line tools.
Navigate to the repository where you want to add the file
Click on the 'Add file' button or use 'git add' command to add the file
Commit the changes with a message describing the file addition
Push the changes to the remote repository
To check processes running in a Linux machine, you can use commands like ps, top, and htop.
Use 'ps' command to display information about processes
Use 'top' command to display dynamic real-time view of processes
Use 'htop' command for an interactive process viewer
I applied via Recruitment Consulltant and was interviewed in Apr 2024. There was 1 interview round.
It was hard and got tons of ds qs
I applied via Naukri.com and was interviewed before Aug 2022. There were 4 interview rounds.
Problem would be given to solve
Identify if a number is positive, negative, or zero
Check if the number is greater than 0 to determine if it is positive
Check if the number is less than 0 to determine if it is negative
If the number is neither greater nor less than 0, it is zero
I applied via LinkedIn and was interviewed in Jun 2021. There was 1 interview round.
References and pointers are both used to refer to memory locations, but references cannot be null and cannot be reseated.
Pointers can be null or uninitialized
Pointers can be reseated to point to a different memory location
References are automatically dereferenced
References cannot be used with arrays
Pointers can be used with arrays
References are necessary when passing large objects to functions or when returning objects from functions.
When passing large objects to functions
When returning objects from functions
When working with complex data structures
When implementing operator overloading
When working with polymorphism
Const pointers should be declared in the same scope as the variable they point to.
Declaring const pointers in the same scope as the variable they point to ensures that the pointer cannot be used to modify the variable.
If the pointer is only used within a function, it should be declared within that function.
If the pointer is used across multiple functions, it should be declared in a header file or at the top of the sour...
Copy constructor with pointers creates a new object by copying the values of the existing object's pointers.
Copy constructor is used to create a new object from an existing object.
Pointers in the new object point to the same memory locations as the original object.
Deep copy should be used to avoid shallow copy issues.
new and malloc are used for dynamic memory allocation in C++ and C respectively.
new is an operator in C++ while malloc is a function in C.
new automatically calls the constructor while malloc does not.
new returns a pointer to the object while malloc returns a void pointer.
new throws an exception if allocation fails while malloc returns NULL.
new can be overloaded while malloc cannot be.
new and delete are used together wh
A confusion matrix is a table that is often used to describe the performance of a classification model.
It is a matrix with rows representing the actual class and columns representing the predicted class.
It helps in evaluating the performance of a classification model by showing the number of correct and incorrect predictions.
It consists of four quadrants: True Positive, False Positive, True Negative, and False Negative...
Principal component analysis is a statistical technique used to reduce the dimensionality of data while preserving important information.
PCA is used to identify patterns in data and express it in a more easily understandable form.
It works by finding the directions (principal components) along which the variance of the data is maximized.
These principal components are orthogonal to each other, meaning they are uncorrelat...
Inventory policy is a set of guidelines for managing inventory levels, while inventory control method is the process of implementing those guidelines.
Inventory policy determines when to order new inventory and how much to order
Inventory control method involves tracking inventory levels, forecasting demand, and optimizing order quantities
Examples of inventory policies include Just-in-Time (JIT) and Economic Order Quanti...
Reverse logistics is the process of moving goods from their final destination back to the manufacturer or point of origin for resale, recycling, or disposal.
Involves returning products from customers to the manufacturer or retailer
Includes activities such as returns, refurbishment, recycling, or disposal
Helps in reducing waste and maximizing value from returned products
Examples: returning a defective product to the man
I was interviewed in Sep 2017.
Use bitwise operations to find the sum of two numbers without using mathematical operators.
Use bitwise XOR to find the sum of two numbers without carrying.
Use bitwise AND and left shift to find the carry.
Repeat the process until there is no carry left.
To delete a node from a linked list when only given a reference to the node, we can copy the data of the next node to the given node and delete the next node.
Copy the data of the next node to the given node
Update the next pointer of the given node to skip the next node
Delete the next node
I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.
UDP is preferred over TCP in this project due to its low latency and lightweight nature.
UDP is a connectionless protocol, which means it does not establish a direct connection between the sender and receiver.
UDP is faster than TCP as it does not have the overhead of establishing and maintaining a connection.
UDP is suitable for applications where real-time data transmission is crucial, such as video streaming or online ...
To clear the 7th bit in a 32-bit register, perform a bitwise AND operation with a mask that has all bits set to 1 except the 7th bit.
Create a mask with the 7th bit set to 0 and all other bits set to 1
Perform a bitwise AND operation between the register and the mask
Store the result back in the register
based on 1 review
Rating in categories
Senior Buyer
52
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Engineer Mechanical
51
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
49
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Electrical Engineer
40
salaries
| ₹0 L/yr - ₹0 L/yr |
Program Manager
37
salaries
| ₹0 L/yr - ₹0 L/yr |
Applied Materials
KLA
ASML
Entegris