MediaTek India Technology
10+ Vraj Global School Interview Questions and Answers
Q1. Middle of a Linked List
You are given the head node of a singly linked list. Your task is to return a pointer pointing to the middle of the linked list.
If there is an odd number of elements, return the middle ...read more
Q2. Remove duplicates from a string
Remove duplicates from a string
Convert string to char array
Create a HashSet to store unique characters
Iterate through char array and add to HashSet
Convert HashSet back to string
Q3. Write code to insert a node to the middle of linked list
Insert a node to the middle of a linked list
Find the middle node using slow and fast pointers
Create a new node with the data to be inserted
Adjust the pointers to insert the new node in the middle
Q4. what is CMOS inverter explain its funtionality?what is body bias effect? why MOS why not BJT? timing anylsis question
CMOS inverter is a digital logic gate that converts input signal to its complementary output signal.
CMOS inverter consists of a PMOS and an NMOS transistor connected in series.
When input is high, PMOS is off and NMOS is on, output is low.
When input is low, PMOS is on and NMOS is off, output is high.
Body bias effect is the change in threshold voltage of MOSFET due to variation in body voltage.
MOSFET is preferred over BJT due to its low power consumption and high input impedanc...read more
Q5. What is volatile and extern keywords in C ? What are local and external linkages ? What are SW and HW interrupts ? What are the different scheduling algorithms ?
Volatile and extern are keywords in C for memory management. Local and external linkages determine scope. SW and HW interrupts handle events. Different scheduling algorithms manage task priorities.
Volatile keyword is used to indicate that a variable may be changed unexpectedly, typically by hardware. Example: volatile int x;
Extern keyword is used to declare a variable that is defined in another file. Example: extern int y;
Local linkage restricts the scope of a variable to the...read more
Q6. You have a 3 ltr jug and 5 ltr jug measure 4lt water using this.
Use the 3 ltr jug to fill the 5 ltr jug twice, leaving 1 ltr in the 3 ltr jug. Then fill the 3 ltr jug and pour it into the 5 ltr jug.
Fill the 5 ltr jug twice with the 3 ltr jug
1 ltr will be left in the 3 ltr jug
Fill the 3 ltr jug and pour it into the 5 ltr jug
4 ltr of water will be in the 5 ltr jug
Q7. Speak 2 mins on square shaped egg
Square shaped egg is a hypothetical concept that defies the laws of nature.
Square shaped egg is not possible in reality due to the shape of the hen's reproductive system.
It is a popular topic in science fiction and fantasy literature.
In some cultures, square shaped eggs are considered a symbol of good luck or prosperity.
The concept of square shaped egg can be used as a metaphor for something that is impossible or unrealistic.
Q8. C Coding Question addition deletion of link list
Addition and deletion operations in a linked list using C coding
Use a struct to define the linked list node
For addition, allocate memory for new node, update pointers accordingly
For deletion, update pointers to skip the node to be deleted
Q9. Find the number of pairs with difference equal to given value k
Count pairs in an array with a given difference
Sort the array to easily find pairs
Use two pointers approach to find pairs with difference equal to k
Keep track of unique pairs to avoid duplicates
Q10. Delete duplicate elements in a sorted singly linked list
Use two pointers to iterate through the list and remove duplicates by updating next pointers
Initialize two pointers, current and next, to iterate through the list
Compare current and next node values, if equal, update next pointer to skip duplicate node
Repeat until end of list is reached
Q11. How to detect and correct burst errors
Burst errors can be detected and corrected using error detection and correction codes.
Use error detection codes like CRC (Cyclic Redundancy Check) to detect burst errors
Use error correction codes like Reed-Solomon codes to correct burst errors
Re-transmit the data if the error cannot be corrected
Implement error detection and correction algorithms in the communication protocol or data storage system
Q12. Is setup and hold uncertainty values are different
Yes, setup and hold uncertainty values are different in physical design engineering.
Setup uncertainty is related to the arrival time of the data signal at the input of the flip-flop, while hold uncertainty is related to the removal time of the data signal.
Setup time is the minimum amount of time the data input must be stable before the clock edge, while hold time is the minimum amount of time the data input must be stable after the clock edge.
Setup and hold times are critical...read more
Q13. Delete a node in a single linked list
To delete a node in a single linked list, update the previous node's next pointer to skip over the node to be deleted.
Traverse the linked list to find the node to be deleted
Update the previous node's next pointer to skip over the node to be deleted
Free the memory allocated to the node to be deleted
Q14. derefer a null pointer
Dereferencing a null pointer means trying to access the memory location pointed to by a null pointer.
Dereferencing a null pointer can lead to a segmentation fault or access violation.
Example: int *ptr = NULL; int value = *ptr; // This will result in a segmentation fault.
Q15. Diff between malloc and calloc
malloc is used to allocate memory without initializing it, while calloc is used to allocate memory and initialize it to zero.
malloc allocates a block of memory of specified size, while calloc allocates a block of memory for an array of elements and initializes them to zero
malloc does not initialize the allocated memory, while calloc initializes the allocated memory to zero
malloc returns a pointer to the allocated memory block, while calloc returns a pointer to the allocated a...read more
Q16. Differences between TDMA,CDMA,WCDMA,OFDM
TDMA, CDMA, WCDMA, and OFDM are different multiple access techniques used in communication systems.
TDMA (Time Division Multiple Access) divides the available frequency into time slots.
CDMA (Code Division Multiple Access) uses unique codes to differentiate between users.
WCDMA (Wideband Code Division Multiple Access) is an advanced version of CDMA.
OFDM (Orthogonal Frequency Division Multiplexing) divides the available frequency into subcarriers.
TDMA and CDMA are used in 2G netw...read more
Interview Process at Vraj Global School
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month