Filter interviews by
Use two pointers to iterate through the list and remove duplicates by updating next pointers
Initialize two pointers, current and next, to iterate through the list
Compare current and next node values, if equal, update next pointer to skip duplicate node
Repeat until end of list is reached
To delete a node in a single linked list, update the previous node's next pointer to skip over the node to be deleted.
Traverse the linked list to find the node to be deleted
Update the previous node's next pointer to skip over the node to be deleted
Free the memory allocated to the node to be deleted
malloc is used to allocate memory without initializing it, while calloc is used to allocate memory and initialize it to zero.
malloc allocates a block of memory of specified size, while calloc allocates a block of memory for an array of elements and initializes them to zero
malloc does not initialize the allocated memory, while calloc initializes the allocated memory to zero
malloc returns a pointer to the allocated ...
Addition and deletion operations in a linked list using C coding
Use a struct to define the linked list node
For addition, allocate memory for new node, update pointers accordingly
For deletion, update pointers to skip the node to be deleted
Insert a node to the middle of a linked list
Find the middle node using slow and fast pointers
Create a new node with the data to be inserted
Adjust the pointers to insert the new node in the middle
Overview of the registration call flow for MO/MT VoLTE calls in IMS architecture.
1. User Equipment (UE) initiates registration by sending a SIP REGISTER message to the IMS network.
2. The SIP REGISTER message includes the user's credentials and the desired service (VoLTE).
3. The IMS Core processes the registration request, authenticating the user via the HSS (Home Subscriber Server).
4. Upon successful authenticatio...
Volatile and extern are keywords in C for memory management. Local and external linkages determine scope. SW and HW interrupts handle events. Different scheduling algorithms manage task priorities.
Volatile keyword is used to indicate that a variable may be changed unexpectedly, typically by hardware. Example: volatile int x;
Extern keyword is used to declare a variable that is defined in another file. Example: exte...
I appeared for an interview in Apr 2024.
To delete a node in a single linked list, update the previous node's next pointer to skip over the node to be deleted.
Traverse the linked list to find the node to be deleted
Update the previous node's next pointer to skip over the node to be deleted
Free the memory allocated to the node to be deleted
Use two pointers to iterate through the list and remove duplicates by updating next pointers
Initialize two pointers, current and next, to iterate through the list
Compare current and next node values, if equal, update next pointer to skip duplicate node
Repeat until end of list is reached
Volatile and extern are keywords in C for memory management. Local and external linkages determine scope. SW and HW interrupts handle events. Different scheduling algorithms manage task priorities.
Volatile keyword is used to indicate that a variable may be changed unexpectedly, typically by hardware. Example: volatile int x;
Extern keyword is used to declare a variable that is defined in another file. Example: extern in...
I appeared for an interview in Feb 2024.
I appeared for an interview before Mar 2023.
Addition and deletion operations in a linked list using C coding
Use a struct to define the linked list node
For addition, allocate memory for new node, update pointers accordingly
For deletion, update pointers to skip the node to be deleted
malloc is used to allocate memory without initializing it, while calloc is used to allocate memory and initialize it to zero.
malloc allocates a block of memory of specified size, while calloc allocates a block of memory for an array of elements and initializes them to zero
malloc does not initialize the allocated memory, while calloc initializes the allocated memory to zero
malloc returns a pointer to the allocated memor...
I applied via Naukri.com and was interviewed before Nov 2022. There were 3 interview rounds.
I interviewed with Mediatek having just 1 year of experience. It was for outsourcing position.
They asked me concepts from C language, writing code for data structures (LinkedIn list), and a question on string which I can't remember. This was pre COVID days.
Insert a node to the middle of a linked list
Find the middle node using slow and fast pointers
Create a new node with the data to be inserted
Adjust the pointers to insert the new node in the middle
I applied via Naukri.com and was interviewed in Jun 2020. There were 4 interview rounds.
Overview of the registration call flow for MO/MT VoLTE calls in IMS architecture.
1. User Equipment (UE) initiates registration by sending a SIP REGISTER message to the IMS network.
2. The SIP REGISTER message includes the user's credentials and the desired service (VoLTE).
3. The IMS Core processes the registration request, authenticating the user via the HSS (Home Subscriber Server).
4. Upon successful authentication, th...
I applied via Naukri.com and was interviewed in Feb 2021. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed before May 2020. There were 3 interview rounds.
Top trending discussions
I appeared for an interview in Aug 2017.
I appeared for an interview in Aug 2017.
I lack experience in a specific technology required for the role.
I may not have experience with a specific programming language or framework mentioned in the job description.
I may not have worked on projects similar to what your company is working on.
I may not have experience with certain tools or technologies that are crucial for the role.
I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.
AC and DC are two types of electrical current with different characteristics.
AC stands for Alternating Current, while DC stands for Direct Current.
AC periodically changes direction, while DC flows in one direction.
AC is commonly used in household electrical systems, while DC is used in batteries and electronic devices.
AC can be easily transformed to different voltage levels using transformers, while DC requires convert...
Fill the cells in the pyramid
The pyramid is a pattern of numbers or characters arranged in a triangular shape
Each row of the pyramid has one more cell than the previous row
Start filling the pyramid from the top and move downwards
The cells can be filled with any desired numbers or characters
An alternator and generator are devices that convert mechanical energy into electrical energy.
Both alternators and generators are used to generate electricity.
They work on the principle of electromagnetic induction.
Alternators are commonly used in modern vehicles to charge the battery and power the electrical systems.
Generators are often used as backup power sources during power outages.
Examples of alternators include ...
Quick sort has an average and worst-case time complexity of O(n log n).
Quick sort is a divide-and-conquer algorithm.
It selects a pivot element and partitions the array around the pivot.
The average and worst-case time complexity is O(n log n).
However, in the worst-case scenario, it can have a time complexity of O(n^2).
I developed a mobile app for tracking daily water intake and hydration levels.
Researched best practices for hydration tracking
Designed user-friendly interface for inputting water intake
Implemented data visualization for tracking hydration levels
Tested app with focus groups for feedback
Continuously updated app based on user suggestions
SHA Algorithm is a cryptographic hash function that takes an input and produces a fixed-size output.
SHA stands for Secure Hash Algorithm.
It is widely used in various security applications and protocols.
SHA-1, SHA-256, SHA-384, and SHA-512 are common variants of SHA.
It generates a unique hash value for each unique input.
The output is a fixed length, regardless of the input size.
SHA is used for data integrity, password h...
To delete a node in a linked list, we need to adjust the pointers of the previous node and the next node.
Find the node to be deleted
Adjust the pointers of the previous node and the next node
Free the memory of the deleted node
I am a passionate software engineer with experience in developing web applications and a strong background in computer science.
Experienced in developing web applications using technologies like HTML, CSS, JavaScript, and React
Strong background in computer science with knowledge of data structures and algorithms
Proficient in programming languages such as Java, Python, and C++
Familiar with Agile development methodologies...
As an intern supervisor, I faced challenges in terms of communication, technical skills, and time management.
Communication barriers due to language or cultural differences
Lack of technical skills or knowledge required for the job
Difficulty in managing time and meeting deadlines
Inability to work independently or as part of a team
Resistance to feedback or constructive criticism
Limited exposure to real-world scenarios and...
I prefer a job place that offers a collaborative and innovative work environment.
Prefer a workplace that encourages teamwork and communication
Value opportunities for learning and growth
Seek a company that fosters creativity and innovation
I will solve disputes by promoting open communication, active listening, and finding mutually beneficial solutions.
Encourage open and honest communication between parties involved
Actively listen to each party's concerns and perspectives
Identify common goals and interests to find mutually beneficial solutions
Mediate discussions and facilitate negotiations if necessary
Document agreements and ensure follow-up to prevent f...
Qualcomm is a leading semiconductor and telecommunications equipment company.
Qualcomm is known for its expertise in wireless technologies and mobile chipsets.
They have developed popular Snapdragon processors used in smartphones and tablets.
Qualcomm has made significant contributions to the advancement of 5G technology.
The company has a strong patent portfolio and is involved in licensing its technology to other manufac...
Some of the top questions asked at the MediaTek India Technology interview for experienced candidates -
The duration of MediaTek India Technology interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 4 interview experiences
Difficulty level
Duration
based on 115 reviews
Rating in categories
Senior Engineer
120
salaries
| ₹15.2 L/yr - ₹27 L/yr |
Staff Engineer
90
salaries
| ₹28 L/yr - ₹48 L/yr |
Software Engineer
59
salaries
| ₹9 L/yr - ₹22 L/yr |
Senior Software Engineer
56
salaries
| ₹15.8 L/yr - ₹28 L/yr |
Technical Manager
40
salaries
| ₹24 L/yr - ₹68.8 L/yr |
Qualcomm
Molex
TDK India Private Limited
Applied Materials