One Convergence
10+ Chimera Technologies Interview Questions and Answers
Q1. Middle of a Linked List
You are given the head node of a singly linked list. Your task is to return a pointer pointing to the middle of the linked list.
If there is an odd number of elements, return the middle ...read more
Q2. Convert a Binary Search Tree (BST) to a Greater Sum Tree
Given a Binary Search Tree of integers, transform it into a Greater Sum Tree where each node's value is replaced with the sum of all node values greater ...read more
Q3. Flip Bits Problem Explanation
Given an array of integers ARR
of size N, consisting of 0s and 1s, you need to select a sub-array and flip its bits. Your task is to return the maximum count of 1s that can be obta...read more
Given an array of 0s and 1s, find the maximum count of 1s by flipping a sub-array at most once.
Iterate through the array and keep track of the maximum count of 1s obtained by flipping a sub-array.
Consider flipping a sub-array from index i to j and calculate the count of 1s in the resulting array.
Return the maximum count of 1s obtained by flipping a sub-array at most once.
Q4. Count Set Bits Problem Statement
Given a positive integer N
, compute the total number of '1's in the binary representation of all numbers from 1 to N. Return this count modulo 1e9+7 because the result can be ve...read more
Count the total number of set bits in the binary representation of numbers from 1 to N modulo 1e9+7.
Iterate through numbers from 1 to N and count the set bits in their binary representation
Use bitwise operations to count the set bits efficiently
Return the count modulo 1e9+7 for each test case
Q5. Longest Common Subsequence Problem Statement
Given two strings STR1
and STR2
, determine the length of their longest common subsequence.
A subsequence is a sequence that can be derived from another sequence by d...read more
The task is to find the length of the longest common subsequence between two given strings.
Implement a function to find the longest common subsequence between two strings.
Use dynamic programming to solve the problem efficiently.
Iterate through the strings and build a matrix to store the lengths of common subsequences.
Return the length of the longest common subsequence found.
Q6. Reverse the String Problem Statement
You are given a string STR
which contains alphabets, numbers, and special characters. Your task is to reverse the string.
Example:
Input:
STR = "abcde"
Output:
"edcba"
Input...read more
Reverse a given string containing alphabets, numbers, and special characters.
Iterate through the string from the end to the beginning and append each character to a new string.
Use built-in functions like reverse() or StringBuilder in languages like Python or Java for efficient reversal.
Handle special characters and numbers while reversing the string.
Ensure to consider the constraints provided in the problem statement.
Test your solution with different test cases to validate th...read more
Zombie, Orphan, and Daemon processes are different types of processes in operating systems.
Zombie process is a terminated process that has not been removed from the process table yet.
Orphan process is a child process whose parent process has terminated.
Daemon process is a background process that runs detached from the controlling terminal.
Memory layout of a C program includes sections like text, data, bss, heap, and stack.
The 'text' section contains the executable code of the program.
The 'data' section contains initialized global and static variables.
The 'bss' section contains uninitialized global and static variables.
The 'heap' is used for dynamic memory allocation.
The 'stack' is used for function call and local variables.
A bridge in networking is a device that connects two or more network segments, allowing them to communicate with each other.
Bridges operate at the data link layer of the OSI model.
They use MAC addresses to forward data between network segments.
Bridges help reduce network congestion by only forwarding data to the segment where the destination device is located.
Example: Connecting a wired LAN to a wireless LAN using a bridge.
NAT stands for Network Address Translation. It is used to translate private IP addresses to public IP addresses.
NAT allows multiple devices on a local network to share a single public IP address.
It enhances security by hiding internal IP addresses from external networks.
Types of NAT include Static NAT, Dynamic NAT, and Port Address Translation (PAT).
Little endian and big endian are ways of storing multibyte data in memory, with little endian storing the least significant byte first and big endian storing the most significant byte first.
Little endian stores the least significant byte first, while big endian stores the most significant byte first.
For example, the number 0x12345678 would be stored as 78 56 34 12 in little endian and 12 34 56 78 in big endian.
Most modern systems, including x86 processors, use little endian, ...read more
A symbol table is a data structure used by a compiler to store information about the names of variables, functions, and other symbols in a program.
It maps identifiers to information about them, such as their type, scope, and memory location.
Symbol tables are used during compilation to resolve references to symbols and perform semantic analysis.
Examples of symbol tables include the global symbol table in Python and the symbol table used by a C compiler.
A socket buffer is a temporary storage area in memory used for sending and receiving data over a network.
Socket buffers are used by the operating system to temporarily store data being sent or received over a network connection.
They help in managing the flow of data between the application and the network interface.
Socket buffers can be adjusted in size to optimize network performance.
Examples include TCP send and receive buffers used in network communication.
A VLAN (Virtual Local Area Network) is a network of computers that behave as if they are connected to the same physical network, even though they may be located on different segments.
VLANs are used to segment network traffic and improve network performance and security.
They allow for logical grouping of devices regardless of their physical location.
VLANs can be configured to separate different departments within an organization or to isolate specific types of traffic.
For exam...read more
Linking is the process of connecting different parts of a program together to create a single executable file.
Linking combines object files generated by the compiler into a single executable file.
There are two types of linking: static linking and dynamic linking.
Static linking includes all necessary libraries and dependencies in the executable file.
Dynamic linking references external libraries at runtime.
Examples of linking tools include ld (GNU linker) and link.exe (Microsof...read more
Top Software Developer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month