Filter interviews by
Reversing a linked list involves changing the direction of its pointers to reverse the order of nodes.
1. Initialize three pointers: previous (prev), current (curr), and next.
2. Set prev to null and curr to the head of the list.
3. Iterate through the list: while curr is not null, do the following:
a. Store the next node: next = curr.next.
b. Reverse the current node's pointer: curr.next = prev.
c. Move prev a...
To replace 'a' with 'ab' in a string, iterate through the string and substitute each occurrence of 'a'.
Use a loop to traverse each character in the string.
Check if the character is 'a'.
If it is, append 'ab' to a new string; otherwise, append the character.
Example: 'cat' becomes 'cabt'.
Example: 'banana' becomes 'babnanab'.
Replace every occurrence of 'a' with 'ab' in a given string, transforming it accordingly.
Use string replacement methods available in programming languages.
In Python, use: result = original_string.replace('a', 'ab').
In JavaScript, use: let result = originalString.replace(/a/g, 'ab');.
Consider edge cases, like strings without 'a' or with consecutive 'a's.
The shebang (#!) indicates the script's interpreter; omitting it can lead to execution issues.
The shebang line specifies which interpreter to use (e.g., #!/bin/bash for Bash scripts).
Without a shebang, the script may not execute as intended, defaulting to the shell used to run it.
Example: A Python script without #!/usr/bin/env python3 may fail if run in a non-Python shell.
Using the shebang ensures portability acro...
What people are saying about Qualcomm
Implementing features through scripts can present various challenges, impacting efficiency and functionality.
Complexity of the script can lead to maintenance difficulties; for example, a long script with multiple functions can be hard to debug.
Integration issues with existing systems; for instance, a new feature script may not align with legacy code, causing conflicts.
Performance bottlenecks; a script that process...
Scripts can run without user input by using automation tools, scheduling, and background processes.
Use cron jobs in Unix/Linux to schedule scripts at specific intervals (e.g., `0 * * * * /path/to/script.sh`).
Implement Windows Task Scheduler to run scripts at defined times or events.
Utilize automation tools like Jenkins for continuous integration and deployment without manual triggers.
Leverage cloud services (e.g.,...
sed is a stream editor for filtering and transforming text, while awk is a programming language for pattern scanning and processing.
sed is primarily used for text substitution and manipulation, e.g., 'sed s/old/new/g file.txt'.
awk is designed for data extraction and reporting, e.g., 'awk '{print $1}' file.txt' to print the first column.
sed operates on a line-by-line basis, while awk processes data in fields and re...
I have extensive experience troubleshooting boot issues across various operating systems and hardware configurations.
Identified and resolved BIOS misconfigurations preventing booting on a custom-built PC.
Used recovery tools to fix corrupted boot sectors on Windows systems.
Diagnosed hardware failures, such as faulty RAM, that caused boot loops.
Utilized safe mode to troubleshoot driver issues that hindered system st...
Wi-Fi generations, from 802.11b to Wi-Fi 6E, have evolved in speed, range, and efficiency, enhancing wireless connectivity.
802.11b (1999): Up to 11 Mbps, 2.4 GHz, good range but limited speed.
802.11g (2003): Up to 54 Mbps, 2.4 GHz, backward compatible with 802.11b.
802.11n (2009): Up to 600 Mbps, operates on 2.4 GHz and 5 GHz, MIMO technology for better performance.
802.11ac (2013): Up to 3.5 Gbps, primarily 5 GHz, ...
LCA (Lowest Common Ancestor) is the deepest node that is an ancestor of two given nodes in a tree structure.
LCA can be found using recursion or iterative methods.
In a binary tree, traverse from the root to find both nodes.
If one node is found in the left subtree and the other in the right, the current node is the LCA.
Example: In a tree with nodes 3, 5, and 1, the LCA of 5 and 1 is 3.
For binary search trees, if bot...
I appeared for an interview in Dec 2024.
I have over 5 years of experience as a Business Analyst in the finance industry.
Led cross-functional teams to analyze market trends and develop strategic plans
Performed data analysis to identify opportunities for cost reduction and revenue growth
Collaborated with stakeholders to gather requirements and create detailed business requirements documents
Business Analyst responsibilities include analyzing data, identifying trends, and making recommendations to improve business processes.
Gather and analyze data to identify trends and make recommendations
Work closely with stakeholders to understand business needs and requirements
Create reports and presentations to communicate findings and recommendations
Collaborate with cross-functional teams to implement solutions
Monito...
I appeared for an interview in Dec 2024.
Linux boot process involves several stages including BIOS, bootloader, kernel initialization, and user space initialization.
BIOS (Basic Input/Output System) performs hardware initialization and loads bootloader
Bootloader (GRUB, LILO) loads the Linux kernel into memory and starts it
Kernel initializes devices, mounts the root filesystem, and starts the init process
Init process (systemd, SysVinit) starts user space proces...
Planning is the process of setting goals, determining actions to achieve those goals, and allocating resources effectively.
Setting specific, measurable, achievable, relevant, and time-bound (SMART) goals
Creating a detailed plan of action to achieve the goals
Allocating resources such as time, money, and manpower efficiently
Monitoring progress and making adjustments as needed
Examples: Financial planning for a company's b...
A financial model is built to forecast future financial performance of a company or project.
Identify the purpose of the financial model (e.g. budgeting, valuation, forecasting)
Gather historical financial data and relevant assumptions
Create income statement, balance sheet, and cash flow statement projections
Perform sensitivity analysis to assess the impact of different variables
Validate the model by comparing actual res...
Depreciation is the allocation of the cost of a tangible asset over its useful life.
Depreciation is a non-cash expense that reduces the value of an asset over time.
It reflects the wear and tear, obsolescence, or decrease in value of an asset.
Common methods of calculating depreciation include straight-line, double declining balance, and units of production.
Example: A company purchases a machine for $10,000 with a useful...
Budgeting is the process of creating a plan to manage income and expenses over a specific period of time.
Budgeting involves setting financial goals and creating a detailed plan to achieve them.
It helps in tracking income, expenses, and savings to ensure financial stability.
Budgeting can be done on a personal level, for businesses, or for specific projects.
Examples of budgeting tools include spreadsheets, budgeting apps...
I appeared for an interview in Sep 2024.
I appeared for an interview in Jun 2025, where I was asked the following questions.
I applied via Approached by Company and was interviewed in Oct 2024. There were 3 interview rounds.
Aptitude and technical questions were asked
Insertion in a doubly linked list involves adding nodes with pointers to both previous and next nodes for bidirectional traversal.
A doubly linked list node contains three parts: data, a pointer to the next node, and a pointer to the previous node.
To insert at the beginning, adjust the head pointer and update the new node's next and previous pointers.
To insert at the end, traverse to the last node, update its next point...
Merge two sorted linked lists into a single sorted linked list
Create a new linked list to store the merged result
Iterate through both input linked lists and compare nodes to determine the order in which they should be merged
Update the next pointers of the nodes in the new linked list accordingly
Reverse words in a given string
Split the string into words using a space as delimiter
Reverse each word individually
Join the reversed words back together with a space in between
Dynamic 2D array multiplication involves multiplying two matrices of varying sizes using dynamic memory allocation.
Define two 2D arrays (matrices) dynamically using pointers.
Ensure the number of columns in the first matrix equals the number of rows in the second.
Allocate memory for the result matrix based on the dimensions of the input matrices.
Use nested loops to perform the multiplication: for each element in the res...
I am passionate about solving complex engineering problems and contributing to innovative projects.
I have always been fascinated by the intersection of technology and creativity
I thrive in fast-paced environments where I can apply my technical skills
I am excited about the opportunity to work with a talented team and make a real impact
Linux kernel is popular for its open-source nature, stability, security, and flexibility. Compiling it allows customization and optimization.
Linux kernel is widely used due to its open-source nature, allowing for customization and collaboration.
It is known for its stability, security, and flexibility, making it a preferred choice for many developers and organizations.
Compiling the Linux kernel involves configuring the ...
I applied via Company Website
A customer disputed a payment due to incorrect billing for services rendered, leading to a resolution process.
Customer received an invoice for $1,000 but only expected to pay $800 based on prior agreement.
Dispute arose when the customer claimed they were charged for services not rendered.
Communication breakdown occurred; the customer felt their concerns were not addressed promptly.
Resolution involved reviewing service ...
Invert the bits of a given number
Use bitwise XOR operator (^) with 1 to flip each bit
Repeat the process for all bits in the number
Return the inverted number
Backward compatibility can be supported by using versioning, deprecation strategies, and maintaining clear communication with users.
Use versioning to clearly distinguish between different versions of the system
Implement deprecation strategies to phase out old features gradually
Maintain clear communication with users about upcoming changes and provide migration paths
Consider using compatibility layers or adapters to bri...
Some of the top questions asked at the Qualcomm interview -
The duration of Qualcomm interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 195 interview experiences
Difficulty level
Duration
based on 1.1k reviews
Rating in categories
Bangalore / Bengaluru
2-6 Yrs
Not Disclosed
Senior Engineer
1.5k
salaries
| ₹22 L/yr - ₹40 L/yr |
Software Engineer
1.1k
salaries
| ₹17.7 L/yr - ₹30 L/yr |
Engineer
921
salaries
| ₹16.6 L/yr - ₹30 L/yr |
Senior Software Engineer
778
salaries
| ₹24.3 L/yr - ₹45 L/yr |
Senior Leader Engineer
539
salaries
| ₹34.8 L/yr - ₹60 L/yr |
Nvidia
Intel
Mercedes-Benz Research and Development India
Tata Electronics