Upload Button Icon Add office photos

Qualcomm

Compare button icon Compare button icon Compare

Filter interviews by

Qualcomm SDE Interview Questions and Answers

Updated 9 Jan 2025

10 Interview questions

A SDE was asked 5mo ago
Q. Given an array of integers nums and an integer target, return indices of the two numbers such that they add up to target. You may assume that each input would have exactly one solution, and you may not use ...
Ans. 

The Two-Sum Problem involves finding two numbers in an array that add up to a specific target sum.

  • Given an array of integers and a target sum, identify two numbers that sum to the target.

  • Example: For array [2, 7, 11, 15] and target 9, the answer is indices 0 and 1 (2 + 7 = 9).

  • Use a hash map to store numbers and their indices for efficient lookup.

  • Time complexity is O(n) with a single pass through the array.

A SDE was asked 6mo ago
Q. Given the head of a singly linked list, reverse the list, and return the reversed list.
Ans. 

Reversing a linked list involves changing the direction of the pointers between nodes.

  • Initialize three pointers: prev, current, and next.

  • Set prev to null and current to the head of the list.

  • Iterate through the list: update next to current.next, current.next to prev, then move prev and current forward.

  • Continue until current is null, then set the head to prev.

  • Example: For list 1 -> 2 -> 3, after reversal it be...

SDE Interview Questions Asked at Other Companies

asked in Infosys
Q1. Return Subsets Sum to K Problem Statement Given an integer array ... read more
asked in Nagarro
Q2. Partition to K Equal Sum Subsets Problem Given an array of intege ... read more
asked in Nagarro
Q3. Sort a "K" Sorted Doubly Linked List Given a doubly-linked list w ... read more
asked in Amazon
Q4. Describe a scenario where you were given updates on repaired road ... read more
asked in Nagarro
Q5. Maximum Meetings Selection You are tasked with scheduling meeting ... read more
A SDE was asked
Q. How does sysctrl work?
Ans. 

sysctrl is a system control utility used to manage system settings and configurations.

  • sysctrl is used to manage system settings and configurations such as network settings, power management, and hardware configurations.

  • It can be used to start, stop, and restart system services.

  • sysctrl is commonly used in Linux and Unix-based operating systems.

  • Examples of sysctrl commands include 'sysctrl -p' to reload all settings...

A SDE was asked
Q. How are function pointers shared across different processes, and which IPC mechanisms are used?
Ans. 

Function pointers can be shared across processes using inter-process communication mechanisms like shared memory, pipes, sockets, etc.

  • Function pointers can be stored in shared memory regions that are accessible by multiple processes.

  • Processes can communicate with each other using pipes or sockets and pass function pointers as arguments.

  • Remote Procedure Call (RPC) mechanisms can also be used to share function point...

What people are saying about Qualcomm

View All
a business data analyst
4d
Anyone from Qualcomm? Need help
Hi, I have apparently cleared all rounds at Qualcomm for Program Analyst- Data Analyst role(A senior data analyst role). My total years of experience is 6. I hold an offer from another company with 20.5 as fixed and 21.75 as Total CTC. How much can I ask Qualcomm for this role? Please help.
Got a question about Qualcomm?
Ask anonymously on communities.
A SDE was asked
Q. How would you determine if your system is little endian or big endian?
Ans. 

Endianess refers to the order in which bytes are stored in memory. Little endian stores the least significant byte first.

  • Check the byte order of a multi-byte integer value

  • Use a test value with known byte order to determine the system's endianess

  • Check the system's documentation or specifications

  • Use a code snippet to determine the endianess

A SDE was asked
Q. How can a function from one user process be called in another user process?
Ans. 

Inter-process communication mechanisms like pipes, sockets, message queues, shared memory can be used to call a function from one user process to another.

  • Use pipes to establish a unidirectional communication channel between two processes.

  • Use sockets to establish a bidirectional communication channel between two processes.

  • Use message queues to send messages between processes.

  • Use shared memory to share data between ...

A SDE was asked
Q. Mention four IPC mechanisms used in user-level processes in Linux.
Ans. 

4 IPCs used in user level process in Linux

  • Message Queues - allows processes to exchange data through messages

  • Shared Memory - allows processes to share a portion of memory

  • Semaphores - used for synchronization between processes

  • Pipes - allows communication between two related processes

Are these interview questions helpful?
A SDE was asked
Q. What is Binder in Android?
Ans. 

Binder is a mechanism for inter-process communication in Android.

  • Binder allows different processes to communicate with each other.

  • It is used for implementing Android's IPC (Inter-Process Communication) system.

  • Binder uses a client-server model where the client sends requests to the server and the server responds with the requested data.

  • It is used for sharing data between different components of an Android applicati...

A SDE was asked
Q. Explain device tree concepts in Linux.
Ans. 

Device tree is a data structure used to describe hardware components in a system and their interconnections.

  • Device tree is used in embedded systems to provide a standardized way of describing hardware components.

  • It is written in a language called Device Tree Source (DTS) and compiled into a binary format called Device Tree Blob (DTB).

  • The device tree is loaded by the bootloader and used by the kernel to configure t...

A SDE was asked
Q. Write a program with 2 threads. One thread should print even numbers, and the other should print odd numbers in sequence. How would you make it SMP safe?
Ans. 

Program with 2 threads printing even and odd numbers in sequence. How to make it SMP safe?

  • Use mutex locks to ensure only one thread accesses the shared resource (the number to be printed) at a time

  • Use condition variables to signal when it's safe for the other thread to access the shared resource

  • Use atomic variables to ensure that the shared resource is accessed atomically

  • Use thread-safe data structures to store th...

Qualcomm SDE Interview Experiences

3 interviews found

SDE Interview Questions & Answers

user image Anonymous

posted on 12 Dec 2024

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Link list reversal
  • Ans. 

    Reversing a linked list involves changing the direction of the pointers between nodes.

    • Initialize three pointers: prev, current, and next.

    • Set prev to null and current to the head of the list.

    • Iterate through the list: update next to current.next, current.next to prev, then move prev and current forward.

    • Continue until current is null, then set the head to prev.

    • Example: For list 1 -> 2 -> 3, after reversal it becomes...

  • Answered by AI
  • Q2. OS all concepts

SDE Interview Questions & Answers

user image Anonymous

posted on 9 Jan 2025

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. Two-Sum Problem
  • Ans. 

    The Two-Sum Problem involves finding two numbers in an array that add up to a specific target sum.

    • Given an array of integers and a target sum, identify two numbers that sum to the target.

    • Example: For array [2, 7, 11, 15] and target 9, the answer is indices 0 and 1 (2 + 7 = 9).

    • Use a hash map to store numbers and their indices for efficient lookup.

    • Time complexity is O(n) with a single pass through the array.

  • Answered by AI

SDE Interview Questions & Answers

user image Anonymous

posted on 4 Jun 2015

Interview Questionnaire 

8 Questions

  • Q1. How would you know .. your system is little endian or big endian??
  • Ans. 

    Endianess refers to the order in which bytes are stored in memory. Little endian stores the least significant byte first.

    • Check the byte order of a multi-byte integer value

    • Use a test value with known byte order to determine the system's endianess

    • Check the system's documentation or specifications

    • Use a code snippet to determine the endianess

  • Answered by AI
  • Q2. How function pointers are shared across different processes? using which iPCs?
  • Ans. 

    Function pointers can be shared across processes using inter-process communication mechanisms like shared memory, pipes, sockets, etc.

    • Function pointers can be stored in shared memory regions that are accessible by multiple processes.

    • Processes can communicate with each other using pipes or sockets and pass function pointers as arguments.

    • Remote Procedure Call (RPC) mechanisms can also be used to share function pointers a...

  • Answered by AI
  • Q3. What is binder in android?
  • Ans. 

    Binder is a mechanism for inter-process communication in Android.

    • Binder allows different processes to communicate with each other.

    • It is used for implementing Android's IPC (Inter-Process Communication) system.

    • Binder uses a client-server model where the client sends requests to the server and the server responds with the requested data.

    • It is used for sharing data between different components of an Android application.

    • Bi...

  • Answered by AI
  • Q4. How sysctrl works?
  • Ans. 

    sysctrl is a system control utility used to manage system settings and configurations.

    • sysctrl is used to manage system settings and configurations such as network settings, power management, and hardware configurations.

    • It can be used to start, stop, and restart system services.

    • sysctrl is commonly used in Linux and Unix-based operating systems.

    • Examples of sysctrl commands include 'sysctrl -p' to reload all settings from...

  • Answered by AI
  • Q5. Explain device tree concepts in linux
  • Ans. 

    Device tree is a data structure used to describe hardware components in a system and their interconnections.

    • Device tree is used in embedded systems to provide a standardized way of describing hardware components.

    • It is written in a language called Device Tree Source (DTS) and compiled into a binary format called Device Tree Blob (DTB).

    • The device tree is loaded by the bootloader and used by the kernel to configure the ha...

  • Answered by AI
  • Q6. Mention 4 IPCs used in user level process in linux
  • Ans. 

    4 IPCs used in user level process in Linux

    • Message Queues - allows processes to exchange data through messages

    • Shared Memory - allows processes to share a portion of memory

    • Semaphores - used for synchronization between processes

    • Pipes - allows communication between two related processes

  • Answered by AI
  • Q7. How a function from one user process can be called in other user process?
  • Ans. 

    Inter-process communication mechanisms like pipes, sockets, message queues, shared memory can be used to call a function from one user process to another.

    • Use pipes to establish a unidirectional communication channel between two processes.

    • Use sockets to establish a bidirectional communication channel between two processes.

    • Use message queues to send messages between processes.

    • Use shared memory to share data between proce...

  • Answered by AI
  • Q8. Write a program with 2 threads. one thread should print even and other should print odd numbers in sequence. how would you make it SMP safe?
  • Ans. 

    Program with 2 threads printing even and odd numbers in sequence. How to make it SMP safe?

    • Use mutex locks to ensure only one thread accesses the shared resource (the number to be printed) at a time

    • Use condition variables to signal when it's safe for the other thread to access the shared resource

    • Use atomic variables to ensure that the shared resource is accessed atomically

    • Use thread-safe data structures to store the sha...

  • Answered by AI

Interview Preparation Tips

Round: Technical Interview
Experience: These are the few questions that i remember from my Qualcomm interview that i faced in march '13 :
#How would you know .. your system is little endian or big endian??
#how function pointers are shared across different processes? using which iPCs?
#what is binder in android?
#how sysctrl works?
#explain device tree concepts in linux.
#mention 4 IPCs used in user level process in linux.
#how a function from one user process can be called in other user process?
#write a program with 2 threads. one thread should print even and other should print odd numbers in sequence. how would you make it SMP safe?

College Name: NA

Skills evaluated in this interview

Interview questions from similar companies

Interview Questionnaire 

9 Questions

  • Q1. Difference between an array and a linked list
  • Ans. 

    Array is a collection of elements stored in contiguous memory locations while linked list is a collection of nodes linked by pointers.

    • Arrays have fixed size while linked lists can grow or shrink dynamically

    • Insertion and deletion is faster in linked lists than arrays

    • Accessing elements in arrays is faster than linked lists

    • Arrays are better for random access while linked lists are better for sequential access

  • Answered by AI
  • Q2. What data structure would you use for a dictionary?
  • Ans. 

    An array of key-value pairs is the best data structure for a dictionary.

    • Use a hash table or a balanced tree to implement the dictionary.

    • Keys should be unique and immutable.

    • Values can be any data type.

    • Access time should be O(1) or O(log n) depending on the implementation.

    • Examples: Python's dict, Java's HashMap, C++'s unordered_map.

  • Answered by AI
  • Q3. What is hashing? When is the time complexity of searching a hash table O(n)?
  • Ans. 

    Hashing is a technique to map data to a fixed-size table. Time complexity of searching a hash table is O(n) in worst case.

    • Hashing is used to store and retrieve data quickly

    • It uses a hash function to map data to a fixed-size table

    • In the best case, searching a hash table takes O(1) time

    • In the worst case, all the data maps to the same index and searching takes O(n) time

    • Collision resolution techniques like chaining and ope...

  • Answered by AI
  • Q4. Practical application of a linked list
  • Ans. 

    A linked list is used to store and manipulate a collection of data elements in a linear order.

    • Linked lists are commonly used in computer science for implementing data structures like stacks, queues, and hash tables.

    • They are also used in operating systems for managing memory allocation.

    • For example, a linked list can be used to implement a music playlist where each song is a node and the links between nodes represent the...

  • Answered by AI
  • Q5. Implement a stack using a linked list
  • Ans. 

    Implement a stack using a linked list

    • Create a Node class with data and next pointer

    • Create a Stack class with top pointer

    • Push new nodes to the top of the stack

    • Pop nodes from the top of the stack

    • Check if the stack is empty before popping

  • Answered by AI
  • Q6. What is a BST?
  • Ans. 

    BST stands for Binary Search Tree, a data structure used for efficient searching and sorting operations.

    • BST is a tree-like data structure where each node has at most two children.

    • The left child of a node contains a value less than the parent node, while the right child contains a value greater than the parent node.

    • BST allows for efficient searching and sorting operations with a time complexity of O(log n).

    • Examples of a...

  • Answered by AI
  • Q7. Program to check if a tree is a BST
  • Ans. 

    Program to check if a binary tree is a BST

    • Traverse the tree in-order and check if the values are in ascending order

    • Use a min-max range for each node to check if it satisfies the BST property

    • Recursively check if the left and right subtrees are BSTs

  • Answered by AI
  • Q8. Puzzle - add mathematical operators to make all these expressions true-
  • Q9. Where do you see yourself 5 years from now and other HR stuff

Interview Preparation Tips

College Name: NA

Skills evaluated in this interview

What people are saying about Qualcomm

View All
a business data analyst
4d
Anyone from Qualcomm? Need help
Hi, I have apparently cleared all rounds at Qualcomm for Program Analyst- Data Analyst role(A senior data analyst role). My total years of experience is 6. I hold an offer from another company with 20.5 as fixed and 21.75 as Total CTC. How much can I ask Qualcomm for this role? Please help.
Got a question about Qualcomm?
Ask anonymously on communities.
Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Coding Test 

Medium difficulty level of questions

Interview Preparation Tips

Interview preparation tips for other job seekers - Good

I appeared for an interview before Sep 2020.

Round 1 - Video Call 

(3 Questions)

Round duration - 30 minutes
Round difficulty - Easy

  • Q1. How do you search for a node in a linked list?
  • Ans. 

    To search for a node in a linked list, iterate through the list and compare each node's value with the target value.

    • Start at the head of the linked list

    • Iterate through each node by following the 'next' pointer

    • Compare the value of each node with the target value

    • Return the node if found, otherwise return null

  • Answered by AI
  • Q2. How do you detect a loop in a linked list?
  • Ans. 

    To detect a loop in a linked list, we can use Floyd's Cycle Detection Algorithm.

    • Initialize two pointers, slow and fast, at the head of the linked list.

    • Move slow pointer by one step and fast pointer by two steps.

    • If there is a loop, the two pointers will eventually meet.

    • Alternatively, we can use a hash set to store visited nodes and check for duplicates.

  • Answered by AI
  • Q3. Implement a stack using a singly linked list.
  • Ans. 

    Implement a stack using a singly linked list

    • Create a Node class with data and next pointer

    • Create a Stack class with top pointer pointing to the top of the stack

    • Implement push, pop, and peek operations by manipulating the linked list

    • Example: Node class - Node { int data; Node next; }

  • Answered by AI
Round 2 - Video Call 

(2 Questions)

Round duration - 40 minutes
Round difficulty - Easy

  • Q1. What is the top view of a binary tree?
  • Ans. 

    The top view of a binary tree shows the nodes visible from the top when looking down from the root node.

    • The top view of a binary tree is the set of nodes visible from the top when looking down from the root node.

    • Nodes at the same horizontal distance from the root are considered at the same level in the top view.

    • If multiple nodes are at the same horizontal distance, only the topmost node at that level is included in the...

  • Answered by AI
  • Q2. Explain the process of deleting a node from a linked list, covering all possible cases.
  • Ans. 

    Deleting a node from a linked list involves updating pointers to maintain the list's integrity.

    • Identify the node to be deleted by traversing the list

    • Update the previous node's next pointer to skip the node to be deleted

    • Free the memory allocated to the node to be deleted

  • Answered by AI

Interview Preparation Tips

Professional and academic backgroundI completed Information Technology from Inderprastha Engineering College. I applied for the job as SDE - 1 in NoidaEligibility criteriaminimum 70 %Cadence Design Systems interview preparation:Topics to prepare for the interview - Data Structures and Algorithms, Object-Oriented Programming, System DesignTime required to prepare for the interview - 5 MonthsInterview preparation tips for other job seekers

Do practice a lot of questions on linked list and stacks as these are two most important data structures asked in the interview. Also, try to implement it yourself without seeing the solution. Also prepare for Computer Science subjects like Operating System, Database Management System, Computer Networks, etc. I prepared them through Coding Ninjas notes which were simpler and easy to understand. 

Application resume tips for other job seekers

Keep your resume short and up to mark and check spellings before submitting it for the interview process.

Final outcome of the interviewSelected

Skills evaluated in this interview

I appeared for an interview in Feb 2017.

Interview Questionnaire 

7 Questions

  • Q1. What is a malloc function and where is it used and how is it different from new?
  • Ans. 

    malloc is a function in C that dynamically allocates memory on the heap. It is used to allocate memory for variables or data structures.

    • malloc is used in C programming language.

    • It is used to allocate memory on the heap.

    • malloc is different from 'new' in C++ as it does not call constructors for objects.

  • Answered by AI
  • Q2. What is the difference between C++ and Objective C and where will you use it?
  • Ans. 

    C++ is a general-purpose programming language while Objective C is a superset of C used for iOS and macOS development.

    • C++ is widely used for developing applications, games, and system software.

    • Objective C is mainly used for iOS and macOS development.

    • C++ supports both procedural and object-oriented programming paradigms.

    • Objective C is an object-oriented language with dynamic runtime features.

    • C++ has a larger community a...

  • Answered by AI
  • Q3. What is the difference between class container and class composition?
  • Ans. 

    Class container is a class that holds objects of other classes, while class composition is a way to combine multiple classes to create a new class.

    • Class container holds objects of other classes, acting as a collection or container.

    • Class composition combines multiple classes to create a new class with its own behavior and attributes.

    • In class container, the objects are typically stored in a data structure like an array o...

  • Answered by AI
  • Q4. There are fifteen horses and a racing track that can run five horses at a time. You have to figure out the top 3 horses out of those and you don't have any timer machine to measure. How will you find the t...
  • Ans. 

    Divide the horses into groups of 5 and race them. Take the top 2 from each race and race them again. Finally, race the top 2 horses to determine the top 3.

    • Divide the horses into 3 groups of 5 and race them.

    • Take the top 2 horses from each race and race them again.

    • Finally, race the top 2 horses to determine the top 3.

  • Answered by AI
  • Q5. What is the most difficult problem that you have solved (during work) till now and why you think you could do so?
  • Ans. 

    Developing a real-time data processing system for a high-traffic e-commerce website

    • Implemented a distributed system architecture to handle large volumes of data

    • Optimized algorithms for efficient data processing and storage

    • Utilized caching mechanisms to improve system performance

    • Worked closely with cross-functional teams to troubleshoot and resolve issues

    • Example: Successfully reduced data processing time by 50% by imple...

  • Answered by AI
  • Q6. Why you want to change your current job?
  • Ans. 

    Seeking new challenges and opportunities for growth.

    • Looking for a more challenging role to further develop my skills

    • Interested in exploring new technologies and industries

    • Seeking better career advancement opportunities

    • Want to work in a more collaborative team environment

  • Answered by AI
  • Q7. What is the width of a tree? How will you calculate the width of the tree?
  • Ans. 

    The width of a tree is the maximum number of nodes at any level in the tree.

    • To calculate the width of a tree, we can perform a level order traversal and keep track of the maximum number of nodes at any level.

    • We can use a queue data structure to perform the level order traversal.

    • At each level, we count the number of nodes in the queue and update the maximum width if necessary.

  • Answered by AI

Interview Preparation Tips

Skills: Basic C/C++, Implementing Data Structures In C++

Skills evaluated in this interview

Are these interview questions helpful?

Interview Questionnaire 

9 Questions

  • Q1. Tree questions related like traversal?
  • Q2. Locate the sum of 2 numbers in a linear array (Unsorted and sorted) and their complexities
  • Ans. 

    Locate sum of 2 numbers in a linear array (unsorted and sorted) and their complexities

    • For unsorted array, use nested loops to compare each element with every other element until the sum is found

    • For sorted array, use two pointers approach starting from the beginning and end of the array and move them towards each other until the sum is found

    • Complexity for unsorted array is O(n^2) and for sorted array is O(n)

  • Answered by AI
  • Q3. Pointers with increment/decrement, address of and value at operators (++,–,*,&)
  • Ans. 

    Pointers are used to manipulate memory addresses and values in C++. Increment/decrement, address of and value at operators are commonly used.

    • Incrementing a pointer moves it to the next memory location of the same data type

    • Decrementing a pointer moves it to the previous memory location of the same data type

    • The address of operator (&) returns the memory address of a variable

    • The value at operator (*) returns the value sto...

  • Answered by AI
  • Q4. A point and a rectangle is present with the given coordinates. How will you determine whether the point is inside or outside the rectangle?
  • Ans. 

    To determine if a point is inside or outside a rectangle, we check if the point's coordinates fall within the rectangle's boundaries.

    • Check if the point's x-coordinate is greater than the left edge of the rectangle

    • Check if the point's x-coordinate is less than the right edge of the rectangle

    • Check if the point's y-coordinate is greater than the top edge of the rectangle

    • Check if the point's y-coordinate is less than the b...

  • Answered by AI
  • Q5. There is a point inside the rectangle. How will you determine the line that passes through the point and divides the rectangle into 2 equal halves?
  • Ans. 

    To find line that divides rectangle into 2 equal halves through a point inside it.

    • Find the center of the rectangle

    • Draw a line from the center to the given point

    • Extend the line to the opposite side of the rectangle

    • The extended line will divide the rectangle into 2 equal halves

  • Answered by AI
  • Q6. There is a scheme which contains 8-bit and 16-bit signed numbers. How many such combinations are possible?
  • Ans. 

    There are multiple combinations of 8-bit and 16-bit signed numbers. How many such combinations are possible?

    • There are 2^8 (256) possible combinations of 8-bit signed numbers.

    • There are 2^16 (65,536) possible combinations of 16-bit signed numbers.

    • To find the total number of combinations, we can add the number of combinations of 8-bit and 16-bit signed numbers.

    • Therefore, the total number of possible combinations is 256 + ...

  • Answered by AI
  • Q7. You are given an array of elements. Some/all of them are duplicates. Find them in 0(n) time and 0(1) space. Property of inputs – Number are in the range of 1..n where n is the limit of the array
  • Ans. 

    Find duplicates in an array of elements in 0(n) time and 0(1) space.

    • Use the property of inputs to your advantage

    • Iterate through the array and mark elements as negative

    • If an element is already negative, it is a duplicate

    • Return all the negative elements as duplicates

  • Answered by AI
  • Q8. Given a array of digits. print all combination of of these i.e all no formed by these. repetition allowed. and then repetition not allowed example: i/p: arr={1,2,3} o/p: (without repetition) 123, 132, 213,...
  • Ans. 

    Generate all combinations of digits from an array, allowing and disallowing repetition.

    • Use recursion or backtracking to generate combinations.

    • For repetition allowed: e.g., arr={1,2}, combinations are 11, 12, 21, 22.

    • For repetition not allowed: e.g., arr={1,2,3}, combinations are 123, 132, 213, 231, 312, 321.

    • Utilize a set to track used digits when repetition is not allowed.

  • Answered by AI
  • Q9. Questions on project

Interview Preparation Tips

Round: Test
Duration: 90 minutes
Total Questions: 3

Round: HR Interview
Experience: HR interview was all about my projects, my background and a few more typical HR questions. It was pretty easy to answer them.

Skills: Algorithm, Data structure, C++
College Name: IIT ROORKEE

Skills evaluated in this interview

I appeared for an interview before May 2016.

Interview Preparation Tips

Round: written test
Experience: it was elitmus test conducted by the company itself on campus. As per my knowledge only those scoring 90 percentile got selected for round 2.
Tips: Attempt only those ques that are necessary for scoring 90+ in e litmus. Specially in verbal don't attempt more then required questions, though you might be tempted. The aim is not to score max bt to score 90+

Round: Technical Interview
Experience: This was a programming based round. I was asked to write algorithms for various array linked list based problems. There was cross questioning prompting to reduce complexity and to use different data structures for same problems.

Mostly it focused on subjects like c, data structures and ADA.
Tips: Be clear with basic of data structures and algorithms. Pointers, queue, stacks, array linked lists, sorting etc are the keywords.

Round: Technical Interview
Experience: This was a information security specific round since that was my major. In depth cross questioning on my thesis topics, honeypots, network intrusion etc. Security certificates, and on the go problems to provide security solution layer wise in different scenarios. Security concept of torrents was also asked in detail.
Tips: It was more of a security discussion and throwing of ideas about how things in a particular case could work or could not. Don't worry about right or wrong answer just be clear with your reasoning about the solution you are suggesting.

Round: Other Interview
Experience: I don't know what to name this round, but it focused mainly on developing test cases for an object. Say they gave me a stapler and said to develop a test plan listing down test cases for a given object to pass so that it can be confirmed that it is a stapler. Another scenario was with a lift.
Tips: This is one round where your presence of mind and inter personal skills matter. I think the way you present your thoughts was most important here.

Round: Behavioural Interview
Experience: This was was mostly about how would you react in a given professional situation
Like your assigned work could not be completed on time, or if you are doing something wrong with the work assigned.
Tips: This is all about inter personal skills and putting your best foot forward :)

College Name: Indira Gandhi Delhi Technical University For Women, Delhi

Software Engineer Interview Questions & Answers

Intel user image ESHAN SHEKHAR cs15m018

posted on 2 Dec 2016

I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.

Interview Questionnaire 

2 Questions

  • Q1. Given a blackbox with arithmetic circuits , design the logical circuits
  • Ans. 

    Design logical circuits for arithmetic circuits in a blackbox.

    • Understand the functionality of the arithmetic circuits in the blackbox.

    • Identify the inputs and outputs of the blackbox.

    • Design logical circuits using logic gates to replicate the arithmetic operations.

    • Test the logical circuits to ensure they produce the same outputs as the arithmetic circuits.

  • Answered by AI
  • Q2. Embedded c-code for recursion
  • Ans. 

    Recursion in embedded C-code allows a function to call itself, useful for repetitive tasks or complex algorithms.

    • Ensure proper base case to avoid infinite recursion

    • Use stack space efficiently as embedded systems have limited resources

    • Avoid recursive functions with deep call stacks to prevent stack overflow

    • Example: Recursive function to calculate factorial of a number

  • Answered by AI

Interview Preparation Tips

Round: Test
Experience: During this round we had some technical questions and some digital logic questions.
Tips: Please be patient.Interviewers do stress testing. Don't panic even if you don't know any answers.
Duration: 2 hours
Total Questions: 1

Round: Technical Interview
Experience: He asked me questions regarding my project and some coding questions
Tips: Please be patient.Interviewers do stress testing. Don't panic even if you don't know any answers.

Round: Technical + HR Interview
Experience: He asked me questions regarding my project and some coding questions
Tips: Please be patient.Interviewers do stress testing. Don't panic even if you don't know any answers.

College Name: IIT Madras

Skills evaluated in this interview

Qualcomm Interview FAQs

How many rounds are there in Qualcomm SDE interview?
Qualcomm interview process usually has 1 rounds. The most common rounds in the Qualcomm interview process are Technical.
What are the top questions asked in Qualcomm SDE interview?

Some of the top questions asked at the Qualcomm SDE interview -

  1. write a program with 2 threads. one thread should print even and other should p...read more
  2. how a function from one user process can be called in other user proce...read more
  3. How would you know .. your system is little endian or big endia...read more

Tell us how to improve this page.

Overall Interview Experience Rating

5/5

based on 2 interview experiences

Interview Questions from Similar Companies

Intel Interview Questions
4.2
 • 224 Interviews
Tata Electronics Interview Questions
4.0
 • 182 Interviews
Texas Instruments Interview Questions
3.9
 • 126 Interviews
Synopsys Interview Questions
3.9
 • 96 Interviews
Molex Interview Questions
3.9
 • 58 Interviews
Lam Research Interview Questions
3.7
 • 50 Interviews
View all
Qualcomm SDE Salary
based on 5 salaries
₹12.5 L/yr - ₹25 L/yr
17% less than the average SDE Salary in India
View more details
Senior Engineer
1.5k salaries
unlock blur

₹22 L/yr - ₹40 L/yr

Software Engineer
1.1k salaries
unlock blur

₹16.8 L/yr - ₹30 L/yr

Engineer
918 salaries
unlock blur

₹16.6 L/yr - ₹30 L/yr

Senior Software Engineer
748 salaries
unlock blur

₹23.9 L/yr - ₹40 L/yr

Senior Leader Engineer
512 salaries
unlock blur

₹34.1 L/yr - ₹58.9 L/yr

Explore more salaries
Compare Qualcomm with

Nvidia

3.5
Compare

Intel

4.2
Compare

Mercedes-Benz Research and Development India

3.8
Compare

Tata Electronics

4.0
Compare
write
Share an Interview