Filter interviews by
Variance of sum of two iid random variables is the sum of their individual variances.
Variance of sum of two iid random variables is the sum of their individual variances
If X and Y are iid random variables, Var(X+Y) = Var(X) + Var(Y)
For example, if X and Y are both dice rolls, Var(X+Y) = Var(X) + Var(Y) = 35/12
Find the next greater element for each element in an array.
Use a stack to keep track of elements without a next greater element.
Iterate through the array and compare elements with the top of the stack.
Update the stack with the current element if it is greater than the top element.
Binary search in a sorted rotated array with no duplicates.
Find the pivot point where the array is rotated.
Determine which half of the array to search based on the target value and pivot point.
Perform binary search in the selected half of the array.
Binary search in a sorted rotated array with duplicates present.
Perform a modified binary search by checking both ends of the array for duplicates
Handle cases where duplicates are present at the start, end, or middle of the array
Consider cases where the array is rotated multiple times
What people are saying about Qualcomm
Generated clocks through edges are defined by specifying the source clock and the edge on which the generated clock is based.
Specify the source clock for the generated clock
Define the edge (rising/falling) on which the generated clock is based
Use tools like Synopsys Design Compiler to define generated clocks
Cross talk is the unwanted transfer of signals between different components or traces on a circuit board.
Occurs when signals from one trace interfere with signals on another trace
Can lead to signal distortion or errors in data transmission
Prevented by proper spacing and shielding between traces
Example: Cross talk between data lines on a PCB causing errors in communication
Deep copy in C involves creating a new copy of data, allocating separate memory for it, unlike shallow copy which shares memory.
Deep copy allocates new memory for the copied data.
Shallow copy copies the pointer, sharing the same memory location.
Example: For an array of integers, deep copy creates a new array with the same values.
Use 'malloc' for dynamic memory allocation in deep copy.
Deep copy is essential for avo...
Detect endianness using C program
Use a union to create a variable with a known value
Check the value of the first byte to determine endianness
Big endian systems store the most significant byte first
Little endian systems store the least significant byte first
Example: union { int i; char c; } u; u.i = 1; if (u.c == 1) { /* Little endian */ } else { /* Big endian */ }
Count set bits in a number using C programming language.
Use bitwise AND operation with 1 to check if the rightmost bit is set.
Shift the number to the right by 1 bit each time to check all bits.
Repeat the process until the number becomes 0, counting the set bits each time.
Merge two sorted linked lists into a single sorted linked list
Create a new linked list to store the merged result
Iterate through both input linked lists and compare nodes to determine the order in which they should be merged
Update the next pointers of the nodes in the new linked list accordingly
I appeared for an interview in Dec 2024.
I have over 5 years of experience as a Business Analyst in the finance industry.
Led cross-functional teams to analyze market trends and develop strategic plans
Performed data analysis to identify opportunities for cost reduction and revenue growth
Collaborated with stakeholders to gather requirements and create detailed business requirements documents
Business Analyst responsibilities include analyzing data, identifying trends, and making recommendations to improve business processes.
Gather and analyze data to identify trends and make recommendations
Work closely with stakeholders to understand business needs and requirements
Create reports and presentations to communicate findings and recommendations
Collaborate with cross-functional teams to implement solutions
Monito...
I appeared for an interview in Dec 2024.
Linux boot process involves several stages including BIOS, bootloader, kernel initialization, and user space initialization.
BIOS (Basic Input/Output System) performs hardware initialization and loads bootloader
Bootloader (GRUB, LILO) loads the Linux kernel into memory and starts it
Kernel initializes devices, mounts the root filesystem, and starts the init process
Init process (systemd, SysVinit) starts user space proces...
Planning is the process of setting goals, determining actions to achieve those goals, and allocating resources effectively.
Setting specific, measurable, achievable, relevant, and time-bound (SMART) goals
Creating a detailed plan of action to achieve the goals
Allocating resources such as time, money, and manpower efficiently
Monitoring progress and making adjustments as needed
Examples: Financial planning for a company's b...
A financial model is built to forecast future financial performance of a company or project.
Identify the purpose of the financial model (e.g. budgeting, valuation, forecasting)
Gather historical financial data and relevant assumptions
Create income statement, balance sheet, and cash flow statement projections
Perform sensitivity analysis to assess the impact of different variables
Validate the model by comparing actual res...
Depreciation is the allocation of the cost of a tangible asset over its useful life.
Depreciation is a non-cash expense that reduces the value of an asset over time.
It reflects the wear and tear, obsolescence, or decrease in value of an asset.
Common methods of calculating depreciation include straight-line, double declining balance, and units of production.
Example: A company purchases a machine for $10,000 with a useful...
Budgeting is the process of creating a plan to manage income and expenses over a specific period of time.
Budgeting involves setting financial goals and creating a detailed plan to achieve them.
It helps in tracking income, expenses, and savings to ensure financial stability.
Budgeting can be done on a personal level, for businesses, or for specific projects.
Examples of budgeting tools include spreadsheets, budgeting apps...
I appeared for an interview in Sep 2024.
I applied via Approached by Company and was interviewed in Oct 2024. There were 3 interview rounds.
Aptitude and technical questions were asked
Merge two sorted linked lists into a single sorted linked list
Create a new linked list to store the merged result
Iterate through both input linked lists and compare nodes to determine the order in which they should be merged
Update the next pointers of the nodes in the new linked list accordingly
Reverse words in a given string
Split the string into words using a space as delimiter
Reverse each word individually
Join the reversed words back together with a space in between
Dynamic 2D array multiplication involves multiplying two matrices of varying sizes using dynamic memory allocation.
Define two 2D arrays (matrices) dynamically using pointers.
Ensure the number of columns in the first matrix equals the number of rows in the second.
Allocate memory for the result matrix based on the dimensions of the input matrices.
Use nested loops to perform the multiplication: for each element in the res...
I am passionate about solving complex engineering problems and contributing to innovative projects.
I have always been fascinated by the intersection of technology and creativity
I thrive in fast-paced environments where I can apply my technical skills
I am excited about the opportunity to work with a talented team and make a real impact
Linux kernel is popular for its open-source nature, stability, security, and flexibility. Compiling it allows customization and optimization.
Linux kernel is widely used due to its open-source nature, allowing for customization and collaboration.
It is known for its stability, security, and flexibility, making it a preferred choice for many developers and organizations.
Compiling the Linux kernel involves configuring the ...
I applied via Company Website
A customer disputed a payment due to incorrect billing for services rendered, leading to a resolution process.
Customer received an invoice for $1,000 but only expected to pay $800 based on prior agreement.
Dispute arose when the customer claimed they were charged for services not rendered.
Communication breakdown occurred; the customer felt their concerns were not addressed promptly.
Resolution involved reviewing service ...
Invert the bits of a given number
Use bitwise XOR operator (^) with 1 to flip each bit
Repeat the process for all bits in the number
Return the inverted number
Backward compatibility can be supported by using versioning, deprecation strategies, and maintaining clear communication with users.
Use versioning to clearly distinguish between different versions of the system
Implement deprecation strategies to phase out old features gradually
Maintain clear communication with users about upcoming changes and provide migration paths
Consider using compatibility layers or adapters to bri...
I applied via Campus Placement and was interviewed in Jul 2024. There were 3 interview rounds.
It consisted of aptitude questions, then OS C 1mrks, which were re GATE questions. No coding, I chose hardware role, so questions were from digital electronics too. prepare the gate questions for these subjects
Some of the top questions asked at the Qualcomm interview -
The duration of Qualcomm interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 192 interview experiences
Difficulty level
Duration
based on 1.1k reviews
Rating in categories
Bangalore / Bengaluru
4-7 Yrs
Not Disclosed
Senior Engineer
1.5k
salaries
| ₹22 L/yr - ₹40 L/yr |
Software Engineer
1.1k
salaries
| ₹16.8 L/yr - ₹30 L/yr |
Engineer
918
salaries
| ₹16.6 L/yr - ₹30 L/yr |
Senior Software Engineer
748
salaries
| ₹23.9 L/yr - ₹40 L/yr |
Senior Leader Engineer
512
salaries
| ₹34.1 L/yr - ₹58.9 L/yr |
Nvidia
Intel
Mercedes-Benz Research and Development India
Tata Electronics