Filter interviews by
Be the first one to contribute and help others!
I applied via Referral and was interviewed in Jan 2020. There were 4 interview rounds.
I applied via Company Website and was interviewed in Jul 2019. There were 3 interview rounds.
As a Business Analyst, I bridge the gap between stakeholders and IT, ensuring project requirements align with business goals.
Gather and analyze business requirements through stakeholder interviews and workshops.
Create detailed documentation, including business requirement documents (BRDs) and functional specifications.
Facilitate communication between technical teams and business stakeholders to ensure clarity and align...
Our organization follows a combination of manual and automated processes to streamline operations.
We use project management tools like Jira to track tasks and progress
Regular team meetings are held to discuss project updates and address any issues
Automated testing is used to ensure software quality and reduce manual errors
IRD stands for Interface Requirements Document, IDD stands for Interface Design Document, and BRD stands for Business Requirements Document.
IRD is a document that outlines the requirements for the interface between different systems or components.
IDD is a document that describes the design of the interface, including the data formats, protocols, and communication methods.
BRD is a document that captures the business req...
Use case diagrams are visual representations of the interactions between users and a system.
They depict the system's functionality from the user's perspective.
They show the different actors and their roles in the system.
They illustrate the various use cases and their relationships.
They help in identifying the requirements of the system.
They aid in communication between stakeholders.
Example: A use case diagram for an on...
I appeared for an interview before May 2021.
Round duration - 120 Minutes
Round difficulty - Medium
Round duration - 60 Minutes
Round difficulty - Easy
Given a singly linked list with 'N' nodes containing integer values, your task is to sort the list using insertion sort and output the sorted list.
Insertion Sort is an al...
Implement insertion sort algorithm on a singly linked list with integer values.
Traverse the linked list and for each node, find its correct position in the sorted list.
Remove the node from the original list and insert it at the correct position in the sorted list.
Repeat this process until all nodes are sorted.
Ensure the implementation is in-place, without using extra space.
Handle edge cases like empty list or single no...
Your task is to implement a Stack data structure using a Singly Linked List.
Create a class named Stack
which supports the following operations, each in O(1...
Implement a Stack data structure using a Singly Linked List with operations in O(1) time.
Create a class named Stack with getSize, isEmpty, push, pop, and getTop methods.
Use a Singly Linked List to store the elements of the stack.
Ensure each operation runs in O(1) time complexity.
Handle cases where the stack is empty appropriately.
Implement the logic for each query type as specified in the input and output sections.
Given an integer N, determine and print all the prime numbers between 2 and N, inclusive.
Integer N
Prime numbers printed on separate lines
Generate and print all prime numbers between 2 and N, inclusive.
Iterate from 2 to N and check if each number is prime
Use a helper function to determine if a number is prime
Print each prime number on a new line
Round duration - 45 Minutes
Round difficulty - Medium
This round was based on oops concepts and their applications and about STLs.
Given a number N
, generate a pattern where the outer rectangle is filled with the number N
, and the inner rectangles contain decreasing numbers down to 1.
The input be...
Generate a rectangular pattern with outer rectangle filled with N and inner rectangles containing decreasing numbers.
Create a 2-D array with dimensions based on input N
Fill the outer rectangle with N and inner rectangles with decreasing numbers down to 1
Adjust the values in the inner rectangles based on the layer number
Return the generated pattern as a 2-D list/array
Round duration - 30 Minutes
Round difficulty - Easy
This around was basically to judge my communication and behavioral skills.
Tip 1 : Basics should be very clear related to DSA.
Tip 2 : Good knowledge of OS will be plus for Qualcomm
Tip 3 : One should revise the college project thoroughly before interview.
Tip 1 : Be brief while writing resume.
Tip 2 : Mention atleast 2 projects.
I applied via Naukri.com and was interviewed before Sep 2019. There were 6 interview rounds.
I appeared for an interview in Aug 2017.
I appeared for an interview in Aug 2017.
I applied via Campus Placement and was interviewed in Dec 2016. There were 5 interview rounds.
Fill the cells in the pyramid
The pyramid is a pattern of numbers or characters arranged in a triangular shape
Each row of the pyramid has one more cell than the previous row
Start filling the pyramid from the top and move downwards
The cells can be filled with any desired numbers or characters
An alternator and generator are devices that convert mechanical energy into electrical energy.
Both alternators and generators are used to generate electricity.
They work on the principle of electromagnetic induction.
Alternators are commonly used in modern vehicles to charge the battery and power the electrical systems.
Generators are often used as backup power sources during power outages.
Examples of alternators include ...
I developed a mobile app for tracking daily water intake and hydration levels.
Researched best practices for hydration tracking
Designed user-friendly interface for inputting water intake
Implemented data visualization for tracking hydration levels
Tested app with focus groups for feedback
Continuously updated app based on user suggestions
SHA Algorithm is a cryptographic hash function that takes an input and produces a fixed-size output.
SHA stands for Secure Hash Algorithm.
It is widely used in various security applications and protocols.
SHA-1, SHA-256, SHA-384, and SHA-512 are common variants of SHA.
It generates a unique hash value for each unique input.
The output is a fixed length, regardless of the input size.
SHA is used for data integrity, password h...
I will solve disputes by promoting open communication, active listening, and finding mutually beneficial solutions.
Encourage open and honest communication between parties involved
Actively listen to each party's concerns and perspectives
Identify common goals and interests to find mutually beneficial solutions
Mediate discussions and facilitate negotiations if necessary
Document agreements and ensure follow-up to prevent f...
I appeared for an interview in Dec 2016.
I appeared for an interview in Sep 2016.
Code for scheduling in C
Define a struct for the task with fields like start time, end time, priority, etc.
Create an array of tasks and sort them based on priority and start time
Implement a scheduling algorithm like Round Robin or Priority Scheduling
Use system calls like fork() and exec() to create and execute processes
Implement synchronization mechanisms like semaphores or mutexes to avoid race conditions
I appeared for an interview in Sep 2016.
Teleperformance
Optum Global Solutions
FIS
Nagarro