Qualcomm Interview Questions
- 0of 0 votes
AnswersWhat is a reentrant function? how do you make a function non-reentrant?
- most unluckiest February 09, 2010| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer C - 0of 0 votes
AnswersWrite a code to clear nth bit in an integer.
- gsl January 22, 2010| Report Duplicate | Flag | PURGE
Qualcomm C - 0of 0 votes
AnswersWrite a code to reverse words in a sentence of words. for ex: I am a boy --> boy a am I.
- gsl January 22, 2010| Report Duplicate | Flag | PURGE
Qualcomm Algorithm - 0of 0 votes
Answersscope of x,y,p,q and where respective variables are stored.
- gsl January 22, 2010
static int x;
int y;
void foo()
{
static int p;
int q;
}| Report Duplicate | Flag | PURGE
Qualcomm C - 0of 0 votes
AnswersWhat is the use of volatile keyword in C?Gave a standard answer,asked to elaborate more.Don't know how.
- gsl January 22, 2010| Report Duplicate | Flag | PURGE
Qualcomm C - 0of 0 votes
Answershow do you come to know what method in java is slow / has bad performance. how will you use the profiling tools for it?
- Anonymous December 15, 2009| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer Debugging - 0of 0 votes
Answersarray having 50 values. 2 values are missing. can u do it better than multiplication and addition method .
- Anonymous December 15, 2009| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer Algorithm - 0of 0 votes
Answerswrite a Macro which when given an array willl return the array size
- Anonymous December 15, 2009| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer Algorithm - 0of 0 votes
AnswersExplain how communication happens between tasks in RTOS
- Amateur November 20, 2009| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer Computer Architecture & Low Level - 0of 0 votes
AnswersExplain priority inversion in RTOS
- Amateur November 20, 2009| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer - 0of 0 votes
AnswersExplain what stack overflow and heap overflow are, and how they impact security.
- s3 October 31, 2009| Report Duplicate | Flag | PURGE
Qualcomm Product Security Engineer Security - 0of 0 votes
AnswersImagine a system where gas service to homes is controlled by a server of a service provider. How would you create a secure protocol for transfer of msgs. between this server and the apparatus at every home?
- s3 October 31, 2009
Assumption - The apparatus is secure and couldn't be hacked.| Report Duplicate | Flag | PURGE
Qualcomm Product Security Engineer Security - 0of 0 votes
Answersyou have an eight bit multiply operator that takes two 8 bit numbers and returns a 16 bit value. Given two 16 bit values stored in 32 bit int variables, find the product using the
- Annonymous.... October 26, 2009
8 bit multiply operator.| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer in Test - 0of 0 votes
Answersis this valid syntax in 'C'
- Annonymous.... October 26, 2009
int a[10];
a = a + 1;| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer - 0of 0 votes
Answersswap bits in position i and j for a number....in the most efficient way....
- Annonymous.... October 26, 2009| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer - 0of 0 votes
Answerscode to remove duplicate characters in a string.
- Annonymous.... October 26, 2009| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer - 0of 0 votes
Answers3. printing a number in a matrix in snake like order
- Annonymous.... October 26, 2009| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer - 0of 0 votes
Answers2. counting number of binary 1s in a number.
- Annonymous.... October 26, 2009| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer - 0of 0 votes
AnswersC coding
- Annonymous.... October 26, 2009
1.calculating power( M, N ) in log N time, power( 2, N ), finding if a number is power of
'2'| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer - 0of 0 votes
AnswersOne real mind-boggling question: Rewrite malloc and free so that they detect memory corruption. For example in a code,
- DesiGrad October 21, 2009
ptr = malloc(5)
write(20); // you modify 20 bytes starting at address ptr
free(ptr);| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer Operating System - 1of 1 vote
AnswersDevice a function that removes the occurences of blank spaces from a string. Constraints: run in linear time and the algorithm must be in-place. For example if,
- DesiGrad October 21, 2009
string = Hi there wassup
output = Hitherewassup| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer String Manipulation - 0of 0 votes
AnswersFor the following piece of code:
- DesiGrad October 21, 2009
func(int d)
{
int temp;
while(temp)
temp--;
}
How does the compiler behave differently if the variable temp is declared with the volatile 'qualifier' ?| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer C - 0of 0 votes
AnswersThis question was asked by the device driver's team: Can a variable be declared with both the 'const' and 'volatile' qualifiers ?
- DesiGrad October 21, 2009| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer C - 0of 0 votes
AnswersReverse a string. Do it in place.
- kichi September 20, 2009| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer - 0of 0 votes
AnswersLocate the node which is the m-th node from the end of a linked list. e.g. linked list has 100 nodes and m=5, it would be node 95.
- kichi September 20, 2009| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer Coding - 0of 0 votes
AnswersWriting a C code to find the endianness of a computer.
- kichi September 20, 2009| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer Coding