einstein.goli
BAN USER
- -1of 1 vote
AnswersWhat kind of benefits are you looking for?
- einstein.goli in United States
What kind of working environment do you prefer to work in?
Are there any specialized areas you would want to work for?
Salary expectations?| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer Behavioral - 0of 0 votes
AnswersThree men on their way from San Jose to New jersey by walk, decides to rest under a tree, And all go deep sleep under it. A fourth person who was passing by the tree, wanted to have fun and draws a smiley face on the forehead of all three and leaves. After all three wake up and they start smiling at each other checking out smiley faces on each other. But only one smart one realizes it. How does he realize it??
- einstein.goli in United States| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer Brain Teasers - 0of 0 votes
AnswersYou have an coin as information source which outputs a sequence of Heads and Tail string as "HHHHTTHTHTHT...". And this data is supposed to be communicated over a channel using the function bool send(char *); optimize the solution for maximum throughput.
- einstein.goli in United States| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer Algorithm - 0of 0 votes
AnswersTwo microprocessors communicating via UART channel. One microprocessor connected to a VGA based monitor output and another mircroprocessor connected to keyboard.
- einstein.goli in United States
Sreen--uP1<--uP2---Keyboard
If you key in {A,B,C,D..} on keyboard, your monitor on other end displays {A,A,A,..}
Think in about debugging process and possible errors.| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer C - 0of 0 votes
AnswersDesign a mask for the string M, which has to replace the bits of N at i th position. Given a the bit-length of sequence N as j. Design a function to return the masked data.
- einstein.goli in United States| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer Bit Manipulation - 0of 0 votes
AnswersCalculate limits of memory buffer for a transmitter station. Channel capacity is 1Gbps.
- einstein.goli in United States
Design the packet size and the communication protocol. Given the turnaround time as 1ms.(Tx-Rx: 500usec and Rx-Tx 500usec). Optimize for minimal memory requirements.| Report Duplicate | Flag | PURGE
Qualcomm Software Engineer / Developer Networking / Web / Internet
the memory where the input is stored must be volatile !! he was satisfied with that answer.
- einstein.goli October 28, 2011another simple algo would be..
1) Draw a unidirectional ray cutting the triangle.
2) if no of intersection points is 2 then it is outside of the triangle
3) if no of intersection point is just 1 then it could be inside the circle or one of the edges..
the case of edge can be eliminated using the slope equation.
include int n in the parameter list
- einstein.goli October 26, 2011struct node* getNthLast(struct node* head,int n)
{
struct node *tmp1, *tmp2;
tmp1=tmp2=head;
while(tmp2)
{ if(n>0)
{
tmp2=tmp2->next;
n--;
}
else
{
tmp1=tmp1->next;
tmp2=tmp2->next;
}
}
return tmp1;
H representing 0
T representing 1
Your string "HTTHHTTT"(8 bytes of string) becomes a single byte 01100111 !! by which u save 7 bytes of data. and u can achieve maximum throughput..!!
i replied da same!! but its not right itseems..!!
- einstein.goli October 26, 2011ya.. "Realizes smiley on his face"
- einstein.goli October 26, 2011yup....there you go..!!
- einstein.goli October 26, 2011principle of induction? really??? how is that even possible when only one realizes it !! think
- einstein.goli October 26, 2011memory based code should have the "volatile" keyword for compiler to not optimize that particular variable..!!
- einstein.goli October 26, 2011LOL...!! okk suppose Place A to Place B :P
- einstein.goli October 26, 2011
gotchya.. thk u..!!
- einstein.goli November 07, 2011