Skip to content
Gblog Must Do Coding Questions for Product Based Companies
As the placement season is back, GeeksforGeeks is here to help you crack the interview. We have selected some most commonly asked and MUST DO… Read More
Let f(n) = n2Logn and g(n) = n (logn)10 be two positive functions of n. Which of the following statements is correct? (A) f(n) =… Read More
Consider any array representation of an n element binary heap where the elements are stored from index 1 to index n of the array. For… Read More
Randomized quicksort is an extension of quicksort where the pivot is chosen randomly. What is the worst case complexity of sorting n numbers using randomized… Read More
A CPU has two modes-privileged and non-privileged. In order to change the mode from privileged to non-privileged (A) a hardware interrupt is needed (B) a… Read More
Recently Amazon came to our campus as a part of our campus recruitment. Online Round:Hey geek! It's time to become a success story instead of… Read More
Hi, I recently interviewed with Goldman Sachs, and had 4 rounds of interview with them at their campus in Bangalore. Round 1 : Technical –… Read More
There was 1 coding round and 4 F2F interviews. This was for Software Developer Position(Note:-It was not for the research division in Walmart Labs)  Coding… Read More
A processor needs software interrupt to (A) test the interrupt system of the processor (B) implement co-routines (C) obtain system services which need execution of… Read More
Given the following Karnaugh map, which one of the following represents the minimal Sum-Of-Products of the map? (A) xy + y’z (B) wx’y’ + xy… Read More
Suppose a processor does not have any stack pointer register. Which of the following statements is true? (A) It cannot have subroutine call instruction (B)… Read More
A low memory can be connected to 8085 by using (A) INTER (B) RESET IN (C) HOLD (D) READY Answer: (D) Explanation: A low memory… Read More
Which of the following statements is false? (A) Virtual memory implements the translation of a program‘s address space into physical memory address space (B) Virtual… Read More
More than one word are put in one cache block to (A) exploit the temporal locality of reference in a program (B) exploit the spatial… Read More
Not many campuses around the world deal with “placement season” as we do in IITs. Only an IITian can understand the significance of December 1,… Read More
Round 1: 1. Print level order traversal of binary tree in iterative & recursive way.     Print each level in next line. –> I used… Read More