Adobe Interview Question Developer Program Engineers


Country: India
Interview Type: In-Person


Comment hidden because of low score. Click to expand.
8
of 8 vote

Step 1: A will lock the box with KeyA than send it to B
Step 2: B on receiving locks it again with KeyB and send it to A
Step 3: A will release its lock with its KeyA and send it back to B(its is still locked with KeyB).
Step 4: B upon receiving will open it with KeyB.

- Pranav on July 03, 2012 | Flag Reply
Comment hidden because of low score. Click to expand.
0
of 0 votes

There are a lot of loop-holes in the question. It can either be exploited as an interviewee, or the answers can be countered by the interviewer.
Your solution is correct, however, I might ask, where is it written that more than one lock can be put on the box?

- ramblersm on July 06, 2012 | Flag
Comment hidden because of low score. Click to expand.
0
of 0 votes

I think more than 1 lock can be put on the box is not really a problem.

How ever, this answer can be exploited by M as follow:
1. M doesn't send the box to B,
2. M locks it with his fake KeyB and send it back to A
3. A release the LockA
4. M open the box with his fake KeyB.

If the locks cannot be faked then the given answer should be correct :-)

- pckben on October 21, 2012 | Flag
Comment hidden because of low score. Click to expand.
3
of 5 vote

Another possible solution could be :

Step 1: A will lock the box with KeyA than send it to B
Step 2: B on receiving keeps the box and send the messenger back to get the key.
Step 3: A send the key.
Step 4: B unlocks the box using the key.

- Anonymous on July 04, 2012 | Flag Reply
Comment hidden because of low score. Click to expand.
0
of 0 votes

hahahaha clever! :D

- ramblersm on July 06, 2012 | Flag
Comment hidden because of low score. Click to expand.
0
of 0 votes

messenger ant send the keys

- BABA on July 07, 2012 | Flag
Comment hidden because of low score. Click to expand.
0
of 0 votes

Key should not be shared with messenger.

- lovelyvikas on August 03, 2012 | Flag
Comment hidden because of low score. Click to expand.
0
of 0 votes

it is also possible that messenger didn't deliver the box to B, or gave a wrong box and then asked for the key from A, not a correct solution.

- Anonymous on August 29, 2012 | Flag
Comment hidden because of low score. Click to expand.
0
of 0 votes

Good one!!! Liked it!!
Messager uses the key to get a duplicate key, and next time he will open the box.. :)

- OTR on August 14, 2013 | Flag
Comment hidden because of low score. Click to expand.
-1
of 1 vote

can you elaborate the question?

- Arulmozhi on July 03, 2012 | Flag Reply
Comment hidden because of low score. Click to expand.
-1
of 1 vote

nice one !!!

- atul gupta on July 03, 2012 | Flag Reply
Comment hidden because of low score. Click to expand.
-1
of 1 vote

hahhahh Awesome Anonymous :)

- Anonymous on July 12, 2012 | Flag Reply
Comment hidden because of low score. Click to expand.
-1
of 1 vote

nice!!!

- Anonymous on September 08, 2012 | Flag Reply


Add a Comment
Name:

Writing Code? Surround your code with {{{ and }}} to preserve whitespace.

Books

is a comprehensive book walking you through getting a job at a top tech company, while focuses on dev interviews and does this for PMs.

Learn More

Videos

CareerCup's interview videos give you a real-life look at technical interviews. In these unscripted videos, watch how other candidates handle tough questions and how the interviewer thinks about their performance.

Learn More

Resume Review

Most engineers make critical mistakes on their resumes -- we can fix your resume with our custom resume review service. And, we use fellow engineers as our resume reviewers, so you can be sure that we "get" what you're saying.

Learn More

Mock Interviews

Our Mock Interviews will be conducted "in character" just like a real interview, and can focus on whatever topics you want. All our interviewers have worked for Microsoft, Google or Amazon, you know you'll get a true-to-life experience.

Learn More