Given an array of size N in which every number is between 1 and N, determine if there are any duplicates in it. You are allowed to destroy the array if you like.
21 64654Write a routine to draw a circle (x ** 2 + y ** 2 = r ** 2) without making use of any floating point computations at all.
2 35215Give a very good method to count the number of ones in a 32 bit number. (caution: looping through testing each bit is not a solution)
7 43404Write, efficient code for extracting unique elements from a sorted list of array. e.g. (1, 1, 3, 3, 3, 5, 5, 5, 9, 9, 9, 9) -> (1, 3, 5, 9).
13 39797Write out a function that prints out all the permutations of a string. For example, abc would give you abc, acb, bac, bca, cab, cba. You can assume that all the characters will be unique.
5 22778Write a prog to accept a given string in any order and flash error if any of the character is different. For example : If abc is the input then abc, bca, cba, cab bac are acceptable, but aac or bcd are unacceptable.
5 15256Sir, I need to do my certification course for .NET. Will u provide me the information of how to prepare for the certification test. And also specify me the online books that is useful in studing for .NEt platform
3 11459What do you like to do best related to computers now (programming, administration, testing, manage projects, etc)? What is it about that area that you specifically enjoy?
1 3386Post New Microsoft Interview Questions
How can AI be used to improve weather prediction?
Can we update view in db2?
Explain the different parts of the x-ray radiation intensity graph? : quantum physics
What are Pig Execution modes?
Define end float in a motor?
Explain magic tables in sql server?
why we use Laravel - Session ?
Tell about your work experience. Why you quit that job?
How many types of operators are available in the vbscript language?
What is meta data, master data and transaction data?
what is the sizes of messages?
How do I get my site listed in the google directory?
What are backlinks?
What is the function of a control group in an experiment?
What is your organization’s security philosophy? What level of security does your data require? How much risk are you willing to assume in each application area?