Given an array of size N in which every number is between 1 and N, determine if there are any duplicates in it. You are allowed to destroy the array if you like.
21 65226Memory is not a constraint. In a single iteration(NOTE: you can't go back), how will you find out the 10th last node/item in a linked list.
16 27827Hi all, Do anybody know how to test JDBC protocol application which doesnt have any UI with LR.I want to test it for performance.Do i need to develope any UI to trigger that process or is there any other way around??Please help me
2511Write a pseudo code to evaluate a number to any base given (2...16) based on the input. Number greater than 9 should be given as A-F for 10-15.
2485Given a set. Write the pseudo code to get all the subsets for the given set. Eg. Input : {1,2} Output : (),(1),(2),(1,2)
2685Given three sides of a triangle. Write the Program to determine whether the triangle is : 1) Invalid 2) Right Angled 3) Isoscales 4) Equilateral 5) Not Special An Isoscales right angled triangle should be taken as a Right Angled Triangle
3 49846A company given a party in order promote the company to its customer in a hotel then hotel provide some food & services to the customers of the company. should TDS deducted on payment made to hotel's bill? if payment is near about 35000/-.
2 8171Post New Goldman Sachs Interview Questions
What is awe?
How do you create columns in word 2010?
How should i design a 1ph & 3 ph transformer. Kindly let meknow all steps and formulaes related to design from scratch.
when to use joins vs. Blending in tableau?
Is Genetic engineering the best of solution?
What is Web architecture that are followed while doing online project and tell the samples of architecture?
What are the benefits provided by jmeter for performance testing?
How do you create a workflow rule in SAP Hybris?
Is there a difference between class and struct?
What should malloc() do?
what is associate law?
What is the excel formula for today's date?
how to implement some securty aspect in our application i.e 1.cookie poisioning. 2.data encryption. 3.forcefull browsing 4.sql/code injection 5.securing web app by using web services ........my question is how to implement these thing in our application is this done by hard coding or by help of some tool
What is the difference between an excel spreadsheet and a database?
How to Make the drop-down list appear faster?