GeeksforGeeks
GeeksforGeeks
04/26/2017 at 16:05. Facebook
[ Geeksforgeeks.org Link ]
Geek love's to drink cold coffee after coding for long hour's. One fine day Geek went to his favourite coffee shop in the town and asked for a cup of cold coffee. The shopkeeper told him that he is their lucky customer and had an offer for the Geek.
Geek loves to drink cold coffee after coding for long hours

Geek and Coffee Shop | Practice | GeeksforGeeks

practice.geeksforgeeks.org
GeeksforGeeks
GeeksforGeeks
04/26/2017 at 13:29. Facebook
[ Geeksforgeeks.org Link ]
Print the Middle of a given linked list
Flattening a linked list
Delete the elements in an linked list whose sum is equal to zero
Delete middle of linked list
Remove duplicate elements from sorted linked list
Print the Middle of a given linked list Flattening a linked

Top 20 Linked List Interview Question - GeeksforGeeks

geeksforgeeks.org
GeeksforGeeks
GeeksforGeeks
04/26/2017 at 04:30. Facebook
[ Geeksforgeeks.org Link ]
Round 1: Online Test (1 hr).
Round 2: Coding (45 Minutes).
Round 3: HR (5 to 10 Minutes).
Round 4: Technical (20 to 30 Minutes).

Round 1: It was Online round on cocubes.com.There wrere 4 section.

1) Quantitative aptitude : 15 Questions, 15 Minutes

2) Verbal : 15 Questions, 15 Minutes
Round 1 Online Test 1 hr Round 2 Coding 45 Minutes

Cavisson System Inc. Interview Experience | Set 1 (On Campus for SDE) - GeeksforGeeks

geeksforgeeks.org
GeeksforGeeks
GeeksforGeeks
04/26/2017 at 03:10. Facebook
[ Geeksforgeeks.org Link ]

By default enums have their own string values, we can also assign some custom values to enums. Consider below example for that.

Examples:

enum Fruits
{
APPLE(“RED”), BANANA(“YELLOW”), GRAPES(“GREEN”);
}

In above example we can see that the Fruits enum have three members i.e APPLE, BANANA and ORANGE with have their own different custom values RED, YELLOW and...
View details ⇨
By default enums have their own string values we can also

Enum with Customized Value in Java - GeeksforGeeks

geeksforgeeks.org
GeeksforGeeks
GeeksforGeeks
yesterday at 17:21. Facebook
[ Geeksforgeeks.org Link ]
Given a string of any combination of three letters ‘a’, ‘b’, and ‘c’, find length of the smallest string that can be obtained by applying the following operation repeatedly:
Take any two adjacent, distinct characters and replace them with the third.

Input : cab
Output : 2
We can select any two adjacent letters,
say 'ca' and transform it into 'b', this
leaves us...
View details ⇨
Given a string of any combination of three letters a b

Smallest length string with repeated replacement of two distinct adjacent - GeeksforGeeks

geeksforgeeks.org
GeeksforGeeks
GeeksforGeeks
yesterday at 15:44. Facebook
Platform to practice programming problems. Solve company interview questions and improve your coding intellect
GeeksforGeeks 04/25/2017

Minimum distance between two numbers | Practice | GeeksforGeeks

practice.geeksforgeeks.org
GeeksforGeeks
GeeksforGeeks
yesterday at 12:29. Facebook
[ Geeksforgeeks.org Link ]
Introducing ProGeek Cup 1.0. Interested candidates may fill their entries using SUBMIT YOUR PROGEEK IDEA BUTTON on [ Geeksforgeeks.org Link ]
Introducing ProGeek Cup 10 Interested candidates may fill their entries using

ProGeek Cup 1.0 - A Project Competition by GeeksforGeeks - GeeksforGeeks

geeksforgeeks.org
Aman Dwivedi
Sahil Goyal
GeeksforGeeks
GeeksforGeeks
yesterday at 08:40. Facebook
[ Geeksforgeeks.org Link ]
Greedy is an algorithmic paradigm that builds up a solution piece by piece, always choosing the next piece that offers the most obvious and immediate benefit. Greedy algorithms are used for optimization problems.
Greedy is an algorithmic paradigm that builds up a solution piece

Top 20 Greedy Algorithms Interview Questions - GeeksforGeeks

geeksforgeeks.org
GeeksforGeeks
GeeksforGeeks
yesterday at 07:00. Facebook
[ Geeksforgeeks.org Link ]
A path traversal attack allows attackers to access directories that they should not be accessing, like config files or any other files/directories that may contains server’s data not intended for public.
A path traversal attack allows attackers to access directories that they

Path Traversal Attack and Prevention - GeeksforGeeks

geeksforgeeks.org
GeeksforGeeks
GeeksforGeeks
04/24/2017 at 17:55. Facebook
[ Geeksforgeeks.org Link ]
Given a number, the task is to check if number is divisible by 5. The input number may be large and it may not be possible to store even if we use long long int.

Examples:

Input : n = 56945255
Output : Yes

Input : n = 1234567589333150
Output : Yes

Input : n = 3635883959606670431112222
Output : No
Given a number the task is to check if number is

Check if a large number is divisible by 5 or not - GeeksforGeeks

geeksforgeeks.org
GeeksforGeeks
GeeksforGeeks
04/24/2017 at 16:50. Facebook
[ Geeksforgeeks.org Link ]
Given an array of strings. The array has both empty and non-empty strings. All non-empty strings are in sorted order. Empty strings can be present anywhere between non-empty strings.
Input : arr[] = {"for", "", "", "", "geeks",
"ide", "", "practice", "" ,
"", "quiz", "", ""};
str = "quiz"
Output : 10
The string...
View details ⇨
Given an array of strings The array has both empty and

Search in an array of strings where non-empty strings are sorted - GeeksforGeeks

geeksforgeeks.org