Given an array of n positive integers and a number k. Find the minimum number of swaps required to bring all the numbers less than… Read More »

#
All Medium Articles

Telephonic Round-1 A number of bad URLs are given (number could be huge-millions of them). Now user enters a URL, you need to identify whether… Read More »

This tutorial will help you download youtube video or audio with python using pafy library. Pafy library is used to retrieve YouTube content and metadata.… Read More »

Given an array of n-positive integers and a positive integer k, find a set of exactly m-elements such that difference of any two element is… Read More »

Prerequisites : NumPy in Python, Data Analysis Visualization with Python | Set 1 1. Storing DataFrame in CSV Format : Pandas provide to.csv(‘filename’, index =… Read More »

Morse code is a method of transmitting text information as a series of on-off tones, lights, or clicks that can be directly understood by a… Read More »

A Polybius Square is a table that allows someone to convert letters into numbers. To make the encryption little harder, this table can be randomized… Read More »

Given a string S, we have to find minimum characters that we can remove to make any permutation of the string S a palindrome. In… Read More »

Given inorder and level-order traversals of a Binary Tree, construct the Binary Tree. Following is an example to illustrate the problem. Examples: Input: Two arrays… Read More »

Given two numbers, find floor of their average without using division. Input : x = 10, y = 12 Output : 11 Input : x… Read More »

Round 1: Telephonic round. Find max 1 in a row of a 2D array.http://gdevtest.geeksforgeeks.org/find-the-row-with-maximum-number-1s/ Find the biggest square in a 2D array.http://gdevtest.geeksforgeeks.org/maximum-size-sub-matrix-with-all-1s-in-a-binary-matrix/ Round 2: On… Read More »

Partition given string in such manner that i’th substring is sum of (i-1)’th and (i-2)’nd substring. Examples: Input : “11235813” Output : [“1”, “1”, “2”,… Read More »

We are given n-processes with their completion times in form of an array. We need to find the time instant when a given process p… Read More »

Double hashing is a collision resolving technique in Open Addressed Hash tables. Double hashing uses the idea of applying a second hash function to key… Read More »

Given N numbers with no duplicates, count the number of unique triplets (ai, aj, ak) such that their XOR is 0. A triplet is said… Read More »

Consider the following four relational schemas. For each schema, all non-trivial functional dependencies are listed, The underlined attributes are the respective primary keys. Schema I:… Read More »

This valentine, gift your loved ones an heart with a message written within it to express what you feel about them. Don’t miss the moment… Read More »

Given a large number as string s and an integer k which denotes the number of breakpoints we must put in the number k <=… Read More »

Infix : An expression is called the Infix expression if the operator appears in between the operands in the expression. Simply of the form (operand1… Read More »

In hashing there is a hash function that maps keys to some values. But these hashing function may lead to collision that is two or… Read More »