## Algorithms Quiz | Dynamic Programming | Question 8

What happens when a top-down approach of dynamic programming is applied to any problem? (A) It increases both, the time complexity and the space complexity… Read More »

What happens when a top-down approach of dynamic programming is applied to any problem? (A) It increases both, the time complexity and the space complexity… Read More »

What is the other name of Dijkstra algorithm? (A) single-source shortest path problem (B) multiple-source shortest path problem (C) multiple-destination shortest path problem (D) single-destination… Read More »

Consider a sorted array of n numbers and a number x. What would be the time complexity of the best known algorithm to find a… Read More »

This topic contains basic questions of Algorithm which can be helpful for GATE CS Preparation. So, it is recommended to solve each of these questions… Read More »

Consider the following code snippet for checking whether a number is power of 2 or not. filter_none edit close play_arrow link brightness_4 code /* Incorrect… Read More »

N = 496 – 2191 How many digits would be there if N is expressed in binary base. (A) 191 (B) 96 (C) 95 (D)… Read More »

In how many ways a deck of 52 cards can be distributed among 4 people uniformly? (A) (52! / 48! * 4!)*4! (B) 52! /… Read More »

Two fair dice are rolled. What is the probability that the sum of outcome is either 5 or 8? (A) 1/2 (B) 1/3 (C) 1/4… Read More »

A and B can finish a work in 6 days, B and C can finish the same work in 8 days and A and C… Read More »

How many zeros will be there at the end of product of 0!5! * 1!6! * 2! 7! * 3! 8! * 4!9! * 5!10!… Read More »

The shell command find -name passwd -print is executed in /etc directory of a computer system running Unix. Which of the following shell commands will… Read More »

The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network? (A) 172.57.88.62 and… Read More »

Which of the following are used to generate a message digest by the network security protocols? (P) RSA (Q) SHA-1 (R) DES (S) MD5 (A)… Read More »

Which one of the following is NOT desired in a good Software Requirement Specifications (SRS) document? (A) Functional Requirements (B) Non-Functional Requirements (C) Goals of… Read More »

Which of the following sorting algorithms can be used to sort a random linked list with minimum worst case time complexity? (A) Insertion Sort (B)… Read More »