Skip to content
All Expert Articles
Let G be the graph with 100 vertices numbered 1 to 100. Two vertices i and j are adjacent iff |i−j|=8 or |i−j|=12. The number of… Read More
type in Python Python have a built-in method called as type which generally come in handy while figuring out the type of variable used in… Read More
Which of the following query transformations (i.e., replacing the l.h.s. expression by the r.h.s. expression) is incorrect? R1 and R2 are relations. C1, C2 are… Read More
In a resident- OS computer, which of the following system software must reside in the main memory under all situations? (A) Assembler (B) Linker (C)… Read More
[5 Marks question] An instruction pipeline consists of 4 stages: Fetch(F), Decode operand field (D), Execute (E), and Result-Write (W). The five instructions in a… Read More
Endurance International Group came to our campus for internship. Positions: Software Development Engineer Intern and Development Operations Engineer Intern. It was only open for CS… Read More
Given a non-negative number n and two values l and r. The problem is to check whether all the bits are unset or not in… Read More
The numpy.delete() function returns a new array with the deletion of sub-arrays along with the mentioned axis.  Syntax: numpy.delete(array, object, axis = None) Parameters : … Read More
Given a non-negative number n and two values l and r. The problem is to check whether all the bits are set or not in… Read More
In computer security, a sandbox is a security mechanism for separating running programs, usually in order to minimize system failures or software vulnerabilities from spreading.… Read More
Often it’s necessary to trace memory usage of the system in order to determine the program that consumes all CPU resources or the program that… Read More
Round 1 (telephonic) https://www.geeksforgeeks.org/shuffle-a-given-array/ Design a system wherein users are sharing images. You need to track the top trending images Design an event system wherein… Read More
Social-Cop – A mobile based solution to address the needs of removal of daily traffic chaos. Problem: More people die on Indian roads every day… Read More
Pushback is used on an input stream to allow a byte to be read and then returned (i.e, “pushed back”) to the stream. The PushbackInputStream… Read More
Binary function object class whose call returns the result of subtracting its second argument from its first argument (as returned by the binary operator -).… Read More
Prerequisite: std::search std::search_n is an STL algorithm defined inside the header file , which is used to search whether a given element satisfies a predicate… Read More
std::generate is an STL algorithm, which is used to generate numbers based upon a generator function, and then, it assigns those values to the elements… Read More
std::generate, as the name suggests is an STL algorithm, which is used to generate numbers based upon a generator function, and then, it assigns those… Read More
Pre-requisites : Fork System Call Fork bomb Bash fork bomb : :(){:&:&};: Working in Unix : In Unix-like operating systems, fork bombs are generally written… Read More
If you have ever tried to create a program for solving Sudoku, you might have come across the Exact Cover problem. In this article, we… Read More