Anti-Aliased Line Drawing Below is the image showing line drawn with Bresenham’s line algorithm (left) and Xiaolin Wu’s line algorithm (right) which smooths the line.… Read More

Given an array ‘arr1’ of n positive integers. Contents of arr1[] are copied to another array ‘arr2’, but numbers are shuffled and one element is… Read More

Given a string s we need to tell minimum characters to be appended (insertion at end) to make a string palindrome. Examples: Input : s… Read More

Convert a number m to n with minimum operations. The operations allowed are : Multiply by 2, i.e., do m = 2 * m Subtract… Read More

This article aims at giving an introduction to magic numbers and file headers, how to extract a file based on magic numbers, and how to corrupt… Read More

If there are a large number of tuples satisfying the query conditions, it might be resourceful to view only a handful of them at a… Read More

We have discussed Conversion from column number to Excel Column name. In this post, reverse is discussed.Given a column title as appears in an Excel… Read More

Although C does not provide direct support to error handling (or exception handling), there are ways through which error handling can be done in C.… Read More

Java doesn’t have pointers; Java has references. Reference: A reference is a variable that refers to something else and can be used as an alias… Read More

Mutation testing is a white-box testing technique, which changes certain portions of the code to reveal possible faults. On a very high level, it is… Read More

Given the level order traversal of a Complete Binary Tree, determine whether the Binary Tree is a valid Min-HeapExamples: Input : level = [10, 15,… Read More

A scaling transformation alters size of an object. In the scaling process, we either compress or expand the dimension of the object. Scaling operation can… Read More

Given a binary tree, find the number of subtrees having odd count of even numbers. Examples: Input : 2 / \ 1 3 / \… Read More

Given a undirected graph of n nodes and m edges. The task is to find minimum edges required to make Euler Circuit in the given… Read More

We know that a primary key of a table cannot be duplicated. For instance, the roll number of a student in the student table must… Read More