Skip to content
Gblog Must Do Coding Questions for Product Based Companies
As the placement season is back, GeeksforGeeks is here to help you crack the interview. We have selected some most commonly asked and MUST DO… Read More
In C/C++ and Java, we can write empty function as following // An empty function in C/C++/Java void fun() { } In Python, if we… Read More
Consider the XML document fragment given below: Consider the XPath expression: *[not (self ) : : TOC] What would be the result of the given… Read More
Consider the XML document fragment given below: With reference to the HTML lines given above, consider the following statements. 1. Clicking on the point does… Read More
A firewall is to be configured to allow hosts in a private network to freely open TCP connections and send packets on open connections. However,… Read More
Exponentiation is a heavily used operation in public key cryptography. Which of the following options is the tightest upper bound on the number of multiplications… Read More
The minimum positive integer p such that 3p modulo 17 = 1 is (A) 5 (B) 8 (C) 12 (D) 16 Answer: (D) Explanation: Either… Read More
Consider lines of slope -1 passing between nodes. Given a Binary Tree, print all diagonal elements in a binary tree belonging to the same line.… Read More
This pattern is easy to understand as the real world is full of adapters.   For example consider a USB to Ethernet adapter. We need this… Read More
Consider the following two statements: i. A hash function (these are often used for computing digital signatures) is an injective function. A. encryption technique such… Read More
Consider a TCP connection in a state where there are no outstanding ACKs. The sender sends two segments back to back. The sequence numbers of… Read More
Consider the following statements about the timeout value used in TCP. i. The timeout value is set to the RTT (Round Trip Time) measured during… Read More
The address sequence generated by tracing a particular program executing in a pure demand paging system with 100 bytes per page is 0100, 0200, 0430,… Read More
Let a memory have four free blocks of sizes 4k, 8k, 20k, 2k. These blocks are allocated following the best-fit strategy. The allocation requests are… Read More
Processes P1 and P2 use critical_flag in the following routine to achieve mutual exclusion. Assume that critical_flag is initialized to FALSE in the main program.… Read More
Consider an ambiguous grammar G and its disambiguated version D. Let the language recognized by the two grammars be denoted by L(G) and L(D) respectively.… Read More

Start Your Coding Journey Now!