Gblog Must Do Coding Questions for Product Based Companies
As the placement season is back, GeeksforGeeks is here to help you crack the interview. We have selected some most commonly asked and MUST DO… Read More
When searching for the key value 60 in a binary search tree, nodes containing the key values 10, 20, 40, 50, 70 80, 90 are… Read More
Consider a hash function that distributes keys uniformly. The hash table size is 20. After hashing of how many keys will the probability that any… Read More
The function f is defined as follows:Attention reader! Don’t stop learning now.  Practice GATE exam well before the actual exam with the subject-wise and overall… Read More
Consider n jobs J1, J2,……Jn such that job Ji has execution time ti and a non-negative integer weight wi. The weighted mean completion time of… Read More
What is the largest integer m such that every simple connected graph with n vertices and n edges contains at least m different spanning trees?… Read More
A depth-first search is performed on a directed acyclic graph. Let d[u] denote the time at which vertex u is visited for the first time… Read More
A partial order P is defined on the set of natural numbers as follows. Here x/y denotes integer division. i. (0, 0) ∊ P. ii.… Read More
The trapezoidal method is used to evaluate the numerical value of . Consider the following values for the step size h. i. 10-2 ii. 10-3… Read More
Which one of these first-order logic formula is valid? (A) ∀x(P(x) => Q(x)) => (∀xP(x) => ∀xQ(x)) (B) ∃x(P(x) ∨ Q(x)) => (∃xP(x) => ∃xQ(x))… Read More
Comprehension passages are sure shot scoring questions. We are given a passage and some questions that follow the passage. The questions are to be answered… Read More
In C/C++ and Java, we can write empty function as following // An empty function in C/C++/Java void fun() { } In Python, if we… Read More
Consider the XML document fragment given below: Consider the XPath expression: *[not (self ) : : TOC] What would be the result of the given… Read More
Consider the XML document fragment given below: With reference to the HTML lines given above, consider the following statements. 1. Clicking on the point does… Read More
A firewall is to be configured to allow hosts in a private network to freely open TCP connections and send packets on open connections. However,… Read More
Exponentiation is a heavily used operation in public key cryptography. Which of the following options is the tightest upper bound on the number of multiplications… Read More