Top Programming Interview Questions

Top Programming Interview Questions

0. Arrays
  • How do you remove duplicates from an array?
  • How do you reverse an array?
  • How do you find the 2nd largest number in an unsorted integer array?
  • How is an array sorted using quick-sort?
  • How do you compare two arrays?
1. Linked Lists
  • How do you reverse a linked list?
  • How do you find the length of a linked list?
  • How are duplicate nodes removed in an unsorted linked list?
  • How do you find the third node from the end?
2. Strings
  • How do you find duplicate characters in strings?
  • How can a given string be reversed?
  • How do you check if a string contains only digits?
  • How do you find first non-repeated character?
3. DateTime
  • How do you find duplicate characters in strings?
  • How can a given string be reversed?
  • How do you check if a string contains only digits?
  • How do you find first non-repeated character?
3. Binary Trees / Heaps
  • What is the difference between a binary tree and a heap?
  • How is a binary search tree implemented?
  • How are all leaves of a binary tree printed?
  • How do you traverse a binary tree in post order traversal?
  • How do you check if a tree is binary search tree?
4. Miscellaneous
  • How do you find prime factors of an integer?
  • How do you implement insertion sort?
  • How do you check whether a number is a power of 2?
  • How do you check if a number is binary?
  • How is a merge sort algorithm implemented?
  • How to find the largest of three integers?
  • How do you perform a binary search on a given array?
  • How do you implement bucket sort algorithm?
Have a #question not in the list? Please #share it!

#ProgrammerPlus

要查看或添加评论,请登录

Ahmed El-Agawy ????的更多文章

  • Learning How to Learn, "Interleaving"

    Learning How to Learn, "Interleaving"

    One significant mistake #students sometimes make in #learning is jumping into the water before they learn to swim. In…

  • 8 Types of Cyber Attacks

    8 Types of Cyber Attacks

    Malware Short for #malicious #software, this is a type of unwanted software that is installed without your consent…

  • How do Web Servers work?

    How do Web Servers work?

    Web Server The term web server can refer to #hardware or #software or both of them working together. On the #hardware…

  • Hackers Start New Campaign Using Coronavirus to Launch Emotet Trojan

    Hackers Start New Campaign Using Coronavirus to Launch Emotet Trojan

    Hackers have embarked on another campaign taking advantage of the global fear of the coronavirus to get targets open a…

  • Object-Oriented Programming (OOP)

    Object-Oriented Programming (OOP)

    What is it? Object-Oriented Programming (OOP) is a way of writing computer programs that are using the idea of…

  • Levels of English Language A, B, and C.

    Levels of English Language A, B, and C.

    A1 You can understand and use familiar everyday expressions and very basic phrases aimed at the satisfaction of needs…

  • 7 Phases of the Software Development Life Cycle (SDLC)

    7 Phases of the Software Development Life Cycle (SDLC)

    1. PLANNING #Planning focuses on the scope of the #project.

  • Top Modern JavaScript Books

    Top Modern JavaScript Books

    Eloquent JavaScript By: Marijin Haverbeke This is a book about #JavaScript, #programming, and the wonders of the…

    2 条评论
  • Life Lessons From Programming

    Life Lessons From Programming

    Being Self-Driven is tough but vital! The sooner you learn that you're the only person who can solve your problems, the…

  • Key Mindsets of Expert Developers

    Key Mindsets of Expert Developers

    Master Debugging The ability to debug effectively has a disproportionately large impact on a programmer's ability to…

社区洞察

其他会员也浏览了