Number of single cycle components in an undirected graph
Given a set of ‘n’ vertices and ‘m’ edges of an undirected simple graph (no parallel edges and no self-loop), find the number of single-cycle-components… Read More »
Featured ArticleNumber of integers with odd number of set bits
Given a number n, count number of integers smaller than or equal to n that have odd number of set bits. Examples : Input :… Read More »
Featured ArticleInvert actual bits of a number
Given a non-negative integer n. The problem is to invert the bits of n and print the number obtained after inverting the bits. Note that… Read More »
Computer Organization | Asynchronous input output synchronization
Asynchronous input output is a form of input output processing that allows others devices to do processing before the transmission or data transfer is done.… Read More »
Heptadecagonal number
Given a number n, the task is to find the nth heptadecagonal number . A heptadecagonal number is class of figurate number. It has seventeen… Read More »
Debouncing in JavaScript
Debouncing in JavaScript is a practice used to improve browser performance. There might be some functionality in a web page which requires time-consuming computations. If… Read More »
IntMath Class | Guava | Java
Introduction : IntMath is used to perform mathematical operations on Integer values. Basic standalone math functions are divided into the classes IntMath, LongMath, DoubleMath, and… Read More »
Range query for count of set bits
Given an array of positive integer and q query which contains two integers, L & R. Task is to find the number of set bits… Read More »
Software Engineering | Black box testing
Prerequisite – Software Testing | Basics Black box testing is a type of software testing in which the functionality of the software is not known.… Read More »
Hexadecagonal number
Given a number n, the task is to find the nth hexadecagonal number. A Hexadecagonal number is class of figurate number and a perfect squares.… Read More »
Computer Network | How message authentication code works?
Prerequisite – Message authentication codes Apart from intruders, the transfer of message between two people also faces other external problems like noise, which may alter… Read More »
Software Engineering | Rapid application development model (RAD)
The Rapid Application Development Model was first proposed by IBM in 1980’s. The critical feature of this model is the use of powerful development tools… Read More »
Forming smallest array with given constraints
Given three integers x, y and z (can be negative). The task is to find the length of the smallest array that can be made… Read More »
Find value of k-th bit in binary representation
Given a number n and k (1 <= k <= 32), find value of k-th bit in binary representation of n. Bits are numbered from… Read More »
Kronos Incorporated Recruitment Process
About Company Recruitment Process Questions Asked in Kronos Interview Experiences Where to Apply ? About Company : Kronos Incorporated is a U.S.- based multi-national workforce… Read More »
Microprocessor | 8254 programmable interval timer
8254 is a device designed to solve the timing control problems in a microprocessor. It has 3 independent counters, each capable of handling clock inputs… Read More »
Program execution transfer instructions in 8086 microprocessor
Prerequisite – Branching instructions in 8085 microprocessor Program execution transfer instructions are similar to branching instructions and refer to the act of switching execution to… Read More »
PHP | each() Function
The each() function is an inbuilt function in PHP which basically returns an array with four elements, two elements (1 and Value) for the element… Read More »