Coding interview preparation
5.76K subscribers
338 photos
47 files
163 links
Download Telegram
Practical threat intelligence
👍3
Nmap scan types and flag
Ethical hacking tools for recon
👍3
What would be the asymptotic time complexity to insert an element at the second position in the linked list?
Anonymous Quiz
36%
O(1)
49%
O(n)
15%
O(n2)
1%
O(n3)
Explanation: A new node is created with the required element. The pointer of the new node points the node to which the head node of the linked list is also pointing. The head node pointer is changed and it points to the new node which we created earlier. The entire process completes in O (1) time. Thus the asymptotic time complexity to insert an element in the second position of the linked list is O (1).
TCP vs UDP
👍3
Common CyberSecurity Careers
👍1
What will be the output of the following Java code snippet?
Anonymous Quiz
17%
Runtime Error
24%
Compilation Error
32%
It runs successfully
27%
EnumNotDefined Exception
7 layers of Cybersecurity
👍1
What is the output of below program?
Anonymous Quiz
8%
Print 1
15%
Print 10
40%
Print 20
37%
Compile error
Best Cybersecurity tools
👍1
What will be the output of the following C++ program?
Anonymous Quiz
12%
Sanfoundry!
21%
Sanfoundry!.
20%
Sanfoundry.
47%
Sanfoundry.!
1
YouTube channels for hacking and bug bounty
👍1