## Algorithm Interview Questions and AnswersAn algorithm is an integral part of any process so that interviewers will ask you many questions related to the algorithm. Here is the list of some most asked ## 1) What is an algorithm? What is the need for an algorithm?An algorithm is a well-defined computational procedure that takes some values or the set of values, as an input and produces a set of values or some values, as an output.
The algorithm provides the basic idea of the problem and an approach to solve it. Some reasons to use an algorithm are as follows. - The algorithm improves the efficiency of an existing technique.
- To compare the performance of the algorithm with respect to other techniques.
- The algorithm gives a strong description of requirements and goal of the problems to the designer.
- The algorithm provides a reasonable understanding of the flow of the program.
- The algorithm measures the performance of the methods in different cases (Best cases, worst cases, average cases).
- The algorithm identifies the resources (input/output, memory) cycles required by the algorithm.
- With the help of an algorithm, we can measure and analyze the complexity time and space of the problems.
- The algorithm also reduces the cost of design.
## 2) What is the Complexity of Algorithm?The complexity of the algorithm is a way to classify how efficient an algorithm is compared to alternative ones. Its focus is on how execution time increases with the data set to be processed. The computational complexity of the algorithm is important in computing. It is very suitable to classify algorithm based on the relative amount of time or relative amount of space they required and specify the growth of time/ space requirement as a function of input size.
Time complexity is a Running time of a program as a function of the size of the input.
Space complexity analyzes the algorithms, based on how much space an algorithm needs to complete its task. Space complexity analysis was critical in the early days of computing (when storage space on the computer was limited). Nowadays, the problem of space rarely occurs because space on the computer is broadly enough. We achieve the following types of analysis for complexity
It is defined by the maximum number of steps taken on any instance of size n.
It is defined by the minimum number of steps taken on any instance of size n.
It is defined by the average number of steps taken on any instance of size n. ## 3) Write an algorithm to reverse a string. For example, if my string is "uhsnamiH" then my result will be "Himanshu".Algorithm to reverse a string.
## 4) Write an algorithm to insert a node in a sorted linked list.Algorithm to insert a node in a sorted linked list.
Check if the linked list is empty then set the node as head and return it.
Insert the new node in middle
Insert a node at the end ## 5) What are the Asymptotic Notations?Asymptotic analysis is used to measure the efficiency of an algorithm that doesn't depend on machine-specific constants and prevents the algorithm from comparing the time taking algorithm. Asymptotic notation is a mathematical tool that is used to represent the time complexity of algorithms for asymptotic analysis. The three most used asymptotic notation is as follows.
θ Notation defines the exact asymptotic behavior. To define a behavior, it bounds functions from above and below. A convenient way to get Theta notation of an expression is to drop low order terms and ignore leading constants.
The Big O notation bounds a function from above, it defines an upper bound of an algorithm. Let's consider the case of insertion sort; it takes linear time in the best case and quadratic time in the worst case. The time complexity of insertion sort is O(n
Just like Big O notation provides an asymptotic upper bound, the ## 6) Explain the Bubble sort algorithm?Bubble sort is the simplest sorting algorithm among all sorting algorithm. It repeatedly works by swapping the adjacent elements if they are in the wrong order. e.g. (72538) we have this array for sorting.
(
(2 Here, the sorted element is (23578). ## 7) How to swap two integers without swapping the temporary variable in Java?It's a very commonly asked trick question. There are many ways to solve this problem. But the necessary condition is we have to solve it without swapping the temporary variable. If we think about integer overflow and consider its solution, then it creates an excellent impression in the eye of interviewers. Suppose we have two integers I and j, the value of i=7 and j=8 then how will you swap them without using a third variable. This is a journal problem. We need to do this using Java programming constructs. We can swap numbers by performing some mathematical operations like addition, subtraction, multiplication, and division. But maybe it will create the problem of integer overflow.
It is a nice trick. But in this trick, the integer will overflow if the addition is more than the maximum value of int primitive as defined by Integer.MAX_VALUE and if subtraction is less than minimum value i.e., Integer.MIN_VALUE.
Another solution to swap two integers without using a third variable (temp variable) is widely recognized as the best solution, as it will also work in a language which doesn't handle integer overflow like Java example C, C++. Java supports several bitwise operators. One of them is XOR (denoted by ^). ## 8) What is a Hash Table? How can we use this structure to find all anagrams in a dictionary?A Hash table is a data structure for storing values to keys of arbitrary type. The Hash table consists of an index into an array by using a Hash function. Indexes are used to store the elements. We assign each possible element to a bucket by using a hash function. Multiple keys can be assigned to the same bucket, so all the key and value pairs are stored in lists within their respective buckets. Right hashing function has a great impact on performance. To find all anagrams in a dictionary, we have to group all words that contain the same set of letters in them. So, if we map words to strings representing their sorted letters, then we could group words into lists by using their sorted letters as a key. The hash table contains lists mapped to strings. For each word, we add it to the list at the suitable key, or create a new list and add it to it. ## 9) What is Divide and Conquer algorithms?Divide and Conquer is not an algorithm; it's a pattern for the algorithm. It is designed in a way as to take dispute on a huge input, break the input into minor pieces, and decide the problem for each of the small pieces. Now merge all of the piecewise solutions into a global solution. This strategy is called divide and conquer.
## 10) Explain the BFS algorithm?BFS (Breadth First Search) is a graph traversal algorithm. It starts traversing the graph from the root node and explores all the neighboring nodes. It selects the nearest node and visits all the unexplored nodes. The algorithm follows the same procedure for each of the closest nodes until it reaches the goal state.
## 11) What is Dijkstra's shortest path algorithm?Dijkstra's algorithm is an algorithm for finding the shortest path from a starting node to the target node in a weighted graph. The algorithm makes a tree of shortest paths from the starting vertex and source vertex to all other nodes in the graph. Suppose you want to go from home to office in the shortest possible way. You know some roads are heavily congested and challenging to use this, means these edges have a large weight. In Dijkstra's algorithm, the shortest path tree found by the algorithm will try to avoid edges with larger weights. ## 12) Give some examples of Divide and Conquer algorithm?Some problems that use Divide and conquer algorithm to find their solution are listed below. - Merge Sort
- Quick Sort
- Binary Search
- Strassen's Matrix Multiplication
- Closest pair (points)
## 13) What are Greedy algorithms? Give some example of it?A greedy algorithm is an algorithmic strategy which is made for the best optimal choice at each sub stage with the goal of this, eventually leading to a globally optimum solution. This means that the algorithm chooses the best solution at the moment without regard for consequences. In other words, an algorithm that always takes the best immediate, or local, solution while finding an answer. Greedy algorithms find the overall, ideal solution for some idealistic problems, but may discover less-than-ideal solutions for some instances of other problems. Below is a list of algorithms that finds their solution with the use of the Greedy algorithm. - Travelling Salesman Problem
- Prim's Minimal Spanning Tree Algorithm
- Kruskal's Minimal Spanning Tree Algorithm
- Dijkstra's Minimal Spanning Tree Algorithm
- Graph - Map Coloring
- Graph - Vertex Cover
- Knapsack Problem
- Job Scheduling Problem
## 14) What is a linear search?Linear search is used on a group of items. It relies on the technique of traversing a list from start to end by visiting properties of all the elements that are found on the way. For example, suppose an array of with some integer elements. You should find and print the position of all the elements with their value. Here, the linear search acts in a flow like matching each element from the beginning of the list to the end of the list with the integer, and if the condition is `True then printing the position of the element.'
Below steps are required to implement the linear search.
## 15) What is a Binary Search Tree?The binary search tree is a special type of data structure which has the following properties. - Nodes which are less than root will be in the left subtree.
- Nodes which are greater than root (i.e., contains more value) will be right subtree.
- A binary search tree should not have duplicate nodes.
- Both sides subtree (i.e., left and right) also should be a binary search tree.
## 16) Write an algorithm to insert a node in the Binary search tree?Insert node operation is a smooth operation. You need to compare it with the root node and traverse left (if smaller) or right (if greater) according to the value of the node to be inserted.
- Make the root node as the current node
- If the node to be inserted < root
- If it has left child, then traverse left
- If it does not have left child, insert node here
- If the node to be inserted > root
- If it has the right child, traverse right
- If it does not have the right child, insert node here.
## 17) How to count leaf nodes of the binary tree?
Steps for counting the number of leaf nodes are: - If the node is null (contains null values) then return 0.
- If encountered leaf node. Left is null and node Right is null then return 1.
- Recursively calculate the number of leaf nodes using
No. of leaf nodes= no of leaf nodes in left subtree + number of leaf nodes in the right subtree. ## 18) How to find all possible words in a board of characters (Boggle game)?In the given dictionary, a process to do a lookup in the dictionary and an M x N board where every cell has a single character. Identify all possible words that can be formed by order of adjacent characters. Consider that we can move to any of the available 8 adjacent characters, but a word should not have multiple instances of the same cell.
Following words of the dictionary are present JAVA ## 19) Write an algorithm to insert a node in a link list?
- Check If the Linked list does not have any value then make the node as head and return it
- Check if the value of the node to be inserted is less than the value of the head node, then insert the node at the start and make it head.
- In a loop, find the appropriate node after which the input node is to be inserted. To find the just node start from the head, keep forwarding until you reach a node whose value is greater than the input node. The node just before is the appropriate node.
- Insert the node after the proper node found in step 3.
## 20) How to delete a node in a given link list? Write an algorithm and a program?Write a function to delete a given node from a Singly Linked List. The function must follow the following constraints: - The function must accept a pointer to the start node as the first argument and node to be deleted as the second argument, i.e., a pointer to head node is not global.
- The function should not return a pointer to the head node.
- The function should not accept pointer to pointer to head node.
We may assume that the Linked List never becomes empty. Suppose the function name is delNode(). In a direct implementation, the function needs to adjust the head pointer when the node to be deleted the first node.
We will handle the case when the first node to be deleted then we copy the data of the next node to head and delete the next node. In other cases when a deleted node is not the head node can be handled generally by finding the previous node.
Available Link List: 12 15 10 11 5 6 2 3 Delete node 10: Updated Linked List: 12 15 11 5 6 2 3 Delete first node Updated Linked list: 15 11 5 6 2 3 ## 21) Write a c program to merge a link list into another at an alternate position?We have two linked lists, insert nodes of the second list into the first list at substitute positions of the first list.
if first list is 1->2->3 and second is 12->10->2->4->6, the first list should become 1->12->2->10->17->3->2->4->6 and second list should become empty. The nodes of the second list should only be inserted when there are positions available. Use of extra space is not allowed i.e., insertion must be done in a place. Predictable time complexity is O(n) where n is number of nodes in first list.
I Linked List: 1 2 3 II Linked List: 4 5 6 7 8 Updated I Linked List: 1 4 2 5 3 6 Updated II Linked List: 7 8 ## 22) Explain how the encryption algorithm works?Encryption is the technique of converting plaintext into a secret code format it is also called as "Ciphertext." To convert the text, the algorithm uses a string of bits called as "keys" for calculations. The larger the key, the higher the number of potential patterns for Encryption. Most of the algorithm use codes fixed blocks of input that have a length of about 64 to 128 bits, while some uses stream method for encryption. ## 23) What Are The Criteria Of Algorithm Analysis?An algorithm is generally analyzed by two factors. - Time complexity
- Space complexity
## 24) What are the differences between stack and Queue?Stack and Queue both are non-primitive data structure used for storing data elements and are based on some real-world equivalent. Let's have a look at key differences based on the following parameters.
The significant difference between stack and queue is that stack uses LIFO (Last in First Out) method to access and add data elements whereas Queue uses FIFO (First in first out) method to obtain data member.
In Stack, the same end is used to store and delete elements, but in Queue, one end is used for insertion, i.e., rear end and another end is used for deletion of elements.
Stack uses one pointer whereas Queue uses two pointers (in the simple case).
Stack operates as Push and pop while Queue operates as Enqueue and dequeuer.
Stack does not have variants while Queue has variants like a circular queue, Priority queue, doubly ended Queue.
The stack is simpler while Queue is comparatively complex. ## 25) What is the difference between the Singly Linked List and Doubly Linked List data structure?This is a traditional interview question on the data structure. The major difference between the singly linked list and the doubly linked list is the ability to traverse. You cannot traverse back in a singly linked list because in it a node only points towards the next node and there is no pointer to the previous node. On the other hand, the doubly linked list allows you to navigate in both directions in any linked list because it maintains two pointers towards the next and previous node. |