Free Essay

Research Paper

In:

Submitted By nfathima
Words 48008
Pages 193
www.it-ebooks.info

www.it-ebooks.info

Programming Interviews Exposed:
Secrets to Landing Your Next Job
Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxix
Chapter 1

Before the Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Chapter 2

The Job Application Process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Chapter 3

Approaches to Programming Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Chapter 4

Linked Lists. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Chapter 5

Trees and Graphs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

Chapter 6

Arrays and Strings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

Chapter 7

Recursion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
. .

Chapter 8

Sorting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

Chapter 9

Concurrency. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

Chapter 10

Object-Oriented Programming. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159

Chapter 11

Design Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

Chapter 12

Databases. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

Chapter 13

Graphics and Bit Manipulation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

Chapter 14

Counting, Measuring, and Ordering Puzzles . . . . . . . . . . . . . . . . . . . . . 207

Chapter 15

Graphical and Spatial Puzzles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225

Chapter 16

Knowledge-Based Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239

Chapter 17

Nontechnical Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253

Appendix

Résumés . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263

Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
. .

www.it-ebooks.info

www.it-ebooks.info

Programming Interviews Exposed
Third Edition

www.it-ebooks.info

www.it-ebooks.info

Programming Interviews Exposed
Secrets to Landing Your Next Job
Third Edition

John Mongan
Eric Giguère
Noah Kindler

www.it-ebooks.info

Programming Interviews Exposed: Secrets to Landing Your Next Job, Third Edition
Published by
John Wiley & Sons, Inc.
10475 Crosspoint Boulevard
Indianapolis, IN 46256

www.wiley.com
Copyright © 2013 by John Mongan, Eric Giguère, and Noah Kindler
Published by John Wiley & Sons, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-1-118-26136-1
ISBN: 978-1-118-28720-0 (ebk)
ISBN: 978-1-118-28340-0 (ebk)
ISBN: 978-1-118-28466-7 (ebk)
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923,
(978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions
Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services.
If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services please contact our Customer Care Department within the
United States at (877) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http:// booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.
Library of Congress Control Number: 2012941787
Trademarks: Wiley, the Wiley logo, Wrox, the Wrox logo, Wrox Programmer to Programmer, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners.
John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.

www.it-ebooks.info

For Thuy, the love of my life, who understands me.

—John Mongan
To my parents, Jean-Claude and Marie-Jolle, who encouraged and supported my love of programming.

—Eric Giguère
To Mikey, Alex, and Teddy
—Noah Kindler

www.it-ebooks.info

www.it-ebooks.info

About the AuthorS

John Mongan is a self-taught programmer with professional experience as a consultant for several

software and pharmaceutical companies. He has three patents on software testing technologies. He holds a B.S. degree from Stanford and an M.D. and a Ph.D. degree in bioinformatics from UC San
Diego, where he worked on supercomputer simulations of protein dynamics. He currently conducts research in medical informatics as a resident radiologist at UC San Francisco.
Eric Giguère started programming in BASIC on a Commodore VIC-20 (a long time ago) and was

hooked. He holds BMath and MMath degrees in computer science from the University of Waterloo, has extensive professional programming experience, and is the author of several programming books. He currently works as a software engineer at Google.
Noah Kindler is VP Technology at the security technology company Avira. He leads software design and development teams across several products with a user base of over 100 million.

www.it-ebooks.info

www.it-ebooks.info

About the Technical Editors

Michael Gilbert is a long-time systems programmer for various engineering firms. He got his start developing games for the Atari ST, and was a frequent contributing editor for STart magazine.
Over the years, he’s developed gaming software on the PC and Mac for clients worldwide. He’s also an expert Flash Actionscript programmer and has produced a popular internet gaming environment called HigherGames, you can check it out at www.highergames.com. He now enjoys developing games for the iPhone and iPad, and currently has four games in the AppStore (Woridgo, Jumpin’ Java, Kings
Battlefield, and Set Pro HD). In his spare time, he enjoys trying to defeat his wife Janeen in a friendly game of Scrabble. You can follow him on Twitter at mija711.
Justin Vogt is an experienced software development professional with a unique blend of skills

(technical, architectural, design, communication, creative, management, and development leadership).
He has over 15 years of diverse experience in software development and has worked on projects that include embedded software, mobile development, web development, commercial software development, device communications, medical application development, and non-profit organization solution development. www.it-ebooks.info

www.it-ebooks.info

Credits
Executive Editor

Production Manager

Carol Long

Tim Tate

Project Editor

Vice President and
Executive Group Publisher

Maureen Spears

Richard Swadley
Technical Editor

Justin J. Vogt

Vice President and Executive Publisher

Neil Edde
Production Editor

Kathleen Wisor

Associate Publisher

Jim Minatel
Copy Editor

Apostrophe Editing

Project Coordinator, Cover

Katie Crocker
Editorial Manager

Mary Beth Wakefield

Compositor

Craig Johnson, Happenstance Type-O-Rama
Freelancer Editorial Manager

Rosemarie Graham

Proofreader

Nancy Carrasco
Associate Director of Marketing

David Mayhew

Indexer

Jack Lewis
Marketing Manager

Ashley Zurcher

Cover Designer

Ryan Sneed
Business Manager

Amy Knies

Cover Image

© Andrew Rich / iStockPhoto

www.it-ebooks.info

www.it-ebooks.info

Acknowledgments

The preparation of this edition followed an unusual path, and we appreciate the extensive

efforts of the staff at Wiley to bring it to a timely and successful completion. The contributions of our editor, Maureen Spears, who can rapidly overcome any obstacle that arises, and the personal attention of our publisher, Jim Minatel, and our senior acquisitions editor, Carol Long, were especially key, and we thank them for their time, work, and assistance.
The quality of this edition has been greatly improved by Wayne Heym’s thoughtful comments and detailed review, and we thank him for his generous contributions.
In addition, John is deeply grateful for Michael J. Mongan’s help in facilitating his participation with this edition.
No third edition would have been possible without the two that preceded it, however, and the many people who contributed to them. For this reason, we also thank our original editors, Margaret Hendrey and Marjorie Spencer, for their patience and helpfulness. We are also grateful to our original reviewers and advisors, Dan Hill, Elise Lipkowitz, Charity Lu, Rob Maguire, and Tom Mongan. Dan’s contributions in particular were tremendous — the quality of the first edition was vastly improved by his careful and meticulous reviews.

www.it-ebooks.info

www.it-ebooks.info

Contents

Preface

xxv

Introduction

xxix

Chapter 1: Before the Search

Know Yourself
Know the Market

1

1
3

Basic Market Information
What About Outsourcing?

3
4

Develop Marketable Skills
5
Get Things Done
6
Manage Your Online Profile
6
Summary 8
Chapter 2: The Job Application Process

9

Finding and Contacting Companies

9

Finding Companies
Getting Referrals
Working with Headhunters
Contacting the Company Directly
Job Fairs

9
10
10
11
12

The Interview Process

12

Screening Interviews
12
On-Site Interviews
13
Dress 13

A Recruiter’s Role
Offers and Negotiation

14
15

Dealing with Recruiter Pressures
Negotiating Your Salary
Accepting and Rejecting Offers

15
15
16

Summary 17

www.it-ebooks.info

CONTENTS

Chapter 3: Approaches to Programming Problems

The Process

19

19

The Scenario
The Problems
Which Languages to Use
Interactivity Is Key

19
20
20
21

Solving the Problems

22

The Basic Steps
When You Get Stuck

22
23

Analyzing Your Solution

24

Big-O Analysis In Action
How Big-O Analysis Works
Best, Average, and Worst Cases
Optimizations and Big-O Analysis
How to Do Big-O Analysis
Which Algorithm Is Better?
Memory Footprint Analysis

25
26
27
27
28
28
29

Summary 30
Chapter 4: Linked Lists

Why Linked Lists?
Kinds of Linked List

31

31
32

Singly Linked Lists
Doubly Linked Lists
Circular Linked Lists

32
34
34

Basic Linked List Operations
Tracking the Head Element
Traversing a List
Inserting and Deleting Elements

Linked List Problems

34
34
36
36

38

Stack Implementation
Maintain Linked List Tail Pointer
Bugs in removeHead
Mth-to-Last Element of a Linked List
List Flattening
List Unflattening
Null or Cycle

38
43
48
50
53
56
58

Summary 60

xviii

www.it-ebooks.info

CONTENTS

Chapter 5: Trees and Graphs

61

Trees 61
Binary Trees
63
Binary Search Trees
64
Heaps 66
Common Searches
66
Traversals 67

Graphs 68
Tree and Graph Problems
68
Height of a Tree
Preorder Traversal
Preorder Traversal, No Recursion
Lowest Common Ancestor
Binary Tree to Heap
Unbalanced Binary Search Tree
Six Degrees of Kevin Bacon

69
70
71
73
75
77
79

Summary 83
Chapter 6: Arrays and Strings

85

Arrays 85
C and C++
86
Java 87
C# 87
JavaScript 88

Strings 88
C 89
C++ 89
Java 90
C# 90
JavaScript 91

Array and String Problems

91

Find the First Nonrepeated Character
Remove Specified Characters
Reverse Words
Integer/String Conversions

91
94
97
101

Summary 105

xix

www.it-ebooks.info

CONTENTS

Chapter 7: Recursion

107

Understanding Recursion
Recursion Problems
Binary Search
Permutations of a String
Combinations of a String
Telephone Words

107
111
111
113
116
119

Summary 124
Chapter 8: Sorting

125

Sorting Algorithms

125

Selection Sort
126
Insertion Sort
127
Quicksort 128
Merge Sort
130

Sorting Problems

131

The Best Sorting Algorithm
Stable Selection Sort
Multi-Key Sort
Make a Sort Stable
Optimized Quicksort
Pancake Sorting

132
134
137
138
139
142

Summary 144
Chapter 9: Concurrency

Basic Thread Concepts

145

145

Threads 145
System Threads versus User Threads
146
Monitors and Semaphores
146
Deadlocks 147
A Threading Example
147

Concurrency Problems

150

Busy Waiting
150
Producer/Consumer 152

The Dining Philosophers
155
Summary 158

xx

www.it-ebooks.info

CONTENTS

Chapter 10: Object-Oriented Programming

159

Fundamentals 159
Classes and Objects
Inheritance and Polymorphism

Construction and Destruction
Object-Oriented Programming Problems
Interfaces and Abstract Classes
Virtual Methods
Multiple Inheritance

159
160

162
162
162
164
165

Summary 166
Chapter 11: Design Patterns

What Are Design Patterns?

167

167

Why Use Design Patterns?
Design Patterns in Interviews

Common Design Patterns

167
168

168

Creational Patterns
Behavioral Patterns
Structural Patterns

168
171
172

Design Pattern Problems

172

Singleton Implementation
Decorator versus Inheritance
Efficient Observer Updates

172
175
176

Summary 176
Chapter 12: Databases

177

Database Fundamentals

177

Relational Databases
177
SQL 178
Database Transactions
182

Database Problems

183

Simple SQL
Company and Employee Database
Max, No Aggregates
Three-Valued Logic

183
184
186
188

Summary 189

xxi

www.it-ebooks.info

CONTENTS

Chapter 13: Graphics and Bit Manipulation

191

Graphics 191
Bit Manipulation
192
Binary Two’s Complement Notation
Bitwise Operators
Optimizing with Shifts

192
193
194

Graphics Problems

194

Eighth of a Circle
Rectangle Overlap

195
197

Bit Manipulation Problems

200

Big-Endian or Little-Endian
Number of Ones

201
203

Summary 205
Chapter 14: Counting, Measuring, and Ordering Puzzles

Tackling Brainteasers

207

207

Solving the Right Problem
Don’t Be Intimidated
Beware of Simple Problems
Estimation Problems

Brainteaser Problems

208
209
210
210

211

Count Open Lockers
Three Switches
Bridge Crossing
Heavy Marble
Number of American Gas Stations

211
213
214
218
222

Summary 223
Chapter 15: Graphical and Spatial Puzzles

Draw It First
Graphical and Spatial Problems
Boat and Dock
Counting Cubes
The Fox and the Duck
Burning Fuses
Escaping the Train

225

225
226
226
228
231
234
235

Summary 237

xxii

www.it-ebooks.info

CONTENTS

Chapter 16: Knowledge-Based Questions

239

Preparation 239
Problems 240
C++ versus Java
241
Friend Classes
241
Argument Passing
242
Macros and Inline Functions
243
Inheritance 245
Garbage Collection
245
32-Bit versus 64-Bit Applications
247
Network Performance
247
Web Application Security
248
Cryptography 250
Hash Tables versus Binary Search Trees
251

Summary 251
Chapter 17: Nontechnical Questions

253

Why Nontechnical Questions?
253
Questions 254
“What Do You Want to Do?”
“What Is Your Favorite Programming Language?”
“What Is Your Work Style?”
“What Can You Tell Me about Your Experience?”
“What Are Your Career Goals?”
“Why Are You Looking to Change Jobs?”
“What Salary Are You Expecting?”
“What Is Your Salary History?”
“Why Should We Hire You?”
“Why Do You Want to Work for This Company?”
“Do You Have Any Questions for Me?”

254
255
256
256
256
256
257
259
260
260
260

Summary 261

xxiii

www.it-ebooks.info

CONTENTS

Appendix: Résumés

263

The Technical Résumé

263

A Poor Example
Sell Yourself
Keep It Short
List the Right Information
Be Clear and Concise
Relevant Information Only
Use Reverse Chronological Ordering
Always Proofread
The Improved Example
Managers and Senior Developers
Tailor the Résumé to the Position

Sample Résumé

263
267
267
268
269
270
271
271
271
273
279

279

Conclusion 283
Index

285

xxiv

www.it-ebooks.info

Preface

The most important thing we have to tell you is the same as in the first edition: You will

get as much out of this book as you put into it. If you read this book cover to cover, you will learn something, but not nearly as much as you would if you take some time trying to work through the problems before you read the answers.
That said, many of the other things we have to tell you have changed over the period of more than a decade since the first edition was published, so it was thrilling to have another opportunity to revise
Programming Interviews Exposed.
This edition represents the largest update yet. In addition to revising, expanding, and updating the material from the previous edition, chapters on the important topics of sorting and design patterns are added. The non-programming parts of the book were revised to reflect the realities of today’s job market. Throughout all this, we maintain the approachable style and step-by-step thought process developed for the original edition.
Code samples are largely in C, C++, or Java, but in most cases the focus is on the data structures and algorithms, and the language choice is entirely secondary. All the examples should be easily understandable for an experienced programmer.
One of us (Eric) recently interviewed for and landed his dream job at Google, which has given him additional perspective on programming interviews, reflected in this revision. We’re pleased that
Google seems to be leading a shift away from the use of trivial puzzles in interviews, something we’ve complained about since the first edition (see the following original preface).
We hope you enjoy the third edition of Programming Interviews Exposed and that it helps you get the job you’ve always wanted. We’d love to hear your thoughts on the book and your interview experiences. You can contact us at authors@piexposed.com. Be sure to visit the official Programming
Interviews Exposed site at http://www.piexposed.com for updates and more information.

Preface to the First Edition
If you’re like us, you don’t usually read prefaces. This one has some useful information in it, though, so we hope you’ll make an exception. If you’re still tempted to skip the preface, here’s what you really need to know: You’ll get as much out of this book as you put into it. If you read this book cover to cover, you’ll learn something, but not nearly as much as you would if you take some time trying to work through the problems on your own before you read the answers.
This book will help prepare you for the interviews you will face when seeking a job in programming, development, technical consulting, or any other field that warrants a programming interview.
Programming interviews bear little resemblance to those described in traditional job-hunting and interview books. They consist almost entirely of programming problems, puzzles, and technical

www.it-ebooks.info

PREFACE

questions about computers. This book discusses each of the kinds of problems you are likely to encounter and illustrates how they are best approached using questions from real interviews as examples. At this point you may be wondering who we are and what gives us the authority to write this book.
We’re both recent graduates who’ve been through a lot of interviews in the past few years. We’ve interviewed for jobs ranging from technical consulting with large established companies to writing device drivers for startups. This book is based on the experiences and observations we’ve taken from those interviews — what yielded offers and what didn’t. We believe that this is the best possible basis for a book like this. Rather than give you some HR exec’s idea of how interviewing should be done or a head hunter’s impression of how it might be done, we will tell you what interviews are really like at America’s top software and computer companies and what you need to do to get the job you want.

NOTE For the record, we don’t think that the way interviewing is done today is necessarily the way it should be done. The current paradigm puts too much emphasis on the ability to solve puzzles and familiarity with a relatively limited body of knowledge, and it generally fails to measure a lot of the skills that are critical to success in industry.
To that end, we haven’t made up any of the questions in this book. Every last one of them has been lifted from a recent interview. The distributions of problem type and difficulty are similar to what you should expect to encounter in your interviews. We must emphasize that the problems presented in this book are a representative sample of the questions asked in interviews, not a comprehensive compilation. Reading this book straight through and memorizing the answers would completely miss the point. You may be asked some of the questions that appear in this book, but you should not expect that. A large and constantly changing body of questions is asked, and any intelligent interviewer who has seen this book will never again use any of the questions that appear here. On the other hand, interview questions encompass relatively few topic areas and types of questions, and these rarely change. If you work on learning to solve not just the specific problems we present, but the types of problems we present, you’ll be able to handle anything they throw at you in an interview. We’ve taken a couple of steps to facilitate the objective of improving your problem-solving skills.
First, where appropriate, we provide reviews of important topics before we present questions on those topics. Second, instead of merely giving answers to the problems, we illustrate the problem-solving process from beginning to solution. We’ve found that most textbooks and nearly all puzzle books take a different approach to examples: They begin with a problem, go immediately to the answer, and then explain why the answer is correct. In our experience, the result is that the reader may understand the particular answer and why it’s right, but is left with no clue as to how the author came up with that solution or how a similar problem might be solved. We hope that our step-by-step approach to solutions will address this issue, helping you to understand not only the answers but also how you arrive at the answers.

xxvi

www.it-ebooks.info

PREFACE

Learning by watching is never as effective as learning by doing. If you want to get the most out of this book, you will have to work out the problems yourself. We suggest the following method:
After you read a problem, put the book down and try to work out the solution.

1.
2.

3.

Read just far enough to get the hint you need, and then put down the book and keep working. 4.

Repeat this as necessary.

If you get stuck, start reading the solution. We never blurt out the answer at the beginning, so you don’t have to worry that we’re going to give away the entire solution.

The more of the solution you work out yourself, the better your understanding will be. In addition, this method closely resembles the actual interview experience, where you will have to solve the problems yourself, but the interviewer will give you hints when you get stuck.
Programming is a difficult and technical art. It would be impossible to teach everything you need to know about computers and programming in one book. Therefore, we’ve had to make some assumptions about who you are. We assume that you have a background in computers equivalent to at least the first year or two of a computer science degree. Specifically, we expect that you are comfortable with programming in C, that you’ve had some experience with object-oriented programming in C++ or perhaps Java, and that you know the fundamentals of computer architecture and computer science theory. These are effectively the minimum requirements for a general development job, so most interviewers will have similar expectations. If you find yourself lacking in any of these areas, you should seriously consider seeking more education before starting your job search and interviews.
It’s also possible that you have a great deal more computer knowledge and experience than what we’ve described as the minimum requirements. If so, you may be particularly interested in some of the more advanced topics included. However, don’t ignore the basic topics and questions, no matter how much experience you have. Interviewers tend to start with the fundamentals regardless of what’s on your résumé.
We have made every effort to ensure that all of the information in this book is correct. All of the code has been compiled and tested. Nevertheless, as you probably know all too well from your own programs, a few bugs and errors are inevitable. As we become aware of such problems, we will post corrections at http://www.piexposed.com.
We’re confident that you’ll find this book useful in getting the job you want. We hope that you may also find it an entertaining exploration of some clever puzzles in your chosen profession. If you’d like to tell us about your reaction to our book, share your thoughts on any particular problem or topic, or provide a problem from one of your recent interviews, we’d love to hear from you. Please e-mail us at authors@piexposed.com.
Go find a killer job!

xxvii

www.it-ebooks.info

www.it-ebooks.info

Introduction

Landing a great programming job isn’t a matter of luck; it’s a matter of preparation. The programming interview process that most software firms use today is designed to determine whether you can actually code. It can be a grueling process, especially because the limitations imposed by the interview format make the process almost completely different from anything you experience in school or on the job. If you’ve never encountered it before, it can be quite a shock. Even great programmers who are inexperienced with programming interviews often struggle if they are unprepared for what they will face.

This book was written to prepare you for the technical interview process so that you have no problem demonstrating how great a programmer you are. It doesn’t teach you how to program; it shows you how to use the programming skills you have to shine in a programming interview. As you read this book, keep in mind that programming interviews (for the most part) are not factual recall tests, so this book isn’t a cheat sheet of all the facts you need to know for your interview. Instead, it teaches by example the techniques and thought processes you need to succeed. The best way to internalize these is to take time to work through and understand the problems. If you do, you’ll approach your interviews with confidence because you’ll be prepared to solve any problem you’re given, putting you that much closer to landing the job you want.

Why Programming Interviews?
Why do software firms use programming interviews? They want to hire great programmers who can work well with others to successfully produce great products. Unfortunately, bitter experience has taught employers that a substantial portion of applicants for programming jobs simply cannot code.
You might expect that these applicants could be screened out by careful review of résumés, experience, course work, and degrees, but in practice this often fails. There are a surprisingly large number of applicants with sparkling résumés and years of apparently relevant industry experience who cannot accomplish even the simplest of programming tasks. Many of them have picked up enough terminology that they can appear competent in conversations about programming and technology. Hiring one of these “developers” who can’t code can easily sink a department (or even a small company).
Recognizing that traditional interviews are ineffective to identify applicants who can’t code, employers took a logical step: Ask applicants to do some coding during the interview. Thus the programming interview was born. Programming interviews are extremely effective at separating those who can code from those who can’t, which is why they are a nearly universal part of the technical interview process.
The difficulty with programming interviews is that employers don’t just want to screen out people who can’t code. Employers want to distinguish the best programmers from those who are merely competent. This is a more difficult distinction to make. Typically, interviewers try to measure an applicant’s ability by posing difficult programming challenges and noting how quickly and accurately the applicant solves them.

www.it-ebooks.info

introduction

The problem with this approach is that due to the time restriction inherent to an interview, the skills that can be tested in a programming interview only partially overlap the skills that are relevant to real-world development. By necessity, programming interviews evaluate your ability to solve problems on the spot, with someone watching you, without the benefit of any of the references you would typically have available. There isn’t time to write a lot of code, so problems must have short solutions.
Most problems with short solutions would be trivial, so to avoid this many interview problems involve unusual algorithmic tricks, absurd restrictions, or obscure language features. Because these types of problems don’t typically arise in real-world development, an excellent programmer who is unprepared for the peculiarities of the interview experience may appear to be unqualified.
Conversely, there are many skills essential to development in a professional environment that programming interviews don’t assess well (or at all). These include communicating and working as part of a team; architecture, and management of large codebases; time management and discipline to consistently produce reliable code on schedule; and the ability to tackle a large project, identify all the component parts, and carry the project through to completion.
Clearly, programming interviews do not provide a perfect measure of an applicant’s worth as a future employee. But to paraphrase Churchill’s assessment of democracy, it’s the worst form of technical interview except for all the other forms that have been tried. More to the point, programming interviews are the way employers choose who they will hire, so you need to perform well in them regardless of whether they are an ideal form of assessment. This book is devoted to teaching you how to adapt your programming skills to the peculiarities of interview problems and gives you the preparation and practice you need to shine in interviews so that you get the job you want.

How to Use this Book
Preparation is the key to mastering the programming interview process. The following are some general guidelines on how to effectively use this book to prepare for programming interviews:
➤➤

Give yourself enough time to prepare. Start your preparations as early as possible, ideally weeks or even months ahead of your interviews. You need that time to practice the concepts presented here. (If you don’t have the luxury of that much time, try to put aside some blocks of uninterrupted time to study the material.)

➤➤

Practice answering problems. Don’t just read through the solutions. Work through the problems using the solutions for a hint when you get stuck and to verify your answer. Try to simulate the interview experience. Most of the time you’ll be writing code on paper or a whiteboard; practice this! It sounds silly, but it takes some practice to get the programming part of your brain engaged through a pen instead of a keyboard.

➤➤

Make sure you understand the underlying concepts. Understanding the concepts that underlie the problems is the key to your success. Don’t skip or gloss over the material you don’t understand. This book provides enough of an explanation to refresh your memory of topics you’ve learned before, but if you encounter something you’ve completely forgotten or never learned, you may need to read more about it in another reference.

xxx

www.it-ebooks.info

introduction

➤➤

Don’t bother memorizing the answers to the problems. Interviewers are unlikely to present you with any of the problems in this book. Even if they do, they may change the problem in any number of small ways. If you answer it by rote, your answer may be incorrect.

➤➤

Keep practicing. Your preparation doesn’t stop after finishing this book. Keep working on programming problems; they’re easy to find on the Internet. Find additional reference material, especially in your areas of expertise, and keep reading.

Your health and well-being is your most important asset; it affects how well you learn and how well you interview. Remember to get enough sleep — especially close to an interview date — and to exercise and eat properly. Take regular breaks to help your mind integrate the material. Don’t try to cram at the last minute — when it’s time for your interview, you’ll be a much more effective problem solver if you go in relaxed with a clear mind than if you stress yourself by cramming right up until the interview.
As part of your preparation, be sure to visit http://www.piexposed.com to sign up for our mailing list and learn about the special smartphone app we’ve prepared to help you with your interviews.
Now, let’s get started!

xxxi

www.it-ebooks.info

www.it-ebooks.info

1

Before the Search
Before starting your job search, you need to prepare yourself. You shouldn’t apply for jobs without knowing what kind of job you want. Just being a good coder isn’t enough; you must understand what the market wants and how you can improve and package your own skills to make sure that the company with the job you want will want you.

Know Yourself
Stereotypes to the contrary, all programmers are not alike. Knowing what kind of programmer you are is crucial to finding the right kind of job. Although you can probably do many different kinds of programming tasks, you probably don’t find them all equally engaging. Doing something you don’t enjoy is fine on a short-term basis, but you need to be interested in and excited by what you’re doing for it to sustain you over the long term. The best programmers are passionate about their work, and you can’t truly be passionate about something that’s only moderately interesting to you.
If you’re not sure what you like or dislike, ask yourself some questions:
➤➤

Are you a systems programmer or an application developer? Systems programmers work on the code that keeps computer systems running: frameworks, tools, compilers, drivers, servers, and so on. Other programmers are their primary audience, so little interaction occurs with non-programmers — and usually the job involves little or no user interface work. Application developers, on the other hand, work on the pieces that those non-programmers use to do their own work, and often more interaction occurs with non-technical people. Many programmers find interacting with non-technical people about technical topics to be frustrating; on the other hand, you may enjoy creating applications that are seen and used by an audience that extends beyond other programmers.

➤➤

Do you like coding user interfaces? User interface design — also referred to as user experience (UX) or human computer interaction (HCI) — is a role that draws on a diverse set of skills, including programming, graphic design, and psychology. This

www.it-ebooks.info

2

❘ CHAPTER 1 Before the Search

work is high profile because the user interface is the most visible part of any application.
User interface design is particularly important in mobile application development, where the restrictions of the device require even greater creativity and innovation. If you have the necessary skills and enjoy this work, you’re in elite company: Many programmers find it finicky, hard to do well, and easy to criticize, especially when you take internationalization and accessibility issues into account.
➤➤

Are you a good debugger? If you think finding problems in your own code is difficult, imagine what it’s like to fix problems with someone else’s code. It requires strong analytical and problem-solving skills. Finding and fixing bugs can be extremely rewarding in its own right.
You need to know if you’d be happy doing primarily maintenance work. (Of course, you should always expect to maintain your own code — all programmers need debugging skills.)
In many cases, particularly in older companies, maintenance programming jobs involve working primarily with older technologies now considered outdated or no longer in fashion.
Developing your experience and skills with older technologies may narrow the range of jobs that you’re suited for, but because expertise in older technologies is hard to find, you may be highly sought after by the smaller number of companies dependent on older programs.

➤➤

Do you like testing? Testing — also referred to as quality assurance or QA for short — requires a combination of meticulous attention to detail to ensure that tests cover every conceivable use of a program and outside-the-box creativity to find bugs in the program by generating combinations of inputs that the program’s developers never considered. Skilled testers are hard to find, and good programming skills are required to write tools and automated test cases.

➤➤

Are you an architect or a coder? Every coding job includes some kind of design aspect, but certain jobs lean more one way than the other. If you enjoy designing, particularly designing the large-scale structure of big projects, a position as a software architect might be more appealing than a coding-focused job. Although you need a good understanding of how to code to be an effective architect, architecture positions can involve a lot of meetings and interpersonal interactions and little or no coding. Unless you have formal training in software architecture, the usual route to becoming an architect is to code first and to then display an aptitude for designing and fitting together different pieces of a project.

The preceding questions deal with different kinds of programming, but you should also consider non-programming responsibilities that might interest you and the work environment that you prefer:
➤➤

Does management interest you? Some coders have a long-term goal to become a manager, but others shiver at the very thought. If management is your goal, you need to develop leadership skills and demonstrate that you can manage the human parts of the software development equation as well as the technical pieces. If management is not your goal, look for companies with good technical career paths, so you’re not forced to manage people to be promoted. (You still need leadership skills to get promoted no matter which career path you choose, but leadership skills are separate from people management skills.)

➤➤

Do you want to work for a big company? There are advantages and disadvantages to working at big companies. For example, a large company may offer more job stability (although layoffs during downturns are common) and some kind of career path. It may also have a name brand that non-techies recognize. On the other hand, you may feel stifled by the bureaucracy, rigidness, and intracompany rivalry often found in bigger companies.

www.it-ebooks.info

Know the Market

❘ 3

➤➤

Do you want to work for a small company? The pay may be less, but getting in on the ground floor at a new company can create opportunities for future advancement (and possibly substantial remuneration) as the company grows and succeeds. Also, the work environment at small companies is often more informal than at larger organizations. The downside, of course, is that most new ventures fail, and you may be out of a job within a year or two, most likely without the kind of severance package you might expect from a large company.

➤➤

Do you want to work on open source projects? The vast majority of programming jobs have historically involved proprietary, closed-source projects, which some programmers don’t like. A shift has occurred in some companies in favor of more open software development, which provides opportunities for people to work on open-source projects and still be paid for that participation. If it’s important to you that your work project is open source, it’s best to seek out companies already involved in open source. Trying to champion open source in traditional software companies is often a frustrating and fruitless undertaking.

➤➤

Do you want long-term or short-term projects? Some programmers crave change, spending a few months at most on each project. If you like short-term projects and don’t mind traveling, a gig with a consulting company might make more sense than a more conventional corporate job.

Realize that there are no universal answers to these questions, and no right or wrong way to answer them. The more truthful you are in answering them, the more likely you’ll find the kind of programming job you truly enjoy.

Know the Market
Knowing what you’d like to do is great, but don’t box yourself in too narrowly. You also need to understand the current job market and how it constrains your search for the “ideal” job, especially during an economic downturn like the one that burst the Internet bubble of the late ’90s or the global real estate and banking meltdown of the late 2000s.

Basic Market Information
A number of sources of information exist about what’s hot and what’s not in the developer job market, including the following:
➤➤

Social networks — The tremendous growth of social networks, such as LinkedIn, Facebook, and Google+, have transformed social networks into virtual recruiting grounds for all types and sizes of organizations. LinkedIn is particularly important. The other social networks can provide an indirect “pulse” of the market and also valuable leads for new and even unannounced job postings.

➤➤

Online job sites — Visit two kinds of job sites as part of your research. Job listing sites such as Dice (which specializes in technology-related career listings) and Monster (a general job listing site) enable you to see what kinds of jobs are currently in demand. Review sites such as Glassdoor and CareerBliss discuss working conditions, salaries, bonuses, perks, and other information useful for finding the right kind of company for you.

www.it-ebooks.info

4

❘ CHAPTER 1 Before the Search

➤➤

Bookstores — Even though more and more programmer documentation is available online, professionally published books are still important, whether printed or downloadable. The number of books published on any given topic is a good indication of the level of interest the programming community has in that topic. Look especially for niche topics that are suddenly going mainstream, but beware that in most companies, mainstream use of technologies lags the interest levels represented in books by a few years.

➤➤

Professional development courses — Colleges and universities try to keep abreast of what companies want and create professional development courses around those needs.

If you’re not in college or university, find out what languages and technologies the local institutions and your alma mater require of their computer science students; although academic needs don’t always coincide with what employers want, educational institutions try to graduate students with practical skills that employers can use.

What About Outsourcing?
Outsourcing and offshoring — contracting tasks to other companies or foreign divisions or companies — is an important part of the technical employment landscape. Outsourcing of ancillary business activities such as payroll administration and property maintenance has been around for decades. More recently, this has expanded to programming, driven by the advent of inexpensive computers, cheap long distance communication provided by the Internet, and the recognition of technically educated workforces in low-wage developing countries. There was a flurry of outsourcing, particularly offshoring, in the mid-2000s. This has become less topical in the past several years because most companies that intend to outsource have already outsourced whatever they can. In addition, the costs of offshoring have risen as wages rise in the developing world, particularly in
India and China. This coupled with recognition of the hidden costs of coordination with workforces from different cultures on very different schedules have led some companies to insource roles they previously outsourced. Nevertheless, outsourcing and offshoring remain a possibility for expanding companies that think they may cut costs, as well as established companies wondering if they’re paying too much by keeping their work local.
If outsourcing (and offshoring in particular) is something that worries you, consider taking steps to avoid landing a job that might be outsourced at some point in the future. The following are some suggestions: ➤➤

Work for software development firms — A software firm’s raison d’être is the intellectual property it develops. Although medium and large firms may open development centers in other parts of the world, the smart ones are unlikely to move their entire operations to other countries or entrust their future to outside firms. That said, some companies outsource all or substantial parts of a project to other countries for cost or other reasons, so it pays to research a company’s behaviors and policies.

➤➤

Work for an outsourcer — Oddly enough, many outsourcing firms hire personnel in countries such as the United States.

www.it-ebooks.info

Develop Marketable Skills

❘ 5

➤➤

Move up the programmer food chain — Design-oriented jobs are less likely to be outsourced.
Coders are relatively cheap and plentiful, but good designers are much harder to find. (This assumes that your company recognizes that good design skills are separate from good coding skills.) Another way to make yourself more difficult to replace is to acquire domain specific knowledge: expertise related to the programs you write but outside of the field of programming. For example, if you develop financial software, it’s much more difficult to outsource your job if it involves the application of accounting skills in addition to programming than if you’re purely a coder.

➤➤

Take a management job — Management can be a refuge from outsourcing, so a managementoriented career path is one option to consider.

Of all these options, moving up the food chain is usually the best approach. The more non-programming knowledge your job requires, or the more interaction with customers, the less likely you are to be outsourced. There’s no guarantee you’ll never be outsourced, of course, or that you’ll always keep your job. Your company may shutter or downsize the project you’re working on at any point, after all, and put you back on the street. This is why developing reusable and marketable skills throughout your career is extremely important.

Develop Marketable Skills
In the appendix we discuss your résumé as a marketing tool to get you job interviews. The easiest thing to sell is something that people want, so it’s important that you have marketable skills to offer a prospective employer.
To stand out from the crowd both on paper and in the interviews you need to develop skills and accomplishments, especially if you’re entering the job market for the first time. The following are some approaches you can take:
➤➤

Upgrade your credentials — Companies such as Google are well known for favoring job applicants with graduate degrees. Getting a master’s or doctorate degree is one way to upgrade your credentials. You can upgrade your credentials in other ways, such as taking university or professional development courses or participating in programming contests.

➤➤

Get certified — Certification is a contentious issue in the software development profession, but some jobs either prefer or require candidates to be certified in specific technologies, especially IT jobs. Consider surveying job listings to see whether certifications are required for the jobs that interest you before you invest time and money in certifications.

➤➤

Work on a side project — A great way to expand your skill set is to work on a project not directly related to your primary work or study focus. Starting or joining an open-source development project is one way to go. Or if you work at a company, see if it will let you spend time on an ancillary project.

➤➤

Do well in school — Although grades aren’t everything, they are one measure that companies use to rank new graduates with little job experience. The better your grades, especially in computer science and mathematics courses, the more you can impress a potential employer.

www.it-ebooks.info

6

❘ CHAPTER 1 Before the Search

➤➤

Keep learning — The end of formal education doesn’t mean you should stop learning, especially when so much information about programming is available from a wide variety of sources. Whether it’s books or blogs, there’s always a way to keep current, no matter what type of programming you do. It’s also a great way to expand your horizons and discover other areas of interest. This kind of learning doesn’t show up on your résumé, but it’s something you can highlight in your technical interviews.

➤➤

Be an intern — New graduates who manage to secure employment during their non-school terms — especially those that participate in cooperative education programs — have a huge advantage over their peers who haven’t yet ventured into the real world. Software development in the field is often different from software development in an academic setting, and potential employers are cognizant of this.

The key is to keep learning, no matter the stage of your career. You can’t develop marketable skills overnight; they take some effort and initiative on your part but can have long-lasting effects on your career. Get Things Done
Companies look for software developers who get things done. You may look great on paper in terms of skills and education, but credentials and knowledge don’t make products or services that a company can sell. It’s your ability to accomplish something that truly sets you apart from the other candidates. Getting an advanced degree such as a Ph.D., becoming a trusted contributor to a widely used open source project, or carrying a product through from start to launch are all big accomplishments. But small accomplishments can be just as important, such as adding a feature to a product, making a measurable improvement to the product’s performance, starting and completing a side project, or creating a useful application for a class project. These all show that you can get things done.
Recruiters and hiring committees like to see that you have multiple accomplishments — a pattern of getting things done. This is especially true for more senior and experienced developers. You need to show those accomplishments on your résumé and your online profile. Whether your accomplishments are big or small, always be ready to talk intelligently and confidently about each one. This is incredibly important! Make sure you can clearly and succinctly describe the underlying problem and how your project solved it, even to a non-technical person. Displaying a passion for programming is always positive; clearly communicating how your passion produces products and services that other people can use makes you really stand out from the other candidates.

Manage Your Online Profile
Your online profile — everything public about you online — is just as important as your résumé.
Recruiters use online profiles to find desirable candidates. Screeners use them to weed out undesirable applicants. Interviewers use them to prepare in-depth interview questions when résumés lack details. www.it-ebooks.info

Manage Your Online Profile

❘ 7

An online profile consists of any or all these things:
➤➤

LinkedIn profile — LinkedIn is a social network for tracking professional connections.
It’s free to join, and you can create a detailed profile about yourself, including your jobs and your education — essentially an online résumé. Colleagues and customers can publicly endorse you or your work, which can be quite valuable.

➤➤

Other social network profiles — Other social networks such as Facebook or Google+, depending on your privacy settings.

➤➤

Personal website — This is a potential source of more in-depth information about you.

➤➤

Articles and blog posts — If you write about programming-related topics, this is a good way for recruiters to assess your experience.

➤➤

Comments and forum posts — These provide another way to gain some insight into your programming skills and your general attitude toward technology and technology companies.

The impression employers get from your online profile can affect your chances of being hired. If your résumé lists extensive experience with C# but they find a forum posting you made only 6 months ago asking how to open a file in C#, they’ll probably conclude that you’re exaggerating your experience level, putting your whole résumé into doubt. Or if they see disturbing or inflammatory material that they think you’ve authored, they may decide to pass you over for an interview, no matter how well your résumé reads or how long ago you wrote those things. No one’s proud of everything they ever did in high school or college, but those who have grown up in the post-Internet era see things follow them that they’d rather forget about, something the older generations rarely had to contend with.
At some point before you apply for a job, take a good look at your online profile. Put yourself in a company’s shoes to see how much information — good or bad — they can find about you, or link to you. If your online profile is possibly going to prevent you from being hired, take some steps to sanitize your profile. If possible, remove questionable material from the web and from the search engines.
Spend some time developing the positive aspects of your profile. This is particularly important if there’s unfavorable material about you on the web that you’re unable to remove. You may want to read a little about search engine optimization (SEO) and apply some of these techniques to get the positive aspects of your profile to appear before older, less favorable items in search results. If you don’t have a LinkedIn profile, create one, and make it as detailed as possible; if you already have one, make sure it’s up to date. Consider creating a profile on Stack Overflow or a similar Q&A site, and spend some time answering questions relating to your areas of expertise.
WARNING One caveat about updating your LinkedIn profile: By default, all your contacts are notified of your updates. Many people have learned to interpret these notifications as de facto announcements that someone is looking for a new job. That might help you get the word out, but if your contacts include people at your current company and you don’t want them to know you’re looking for a new job, disable these notifications before you make your updates.

www.it-ebooks.info

8

❘ CHAPTER 1 Before the Search

Develop an online profile that doesn’t throw any red flags in front of the screeners and shows you in the best possible light. Finding a good job is hard enough — why make it harder?

Summary
What you do before a formal job search is critical to finding the right kind of job. With that in mind, you should consider the following things:
➤➤

Know your likes and dislikes as a programmer and a prospective employee.

➤➤

Understand the market to find and apply for the best jobs.

➤➤

Develop the marketable skills that employers look for and that can enhance your career.

➤➤

Manage your public profile to show you in the best possible light and make sure there are no surprises to turn off potential employers.

Once you’ve worked through all these points, you’re ready to begin your job search.

www.it-ebooks.info

2

The Job Application Process
Interviewing and recruiting procedures are similar at most tech companies, so the more prepared you are for what you will encounter, the more successful you will be. This chapter familiarizes you with the entire job-search process, from contacting companies to starting your new job, so you won’t need to write off your first few application attempts as learning experiences. Hiring procedures at technical companies are often substantially different from those followed by more traditional firms, so you may find this information useful even if you’ve spent some time in the working world.

Finding and Contacting Companies
The first step to getting a job is to find and make contact with companies you’re interested in working for. Although referrals are the best way to land a job, you can also work with headhunters or contact a company directly.

Finding Companies
You can better target your search if you know which companies you’re most interested in working for. Big companies are easy to find — you can probably name a dozen national and international tech companies off the top of your head. You can identify candidate medium-sized (as well as large) companies through articles in trade and local business press. Many magazines and newspapers regularly compile lists of successful companies and rankings of the best places to work.
(Take these rankings with a grain of salt: There’s often a lot of variation in quality of work life across large companies.) Most companies of this size also advertise at least some of their job openings on online job boards; these postings can help you identify companies to investigate even if the specific job posted isn’t right for you.
Small companies, especially early-stage startups, can be much more challenging to find. Often these companies are too small, too new, or too secretive to get much press. They may lack the resources to advertise their openings beyond their own website, which you can’t find unless

www.it-ebooks.info

10

❘ CHAPTER 2 The Job Application Process

you know the name of the company. One good way to find these companies is asking friends and acquaintances if they know of startups that are hiring. Another technique is to use online social networks. You can use some sites, such as LinkedIn, to search for people by profession within a region.
Most people on these sites list the name of their company, so you can build a list of companies in a particular region by going through the results of this search. This can be laborious, but part of the payoff is that if you can’t find these companies any other way, neither can anyone else, so you’re likely to be competing with fewer applicants.

Getting Referrals
Referrals are the best way to find a job. Tell all your friends about what kind of job you’re looking for. Even if they don’t work for the kinds of companies that might hire you, they may know people who do. Coming from “Susan’s friend” or “Bill’s neighbor,” your résumé is sure to receive more careful consideration than the hundreds (or thousands) of anonymous résumés that come flooding in from online postings, job fairs, and other recruitment activities. Be sure to use your social networks, both real and virtual, to identify potential job opportunities.
Don’t feel you’re imposing on your friends and acquaintances. Companies often reward employees with big bonuses — as much as several thousand dollars — for successful referrals of talented software engineers. Your friends have a financial incentive to submit as many résumés as possible! (This is why referral bonuses are paid only after the referred person has been hired and has started working for the company.)
After you have a contact at a company, it’s up to you to make the most of it. Your approach depends on how well you know the contact.
If the contact is not a close friend, e-mail the person to arrange a time to speak. When you speak to the person, ask about the company and the work environment. Then ask about any existing job openings. The person might not know of any — many employees know only about job openings in their immediate workgroup — but if you know jobs are available, point the person to the job listings.
Explain why you’d be a good match for one of those openings. Then ask the person to submit your résumé. Before you end your conversation, always thank people for their time.
If the contacts are close friends, you can be more casual and just ask about job openings and if they’d refer you.
The best referrals are from people who have worked with you before. A current employee who vouches for your skills and accomplishments is the strongest type of referral. That’s why you need to keep track of former co-workers — you might want to work with them again one day.

Working with Headhunters
Particularly when labor markets are tight, some firms use outside recruiters known as headhunters to help them find candidates. In addition, you may find it useful to seek out a headhunter and provide her with your information.
If you list yourself with a headhunter, she can assist you with your job search and call you when she learns of an opening that matches your skill set. It may take a while, so don’t be discouraged.

www.it-ebooks.info

Finding and Contacting Companies

❘ 11

Some headhunters are more helpful than others, so ask around to see if anyone you know has recommendations. If you can’t locate a headhunter this way, you can search the web for headhunters, recruiters, or staffing services. You can check out a prospective headhunter by asking for references, but be aware that headhunters deal with so many people that even those who frequently do a poor job probably have 5 or 10 satisfied clients who serve as references.
When you work with headhunters, you must understand their motivation: headhunters are paid only when an applicant they’ve referred is hired. It is therefore in a headhunter’s interest to put as many people as possible into as many jobs as possible as quickly as possible. A headhunter has no financial incentive to find you the best possible job — or to find a company the best possible applicant, for that matter. If you recognize that a headhunter is in business for the purpose of making a living and not for the purpose of helping you, you are less likely to be surprised or disappointed by your experiences. This is not to suggest that headhunters are bad people or that as a rule they take advantage of applicants or companies. Headhunters can be helpful and useful, but you must not expect them to look out for your interests above their own.
When you get a potential lead from a headhunter, she will usually send you a job description and a vague description of the type of company but not the name of the company. This is to make sure that if you apply for the job, you do it through the headhunter so that she gets her commission. It’s unethical to independently apply for a job that comes to you through a headhunter, but sometimes you might like to have more information about the job or company before you proceed. For example, you may determine that it’s a job you’ve already applied for, or at a location that would involve too long of a commute. The job description that the headhunter sends you is often copied verbatim from the company’s website so by pasting it into your favorite search engine you can often find the original job listing.
Some companies don’t work with headhunters in any capacity, so don’t limit yourself by conducting your entire job search through a headhunter. As a corollary of this, avoid working with any headhunter who insists on being your exclusive representative. Finally, be aware that “headhunter” is a widely used term by people outside of this profession, but considered pejorative by most of the people who do this work, so it’s best not to use the word “headhunter” when you speak to one of them.

Contacting the Company Directly
You can also try contacting companies directly. The Internet is the best medium for this approach.
Most companies’ web pages have instructions for submitting résumés. If the website lists specific openings, read through them and submit your résumé specifically for the openings that interest you. If you don’t have a contact within the company, it’s best to look for specific job openings: In many companies, résumés targeted at a specific job opportunity are forwarded directly to the hiring manager, whereas those that don’t mention a specific opening languish in the human resources database. A tech-oriented job site is a good place to start your search if you don’t have a specific company already in mind.
If a site doesn’t provide any directions for submitting your résumé, look for an e‑mail address to which you can send it. Send your résumé as both plain text in the body of the e-mail (so the recipient can read it without having to do any work) and, unless there are instructions to the contrary, as an attached file so that the recipient can print a copy. A PDF file is ideal; otherwise, attach a Microsoft
Word file. Do not send a file in any other format unless specifically requested. Be sure to convert the

www.it-ebooks.info

12

❘ CHAPTER 2 The Job Application Process

file so that it can be read by older versions of Word, and scan it with an antivirus program (you can easily do this by mailing the resume to yourself as an attachment) to be absolutely certain that your résumé isn’t carrying any macro viruses.
Approaching a company directly like this is a bit of a long shot, especially when the résumé is sent to a generic human resources e-mail address. Many companies use automated screening software to filter incoming résumés, so if your résumé lacks the right buzzwords, a human probably won’t even see it. Consult the appendix for tips to get your résumé past automated screeners. With a good résumé in hand it takes so little time and effort to apply that you have nothing to lose.

Job Fairs
Job fairs are an easy way to learn about and make contact with a lot of companies without much effort. Your chances of success with any one particular company at a job fair are low because each company sees so many applicants. However, given the number of companies at a job fair, your overall odds may still be favorable. If you collect business cards at the job fair and follow up with people afterward, you can separate yourself from the rest of the job fair crowd.
In addition, if they are available to you, college career centers, alumni organizations, and professional associations can also be helpful in finding jobs.

The Interview Process
If someone is sufficiently impressed by your résumé to want to talk to you, the next step is one or more screening interviews, usually followed by an on-site interview. Here, we prepare you for the stages of the interview process and help you dress for success.

Screening Interviews
Screening interviews are usually conducted by phone and last anywhere from 15 minutes to an hour.
You should take the interview in a quiet room with no distractions and keep pen and paper handy to take notes. Screening interviews may also take place on the spot at a job fair or on campus as part of a college recruiting process.
The initial screening interview is with a company recruiter or human resources representative. The recruiter wants to make sure that you’re interested in doing the job the company is hiring for, that you have the skills needed for the position, and that you’re willing to accept any logistical requirements of the position, such as relocation or travel.
If you make it past the recruiter, there’s normally a second screening interview in which a technical person asks you a few knowledge-based questions. These questions are designed to eliminate applicants who have inflated their résumés or are weak in skills that are key to the position. During the technical interview you may be asked to write some code using some kind of cloud-based documentsharing tool such as Google Docs. This gives the interviewer a firsthand look at your coding skills.
You should treat the phone interview as seriously as an on-site interview. It is an interview.

www.it-ebooks.info

The Interview Process

❘ 13

If the feedback from the technical interviewer is positive, the recruiter will get back to you, usually within a week, to schedule an on-site interview at the company’s office.

On-Site Interviews
Your performance in on-site interviews is the biggest factor in determining whether you get an offer.
These interviews consist mostly of a variety of technical questions: problems requiring you to implement a simple program or function; questions that test your knowledge of computers, languages, and programming; and sometimes even mathematics and logic puzzles. The majority of this book focuses on helping you answer these questions to succeed in your interviews.
Your on-site interviews usually last either a half day or a full day and typically consist of three to six interviews of 30 to 60 minutes each. Arrive early and well rested at the company’s office, and take a restroom break if at all possible before any of the interviewing starts. Turn off any phones or pagers you carry. Under no circumstances should you interrupt your interview to read or answer a text, page, or call. You’ll likely be greeted by either the recruiter you’ve been dealing with or the hiring manager.
You may get an informal tour before the actual interviewing starts, which is a good way to see what the working conditions are like at that location.
Your interviewers may be the members of the team you’ll work with if you are hired, or they may be engineers chosen at random from other groups within the company. Most companies have a rule that any interviewer can block an applicant from being hired, so all your interviews are important.
Sometimes you may interview with two separate teams on the same day. Usually each group you interview with makes a separate decision about giving you an offer.
The company usually takes you out for lunch midway through your interview day. A free lunch at a nice restaurant or even at the company cafeteria is certainly enjoyable, but don’t let your guard down completely. If you make a negative impression at lunch, you may lose your offer. Be polite, and avoid alcohol and messy foods. These general guidelines apply to all company outings, including evening recruiting activities. Moderate drinking is acceptable during evening outings, but show restraint.
Getting drunk isn’t likely to improve your chances to get an offer.
At the end of the day, you may meet with the boss; if he or she spends a lot of time trying to sell you on working for the company, it’s a pretty strong indication that you’ve done well in your interviews and an offer will follow.

Dress
Job applicants traditionally wear suits to interviews. Most tech companies, though, are business casual — or even just casual. The running joke at some of these companies is that the only people who wear suits are job candidates and salespeople.
This is one area in which it’s critical to do some research. It’s probably not to your advantage to wear a suit if nobody else at the company is wearing them, not even the salespeople. On the other hand, if you wear jeans and a T-shirt, interviewers may feel you’re not showing sufficient respect or seriousness, even though they may be wearing jeans. Ask around to see what’s appropriate for the company.
Expectations for dress vary by location and nature of business. For example, programmers working

www.it-ebooks.info

14

❘ CHAPTER 2 The Job Application Process

for a bank or brokerage may be expected to wear suits. You should aim to dress as well as or slightly more formally than you would be expected to dress for the job you’re interviewing for.
In general, though, a suit or even a jacket and tie is overkill for most technical job interviews. A standard technical interviewing outfit for men consists of non-denim cotton pants, a collared shirt, and loafers (no sneakers or sandals). Women can dress similarly to men. No matter what your sex, go light on the perfume or cologne.

A Recruiter’s Role
Your interviews and offer are usually coordinated by a company recruiter or human resources representative. The recruiter is responsible for the scheduling and logistical aspects of your interview, including reimbursing you for travel or lodging expenses. Recruiters aren’t usually involved in the hiring decision but may pass on information about you to those who are. They are also usually the ones who call you back about your offer and handle compensation negotiations.
Recruiters are usually good at what they do. The vast majority of recruiters are honorable people deserving of your respect and courtesy. Nevertheless, don’t let their friendliness fool you into thinking that their job is to help you; their job is to get you to sign with their company as quickly as possible for as little money as possible. As with headhunters, you need to understand the position recruiters are in so that you understand how they behave:
➤➤

Recruiters may focus on a job’s benefits or perks to draw attention away from negative aspects of a job offer. They generally tell you to come to them with any questions about your offer. This is fine for benefit and salary questions, but ill-advised when you have questions about the job. The recruiter usually doesn’t know much about the job you’re being hired to do. When you ask a specific question about the job, the recruiter has little incentive to do the work to find the answer, especially if that answer might cause you to turn down the offer. Instead, recruiters are likely to give you a vague response along the lines of what they think you want to hear. When you want straight answers to your questions, it’s best to go directly to the people you’ll be working for. You can also try going directly to your potential manager if you feel the recruiter is being unreasonable with you.
This is a somewhat risky strategy — it certainly won’t win you the recruiters’ love — but often the hiring manager has the authority to overrule decisions or restrictions that a recruiter makes. Hiring managers are often more willing to be flexible than recruiters.
You’re just another applicant to recruiters, but to the hiring manager, you’re the person she chose to work with.

➤➤

After the decision is made to give you an offer, the recruiter’s job is to do everything necessary to get you to accept the offer at the lowest possible salary. A recruiter’s pay is often tied to how many candidates he signs. To maneuver you, a recruiter sometimes might try to play career counselor or advisor by asking you about each of your offers and leading you through a supposedly objective analysis to determine which is the best offer. Not surprisingly, this exercise always leads to the conclusion that the offer from the recruiter’s company is clearly the best choice.

www.it-ebooks.info

Offers and Negotiation

➤➤

❘ 15

Some recruiters are territorial enough about their candidates that they won’t give you your prospective team’s contact information. To protect against this possibility, collect business cards from your interviewers during your interviews, particularly from your prospective managers. Then you’ll have the necessary information without having to go through the recruiter. Offers and Negotiation
When you get an offer, you’ve made it through the hardest part: You now have a job, if you want it.
However, the game isn’t over yet. You’re looking for a job because you need to make money; how you play the end game largely determines how much you get.
When your recruiter or hiring manager makes you an offer, she may also tell you how much the company plans to pay you. Perhaps a more common practice, though, is for the recruiter or hiring manager to tell you that the company would like to hire you and ask you how much you want to make. Answering this question is covered in detail in Chapter 17.
After you’ve been given a specific offer that includes details about salary, signing bonus, and stock options, you need to decide whether you’re satisfied with it. This shouldn’t be a snap decision — never accept an offer on the spot. Always spend at least a day thinking about important decisions such as this; it’s surprising how much can change in a day.

Dealing with Recruiter Pressures
Recruiters often employ a variety of high-pressure tactics to get you to accept offers quickly. They may tell you that you must accept the offer within a few days if you want the job, or they may offer you an exploding signing bonus: a signing bonus that decreases by a fixed amount each day. Don’t let this bullying rush your decision. If the company wants you (and it probably does if it made you an offer), these limits and terms are negotiable, even when a recruiter claims they aren’t. You may have to go over the recruiter’s head and talk to your hiring manager if the recruiter refuses to be flexible. If these conditions are non-negotiable, you probably don’t want to work for a rigid company full of bullies anyway.

Negotiating Your Salary
If, after careful consideration, the offer meets or exceeds your expectations, you’re all set. On the other hand, if you’re not completely happy with your offer, you should try to negotiate. All too often, applicants assume that offers are non-negotiable and reject offers without negotiation or accept offers they’re not pleased with. Almost every offer is negotiable to some extent.
You should never reject an offer for monetary reasons without trying to negotiate. When you negotiate an offer that you would otherwise reject, you hold the ultimate high card. You’re ready to walk, so you have nothing to lose.
Even when an offer is in the range you were expecting, it’s often worthwhile to negotiate. As long as you are respectful and truthful in your negotiations and your requests are reasonable, you’ll almost

www.it-ebooks.info

16

❘ CHAPTER 2 The Job Application Process

never lose an offer just because you tried to negotiate it. In the worst case, the company refuses to change the offer, and you’re no worse off than before you tried to negotiate.
If you decide to negotiate your compensation package, here’s how you do it:
➤➤

Figure out exactly what you want. You may want a signing bonus, better pay, or more stock options. ➤➤

Arrange a phone call with the appropriate negotiator, usually the recruiter. Your negotiator is usually the same person who gave you the terms of your offer. Don’t call the negotiator blind because you may catch him at an inconvenient time.

➤➤

Explain your case. Say you appreciate receiving the offer and explain why you’re not completely happy with it. For example, you could say, “I’m pleased to have received the offer, but I’m having a hard time accepting it because it’s not competitive with my other offers.”
Or you could say, “Thank you again for the offer, but I’m having trouble accepting it because I know from discussions with my peers and from talking with other companies that this offer is below market rates.” If the negotiator asks you to go into greater detail about which other companies have offered you more money and how much, or where your peers work, you’re under no obligation to do so. You can easily say, “I keep all my offers confidential, including yours, and feel that it’s unprofessional to give out that sort of information.”

➤➤

Thank the negotiator for his time and help and say that you’ re looking forward to hearing from him again. Negotiators rarely change an offer on the spot. The company’s negotiator may ask you what you had in mind or, conversely, tell you that the offer is non-negotiable.
Claiming that the offer is non-negotiable is often merely a hardball negotiation tactic, so in either case you should respond by politely and respectfully spelling out exactly what you expect in an offer and giving the negotiator a chance to consider what you’ve said.

Many people find negotiation uncomfortable, especially when dealing with professional recruiters who do it every day. It’s not uncommon for someone to accept an offer as close enough just to avoid having to negotiate. If you feel this way about negotiation, try looking at it this way: You rarely have anything to lose, and even modest success in negotiation can be rewarding. If it takes you a 30-minute phone call to get your offer increased by $3,000, you’ve made $6,000 per hour. Even lawyers aren’t paid that much.
Remember that the best time to get more money is before you accept the job. When you’re an employee, the company holds all the power.

Accepting and Rejecting Offers
At some point, your negotiations will be complete, and you will be ready to accept an offer. After you inform a company you’re accepting its offer, be sure to keep in touch to coordinate start dates and paperwork. The company may do a background check on you at this point to verify your identity and your credentials.
Be professional about declining your other offers. Contacts are important, especially in the computer business where people change jobs frequently. You’ve no doubt built contacts at all the companies that made you offers. It’s foolish to squander your contacts at other companies by failing to inform

www.it-ebooks.info

Summary

❘ 17

them of your decision. If you had a recruiter at the company, you should e‑mail her with your decision. (Don’t expect her to be overjoyed, however.) You should also personally call the hiring managers who made you an offer to thank them and let them know what you decided. For example, you can say, “I want to thank you again for extending me the offer. I was impressed with your company, but I’ve decided it’s not the best choice for me right now. Thank you again, and I appreciate your confidence in me.” Besides simply being classy, this approach can often get a response such as, “I was pleased to meet you, and I’m sorry that you won’t be joining us. If things don’t work out at that company, give me a call, and maybe we can work something out. Best of luck.”
This gives you a great place to start the next time you look for work.

Summary
You can find prospective jobs in various ways, but networking through friends and acquaintances is usually the best method. If that’s not possible, find and contact companies directly. You may also engage the services of a headhunter; be aware that the headhunter’s motivations aren’t always aligned with yours.
The interviews are the most important part of the job application process. There are one or two screening interviews, usually by phone, to ensure that you’re applying for the right job and that you are actually qualified. After the screening interviews, there are usually a series of on-site technical interviews that ultimately determine whether a job offer comes your way. Be sure to dress appropriately for the interviews, and turn off any electronic gadgets you might have with you.
During the interview process you’ll frequently interact with one of the company’s recruiters, especially if a job offer is made. Be sure to understand the recruiter’s role during this process.
When an offer is made, don’t accept it immediately. Give yourself time to consider it. Look over the offer, and try to negotiate a better deal because most offers aren’t fixed in stone, no matter what the recruiter says. After accepting a job offer, be sure to contact anyone else who has made you an offer to thank them for their interest in you.

www.it-ebooks.info

www.it-ebooks.info

3

Approaches to Programming
Problems
Coding questions are the meat of a programming interview and your opportunity to demonstrate that you can do the job. These questions are the heart of the process that most computer and software companies use to decide who to hire. Many companies make offers to less than
10 percent of the people who interview with them. How a candidate performs during the programming interviews is the main determinant of whether an offer is made.
The programming questions are generally difficult. If everyone (or even most people) answered a particular question quickly, the company would stop asking it because it wouldn’t tell them anything about the applicants. Many of the questions are designed to take up to an hour to solve, so don’t get frustrated if you don’t see the answer right away. It’s not unusual for each interview to explore just a single question.
NOTE These problems are hard! Some of the questions are designed to see how you handle a problem when you don’t immediately see the solution.

The Process
The point of coding questions is to determine how well you can code. It’s the most important part of the interview because the code you write and the answers you give to the interviewer largely determine whether he recommends you for the job.

The Scenario
You usually work one-on-one with your interviewer. He will give you a marker and a whiteboard (or pen and paper) and ask you to write some code. The interviewer usually wants you to talk through the question before you start writing. Generally, you are asked to code a function

www.it-ebooks.info

20

❘ CHAPTER 3 Approaches to Programming Problems

or method, but sometimes you need to write a class definition or a sequence of related code modules.
In any case, you write code, either in an actual programming language or in some form of pseudocode. (The closer you can get to actual working code, the better.)

The Problems
The problems the interviewers give you have specific requirements. They must be short enough to be explained and solved reasonably quickly, yet complex enough that not everyone can solve them.
Therefore, it’s unlikely that you’ll be asked any real-world problems. Almost any worthy real-world problem would take too long to explain, let alone solve. That isn’t an option in an interview. Instead, many of these problems require algorithmic tricks or uncommonly used features of a language.
The problems often prohibit you from using the most-common way to do something or from using the ideal data structure. For example, you might be given a problem such as this: “Write a function that determines whether two integers are equal without using any comparison operators.”
This is an outright silly and contrived problem. Almost every language that ever existed has some way to compare two integers. However, you’re not off the hook if you respond, “This is a stupid question; I’d always use the equality operator. I’d never have this problem.” You would flunk if you answer this way. The interviewer is looking for a different way to compare two integers. (Hint: Try using bit operators.)
Instead, describe the better way to solve the problem and then solve it as it was asked. For example, if you are asked to solve a certain problem with a hash table, you might say, “This would be easy with a binary search tree because it’s much easier to extract the largest element, but let’s see how I can solve this with a hash table.”
NOTE Many problems involve ridiculous restrictions, use obscure features of languages, and seem silly and contrived. Play within the rules. Real-world programming is rarely done in a vacuum. The ability to work within the particular constraints of a situation is an important skill to develop.
Problems are generally presented in ascending order of difficulty. This is not a hard-and-fast rule, but you can expect them to get more difficult as you answer more of them correctly. Often, different interviewers communicate with each other about what they asked you, what you could answer, and what you couldn’t answer. If you solve all the problems in your early interviews but are stumped by harder problems later, this may indicate that earlier interviewers were impressed with your responses. Which Languages to Use
If you apply for a job with specific language requirements, you should know those languages and expect to use them to solve the problems. If you apply for a general programming or development position, a thorough knowledge of a mainstream language such as C#, Java, and/or C++ is enough to get by. Your interviewer may permit you to use other popular languages, such as JavaScript, PHP,

www.it-ebooks.info

The Process

❘ 21

or Python. If you are given a choice, select the language you know best, but expect to be required to solve some problems in a specific language. Interviewers are less likely to be amenable to you using languages such as Lisp, Tcl, Prolog, Lua, or Fortran, but if you are particularly expert in one of these, there’s no harm in asking.
Before you go to your interview, make sure you are completely comfortable with the use and syntax of any language you plan to use. If it has been a few years since you’ve done any C++ programming, for example, you should at least thumb through a good C++ reference guide and refamiliarize yourself with the language.

Interactivity Is Key
The code you write in the interview is probably the only example of your code that your interviewer sees. If you write ugly code, your interviewer will assume you always write ugly code. This is your chance to shine and show your best code. Take the time to make your code solid and pretty.
NOTE Brush up on the languages you expect to use and always write your best code! Programming questions are designed to see both how well you can code and how you solve problems. If all the interviewer wanted to do were measure your coding ability, she could give you a piece of paper with problems and come back an hour later to evaluate how you did, as they do in programming contests. What the interviewer wants is to see your thought processes as you work through each stage of the programming problem.
The problem-solving process in these interviews is interactive, and if you have difficulty, the interviewer generally guides you to the correct answer via a series of hints. Of course, the less help you need to solve the problem, the better you look, but showing an intelligent thought process and responding well to the hints you are given is also important. If you don’t respond well to guidance, your interviewer might suspect that you won’t work well in a team environment.
Even when you immediately know the answer to a problem, don’t just blurt it out. Break the answer down into discrete steps and explain the thought processes behind each step. The point is to show the interviewer that you understand the underlying concepts, not that you’ve managed to memorize the answer to a programming puzzle.
If you know any additional information pertaining to the problem, you may want to mention it during the process to show your general knowledge of programming, even if it’s not directly applicable to the problem at hand. In answering these problems, show that you’re not just a propeller-head coder. Demonstrate that you have logical thought processes, are generally knowledgeable about computers, and can communicate well.
NOTE Keep talking! Always explain what you are doing. Otherwise, the interviewer has no way to know how you tackle complex programming problems.

www.it-ebooks.info

22

❘ CHAPTER 3 Approaches to Programming Problems

Solving the Problems
When you begin solving a problem, don’t start writing code immediately. First, make sure you completely understand the problem. It may help to work through a simple, concrete example and then try to generalize the process to an algorithm. When you’re convinced you have the right algorithm, explain it clearly. Writing the code should be one of your final steps.

The Basic Steps
The best way to solve an interview problem is to approach it methodically.

1.

Make sure you understand the problem. Your initial assumptions about the problem may be wrong, or the interviewer’s explanation may be brief or difficult to follow. You can’t demonstrate your skills if you don’t understand the problem. Don’t hesitate to ask your interviewer questions about the problem. Don’t start solving the problem until you understand it. The interviewer may be deliberately obscuring things to determine whether you can find and understand the actual problem. In these cases, asking the right clarifying questions is an important part of the correct solution.

2.

When you understand the question, try a simple example. This example may lead to insights about how to solve the general problem or bring to light any remaining misunderstandings that you have. Starting with an example also demonstrates a methodical, logical thought process. Examples are especially useful if you don’t see the solution right away.
NOTE Make sure you understand the problem before you start solving it, and then start with an example to solidify your understanding.

3.

Focus on the algorithm and data structures you will use to solve the problem. This can take a long time and require additional examples. This is to be expected. Interactivity is important during this process. If you stand quietly staring at the whiteboard, the interviewer has no way to know whether you’re making productive headway or are simply clueless. Talk to your interviewer and tell him what you are doing. For example, you might say something like, “I’m wondering whether I can store the values in an array and then sort them, but I don’t think that will work because I can’t quickly look up elements in an array by value.” This demonstrates your skill, which is the point of the interview, and may also lead to hints from the interviewer, who might respond, “You’re close to the solution. Do you really need to look up elements by value, or could you….”
It may take a long time to solve the problem, and you may be tempted to begin coding before you figure out a complete solution. Resist this temptation. Consider who you would rather work with: someone who thinks about a problem for a long time and then codes it correctly the first time or someone who hastily jumps into a problem, makes several errors while coding, and doesn’t have any idea where he is going. Not a difficult decision, is it?

4.

After you figure out your algorithm and how you can implement it, explain your solution to the interviewer. This gives her an opportunity to evaluate your solution before you

www.it-ebooks.info

Solving the Problems

❘ 23

begin coding. Your interviewer may say, “Sounds great, go ahead and code it,” or something like, “That’s not quite right because you can’t look up elements in a hash table that way.”
Another common response is “That sounds like it will work, but there’s a more efficient solution.” In any case, you gain valuable information about whether you should move on to coding or go back to working on the algorithm.

5.

While you code, explain what you’re doing. For example, you might say, “Here, I’m initializing the array to all zeroes.” This narrative enables the interviewer to follow your code more easily.
NOTE Explain what you are doing to your interviewer before and while coding the solution. Keep talking!

6.

Ask questions when necessary. You generally won’t be penalized for asking factual questions that you might otherwise look up in a reference. You obviously can’t ask a question such as, “How do I solve this problem?” but it is acceptable to ask a question such as, “I can’t remember — what format string do I use to print out a localized date?” Although it’s better to know these things, it’s okay to ask this sort of question.

7.

After you write the code for a problem, immediately verify that the code works by tracing through it with an example. This step demonstrates clearly that your code is correct in at least one case. It also illustrates a logical thought process and your intention to check your work and search for bugs. The example may also help you flush out minor bugs in your solution. 8.

Make sure you check your code for all error and special cases, especially boundary conditions. Programmers might overlook many error and special cases; forgetting these cases in an interview indicates you might forget them on the job. If time does not allow for extensive checking, at least explain that you should check for such failures. Covering error and special cases can impress your interviewer and help you correctly solve the problem.
NOTE Try an example, and check all error and special cases.

After you try an example and feel comfortable that your code is correct, the interviewer may ask you questions about what you wrote. These questions often focus on running time, alternative implementations, and complexity. If your interviewer does not ask you these questions, you should volunteer the information to show that you are cognizant of these issues. For example, you could say, “This implementation has linear running time, which is the best possible because I need to check all the input values. The dynamic memory allocation will slow it down a little, as will the overhead of using recursion.”

When You Get Stuck
Getting stuck on a problem is expected and an important part of the interviewing process. Interviewers want to see how you respond when you don’t recognize the answer to a question immediately. Giving

www.it-ebooks.info

24

❘ CHAPTER 3 Approaches to Programming Problems

up or getting frustrated is the worst thing to do if this happens to you. Instead, show interest in the problem and keep trying to solve it:
➤➤

Go back to an example. Try performing the task and analyzing what you are doing. Try extending your specific example to the general case. You may have to use detailed examples.
This is okay, because it shows the interviewer your persistence in finding the correct solution. NOTE When all else fails, return to a specific example. Try to move from the specific example to the general case and from there to the solution.

➤➤

Try a different data structure. Perhaps a linked list, an array, a hash table, or a binary search tree can help. If you’re given an unusual data structure, look for similarities between it and more-familiar data structures. Using the right data structure often makes a problem much easier.

➤➤

Consider the less-commonly used or more-advanced aspects of a language. Sometimes the key to a problem involves one of these features.
NOTE Sometimes a different data structure or advanced language feature is key to the solution.

Even when you don’t feel stuck, you may have problems. You may miss an elegant or obvious way to implement something and write too much code. Almost all interview coding questions have short answers. You rarely need to write more than 30 lines of code and almost never more than 50. If you start writing a lot of code, you may be heading in the wrong direction.

Analyzing Your Solution
After you answer the problem, you may be asked about the efficiency of your implementation.
Often, you have to compare trade-offs between your implementation and another possible solution and identify the conditions that make each option more favorable. Common questions focus on run time and memory usage.
A good understanding of Big-O analysis is critical to make a good impression with the interviewer.
Big-O analysis is a form of runtime analysis that measures the efficiency of an algorithm in terms of the time it takes for the algorithm to run as a function of the input size. It’s not a formal benchmark, just a simple way to classify algorithms by relative efficiency when dealing with very large input sizes.
Most coding problem solutions in this book include a runtime analysis to help you solidify your understanding of the algorithms.

www.it-ebooks.info

Analyzing Your Solution

❘ 25

Big-O Analysis In Action
Consider a simple function that returns the maximum value stored in an array of non-negative integers. The size of the array is n. There are at least two easy ways to implement the function.
In the first alternative, you keep track of the current largest number as the function iterates through the array and return that value when you are done iterating. This implementation, called
CompareToMax, looks like:
/* Returns the largest value in an array of non-negative integers */ int CompareToMax(int array[], int n)
{
int curMax, i;
/* Make sure that there is at least one element in the array. */ if (n curMax) { curMax = array[i];
}
} return curMax;
}

The second alternative compares each value to all the other values. If all other values are less than or equal to a given value, that value must be the maximum value. This implementation, called
CompareToAll, looks like:
/* Returns the largest value in an array of non-negative integers */ int CompareToAll(int array[], int n)
{
int i, j; bool isMax;
/* Make sure that there is at least one element in the array. */ if (n 0; i--) { isMax = true; for (j = 0; j < n; j++) {
/* See if any value is greater. */ if (array[j] > array[i]) { isMax = false; /* array[i] is not the largest value. */ break; }
}

www.it-ebooks.info

26

❘ CHAPTER 3 Approaches to Programming Problems

/* If isMax is true, no larger value exists; array[i] is max. */ if (isMax) break;
}
return array[i];
}

Both of these functions correctly return the maximum value. Which one is more efficient? You could try benchmarking them, but this would tie your measure of efficiency to the particular system you used for benchmarking. It’s more useful to have a means of comparing the performance of different algorithms that depends only on the algorithm. Big-O analysis enables you to do exactly that:
Compare the predicted relative performance of different algorithms.

How Big-O Analysis Works
In Big-O analysis, input size is assumed to be an unknown value n. In this example, n simply represents the number of elements in an array. In other problems, n may represent the number of nodes in a linked list, the number of bits in a data type, or the number of entries in a hash table. After determining what n means in terms of the input, you must determine how many operations are performed for each of the n input items. “Operation” is a fuzzy word because algorithms differ greatly.
Commonly, an operation is something that a real computer can do in a constant amount of time, like adding an input value to a constant, creating a new input item, or deleting an input value. In
Big-O analysis, the times for these operations are all considered equivalent. In both CompareToMax and CompareToAll, the operation of greatest interest is comparing an array value to another value.
In CompareToMax, each array element was compared once to a maximum value. Thus, the n input items are each examined once, resulting in n examinations. This is considered O(n), usually referred to as linear time: The time required to run the algorithm increases linearly with the number of input items. You may notice that in addition to examining each element once, there is a check to ensure that the array is not empty and a step that initializes the curMax variable. It may seem more accurate to call this an O(n + 2) function to reflect these extra operations. Big-O analysis, however, is concerned with the asymptotic running time: the limit of the running time as n gets very large. The justification for this is that when n is small, almost any algorithm will be fast. It’s only when n become large that the differences between algorithms are noticeable. As n approaches infinity, the difference between n and n + 2 is insignificant, so the constant term can be ignored. Similarly, for an algorithm running in n + n 2 time, the difference between n 2 and n + n 2 is negligible for a very large n. Thus, in Big-O analysis you eliminate all but the highest-order term: the term that is largest as n gets very large. In this case, n is the highest-order term. Therefore, the CompareToMax function is O(n).
The analysis of CompareToAll is a little more difficult. First, you need to make an assumption about where the largest number occurs in the array. For now, assume that the maximum element is at the beginning of the array. In this case, this function may compare each of n elements to n other elements.
Thus there are n·n examinations so this is an O(n) algorithm.
The analysis so far has shown that CompareToMax is O(n) and CompareToAll is O(n 2). This means that as the array grows, the number of comparisons in CompareToAll becomes much larger than

www.it-ebooks.info

Analyzing Your Solution

❘ 27

in CompareToMax. Consider an array with 30,000 elements. CompareToMax compares on the order of 30,000 elements, whereas CompareToAll compares on the order of 900,000,000 elements. You would expect CompareToMax to be much faster because it examines 30,000 times fewer elements.
In fact, one benchmark timed CompareToMax at less than .01 seconds, whereas CompareToAll took
23.99 seconds.

Best, Average, and Worst Cases
You may think this comparison was stacked against CompareToAll because the maximum value was at the end. This is true, and it raises the important issues of best-case, average-case, and worstcase running times. The analysis of CompareToAll was a worst-case scenario: The maximum value was at the end of the array. Consider, the average case, in which the largest value is in the middle.
You end up checking only half the values n times because the maximum value is in the middle. This results in checking n(n/2) = n 2 /2 times. This would appear to be an O(n 2 /2) running time. Consider what the 1/2 factor means. The actual time to check each value is highly dependent on the machine instructions that the code translates to and then on the speed at which the CPU can execute the instructions. Therefore, the 1/2 doesn’t mean much. You could even come up with an O(n 2) algorithm that was faster than an O(n 2 /2) algorithm. In Big-O analysis, you drop all constant factors, so the average case for CompareToAll is no better than the worst case. It is still O(n 2).
The best-case running time for CompareToAll is better than O(n 2). In this case, the maximum value is at the beginning of the array. The maximum value is compared to all other values only once, so the result is an O(n) running time.
In CompareToMax, the best-case, average-case, and worst-case running times are identical.
Regardless of the arrangement of the values in the array, the algorithm is always O(n).
Ask the interviewer which scenario he is most interested in. Sometimes there are clues to this in the problem. Some sorting algorithms with terrible worst cases for unsorted data may nonetheless be well suited for a problem if the input is already sorted. These kinds of trade-offs are discussed in more detail in Chapter 8, which discusses general sorting algorithms.

Optimizations and Big-O Analysis
Algorithm optimizations do not always yield the expected changes in their overall running times.
Consider the following optimization to CompareToAll: Instead of comparing each number to every other number, compare each number only with the numbers that follow it in the array. In essence, every number before the current number has already been compared to the current number. Thus, the algorithm is still correct if you compare only to numbers occurring after the current number.
What’s the worst-case running time for this implementation? The first number is compared to n numbers, the second number to n – 1 numbers, the third number to n – 2, resulting in a number of comparisons equal to n + (n – 1) + (n – 2) + (n – 3) + ... + 1. This is a common result, a mathematical series with a sum of n2/2 + n/2. But because n2 is the highest-order term, this version of the algorithm still has an O(n2) running time in the average case! For large input values, this optimization of the algorithm has no significant effect on its running time.

www.it-ebooks.info

28

❘ CHAPTER 3 Approaches to Programming Problems

How to Do Big-O Analysis
The general procedure for Big-O runtime analysis is as follows:

1.
2.
3.
4.

Figure out what the input is and what n represents.
Express the number of operations the algorithm performs in terms of n.
Eliminate all but the highest-order terms.
Remove all constant factors.

For the algorithms you’ll encounter in interviews, Big-O analysis should be straightforward as long as you correctly identify the operations that are dependent on the input size.
If you’d like to learn more about runtime analysis, you can find a more extensive, mathematically rigorous discussion in the first chapters of any good algorithms textbook. This book defines Big-O as it is most commonly used by professional programmers.

Which Algorithm Is Better?
The fastest-possible running time for any runtime analysis is O(1), commonly referred to as constant running time. An algorithm with constant running time always takes the same amount of time to execute, regardless of the input size. This is the ideal run time for an algorithm, but it’s rarely achievable. The performance of most algorithms depends on n, the size of the input. The algorithms can be classified as follows from best-to-worse performance:
➤➤

O(log n) — An algorithm is said to be logarithmic if its running time increases logarithmically in proportion to the input size.

➤➤

O(n) — A linear algorithm’s running time increases in direct proportion to the input size.

➤➤

O(n log n) — A superlinear algorithm is midway between a linear algorithm and a polynomial algorithm.

➤➤

O(nc) — A polynomial algorithm grows quickly based on the size of the input.

➤➤

O(cn) — An exponential algorithm grows even faster than a polynomial algorithm.

➤➤

O(n!) — A factorial algorithm grows the fastest and becomes quickly unusable for even small values of n.

The run times of different orders of algorithms separate rapidly as n gets larger. Consider the run time for each of these algorithm classes with n = 10:
➤➤

log 10 = 1

➤➤

10 = 10

➤➤

10 log 10 = 10

www.it-ebooks.info

Analyzing Your Solution

➤➤

102 = 100

➤➤

210 = 1,024

➤➤

❘ 29

10! = 3,628,800

Now double it to n = 20:
➤➤

log 20 = 1.30

➤➤

20 = 20

➤➤

20 log 20= 26.02

➤➤

202 = 400

➤➤

220 = 1,048,576

➤➤

20! = 2.43×1018

Finding an algorithm that works in superlinear time or better can make a huge difference in how well an application performs.

Memory Footprint Analysis
Runtime analysis is not the only relevant metric for performance. A common request from interviewers is to analyze how much memory a program uses. This is sometimes referred to as the memory footprint of the application. Memory use is sometimes as important as running time, particularly in constrained environments such as mobile devices.
In some cases, you will be asked about the memory usage of an algorithm. For this, the approach is to express the amount of memory required in terms of n, the size of the input, analogous to the preceding discussion of Big-O runtime analysis. The difference is that instead of determining how many operations are required for each item of input, you determine the amount of storage required for each item.
Other times, you may be asked about the memory footprint of an implementation. This is usually an exercise in estimation, especially for languages such as Java and C# that run in a virtual machine.
Interviewers don’t expect you to know to the byte exactly how much memory is used, but they like to see that you understand how the underlying data structures might be implemented. If you’re a C++ expert, though don’t be surprised if you’re asked how much memory a struct or class requires — the interviewer may want to check that you understand memory alignment and structure packing issues.
There is usually a trade-off between optimal memory use and runtime performance. The classic example of this is the Unicode string encodings discussed in Chapter 6, which enable more compact representations of strings while making it more expensive to perform many common string operations. Be sure to mention any trade-offs to the interviewer when discussing memory footprint issues.

www.it-ebooks.info

30

❘ CHAPTER 3 Approaches to Programming Problems

Summary
How you solve programming problems during your interviews can determine whether you get a job offer, so you need to answer them as correctly and completely as you can. The problems usually get progressively harder as the day progresses, so don’t be surprised if you need an occasional hint from the interviewer. You normally code in a mainstream programming language, but the choice of language is ultimately dictated by the requirements of the job for which you apply, so be familiar with the right languages.
Interact with your interviewer as much as possible as you attempt each problem. Let her know what you’re thinking at each point in your analysis of the problem and your attempts at coding an answer. Start by making sure you understand the problem, and then try some examples to reinforce that understanding. Choose the algorithm and make sure it works for those examples. Don’t forget to test for special cases. If you’re stuck, try more examples or choose a different algorithm. Keep
­
obscure or advanced language features in mind when looking for alternative answers.
If asked to comment on the performance of a solution, a Big-O run time analysis is usually sufficient.
Algorithms that run in constant, logarithmic, linear or superlinear time are preferred. You should also be prepared to comment on the memory footprint of an algorithm.

www.it-ebooks.info

4

Linked Lists
The linked list, a deceptively simple data structure, is the basis for a surprising number of problems regarding the handling of dynamic data. Questions about efficient list traversal, list sorting, and the insertion or removal of data from either end of a list are good tests of basic data structure concepts, which is why an entire chapter is devoted to linked lists.

Why Linked Lists?
The simplicity of linked list questions appeals to interviewers who want to present at least two or three problems over the course of a 1-hour interview, because they must give you problems that you can be reasonably expected to answer in only 20 to 30 minutes. You can write a relatively complete implementation of a linked list in less than 10 minutes, leaving you plenty of time to solve the problem. In contrast, it might take you most of the interview period to implement a more complex data structure such as a hash table.
Also, little variation exists in linked list implementations, which means that an interviewer can simply say “linked list” and not waste time discussing and clarifying implementation details.
Perhaps the strongest reason is that linked lists are useful to determine whether a candidate understands how pointers and references work, particularly in C and C++. If you’re not a C or C++ programmer, you may find the linked list problems in this chapter challenging. Still, linked lists are so basic that you need to be familiar with them before moving to more complicated data structures found in the chapters that follow.

NOTE In real-world development, you don’t usually write your own linked lists;

you use the implementation in your language’s standard library. In a programming interview, you’re expected to be able to create your own implementation to demonstrate that you fully understand linked lists.

www.it-ebooks.info

32

❘ CHAPTER 4 Linked Lists

Kinds of Linked List
There are three basic kinds of linked list: singly linked lists, doubly linked lists, and circular linked lists. Singly linked lists are the variety most commonly encountered in interviews.

Singly Linked Lists
When an interviewer says “linked list” he or she generally means a linear singly linked list, where each data element in the list has a link (a pointer or reference) to the element that follows it in the list, as shown in Figure 4-1. The first element in a singly linked list is referred to as the head of the list. The last element in such a list is called the tail of the list and has an empty or null link. head pointer

12

3

–8

6

Figure 4-1

Singly linked lists have a host of special cases and potential programming pitfalls. Because the links in a singly linked list consist only of next pointers (or references), the list can be traversed only in the forward direction. Therefore a complete traversal of the list must begin with the first element. In other words, you need a pointer or reference to the first element of a list to locate all the elements in the list. It’s common to store that pointer or reference in a separate data structure.
In C, the simplest singly linked list element is a struct with a pointer to a struct of the same type as its only member:
// The simplest singly linked list element typedef struct ListElement { struct ListElement *next;
} ListElement;

Because it has no data, it’s not a particularly useful list element. A more useful struct has at least one data member in addition to the pointer:
// A more useful singly linked list element typedef struct IntElement { struct IntElement *next; int data;
} IntElement;

The next pointer can be anywhere in the struct, but placing it at the beginning makes it easier to write generic list-handling routines that work no matter what data an element holds by casting the pointer to be of the generic list element type.
In C++ you could define a class for the list element:
// A singly linked list in C++ class IntElement { public: IntElement( int value ): next( NULL ), data( value ) {}

www.it-ebooks.info

Kinds of Linked List

~tElement() {}
IntElement *getNext() const { return next; } int value() const { return data; } void setNext( IntElement *elem ) { next = elem; } void setValue( int value ) { data = value; } private: IntElement *next; int data;
};

However, it usually makes more sense to define a template for the list element:
// A templated C++ singly linked list template class ListElement { public: ListElement( const T &value ): next( NULL ), data( value ) {}
~ListElement() {}
ListElement *getNext() const { return next; } const T& value() const { return data; } void setNext( ListElement *elem ) { next = elem; } void setValue( const T &value ) { data = value; } private: ListElement *next;
T
data;
};

NOTE When defining classes in C++, particularly in template form, it’s always

best to explicitly add copy constructors and assignment operators so you don’t depend on the compiler-generated versions. In an interview, however, you’ll generally skip these additional details as we’ve done here, but it doesn’t hurt to mention them in passing to the interviewer.
A Java implementation using generics is similar, but of course uses references instead of pointers:
// A templated Java singly linked list public class ListElement { public ListElement( T value ) { data = value; } public public public public

ListElement next() { return next; }
T value() { return data; } void setNext( ListElement elem ) { next = elem; } void setValue( T value ) { data = value; }

private ListElement next; private T data; }

www.it-ebooks.info

❘ 33

34

❘ CHAPTER 4 Linked Lists

Doubly Linked Lists
A doubly linked list, as shown in Figure 4-2, eliminates many of the difficulties of using a singly linked list. In a doubly linked list, each element has a link to the previous element in the list as well as to the next element in the list. This additional link makes it possible to traverse the list in either direction. The entire list can be traversed starting from any element. A doubly linked list has head and tail elements just like a singly linked list. The head of the list has an empty or null previous link, just as the tail of the list has a null or empty next link. head pointer

12

3

–8

6

Figure 4-2

Doubly linked lists are not frequently seen in interview problems. Many problems involve singly linked lists specifically because they are more difficult that way; they would be trivial with a doubly linked list. Other problems are difficult whether the list is singly or doubly linked, so there’s no point in using a doubly linked list, which adds complexity irrelevant to the problem.

Circular Linked Lists
The final variation on the linked list theme is the circular linked list, which comes in singly and doubly linked varieties. Circular linked lists have no ends — no head or tail. Each element in a circular linked list has non-null next (and previous, if it’s also doubly linked) pointers or references. A list with one element merely points to itself.
The primary traversal problem for these lists is cycle avoidance — if you don’t track where you start, you’ll cycle infinitely through the list.
You may encounter circular linked lists from time to time, but they rarely appear in interview problems. Basic Linked List Operations
Successfully solving linked list problems requires a thorough understanding of how to operate on linked lists. This includes tracking the head element so that the list doesn’t get lost, traversing the list, and inserting and deleting list elements. These operations are much more straightforward with a doubly linked list, so we focus on the pitfalls of implementing these operations for singly linked lists.

Tracking the Head Element
The head element of a singly linked list must always be tracked; otherwise, the list will be lost — either garbage collected or leaked, depending on the language. This means that the pointer or

www.it-ebooks.info

Basic Linked List Operations

reference to the head of the list must be updated when a new element is inserted ahead of the first element or when the existing first element is removed from the list.
Tracking the head element becomes a problem when you alter the list inside a function or method, because the caller must be made aware of the new head element. For example, the following Java code is incorrect because it fails to update the reference to the head of the list: public void insertInFront( ListElement list, int data ){
ListElement l = new ListElement( data );
l.setNext( list );
}

The correct solution is to return the new head element from the method: public ListElement insertInFront( ListElement list, int data ){
ListElement l = new ListElement( data );
l.setNext( list ); return l;
}

The caller updates its reference to the head element accordingly: int data = ....; // data to insert
ListElement head = ....; // reference to head head = insertInFront( head, data );

In C or C++ it’s easier to make mistakes with pointer misuse. Consider this C code (that uses C++ features such as the bool datatype that are now available in C as part of the C99 standard) for inserting an element at the front of a list: bool insertInFront( IntElement *head, int data ){
IntElement *newElem = malloc( sizeof(IntElement) ); if( !newElem ) return false; newElem->data = data; newElem->next = head; head = newElem; // Incorrect! Updates only the local head pointer return true;
}

The preceding code is incorrect because it updates only the local copy of the head pointer. The correct version passes in a pointer to the head pointer: bool insertInFront( IntElement **head, int data ){
IntElement *newElem = malloc( sizeof(IntElement) ); if(!newElem) return false; newElem->data = data; newElem->next = *head;
*head = newElem; return true;
}

This function uses the return value to indicate the success or failure of the memory allocation
(because there are no exceptions in C), so it can’t return the new head pointer as the Java function

www.it-ebooks.info

❘ 35

36

❘ CHAPTER 4 Linked Lists

did. In C++, the head pointer could also be passed in by reference, or the function could return the new head pointer.

Traversing a List
Often, you need to work with list elements other than the head element. Operations on any but the first element of a linked list require traversal of some elements of the list. When traversing, you must always check that you haven’t reached the end of the list. The following traversal is unsafe: public ListElement find( ListElement head, int data ){
ListElement elem = head; while( elem.value() != data ){ elem = elem.next();
}
return elem;
}

This method works fine as long as the data to find is actually in the list. If it isn’t, an error occurs (a null reference exception) when you travel past the last element. A simple change to the loop fixes the problem: public ListElement find( ListElement head, int data ){
ListElement elem = head; while( elem != null && elem.value() != data ){ elem = elem.next();
}
return elem;
}

With this implementation, the caller must detect an error condition by checking for a null return value. (Alternatively, it may make more sense to throw an exception if the end of the list is reached and the element cannot be found.)

NOTE Always test for the end of a linked list as you traverse it.

Inserting and Deleting Elements
Because links in a singly linked list are maintained exclusively with next pointers or references, any insertion or deletion of elements in the middle of a list requires modification of the previous element’s next pointer or reference. If you’re given only the element to delete (or before which to insert), this requires traversal of the list from the head because there’s no other way to find the preceding element. Special care must be taken when the element to be deleted is the head of the list.
This C function deletes an element from a list: bool deleteElement( IntElement **head, IntElement *deleteMe )
{

www.it-ebooks.info

Basic Linked List Operations

❘ 37

IntElement *elem; if (!head || !*head || !deleteMe ) /* Check for null pointers */ return false; elem = *head; if( deleteMe == *head ){ /* special case for head */
*head = elem->next; free(deleteMe); return true;
}
while( elem ){ if( elem->next == deleteMe ){
/* elem is element preceding deleteMe */ elem->next = deleteMe->next; free(deleteMe); return true;
}
elem = elem->next;
}
/* deleteMe not found */ return false;
}

NOTE Deletion and insertion require a pointer or reference to the element immediately preceding the deletion or insertion location.

Performing deletions raises another issue in languages without garbage collection, like C or C++.
Suppose you want to remove all the elements from a linked list. The natural inclination is to use a single pointer to traverse the list, freeing elements as you go. A problem arises, however, when this is implemented. Do you advance the pointer first or free the element first? If you advance the pointer first, then the freeing is impossible because you overwrote the pointer to the element to be freed. If you free the element first, advancing the pointer is impossible because it involves reading the next pointer in the element that was just freed. The solution is to use two pointers, as in the following example: void deleteList( IntElement **head )
{
IntElement *deleteMe = *head; while( deleteMe ){
IntElement *next = deleteMe->next; free(deleteMe); deleteMe = next;
}
*head = NULL;
}

www.it-ebooks.info

38

❘ CHAPTER 4 Linked Lists

NOTE Deletion of an element always requires at least two pointer variables.

Insertion requires two pointer variables as well, but because one of them is used for an element in the list and the other for the pointer returned by the memory allocation call, there’s little danger of forgetting this in the insertion case.

Linked List Problems
The solutions to the linked list problems that follow can be implemented in any language that supports dynamic memory, but because you rarely implement your own linked lists in languages like
Java and C#, these problems make most sense in C.

Stack Implementation
PROBLEM Discuss the stack data structure. Implement a stack in C using either

a linked list or a dynamic array, and justify your decision. Design the interface to your stack to be complete, consistent, and easy to use.
This problem is designed to determine three things:

1.
2.
3.

Your knowledge of basic data structures
Your ability to write routines to manipulate these structures
Your ability to design consistent interfaces to a group of routines

A stack is a last-in-first-out (LIFO) data structure: Elements are always removed in the reverse order in which they were added, much in the same way that you add or remove a dish from a stack of dishes.
The add element and remove element operations are conventionally called push and pop, respectively.
Stacks are useful data structures for tasks that are divided into multiple subtasks. Tracking return addresses, parameters, and local variables for subroutines is one example of stack use; tracking tokens when parsing a programming language is another.
One of the ways to implement a stack is by using a dynamic array, an array that changes size as needed when elements are added. (See Chapter 6, “Arrays and Strings,” for a more complete discussion of arrays.) The main advantage of dynamic arrays over linked lists is that arrays offer random access to the array elements — you can immediately access any element in the array if you know its index.
However, operations on a stack always work on one end of the data structure (the top of the stack), so the random accessibility of a dynamic array gains you little. In addition, as a dynamic array grows, it must occasionally be resized, which can be a time-consuming operation as elements are copied from the old array to the new array.
Linked lists usually allocate memory dynamically for each element. Depending on the overhead of the memory allocator, these allocations are often more time consuming than the copies required by a dynamic array, so a stack based on a dynamic array is usually faster than one based on a linked

www.it-ebooks.info

Linked List Problems

❘ 39

list. Implementing a linked list is less complicated than implementing a dynamic array, so in an interview, a linked list is probably the best choice for your solution. Whichever choice you make, be sure to explain the pros and cons of both approaches to your interviewer.
After explaining your choice, you can design the routines and their interfaces. If you take a moment to design your code before writing it, you can avoid mistakes and inconsistencies in implementation.
More important, this shows you won’t skip right to coding on a larger project where good planning is essential to success. As always, talk to the interviewer about what you’re doing.
Your stack will need push and pop routines. What will the prototype for these functions be? Each function must be passed the stack it operates on. The push operation will be passed the data it is to push, and pop will return a piece of data from the stack.
The simplest way to pass the stack is to pass a pointer to the stack. Because the stack will be implemented as a linked list, the pointer to the stack will be a pointer to the head of the list. In addition to the pointer to the stack, you could pass the data as a second parameter to push. The pop function could take only the pointer to the stack as an argument and return the value of the data it popped from the stack.
To write the prototypes, you need to know the type of the data that will be stored on the stack. You should declare a struct for a linked list element with the appropriate data type. If the interviewer doesn’t make any suggestion, storing void pointers is a good general-purpose solution: typedef struct Element { struct Element *next; void *data;
} Element;

The corresponding prototypes for push and pop follow: void push( Element *stack, void *data ); void *pop( Element *stack );

Now consider what happens in these routines in terms of proper functionality and error handling.
Both operations change the first element of the list. The calling routine’s stack pointer must be modified to reflect this change, but any change you make to the pointer that is passed to these functions won’t be propagated back to the calling routine. You can solve this problem by having both routines take a pointer to a pointer to the stack. This way, you can change the calling routine’s pointer so that it continues to point at the first element of the list. Implementing this change results in the following: void push( Element **stack, void *data ); void *pop( Element **stack );

What about error handling? The push operation needs to dynamically allocate memory for a new element. Memory allocation in C is an operation that can fail, so remember to check that the allocation succeeded when you write this routine. (In C++ an exception is thrown when allocation fails, so the error handling is somewhat different.)
You also need some way to indicate to the calling routine whether the push succeeded or failed. In
C, it’s generally most convenient to have a routine indicate success or failure by its return value.
This way, the routine can be called from the condition of an if statement with error handling in the

www.it-ebooks.info

40

❘ CHAPTER 4 Linked Lists

body. Have push return true for success and false for failure. (Throwing an exception is also an option in C++ and other languages with exception support.)
Can pop fail? It doesn’t have to allocate memory, but what if it’s asked to pop an empty stack? It should indicate that the operation was unsuccessful, but it still has to return data when it is successful. A C function has a single return value, but pop needs to return two values: the data it popped and an error code.
This problem has a number of possible solutions, none of which are entirely satisfactory. One approach is to use the single return value for both purposes. If pop is successful, have it return the data; if it is unsuccessful, return NULL. As long as your data is a pointer type and you never need to store null pointers on the stack, this works. If you have to store null pointers, however, there’s no way to determine whether the null pointer returned by pop represents a legitimate element that you stored or an empty stack. Another option is to return a special value that can’t represent a valid piece of data — a pointer to a reserved memory block, for example, or (for stacks dealing with nonnegative numbers only) a negative value. Although restricting the values that can be stored on the stack might be acceptable in some cases, assume that for this problem it is not.
You must return two distinct values. How else can a function return data? The same way the stack parameter is handled: by passing a pointer to a variable. The routine can return data by using the pointer to change the variable’s value, which the caller can access after popping the stack.
There are two possibilities for the interface to pop that use this approach to return two values. You can have pop take a pointer to an error code variable as an argument and return the data, or you can have it take a pointer to a data variable and return an error code. Intuitively, most programmers would expect pop to return data. However, using pop is awkward if the error code is not its return value: Instead of simply calling pop in the condition of an if or while statement, you must explicitly declare a variable for the error code and check its value in a separate statement after you call pop.
Furthermore, push would take a data argument and return an error code, whereas pop would take an error code argument and return data. This may offend your sense of symmetry (it does ours).
Neither alternative is clearly correct; there are problems with either approach. In an interview, it wouldn’t matter much which alternative you chose as long as you identified the pros and cons of each and justified your choice. We think error code arguments are particularly irksome, so this discussion continues by assuming you chose to have pop return an error code. This results in the following prototypes: bool push( Element **stack, void *data ); bool pop( Element **stack, void **data );

You also want to write createStack and deleteStack functions, even though neither of these is absolutely necessary in a linked list stack implementation: You could delete the stack by calling pop until the stack is empty and create a stack by passing push a null pointer as the stack argument.
However, writing these functions provides a complete, implementation-independent interface to the stack. A stack implemented as a dynamic array would need createStack and deleteStack functions to properly manage the underlying array. By including these functions in your implementation, you create the possibility that someone could change the underlying implementation of the stack without needing to change the programs that use the stack — always a good thing.

www.it-ebooks.info

Linked List Problems

❘ 41

With the goals of implementation independence and consistency in mind, it’s a good idea to have these functions return error codes, too. Even though in a linked list implementation neither createStack nor deleteStack can fail, they might fail under a different implementation, such as if createStack couldn’t allocate memory for a dynamic array. If you design the interface with no way for these functions to indicate failure, you severely handicap anyone who might want to change your implementation.
Again, you face the same problem as with pop: createStack must return both the empty stack and an error code. You can’t use a null pointer to indicate failure because a null pointer is the empty stack for a linked list implementation. In keeping with the previous decision, we write an implementation with an error code as the return value. Because createStack can’t return the stack as its value, it must take a pointer to a pointer to the stack. Because all the other functions take a pointer to the stack pointer, it makes sense to have deleteStack take its stack parameter in the same way.
This way you don’t need to remember which functions require only a pointer to a stack and which take a pointer to a pointer to a stack — they all work the same way. This reasoning gives you the following prototypes: bool createStack( Element **stack ); bool deleteStack( Element **stack );

When everything is designed properly, the coding is fairly simple. The createStack routine sets the stack pointer to NULL and returns success: bool createStack( Element **stack ){
*stack = NULL; return true;
}

The push operation allocates the new element, checks for failure, sets the data of the new element, places it at the top of the stack, and adjusts the stack pointer: bool push( Element **stack, void *data ){
Element *elem = malloc( sizeof(Element) ); if( !elem ) return false; elem->data = data; elem->next = *stack;
*stack = elem; return true;
}

The pop operation checks that the stack isn’t empty, fetches the data from the top element, adjusts the stack pointer, and frees the element that is no longer on the stack, as follows: bool pop( Element **stack, void **data ){
Element *elem; if( !(elem = *stack) ) return false;
*data = elem->data;
*stack = elem->next; free( elem ); return true;
}

www.it-ebooks.info

42

❘ CHAPTER 4 Linked Lists

Although deleteStack could call pop repeatedly, it’s more efficient to simply traverse the data structure, freeing as you go. Don’t forget that you need a temporary pointer to hold the address of the next element while you free the current one: bool deleteStack( Element **stack ){
Element *next; while( *stack ){ next = (*stack)->next; free( *stack );
*stack = next;
}
return true;
}

Before the discussion of this problem is complete, it is worth noting (and probably worth mentioning to the interviewer) that the interface design would be much more straightforward in an object-oriented language. The createStack and deleteStack operations become the constructor and destructor, respectively. The push and pop routines are bound to the stack object, so they don’t need to have the stack explicitly passed to them, and the need for pointers to pointers evaporates. An exception can be thrown when there’s an attempt to pop an empty stack or a memory allocation fails, which enables you to use the return value of pop for data instead of an error code. A minimal C++ version looks like the following: class Stack
{
public:
Stack() : head( NULL ) {};
~Stack();
void push( void *data ); void *pop(); protected: class Element { public: Element( Element *n, void *d ): next(n), data( d ) {}
Element *getNext() const { return next; } void *value() const { return data; } private: Element
*next;
void
*data;
};
Element *head;
};
Stack::~Stack() { while( head ){
Element *next = head->getNext(); delete head; head = next;
}
}

www.it-ebooks.info

Linked List Problems

❘ 43

void Stack::push( void *data ){
//Allocation error will throw exception
Element *element = new Element(head,data); head = element;
}
void *Stack::pop() {
Element *popElement = head; void *data;
/* Assume StackError exception class is defined elsewhere */ if( head == NULL ) throw StackError( E_EMPTY ); data = head = delete return

head->value(); head->getNext(); popElement; data; }

A more complete C++ implementation should include a copy constructor and assignment operator, because the default versions created by the compiler could lead to multiple deletes of the same
Element due to inadvertent sharing of elements between copies of a Stack.

Maintain Linked List Tail Pointer
PROBLEM head and tail are global pointers to the first and last element, respectively, of a singly linked list of integers. Implement C functions for the ­ ollowing f prototypes: bool delete( Element *elem ); bool insertAfter( Element *elem, int data );

The argument to delete is the element to be deleted. The two arguments to insertAfter give the element after which the new element is to be inserted and the data for the new element. It should be possible to insert at the beginning of the list by calling insertAfter with NULL as the element argument. These functions should return a boolean indicating success.
Your functions must keep the head and tail pointers current.
This problem seems relatively straightforward. Deletion and insertion are common operations on a linked list, and you should be accustomed to using a head pointer for the list. The requirement to maintain a tail pointer is the only unusual aspect of this problem. This requirement doesn’t seem to fundamentally change anything about the list or the way you operate on it, so it doesn’t look as

www.it-ebooks.info

44

❘ CHAPTER 4 Linked Lists

if you need to design any new algorithms. Just be sure to update the head and tail pointers when necessary. When do you need to update these pointers? Obviously, operations in the middle of a long list do not affect either the head or tail. You need to update the pointers only when you change the list such that a different element appears at the beginning or end. More specifically, when you insert a new element at either end of the list, that element becomes the new beginning or end of the list. When you delete an element at the beginning or end of the list, the next-to-first or next-to-last element becomes the new first or last element.
For each operation you have a general case for operations in the middle of the list and special cases for operations at either end. When you deal with many special cases, it can be easy to miss some of them, especially if some of the special cases have more specific special cases of their own. One technique to identify special cases is to consider what circumstances are likely to lead to special cases being invoked. Then, you can check whether your proposed implementation works in each of these circumstances. If you discover a circumstance that creates a problem, you have discovered a new special case.
The circumstance where you are instructed to operate on the ends of the list has already been discussed. Another error-prone circumstance is a null pointer argument. The only other thing that can change is the list on which you are operating — specifically, its length.
What lengths of lists may be problematic? You can expect somewhat different cases for the beginning, middle, and end of the list. Any list that doesn’t have these three distinct classes of elements could lead to additional special cases. An empty list has no elements, so it obviously has no beginning, middle, or end elements. A one-element list has no middle elements and one element that is both the beginning and end element. A two-element list has distinct beginning and end elements, but no middle element. Any list longer than this has all three classes of elements and is effectively the general case of lists — unlikely to lead to additional special cases. Based on this reasoning, you should explicitly confirm that your implementation works correctly for lists of length 0, 1, and 2.
At this point in the problem, you can begin writing delete. As mentioned earlier, you need a special case for deleting the first element of the list. You can compare the element to be deleted to head to determine whether you need to invoke this case: bool delete( Element *elem ){ if (elem == head) { head = elem->next; free( elem ); return true;
}
...

Now write the general middle case. You need an element pointer to keep track of your position in the list. (Call the pointer curPos.) Recall that to delete an element from a linked list, you need a pointer to the preceding element so that you can change its next pointer. The easiest way to find the preceding element is to compare curPos->next to elem, so curPos points to the preceding element when you find elem.

www.it-ebooks.info

Linked List Problems

❘ 45

You also need to construct your loop so you don’t miss any elements. If you initialize curPos to head, then curPos->next starts as the second element of the list. Starting at the second item is fine because you treat the first element as a special case, but make your first check before advancing curPos or you’ll miss the second element. If curPos becomes NULL, you have reached the end of the list without finding the element you were supposed to delete, so you should return failure. The middle case yields the following (added code is bolded): bool delete( Element *elem ){
Element *curPos = head; if (elem == head) { head = elem->next; free( elem ); return true;
}
while( curPos ){ if( curPos->next == elem ){ curPos->next = elem->next; free( elem ); return true;
}
curPos = curPos->next;
}
return false;
...

Next, consider the last element case. The last element’s next pointer is NULL. To remove it from the list, you need to make the next-to-last element’s next pointer NULL and free the last element. If you examine the loop constructed for middle elements, you see that it can delete the last element as well as middle elements. The only difference is that you need to update the tail pointer when you delete the last element. If you set curPos->next to NULL, you know you changed the end of the list and must update the tail pointer. Adding this to complete the function, you get the following: bool delete( Element *elem ){
Element *curPos = head; if( elem == head ){ head = elem->next; free( elem );
}
while( curPos ){ if( curPos->next == elem ){ curPos->next = elem->next; free( elem ); if( curPos->next == NULL ) tail = curPos; return true;
}

www.it-ebooks.info

46

❘ CHAPTER 4 Linked Lists

curPos = curPos->next;
}
return false;
}

This solution covers the three discussed special cases. Before you present the interviewer with this solution, you should check behavior for null pointer arguments and the three potentially problematic list length circumstances.
What happens if elem is NULL? The while loop traverses the list until curPos->next is NULL (when curPos is the last element). Then, on the next line, evaluating elem->next dereferences a null pointer.
Because it’s never possible to delete NULL from the list, the easiest way to fix this problem is to return false if elem is NULL.
If the list has zero elements, then head and tail are both NULL. Because you’ll check that elem isn’t
NULL, elem == head will always be false. Further, because head is NULL, curPos will be NULL, and the body of the while loop won’t be executed. There doesn’t seem to be any problem with zeroelement lists. The function simply returns false because nothing can be deleted from an empty list.
Now try a one-element list. In this case, head and tail both point to the one element, which is the only element you can delete. Again, elem == head is true. elem->next is NULL, so you correctly set head to NULL and free the element; however, tail still points to the element you just freed. As you can see, you need another special case to set tail to NULL for one-element lists.
What about two-element lists? Deleting the first element causes head to point to the remaining element, as it should. Similarly, deleting the last element causes tail to be correctly updated. The lack of middle elements doesn’t seem to be a problem. You can add the two additional special cases and then move on to insertAfter: bool delete( Element *elem ){
Element *curPos = head; if( !elem ) return false; if( elem == head ){ head = elem->next; free( elem );
/* special case for 1 element list */ if( !head ) tail = NULL; return true;
}
while( curPos ){ if( curPos->next == elem ){ curPos->next = elem->next; free( elem );

www.it-ebooks.info

Linked List Problems

❘ 47

if( curPos->next == NULL ) tail = curPos; return true;
}
curPos = curPos->next;
}
return false;
}

You can apply similar reasoning to writing insertAfter. Because you allocate a new element in this function, you must take care to check that the allocation is successful and that you don’t leak any memory. Many of the special cases encountered in delete are relevant in insertAfter, however, and the code is structurally similar: bool insertAfter( Element *elem, int data ){
Element *newElem, *curPos = head; newElem = malloc( sizeof(Element) ); if( !newElem ) return false; newElem->data = data;
/* Insert at beginning of list */ if( !elem ){ newElem->next = head; head = newElem;
/* Special case for empty list */ if( !tail ) tail = newElem; return true;
}
while( curPos ){ if( curPos == elem ){ newElem->next = curPos->next; curPos->next = newElem;
/* Special case for inserting at end of list */ if( !(newElem->next) ) tail = newElem; return true;
}
curPos = curPos->next;
}
/* Insert position not found; free element and return failure */ free( newElem ); return false;
}

www.it-ebooks.info

48

❘ CHAPTER 4 Linked Lists

This problem turns out to be an exercise in special cases. It’s not particularly interesting or satisfying to solve, but it’s good practice. Many interview problems have special cases, so you should expect to encounter them frequently. In the real world of programming, unhandled special cases represent bugs that may be difficult to find, reproduce, and fix. Programmers who identify special cases as they are coding are likely to be more productive than those who find special cases through debugging. Intelligent interviewers recognize this and pay attention to whether a candidate identifies special cases as part of the coding process or needs to be prompted to recognize special cases.

Bugs in removeHead
PROBLEM Find and fix the bugs in the following C function that is supposed to

remove the head element from a singly linked list: void removeHead( ListElement *head ){ free( head );
// Line 1 head = head->next;
// Line 2
}

Bug-finding problems occur with some frequency, so it’s worthwhile to discuss a general strategy that you can apply to this and other problems.
Because you will generally be given only a small amount of code to analyze, your bug-finding strategy will be a little different from real-world programming. You don’t need to worry about interactions with other modules or other parts of the program. Instead, you must do a systematic analysis of every line of the function without the help of a debugger. Consider four common problem areas for any function you are given:

1.

Check that the data comes into the function properly. Make sure you aren’t accessing a variable that you don’t have, you aren’t reading something as an int that should be a long, and you have all the values you need to perform the task.

2.

Check that each line of the function works correctly. The function is intended to perform a task. Verify that the task is executed correctly at each line and that the desired result is produced at the end.

3.

Check that the data comes out of the function correctly. The return value should be what you expect. In addition, if the function is expected to update any caller variables, make sure this occurs. 4.

Check the common error conditions. Error conditions vary depending on the specifics of a problem. They tend to involve unusual argument values. For instance, functions that operate on data structures may have trouble with empty or nearly empty data structures; functions that take a pointer as an argument may fail if passed a null pointer.

www.it-ebooks.info

Linked List Problems

❘ 49

Starting with the first step, verify that data comes into the function properly. In a linked list, you can access every element given only the head. Because you are passed the list head, you have access to all the data you require — no bugs so far.
Now do a line-by-line analysis of the function. The first line frees head — okay so far. Line 2 then assigns a new value to head but uses the old value of head to do this. That’s a problem. You have already freed head, and you are now dereferencing freed memory. You could try reversing the lines, but this would cause the element after head to be freed. You need to free head, but you also need its next value after it has been freed. You can solve this problem by using a temporary variable to store head’s next value. Then you can free head and use the temporary variable to update head. These steps make the function look like the following: void removeHead( ListElement *head ){
ListElement *temp = head->next; // Line 1 free( head );
// Line 2 head = temp;
// Line 3
}

Now, move to step 3 of the strategy to make sure the function returns values properly. Though there is no explicit return value, there is an implicit one. This function is supposed to update the caller’s head value. In C, all function parameters are passed by value, so functions get a local copy of each argument, and any changes made to that local copy are not reflected outside the function. Any new value you assign to head on line 3 has no effect — another bug. To correct this, you need a way to change the value of head in the calling code. Variables cannot be passed by reference in C, so the solution is to pass a pointer to the variable you want to change — in this case, a pointer to the head pointer. After the change, the function should look like this: void removeHead( ListElement **head ){
ListElement *temp = (*head)->next; free( *head );
*head = temp;
}

// Line 1
// Line 2
// Line 3

Now you can move on to the fourth step and check error conditions. Check a one-element and a zero-element list. In a one-element list, this function works properly. It removes the one element and sets the head to NULL, indicating that the head was removed. Now take a look at the zero-element case. A zero-element list is simply a null pointer. If head is a null pointer, you would dereference a null pointer on line 1. To correct this, check whether head is a null pointer and be sure not to dereference it in this case. This check makes the function look like the following: void removeHead( ListElement **head ){
ListElement *temp; if( head && *head ){ temp = (*head)->next; free( *head );
*head = temp;
}
}

www.it-ebooks.info

50

❘ CHAPTER 4 Linked Lists

You have checked that the body of the function works properly, that the function is called correctly and returns values correctly, and that you have dealt with the error cases. You can declare your debugging effort complete and present this version of removeHead to the interviewer as your solution. Mth-to-Last Element of a Linked List
PROBLEM Given a singly linked list, devise a time- and space-efficient algorithm

to find the mth-to-last element of the list. Implement your algorithm, taking care to handle relevant error conditions. Define mth to last such that when m = 0 the last element of the list is returned.

Why is this a difficult problem? Finding the mth element from the beginning of a linked list would be an extremely trivial task. Singly linked lists can be traversed only in the forward direction. For this problem you are asked to find a given element based on its position relative to the end of the list.
While you traverse the list, however, you don’t know where the end is, and when you find the end, there is no easy way to backtrack the required number of elements.
You may want to tell your interviewer that a singly linked list is a particularly poor choice for a data structure when you frequently need to find the mth-to-last element. If you were to encounter such a problem while implementing a real program, the correct and most efficient solution would probably be to substitute a more suitable data structure (such as a doubly linked list) to replace the singly linked list. Although this comment shows that you understand good design, the interviewer still wants you to solve the problem as it was originally phrased.
How, then, can you get around the problem that there is no way to traverse backward through this data structure? You know that the element you want is m elements from the end of the list. Therefore, if you traverse m elements forward from an element and that places you exactly at the end of the list, you have found the element you were searching for. One approach is to simply test each element in this manner until you find the one you’re searching for. Intuitively, this feels like an inefficient solution because you will traverse over the same elements many times. If you analyze this potential solution more closely, you can see that you would be traversing m elements for most of the elements in the list.
If the length of the list is n, the algorithm would be approximately O(mn). You need to find a solution more efficient than O(mn).
What if you store some of the elements (or, more likely, pointers or references to the elements) as you traverse the list? Then, when you reach the end of the list, you can look back m elements in your storage data structure to find the appropriate element. If you use an appropriate temporary storage data structure, this algorithm is O(n) because it requires only one traversal through the list. Yet this approach is far from perfect. As m becomes large, the temporary data structure would become large as well. In the worst-case scenario, this approach might require almost as much storage space as the list itself — not a particularly space-efficient algorithm.

www.it-ebooks.info

Linked List Problems

❘ 51

Perhaps working back from the end of the list is not the best approach. Because counting from the beginning of the list is trivial, is there any way to count from the beginning to find the desired element? The desired element is m from the end of the list, and you know the value of m. It must also be l elements from the beginning of the list, although you don’t know l. However, l + m = n, the length of the list. It’s easy to count all the elements in the list. Then you can calculate l = n – m, and traverse l elements from the beginning of the list.
Although this process involves two passes through the list, it’s still O(n). It requires only a few variables’ worth of storage, so this method is a significant improvement over the previous attempt. If you could change the functions that modify the list such that they would increment a count variable for every element added and decrement it for every element removed, you could eliminate the count pass, making this a relatively efficient algorithm. Again, though this point is worth mentioning to the interviewer, he or she is probably looking for a solution that doesn’t modify the data structure or place any restrictions on the methods used to access it.
Assuming you must explicitly count the elements in the current algorithm, you must make almost two complete traversals of the linked list. A large list on a memory-constrained system might exist mostly in paged-out virtual memory (on disk). In such a case, each complete traversal of the list would require a large amount of disk access to swap the relevant portions of the list in and out of memory. Under these conditions, an algorithm that made only one complete traversal of the list might be significantly faster than an algorithm that made two traversals, even though they would both be
O(n). Is there a way to find the target element with a single traversal?
The counting-from-the-beginning algorithm obviously demands that you know the length of the list.
If you can’t track the length so that you know it ahead of time, you can determine the length only by a full-list traversal. There doesn’t seem to be much hope for getting this algorithm down to a single traversal. Try reconsidering the previous linear time algorithm, which required only one traversal but was rejected for requiring too much storage. Can you reduce the storage requirements of this approach?
When you reach the end of the list, you are actually interested in only one of the m elements you’ve been tracking — the element that is m elements behind your current position. You are tracking the rest of the m elements merely because the element m behind your current position changes every time your position advances. Keeping a queue m elements long, where you add the current element to the head and remove an element from the end every time you advance your current position, ensures that the last element in the queue is always m elements behind your current position.
In effect, you are using this m element data structure to make it easy to implicitly advance an m-behind pointer in lock step with your current position pointer. However, this data structure is unnecessary — you can explicitly advance the m-behind pointer by following each element’s next pointer just as you do for your current position pointer. This is as easy as (or perhaps easier than) implicitly advancing by shifting through a queue, and it eliminates the need to track all the elements between your current position pointer and your m-behind pointer. This algorithm seems to be the one you’ve been looking for: linear time, a single traversal, and negligible storage requirements. Now you just need to work out the details.

www.it-ebooks.info

52

❘ CHAPTER 4 Linked Lists

You need to use two pointers: a current position pointer and an m-behind pointer. You must ensure that the two pointers are actually spaced m elements apart; then you can advance them at the same rate. When your current position is the end of the list, m-behind points to the mth-to-last element.
How can you get the pointers spaced properly? If you count elements as you traverse the list, you can move the current position pointer to the mth element of the list. If you then start the m-behind pointer at the beginning of the list, they will be spaced m elements apart.
Are there any error conditions you need to watch for? If the list is less than m elements long, then there is no mth-to-last element. In such a case, you would run off the end of the list as you tried to advance the current position pointer to the mth element, possibly dereferencing a null pointer in the process. Therefore, check that you don’t hit the end of the list while doing this initial advance.
With this caveat in mind, you can implement the algorithm. It’s easy to introduce off-by-one errors in any code that spaces any two things m items apart or counts m items from a given point. You may want to refer to the exact definition of “mth to last” given in the problem and try a simple example on paper to make sure you get your counts right, particularly in the initial advancement of the current pointer.
ListElement *findMToLastElement( ListElement *head, int m ){
ListElement *current, *mBehind; int i; if (!head) return NULL;
/* Advance current m elements from beginning,
* checking for the end of the list
*/
current = head; for( i = 0; i < m; i++ ) { if( current->next ){ current = current->next;
} else { return NULL;
}
}
/* Start mBehind at beginning and advance pointers
* together until current hits last element
*/
mBehind = head; while( current->next ){ current = current->next; mBehind = mBehind->next;
}
/* mBehind now points to the element we were
* searching for, so return it
*/
return mBehind;
}

www.it-ebooks.info

Linked List Problems

List Flattening
PROBLEM Start with a standard doubly linked list. Now imagine that in addi-

tion to the next and previous pointers, each element has a child pointer, which may or may not point to a separate doubly linked list. These child lists may have one or more children of their own, and so on, to produce a multilevel data structure, as shown in Figure 4-3. head pointer

tail pointer
5

33

17

2

1

6

25

6

2

7

8

9

12

5

7

21

3

Figure 4-3

Flatten the list so that all the nodes appear in a single-level, doubly linked list. You are given the head and tail of the first level of the list. Each node is a C struct with the following definition: typedef struct Node { struct Node *next; struct Node *prev; struct Node *child; int value;
} Node;

www.it-ebooks.info

❘ 53

54

❘ CHAPTER 4 Linked Lists

This list-flattening problem gives you plenty of freedom. You have simply been asked to flatten the list. There are many ways to accomplish this task. Each way results in a one-level list with a different node ordering. Start by considering several options for algorithms and the node orders they would yield. Then implement the algorithm that looks easiest and most efficient.
Begin by looking at the data structure. This data structure is a little unusual for a list. It has levels and children — somewhat like a tree. A tree also has levels and children, as you’ll see in the next chapter, but trees don’t have links between nodes on the same level. You might try to use a common tree traversal algorithm and copy each node into a new list as you visit it as a simple way to flatten the structure.
The data structure is not exactly a normal tree, so any traversal algorithm you use must be modified.
From the perspective of a tree, each separate child list in the data structure forms a single extended tree node. This may not seem too bad: Where a standard traversal algorithm checks the child pointers of each tree node directly, you just need to do a linked list traversal to check all the child pointers.
Every time you check a node, you can copy it to a duplicate list. This duplicate list will be your flattened list.
Before you work out the details of this solution, consider its efficiency. Every node is examined once, so this is an O(n) solution. There is likely to be some overhead for the recursion or data structure required for the traversal. In addition, you make a duplicate copy of each node to create the new list.
This copying is inefficient, especially if the structure is large. See if you can identify a more efficient solution that doesn’t require so much copying.
So far, the proposed solution has concentrated on an algorithm, letting the ordering follow. Instead, try focusing on an ordering and then try to deduce an algorithm. You can focus on the data structure’s levels as a source of ordering. It helps to define the parts of a level as child lists. Just as rooms in a hotel are ordered by level, you can order nodes by the level in which they occur. Every node is in a level and appears in an ordering within that level (arranging the child lists from left to right).
Therefore, you have a logical ordering just like hotel rooms. You can order by starting with all the first-level nodes, followed by all the second-level nodes, followed by all the third-level nodes, and so on. Applying these rules to the example data structure, you should get the ordering shown in
Figure 4-4. head pointer
5

tail pointer 33

17

2

1

6

25

6

2

7

8

9

12

5

7

21

3

Figure 4-4

Now try to discover an algorithm that yields this ordering. One property of this ordering is that you never rearrange the order of the nodes in their respective levels, so you could connect all the nodes on each level into a list and then join all the connected levels. However, to find all the nodes

www.it-ebooks.info

Linked List Problems

❘ 55

on a given level so that you can join them, you would need to do a breadth-first search of that level.
Breadth-first searching is inefficient, so you should continue to look for a better solution.
In Figure 4-3, the second level is composed of two child lists. Each child list starts with a different child of a first-level node. You could try to append the child lists one at a time to the end of the first level instead of combining the child lists.
To append the child lists one at a time, traverse the first level from the start, following the next pointers. Every time you encounter a node with a child, append the child (and thus the child list) to the end of the first level and update the tail pointer. Eventually, you append the entire second level to the end of the first level. You can continue traversing the first level and arrive at the start of the old second level. If you continue this process of appending children to the end of the first level, you eventually append every child list to the end and have a flattened list in the required order. More formally, this algorithm is as follows:
Start at the beginning of the first level
While you are not at the end of the first level
If the current node has a child
Append the child to the end of the first level
Update the tail pointer
Advance to next node

This algorithm is easy to implement because it’s so simple. In terms of efficiency, every node after the first level is examined twice. Each node is examined once when you update the tail pointer for each child list and once when you examine the node to see if it has a child. The nodes in the first level are examined only once when you examine them for children because you had a first-level tail pointer when you began. Therefore, there are no more than 2n comparisons in this algorithm, and it is an O(n) solution. This is the best time order you can achieve because every node must be examined. Although this solution has the same time order as the tree traversal approach considered earlier, it is more efficient because it requires no recursion or additional memory. (There are other equally efficient solutions to this problem. One such solution involves inserting child lists after their parents, rather than at the end of the list.)
The code for this algorithm is as follows. Note that the function takes a pointer to the tail pointer so that changes to the tail pointer are retained when the function returns: void flattenList( Node *head, Node **tail ){
Node *curNode = head; while( curNode ){
/* The current node has a child */ if( curNode->child ){ append( curNode->child, tail );
}
curNode = curNode->next;
}
}
/* Appends the child list to the end of the tail and updates
* the tail.
*/

www.it-ebooks.info

;

56

❘ CHAPTER 4 Linked Lists

void append( Node *child, Node **tail ){
Node *curNode;
/* Append the child child list to the end */
(*tail)->next = child; child->prev = *tail;
/* Find the new tail, which is the end of the child list. */ for( curNode = child; curNode->next; curNode = curNode->next )
; /* Body intentionally empty */
/* Update the tail pointer now that curNode is the new tail. */
*tail = curNode;
}

List Unflattening
PROBLEM Unflatten the list created by the previous problem and restore the

data structure to its original condition.
This problem is the reverse of the previous problem, so you already know a lot about this data structure. One important insight is that you created the flattened list by combining all the child lists into one long level. To get back the original list, you must separate the long flattened list back into its original child lists.
Try doing the exact opposite of what you did to create the list. When flattening the list, you traversed down the list from the start and added child lists to the end. To reverse this, you go backward from the tail and break off parts of the first level. You could break off a part when you encounter a node that was the beginning of a child list in the unflattened list. Unfortunately, this is more difficult than it might seem because you can’t easily determine whether a particular node is a child (indicating that it started a child list) in the original data structure. The only way to determine whether a node is a child is to scan through the child pointers of all the previous nodes. All this scanning would be inefficient, so you should examine some additional possibilities to find a better solution.
One way to get around the child node problem is to go through the list from start to end, storing pointers to all the child nodes in a separate data structure. Then you could go backward through the list and separate every child node. Looking up nodes in this way frees you from repeated scans to determine whether a node is a child. This is a good solution, but it still requires an extra data structure. Try looking for a solution without an extra data structure.
It seems you have exhausted all the possibilities for going backward through the list, so try an algorithm that traverses the list from the start to the end. You still can’t immediately determine whether a node is a child. One advantage of going forward, however, is that you can find all the child nodes in the same order that you appended them to the first level. You also know that every child node began a child list in the original list. If you separate each child node from the node before it, you get the unflattened list back.

www.it-ebooks.info

Linked List Problems

❘ 57

You can’t simply traverse the list from the start, find each node with a child, and separate the child from its previous node. You would get to the end of your list at the break between the first and second level, leaving the rest of the data structure untraversed. This approach seems promising, though.
You can traverse every child list, starting with the first level (which is a child list itself). When you find a child, continue traversing the original child list and also traverse the newly found child list.
You can’t traverse both at the same time, however. You could save one of these locations in a data structure and traverse it later. However, rather than design and implement this data structure, you can use recursion. Specifically, every time you find a node with a child, separate the child from its previous node, start traversing the new child list, and then continue traversing the original child list.
This is an efficient algorithm because each node is checked at most twice, resulting in an O(n) running time. Again, an O(n) running time is the best you can do because you must check each node at least once to see if it is a child. In the average case, the number of function calls is small in relation to the number of nodes, so the recursive overhead is not too bad. In the worst case, the number of function calls is no more than the number of nodes. This solution is approximately as efficient as the earlier proposal that required an extra data structure, but somewhat simpler and easier to code. Therefore, this recursive solution would probably be the best choice in an interview. In outline form, the algorithm looks like the following:
Explore path:
While not at the end
If current node has a child
Separate the child from its previous node
Explore path beginning with the child
Go onto the next node

It can be implemented in C as:
/* unflattenList wraps the recursive function and updates the tail pointer. */ void unflattenList( Node *start, Node **tail ){
Node *curNode; exploreAndSeparate( start );
/* Update the tail pointer */ for( curNode = start; curNode->next; curNode = curNode->next )
; /* Body intentionally empty */
*tail = curNode;
}
/* exploreAndSeparate actually does the recursion and separation */ void exploreAndSeparate( Node *childListStart ){
Node *curNode = childListStart; while( curNode ){ if( curNode->child ){
/* terminates the child list before the child */ curNode->child->prev->next = NULL;
/* starts the child list beginning with the child */ curNode->child->prev = NULL;

www.it-ebooks.info

58

❘ CHAPTER 4 Linked Lists

exploreAndSeparate( curNode->child );
}
curNode = curNode->next;
}
}

Null or Cycle
PROBLEM You are given a linked list with at least one node that is either null-

terminated (acyclic), as shown in Figure 4-5, or ends in a cycle (cyclic), as shown in Figure 4-6. head pointer
3

2

4

6

2

Figure 4-5

head pointer
3

2

4

6

2

Figure 4-6

Write a function that takes a pointer to the head of a list and determines whether the list is cyclic or acyclic. Your function should return false if the list is acyclic and true if it is cyclic. You may not modify the list in any way.
Start by looking at the pictures to see if you can determine an intuitive way to differentiate a cyclic list from an acyclic list.
The difference between the two lists appears at their ends. In the cyclic list, there is an end node that points back to one of the earlier nodes. In the acyclic list, there is an end node that is null terminated. Thus, if you can find this end node, you can test whether the list is cyclic or acyclic.
In the acyclic list, it is easy to find the end node. You traverse the list until you reach a null terminated node.
In the cyclic list, though, it is more difficult. If you just traverse the list, you go in a circle and won’t know whether you’re in a cyclic list or just a long acyclic list. You need a more sophisticated approach. Try looking at the end node a bit more. The end node points to a node that has another node pointing at it. This means that there are two pointers pointing at the same node. This node is the only

www.it-ebooks.info

Linked List Problems

❘ 59

node with two elements pointing at it. You can design an algorithm around this property. You can traverse the list and check every node to determine whether two other nodes are pointing at it. If you find such a node, the list must be cyclic. Otherwise, the list is acyclic, and you will eventually encounter a null pointer.
Unfortunately, it is difficult to check the number of nodes pointing at each element. See if you can find another special property of the end node in a cyclic list. When you traverse the list, the end node’s next node is a node that you have previously encountered. Instead of checking for a node with two pointers pointing at it, you can check whether you have already encountered a node. If you find a previously encountered node, you have a cyclic list. If you encounter a null pointer, you have an acyclic list. This is only part of the algorithm. You still need to figure out how to determine whether you have previously encountered a node.
The easiest way to do this would be to mark each element as you visit it, but you’ve been told you’re not allowed to modify the list. You could keep track of the nodes you’ve encountered by putting them in a separate list. Then you would compare the current node to all the nodes in the alreadyencountered list. If the current node ever points to a node in the already-encountered list, you have a cycle. Otherwise, you’ll get to the end of the list and see that it’s null terminated and thus acyclic.
This would work, but in the worst case the already-encountered list would require as much memory as the original list. See if you can reduce this memory requirement.
What are you storing in the already-encountered list? The already-encountered list’s first node points to the original list’s first node, its second node points to the original list’s second node, its third node points to the original list’s third node, and so on. You’re creating a list that mirrors the original list. This is unnecessary — you can just use the original list.
Try this approach: Because you know your current node in the list and the start of the list, you can compare your current node’s next pointer to all its previous nodes directly. For the ith node, compare its next pointer to see if it points to any of nodes 1 to i – 1. If any are equal, you have a cycle.
What’s the time order of this algorithm? For the first node, 0 previous nodes are examined; for the second node, one previous node is examined; for the third node, two previous nodes are examined, and so on. Thus, the algorithm examines 0 + 1 + 2 + 3 +...+ n nodes. As discussed in Chapter 3, such an algorithm is O(n 2).
That’s about as far as you can go with this approach. Although it’s difficult to discover without some sort of hint, there is a better solution involving two pointers. What can you do with two pointers that you couldn’t do with one? You can advance them on top of each other, but then you might as well have one pointer. You could advance them with a fixed interval between them, but this doesn’t seem to gain anything. What happens if you advance the pointers at different speeds?
In the acyclic list, the faster pointer reaches the end. In the cyclic list, they both loop endlessly. The faster pointer eventually catches up with and passes the slower pointer. If the fast pointer is ever behind or equal to the slower pointer, you have a cyclic list. If it encounters a null pointer, you have an acyclic list. You’ll need to start the fast pointer one node ahead of the slow pointer so they’re not equal to begin with. In outline form, this algorithm looks like this:
Start slow pointer at the head of the list
Start fast pointer at second node
Loop infinitely

www.it-ebooks.info

60

❘ CHAPTER 4 Linked Lists

If the fast pointer reaches a null pointer
Return that the list is null terminated
If the fast pointer moves onto or over the slow pointer
Return that there is a cycle
Advance the slow pointer one node
Advance the fast pointer two nodes

You can now implement this solution:
/* Takes a pointer to the head of a linked list and determines if
* the list ends in a cycle or is NULL terminated
*/
bool determineTermination( Node *head ){
Node *fast, *slow; slow = head; fast = head->next; while( true ){ if( !fast || !fast->next ) return false; else if( fast == slow || fast->next == slow ) return true; else { slow = slow->next; fast = fast->next->next;
}
}
}

Is this algorithm faster than the earlier solution? If this list is acyclic, the faster pointer comes to the end after examining n nodes, while the slower pointer traverses 1⁄2 n nodes. Thus, you examine
3⁄2n nodes, which is an O(n) algorithm.
What about a cyclic list? The slower pointer never goes around any loop more than once. When the slower pointer has examined n nodes, the faster pointer will have examined 2n nodes and have
“passed” the slower pointer, regardless of the loop’s size. Therefore, in the worst case you examine
3n nodes, which is still O(n). Regardless of whether the list is cyclic or acyclic, this two-pointer approach is much better than the single-pointer approach to the problem.

Summary
Although they are simple data structures, problems with linked lists often arise in interviews focusing on C or C++ experience as a way to determine whether a candidate understands basic pointer manipulation. Each element in a singly linked list contains a pointer to the next element in the list, whereas each element in a doubly linked list points to both the previous and the next elements. The first element in both list types is referred to as the head, whereas the last element is referred to as the tail.
Circular linked lists have no head or tail; instead, the elements are linked together to form a cycle.
List operations are much simpler to perform on doubly linked lists, so most interview problems use singly linked lists. Typical operations include updating the head of the list, traversing the list to find a specific element from the end of the list, and inserting or removing list elements.

www.it-ebooks.info

5

Trees and Graphs
Trees and graphs are common data structures, so both are fair game in a programming interview. Tree problems are more common, however, because they are simple enough to implement within the time constraints of an interview and enable an interviewer to test your understanding of recursion and runtime analysis. Graph problems are interesting but often more complicated, so you won’t see them as frequently.
Unlike the previous chapter’s focus on implementations in C, this and subsequent chapters focus on implementations in more modern object-oriented languages.

Trees
A tree is made up of nodes (data elements) with zero, one, or several references (or pointers) to other nodes. Each node has only one other node referencing it. The result is a data structure that looks like Figure 5-1.
As in a linked list, a node is represented by a structure or class, and trees can be implemented in any language that includes pointers or references. In object-oriented languages you usually define a class for the common parts of a node and one or more subclasses for the data held by a node. For example, the following are the C# classes you might use for a tree of integers:

A

B

D

public class Node { public Node[] children;
}
public class IntNode : Node { public int value;
}

H

E

I

C

F

J

K
Figure 5-1

www.it-ebooks.info

G

62

❘ CHAPTER 5 Trees and Graphs

In this definition, children is an array that keeps track of all the nodes that this node references.
For simplicity, these classes expose the children as public data members, but this isn’t good coding practice. A proper class definition would make them private and instead expose public methods to manipulate them. A somewhat more complete Java equivalent (with methods and constructors) to the preceding classes is: public abstract class Node { private Node[] children; public Node( Node[] children ){ this.children = children;
}
public int getNumChildren(){ return children.length;
}
public Node getChild( int index ){ return children[ index ];
}
} public class IntNode extends Node { private int value; public IntNode( Node[] children, int value ){ super( children ); this.value = value;
}
public int getValue(){ return value;
}
}

This example still lacks error handling and methods to add or remove nodes from a tree. During an interview you may want to save time and keep things simple by using public data members, folding classes together, and sketching out the methods needed to manage the tree rather than fully implementing them. Ask the interviewer how much detail she wants and write your code accordingly. Any time you take shortcuts that violate good object-oriented design principles, be sure to mention the more correct design to the interviewer and be prepared to implement it that way if asked. This way you avoid getting bogged down in implementation details, but don’t give the impression that you’re a sloppy coder who can’t properly design classes.
Referring to the tree shown in Figure 5-1, you can see there is only one top-level node. From this node, you can follow links and reach every other node. This top-level node is called the root. The root is the only node from which you have a path to every other node. The root node is inherently the start of any tree. Therefore, people often say “tree” when talking about the root node of the tree.

www.it-ebooks.info

Trees

❘ 63

Some additional tree-related terms to know are:
➤➤

Parent — A node that points to other nodes is the parent of those nodes. Every node except the root has one parent. In Figure 5-1, B is the parent of D, E, and F.

➤➤

Child — A node is the child of any node that points to it. In Figure 5-1, each of the nodes D,
E, and F is a child of B.

➤➤

Descendant — All the nodes that can be reached by following a path of child nodes from a particular node are the descendants of that node. In Figure 5-1, D, E, F, H, I, J, and K are the descendants of B.

➤➤

Ancestor — An ancestor of a node is any other node for which the node is a descendant. For example, A, B, and D are the ancestors of I.

➤➤

Leaves — The leaves are nodes that do not have any children. G, H, I, and K are leaves.

Binary Trees
So far, we’ve used the most general definition of a tree. Most tree problems involve a special type of tree called a binary tree. In a binary tree, each node has no more than two children, referred to as left and right. Figure 5-2 shows an example of a binary tree.
The following is an implementation of a binary tree. For simplicity, everything is combined into a single class: public class Node { private Node left; private Node right; private int value;

A

B

public Node( Node left, Node right, int value ){ this.left = left; this.right = right; this.value = value;
}
public Node getLeft() { return left; } public Node getRight() { return right; } public int getValue() { return value; }

C

D

F

E

G

H

Figure 5-2

}

When an element has no left or right child, the corresponding reference is null.
Binary tree problems can often be solved more quickly than equivalent generic tree problems, but they are no less challenging. Because time is at a premium in an interview, most tree problems will be binary tree problems. If an interviewer says “tree,” it’s a good idea to clarify whether she is referring to a generic tree or a binary tree.

NOTE When interviewers say “tree,” they often mean a binary tree.

www.it-ebooks.info

64

❘ CHAPTER 5 Trees and Graphs

Binary Search Trees
Trees are often used to store sorted or ordered data. The most common way to store ordered data in a tree is to use a special tree called a binary search tree (BST). In a BST, the value held by a node’s left child is less than or equal to its own value, and the value held by a node’s right child is greater than or equal to its value. In effect, the data in a BST is sorted by value: All the descendants to the left of a node are less than or equal to the node, and all the descendants to the right of the node are greater than or equal to the node. Figure 5-3 shows an example of a BST.
BSTs are so common that many people mean a BST when they say
“tree.” Again, ask for clarification before proceeding.

5

3

1

10

4

7

12

Figure 5-3

NOTE When interviewers say “tree,” they often mean a binary search tree.
One advantage of a binary search tree is that the lookup operation (locating a particular node in the tree) is fast and simple. This is particularly useful for data storage. In outline form, the algorithm to perform a lookup in a BST is as follows:
Start at the root node
Loop while current node is non-null
If the current node's value is equal to the search value
Return the current node
If the current node's value is less than the search value
Make the right node the current node
If the current node's value is greater than the search value
Make the left node the current node
End loop

If you fall out of the loop, the node wasn’t in the tree.
Here’s an implementation of the search in C# or Java:
Node findNode( Node root, int value ){ while( root != null ){ int currval = root.getValue(); if( currval == value ) break; if( currval < value ){ root = root.getRight();
} else { // currval > value root = root.getLeft();
}
} return root;
}

www.it-ebooks.info

Trees

❘ 65

This lookup is fast because you eliminate half the remaining nodes from your search on each iteration by choosing to follow the left subtree or the right subtree. In the worst case, you will know whether the lookup was successful by the time there is only one node left to search. Therefore, the running time of the lookup is equal to the number of times that you can halve n nodes before you get to 1.
This number, x, is the same as the number of times you can double 1 before reaching n, and it can be expressed as 2x = n. You can find x using a logarithm.
For example, log 2 8 = 3 because 23 = 8, so the running time of the lookup operation is O(log 2(n)).
Because logarithms with different bases differ only by a constant factor, it’s common to omit the base 2 and call this O(log(n)). log(n) is very fast. For an example, log 2(1,000,000,000) # 30.

NOTE Lookup is an O(log(n)) operation in a balanced binary search tree.
One important caveat exists in saying that lookup is O(log(n)) in a BST: Lookup is only O(log(n)) if you can guarantee that the number of nodes remaining to be searched will be halved or nearly halved on each iteration. Why? Because in the worst case, each node has only one child, in which case you end up with a linked list and lookup becomes an O(n) operation. This worst case may be encountered more commonly than you might expect, such as when a tree is created by adding data already in sorted order.

NOTE Deletion and insertion are O(log(n)) operations in binary search trees.
Binary search trees have other important properties. For example, you can obtain the smallest element by following all the left children and the largest element by following all the right children.
The nodes can also be printed out, in order, in O(n) time. Given a node, you can even find the next highest node in O(log(n)) time.
Tree problems are often designed to test your ability to think recursively. Each node in a tree is the root of a subtree beginning at that node. This subtree property is conducive to recursion because recursion generally involves solving a problem in terms of similar subproblems and a base case. In tree recursion you start with a root, perform an action, and then move to the left or right subtree (or both, one after the other). This process continues until you reach a null reference, which is the end of a tree (and a good base case). For example, the preceding lookup operation can be reimplemented recursively as follows:
Node findNode( Node root, int value ){ if( root == null ) return null; int currval = root.getValue(); if( currval == value ) return root; if( currval < value ){ return findNode( root.getRight(), value );
} else { // currval > value return findNode( root.getLeft(), value );
}
}

www.it-ebooks.info

66

❘ CHAPTER 5 Trees and Graphs

Most problems with trees have this recursive form. A good way to start thinking about any problem involving a tree is to start thinking recursively.

NOTE Many tree operations can be implemented recursively. The recursive implementation may not be the most efficient, but it’s usually the best place to start.

Heaps
Another common tree is a heap. Heaps are trees (usually binary trees) where (in a max-heap) each child of a node has a value less than or equal to the node’s own value. (In a min-heap, each child is greater than or equal to its parent.) Consequently, the root node always has the largest value in the tree, which means that you can find the maximum value in constant time: Simply return the root value. Insertion and deletion are still O(log(n)), but lookup becomes O(n). You cannot find the next higher node to a given node in O(log(n)) time or print out the nodes in sorted order in O(n) time as in a BST. Although conceptually heaps are trees, the underlying data implementation of a heap often differs from the trees in the preceding discussion.
You could model the patients waiting in a hospital emergency room with a heap. As patients enter, they are assigned a priority and put into the heap. A heart attack patient would get a higher priority than a patient with a stubbed toe. When a doctor becomes available, the doctor would want to examine the patient with the highest priority. The doctor can determine the patient with the highest priority by extracting the max value from the heap, which is a constant time operation.

NOTE If extracting the max value needs to be fast, use a heap.

Common Searches
It’s convenient when you have a tree with ordering properties such as a BST or a heap. Often you’re given a tree that isn’t a BST or a heap. For example, you may have a tree that is a representation of a family tree or a company organization chart. You must use different techniques to retrieve data from this kind of tree. One common class of problems involves searching for a particular node. When you search a tree without the benefit of ordering, the time to find a node is O(n), so this type of search is best avoided for large trees. You can use two common search algorithms to accomplish this task.

Breadth-First Search
One way to search a tree is to do a breadth-first search (BFS). In a BFS you start with the root, move left to right across the second level, then move left to right across the third level, and so forth.
You continue the search until either you have examined all the nodes or you find the node you are searching for. A BFS uses additional memory because it is necessary to track the child nodes for all nodes on a given level while searching that level.

www.it-ebooks.info

Trees

❘ 67

Depth-First Search
Another common way to search for a node is by using a depth-first search (DFS). A depth-first search follows one branch of the tree down as many levels as possible until the target node is found or the end is reached. When the search can’t go down any farther, it is continued at the nearest ancestor with unexplored children.
DFS has much lower memory requirements than BFS because it is not necessary to store all the child pointers at each level. If you have additional information on the likely location of your target node, one or the other of these algorithms may be more efficient. For instance, if your node is likely to be in the upper levels of the tree, BFS is most efficient. If the target node is likely to be in the lower levels of the tree, DFS has the advantage that it doesn’t examine any single level last. (BFS always examines the lowest level last.)
For example, if you were searching a job hierarchy tree looking for an employee who started less than 3 months ago, you would suspect that lower-level employees are more likely to have started recently. In this case, if the assumption were true, a DFS would usually find the target node more quickly than a BFS.
There are other types of searches, but these are the two most common that you will encounter in an interview. Traversals
Another common type of tree problem is called a traversal. A traversal is just like a search, except that instead of stopping when you find a particular target node, you visit every node in the tree.
Often this is used to perform some operation on each node in the tree. There are many types of traversals, each of which visits nodes in a different order, but you’re most likely to be asked about the three most common types of depth-first traversals for binary trees:
➤➤

Preorder — Performs the operation first on the node itself, then on its left descendants, and finally on its right descendants. In other words, a node is always visited before any of its children. ➤➤

Inorder — Performs the operation first on the node’s left descendants, then on the node itself, and finally on its right descendants. In other words, the left subtree is visited first, then the node itself, and then the node’s right subtree.

➤➤

Postorder — Performs the operation first on the node’s left descendants, then on the node’s right descendants, and finally on the node itself. In other words, a node is always visited after all its children.

These classes of traversals can also apply to nonbinary trees as long as you have a way to classify whether a child is “less than” (on the left of) or “greater than” (on the right of) its parent node.
Recursion is usually the simplest way to implement a depth-first traversal.

NOTE If you’re asked to implement a traversal, recursion is a good way to start thinking about the problem.

www.it-ebooks.info

68

❘ CHAPTER 5 Trees and Graphs

Graphs
Graphs are more general and more complex than trees. Like trees, they consist of nodes with children — a tree is actually a special case of a graph. But unlike tree nodes, graph nodes (or vertices) can have multiple “parents,” possibly creating a loop (a cycle). In addition, the links between nodes, as well as the nodes themselves, may have values or weights. These links are called edges because they may contain more information than just a pointer. In a graph, edges can be one-way or twoway. A graph with one-way edges is called a directed graph. A graph with only two-way pointers is called an undirected graph. Figure 5-4 shows a directed graph, and Figure 5-5 shows an undirected graph. Graphs are commonly used to model real-world problems that are difficult to model with other data structures. For example, a directed graph could represent the aqueducts connecting cities because water flows only one way. You might use such a graph to help you find the fastest way to get water from city A to city
D. An undirected graph can represent something such as a series of relays in signal transmission.
There are several common ways to represent graph data structures. The best representation is often determined by the algorithm being implemented. One common representation has the data structure for each node include an adjacency list: a list of references to other nodes with which the node shares edges. This list is analogous to the child references of the tree node data structure, but the adjacency list is usually a dynamic data structure since the number of edges at each node can vary over a wide range. Another graph representation is an adjacency matrix, which is a square matrix with dimension equal to the number of nodes. The matrix element at position i,j represents the number of edges extending from node i to node j.

7
A

3

E

2

B
4

6

C

1

D

4

3

F
Figure 5-4
B
4
A

2

3

C

1

2

D
5

E
Figure 5-5

All the types of searches possible in trees have analogs in graphs. The graph equivalents are usually slightly more complex due to the possibility of cycles.
Graphs are often used in real-world programming, but they are less frequently encountered in interviews, in part because graph problems can be difficult to solve in the time allotted for an interview.

Tree and Graph Problems
Most tree problems involve binary trees. You may occasionally encounter a graph problem, especially if the interviewer thinks you’re doing particularly well with easier problems.

www.it-ebooks.info

Tree and Graph Problems

❘ 69

Height of a Tree
PROBLEM The height of a tree (binary or not) is defined to be the maximum distance from the root node to any leaf node. The tree in Figure 5-2, for example, has a height of 4 because the path from A to F, G, or H involves four nodes.
Write a function to calculate the height of an arbitrary binary tree.
Start by looking at some simple trees to see if there’s a way to think recursively about the problem.
Each node in the tree corresponds to another subtree rooted at that node. For the tree in Figure 5-2, the heights of each subtree are:
➤➤

A: height 4

➤➤

B: height 1

➤➤

C: height 3

➤➤

D: height 2

➤➤

E: height 2

➤➤

F: height 1

➤➤

G: height 1

➤➤

H: height 1

Your initial guess might be that the height of a node is the sum of the height of its children because height A = 4 = height B + height C, but a quick test shows that this assumption is incorrect because height C = 3, but the heights of D and E add up to 4, not 3.
Look at the two subtrees on either side of a node. If you remove one of the subtrees, does the height of the tree change? Yes, but only if you remove the taller subtree. This is the key insight you need:
The height of a tree equals the height of its tallest subtree plus one. This is a recursive definition that is easy to translate to code: public static int treeHeight( Node n ){ if( n == null ) return 0; return 1 + Math.max( treeHeight( n.getLeft() ), treeHeight( n.getRight() ) );
}

What’s the running time for this function? The function is recursively called for each child of each node, so the function will be called once for each node in the tree. Since the operations on each node are constant time, the overall running time is O(n).

www.it-ebooks.info

70

❘ CHAPTER 5 Trees and Graphs

Preorder Traversal
PROBLEM Informally, a preorder traversal involves walking around the tree in a counter-clockwise manner starting at the root, sticking close to the edges, and printing out the nodes as you encounter them. For the tree shown in Figure 5-6, the result is 100, 50, 25, 75, 150, 125, 110, and 175. Perform a preorder traversal of a binary search tree, printing the value of each node.
To design an algorithm for printing out the nodes in the correct order, you should examine what happens as you print out the nodes.
Go to the left as far as possible, come up the tree, go one node to the right, and then go to the left as far as possible, come up the tree again, and so on. The key is to think in terms of subtrees.
The two largest subtrees are rooted at 50 and 150. All the nodes in the subtree rooted at 50 are printed out before any of the nodes in the subtree rooted at 150. In addition, the root node for each subtree is printed out before the rest of the subtree.
Generally, for any node in a preorder traversal, you would print the node itself, followed by the left subtree and then the right subtree.
If you begin the printing process at the root node, you would have a recursive definition as follows:

1.
2.
3.

100

50

25

150

75

125

175

110
Figure 5-6

Print out the root (or the subtree’s root) value.
Do a preorder traversal on the left subtree.
Do a preorder traversal on the right subtree.

Assume you have a binary tree Node class with a printValue method. (Your interviewer probably wouldn’t ask you to write out the definition for this class, but if she did, an appropriate definition would be the same as the Node class in the introduction to this chapter, with the addition of a printValue method.) The preceding pseudocode algorithm is easily coded using recursion: void preorderTraversal( Node root ){ if( root == null ) return; root.printValue(); preorderTraversal( root.getLeft() ); preorderTraversal( root.getRight() );
}

What’s the running time on this algorithm? Every node is examined once, so it’s O(n).
The inorder and postorder traversals are almost identical; all you vary is the order in which the node and subtrees are visited: void inorderTraversal( Node root ){ if( root == null ) return;

www.it-ebooks.info

Tree and Graph Problems

❘ 71

inorderTraversal( root.getLeft() ); root.printValue(); inorderTraversal( root.getRight() );
}
void postorderTraversal( Node root ){ if( root == null ) return; postorderTraversal( root.getLeft() ); postorderTraversal( root.getRight() ); root.printValue(); }

Just as with the preorder traversal, these traversals examine each node once, so the running time is always O(n).

Preorder Traversal, No Recursion
PROBLEM Perform a preorder traversal of a binary search tree, printing the value of each node, but this time you may not use recursion.
Sometimes recursive algorithms can be replaced with iterative algorithms that accomplish the same task in a fundamentally different manner using different data structures. Consider the data structures you know and think about how they could be helpful. For example, you might try using a list, an array, or another binary tree.
Because recursion is so intrinsic to the definition of a preorder traversal, you may have trouble finding an entirely different iterative algorithm to use in place of the recursive algorithm. In such a case, the best course of action is to understand what is happening in the recursion and try to emulate the process iteratively.
Recursion implicitly uses a stack data structure by placing data on the call stack. That means there should be an equivalent solution that avoids recursion by explicitly using a stack.
Assume you have a stack class that can store nodes. (Implementing the stack is a separate problem.)
The following is a skeleton class definition for the stack. (If you’re not sure what these methods do, revisit the stack implementation problem in Chapter 4.) public class NodeStack { public void push( Node n ){ .... } public Node pop() { .... }
}

Now consider the recursive preorder algorithm, paying close attention to the data that are implicitly stored on the call stack so you can explicitly store the same data on a stack in your iterative implementation: Print out the root (or subtree's root) value.
Do a preorder traversal on the left subtree.
Do a preorder traversal on the right subtree.

www.it-ebooks.info

72

❘ CHAPTER 5 Trees and Graphs

When you first enter the procedure, you print the root node’s value. Next, you recursively call the procedure to traverse the left subtree. When you make this recursive call, the calling procedure’s state is saved on the stack. When the recursive call returns, the calling procedure can pick up where it left off.
What’s happening here? Effectively, the recursive call serves to implicitly store the address of the right subtree on the stack, so it can be traversed after the left subtree traversal is complete. Each time you print a node and move to its left child, the right child is first stored on an implicit stack.
Whenever there is no child, you return from a recursive call, effectively popping a right child node off the implicit stack, so you can continue traversing.
To summarize, the algorithm prints the value of the current node, pushes the right child onto an implicit stack, and moves to the left child. The algorithm pops the stack to obtain a new current node when there are no more children (when it reaches a leaf). This continues until the entire tree has been traversed and the stack is empty.
Before implementing this algorithm, first remove any unnecessary special cases that would make the algorithm more difficult to implement. Instead of coding separate cases for the left and right children, why not push pointers to both nodes onto the stack? Then all that matters is the order in which the nodes are pushed onto the stack: You need to find an order that enables you to push both nodes onto the stack so that the left node is always popped before the right node.
Because a stack is a last-in-first-out data structure, push the right node onto the stack first, followed by the left node. Instead of examining the left child explicitly, simply pop the first node from the stack, print its value, and push both of its children onto the stack in the correct order. If you start the procedure by pushing the root node onto the stack and then pop, print, and push as described, you can emulate the recursive preorder traversal. To summarize:
Create the stack
Push the root node on the stack
While the stack is not empty
Pop a node
Print its value
If right child exists, push the node's right child
If left child exists, push the node's left child

The code (with no error checking) for this algorithm is as follows: void preorderTraversal( Node root ){
NodeStack stack = new NodeStack(); stack.push( root ); while( stack.size() > 0 ){
Node curr = stack.pop(); curr.printValue(); Node n = curr.getRight(); if( n != null ) stack.push( n ); n = curr.getLeft(); if( n != null ) stack.push( n );
}
}

www.it-ebooks.info

Tree and Graph Problems

❘ 73

What’s the running time for this algorithm? Each node is examined only once and pushed on the stack only once. Therefore, this is still an O(n) algorithm. You don’t have the overhead of many recursive function calls in this implementation. On the other hand, the stack used in this implementation probably requires dynamic memory allocation, so it’s unclear whether the iterative implementation would be more or less efficient than the recursive solution. The point of the problem, however, is to demonstrate your understanding of recursion.

Lowest Common Ancestor
PROBLEM Given the value of two nodes in a binary search tree, find the lowest
(nearest) common ancestor. You may assume that both values already exist in the tree.
For example, using the tree shown in Figure 5-7, assume 4 and 14 are the two given nodes. The lowest common ancestor would be 8 because it’s an ancestor to both 4 and 14, and there is no node lower on the tree that is an ancestor to both 4 and 14.
Figure 5-7 suggests an intuitive algorithm: Follow the lines up from each of the nodes until they converge. To implement this algorithm, make lists of all the ancestors of both nodes, and then search through these two lists to find the first node where they differ. The node immediately above this divergence is the lowest common ancestor. This is a good solution, but there is a more efficient one.
The first algorithm works for any type of tree but doesn’t use any of the special properties of a binary search tree. Try to use some of those special properties to help you find the lowest common ancestor more efficiently. Consider the two special properties of binary search trees. The first property is that every node has zero, one, or two children. This fact doesn’t seem to help find a new algorithm.

20

8

22

12

4

10

14

Figure 5-7

The second property is that the left child’s value is less than or equal to the value of the current node, and the right child’s value is greater than or equal to the value of the current node. This property looks more promising.
Looking at the example tree, the lowest common ancestor to 4 and 14, the node with value 8, is different from the other ancestors to 4 and 14 in an important way. All the other ancestors are either greater than both 4 and 14 or less than both 4 and 14. Only 8 is between 4 and 14. You can use this insight to design a better algorithm.
The root node is an ancestor to all nodes because there is a path from it to all other nodes. Therefore, you can start at the root node and follow a path through the common ancestors of both nodes. When

www.it-ebooks.info

74

❘ CHAPTER 5 Trees and Graphs

your target values are both less than the current node, you go left. When they are both greater, you go right. The first node you encounter that is between your target values is the lowest common ancestor. Based on this description, and referring to the values of the two nodes as value1 and value2, you can derive the following algorithm:
Examine the current node
If value1 and value2 are both less than the current node's value
Examine the left child
If value1 and value2 are both greater than the current node's value
Examine the right child
Otherwise
The current node is the lowest common ancestor

This solution may seem to suggest using recursion because it is a tree and the algorithm has a recursive structure to it, but recursion is not necessary here. Recursion is most useful when moving through multiple branches of a tree or examining some special pattern of nodes. Here you are only traveling down the tree. It’s easy to implement this kind of search iteratively:
Node findLowestCommonAncestor( Node root, int value1, int value2 ){ while( root != null ){ int value = root.getValue(); if( value > value1 && value > value2 ){ root = root.getLeft();
} else if( value < value1 && value < value2 ){ root = root.getRight();
} else { return root;
}
} return null; // only if empty tree
}

What’s the running time of this algorithm? You travel down a path to the lowest common ancestor.
Recall that traveling a path to any one node takes O(log(n)). Therefore, this is an O(log(n)) algorithm. In addition, this is slightly more efficient than a similar recursive solution because you don’t have the overhead of repeated function calls.
The problem states that you’ll be given the value of two nodes in the tree, but it’s trivial to write an overloaded wrapper for the function you just implemented that would cover the case where you’re given references to the two nodes:
Node findLowestCommonAncestor( Node root, Node child1, Node child2 ){ if( root == null || child1 == null || child2 == null ){ return null;
}
return findLowestCommonAncestor( root, child1.getValue(), child2.getValue() );
}

www.it-ebooks.info

Tree and Graph Problems

❘ 75

Binary Tree to Heap
PROBLEM You are given a set of integers in an unordered binary tree. Use an array sorting routine to transform the tree into a heap that uses a balanced binary tree as its underlying data structure.
To use an array sorting routine, as the problem requires, you must convert the tree you start with into an array. Because you both start and end with binary tree data structures, transforming into an array probably isn’t the most efficient way to accomplish the end goal. You might comment to your interviewer that if not for the requirement to use an array sorting routine, it would be more efficient to simply heapify the nodes of the starting tree: that is, reorder them such that they meet the criteria of a heap. You can heapify the tree in O(n) time, while just the array sort is at least O(n log(n)). But, as is often the case, this problem includes an arbitrary restriction to force you to demonstrate certain skills — here, it’s the ability to transform between tree and array data structures.
Your first task is to convert the tree into an array. You need to visit each node to insert its associated value into your array. You can accomplish this with a tree traversal. One wrinkle (assuming you’re working with static arrays) is that you have to allocate the array before you can put anything in it, but you don’t know how many values there are in the tree before you traverse it, so you don’t know how big to make the array. This is solved by traversing the tree twice: once to count the nodes and a second time to insert the values in the array. After the array has been filled, a simple call to the sorting routine yields a sorted array. The major challenge of this problem is to construct the heap from the sorted array.
The essential property of a heap is the relationship between the value of each node and the values of its children: less than or equal to the children for a min-heap and greater than or equal for a maxheap. The problem doesn’t specify a min-heap or max-heap; we’ll arbitrarily choose to construct a min-heap. Because each value in the sorted array is less than or equal to all the values that follow it, you need to construct a tree where the children of each node come from further down the array
(closer to the end) than their parent.
If you made each node the parent of the node to the right of it in the array, you would satisfy the heap property, but your tree would be completely unbalanced. (It would effectively be a linked list.)
You need a better way to select children for each node that leaves you with a balanced tree. If you don’t immediately see a way to do this, you might try working in reverse: Draw a balanced binary tree, and then put the nodes into a linear ordering (as in an array) such that parents always come before children. If you can reverse this process, you’ll have the procedure you’re looking for.
One simple way to linearly arrange the nodes while keeping parents ahead of children is by level: first the root (the first level of the tree), then both of its children (the second level), then all their children (the third level), and so on. This is the same order in which you would encounter the nodes in a breadth-first traversal. Think about how you can use the relationship you’ve established between this array and the balanced tree that it came from.
The key to constructing the balanced heap from the array is identifying the location of a node’s children relative to the node itself. If you arrange the nodes of a binary tree in an array by level, the root

www.it-ebooks.info

76

❘ CHAPTER 5 Trees and Graphs

node (at index 0) has children at indexes 1 and 2. The node at index 1 has children at 3 and 4, and the node at 2 has children at 5 and 6. Expand this as far as you need to identify the pattern: It looks like each node’s children have indexes just past two times the parent’s index. Specifically, the children of the node at index i are located at 2i + 1 and 2i + 2. Verify that this works with an example you can draw out, and then consider whether this makes sense. In a complete binary tree, there are
2n nodes at each level of the tree, where n is the level. Therefore, each level has one more node than the sum of the nodes in all the preceding levels. So, it makes sense that the indexes of the children of the first node in a level would be 2i + 1 and 2i + 2. As you move further along the level, since there are two children for each parent, the index of the child must increase by two for every increase in the index of the parent, so the formula you’ve derived continues to make sense.
At this point, it’s worth stopping to consider where you are with this solution. You’ve ordered the elements in an array such that they satisfy the heap property. (Beyond just satisfying the heap property, they are fully ordered because you were required to perform a full sort: This additional degree of ordering is why this step was O(n log(n)) instead of just the O(n) that it would have been to merely satisfy the heap property.) You’ve also determined how to find the children of each node (and by extension, the parent of each node) within this array without needing the overhead of explicit references or pointers between them. Although a binary heap is conceptually a tree data structure, there’s no reason why you can’t represent it using an array. In fact, arrays using implicit links based on position are the most common underlying data representation used for binary heaps. They are more compact than explicit trees, and the operations used to maintain ordering within the heap involve exchanging the locations of parents and children, which is easily accomplished with an array representation. Although the array representation of your heap is probably a more useful data structure, this problem explicitly requires that you unpack your array into a tree data structure. Now that you know how to calculate the position of the children of each node, that’s a fairly trivial process.
Because you’re both starting and ending with a binary tree data structure, you can take a shortcut in implementation by creating an array of node objects and sorting that, rather than extracting the integer from each node into an array. Then you can simply adjust the child references on these nodes instead of having to build the tree from scratch. A Java implementation looks like: public static Node heapifyBinaryTree( Node root ){ int size = traverse( root, 0, null ); // Count nodes
Node[] nodeArray = new Node[size]; traverse( root, 0, nodeArray );
// Load nodes into array
// Sort array of nodes based on their values, using Comparator object
Arrays.sort( nodeArray, new Comparator(){
@Override public int compare(Node m, Node n){ int mv = m.getValue(), nv = n.getValue(); return ( mv < nv ? -1 : ( mv == nv ? 0 : 1));
}
});
// Reassign children for each node for( int i = 0; i < size; i++ ){ int left = 2*i + 1;

www.it-ebooks.info

Tree and Graph Problems

❘ 77

int right = left + 1; nodeArray[i].setLeft( left >= size ? null : nodeArray[left] ); nodeArray[i].setRight( right >= size ? null : nodeArray[right] );
}
return nodeArray[0]; // Return new root node
}
public static int traverse( Node node, int count, Node[] arr ){ if( node == null ) return count; if( arr != null ) arr[count] = node; count++; count = traverse( node.getLeft(), count, arr ); count = traverse( node.getRight(), count, arr ); return count;
}

Unbalanced Binary Search Tree
PROBLEM Given an unbalanced binary search tree with more nodes in the left subtree than the right, reorganize the tree to improve its balance while maintaining the properties of a binary search tree
This would be a trivial problem with a binary tree, but the requirement to maintain the ordering of a BST makes it more complex.
If you start by thinking of a large BST and all the possible ways it could be arranged, it’s easy to get overwhelmed by the problem.
Instead, it may be helpful to start by drawing a simple example of an unbalanced binary search tree, such as the one in Figure 5-8.

6

4

7

2

5

What are your options for rearranging this tree? Since there are too many nodes on the left and not enough on the right, you need
1
3 to move some nodes from the left subtree of the root to the right
Figure 5-8 subtree. For the tree to remain a BST, all of the nodes in the left subtree of the root must be less than or equal to the root, and all the nodes in the right subtree greater than or equal to the root. There’s only one node (7) that is greater than the root, so you won’t be able to move any nodes to the right subtree if 6 remains the root. Clearly, a different node will have to become the root in the rearranged BST.
In a balanced BST, half of the nodes are less than or equal to the root and half are greater or equal. This suggests that 4 would be a good choice for the new root. Try drawing a BST with the same set of nodes, but with 4 as the root, as seen in Figure 5-9. Much better! For this example, the tree ends up perfectly balanced. Now look at how you need to change the child links on the first tree to get to the second one.

www.it-ebooks.info

4
2
1

6
3

Figure 5-9

5

7

78

❘ CHAPTER 5 Trees and Graphs

The new root is 4 and 6 becomes its right child, so you need to set the right child of the new root to be the original root. You’ve changed the right child of the new root, so you need to reattach its original right child (5) to the tree. Based on the second diagram, it becomes the left child of the old root. Comparing the previous two figures, the left subtree of 4 and the right subtree of 6 remain unchanged, so these two modifications, illustrated in Figure 5-10, are all you need to do.

6

4

2

1

7

5

3

Will this approach work for larger, more complex trees, or is it
Figure 5-10 limited to this simple example? There are two cases to consider: first where the “root” in this example is actually a child of a larger tree and second where the
“leaves” in this example are actually parents and have additional nodes beneath them.
In the first case, the larger tree was a BST to begin with, so we won’t violate the BST properties of the larger tree by rearranging the nodes in a subtree — just remember to update the parent node with the new root of the subtree.
In the second case, consider the properties of the subtrees rooted at the two nodes that get new parents. We must make sure that the properties of a BST won’t be violated. The new root was the old root’s left child, so the new root and all of its original children are less than or equal to the old root.
Therefore there’s no problem with one of the new root’s child subtrees becoming the left subtree of the old root. Conversely, the old root and its right subtree are all greater than or equal to the new root, so there’s no problem with these nodes being in the right subtree of the new root.
Since there’s no case in which the properties of a BST will be violated by the transformation you’ve devised, this algorithm can be applied to any BST. Moreover, it can be applied to any subtree within a BST. You can imagine that a badly unbalanced tree could be balanced by applying this procedure repeatedly; a tree unbalanced to the right could be improved by applying the procedure with the sides reversed.
At some point during this problem, you may recognize that the algorithm you’re deriving is a tree rotation (specifically, a right rotation). Tree rotations are the basic operations of many self-balancing trees, including AVL trees and red-black trees.
Right rotation can be implemented as: public static Node rotateRight( Node oldRoot ){
Node newRoot = oldRoot.getLeft(); oldRoot.setLeft( newRoot.getRight() ); newRoot.setRight( oldRoot ); return newRoot;
}

An equivalent implementation as a non-static method of the Node class is better object-oriented design: public Node rotateRight() {
Node newRoot = left; left = newRoot.right; newRoot.right = this; return newRoot;
}

www.it-ebooks.info

Tree and Graph Problems

❘ 79

rotateRight performs a fixed number of operations regardless of the size of the tree, so its run time

is O(1).

Six Degrees of Kevin Bacon
PROBLEM The game “Six Degrees of Kevin Bacon” involves trying to find the shortest connection between an arbitrarily selected actor and Kevin Bacon. Two actors are linked if they appeared in the same movie. The goal of the game is to connect the given actor to Kevin Bacon using the fewest possible links.
Given a list of all major movies in history and their casts (assume that the names of movies and actors are unique identifiers), describe a data structure that could be constructed to efficiently solve Kevin Bacon problems. Write a routine that uses your data structure to determine the Bacon number (the minimum number of links needed to connect to Kevin Bacon) for any actor.
The data structure you need to devise seems to involve nodes (actors) and links (movies), but it’s a little more complicated than the tree structures you’ve been working with up to this point. For one thing, each node may be linked to an arbitrarily large number of other nodes. There’s no restriction on which nodes may have links to each other, so it’s expected that some sets of links will form cycles
(circular connections). Finally, there’s no hierarchical relationship between the nodes on either side of a link. (At least in your data structure; how the politics play out in Hollywood is a different matter.) These requirements point toward using a very general data structure: an undirected graph.
Your graph needs a node for each actor. Representing movies is trickier: Each movie has a cast of many actors. You might consider also creating nodes for each movie, but this makes the data structure considerably more complicated: There would be two classes of nodes, with edges allowed only between nodes of different classes. Because you only care about movies for their ability to link two actors, you can represent the movies with edges. An edge connects only two nodes, so each single movie will be represented by enough edges to connect all pairs of actor nodes in the cast. This has the disadvantage of substantially increasing the total number of edges in the graph and making it difficult to extract information about movies from the graph, but it simplifies the graph and the algorithms that operate on it.
One logical approach is to use an object to represent each node. Again, because you only care about movies for establishing links, if two actors have appeared in more than one movie together, you need to maintain only a single edge between them. Edges are often implemented using references (or pointers), which are inherently unidirectional: There’s generally no way for an object to determine what is referencing it. The simplest way to implement the undirected edges you need here is to have each node object reference the other. An implementation of the node class in Java might look like: public class ActorGraphNode{ private String name; private Set linkedActors; public ActorGraphNode( String name ){ this.name = name; linkedActors = new HashSet();
}

www.it-ebooks.info

80

❘ CHAPTER 5 Trees and Graphs

public void linkCostar( ActorGraphNode costar ){ linkedActors.add( costar ); costar.linkedActors.add( this );
}
}

The use of a Set to hold the references to other nodes allows for an unlimited number of edges and prevents duplicates. The graph is constructed by creating an ActorGraphNode object for each actor and calling linkCostar for each pair of actors in each movie.
Using a graph constructed from these objects, the process to determine the Bacon number for any actor is reduced to finding the length of the shortest path between the given node and the
“Kevin Bacon” node. Finding this path involves searching across the graph. Consider how you might do this.
Depth-first searches have simple recursive implementations — would that approach work here? In a depth-first search, you repeatedly follow the first edge of each node you encounter until you can go no further, then backtrack until you find a node with an untraversed second edge, follow that path as far as you can, and so on. One challenge you face immediately is that unlike in a tree, where every path eventually terminates in a leaf node, forming an obvious base case for recursion, in a graph there may be cycles, so you need to be careful to avoid endless recursion. (In this graph, where edges are implemented with pairs of references, each edge effectively forms a cycle between the two nodes it connects, so there are a large number of cycles.)
How can you avoid endlessly circling through cycles? If a node has already been visited, you shouldn’t visit it again. One way to keep track of whether a node has been visited is to change a variable on the node object to mark it as visited; another is to use a separate data structure to track all the nodes that have been visited. Then the recursive base case is a node with no adjacent (directly connected by an edge) unvisited nodes. This provides a means to search through all the (connected) nodes of the graph, but does it help solve the problem?
It’s not difficult to track the number of edges traversed from the starting node — this is just the recursion level. When you find the target node (the node for the actor whose Bacon number you’re determining), your current recursion level gives you the number of edges traversed along the path you traveled to this node. But you need the number of edges (links) along the shortest path, not just any path. Will this approach find the shortest path? Depth-first search goes as far into the network as possible before backtracking. This means that if you have a network where a node could be reached by either a longer path passing through the starting node’s first edge, or a shorter path passing through the second edge, you will encounter it by the longer path rather than the shorter. So there are at least some cases where this approach will fail to find the shortest path; in fact, if you try a few more examples, you’ll find that in most cases the path you traverse is not the shortest. You might consider trying to fix this by revisiting previously visited nodes if you encounter them by a shorter path, but this seems overly complicated. Put this idea on hold and see if you can come up with a better algorithm.
Ideally, you want a search algorithm that encounters each node along the shortest path from the starting node. If you extend your search outward from the starting node in all directions, extending each search path one edge at a time, then each time you encounter a node, it will be via the shortest path to that node. This is a description of a breadth-first search. You can prove that this search

www.it-ebooks.info

Tree and Graph Problems

❘ 81

will always find nodes along the shortest path: When you encounter an unvisited node while you are searching at n edges from the start node, all the nodes that are n – 1 or fewer edges from the start have already been visited, so the shortest path to this node must involve n edges. (If you’re thinking that this seems simpler than what you remember for the algorithm for finding the shortest path between two nodes in a graph, you may be thinking of Dijkstra’s algorithm. Dijkstra’s algorithm, which is somewhat more complex, finds the shortest path when each edge is assigned a weight, or length, so the shortest path is not necessarily the path with the fewest edges. Breadth-first search is sufficient for finding the shortest path when the edges have no [or equal] weights, such as in this problem.) You may remember how to implement a breadth-first search for a graph, but we’ll assume you don’t and work through the details of the implementation. Just as with the depth-first search, you have to make sure you don’t follow cycles endlessly. You can use the same strategy you developed for the depth-first search to address this problem.
Your search starts by visiting each of the nodes adjacent to the starting node. You need to visit all the unvisited nodes adjacent to each of these nodes as well, but not until after you visit all the nodes adjacent to the start node. You need some kind of data structure to keep track of unvisited nodes as you discover them so that you can come back to them when it is their turn. Each unvisited node that you discover should be visited, but only after you’ve already visited all the previously discovered unvisited nodes. A queue is a data structure that organizes tasks to be completed in the order that they’re discovered or added: You can add unvisited nodes to the end of the queue as you discover them and remove them from the front of the queue when you’re ready to visit them.
A recursive implementation is natural for a depth-first search where you want to immediately visit each unvisited node as soon as you discover it and then return to where you left off, but an iterative approach is simpler here because the nodes you need to visit are queued. Prepare the queue by adding the start node. On each iterative cycle, remove a node from the front of the queue, and add each unvisited adjacent node to the end of the queue. You’re done when you find your target node or the queue is empty (meaning you’ve searched all the graph reachable from the start node).
The final remaining piece of the puzzle is determining the length of the path after you find the target node. You could try to determine what the path that you followed was and measure its length, but with this algorithm there’s no easy way to identify that path. One way around this is to constantly keep track of how many edges you are away from the start; that way when you find the target, you know the length of the path. The easiest way to do this is to mark each node with its Bacon number as you discover it. The Bacon number of a newly discovered unvisited node is the Bacon number of the current node plus one. This also provides a convenient means for distinguishing visited from unvisited nodes: If you initialize each node with an invalid Bacon number (for example, –1), then any node with a non-negative Bacon number has been visited and any node with a Bacon number of
–1 has not.
In pseudo-code, your current algorithm is:
Create a queue and initialize it with the start node
While the queue is not empty
Remove the first node from the queue
If it is the target node, return its Bacon number
For each node adjacent to the current node

www.it-ebooks.info

82

❘ CHAPTER 5 Trees and Graphs

If the node is unvisited (Bacon number is -1)
Set the Bacon number to current node's Bacon number + 1
Add the adjacent node to the end of the queue
Return failure because the loop terminated without finding the target

Before you code this, consider whether you can optimize it for the likely case where you need to determine the Bacon number for several actors. The search is the same each time you run it; the only difference is the target node at which you terminate. So you’re recomputing the Bacon numbers for many of the actors each time you run the search, even though these numbers never change. What if instead of terminating the search at a target node, you use this routine once to do a breadth-first traversal of the entire graph (or at least the entire graph reachable from Kevin Bacon) to precompute the Bacon numbers for all of the actors? Then finding the Bacon number for an individual actor is reduced to returning a single precomputed value. Adding to the preceding class definition for
ActorGraphNode, the code for this is: private int baconNumber = -1; public int getBaconNumber() { return baconNumber; }
// To be called only on the Kevin Bacon node public void setBaconNumbers(){ baconNumber = 0;
Queue queue = new LinkedList(); queue.add( this );
ActorGraphNode current; while( (current = queue.poll()) != null ){ for( ActorGraphNode n : current.linkedActors ){ if( -1 == n.baconNumber ){ //if node is unvisited
n.baconNumber = current.baconNumber + 1; queue.add( n );
}
}
}
}

What’s the run time of this algorithm? The function to compute the Bacon numbers evaluates every
(reachable) node once and every edge twice, so in a graph with m nodes and n edges, it is O(m + n).
In this graph, you would expect that n m, so this reduces to O(n). This is the same run time you would have to determine the Bacon number for an individual actor if you did not precompute them.
With precomputation, the Bacon number for an individual actor is just a single look up, which is
O(1). Of course, this assumes that you have a reference to the relevant actor node. If all you have is the actor’s name, a graph traversal to find the node would be O(m + n), so to maintain O(1) performance you need a constant time means of finding the node representing that actor, such as a hash table mapping names to nodes.
For additional practice with graphs, try extending this algorithm to print out the names of the actors forming the connection between the target actor and Kevin Bacon. Alternatively, write a method that adds edges to an existing graph when a new movie is released, and efficiently updates only the Bacon numbers that have changed.

www.it-ebooks.info

Summary

❘ 83

Summary
Trees and graphs are common data structures, and trees are common in interview questions. Both data structures consist of nodes that reference other nodes in the structure. A tree is a special case of a graph where each node (except the root) has exactly one parent and there are no cycles.
Three important kinds of trees are binary trees, binary search trees, and heaps. A binary tree has two children, called left and right. A binary search tree is an ordered binary tree where all the nodes to the left of a node have values less than or equal to the node’s own value and all nodes to the right of a node have values greater than or equal to the node’s value. A heap is a tree in which each node is less than or equal to its children (in a min-heap) or greater than or equal to its children (in a max heap) which means the maximum (max-heap) or minimum (min-heap) value is the root and can be accessed in constant time. Many tree problems can be solved with recursive algorithms.
Both tree and graph problems often involve traversals, which progress through each node of the data structure, or searches, which are traversals that terminate when a target node is found. Two fundamental orderings for these are depth-first and breadth-first. Graphs may have cycles, so when these algorithms are applied to graphs, some mechanism is needed to avoid retraversing parts of the graph that have already been visited.

www.it-ebooks.info

www.it-ebooks.info

6

Arrays and Strings
Arrays and strings are closely related. In the abstract sense, a string is just a (possibly readonly) array of characters. Most of the string-manipulation problems you encounter are based on your understanding of array data types, particularly in C where strings and character arrays are essentially identical. Other languages consider strings and character arrays as distinct data types, but there’s always a way to convert a string to an array and vice versa. When the two are different, it’s important to understand how and why they diverge. In addition, not all array problems involve strings, so understanding how arrays work in the abstract and how they’re implemented by the language you use is crucial to answering array-focused problems.

Arrays
An array is a sequence of variables of the same type arranged contiguously in a block of memory. Because arrays play an important role in every major language used in commercial development, we assume you’re at least somewhat familiar with their syntax and usage. With that in mind, this discussion focuses on the theory and application of arrays.
Like a linked list, an array provides an essentially linear form of storage, but its properties are significantly different. (Multidimensional arrays are not exactly linear, but they are implemented as linear arrays of linear arrays.) In a linked list, lookup is always an O(n) operation, but array lookup is O(1) as long as you know the index of the element you want. The provision regarding the index is important — if you know only the value, lookup is still O(n) in the average case. For example, suppose you have an array of characters. Locating the sixth character is
O(1), but locating the character with value 'w' is O(n).
The price for this improved lookup is significantly decreased efficiency for insertion and deletion of data in the middle of the array. Because an array is essentially a block of contiguous memory, it’s not possible to create or eliminate storage between any two elements as it is with a linked list. Instead, you must physically move data within the array to make room for an insertion or to close the gap left by a deletion; this is an O(n) operation.

www.it-ebooks.info

86

❘ CHAPTER 6 Arrays and Strings

Arrays are not dynamic data structures: They have a finite, fixed number of elements. Memory must be allocated for every element in an array, even if only part of the array is used. Arrays are best used when you know how many elements you need to store before the program executes. When the program needs a variable amount of storage, the size of the array imposes an arbitrary limit on the amount of data that can be stored. Making the array large enough so that the program always operates below the limit doesn’t solve the problem: Either you waste memory or you won’t have enough memory to handle the largest data sizes possible.
Most modern languages also have library support for dynamic arrays: arrays that can change size to store as much or as little data as necessary. (Some languages, typically scripting languages, use dynamic arrays as their fundamental array type and have no static array type.) This discussion won’t go into the details of implementing a dynamic array, but you should know that most dynamic array implementations use static arrays internally. A static array cannot be resized, so dynamic arrays are resized by allocating a new array of the appropriate size, copying every element from the old array into the new array, and freeing the old array. This is an expensive operation that should be done as infrequently as possible.
Each language handles arrays somewhat differently, giving each language a different set of array programming pitfalls.

C and C++
Despite the differences between C and C++, they are similar in their treatment of arrays. In most cases, an array name is equivalent to a pointer constant to the first element of the array. This means that you can’t initialize the elements of one array with another array using a simple assignment.

NOTE Pointers and constants can be confusing concepts separately; they are often nearly incomprehensible in combination. When we say pointer constant we mean a pointer declared like char *const chrPtr that cannot be altered to point at a different place in memory, but that can be used to change the contents of the memory it points at. This is not the same as the more commonly seen constant pointer, declared like const char *chrPtr, which can be changed to point at a different memory location but cannot be used to change the contents of a memory location. If you find this confusing, you’re certainly not the only one.
For example, arrayA = arrayB;

/* Compile error: arrayA is not an lvalue */

is interpreted as an attempt to make arrayA refer to the same area of memory as arrayB. If arrayA has been declared as an array, this causes a compile error because you can’t change the memory location to which arrayA refers. To copy arrayB into arrayA, you must write a loop that does an element-by-element assignment or use a library function such as memcpy that does the copying for you (usually much more efficiently).
In C and C++, the compiler tracks only the location of arrays, not their size. The programmer is responsible for tracking array sizes, and there is no bounds checking on array accesses — the language won’t

www.it-ebooks.info

Arrays

❘ 87

complain if you store something in the 20th element of a 10-element array. As you can imagine, writing outside the bounds of an array usually overwrites some other data structure, leading to all manner of curious and difficult-to-find bugs. Development tools are available to help programmers identify out-ofbounds array accesses and other memory-related problems in their C and C++ programs.

Java
Unlike a C array, a Java array is an object in and of itself, separate from the data type it holds. A r ­ eference to an array is therefore not interchangeable with a reference to an element of the array.
Java arrays are static, and the language tracks the size of each array, which you can access via the implicit length data member. As in C, you cannot copy arrays with a simple assignment: If two array references have the same type, assignment of one to the other is allowed, but it results in both symbols referring to the same array, as shown in the following example: byte[] arrayA = new byte[10]; byte[] arrayB = new byte[10]; arrayA = arrayB; // arrayA now refers to the same array as arrayB

If you want to copy the contents of one array to another, you must do it element by element in a loop or call a system function: if( arrayA.length (right arrow), shift operators, 194

A abstract classes, 162–164 abstract factory methods, 171
Abstract Factory pattern, 171 accomplishments, showing you can get things done, 6
ACID (atomicity, consistency, isolation, and durability) properties, 182–183 actions (or capabilities or methods), class. See methods acyclic lists, distinguishing cyclic lists from, 58–60 adjacency list, representation of graph data, 68 adjacency matrix, representation of graph data, 68 aggregates, SQL statements, 181 algorithms determining best sorting algorithm, 132–134 finding best algorithm in Big-O analysis, 28–29

for finding mth-to-last element in linked list, 50–52 insertion sorts, 127–128 list-flattening and, 54–55 list-unflattening and, 57–58 memory usage of, 29 merge sorts, 130–131 optimization using, 27 overview, 125–126 quicksort algorithm, 128–130 selection sorts, 126–127 steps in problem solving, 22 ancestors finding lowest common ancestor in tree structure, 73–74 of trees, 63
AND operator bitwise operators, 193 determining number of 1 bits in binary representation of an integer, 203–205 in three-value logic, 188–189
APIs (application programming interfaces), 162 application developer, know your aptitudes and likes, 1 application programming interfaces
(APIs), 162 argument passing, in C++, 242–243
Array object, JavaScript, 88

285

www.it-ebooks.info

arrays – bit manipulation

arrays in C and C++, 86–87 in C#, 87 dynamic arrays for stack implementation, 38–39 finding the first nonrepeated character, 91–94 insertion sort and, 127 in Java, 87 in JavaScript, 88, 91 overview, 85–86 removing specified characters from strings, 95–96 selection sort and, 126 summary, 105–106 using array sorting routine to convert tree into a heap, 75–77
ASCII
removing specified characters from ASCII string, 94–96 as subset of UTF-8, 88 assumptions logic and, 209 problem-solving and, 216–217 atomicity property, ACID properties in database transactions, 182 attributes (columns), relational database tables, 177 attributes, class, 159
AVG, SQL aggregates, 181
AVL trees, 78

B bandwidth, network performance and, 247–248 base case, in recursion, 107–108 base classes, inheritance and, 160
Basic Multilingual Plane (BMP), Unicode and, 93

behavioral design patterns
Iterator pattern, 171
Observer pattern, 171–172
BFS (breadth-first search) overview of, 66 in “Six Degrees of Kevin Bacon” game, 80–81
Big-O analysis applying, 25–26 how it works, 26–27 optimization using, 27 procedure for, 28 selecting best performing algorithm, 28–29 big-endian, determining endianness of computer, 201–202 binary numbers binary two’s complement notation for, 192–193 determining number of 1 bits in binary representation of an integer, 203–205 binary search applying to problem weighing marbles, 219 recursion applied to, 111–113 binary search trees. See BSTs (binary search trees) binary trees. See also BSTs (binary search trees) converting to heap, 75–77 overview, 63 unbalanced, 77–79 binary two’s complement notation, for numbers, 192–193 bit manipulation binary two’s complement notation and, 192–193 bitwise operators, 193–194 determining if computer is big-endian or little-endian, 201–202 determining number of 1 bits in binary representation of an integer, 203–205

286

www.it-ebooks.info

bitwise operators – C# language

optimizing using shift operators, 194 overview, 192 summary, 205 bitwise operators, 193–194 blacklisting, Web application security and, 249 blogs, developing marketable skills, 7
BMP (Basic Multilingual Plane), Unicode and, 93 boat and dock problem, graphical/spatial brainteasers, 226–228 bonuses, referrals and, 10 bookstores, researching job market, 4 brainteasers being wary of simple problems, 210 bridge crossing problem, 214–217 estimation problems, 210–211 gas stations in U.S. problem, 222 marble weighing problem, 218–221 not being intimidated by, 209–210 open lockers problem, 211–213 overview of, 207 solving the right problem, 208–209 summary, 223 tackling, 207–208 three light switch problem, 213–214 brainteasers, graphical or spatial boat and dock problem, 226–228 burning fuse problem, 233–235 cube counting problem, 228–231 drawing as first step in solving, 225–226 escaping oncoming train problem, 235–236 fox and duck problem, 231–233 overview, 225 summary, 235–236 breadth-first search (BFS) overview of, 66 in “Six Degrees of Kevin Bacon” game, 80–81

bridge crossing problem, brainteasers, 214–217
BSTs (binary search trees) finding lowest common ancestor in tree structure, 73–74 overview, 64–66 reorganizing an unbalanced binary search tree, 77–79 vs. hash tables, 251 bug-finding problem, linked lists, 48–50
Builder pattern, 169–170 burning fuse problem, graphical/spatial brainteasers, 233–235 busy waiting problem in concurrency, 150–152
CPU time wasted by, 153

C
C language arrays in, 86–87 inserting/deleting elements in linked lists, 36–37 linked list problems and, 31 pointer misuse in, 35 strings in, 89 writing C function to determine endianness of computer, 201–202
C# language applying languages in programming interviews, 20 arrays in, 87 converting integers to strings, 101 garbage collection and, 245 multiple inheritance disallowed, 165 not supporting friend classes, 242
OOP (object-oriented programming) and, 159 strings in, 90

287

www.it-ebooks.info

C++ language – CompareToAll function

C++ language applying languages in programming interviews, 20–21 argument passing, 242–243 arrays in, 86–87 comparing macros and inline functions, 243–245 comparing with Java, 241 destructor methods in, 162 example of use of virtual methods, 164–165 implementing singly linked list, 32–33 inserting/deleting elements in linked lists, 37 linked list problems and, 31 multiple inheritance in, 165
OOP (object-oriented programming) and, 159 pointer misuse in, 35–36 strings in, 89
C99 language, 243–245 capabilities, class. See methods career-related questions
“What Are Your Career Goals?” 256
“What Can You Tell Me About Your
Experience?” 256
“Why Are You Looking to Change
Jobs?” 256–257
Cartesian coordinate system raster pixel displays and, 191 scan conversion and, 195–196 char object, in C and C++, 88–89 characters converting numeric values to, 103 converting to numeric values, 101–102 finding the first nonrepeated character, 91–94 removing specified characters from ASCII string, 94–96 reversing order of words in string, 97–101 sequence of. See strings

child lists list-flattening and, 54–55 list-unflattening and, 57 child nodes, of binary trees, 63 circles, exercise drawing upper-eighth of, 195–197 circular linked lists, 34 clarity, in résumé, 271 classes abstract classes, 162–163 attributes and actions, 159–160 creational design patterns and, 168–169 definition in object-oriented languages, 61–62 friend classes, 241–242 inheritance and polymorphism and, 160–161 cleartext passwords, 249
Codd, E. F., 177 coding explaining your approach and testing, 23 know your aptitudes and likes, 2 programming interviews covering coding skills, 19–20 columns (attributes), relational database tables, 177 combinations, of strings, 116–118 combinatorial mathematics, 120 communication, being interactive in programming interviews, 21 companies contacting for job application, 11–12 finding for job application, 9–10 know your aptitudes and likes in selecting, 2–3
“Why Do You Want to Work for This
Company?” 260 comparator function, using with sorting routines, 137–139
CompareToAll function, in Big-O analysis, 25–27

288

www.it-ebooks.info

CompareToMax function – Decorator pattern

CompareToMax function, in Big-O

analysis, 25–27 compensation. See also salary knowing what you want in compensation package, 257 negotiating compensation package, 16 compilers, handling inline functions, 243–244 conciseness, in résumé, 271 concurrency ATM example, 147–150 busy waiting problem, 150–152 deadlocks, 147 dining philosophers problem, 155–158 monitors and semaphores in thread synchronization, 146–147 overview, 145 producer/consumer threads and, 152–155 summary, 158 system threads vs. user thread, 146 threads and, 145–146 consistency property, ACID properties in database transactions, 183 constructor methods, for creating objects, 162 contacts getting referrals from, 10 maintaining even while rejecting offers, 16–17 context switches, in thread management, 146 cooperative model, for thread management, 146 counting semaphores, locking shared resources, 147 co-workers, getting referrals from, 10 createStack function, stack implementation in linked lists, 39–43 creational design patterns
Builder pattern, 169–170
Factory Method pattern and Abstract
Factory Method pattern, 171 overview, 168
Singleton pattern, 169 credentials, developing marketable skills, 5

cryptography cryptographic hashes, 249–250 public and shared key approaches, 250–251 cube counting problem, graphical/spatial brainteasers, 228–231 curriculum vitae (CV), 269 cyclic lists, distinguishing from acyclic lists, 58–60

D data structures graphs. See graphs list-flattening and, 54 list-unflattening and, 56 trees. See trees using in problem-solving, 22, 24 database management systems (DBMS), 178 databases exercise writing SQL INSERT statement, 183 exercise writing SQL statement that returns maximum value, 186–187 exercise writing SQL statement that returns names of employee, 184–186 exercise writing SQL statement that returns nonapartment addresses, 188–189 overview of, 177 relational, 177–178
SQL databases, 178–182 transactions in, 182–183
DBMS (database management systems), 178 deadlocks in dining philosopher problem, 157–158 in thread management, 147 debugging skills, know your aptitudes and likes, 2
Decorator pattern comparing with inheritance, 175–176 as Wrapper pattern, 172

289

www.it-ebooks.info

deferred initialization – experience-related questions

deferred initialization, Singleton pattern and, 172–175
DELETE statement, SQL statements, 182 deleteStack function, stack implementation in linked lists, 39–43 depth-first search (DFS) overview of, 67 in “Six Degrees of Kevin Bacon” game, 80 descendants, of trees, 63 design patterns applying Singleton pattern to problem,
172–175
behavioral patterns, 171–172 comparing use of Decorator pattern with inheritance, 175–176 creational patterns, 168–171 efficient updating of Observer pattern, 176 overview, 167 reasons for using, 167–168 structural patterns, 172 summary, 176
Design Patterns: Elements of Reusable Object
Oriented Software (Gamma, Helm, Johnson, and Vlissides), 167–168 design-related jobs, outsourcing risk and, 5 destructor methods, objects, 162
DFS (depth-first search) overview of, 67 in “Six Degrees of Kevin Bacon” game, 80 digest strings, Web application security and, 249
Dijkstra’s algorithm, 80–81 dining philosophers problem, 155–158 directed graphs, 68 display, raster pixel displays and, 191 divide-and-conquer algorithms merge sort as, 130 quicksort as, 128 doctorates, developing marketable skills, 5

domain-specific knowledge, outsourcing risk and, 5 doubly linked lists flattening, 53–56 overview of, 34 unflattening, 56–58
Drake Equation, 211 drawing, as approach to solving graphical/ spatial brainteasers, 225–226 dressing, for interviews, 13–14 durability property, ACID properties in database transactions, 183 dynamic arrays overview. See arrays for stack implementation, 38–39

E edges, of graphs, 68 education, developing marketable skills, 5
EJB (Enterprise Java Beans), 177 e‑mail, submitting résumé to companies via, 11–12 employees, getting referrals from, 10 employers, getting referrals from, 10 endianness, writing C function to determine endianness of computer, 201–202
Enterprise Java Beans (EJB), 177 error handling finding/fixing bugs in removeHead, 48–50 stack implementation in linked lists and, 39–41 estimation problems overview, 210–211 problem determining number of gas stations in U.S., 222 event semaphores, locking shared resources, 147 event threads, 146 experience-related questions, in interviews, 254

290

www.it-ebooks.info

factorial – Horner’s Rule

F factorial, implementing via recursion, 108–109
Factory Method pattern, 171 finalizer methods, objects, 162 fingerprints, Web application security and, 249 floating-point values, rounding and, 192 foreign key constraints, in relational databases, 178 foreign keys, in relational databases, 178
Fortran language, 21 forums, developing marketable skills, 7 fox and duck problem, graphical/spatial brainteasers, 231–233 friend classes, 241–242 friend keyword, applying to functions or classes, 241–242
FROM clause, SQL statements, 180–181 functions in Big-O analysis, 25–27 comparator function, 137–139 copying strings in C, 89 inline functions, 243–245 recursive function, 107 stack implementation in linked lists and, 39–43 tail-recursive functions, 127

G
The Gang of Four, 167–168 garbage collection, 245–246 gas stations in U.S. problem, brainteasers, 222 generalization, as problem-solving technique,
212, 220 goals, “What Are Your Career Goals?” 256 graduate degrees, developing marketable skills, 5 graphical/spatial brainteasers boat and dock problem, 226–228 burning fuse problem, 233–235 cube counting problem, 228–231

drawing as first step in solving, 225–226 escaping oncoming train problem, 235–236 fox and duck problem, 231–233 overview, 225 summary, 235–236 graphics exercise drawing upper-eighth of a circle, 195–197 exercising determining if two rectangles overlap, 197–200 overview of, 191–192 graphs, 81
BFS (breadth-first search) in, 81 overview, 61 in “Six Degrees of Kevin Bacon” game, 80 types of, 68 green threads, 146

H hash tables finding the first nonrepeated character, 91–92 removing specified characters from strings, 91–92 vs. BSTs, 251 hashes, Web application security and, 249–250
HCI (human computer interaction), know your aptitudes and likes, 1–2 head element in doubly linked lists, 34 finding/fixing bugs in removeHead, 48–50 null vs. cyclic lists and, 58–60 in singly linked lists, 32 tracking in singly linked list, 34–36 headhunters, working with, 10–11 heaps converting binary tree to, 75–77 overview, 66 high-performance computing (HPC), 152
Horner’s Rule, 101–102

291

www.it-ebooks.info

HPC – Java language

HPC (high-performance computing), 152 human computer interaction (HCI), know your aptitudes and likes, 1–2 hybrid merge sorts, 131

I inheritance classes and, 160–161 comparing Decorator design pattern with, 175–176 multiple inheritance, 165–166 passing methods and, 245 inline functions, comparing macros with, 243–245 inner join, SQL tables, 181 inorder traversal defined, 67 process of, 70–71 in-place sorting overview, 126 selection sort and, 127–128
INSERT statement exercise writing, 183
SQL statements, 179, 182 insertAfter, maintaining tail pointer in linked list, 47 inserting/deleting elements, into/from linked lists, 36–37 insertion sorts, 127–128 integers converting to strings, 103–105 determining number of 1 bits in binary representation of an integer, 203–205 rounding, 192 interactivity in problem-solving, 22 in programming interviews, 21 interface keyword, Java, 163

interfaces know your aptitudes and likes, 1–2 vs. abstract classes, 162–164
Internet, submitting résumé to companies via, 11 internships, developing marketable skills, 6 interviews dressing for, 13–14 overview, 12 screening interviews, 12–13 on-site interviews, 13 is-a relationships, abstract classes and, 164 isolation property, ACID properties in database transactions, 183 iteration compared with recursive solutions, 109–110 transforming tail-recursive process into, 127
Iterator pattern, 171

J jagged arrays, in C#, 87
Java language applying languages in programming interviews, 20 applying recursion to telephone word problem, 121–123 arrays in, 87 comparing with C++, 241 converting integers to strings, 101, 105 creating monitor for thread management, 148–150 defining interfaces in, 163 garbage collection and, 245 implementing singly linked list, 33 multiple inheritance disallowed, 165 not supporting friend classes, 242
OOP (object-oriented programming) and, 159

292

www.it-ebooks.info

JavaScript – line segment

permutations of strings, 115 strings in, 90 thread-safe and nonthread-safe classes in, 147 tracking head element of singly linked list, 35
JavaScript
applying languages in programming interviews, 21 arrays in, 88, 91 use of OOP in, 159 job application accepting/rejecting job offers, 16–17 contacting companies, 11–12 dressing for interviews, 13–14 evaluating job offers, 15 finding companies, 9–10 getting referrals, 10 job fairs, 12 negotiating salary, 15–16 overview of, 9 preparing for. See preparation, for job search recruiter’s role in, 14–15 screening interviews and, 12–13 on-site interviews, 13 summary, 17
“Why Should We Hire You?” 260 working with headhunters, 10–11 job fairs, learning about potential employers, 12 job offers accepting/rejecting, 16–17 evaluating, 15 negotiating salary, 15–16 joins exercise joining two SQL tables, 184–186 exercise writing SQL statement that returns maximum value, 186–187
SQL tables, 180–181

K kernel-level threads, 146 keys in relational databases, 178 for sort order, 126 know yourself, 1–3 knowledge-based questions
32-bit vs. 64-bit applications, 246 argument passing, 242–243
C++ vs. Java, 241 cryptography, 250–251 friend classes, 241–242 garbage collection, 245–246 hash tables vs. BSTs, 251 inheritance, 245 macros and inline functions, 243–245 network performance, 246–247 preparing for, 239–240 summary, 251 types of problems, 240–241
Web application security, 247–250

L languages. See programming languages last-in-first-out (LIFO), stacks and, 38 latency, network performance and, 247–248 lazy initialization (lazy loading), Singleton pattern, 172–175 learning, developing marketable skills, 6 least-significant bit (LSB), in determining endianness of computer, 201–202 leaves, of trees, 63 left node, child nodes of binary trees, 63 libraries, sorting routine applied to, 137
LIFO (last-in-first-out), stacks and, 38 line segment, drawing, 192

293

www.it-ebooks.info

linked lists – model-view-controller

linked lists bug-finding in, 48–50 distinguishing cyclic from acyclic lists, 58–60 finding mth-to-last element in, 50–52 flattening, 53–56 inserting/deleting elements, 36–37 maintenance of tail pointer, 43–48 overview, 31 stack implementation, 38–43 summary, 60 tracking head element of singly linked list, 34–36 traversing a list, 36 types of, 32–34 unflattening, 56–58
LinkedIn, managing online profile, 7
Lisp language applying languages in programming interviews, 21 garbage collection and, 245 lists insertion sort and, 127 linked. See linked lists selection sort and, 126 little-endian, determining endianness of computer, 201–202 livelocks, in dining philosopher problem, 157 logic assumptions and, 209 brainteasers and, 207 logical operators, compared with bitwise operators, 194 lookups finding the first nonrepeated character, 91–94 using binary search trees, 65 loop index dependent conditionals, 118 loop partitioning, 118
LSB (least-significant bit), in determining endianness of computer, 201–202
Lua language, 21

M macros, comparing inline functions with, 243–245 management know your aptitudes and likes, 2 outsourcing risk and, 5 managers, résumé for, 276–282 marble weighing problem, brainteasers,
218–221
mark and sweep implementation, of tracing garbage collector, 246 market, job developing marketable skills, 5–6 getting information regarding, 3–4 outsourcing risk and, 4–5 master’s degrees, developing marketable skills, 5 mathematics brainteasers, 207 combinatorial mathematics, 118
MAX, SQL aggregates, 181 max heap, 66
MD5 cryptographic hash, 249 memory footprint analysis, 29 merge sort determining best sorting algorithm, 132–134 overview, 130–131 methods class, 159 constructors/destructors/finalizers, 162 finalizer methods, 162 inheritance and, 245 interfaces vs. abstract classes, 162 polymorphism and, 160 virtual methods, 164–165
MIN, SQL aggregates, 181 min heap, 66 model-view-controller (MVC), separation of responsibilities, 172

294

www.it-ebooks.info

monitors – O(n) algorithm

monitors busy waiting problem and, 151 creating in Java, 148–150 thread synchronization and, 146–147 most-significant bit (MSB), in determining endianness of computer, 201–202
MSB (most-significant bit), in determining endianness of computer, 201–202 mth-to-last element, linked list problems, 50–52 multidimensional arrays, in Java, 87 multi-key sort problem, 137–138 multiple inheritance, 165–166 multithreaded applications, 150–152 mutex (mutual exclusion) semaphore, 147 mutual exclusion (mutex) semaphore, 147
MVC (model-view-controller), separation of responsibilities, 172

N native threads, 146 negotiation, of salary, 15–16 network performance, 246–247 nodes of binary search trees, 65 of binary trees, 63 determining height of trees and, 69 in “Six Degrees of Kevin Bacon” game, 79–82 of trees, 61–62 non-technical questions
“Do You Have Any Questions for Me?” 260 overview, 253 reasons for, 253–254 summary, 261
“What Are Your Career Goals?” 256
“What Can You Tell Me About Your
Experience?” 256
“What Do You Want to Do?” 254–255
“What Is Your Favorite Programming
Language?” 255

“What Is Your Salary History?” 259–260
“What Is Your Work Style?” 256
“What Salary Are You Expecting?”
257–258
“Why Are You Looking to Change
Jobs?” 256–257
“Why Do You Want to Work for This
Company?” 260
“Why Should We Hire You?” 260
NOT operator bitwise operators, 193 in three-value logic, 189
NULL

cyclic lists and, 58–60 maintaining tail pointer in linked list, 45–46 numeric values binary two’s complement notation of,
192–193
converting characters to, 101–102 converting to characters, 103

O object-oriented programming. See OOP (objectoriented programming) objects as class instance, 159–160 constructors/destructors, 162 creational design patterns and, 168–169 passing methods through inheritance, 245
Observer pattern efficient updating of, 176 overview, 171–172 offers. See job offers offshoring, avoiding loss of job due to, 4–5
O(n) algorithm finding the first nonrepeated character, 92 removing specified characters from ASCII string, 95

295

www.it-ebooks.info

online algorithm – prepared statements

online algorithm, processing data as it becomes available, 133 online job sites, getting market information from, 3 online profile, managing, 6–8 on-site interviews, 13
OOP (object-oriented programming) class definitions, 61–62 classes and objects, 159–160 constructors/destructors, 162 inheritance and polymorphism, 160–161 interfaces vs. abstract classes, 162–164 multiple inheritance, 165–166 overview, 159 summary, 166 virtual methods, 164–165 open lockers problem, brainteasers, 211–213 open source know your aptitudes and likes, 3 working on open source project to develop marketable skills, 5 operating systems, native threads and, 146
OR operator bitwise operators, 193 in three-value logic, 188–189 outer join, SQL tables, 181 outsourcing, avoiding loss of job due to, 4–5 overrides, polymorphism and, 160

P pancake sort problem, 142–144 parent classes, 160 parent node, of trees, 63 passwords, Web application security and, 249–250 performance memory footprint analysis, 29 runtime analysis (Big-O), 25–29 permutations, of strings, 113–115 phone interviews. See screening interviews

PHP language, 21 pivot value, in quicksorts, 128–130, 139–142 pixels, raster pixel displays and, 191 pointers argument passing and, 243 for finding mth-to-last element in linked list, 51–52 inserting/deleting elements in linked lists, 36–37 maintaining tail pointer in linked list, 43–48 passing to stacks, 39 pointer constants, 86 to tail of list, 55 tracking head element of singly linked list, 34–35 to tree nodes, 61 polymorphism overview, 160–161 virtual methods used for, 165 pop, removing elements from stacks, 38–43 postorder traversal, 67, 70–71 preemptive threading, 146 preorder traversal defined, 67 process of, 70–71 without using recursion, 71–73 preparation, for job interview, 263 preparation, for job search developing marketable skills, 5–6 know the market, 3–4 know yourself, 1–3 managing online profile, 6–8 outsourcing risk and, 4–5 showcasing accomplishments, 6 summary, 6–8 preparation, for knowledge-based questions, 239–240
The Preparation of Programs for an Electronic
Digital Computer, 205 prepared statements, SQL, 249

296

www.it-ebooks.info

preprocessors – raster pixel displays

preprocessors, macros and, 243 primary key, in relational databases, 178–179 problem-solving analyzing your solution, 24 brainteasers and, 207 interactive nature of, 21 programming interviews and, 20 runtime analysis (Big-O), 25–29 steps, 22–23 what to do if you get stuck, 23–24 procedure, for Big-O analysis, 28 producer/consumer threads, example of concurrency problem, 152–155 professional development, courses in, 4 programming interviews analyzing your solution, 24 coding skills and, 19 interactive nature of problem-solving in, 21 language requirements and, 20–21 memory footprint analysis, 29 problem requirements and, 20 problem-solving steps, 22–23 runtime analysis (Big-O), 25–29 scenario for, 19–20 summary, 29 what to do if you get stuck, 23–24 programming languages programming interviews and, 20–21
“What Is Your Favorite Programming
Language?” 255 what to do if you get stuck, 24 project lifecycle, know your aptitudes and likes, 3
Prolog language, 21 proofreading résumé, 273 properties (or states), class, 159 public key cryptography, 250
Publish-Subscribe pattern, 171 push, adding elements to stacks, 38–43
Python language

applying languages in programming interviews, 21 garbage collection and, 245

Q
QA (quality assurance), know your aptitudes and likes, 2 quality assurance (QA), know your aptitudes and likes, 2 queries exercise writing SQL statement that returns maximum value, 186–187 exercise writing SQL statement that returns names of employee, 184–186 exercise writing SQL statement that returns nonapartment addresses, 188–189 in relational databases, 177 questions knowledge-based. See knowledge-based questions non-technical. See non-technical questions offering specific and thorough responses to, 240 preparing for, 239 quicksort determining best sorting algorithm,
132–134
optimizing, 139–142 overview, 128–130

R race conditions, in dining philosopher problem, 156 rainbow table, Web application security and, 250 raster pixel displays
Cartesian coordinate system and, 191 scan conversion, 195–196

297

www.it-ebooks.info

recruiters – scan conversion

recruiters dealing with high-pressure tactics of, 15 maintaining contact with even while rejecting offers, 17 negotiating compensation package, 16 role of, 14–15 working with headhunters, 10–11 rectangles, exercising determining overlap,
197–200
recursion applying to a binary search, 111–113 applying to telephone word problem,
119–124
combinations of a string, 116–118 implementing depth-first traversal, 67 iterative solutions compared with, 109–110 merge sort, 130–131 overview, 107–109 permutations of a string, 113–115 preorder traversal without using, 71–73 selection sort and, 126–127 summary, 124 thinking recursively when using binary search trees, 65–66 recursive case, 107–108 recursive function, 107 red-black trees, 78 reference counting, garbage collection method, 246 references argument passing and, 243 inserting/deleting elements in linked lists, 36–37 tracking head element of singly linked list, 34–35 referential integrity, in relational databases, 178 referrals, getting for job application, 10 relational databases exercise writing SQL statement that returns maximum value, 186–187 exercise writing SQL statement that returns names of employee, 184–186

exercise writing SQL statement that returns nonapartment addresses, 188–189 overview, 177–178
SQL databases, 178–182 transactions in, 182–183 removeHead, finding/fixing bugs in, 48–50 résumé clarity and conciseness in, 271 examples, 266–268, 274–276, 282–285 financial incentives for submitting, 10 keeping it relevant, 272 keeping it short, 269 listing the right information in, 270 for managers and senior developers,
276–282
as marketing tool, 5 proofreading, 273 reversing chronological order in, 273 selling yourself, 269 submitting to companies, 11–12 tailoring to the position, 282 technical, 265–268 right node, child nodes of binary trees, 63 right rotation, balancing binary search trees, 78 rollback, of database transactions, 182 root node, of trees, 62 rounding off integers, 192 rows (tuples), relational database tables, 177
Ruby on Rails, 177 runtime analysis (Big-O). See Big-O analysis

S salary negotiating, 15–16 recruiter’s role in, 14
“What Is Your Salary History?” 259–260
“What Salary Are You Expecting?”
257–258
salt, cryptographic hash, 250 scan conversion, converting geometric drawing to pixel-based raster image, 195

298

www.it-ebooks.info

schema – spatial brainteasers

schema relational database table definitions, 177 in SQL database, 179 screening interviews, 12–13 search algorithms
BFS (breadth-first search), 66
DFS (depth-first search), 67 search engine optimization (SEO), managing online profile, 7 searches applying recursion to binary search,
111–113
binary search trees. See BSTs (binary search trees) security, Web application security, 248
SELECT statement, SQL statements, 179–
180, 182 selection sort determining best sorting algorithm,
132–134
implementing a stable version, 134–136 overview, 126–127 selling yourself, in your résumé, 269 semaphores busy waiting problem and, 151 thread synchronization and, 146–147 senior developers, résumé for, 276–282
SEO (search engine optimization), managing online profile, 7
SHA cryptographic hashes, 249 shared key (symmetric) cryptography, 250–251 sharing resources semaphores locking, 147 threads and, 145 shift operators, bitwise operators, 194 simplification, as problem-solving technique, 209–210
Simula language, in history of OOP, 159
Singleton pattern applying, 172–175 deferred initialization, 172–175

implementing, 172 overview of, 169 singly linked lists for finding mth-to-last element in, 50–52 finding/fixing bugs in, 48–50 overview of, 32–33 tracking head element of, 34–36
“Six Degrees of Kevin Bacon” game, 79–82 skill set developing marketable skills, 5–6 listing the right information in résumé, 270 reversing chronological order in résumé, 273 tailoring résumé to the position, 282
Smalltalk language, in history of OOP, 159 social networks job market and, 3 managing online profile, 7 software architecture, know your aptitudes and likes, 2 software development firms, outsourcing risk and, 4 sorting algorithms for, 125–126 determining best sorting algorithm,
132–134
implementing a stable version of selection sort algorithm, 134–136 insertion sorts, 127–128 merge sorts, 130–131 multi-key sort problem, 137–138 optimizing quicksort algorithm, 139–142 overview, 125 pancake sort problem, 142–144 quicksort algorithm, 128–130 selection sorts, 126–127 stabilizing a sort routine, 138–139 stack implementation in linked lists, 38–43 summary, 144 spatial brainteasers. See graphical/spatial brainteasers 299

www.it-ebooks.info

spinlocks – threads

spinlocks, 152
SQL (Structured Query Language) exercise writing SQL statement that returns maximum value, 186–187 exercise writing SQL statement that returns names of employee, 184–186 exercise writing SQL statement that returns nonapartment addresses, 188–189 overview, 178–182 prepared statements, 249 transactions in SQL databases, 182–183
SQL injection attacks, 248 stability implementing a stable version of selection sort algorithm, 134–136 making a sort routine stable, 138–139 of sorting algorithms, 126
Stack Overflow, managing online profile, 7 stacks linked list problems, 38–43 using with recursive algorithms, 110 standard library, sorting routine applied to, 137
Standard Template Library, C++ language, 89 states (properties), class, 159 static arrays, compared with dynamic, 86 string class, C++ language, 89
String class, Java and C# languages, 90 strings in C and C++, 89 in C#, 90 combinations of, 116–118 converting integers to, 103–105 converting to integers, 101–103 finding the first nonrepeated character, 91–94 in Java, 90 overview, 88–89 permutations of, 113–115 removing specified characters from ASCII string, 94–96 reversing order of words in, 97–101 summary, 105–106

strlcpy function, copying strings in C, 89 struct, in singly linked lists, 32

structural design patterns, 172
Structured Query Language. See SQL
(Structured Query Language) subclasses, inheritance and, 160
SUM, SQL aggregates, 181 symmetric key cryptography (shared key), 250–251 synchronized keyword, creating monitor for thread management in Java, 148–150 system threads, 146
System.array base calls, in C#, 87 systems programmer, know your aptitudes and likes, 1

T tables exercise joining two SQL tables, 184–186 in relational databases, 177 tail call elimination, 108 tail element in doubly linked lists, 34 maintaining tail pointer in linked list, 43–48 pointer to, 55 in singly linked lists, 32 tail-recursive functions, 108, 127
Tcl language, 21 technical résumé, 265–268 telephone word problem, 119–124 ternary logic, in SQL, 188–189 testing, know your aptitudes and likes, 2 thread synchronization
ATM example and, 147–150 monitors and semaphores in, 146–147 threads ATM example, 147–150 busy waiting problem, 150–152 deadlocks, 147 dining philosophers problem, 155–158

300

www.it-ebooks.info

three light switch problem – XOR operator three light switch problem

monitors and semaphores and, 146–147 overview, 145–146 producer/consumer threads, 152–155 summary, 158 system threads vs. user thread, 146 three light switch problem, brainteasers, 213–214 three-valued logic, in SQL, 188–189 tie breakers, comparator function and, 139 token scanners, reversing order of words in string, 97–99 tracing garbage collectors, 246 train tunnel problem, graphical/spatial brainteasers, 235–236 transactions, in SQL databases, 182–183 traversal of linked lists, 36 overview of, 67 preorder traversal, 70–73 tree rotation, balancing binary search trees, 78 trees BFS (breadth-first search), 66 binary search trees, 64–66 binary trees, 63 converting binary tree to heap, 75–77 determining height of, 69 determining lowest common ancestor, 73–74
DFS (depth-first search), 67 heaps, 66 overview, 61–63 preorder traversal, 70–73 reorganizing an unbalanced binary search tree, 77–79
“Six Degrees of Kevin Bacon” game, 79–82 summary, 79–82 traversal, 67 tri-color marking, garbage collection and, 246 tuples (rows), relational database tables, 177

U unary operators, 193 undirected graphs, 68
Unicode
BMP (Basic Multilingual Plane) and, 93 characters and, 88
UPDATE statement, SQL statements, 182 user interfaces, know your aptitudes and likes, 1–2 user thread, vs. system threads, 146
UTF-16, 88
UTF-8, 88
UX (user experience), know your aptitudes and likes, 1–2

V variables, sequence of. See arrays vertices, of graphs, 68 virtual methods, 164–165 visualization as approach to solving graphical/spatial brainteasers, 226 cube counting problem, 228–231 vocabulary, provided by design patterns, 168

W weak references, garbage collection and, 246
Web application security, 247–250 websites, developing personal site, 7
WHERE clause, SQL statements, 180–181 word characters, distinguishing from nonword, 97 wrapper functions, use in recursion, 109
Wrapper pattern, 172

X-Y-Z
XOR operator, 193

301

www.it-ebooks.info

www.it-ebooks.info

www.it-ebooks.info

Try Safari Books Online FREE for 15 days and take 15% off for up to 6 Months*
Gain unlimited subscription access to thousands of books and videos.
With Safari Books Online, learn without limits

annual unlimited access subscription, you get:
Go apps for iPad, iPhone and Android today’s hottest topics software projects
• Robust organizing features including favorites, highlights, tags, notes, mash-ups and more
• Rough Cuts pre-published manuscripts

START YOUR FREE TRIAL TODAY!
Visit: www.safaribooksonline.com/wrox

*Discount applies to new Safari Library subscribers only and is valid for the first 6 consecutive monthly billing cycles.
Safari Library is not available in all countries.

www.it-ebooks.info

Similar Documents

Premium Essay

Printmaking Research Paper

...Printmaking is an interesting way to create art. The process of Printmaking is done by transferring ink to a matrix which then presses the ink down onto paper or a material of choice. The first origins of printmaking date back to the 5th century. A few centuries later, printmaking made an appearance in Europe in the 15th century. When paper was imported from the east, printmaking took off. Printmaking has evolved since then. Printmaking has many different types of categories. One type of printing is Woodcut. This process is done by carving the image into a block of wood. When the carving is finished, the ink is then transferred onto the wood to get into the carving. Last, it is printed on paper. This was first seen in China in the 5th century when people carved characters and images into...

Words: 529 - Pages: 3

Premium Essay

Swoon Research Paper

...Paper is not known for its ability to survive the downpour of rain or the rough hands of constant passersby. It is this cracking and yellowing attribute that draws blossoming street artist Swoon to its aging nature. She remarks upon its ability to weather and how vital that is to her craft. Her work is resonant, its purpose to impact the nearby residents in shared, but personal experiences, and awareness of the surrounding area. Swoon is unique in her ability to charge public space with new and different types of imagery. Developing Questions: How does having a degree in art affect her standing as a street artist? Is there a difference between her type of street art and other forms of graffiti? What influences can be seen in her work? Who is her targeted audience - if she has one at all? Why did she give up traditional painting? Do galleries or exhibits hold any influence...

Words: 1462 - Pages: 6

Premium Essay

Self Evaluation Research Paper

...My Self Evaluation I am writing this paper as a self-evaluation of myself as a writer and my growth in writing as a college student. College is something many people try to tackle in their lifetime and also a fear many people never tackle during their life. At eighteen years old I was one of those people fearful to become a college student and because of that I did not attend college until I was twenty one years old. When attending my first semester of college I thought that the English class I attended that semester would be the only English class I would have to attend throughout my college experience and the only form of writing I would have to tackle. Little did I know that it was only the beginning of my journey with writing? When starting English 102 I was very nervous not only knowing that there would be an extremely long and time consuming paper involved but also the numerous comments I’ve heard about how hard the class truly is. One of those comments being that the national average drop rate for the course was a 60%. During my first night in class we were informed that our first paper would be a website evaluation. I was frightened just starting...

Words: 874 - Pages: 4

Premium Essay

Education Research Paper

...Education Research Paper Writing Education research paper is a particular type of college research paper that has to be considered by every students involved in the writing research paper process. It is often misunderstood that only students in education will be required to write this type of paper. In actual fact, every research paper should be considered an education research paper or an edification paper in which the student will have to infuse some learning into the readers. Therefore, you should decide on a topic that you know much about and which you think will call for action in the minds of your readers. You should seek for assistance in doing so from www.MasterPapers.com. If your paper is an education or edification, organization and choice of words used is what matters most. If you are writing your paper using any particular referencing style, make sure you represent all the features of that style in the paper. Keep in mind that your paper must be full of examples and illustrations and this is one of the easiest ways to educate your readers. Your language should be simple and easy for all to understand what you are teaching. In fact, you should consider your paper to be more than a good research paper to a sample research paper because others will have to make reference to your paper. Therefore, do not discard support from research and writing services like www.MasterPapers.com. An education paper should have something new to the readers. Therefore, you should...

Words: 547 - Pages: 3

Premium Essay

Research Paper About a Research Paper

...Research Paper about a Research Paper Name place Professor 05/22/11 Research Paper about a Research Paper Research is a way to formulate questions and ideas used to solve a give problem using of all sorts of sources to collect information that would generate a solution. Research in the simplest form could be presented as; my computer keeps rebooting. The research focus could involve looking threw the internet to find web help that addresses the same issue or finding a business that specialize in computer repair by doing a query for computer repair from online in your area or looking threw the phone book. In this instance, someone has prepared both sources with the intention to help find the answer from documented information (Booth, Colomb & Williams, 2008). Over centuries information and been collected in libraries all the information desired. The information age yielding the internet that contains information collected by others for others to answer questions and develop new questions, and find answers. Research papers are also used as a primary form of learning that begins in elementary school and used all threw college and beyond. Carriers have been built for the purpose of conducting research and writing research papers by teachers, scientists, writers, historians, lawyers, engineers – list is goes on. Educators have established the fact that formal research can be a tool used for learning, thinking and understanding (Booth...

Words: 1673 - Pages: 7

Premium Essay

Research Paper

...Lesson Guide The Research Process In writing a research paper, you will use the skills you have already learned, such as summary, analysis, and synthesis. You will go beyond the readings in the text, however, to add breadth and depth to your paper. Depending on your topic, you might use library research for traditional sources, online research for Internet sources, field research, or a combination of the three. Each topic chapter provides a list of Research Activities at the end. These suggestions will guide you to source material outside the textbook and provide ideas for research papers. Additionally, make use of the topic chapter links provided on this Companion Website to find more readings on each subject. What follows is a list of the steps you will take in planning and writing a paper. Remember that writing is a recursive process; you will not necessarily follow these steps in this order, and you may find yourself backtracking and looping. Find a Subject. If a subject is not assigned to you, decide what subject you are going to research and write about. Your text provides you with a wealth of ideas to start with. Use it as a springboard for discovering ideas. Develop a Research Question. Formulate an important question that you would like to answer through your research. This helps you narrow and focus your topic. The answer to the research question will become your thesis statement. Conduct Preliminary Research. To help you narrow your topic further and to find out...

Words: 917 - Pages: 4

Free Essay

Paper Research

...most students' careers when they are assigned a research paper. Such an assignment often creates a great deal of unneeded anxiety in the student, which may result in procrastination and a feeling of confusion and inadequacy. This anxiety frequently stems from the fact that many students are unfamiliar and inexperienced with this genre of writing. Never fear—inexperience and unfamiliarity are situations you can change through practice! Writing a research paper is an essential aspect of academics and should not be avoided on account of one's anxiety. In fact, the process of writing a research paper can be one of the more rewarding experiences one may encounter in academics. What is more, many students will continue to do research throughout their careers, which is one of the reasons this topic is so important. Becoming an experienced researcher and writer in any field or discipline takes a great deal of practice. There are few individuals for whom this process comes naturally. Remember, even the most seasoned academic veterans have had to learn how to write a research paper at some point in their career. Therefore, with diligence, organization, practice, a willingness to learn (and to make mistakes!), and, perhaps most important of all, patience, a student will find that she can achieve great things through her research and writing. This handout will include the following sections related to the process of writing a research paper: Genre- This section will provide an overview...

Words: 345 - Pages: 2

Premium Essay

Research Paper

...English 102— Research Paper Requirements and General Guidelines Dr. B. Bryant Office phone—671-6358 Office—Bldg. 1, room 119 E/ office 19 Research Paper due—May 2nd (Fri) 3:00 pm in my office It must contain copies of your research. 1. Your final paper needs to be 5-8 pages (not including “Works Consulted page”) in MLA format. NO PAPER UNDER 5 PAGES WILL BE ACCEPTED!!! 2. In your research folder—a folder that does not allow your research materials to fall out—you must have the following items: • Research Paper—11/25 • Rough Draft • Research proposal/outline due 4/24 for class time • COPIES OF YOUR RESEARCH! • Your paper must be sent to on safe assignment PLEASE NOTE: NO PAPER WILL BE ACCEPTED WITHOUT COPIES OF YOUR RESEACH! The paper will receive an F. 3. Research Materials—Included on your “Works Consulted” page, you must have at least 5 professional journal articles or books. You can have more; the research really depends on your topic. Also the research papers I gave you count as a source and Loot. 4. The journal articles can come from the internet, but make sure the article is a professional article with a thesis/research, not a general informational page. All internet articles must be cited as an internet source. You can use the museum websites and YouTube. 5. For books and articles in books, you must copy the title page, copyright page, table of contents and the entire...

Words: 628 - Pages: 3

Free Essay

Research Paper

...Research paper may refer to: * Academic paper (also called scholarly paper), which is published in academic journals and contains original research results or reviews existing results * Term paper, written by high school or college students * Thesis or dissertation, a document submitted in support of a candidature for a degree or professional qualification, presenting the author's research and findings A thesis or dissertation[1] is a document submitted in support of candidature for anacademic degree or professional qualification presenting the author's research and findings.[2] In some contexts, the word "thesis" or a cognate is used for part of abachelor's or master's course, while "dissertation" is normally applied to a doctorate, while in others, the reverse is true.[3] Dissertations and theses may be considered asgrey literature. The word dissertation can at times be used to describe a treatise without relation to obtaining an academic degree. The term thesis is also used to refer to the general claim of an essay or similar work. ------------------------------------------------- Etymology[edit] The term "thesis" comes from the Greek θέσις, meaning "something put forth", and refers to an intellectual proposition. "Dissertation" comes from the Latin dissertātiō, meaning "path". ------------------------------------------------- Structure and presentation style[edit] Structure[edit] A thesis (or dissertation) may be arranged as a thesis by publication or...

Words: 1243 - Pages: 5

Premium Essay

Research Paper

...Organizing a Research Paper Introduction A research paper is a combination and ultimate result of an involved procedure that entails source evaluation, critical thinking, planning and composition. No matter its objectives, any research paper must attain some common goals. As such, organizing a research paper requires a systematic approach that will enable the researcher to accomplish the intended objectives of the research. Apart from addressing the needs of the assignment, a research paper should have a clear purpose, thesis and discussing the quantity as well as quality of sources. In order to gain experience in research writing, an individual must be familiar with the whole process involved in organizing a research paper. There are two types of research paper namely; * Argumentative research * Analytical research Although each type has its own specified format, they bear seven similarities when it comes to their organization; a. Collect printed sources and evaluate them Assemble materials such as scholarly articles, state documents and other useful sources with regard to the research question. Skim through them to get hint on their importance. One can also evaluate online materials since most of them have useful although random information. b. Choose a method for keeping notes You should keep notes on different index cards and ensure to indicate the title or author as this will enable you to recheck the information obtained from the source material. c. Use...

Words: 378 - Pages: 2

Premium Essay

English 1010 Research Paper

...English 1010 has been a very interesting journey for me. Throughout my journey, I experienced frustration, stress, and long nights in the computer lab. English 1010 have not only made me a better writer, but it has also improved my creativity in my writing. My writing has improved tremendously since the first day of class. I am satisfied with the grade I earned although; I feel I could have done a lot better on to receive a higher grade. I believe my grade should be a B. According to the English 1010 syllabus I feel that my grade should be a B because I improved since my first paper, I participate in class conversations, and I have decent attendance. At the very beginning of the English 1010 Course, my writing style wasn’t too good. I noticed...

Words: 596 - Pages: 3

Premium Essay

Wd-40 Research Paper

...Due to WD-40’s Duct Tape’s and Super Glue’s versatility, it seems that almost anything can be fix with, at least one, or any combination of the three. If it doesn’t move and it should WD-40 can be the solution. For instance, in my room, there are three doors, one to enter my room, one to the bathroom, one to the closet. The door to my bathroom was difficult to swing open and shut and the hinges would squeak terribly. I observed that the hinges were rusty and stiff. The squeaking continually got on my nerves until I discovered the amazing properties of WD-40. WD-40 is a lubricant that can be sprayed on metal surfaces to increase mobility and loosen rust. I sprayed the WD-40 on the hinges and let it soak in and the door began to swing freely...

Words: 446 - Pages: 2

Free Essay

Research Paper

...PREFERENCES OF FACULTY MEMBERS OF CAVITE STATE UNIVERSITY-SILANG CAMPUS IN CHOOSING TOURISTS DESTINATION Undergraduate Research Submitted to the Faculty of the Department of Management of Cavite State University-Silang Campus Silang, Cavite In partial fulfillment of the requirements for the degree of Bachelor of Science in Tourism and Resort Management UNIVERSITY MISSION “Cavite State University shall provide excellent, equitable and relevant educational opportunities in the arts, science and technology through quality instruction and responsive research and development activities. It shall produce professional, skilled and morally upright individuals for global competitiveness.” UNIVERSITY MISSION “Cavite State University shall provide excellent, equitable and relevant educational opportunities in the arts, science and technology through quality instruction and responsive research and development activities. It shall produce professional, skilled and morally upright individuals for global competitiveness.” Republic of the Philippines CAVITE STATE UNIVERSITY (CvSU) Silang Campus Silang, Cavite Republic of the Philippines CAVITE STATE UNIVERSITY (CvSU) Silang Campus Silang, Cavite UNIVERSITY VISION The premier University in historic Cavite recognized for excellence in the development of globally competitive and morally upright individuals UNIVERSITY VISION The premier University in historic Cavite recognized for excellence in the development...

Words: 1897 - Pages: 8

Premium Essay

Jacob Lupkin Research Paper

...Hello my name is Jacob Lumpkin. I am 19 years old and am currently in my first semester of college. I am majoring in business and after I finish my associates degree at OCCC I want to go to OU and get a bachelors in economics. My favorite subject in school growing up was history because I love learning about how the past has affect the present day. My favorite thing to do is playing or watching basketball. I played basketball for 3 years when I was in high school and enjoyed every minute of it. I also played baseball and hockey when I was younger and still enjoy watching games. I have also moved around quite a bit in my life. I’m originally from Oklahoma but moved several times growing up because my dad’s job. I moved back to Oklahoma when I was 10 and have been here ever since. I think this course will really help me improve my writing skills and teach me things that are crucial to success in life after college. I believe this course will help me learn to consistently meet deadlines and become a better writer overall. I think it’s important to be able to write well because it’s a really great way to communicate with other people and is another way to express someone’s thoughts. I am really looking forward to participating and being involved in this class as well as being challenged to become a better writer and getting to meet new people along the way. ...

Words: 255 - Pages: 2

Premium Essay

Ap Biology Research Paper

...over-thinking things. I’m not a linear thinker, I prefer to think in an abstract form. I like to touch, see, and move when I’m learning new concepts in class. (To see subject material only in text sometimes confuses and overwhelms me (unless it is written very clearly.)) 6. What is the most effective way for you to prepare for a test? Flashcards are my favorite manner of preparation. I prefer also looking back at my notes whenever possible. Study guides are extremely helpful, but I have the feeling that the AP exam won't have one. 7. At this time, what do you plan on majoring in when you get to college? At this point in time, I’m planning to explore the medical field and specialize as a nutritionist or dermatologist. Particularly, I want to research ways of people getting an adequate nutrition when they have a very limited diet (whether it would be because of allergies or intolerances). I have issues with eczema and allergies myself; therefore, I feel like I could connect with people in a similar circumstance as my own. ...

Words: 396 - Pages: 2