Better Passwords Byang is creating an account on Toph. He needs your help to create a strong password. Byang will giv... |
Burrows and Scofield Michael Scofield and Lincoln Burrows are working on a secret mission. Michael is needed to give a se... |
Butcher of Vowels ...if I'm to choose between one evil and another, then I prefer not to choose at all. -- Geralt (Th... |
Can You Help? Hey, hello! Yes, I am talking to you, whoever is reading this problem statement. I know you are Robi... |
Convert String Into Palindrome A palindrome is a word, number, phrase, or other sequence of characters which reads the same backwar... |
Distinctness A substring of string S is another string S' which occurs in string S. For example: S = aaba and one... |
Eet Izz Phet! A long long time ago, I left the country that was my home and with my head full of brains and shoes ...
smilitude, wasiahmed, sahedsohel
BinarySearch, Hashing, Implementation, Sorting, String
Very Easy
220/267/936 |
Facebook Reacts There are seven types of "React" for Facebook posts. These are Like Love Care Haha Wow Sad Angry ... |
Formatted Numbers Read an integer variable and print it in which the digits are separated into groups of three by comm... |
Freezed Standings Team Depuradores and Team Resolvers represented their university in the ICPC world finals 2021. Depu... |
Game of Palindromes In a popular computer game, Game of Palindromes also known as GOP there is a city called Palindesh. ... |
Genius Needs Help You all know Emrul bhai, right? He is a genius guy. He knows how to add two integer numbers and so d... |
#Hashtag Giving Hashtag in Social Network is very popular now a day. But Poltu is very new in Social Network.... |
Is Anagram An anagram is a word formed by rearranging the letters of another word. The words "listen" and "sile... |
Is Palindrome Given a word, print Yes if it is a palindrome, otherwise No. A palindrome is a word which reads the ... |
Konami Code The Konami code is a sequence of key/button presses that is implemented in many video games to unloc... |
K-String We will call a string K-String if it consists of K distinct characters. For example, if K is 3 then ... |
Learning New Algorithms Every Day Shak is a new programmer and he knows nothing about algorithms. He has made a plan and decided to le... |
Let’s Build Nepal In our country, there are many political leaders belonging to different political parties. They alwa... |
Life of Decimals Given any circle, if you divide the circumference of that circle with its diameter, you would always... |
Living on a Prayer Tommy is an unlucky guy who used to work on the docks. He and his wife Gina are not financially stab... |
Locality-Sensitive Hashing I According to Wikipedia, Locality-Sensitive hashing (LSH) is an algorithmic technique that hashes sim... |
Love Letter Mr. A has finally found the love of his life. Being a love expert Mr. P has given Mr. A an idea to w... |
Match the Substring String Matching is an important problem in computer science research and finds applications in data ... |
New Recruitment Mr. Azad applied for a job. During his interview, the interviewer gave him the following task to sol... |