Introduction:

How to take input? ♂
I have started to practice coding problems (hackerearth.com) in to increase my problem-solving skill.
As I saw, most of the coding problems are asked for taking input and then output the correct answer based on entered input.
Eg : Input-
The first line consists of two integers N and
K, N being the number of elements in the array and K denotes the
number of steps of rotation.
The next line consists of N space
separated integers , denoting the elements of the array A.
Till now, I know -
But I don't know how to take an array of size N.
Please help me how to take array of size N. Then It will help me to code further. Else I will just stuck on taking input.
Please help me any PHP pro coder.
The problem on which I am still stuck is given below -
Coding challenge -
Monk and Rotation
Monk loves to preform different operations on arrays, and so being the principal of Hackerearth School, he assigned a task to his new student Mishki. Mishki will be provided with an integer array A of size N and an integer K , where she needs to rotate the array in the right direction by K steps and then print the resultant array. As she is new to the school, please help her to complete the task.
Problem can be found here.
What I have tried till know to solve this problem-
Problem Setter ♂
HackerEarth provides enterprise software solutions that help organizations in their innovation management and talent assessment endeavors.
HackerEarth Recruit is a talent assessment platform that helps in efficient technical talent screening allowing organizations to build strong, proficient teams.
Related questions
Companies across various industries hire ethical hackers to enhance cybersecurity, protect data, and comply with regulations. Below is a categorized list of sectors and notable examples:
1. Cybersecurity Firms
- Palo Alto Networks: Offers advanced firewall and cloud security solutions.
- CrowdStrike: Specializes in endpoint protection and threat intelligence.
- Mandiant (Google Cloud): Focuses on incident response and threat detection.
- HackerOne & Bugcrowd: Platforms connecting companies with ethical hackers via bug bounty programs.
- Check Point, Fortinet, Rapid7: Provide network security and vulnerability management services.
2. Tech Giants
- Microsoft: Runs the "BlueHat" security initiative and employs red teams.
- Google (including Mandiant): Invests in Project Zero for zero-day vulnerability research.
- Amazon (AWS): Secures cloud infrastructure and offers security certifications.
- IBM, Cisco, Intel: Maintain dedicated cybersecurity divisions (e.g., IBM Security, Cisco Talos).
3. Financial Institutions
- JPMorgan Chase, Bank of America: Protect financial systems and customer data.
- Visa, Mastercard, PayPal: Secure transaction processing and fraud prevention.
4. Consulting & Professional Services
- Deloitte, PwC, KPMG, EY: Offer cybersecurity audits and penetration testing.
- Accenture, Booz Allen Hamilton: Provide government and private-sector security consulting.
5. Government & Defense
- NSA, CIA, FBI (US): National security roles requiring clearances.
- GCHQ (UK), BSI (Germany): National cybersecurity agencies.
- Lockheed Martin, Raytheon: Defense contractors with cyber warfare divisions.
6. Healthcare
- UnitedHealth Group, Anthem: Protect patient data and comply with HIPAA.
- Medical device manufacturers: Secure IoT devices and hospital networks.
7. E-commerce & Retail
- Amazon, Shopify: Guard against payment fraud and data breaches.
- Walmart, Target: Invest in cybersecurity post-high-profile breaches.
8. Telecommunications
- AT&T, Verizon: Secure network infrastructure and customer data.
- Ericsson, Nokia: Protect 5G and IoT technologies.
9. Automotive
- Tesla, Ford: Secure connected vehicles and autonomous driving systems.
- Bosch, Continental: Protect automotive software and supply chains.
10. Gaming & Entertainment
- Sony (PlayStation), Microsoft (Xbox): Defend against DDoS attacks and cheating.
- Electronic Arts, Ubisoft: Protect user accounts and game integrity.
11. Social Media & Tech
- Meta (Facebook), Twitter: Combat account takeovers and misinformation.
- LinkedIn, TikTok: Secure user data and content platforms.
12. Cloud Providers
- AWS, Google Cloud, Microsoft Azure: Hire ethical hackers to secure global cloud infrastructure.
13. Critical Infrastructure
- ExxonMobil, Duke Energy: Protect energy grids and industrial control systems.
- Boeing, Siemens: Secure manufacturing and IoT systems.
14. Education & Certifications
- EC-Council, Offensive Security: Develop certifications (CEH, OSCP) and training programs.
- SANS Institute: Offers cybersecurity training and research.
15. Startups & Bug Bounty Platforms
- Synack, Cobalt: Crowdsourced security testing platforms.
- Zscaler, CrowdStrike (early-stage): Fast-growing cybersecurity firms.
Key Roles & Pathways:
- Job Titles: Penetration Tester, Security Engineer, Red Team Specialist, Vulnerability Researcher.
- Certifications: CEH, OSCP, CISSP, CompTIA Security+.
- Entry Points: Bug bounty programs (e.g., HackerOne), internships, or cybersecurity competitions.
Ethical hackers are in demand globally, with opportunities ranging from full-time roles to freelance engagements. Companies often seek professionals with hands-on experience, certifications, and a proactive approach to discovering vulnerabilities.
php hiring challenge question in hacker earth
0x03. The setValue() method in AbstractInputCheckedMapDecorator
hacker earth common hiring questions(Full stack questions)
Git leak && AWS AKSK && AWS Lambda cli && Function Information Leakage && JWT secret leak
3. Multi-party Security Computation - MPC (Secure Multi-Party Computation)

评论已关闭