SlideShare a Scribd company logo
Entrance Exam Guidelines
                     Department of Mathematics
                      Chulalongkorn University
SUBJECT: Computer
Year: 2010
General description:
• Expressing computer algorithms: using natural language (English),
  pseudocode, flowcharts and programming languages
• Implementation: Recursions or iterations
• Design paradigm: Brute-force or exhaustive search, divide and conquer,
  dynamic programming, the greedy method, linear programming, reduction,
  search and enumeration, probabilitistic and heuristic paradigm.
• Basic well-known algorithms:Insertion sort, Selection sort, Bubble sort, Heap
  sort, Merge sort, Quick sort, Radix sort, Euclid algorithm, Binary search, Naive
  string matching

Reference Materials:
1. Aho, A.V., Hopcroft, J.E., and Ullman, J.D., The Design and Analysis of Computer
   Algorithms, Addison-Wesley, 1974.
2. Brassard, G. and Bratley P., Fundamentals of Algorithmics, Prentice-Hall, 1996.
3. Even, S., Graph Algorithms, Computer Science Press, 1979.
4. Heileman, G. L., Data structures, algorithms, and object-oriented programming, McGraw-
   Hill Companies, 1996.
5. Horowitz, E. and Sahni, S., Fundamentals of Computer Algorithms, Computer Science
   Press, 1978.
6. Manber, U., Introduction to Algorithms: A Creative Approach, Addison-Wesley, 1989.

More Related Content

Similar to ScopeComputer_topics-Admission54

Course Syllabus
Course SyllabusCourse Syllabus
Course Syllabus
butest
 
1st sem
1st sem1st sem
1st sem
nastysuman009
 
1st sem
1st sem1st sem
1st sem
nastysuman009
 
Resume_Hui_Zhang_Rice_University
Resume_Hui_Zhang_Rice_UniversityResume_Hui_Zhang_Rice_University
Resume_Hui_Zhang_Rice_University
Hui Zhang
 
402_DheerajKura
402_DheerajKura402_DheerajKura
402_DheerajKura
Dheeraj Kura
 
438_AmeeruddinMohammed
438_AmeeruddinMohammed438_AmeeruddinMohammed
438_AmeeruddinMohammed
Ameeruddin MD
 
671_JeevanRavula_CEE
671_JeevanRavula_CEE671_JeevanRavula_CEE
671_JeevanRavula_CEE
Jeevan Reddy R
 

Similar to ScopeComputer_topics-Admission54 (7)

Course Syllabus
Course SyllabusCourse Syllabus
Course Syllabus
 
1st sem
1st sem1st sem
1st sem
 
1st sem
1st sem1st sem
1st sem
 
Resume_Hui_Zhang_Rice_University
Resume_Hui_Zhang_Rice_UniversityResume_Hui_Zhang_Rice_University
Resume_Hui_Zhang_Rice_University
 
402_DheerajKura
402_DheerajKura402_DheerajKura
402_DheerajKura
 
438_AmeeruddinMohammed
438_AmeeruddinMohammed438_AmeeruddinMohammed
438_AmeeruddinMohammed
 
671_JeevanRavula_CEE
671_JeevanRavula_CEE671_JeevanRavula_CEE
671_JeevanRavula_CEE
 

More from พระทรงพล กิตติปัญโญ

ปัญหา แคลคูลัส
ปัญหา แคลคูลัสปัญหา แคลคูลัส
ปัญหา แคลคูลัส
พระทรงพล กิตติปัญโญ
 
ScopeMathe. Analysis-Admission54
ScopeMathe. Analysis-Admission54ScopeMathe. Analysis-Admission54
ScopeAppliedAnalysis-1-53
ScopeAppliedAnalysis-1-53ScopeAppliedAnalysis-1-53
ScopeAppliedLinearAlgebra-1-53
ScopeAppliedLinearAlgebra-1-53ScopeAppliedLinearAlgebra-1-53
Img 0002
Img 0002Img 0002

More from พระทรงพล กิตติปัญโญ (18)

ปัญหา แคลคูลัส
ปัญหา แคลคูลัสปัญหา แคลคูลัส
ปัญหา แคลคูลัส
 
ScopeMathe. Analysis-Admission54
ScopeMathe. Analysis-Admission54ScopeMathe. Analysis-Admission54
ScopeMathe. Analysis-Admission54
 
ScopeAppliedAnalysis-1-53
ScopeAppliedAnalysis-1-53ScopeAppliedAnalysis-1-53
ScopeAppliedAnalysis-1-53
 
ScopeAppliedLinearAlgebra-1-53
ScopeAppliedLinearAlgebra-1-53ScopeAppliedLinearAlgebra-1-53
ScopeAppliedLinearAlgebra-1-53
 
qualification_criteria
qualification_criteriaqualification_criteria
qualification_criteria
 
PhD_Macs_2_53
PhD_Macs_2_53PhD_Macs_2_53
PhD_Macs_2_53
 
E R P8 Future
E R P8 FutureE R P8 Future
E R P8 Future
 
E R P7 How
E R P7 HowE R P7 How
E R P7 How
 
E R P6 Success
E R P6 SuccessE R P6 Success
E R P6 Success
 
E R P5 Using
E R P5 UsingE R P5 Using
E R P5 Using
 
E R P4 Manager
E R P4 ManagerE R P4 Manager
E R P4 Manager
 
E R P3 Present
E R P3 PresentE R P3 Present
E R P3 Present
 
E R P2 Meaning
E R P2 MeaningE R P2 Meaning
E R P2 Meaning
 
E R P1 History
E R P1 HistoryE R P1 History
E R P1 History
 
Img 0001
Img 0001Img 0001
Img 0001
 
Img 0002
Img 0002Img 0002
Img 0002
 
One Pointed Mind
One Pointed MindOne Pointed Mind
One Pointed Mind
 
22 54
22    5422    54
22 54
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

ScopeComputer_topics-Admission54

  • 1. Entrance Exam Guidelines Department of Mathematics Chulalongkorn University SUBJECT: Computer Year: 2010 General description: • Expressing computer algorithms: using natural language (English), pseudocode, flowcharts and programming languages • Implementation: Recursions or iterations • Design paradigm: Brute-force or exhaustive search, divide and conquer, dynamic programming, the greedy method, linear programming, reduction, search and enumeration, probabilitistic and heuristic paradigm. • Basic well-known algorithms:Insertion sort, Selection sort, Bubble sort, Heap sort, Merge sort, Quick sort, Radix sort, Euclid algorithm, Binary search, Naive string matching Reference Materials: 1. Aho, A.V., Hopcroft, J.E., and Ullman, J.D., The Design and Analysis of Computer Algorithms, Addison-Wesley, 1974. 2. Brassard, G. and Bratley P., Fundamentals of Algorithmics, Prentice-Hall, 1996. 3. Even, S., Graph Algorithms, Computer Science Press, 1979. 4. Heileman, G. L., Data structures, algorithms, and object-oriented programming, McGraw- Hill Companies, 1996. 5. Horowitz, E. and Sahni, S., Fundamentals of Computer Algorithms, Computer Science Press, 1978. 6. Manber, U., Introduction to Algorithms: A Creative Approach, Addison-Wesley, 1989.