青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品

posts - 297,  comments - 15,  trackbacks - 0
1. Given a rectangular (cuboidal for the puritans) cake with a rectangular piece removed (any size or orientation), how would you cut the remainder of the cake into two equal halves with one straight cut of a knife ?
2. You're given an array containing both positive and negative integers and required to find the sub-array with the largest sum (O(N) a la KBL). Write a routine in C for the above.
3. Given an array of size N in which every number is between 1 and N, determine if there are any duplicates in it. You are allowed to destroy the array if you like. [ I ended up giving about 4 or 5 different solutions for this, each supposedly better than the others ].
4. Write a routine to draw a circle (x ** 2 + y ** 2 = r ** 2) without making use of any floating point computations at all. [ This one had me stuck for quite some time and I first gave a solution that did have floating point computations ].
5. Given only putchar (no sprintf, itoa, etc.) write a routine putlong that prints out an unsigned long in decimal. [ I gave the obvious solution of taking % 10 and / 10, which gives us the decimal value in reverse order. This requires an array since we need to print it out in the correct order. The interviewer wasn't too pleased and asked me to give a solution which didn't need the array ].
6. Give a one-line C expression to test whether a number is a power of 2. [No loops allowed - it's a simple test.]
7. Given an array of characters which form a sentence of words, give an efficient algorithm to reverse the order of the words (not characters) in it.
(abc)'=a'b'c'
8. How many points are there on the globe where by walking one mile south, one mile east and one mile north you reach the place where you started.
9. Give a very good method to count the number of ones in a "n" (e.g. 32) bit number.
ANS. Given below are simple solutions, find a solution that does it in log (n) steps.

Iterativefunction iterativecount (unsigned int n)beginint count=0;while (n)begincount += n & 0x1 ;n >>= 1;endreturn count;endSparse Countfunction sparsecount (unsigned int n)beginint count=0;while (n)begincount++;n &= (n-1);endreturn count ;end
10. What are the different ways to implement a condition where the value of x can be either a 0 or a 1. Apparently the if then else solution has a jump when written out in assembly. if (x == 0) y=a else y=b There is a logical, arithmetic and a data structure solution to the above problem.
11. Reverse a linked list.
12. Insert in a sorted list
13. In a X's and 0's game (i.e. TIC TAC TOE) if you write a program for this give a fast way to generate the moves by the computer. I mean this should be the fastest way possible.
The answer is that you need to store all possible configurations of the board and the move that is associated with that. Then it boils down to just accessing the right element and getting the corresponding move for it. Do some analysis and do some more optimization in storage since otherwise it becomes infeasible to get the required storage in a DOS machine.
14. I was given two lines of assembly code which found the absolute value of a number stored in two's complement form. I had to recognize what the code was doing. Pretty simple if you know some assembly and some fundaes on number representation.
15. Give a fast way to multiply a number by 7.
16. How would go about finding out where to find a book in a library. (You don't know how exactly the books are organized beforehand).
17. Linked list manipulation.
18. Tradeoff between time spent in testing a product and getting into the market first.
19. What to test for given that there isn't enough time to test everything you want to.
20. First some definitions for this problem: a) An ASCII character is one byte long and the most significant bit in the byte is always '0'. b) A Kanji character is two bytes long. The only characteristic of a Kanji character is that in its first byte the most significant bit is '1'.
Now you are given an array of a characters (both ASCII and Kanji) and, an index into the array. The index points to the start of some character. Now you need to write a function to do a backspace (i.e. delete the character before the given index).
21. Delete an element from a doubly linked list.
22. Write a function to find the depth of a binary tree.
23. Given two strings S1 and S2. Delete from S2 all those characters which occur in S1 also and finally create a clean S2 with the relevant characters deleted.
24. Assuming that locks are the only reason due to which deadlocks can occur in a system. What would be a foolproof method of avoiding deadlocks in the system.
25. Reverse a linked list.
Ans: Possible answers -
iterative loop
curr->next = prev;
prev = curr;
curr = next;
next = curr->next
endloop
recursive reverse(ptr)
if (ptr->next == NULL)
return ptr;
temp = reverse(ptr->next);
temp->next = ptr;
return ptr;
end

26. Write a small lexical analyzer - interviewer gave tokens. expressions like "a*b" etc.
27. Besides communication cost, what is the other source of inefficiency in RPC? (answer : context switches, excessive buffer copying). How can you optimize the communication? (ans : communicate through shared memory on same machine, bypassing the kernel _ A Univ. of Wash. thesis)
28. Write a routine that prints out a 2-D array in spiral order!
29. How is the readers-writers problem solved? - using semaphores/ada .. etc.
30. Ways of optimizing symbol table storage in compilers.
31. A walk-through through the symbol table functions, lookup() implementation etc. - The interviewer was on the Microsoft C team.
32. A version of the "There are three persons X Y Z, one of which always lies".. etc..
33. There are 3 ants at 3 corners of a triangle, they randomly start moving towards another corner.. what is the probability that they don't collide.
34. Write an efficient algorithm and C code to shuffle a pack of cards.. this one was a feedback process until we came up with one with no extra storage.
35. The if (x == 0) y = 0 etc..
36. Some more bitwise optimization at assembly level
37. Some general questions on Lex, Yacc etc.
38. Given an array t[100] which contains numbers between 1..99. Return the duplicated value. Try both O(n) and O(n-square).
39. Given an array of characters. How would you reverse it. ? How would you reverse it without using indexing in the array.
40. Given a sequence of characters. How will you convert the lower case characters to upper case characters. ( Try using bit vector - solutions given in the C lib -typec.h)
41. Fundamentals of RPC.
42. Given a linked list which is sorted. How will u insert in sorted way.
43. Given a linked list How will you reverse it.
44. Give a good data structure for having n queues ( n not fixed) in a finite memory segment. You can have some data-structure separate for each queue. Try to use at least 90% of the memory space.
45. Do a breadth first traversal of a tree.
46. Write code for reversing a linked list.
47. Write, efficient code for extracting unique elements from a sorted list of array. e.g. (1, 1, 3, 3, 3, 5, 5, 5, 9, 9, 9, 9) -> (1, 3, 5, 9).
48. Given an array of integers, find the contiguous sub-array with the largest sum.
ANS. Can be done in O(n) time and O(1) extra space. Scan array from 1 to n. Remember the best sub-array seen so far and the best sub-array ending in i.
49. Given an array of length N containing integers between 1 and N, determine if it contains any duplicates.
ANS. [Is there an O(n) time solution that uses only O(1) extra space and does not destroy the original array?]
50. Sort an array of size n containing integers between 1 and K, given a temporary scratch integer array of size K.
ANS. Compute cumulative counts of integers in the auxiliary array. Now scan the original array, rotating cycles! [Can someone word this more nicely?]
* 51. An array of size k contains integers between 1 and n. You are given an additional scratch array of size n. Compress the original array by removing duplicates in it. What if k << n?
ANS. Can be done in O(k) time i.e. without initializing the auxiliary array!
52. An array of integers. The sum of the array is known not to overflow an integer. Compute the sum. What if we know that integers are in 2's complement form?
ANS. If numbers are in 2's complement, an ordinary looking loop like for(i=total=0;i< n;total+=array[i++]); will do. No need to check for overflows!
53. An array of characters. Reverse the order of words in it.
ANS. Write a routine to reverse a character array. Now call it for the given array and for each word in it.
* 54. An array of integers of size n. Generate a random permutation of the array, given a function rand_n() that returns an integer between 1 and n, both inclusive, with equal probability. What is the expected time of your algorithm?
ANS. "Expected time" should ring a bell. To compute a random permutation, use the standard algorithm of scanning array from n downto 1, swapping i-th element with a uniformly random element <= i-th. To compute a uniformly random integer between 1 and k (k < n), call rand_n() repeatedly until it returns a value in the desired range.
55. An array of pointers to (very long) strings. Find pointers to the (lexicographically) smallest and largest strings.
ANS. Scan array in pairs. Remember largest-so-far and smallest-so-far. Compare the larger of the two strings in the current pair with largest-so-far to update it. And the smaller of the current pair with the smallest-so-far to update it. For a total of <= 3n/2 strcmp() calls. That's also the lower bound.
56. Write a program to remove duplicates from a sorted array.
ANS. int remove_duplicates(int * p, int size)
{
int current, insert = 1;
for (current=1; current < size; current++)
if (p[current] != p[insert-1])
{
p[insert] = p[current];
current++;
insert++;
} else
current++;
return insert;
}
57. C++ ( what is virtual function ? what happens if an error occurs in constructor or destructor. Discussion on error handling, templates, unique features of C++. What is different in C++, ( compare with unix).
58. Given a list of numbers ( fixed list) Now given any other list, how can you efficiently find out if there is any element in the second list that is an element of the first list (fixed list).
59. Given 3 lines of assembly code : find it is doing. IT was to find absolute value.
60. If you are on a boat and you throw out a suitcase, Will the level of water increase.
61. Print an integer using only putchar. Try doing it without using extra storage.
62. Write C code for (a) deleting an element from a linked list (b) traversing a linked list
63. What are various problems unique to distributed databases
64. Declare a void pointer ANS. void *ptr;
65. Make the pointer aligned to a 4 byte boundary in a efficient manner ANS. Assign the pointer to a long number and the number with 11...1100 add 4 to the number
66. What is a far pointer (in DOS)
67. What is a balanced tree
68. Given a linked list with the following property node2 is left child of node1, if node2 < node1 else, it is the right child.
 O P||O A||O B||O C
How do you convert the above linked list to the form without disturbing the property. Write C code for that.
   O P||O B/ \/   \/     \O ?     O ?
determine where do A and C go
69. Describe the file system layout in the UNIX OS
ANS. describe boot block, super block, inodes and data layout
70. In UNIX, are the files allocated contiguous blocks of data
ANS. no, they might be fragmented
How is the fragmented data kept track of
ANS. Describe the direct blocks and indirect blocks in UNIX file system
71. Write an efficient C code for 'tr' program. 'tr' has two command line arguments. They both are strings of same length. tr reads an input file, replaces each character in the first string with the corresponding character in the second string. eg. 'tr abc xyz' replaces all 'a's by 'x's, 'b's by 'y's and so on. ANS.
a) have an array of length 26.
put 'x' in array element corr to 'a'
put 'y' in array element corr to 'b'
put 'z' in array element corr to 'c'
put 'd' in array element corr to 'd'
put 'e' in array element corr to 'e'
and so on.
the code
while (!eof)
{
c = getc();
putc(array[c - 'a']);
}
72. what is disk interleaving
73. why is disk interleaving adopted
74. given a new disk, how do you determine which interleaving is the best a) give 1000 read operations with each kind of interleaving determine the best interleaving from the statistics
75. draw the graph with performance on one axis and 'n' on another, where 'n' in the 'n' in n-way disk interleaving. (a tricky question, should be answered carefully)
76. I was a c++ code and was asked to find out the bug in that. The bug was that he declared an object locally in a function and tried to return the pointer to that object. Since the object is local to the function, it no more exists after returning from the function. The pointer, therefore, is invalid outside.
77. A real life problem - A square picture is cut into 16 squares and they are shuffled. Write a program to rearrange the 16 squares to get the original big square.
78.
int *a;
char *c;
*(a) = 20;
*c = *a;
printf("%c",*c);
what is the output?
79. Write a program to find whether a given m/c is big-endian or little-endian!
80. What is a volatile variable?
81. What is the scope of a static function in C ?
82. What is the difference between "malloc" and "calloc"?
83. struct n { int data; struct n* next}node;
node *c,*t;
c->data = 10;
t->next = null;
*c = *t;
what is the effect of the last statement?
84. If you're familiar with the ? operator x ? y : z
you want to implement that in a function: int cond(int x, int y, int z); using only ~, !, ^, &, +, |, <<, >> no if statements, or loops or anything else, just those operators, and the function should correctly return y or z based on the value of x. You may use constants, but only 8 bit constants. You can cast all you want. You're not supposed to use extra variables, but in the end, it won't really matter, using vars just makes things cleaner. You should be able to reduce your solution to a single line in the end though that requires no extra vars.
85. You have an abstract computer, so just forget everything you know about computers, this one only does what I'm about to tell you it does. You can use as many variables as you need, there are no negative numbers, all numbers are integers. You do not know the size of the integers, they could be infinitely large, so you can't count on truncating at any point. There are NO comparisons allowed, no if statements or anything like that. There are only four operations you can do on a variable.
1) You can set a variable to 0.
2) You can set a variable = another variable.
3) You can increment a variable (only by 1), and it's a post increment.
4) You can loop. So, if you were to say loop(v1) and v1 = 10, your loop would execute 10 times, but the value in v1 wouldn't change so the first line in the loop can change value of v1 without changing the number of times you loop.
You need to do 3 things.
1) Write a function that decrements by 1.
2) Write a function that subtracts one variable from another.
3) Write a function that divides one variable by another.
4) See if you can implement all 3 using at most 4 variables. Meaning, you're not making function calls now, you're making macros. And at most you can have 4 variables. The restriction really only applies to divide, the other 2 are easy to do with 4 vars or less. Division on the other hand is dependent on the other 2 functions, so, if subtract requires 3 variables, then divide only has 1 variable left unchanged after a call to subtract. Basically, just make your function calls to decrement and subtract so you pass your vars in by reference, and you can't declare any new variables in a function, what you pass in is all it gets.
* 86. Under what circumstances can one delete an element from a singly linked list in constant time?
ANS. If the list is circular and there are no references to the nodes in the list from anywhere else! Just copy the contents of the next node and delete the next node. If the list is not circular, we can delete any but the last node using this idea. In that case, mark the last node as dummy!
* 87. Given a singly linked list, determine whether it contains a loop or not.
ANS. (a) Start reversing the list. If you reach the head, gotcha! there is a loop!
But this changes the list. So, reverse the list again.
(b) Maintain two pointers, initially pointing to the head. Advance one of them one node at a time. And the other one, two nodes at a time. If the latter overtakes the former at any time, there is a loop!
          p1 = p2 = head;do {p1 = p1->next;p2 = p2->next->next;} while (p1 != p2);
88. Given a singly linked list, print out its contents in reverse order. Can you do it without using any extra space?
ANS. Start reversing the list. Do this again, printing the contents.
89. Given a binary tree with nodes, print out the values in pre-order/in-order/post-order without using any extra space.
90. Reverse a singly linked list recursively. The function prototype is node * reverse (node *) ;
ANS.
    node * reverse (node * n){node * m ;if (! (n && n -> next))return n ;m = reverse (n -> next) ;n -> next -> next = n ;n -> next = NULL ;return m ;}
91. Given a singly linked list, find the middle of the list.
HINT. Use the single and double pointer jumping. Maintain two pointers, initially pointing to the head. Advance one of them one node at a time. And the other one, two nodes at a time. When the double reaches the end, the single is in the middle. This is not asymptotically faster but seems to take less steps than going through the list twice.
92. Reverse the bits of an unsigned integer.
ANS.
    #define reverse(x)                              \(x=x>>16|(0x0000ffff&x)<<16,            \x=(0xff00ff00&x)>>8|(0x00ff00ff&x)<<8, \x=(0xf0f0f0f0&x)>>4|(0x0f0f0f0f&x)<<4, \x=(0xcccccccc&x)>>2|(0x33333333&x)<<2, \x=(0xaaaaaaaa&x)>>1|(0x55555555&x)<<1)
* 93. Compute the number of ones in an unsigned integer.
ANS.
   #define count_ones(x)                        \(x=(0xaaaaaaaa&x)>>1+(0x55555555&x), \x=(0xcccccccc&x)>>2+(0x33333333&x), \x=(0xf0f0f0f0&x)>>4+(0x0f0f0f0f&x), \x=(0xff00ff00&x)>>8+(0x00ff00ff&x), \x=x>>16+(0x0000ffff&x))
94. Compute the discrete log of an unsigned integer.
ANS.
#define discrete_log(h) \(h=(h>>1)|(h>>2), \h|=(h>>2), \h|=(h>>4), \h|=(h>>8), \h|=(h>>16), \h=(0xaaaaaaaa&h)>>1+(0x55555555&h), \h=(0xcccccccc&h)>>2+(0x33333333&h), \h=(0xf0f0f0f0&h)>>4+(0x0f0f0f0f&h), \h=(0xff00ff00&h)>>8+(0x00ff00ff&h), \h=(h>>16)+(0x0000ffff&h))
If I understand it right, log2(2) =1, log2(3)=1, log2(4)=2..... But this macro does not work out log2(0) which does not exist! How do you think it should be handled?
* 95. How do we test most simply if an unsigned integer is a power of two?
ANS. #define power_of_two(x) \ ((x)&&(~(x&(x-1))))
96. Set the highest significant bit of an unsigned integer to zero.
ANS. (from Denis Zabavchik) Set the highest significant bit of an unsigned integer to zero
#define zero_most_significant(h) \
(h&=(h>>1)|(h>>2), \
h|=(h>>2), \
h|=(h>>4), \
h|=(h>>8), \
h|=(h>>16))
97. Let f(k) = y where k is the y-th number in the increasing sequence of non-negative integers with the same number of ones in its binary representation as y, e.g. f(0) = 1, f(1) = 1, f(2) = 2, f(3) = 1, f(4) = 3, f(5) = 2, f(6) = 3 and so on. Given k >= 0, compute f(k).
98. A character set has 1 and 2 byte characters. One byte characters have 0 as the first bit. You just keep accumulating the characters in a buffer. Suppose at some point the user types a backspace, how can you remove the character efficiently. (Note: You cant store the last character typed because the user can type in arbitrarily many backspaces)
99. What is the simples way to check if the sum of two unsigned integers has resulted in an overflow.
100. How do you represent an n-ary tree? Write a program to print the nodes of such a tree in breadth first order.
101. Write the 'tr' program of UNIX. Invoked as
tr -str1 -str2. It reads stdin and prints it out to stdout, replacing every occurance of str1[i] with str2[i].
e.g. tr -abc -xyz
to be and not to be <- input
to ye xnd not to ye <- output
 
本文來(lái)自CSDN博客,轉(zhuǎn)載請(qǐng)標(biāo)明出處:http://blog.csdn.net/clearriver/archive/2009/08/04/4409465.aspx
posted on 2009-11-03 20:12 chatler 閱讀(426) 評(píng)論(0)  編輯 收藏 引用 所屬分類(lèi): Algorithm
<2025年11月>
2627282930311
2345678
9101112131415
16171819202122
23242526272829
30123456

常用鏈接

留言簿(10)

隨筆分類(lèi)(307)

隨筆檔案(297)

algorithm

Books_Free_Online

C++

database

Linux

Linux shell

linux socket

misce

  • cloudward
  • 感覺(jué)這個(gè)博客還是不錯(cuò),雖然做的東西和我不大相關(guān),覺(jué)得看看還是有好處的

network

OSS

  • Google Android
  • Android is a software stack for mobile devices that includes an operating system, middleware and key applications. This early look at the Android SDK provides the tools and APIs necessary to begin developing applications on the Android platform using the Java programming language.
  • os161 file list

overall

搜索

  •  

最新評(píng)論

閱讀排行榜

評(píng)論排行榜

青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品
  • <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>
            欧美国产日韩一区二区| 国产亚洲一级高清| 亚洲欧美日韩一区在线观看| 亚洲精品日韩欧美| 99ri日韩精品视频| 亚洲一区二区三区乱码aⅴ| 亚洲男人的天堂在线观看| 午夜在线成人av| 久久视频一区| 欧美日韩国产综合新一区| 国产精品久久久久久妇女6080| 国产精品外国| 亚洲福利视频二区| 亚洲少妇在线| 久久伊伊香蕉| av成人动漫| 久久精品二区三区| 欧美久久视频| 国产视频在线观看一区| 亚洲国产高潮在线观看| 中日韩美女免费视频网站在线观看| 性欧美xxxx大乳国产app| 久久色中文字幕| 亚洲九九九在线观看| 欧美一区二区三区在线播放| 欧美不卡福利| 国产女主播一区二区| 亚洲人成人77777线观看| 亚洲性夜色噜噜噜7777| 美女脱光内衣内裤视频久久网站| 亚洲日本中文| 亚洲制服欧美中文字幕中文字幕| 久久在线免费观看| 国产精品一区二区在线观看不卡| 亚洲人成免费| 国产日韩欧美精品| 日韩视频在线免费观看| 久久综合九色九九| 亚洲一区二区欧美| 欧美激情精品久久久久久| 国产午夜精品全部视频在线播放| 日韩视频久久| 欧美大片免费看| 欧美一区二区三区在线视频| 欧美午夜片在线免费观看| 91久久中文| 美女视频一区免费观看| 性娇小13――14欧美| 国产精品国产a级| 在线性视频日韩欧美| 欧美黄色视屏| 久久亚洲精品一区二区| 激情久久久久| 久久亚洲综合色一区二区三区| 亚洲一区二区视频| 欧美日韩中文字幕在线视频| 亚洲美女毛片| 亚洲国产日韩欧美在线图片| 麻豆精品在线播放| 亚洲第一精品福利| 美女国产精品| 另类天堂视频在线观看| 亚洲国产成人av在线| 欧美sm重口味系列视频在线观看| 欧美综合国产| 在线观看福利一区| 欧美黄色成人网| 欧美国产丝袜视频| 一区二区欧美日韩视频| 妖精成人www高清在线观看| 欧美午夜电影在线观看| 亚洲欧美日韩一区二区三区在线观看| 一区二区三区毛片| 国产精品永久免费在线| 久久久免费精品视频| 久久亚洲春色中文字幕| 日韩一区二区免费高清| 一本色道久久加勒比精品| 国产精品一区二区在线观看不卡 | 亚洲三级电影全部在线观看高清| 久久久水蜜桃| 欧美成人性生活| 亚洲一区二区三区四区在线观看 | 国产视频在线观看一区二区| 久久精品日韩| 免费观看亚洲视频大全| 99亚洲一区二区| 午夜精品成人在线| 亚洲国产天堂久久综合网| 亚洲另类黄色| 国产亚洲激情视频在线| 欧美激情视频网站| 国产精品久久久久久户外露出| 韩国欧美一区| 亚洲精品国产拍免费91在线| 欧美性大战久久久久| 久久久久久一区| 欧美日韩精品二区第二页| 久久精品国产99精品国产亚洲性色| 久久综合中文| 欧美自拍偷拍| 欧美精品国产一区| 久久久水蜜桃av免费网站| 欧美乱妇高清无乱码| 久久精品九九| 欧美精品国产| 久久久久一区| 国产精品家庭影院| 亚洲国产另类久久精品| 国产一区二区三区在线观看免费| 亚洲黄色一区二区三区| 国产一区二区日韩精品| 一本色道久久精品| 9久草视频在线视频精品| 久久久久久久999精品视频| 亚洲欧美日韩精品久久| 欧美日本免费| 亚洲黄色影片| 亚洲人成亚洲人成在线观看| 久久精品网址| 久久精品夜色噜噜亚洲a∨| 国产精品ⅴa在线观看h| 91久久在线播放| 亚洲国产精品一区二区www| 欧美一区二区视频在线| 欧美一进一出视频| 国产精品久久久久久久久搜平片 | 国产一区二区三区四区在线观看 | 亚洲精品色婷婷福利天堂| 欧美在线三级| 久久激情久久| 国产日韩精品一区二区| 亚洲视频狠狠| 亚洲欧美日韩精品久久久| 欧美性猛交xxxx免费看久久久 | 麻豆成人综合网| 久久午夜电影网| 伊人色综合久久天天| 久久青青草综合| 麻豆精品91| 亚洲国产成人一区| 欧美国产成人在线| 日韩视频第一页| 国产精品99久久久久久久女警 | 亚洲第一黄网| 欧美高清视频在线播放| 最新日韩中文字幕| 欧美系列一区| 99在线观看免费视频精品观看| 亚洲精品视频在线| 欧美jizzhd精品欧美巨大免费| 欧美阿v一级看视频| 亚洲人成绝费网站色www| 欧美成人一区二免费视频软件| 亚洲人成久久| 午夜在线视频观看日韩17c| 国产免费亚洲高清| 久久精品99无色码中文字幕 | 亚洲电影免费观看高清| 欧美jizzhd精品欧美喷水| 亚洲人午夜精品| 香蕉久久国产| 在线看日韩av| 欧美视频中文字幕在线| 午夜视频在线观看一区| 欧美成年人网| 亚洲欧美区自拍先锋| 激情亚洲网站| 欧美精品自拍偷拍动漫精品| 亚洲校园激情| 亚洲国产91精品在线观看| 亚洲欧美日韩国产另类专区| 激情六月综合| 欧美视频在线观看免费网址| 欧美一区二区女人| 亚洲精品久久久久久久久久久| 欧美一级免费视频| 亚洲三级性片| 国产午夜久久久久| 欧美人妖另类| 久久频这里精品99香蕉| 亚洲一区在线播放| 亚洲激情视频| 毛片基地黄久久久久久天堂| 亚洲天堂久久| 最新精品在线| 国产午夜精品一区二区三区欧美| 欧美大片第1页| 欧美综合国产| 亚洲一品av免费观看| 亚洲国产精品一区二区三区| 久久国内精品自在自线400部| 99综合在线| 亚洲国产美女| 激情文学综合丁香| 国产日韩欧美91| 国产精品男女猛烈高潮激情| 欧美成人性生活| 美女精品在线| 久久久综合精品|