Courses
Tutorials
Jobs
Practice
Contests
Data Structure
Java
Python
HTML
Interview Preparation
Trending Now
DSA
Web Tech
Foundational Courses
Data Science
Practice Problem
Python
Machine Learning
JavaScript
System Design
Django
DevOps Tutorial
Java
C
C++
ReactJS
NodeJS
CP Live
Aptitude
Puzzles
Projects
HMAC Algorithm in Computer Network
HMAC algorithm stands for Hashed or Hash-based Message Authentication Code. It is a result of work done on developing a MAC derived from cryptographic hash functions. HMAC...
Read More
Computer Networks
Block Cipher modes of Operation
Encryption algorithms are divided into two categories based on the input type, as a block cipher and stream cipher. Block cipher is an encryption algorithm that takes a fi...
Read More
Misc
Bash shell script to swap two numbers
Given two numbers and the task is to swap them using the third variable. Examples: Input: first = 2, second = 4Output: first = 4, second = 2Input: first = 5, second = 7O...
Read More
Misc
Pandas DataFrame.dropna() Method
Pandas is one of the packages that makes importing and analyzing data much easier. Sometimes CSV file has null values, which are later displayed as NaN in Pandas DataFrame...
Read More
Python
python-modules
MAQ Software Interview Experience | Set 19 (On Campus Internship)
MAQ Software visited our campus for Software Intern on 26th April 2018 about 120 students applied for it.Round 1: Round 1 was nothing but CV shortlisting. They shortlisted...
Read More
Interview Experiences
Experiences
Risk Management for Information Security | Set-2
Prerequisite - Risk Management | Set-1 2. Risk Assessment - Risk Management is a recurrent activity, on the other hand Risk assessment is executed at discrete points and u...
Read More
Computer Networks
Information-Security
Algorithms Quiz | SP Contest 1 | Question 10
Here are the two concurrent process A, B with respective codes:Code A:while (true) // infinite condition{ M :____; printf("%c", b); printf("%c", b); N:____;}Co...
Read More
DSA Quiz
Algorithms Quiz | SP Contest 1 | Question 9
Find the missing term in the below sequence:1, 1, 4, 25, 196, __ , 17424 (A) 1561(B) 1764(C) 1600(D) None of these Answer: (B) Explanation: Each term is the square of numb...
Read More
DSA Quiz
Algorithms Quiz | SP Contest 1 | Question 8
How many numbers of 6 digits are possible with the property that the sum of their digits is 5?(A) 96(B) 104(C) 120(D) 126 Answer: (D) Explanation: There are 6 digits and t...
Read More
DSA Quiz
Algorithms Quiz | SP Contest 1 | Question 7
A can finish an IT project in 15 days, B can finish the same project in 12 days. In how many days, both of them can finish 60% of the project? It may be assumed that work...
Read More
DSA Quiz
Algorithms Quiz | SP Contest 1 | Question 6
What is the output of below C program?[sourcecode language="C"]#include stdio.hvoid print(int c){ if (c 0) { return; } printf(%d , c); c--; ...
Read More
DSA Quiz
Risk Management for Information Security | Set-1
Prerequisite - Threat ModellingA risk is nothing but intersection of assets, threats and vulnerability.A+T+V = RNIST SP 800-30 Risk Management Guide for Information Techno...
Read More
Computer Networks
Information-Security
Algorithms Quiz | SP Contest 1 | Question 5
Below are some operators separated by comma in C++. Which of these operators cannot be overloaded?!, ::, ->*, ~, .*, sizeof, new(A) ->*, .*, sizeof(B) .*, ~, new(C) ::, si...
Read More
DSA Quiz
Threat Modelling
Pre-Requisite: ThreatsWith the advancement in technology, it becomes easier day by day for hackers to gain access to sensitive data, disable applications, etc. Thus, Appli...
Read More
Computer Networks
Information-Security
Algorithms Quiz | SP Contest 1 | Question 4
Which statement is true about initializing a variable to a default value (i.e. integer to 0, boolean to false) using the default constructor?(A) It initializes the data me...
Read More
DSA Quiz
1
...
11179
11180
11181
...
11582