All Basic Articles
Progressive web app seems to be the latest buzzword in today’s tech era. If we ask you to open the Google Maps on your phone,… Read More
Ansible is an open-source IT engine that automates application deployment, cloud provisioning, intra-service orchestration, and other IT tools. It is an automation and orchestration tool popular… Read More
Vertical Redundancy Check is also known as Parity Check. In this method, a redundant bit also called parity bit is added to each data unit.… Read More
Given an integer array arr[], the task is to minimize the length of the given array by repeatedly replacing two unequal adjacent array elements by… Read More
Amazon Web Services provide a wide range of database solutions to its clients. Depending upon the nature of the data and the cost constraints of… Read More
Lodash _.pick() method is used to return a copy of the object that is composed of the picked object properties. It can be called a… Read More
Python can be used to perform a variety of tasks. One of them is creating a voice recorder. We can use python’s sounddevice module to… Read More
Given the coordinates of any two vertices of a square (X1, Y1) and (X2, Y2), the task is to find the coordinates of the other… Read More
Given a string S and an integer N, the task is to check if it is possible to generate any string N times from the… Read More
Profile: Intern at Nokia Solutions and Networks Stream Required : B.Tech & M.Tech (CS, IT) Shortlisting Criteria for sitting in Round 1: Batch-2021, Best 150… Read More
The JavaScript Number.MAX_SAFE_INTEGER is a constant number that represents the maximum safe integer. This constant has a value of (253 – 1). Here safe refers… Read More
The JavaScript Number.MIN_SAFE_INTEGER is a constant number that represents the minimum safe integer. This constant has a value of (-(253 – 1)). Use Number.MIN_SAFE_INTEGER, as… Read More
Do you have a dream to win a Gold Medal in the Olympics of Programming (ACM ICPC)? Do you want to ace your career with… Read More
Prerequisite – Error Detection in Computer Networks  Checksum is the error detection method used by upper layer protocols and is considered to be more reliable… Read More
Spatial data is the data collected through with physical real life locations like towns, cities, islands etc. Spatial data are basically of three different types… Read More
Given a binary string str, the task is to build a DFA that accepts the languages ending with “01” over the characters {0, 1}. Examples:… Read More
The break and continue statements are the jump statements that are used to skip some statements inside the loop or terminate the loop immediately without… Read More
Source code refers to the high-level code or assembly code that is generated by a human/programmer. Source code is easy to read and modify. It… Read More
The composition is a design technique in java to implement a has-a relationship. Java Inheritance is used for code reuse purposes and the same we… Read More
1. Database Management System (DBMS) : DBMS i.e, Database Management System is a set of programs to access the data which gives information about a… Read More