All Basic Articles
The app.set() function is used to assign the setting name to value. You may store any value that you want, but certain names can be… Read More
The std::is_convertible template of C++ STL is present in the <type_traits> header file. The std::is_convertible template of C++ STL is used to check whether any… Read More
Ethical hacking refers to offensive testing of computer systems in order to find out security-related loopholes. These loopholes are called security vulnerabilities. It has been… Read More
Spring Data JPA is a method to implement JPA repositories to add the data access layer in applications easily. CRUD stands for create, retrieve, update,… Read More
In this article we will see how we can get the location of a user. The location of the user account need not be the… Read More
Java is one of the most popular and widely used programming languages. It is simple, portable, platform independent language. It has been one of the… Read More
Inheritance is an important pillar of OOPs(Object Oriented Programming). It is the mechanism in java by which one class is allowed to inherit the features(fields… Read More
Feature scaling is one of the most important data preprocessing step in machine learning. Algorithms that compute the distance between the features are biased towards… Read More
In Database Management System (DBMS), data is represented in a tabular form through attributes and tuples i.e., columns and rows. There are various operations (insert,… Read More
Given a number and the task is to find sum of digits of this number in Python. Examples:   Input : n = 87 Output : 15 Input :… Read More
What is  Downloading :  Meaning of downloading is that our computer is receiving data from the Internet. When users are copying any file from the… Read More
Round 1:It consists of a Hackerrank powered test on their internal assessment platform called playground. It had 30-40 Question The questions consisted of tricky OOPs… Read More
Rational Unified Process (RUP) is a software development process for object-oriented models. It is also known as the Unified Process Model. It is created by… Read More
1. Project Evaluation and Review Technique (PERT) : PERT is appropriate technique which is used for the projects where the time required or needed to… Read More
In this article, we will be looking into the major difference between UNIX and Windows Operating System.  UNIX :  UNIX is a powerful, multi-user, and… Read More
The SELECT DISTINCT statement is used to return only distinct (different) values. Inside a table, a column often contains many duplicate values and sometimes we… Read More
Prerequisite – Classification of Routing Algorithms  1. Adaptive Routing algorithm: Adaptive routing algorithm is also called a dynamic routing algorithm. In this algorithm, the routing decisions… Read More
Prerequisite – I/O Interface (Interrupt and DMA Mode) Data transfer between the CPU and I/O devices can be done in variety of modes. These are three… Read More
1. Monoalphabetic Cipher : A monoalphabetic cipher is any cipher in which the letters of the plain text are mapped to cipher text letters based on… Read More
Keyboard is like a type-writer but with modern set of arrangements. Basically, it is a input device that takes letters or characters from the user,… Read More