All Easy Articles
Prerequisites: Burpsuite  One of the most crucial Vulnerabilities listed in the top 10 of OWASP is Insecure Direct Object Reference Vulnerability (IDOR Vulnerability). In this… Read More
The portfolio gallery is useful when your website contains different types of content or so many contents. With the help of a portfolio gallery, you… Read More
A number is a way to represent arithmetic value, count or measure of a particular quantity. A number system can be considered as a mathematical… Read More
Equivalence class testing (Equivalence class Partitioning) is a black-box testing technique used in software testing as a major step in the Software development life cycle… Read More
Zed Attack Proxy is an open-source security software written in Java programming language and released in 2010. It is used to scan web applications and… Read More
Cron Jobs: These are the tasks that run periodically by the operating system. Users can schedule commands the OS will run these commands automatically according… Read More
Next.js is a react based framework. It has powers to Develop beautiful Web application for different platform like Windows, Linux and mac. If you have… Read More
Sometimes, while working with Matrix we can have a problem in which we have Strings and we need a universal concatenation of all the String… Read More
In this tutorial, we are going to learn how to add a pressed effect on a button using CSS. This effect is a part of… Read More
Adapter method is a Structural Design Pattern which helps us in making the incompatible objects adaptable to each other. The Adapter method is one of… Read More
Python utilizes a system, which is known as “Call by Object Reference” or “Call by assignment”. If you pass arguments like whole numbers, strings, or… Read More
Sprinklr visited our campus(IIT BHU, Varanasi) for Full Time placement. Round 1: It was an online test conducted on hackerearth. Test consisted of 3 coding… Read More
Given a permutation P of first N natural numbers. The task is to find the number of i’s such that Pi ? Pj for all… Read More
In today’s world, wireless communication has a major application in sharing of information anywhere and at anytime. We can use wireless networks in the form… Read More
Prerequisite – Data Mining The method of data reduction may achieve a condensed description of the original data which is much smaller in quantity but keeps… Read More
With the help of np.triu_indices() method, we can get the indices for the upper triangle of an [n, m] array by using np.triu_indices() method. Syntax… Read More
In this article, we will learn how to develop and publish your own npm package (also called an NPM module).  There are many benefits of… Read More
Given an ArrayList collection in Java, the task is to remove the first element from the ArrayList. Example: Input: ArrayList[] = [10, 20, 30, 1,… Read More
One must have header terms parallel computing, heterogeneous computing, high performance computing (HPC). If not you can explore HPC domain it is one of the… Read More
Prerequisite – Software TestingSoftware typically undergoes many levels of testing, from unit testing to system or acceptance testing. Typically, in-unit testing, small “units”, or modules of… Read More