Skip to content
All Expert Articles
Cognizant was an on-campus virtual drive. They were asking for two profiles. Students can apply to any one of the profiles. They used Superset for… Read More
Java is one of the most widely-used object-oriented programming languages today, known for its robustness, cross-platform compatibility, and user-friendly syntax. Java developers are responsible for… Read More
Netcracker Technology Solutions India Pvt. Ltd. was an on-campus virtual drive. They conducted three rounds. Round 1: Cognitive + Coding L2 L3 Test Duration: 1… Read More
SEO (Search Engine Optimization) is an important aspect of web development, as it helps to improve the visibility and ranking of a website in search… Read More
Tailwind CSS is a popular utility-first CSS framework and Next.js is a server-side rendering framework for React. Combining the two can lead to powerful web… Read More
With C++20, we get a convenient way of initializing data members. The new feature is called Designated Initializers and it might be familiar to C… Read More
In this article, we are going to make a project on the Tinder Match-Making Recommender system. Most social media platform have their own recommender system… Read More
Machine learning is the branch of artificial intelligence that uses data to train the machine or computer, which recognize the hidden patterns in data which… Read More
Pre-requisites: Difference between Phishing and Vishing There are several types of Email attacks that are used by the attackers to steal confidential information from users.… Read More
Cyber threat intelligence (CTI) refers to the process of collecting, analyzing, and interpreting data and information about potential or actual cyber threats to identify their… Read More
Noisy channel protocols are commonly known as communication protocols. These protocols are designed to ensure a reliable data transmission over a channel in which there… Read More
In the year of 1955, an amendment was made to Indian constitution to modify several provisions of the constitution. Basically in the original text of… Read More
The term “Blockchain” is a combination of the words “block” and “chain“. Each block contains data and is linked to the previous block, forming a… Read More
AWS Lambda is a serverless computing service that allows developers to run code without having to worry about infrastructure. It is an event-driven service, i.e… Read More
AWS Copilot is a command line tool provided by amazon web services, which helps developers to focus on creating and improving the application, without always… Read More
In recent years, microservices architecture has gained popularity as a way to develop and deploy applications. Microservices architecture breaks down an application into smaller, independent… Read More
Location: PAN IndiaDate: March 2023Rounds: 2 Rounds(Technical +HR)Type: Off-CampusResult: SelectedPlatform Used: Microsoft Meet First of all, I got a call from the campus recruiter, asking… Read More
Given an undirected graph, with n nodes numbered from 0 to n-1. Given a 2D integer array of edges where edges[i]= [ai, bi] denotes that… Read More
Given a string s and string t, the task is to remove all occurrences of a string t in a string s using the Boyer-Moore… Read More
Given a singly linked list of integers, the task is to replace every node with its closest Fibonacci number and return the modified linked list.… Read More