All Hard Articles
Trigonometry is a branch of mathematics, which deal with the angles, lengths, and heights of triangles and their relationships. It had played an important role… Read More
There are mainly 3 ways to copy files using java language. They are as given below: Using File Stream (Naive method)Using FileChannel ClassUsing Files class.… Read More
Android is an open-source operating system based on Linux Kernel and used in smart devices like Android Phones, Watches, T.V., Tablets, etc. Android was developed… Read More
The Binary Exponential Backoff Algorithm prevents packet collisions during simultaneous access by randomizing moments at stations attempting to access the wireless channels. However, this randomization… Read More
I got a call from an Amazon recruiter as I was referred by one of my friends for the role. She sent me the coding… Read More
The library, BeautifulSoup in Python apart from extracting data out of HTML or XML files, helps in searching, modifying, and navigating the parse tree. Are… Read More
Problem Statement: At a restaurant, pizzas can be ordered in boxes of 6, 9, and 20. What is the highest number of Pizzas that cannot… Read More
Slowloris is a free and Open source tool available on Github. We can perform a denial of service attack using this tool. It’s a framework… Read More
Animation is a way using which we can create the illusion of motion by placing still images one after another in a typical format. For… Read More
The HTML <keygen> element can help generate a key material as part of an HTML form and submit the public key. This mechanism is intended… Read More
Equation of a circle is the algebraic way to define a circle. It is the locus of the point which is at a constant distance… Read More
Given a Binary Tree, the task is to modify the Tree by left rotating every node any number of times such that every level consists… Read More
Unlike arrays, linked list elements are not stored at a contiguous location; the elements are linked using pointers. In this post, methods to insert a… Read More
Recently I was interviewed by Amazon for SDE-2, here is my experience.  Current Status: 3.5 YOE with the product-based company. Online Assessment: 105 minutes including… Read More
Given a string S of length N and a 2D array of strings Q[][] consisting of M queries of the following type: Query(“U”, “I”, “X”):… Read More
Independent sets are set of vertices or edges in which the pair of any two vertices or edges are not adjacent to each other. Assuming… Read More
This class accepts lots of value in tailwind CSS in which all the properties are covered in class form. This class is used to improving… Read More
Cipher is an algorithm for encryption and decryption. The cipher text is a process that applies to different types of algorithms to convert plain text… Read More
Matrix is simply a two-dimensional array. So the goal is to deal with fixed indices at which elements are present and to perform operations on… Read More