All Medium Articles
Given an array arr[] consisting of N integers and an integer K, the task is to find the minimum difference between the maximum and minimum… Read More
We can set up a cookie that never expires in JavaScript using the following approach: Prerequisites : Intermediate level knowledge of JavaScript Basic HTML   Disclaimer:… Read More
NetHogs is similar to Linux top command which is an open-source command-line program, that is used for monitoring network traffic in Linux. But do you… Read More
Prerequisite: Kadane’s algorithm Given a 2D array arr[][] of dimension N*M, the task is to find the maximum sum sub-matrix from the matrix arr[][]. Examples:… Read More
Given a matrix M[][] of dimension N*N, the task is to check if all the elements on the principal and cross diagonals of the matrix… Read More
The OS module is one of the most popular Python modules for automating the systems calls and operations of an operating system. With a rich… Read More
In this article, we will learn how to programmatically fire click events on the input file element. Approach Whenever you want to perform a click… Read More
Indexes are special data structures that store some information related to the documents such that it becomes easy for MongoDB to find the right data… Read More
INSTR() function is a built-in function in MySQL that is used to get the position of the first occurrence of pattern in the text. Note:… Read More
FIELD() function is a built-in function in MySQL that is used to get the position of the first occurrence of a value in a set… Read More
This tutorial will walk you through each step in detail on how to configure your django websocket application on a Ubuntu 20.10 server. This article… Read More
Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design. Built by experienced developers, it takes care of much of… Read More
IDS(Intrusion detection system) is a software application that monitors your system and checks whether any malicious activity is found or not and reports that to… Read More
An ISO file also called an ISO image represents an entire optical disk like a CD or DVD as a single file. It is used… Read More
Biometric Fingerprint authentication is one method of protecting sensitive information or premium content of your app. Nowadays, all payment apps use this feature in their… Read More
The 68000 processor is characterized by a 16-bit external word length as the processor chip has 16 data pins for connection to the memory. However,… Read More
Round 1 (Written) An aptitude test, scheduled on AMCAT platform was taken comprising of 74 Questions for 95 Minutes. There were three segments namely English… Read More
Given an array arr[] of size N, the task is to find the number of non-empty subsets present in the array such that every element(… Read More
Given an array nums[] of size N, the task is to print all distinct permutations of the given array. Input: nums[] = { 1, 2,… Read More