All Medium Articles
Do you also feel excited to learn the latest Google technologies? If yes, then there’s an exciting opportunity by Google developers waiting for you. It’s… Read More
Coding is the most salient skill an individual needs to learn, as it has become the foundation of the modern world. But learning about it… Read More
The processor also known as CPU is a piece of hardware. It is often referred to as the “Brain of a PC” because all the… Read More
1. Control Structure :Control Structure, as name suggests, is basically a set of statements and control statements that are controlling their execution.   2. Control… Read More
1. Semaphore :Semaphore, as name suggests, is basically an object that includes counter, waiting list of process and supports two different operations i.e., wait and… Read More
BREAKING NEWS: Geeks Summer Carnival is on the way…!!!! Pretty much sure, your excitement level would’ve gone to the next level after hearing this. And… Read More
Given a binary tree, the task is to print all the nodes of the binary tree in Pre-order, Post-order, and In-order iteratively using only one… Read More
The Project Manager has to exercise direction, coordination, and control to execute the project efficiently. All these forces help to attain the results timely. Directing… Read More
68000 processor was introduced in 1979. Through 1980’s and early 1990’s the 68000, 68020, 68030 and 68040 were targeted for personal computer’s market and were… Read More
Given a positive integer N, the task is to count the number of integers upto N which can be represented as the sum of two… Read More
Given an array arr[] of size N, the task is to find the maximum sum possible of the count of distinct prime factors of K… Read More
Django is a Python-based web framework that allows you to quickly create efficient web applications. It is also called batteries included framework because Django provides… Read More
Double hashing is a technique in an open addressing scheme. and there is the ordinary hash function. In an open addressing scheme, the actual hash… Read More
An alphanumeric value i.e. the sequence of letters and numbers that uniquely defines the contents of a file is called a checksum (often referred to… Read More
Given a number n, the task is to write a Python program to print a half-diamond pattern of numbers with a star border. Examples: Input:… Read More
Validating phone numbers is a common prerequisite in today’s web, mobile, or desktop applications, but Java does not have an integrated method for carrying out… Read More
An Amplifier is simply an electronic device that is used to increase the strength of the input signal. In this process of amplification, even the… Read More
Universally Unique Identifiers (UUIDs) are also known as Globally Unique Identifier(GUID) which are 128-bit numbers and are unique on all local systems they are created… Read More
Given an undirected graph, the task is to check if the given graph is connected or not using DFS. A connected graph is a graph… Read More
Modulation is simply a widely used process in communication systems in which a very high-frequency carrier wave is used to transmit the low-frequency message signal… Read More