Courses
Tutorials
Jobs
Practice
Contests
Data Structure
Java
Python
HTML
Interview Preparation
Trending Now
DSA
Web Tech
Foundational Courses
Data Science
Practice Problem
Python
Machine Learning
JavaScript
System Design
Django
DevOps Tutorial
Java
C
C++
ReactJS
NodeJS
CP Live
Aptitude
Puzzles
Projects
How Deque Works Internally in C++?
Prerequisite: Deque in C++Deque or Double Ended Queue is a generalized version of the Queue data structure that allows insert and deletion at both ends. It supports the ac...
Read More
Technical Scripter
STL
C++
cpp-deque
Picked
Technical Scripter 2022
C++ using vs Typedef
typedef keyword in C++ is used for aliasing existing data types, user-defined data types, and pointers to a more meaningful name. Typedefs allow you to give descriptive na...
Read More
Technical Scripter
STL
C++
Picked
Technical Scripter 2022
C++ Program For Average of an Array (Iterative and Recursive)
Given an array, the task is to find the average of that array. Average is the sum of the array elements divided by the number of elements.Examples:Input: arr[] = {1, 2, 3,...
Read More
Arrays
C++
Arrays
C++ Programs
C Array Programs
DSA
C++ Program To Remove Duplicates From Sorted Array
Given a sorted array, the task is to remove the duplicate elements from the array.Examples:Input: arr[] = {2, 2, 2, 2, 2}Output: arr[] = {2} new size = 1Input: arr[...
Read More
Arrays
C++
C++ Programs
C++ Array Programs
DSA
Configuring EIGRP Stub in Cisco
Pre-requisites: EIGRP Implementation in Cisco, EIGRP FUNDAMENTALS.EIGRP stub area routing is a feature specifically designed to improve network scalability and stability. ...
Read More
Cisco
Technical Scripter
Picked
CCNA
Technical Scripter 2022
How To Configure, Verify, and Troubleshoot RIPv2 for IPv4?
Pre-requisite: Routing Information Protocol (RIP) V1 V2, Configuring RIP Versions 1 and 2 in Cisco.RIPv2 is a classless, distance-vector routing protocol (DVRP). It is a ...
Read More
Technical Scripter
Picked
How To
CCNA
CCNA IP Addressing
Technical Scripter 2022
Configuring RIP Default Information Originate in Cisco
Pre-requisites: RIP, Configuring RIP Versions 1 and 2 in Cisco.After configuring one or multiple default routes on the routers in the routing protocol's domain, the routin...
Read More
Technical Scripter
Picked
CCNA
CCNA Routing
Technical Scripter 2022
How To Install a Modem?
When you get internet at home, your provider gives you a special box called a modem. It connects you to the internet. This guide explains How To Install a Modem and make y...
Read More
Technical Scripter
TechTips
Picked
How To
Technical Scripter 2022
How To Troubleshoot Interface and Cable Issues?
Pre-requisites: Types of CollisionsCollision refers to the scenario in which two stations transmit frames at the same time. In that case, both frames may be dropped or ret...
Read More
Technical Scripter
Picked
CCNA
Technical Scripter 2022
Steps Involves in Cisco Router Configuration Backups
A backup of Configurations is required for troubleshooting the device when necessary, or if the device accidentally gets reset. These Backups are nothing but files (genera...
Read More
Technical Scripter
Picked
CCNA
CCNA Routing
Technical Scripter 2022
How To Free up Drive Space in Windows?
Windows 10 provides easy ways to free up space on your computer. Even though modern devices have large storage, files and apps can fill it up and slow things down. Windows...
Read More
Technical Scripter
TechTips
Picked
How To
Windows-Tools
Technical Scripter 2022
What is DNS Rebinding?
A DNS Rebinding attack takes advantage of the fact that typically when an attacker exploits a vulnerability (such as Cross-Site Scripting—XSS) in order to compromise a dom...
Read More
Picked
Ethical Hacking
Ethical Hacking - Fundamentals
How To Install Super Bluetooth Hack on Android?
Super Bluetooth Hack is a very impressive app and will certainly come in handy if you need to know what that unknown phone is doing near you. However, if you don't feel th...
Read More
Picked
Ethical Hacking
Ethical Hacking - Basics
How To Counter Insider Threats in Software Supply Chain?
In today’s digital world, software supply chain security is a major concern for organizations. In the age of cyber threats, cybercriminals can use a variety of techniques ...
Read More
Technical Scripter
Picked
How To
Ethical Hacking
Ethical Hacking - Misc
Technical Scripter 2022
What are Network Boundaries?
Network boundaries are the limits that define where a network begins and ends. They are used to specify the range of devices and services that are allowed on the network. ...
Read More
Technical Scripter
Picked
CCNA
CCNA Basics
Technical Scripter 2022
1
...
3503
3504
3505
...
11501