Courses
Tutorials
Jobs
Practice
Contests
Data Structure
Java
Python
HTML
Interview Preparation
Trending Now
DSA
Web Tech
Foundational Courses
Data Science
Practice Problem
Python
Machine Learning
JavaScript
System Design
Django
DevOps Tutorial
Java
C
C++
ReactJS
NodeJS
CP Live
Aptitude
Puzzles
Projects
GBlog
Frontend Developer Roadmap 2024
Frontend development means to design the face of a website or application. It involves working on the appearance of the website. Building interactive buttons, using images...
Read More
Find MEX of every subtree in given Tree
Given a Generic Tree consisting of N nodes numbered from 0 to N - 1 which is rooted at node 0 and an array val[] such that the value at each node is represented by val[i],...
Read More
Arrays
Tree
Trees
tree-traversal
Binary Search
Divide and Conquer
Searching
Sorting
DFS
DSA
Machine Independent Code optimization in Compiler Design
Machine Independent code optimization tries to make the intermediate code more efficient by transforming a section of code that doesn't involve hardware components like CP...
Read More
GATE CS
Compiler Design
Picked
Blogathon
Blogathon-2021
Transition Table in Automata
Transition Table :Transition function(∂) is a function which maps Q * ∑ into Q . Here 'Q' is set of states and '∑' is input of alphabets. To show this transition function ...
Read More
GATE CS
Theory of Computation
Modes of DMA Transfer
In this article we will try to understand the details associated with the DMA (Direct Memory Access) like what exactly DMA is or how it works and also further we will see ...
Read More
GATE CS
Computer Organization and Architecture
Computer Organization & Architecture
Blogathon
Blogathon-2021
Ladner's theorem in TOC
Ladner's theorem in TOC :As you presumably know, regardless of whether P = NP is a significant perplexing issue in field of Computer Science. In computational complexity, ...
Read More
Articles
Computer Subject
Theory of Computation
What is a Proxy Firewall?
Prerequisite : Introduction of FirewallIntroduction :A firewall proxy provides security by controlling the information going in and out of the network. Firewall proxy serv...
Read More
Computer Networks
Picked
A Cryptographic Introduction to Hashing and Hash Collisions
What is hashing?Hashing is the process of converting any kind of data (usually passwords or installer files) into a fixed-length string. There are multiple types of hashes...
Read More
cryptography
Computer Networks
Blogathon
Blogathon-2021
What is a Network Operating System?
The basic definition of an operating system is that the operating system is the interface between the computer hardware and the user. In daily life, we use the operating s...
Read More
Operating Systems
Picked
Overview of DFSS
Prerequisite : Six SigmaDFSS :DFSS stands for Design For Six Sigma. Six sigma is a strategy for improving the quality of products and customer experience through defect el...
Read More
Software Engineering
Understanding DMADV
Prerequisite: Six Sigma in Software EngineeringDMADV :DMADV is a process defined as Motorola which includes six sigma management philosophy. The term stands for Define, Me...
Read More
Software Engineering
Feature Testing in Software Testing
Prerequisite: Software TestingFeature testing:Feature Testing is the testing of various features present or to be included inside an app in order to make the interaction a...
Read More
Software Engineering
Software Testing
Software Testing
Understanding Runtime Application Self Protection
RASP :RASP term stands for Runtime Application Self Protection. A security driven technology that uses runtime instrumentation to detect and block computer attacks by taki...
Read More
Software Engineering
Difference between DMAIC and DMADV
Prerequisite: Six Sigma in Software Engineering1. DMAIC :DMAIC is a part of the six sigma program which stands for Define, Measure, Analyze, Improve, and Control. DMAIC is...
Read More
Difference Between
Software Engineering
Understanding Internet of Robotic Things
Internet Of Robotic Things :The term “Internet of Things” (IoT) stems from the Internet Protocol suite, which is based totally on Transmission Control Protocol (TCP) and I...
Read More
Computer Networks
IoT
Difference between DMAIC and PDCA
1. DMAIC :Define, Measure, Analyze, Improve and Control in short referred as DMAIC. When it is fully implemented, ideates new process solution and problem solving approach...
Read More
Difference Between
Software Engineering
1
...
5610
5611
5612
...
11360