Courses
Tutorials
Jobs
Practice
Contests
Data Structure
Java
Python
HTML
Interview Preparation
Trending Now
DSA
Web Tech
Foundational Courses
Data Science
Practice Problem
Python
Machine Learning
JavaScript
System Design
Django
DevOps Tutorial
Java
C
C++
ReactJS
NodeJS
CP Live
Aptitude
Puzzles
Projects
GBlog
Frontend Developer Roadmap 2024
Frontend development means to design the face of a website or application. It involves working on the appearance of the website. Building interactive buttons, using images...
Read More
Understanding Internet of Robotic Things
Internet Of Robotic Things :The term “Internet of Things” (IoT) stems from the Internet Protocol suite, which is based totally on Transmission Control Protocol (TCP) and I...
Read More
Computer Networks
IoT
Difference between DMAIC and PDCA
1. DMAIC :Define, Measure, Analyze, Improve and Control in short referred as DMAIC. When it is fully implemented, ideates new process solution and problem solving approach...
Read More
Difference Between
Software Engineering
Reduction Theorem in TOC
Reduction Theorem :A reduction from A to B is a function f : Σ1* → Σ2* such that For any w ∈ Σ1*, w ∈ A if f(w) ∈ B Every w ∈ A maps to some...
Read More
Theory of Computation
What is DDoS mitigation?
In this article, we will learn about DDoS mitigation and how it attacks.DDoS mitigation refers to the process of securing and protecting a server when it gets attacked by ...
Read More
Computer Networks
Picked
Blogathon
Blogathon-2021
SQL Query to Match Any Part of String
It is used for searching a string or a sub-string to find a certain character or group of characters from a string. We can use the LIKE Operator of SQL to search sub-strin...
Read More
SQL
DBMS-SQL
Picked
NL-Completeness and PSPACE-Completeness
For solving complex problems we require efficient algorithm. We face so many problems and some of them can be solved by using an algorithm and every algorithm requires som...
Read More
Algorithms
Experienced
Computer Subject
Theory of Computation
DSA
Experiences
How Data Encapsulation and De-encapsulation Works?
Data encapsulation and de-encapsulation are fundamental concepts in computer networking and communication protocols. These processes are essential for transferring data ac...
Read More
Computer Networks
Picked
What is a DNS Amplification Attack?
DNS Amplification Attack :In this article, we will learn about the DNS Amplification Attack and how it can be prevented.A DNS (domain name system) Amplification Attack is ...
Read More
Computer Networks
Picked
Blogathon
Blogathon-2021
What is Ping?
A ping is a basic Internet command that allows a user to test and verify whether a given destination IP address exists and can accept requests in computer network administ...
Read More
Computer Networks
Picked
How to Mitigate a DDoS Attack?
DDoS Attack :Distributed Denial of Service Attack is a sophisticated cyber attack, which is performed on digital assets, such as servers and computer systems. Primary aim ...
Read More
Computer Networks
Picked
Benefits of Hosted Desktop
The BYOD revolution is a trend that is not going to stop anytime soon. Today's empowered consumers are expecting to work in and out of the office, using technology just li...
Read More
Misc
Operating Systems
Wireless Pentest Basic
Wireless Pen-testing :Many of them want to use wi-fi , most of them try to hack the wi-fi and get the password without acknowledgement of neighbor but they are failed to f...
Read More
Misc
Computer Networks
misc
linux
Return from Subroutine and Return from Interrupt
In this article, we will discuss the Return from Subroutine and Return from Interrupt and will explain in detail and finally conclude with Difference between Return from S...
Read More
Computer Organization & Architecture
Blogathon
Blogathon-2021
Best yarn Commands to use for being productive
Overview :YARN stands for “Yet Another Resource Negotiator“. It was introduced in Hadoop 2.0 to remove the bottleneck on Job Tracker which was present in Hadoop 1.0. YARN ...
Read More
Hadoop
Hadoop
Problem solving on scatter matrix
Prerequisite : Scatter Plot MatrixWe calculate Sw ( within class scatter matrix ) and SB ( between class scatter matrix ) for the available data points.SW : To minimize va...
Read More
Matrix
Project
Engineering Mathematics
Machine Learning
data-science
Data Mining
DSA
Data Science
1
...
5629
5630
5631
...
11375