Courses
Tutorials
Jobs
Practice
Contests
Data Structure
Java
Python
HTML
Interview Preparation
Trending Now
DSA
Web Tech
Foundational Courses
Data Science
Practice Problem
Python
Machine Learning
JavaScript
System Design
Django
DevOps Tutorial
Java
C
C++
ReactJS
NodeJS
CP Live
Aptitude
Puzzles
Projects
GBlog
Three 90 Challenge: Bigger and Better
As we transit into the new phase, it's essential to fuel our inner drive for success. On popular demand, GeeksforGeeks is happy to announce that we are back with the Thre...
Read More
Difference between RPA and Test Automation
The terms Test Automation and Mechanical Cycle Computerization seem to be comparative as the two of them contain 'Automation' and offer similar highlights of decreasing di...
Read More
Misc
Difference Between
Software Engineering
Single-Row and Multi-Row Partitions in Cassandra
In Cassandra, CQL(Cassandra Query Language) has two partitions as follows -Single-Row PartitionsMulti-Row PartitionsSingle-Row Partitions :In Cassandra, the primary key re...
Read More
SQL
NoSQL
Crypto Virus
IntroductionsCrypto Virus occurred from 5 September 2013 to late May 2014. This virus is also known as the crypto locker (isolated in late May 2014 via Operation Tovar) vi...
Read More
Computer Networks
Information-Security
I love you Virus
Introduction :This virus name I love you referred to as a love bug or a love letter. It infected over 10 million computers and it started spreading as an email message wit...
Read More
Computer Networks
Information-Security
Email Worms
Email Worms is commonly known as a mass-mailing worm. This worm has the capability of sending itself as an attachment to an email or as a link. It can only activate if the...
Read More
Computer Networks
Information-Security
Right and Left linear Regular Grammars
Regular grammar is a type of grammar that describes a regular language. A regular grammar is a mathematical object, G, which consists of four components, G = (N, E, P, S),...
Read More
GATE CS
Compiler Design
Theory of Computation
Approaches for Test Data Generation in Software Testing
Prerequisite: Software Testing | BasicsAs a tester, you needn't only to test the software product but also have to manage, collect, and maintain a large volume of data set...
Read More
Technical Scripter
Software Engineering
Software Testing
Types of Footprinting in Ethical Hacking
Footprinting is the first step of an attack on information systems in which an attacker collects information about a target network for identifying various ways to intrude...
Read More
Misc
Cyber-security
Inverse of Permutation Group
Inverse of Permutation Group-: If the product of two permutations is the identical permutation then each of them is called inverse of each other.For Example-: The permutat...
Read More
GATE CS
Engineering Mathematics
Technical Scripter 2020
Role of processor in a PC
The processor also known as CPU is a piece of hardware. It is often referred to as the “Brain of a PC” because all the computations and processing are carried out directly...
Read More
GATE CS
Computer Organization & Architecture
Remote Access Trojan
One of the most powerful Trojans that are popularly used by the attacker or hacker is Remote Access Trojan. This is mostly used for malicious purposes. This Trojan ensures...
Read More
Computer Networks
Information-Security
Use of Single Quotes for Stored Procedure Parameters in SQL Server
Whenever any value is passed to the variable or column of character data type, the string value has single quotes('') around them otherwise it will through an error. Below...
Read More
SQL
DBMS-SQL
SQL-Server
Capturing INSERT Timestamp in Table SQL Server
While inserting data in tables, sometimes we need to capture insert timestamp in the table. There is a very simple way that we could use to capture the timestamp of the in...
Read More
SQL
DBMS-SQL
SQL-Server
Conceptual model of ERP
The below figure shows the conceptual model on which ERP theory is based. ERP defines the five measures that govern business policies:Process-based flat organizationAssemb...
Read More
Software Engineering
Difference between Debian and Arch
1. Debian :It is a Linux kernel-based operating system for your computer which comes with a modular and generic installer. The developers’ community offers an appropriate ...
Read More
Difference Between
1
...
6351
6352
6353
...
11204