Courses
Tutorials
Jobs
Practice
Contests
Data Structure
Java
Python
HTML
Interview Preparation
Trending Now
DSA
Web Tech
Foundational Courses
Data Science
Practice Problem
Python
Machine Learning
JavaScript
System Design
Django
DevOps Tutorial
Java
C
C++
ReactJS
NodeJS
CP Live
Aptitude
Puzzles
Projects
GBlog
Frontend Developer Roadmap 2024
Frontend development means to design the face of a website or application. It involves working on the appearance of the website. Building interactive buttons, using images...
Read More
Intersection of two subgroups of a group is again a subgroup
Group :It is a set equipped with a binary operation that combines any two elements to form a third element in such a way that three conditions called group axioms are sati...
Read More
Engineering Mathematics
Difference between GSM and GPRS
1. Global Systems for Mobile (GSM) :GSM is a cellular standard for mobile phone communications to cater to voice services and data delivery using digital modulation where ...
Read More
Computer Networks
Difference Between
Difference between Propositional Logic and Predicate Logic
Logical reasoning forms the basis for a huge domain of computer science and mathematics. They help in establishing mathematical arguments, valid or invalid.1. Propositiona...
Read More
Engineering Mathematics
Difference Between
Difference between Software Encryption and Hardware Encryption
1. Software Encryption: Software Encryption, as the name suggests, is a process of keeping data safe using the software. In this, the software is generally installed in th...
Read More
Computer Networks
Difference Between
Difference between Cryptography and Cyber Security
In today's world, where technology has become an integral part of our lives, ensuring the security of our digital data has become more important than ever. Cryptography an...
Read More
cryptography
Computer Networks
Cyber-security
Importance of Two Factor Authentication
Two-factor authentication referred to us a two-step of verification, Most of the user use one-factor authentication to log in to their social media or to any platform on t...
Read More
Technical Scripter
Computer Networks
Technical Scripter 2020
Data Flow Diagram for Online Banking System
Data Flow Diagrams are used to represent the flow of data as well as the processes and functions involved to store, manipulate, and distribute data among various component...
Read More
Software Engineering
∈-NFA of Regular Language L = bc(ab+c)*a+
Finite Automata can be classified into three types-DFANFA∈-NFA.The only difference between ∈-NFA and NFA is that ∈-NFA has a different transition function than regular NFA...
Read More
Theory of Computation
What are Worm Watcher & Antidotes
Introduction:Any self-propagating program that will call any sort of damage to the system is a kind of worm that will get activated it does not need a host program like a ...
Read More
Computer Networks
Difference between Encryption and Cryptography
1. Encryption :Encryption, as name suggests, is generally a technique that is used to conceal message using algorithms. It is fundamental application of cryptography that ...
Read More
cryptography
Computer Networks
Difference Between
Difference between Tokenization and Encryption
1. Tokenization :Tokenization, as name suggests, is basically a replacement technique that replace sensitive data with randomly generated code that is known as token. Here...
Read More
Computer Networks
Difference Between
Difference between the keylogger and the Remote AccessTrojans
1. Remote Access Trojans :This Remote Access Trojan popularity increased in the year of 2000s. In this period people didn't have sufficient knowledge of how this virus spr...
Read More
Computer Networks
Difference Between
30 Days to Form a New Habit of Coding – Are You In?
Many times we have seen people, especially students, complaining about how they can't maintain consistency while doing Coding and solving programming problems. All the exc...
Read More
GBlog
GFG-Course
GFG-Update
Gblog-2021
Goldman Sachs Interview Experience for Summer Analyst Internship'21
CODING TESTThe test has 5 sections and duration is 2 hours 15 minutes. All sections are mandatory.The Coding section has 2 programming questions and duration is 30 mins.Th...
Read More
Goldman Sachs
Interview Experiences
Internship
Experiences
Count maximum number of consumable candies
Given two arrays A[] and B[] consisting of N integers representing the amount of each type of candies and maximum consumable limit respectively, and an integer M which rep...
Read More
Arrays
Greedy
Mathematical
DSA
1
...
6538
6539
6540
...
11365