Courses
Tutorials
Jobs
Practice
Contests
Data Structure
Java
Python
HTML
Interview Preparation
Trending Now
DSA
Web Tech
Foundational Courses
Data Science
Practice Problem
Python
Machine Learning
JavaScript
System Design
Django
DevOps Tutorial
Java
C
C++
ReactJS
NodeJS
CP Live
Aptitude
Puzzles
Projects
GBlog
Complete DevOps Roadmap - Beginner to Advanced
DevOps is considered a set of practices that combines the abilities of Software Development i.e Dev and IT Operations i.e Ops together, which results in delivering top-not...
Read More
Wrap every continuous instance of given word with some given string
Given two string S1 and S2. The task is to wrap every instance of string S2 in string S1 with some string on either side.Note: Here we will use underscore(_) for the wrapp...
Read More
Strings
Pattern Searching
DSA
Finding the LCM and HCF of decimal numbers
Finding the LCM and HCF are most frequently asked questions in any competitive exams. Finding LCM and HCF for natural numbers are taught in our school level but in some ex...
Read More
Aptitude
GATE
Engineering Mathematics
GRE
Maximum number of envelopes that can be put inside other bigger envelopes
Given N number of envelopes, as {W, H} pair, where W as the width and H as the height. One envelope can fit into another if and only if both the width and height of one en...
Read More
Arrays
Palantir Technologies
Binary Search
Algorithms
Dynamic Programming
Searching
interview-preparation
LCS
Algorithms-Dynamic Programming
DSA
Length of largest subsequence consisting of a pair of alternating digits
Given a numeric string s consisting of digits 0 to 9, the task is to find the length of the largest subsequence consisting of a pair of alternating digits.An alternating d...
Read More
Strings
Greedy
Mathematical
subsequence
number-digits
School Programming
Numbers
DSA
Find the pair (a, b) with minimum LCM such that their sum is equal to N
Given a number N, the task is to find two numbers a and b such that a + b = N and LCM(a, b) is minimum.Examples:Input: N = 15Output: a = 5, b = 10Explanation:The pair 5, 1...
Read More
Algorithms
Mathematical
Competitive Programming
GCD-LCM
number-theory
C++ Programs
DSA
Point-to-Point Protocol (PPP) Phase Diagram
Point-to-Point Protocol (PPP) was generally invented by Internet Engineering Task Force (IETF) simply to create and develop a data link protocol for point to point lines t...
Read More
Computer Networks
Data Link Layer
Commands required to configure PPP
Nowadays, several commands are available on the router to simply configure, manage, and handle Point-to-Point Protocol (PPP) on the router. Configuration simply means proc...
Read More
Computer Networks
Frame Format of BISYNC
Binary Synchronous Communication Protocol (BISYNC) is a byte oriented communication protocol and a data link layer protocol, developed by IBM. In a byte oriented approach,...
Read More
Computer Networks
Difference between WiFi and MiFi
1. Wireless Fidelity (WiFi):WiFi stands for Wireless Fidelity. It is a trademark of the Wi-Fi Alliance, and refers to a wireless networking standard based on IEEE 802.11. ...
Read More
Computer Networks
Difference Between
ADD PPP Command in PPP Configuration
To use a physical layer, ADD command, as the name suggests, is required to add synchronous port, ISDN call, ACC call, MIOX circuit, etc. simply to the Point-to-Point Proto...
Read More
Computer Networks
Enable PPP Debug Command in PPP Configuration
For specified Point-to-Point Protocol (PPP) interface, Enable PPP Debug Command, as name suggests, generally enables all of the debugging options. If PORT parameter was no...
Read More
Computer Networks
Link Access Protocol D-channel (LAPD)
LAPD or Link Access Protocol on D channel is basically Layer 2 protocol usually required on ISDN D channel. It is being derived from Link Access Protocol Balanced (LAPB) p...
Read More
Computer Networks
Introduction to TELNET
Pre-Requisite: Types of Network ProtocolTELNET stands for Teletype Network. It is a type of protocol that enables one computer to connect to the local computer. It is used...
Read More
Computer Networks
Different types of CAPTCHAs
Types of CAPTCHAs :Fundamental math :It is one of most widely recognized types of captcha being utilized in better places like sites, forms, and so forth. A captcha struct...
Read More
Computer Networks
Network-security
Python | Imputation using the KNNimputer()
KNNimputer is a scikit-learn class used to fill out or predict the missing values in a dataset. It is a more useful method which works on the basic approach of the KNN alg...
Read More
Python
Machine Learning
1
...
7094
7095
7096
...
10993