Recent
chevron_left

Featured Bloggers

amna
dev
kylejones
mayankpathak
Mbaoma
mjg

Recent Posts

2 0 3 min.
The C language shook the computer world. Its impact should not be underestimated, because it fundamentally changed the way programming was approached and thought about. The creation of C was a direct ...
posted 6 hours ago Takele 262 points
2 0 2 min.
A linked list is a linear collection (i.e., a sequence) of self-referential-class objects, called nodes, connected by reference links—hence, the term “linked” list. Typically, a program accesses a lin...
posted 6 hours ago Takele 262 points
2 0 1 min.
A sequential search is not very efficient for large lists. It typically searches about half of the list. However, if the list is sorted, you can use another search algorithm called binary search. A bi...
posted 6 hours ago Takele 262 points
2 0 6 min.
All object-oriented programming languages provide mechanisms that help you implement the object-oriented model. They are encapsulation, inheritance, and polymorphism. Let’s take a look at these concep...
posted 6 hours ago Takele 262 points
2 0 2 min.
System You’re probably familiar with System.in and System.out. But what about System.getProperty? The getProperty method reveals all kinds of information about your computer. Some of the information ...
posted 6 hours ago Takele 262 points
2 0 1 min.
Before defining IoT, it may be worthwhile listing the most generic enablement components. In its simple form, IoT may be considered as a network of physical elements empowered by: • Sensors: to collec...
posted 6 hours ago Takele 262 points
2 0 1 min.
Competitive programming combines two topics: the design of algorithms and the implementation of algorithms. Design of Algorithms The core of competitive programming is about inventing efficient algori...
posted 6 hours ago Takele 262 points
2 0 1 min.
The Java cryptographic extensions contain a class Cipher that is the superclass of all encryption algorithms. To get a cipher object, call the getInstance method: Cipher cipher = Cipher.getIn...
posted 6 hours ago Takele 262 points
2 0 1 min.
The AES cipher that you have seen in the preceding section is a symmetric cipher. The same key is used for both encryption and decryption. The Achilles heel of symmetric ciphers is key distribution. I...
posted 6 hours ago Takele 262 points
2 0 2 min.
A message digest is a digital fingerprint of a block of data. For example, the socalled SHA-1 (Secure Hash Algorithm #1) condenses any data block, no matter how long, into a sequence of 160 bits (20 b...
posted 6 hours ago Takele 262 points
0 0 2 min.
In this article, let us decipher BufferedReader class of the character streams. BufferedReader BufferedReader class extends abstract class Reader. public class BufferedReader extends Reader -->...
posted 23 hours ago DivyaN 354 points
edited 22 hours ago by DivyaN
0 0 4 min.
Recursion may seem confusing and hard to understand at first, but in this article, I'm going to explain it in a very simple and friendly way. What Is Recursion? Oooo, Who lives in a pineapple un...
posted 1 day ago Vanza Setia 3 points
0 0 1 min.
Variables in python A variable is a storage location in memory with a unique name. In other words, it is a container for values that are stored in the memory. Example: name= "Jack" # a string stored ...
posted 1 day ago Riya 3 points
0 0 6 min.
Using the command line is fun but it is always better to have an interactive GUI. Many programming languages have a way of creating graphical interfaces. Some, like Python, provide special bindings fo...
posted 1 day ago gursimar 3 points
2 0 2 min.
Applet What Java book is complete without some mention of applets? An applet is a piece of code that runs inside a Web browser window. For example, a small currency calculator running in a little rect...
posted 1 day ago Takele 262 points
2 0 2 min.
The key that allows Java to solve both the security and the portability problems just described is that the output of a Java compiler is not executable code. Rather, it is bytecode. Bytecode is a high...
posted 1 day ago Takele 262 points
2 0 3 min.
Streams Java programs perform I/O through streams. A stream is an abstraction that either produces or consumes information. A stream is linked to a physical device by the Java I/O system. All streams ...
posted 1 day ago Takele 262 points
2 0 1 min.
To encrypt, you need to generate a key. Each cipher has a different format for keys, and you need to make sure that the key generation is random. Follow these steps: 1. Get a KeyGenerator for your alg...
posted 1 day ago Takele 262 points
2 0 1 min.
In a 2-D coordinate system the X axis generally points from left to right, and the Y axis generally points from bottom to top. When we add the third coordinate, Z, we have a choice as to whether the Z...
posted 1 day ago Takele 262 points
2 0 1 min.
IOI The International Olympiad in Informaticsis an annual programming contest for secondary school students. Each country is allowed to send a team of four students to the contest. There are usually a...
posted 1 day ago Takele 262 points