Relations can be used to order some or all the elements of a set. For instance, the set of Natural numbers is ordered by the relation such that for every ordere
SEQUENCE: It is a set of numbers in a definite order according to some definite rule (or rules). Each number of the set is called a term of the sequence and its
Prerequisite – Combinatorics Basics Several Counting problems require finding the number of ways to arrange a certain number of distinct elements, where the r
Prerequisite – Graph Theory Basics Certain graph problems deal with finding a path between two vertices such that each edge is traversed exactly once, or find
Isomorphism : Consider the following two graphs – Are the graphs and the same? If your answer is no,then you need to rethink. The graphical arrangement of the
1. Limits – For a function the limit of the function at a point is the value the function achieves at a point which is very close to . Formally, Let be a func
Artificial Intelligence is the theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception
A path traversal attack allows attackers to access directories that they should not be accessing, like config files or any other files/directories that may cont
Command injection is basically injection of operating system commands to be executed through a web-app. The purpose of the command injection attack is to inject
We have introduced and discussed importance of hashed passwords. To create strong hashed passwords, we must understand some terminology related to it and then w
What are these? Little and big endian are two ways of storing multibyte data-types ( int, float, etc). In little endian machines, last byte of binary representa
Every application(program) comes into execution through means of process, process is a running instance of a program. Processes are created through different sy
fgetc() fgetc() is used to obtain input from a file single character at a time. This function returns the number of characters read by the function. It returns
In C and C++, comma (,) can be used in two contexts: 1) Comma as an operator: The comma operator (represented by the token ,) is a binary operator that evaluate
HTML and ASP are two very common aspects in the web programming world. HTML stands for HyperText Markup Language used to develop webpages and specifically web d
A variable in simple terms is a storage place which has some memory allocated to it. Basically, a variable used to store some form of data. Different types of v
Reduced Set Instruction Set Architecture (RISC) – The main idea behind is to make hardware simpler by using an instruction set composed of a few basic steps f
Subscript : For adding a subscript text in a html file, tag can be used. The sub tag defines subscript text. Subscript text appears half a character below the n
1. Multiprocessor: A Multiprocessor is a computer system with two or more central processing units (CPUs) share full access to a common RAM. The main objective
In this article we look at what an Instruction Set Architecture (ISA) is and what is the difference between an ‘ISA’ and Microarchitecture. An ISA is define
Colors are used to make the page more attractive. Here are the different styles which can be used to create new colors by combination of different colors. Hexad
Internal structure of Memory either RAM or ROM is made of memory cells which contains a memory bit. Basically group of 8 bits makes a word. Now the memory is fo
Prerequisite – Introduction to Hadoop, Apache Hive The major components of Hive and its interaction with the Hadoop is demonstrated in the figure below and al
Hive: Hive is a datawarehousing package built on the top of Hadoop. It is mainly used for data analysis. It generally target towards users already comfortable w
Relational Database Management System (RDBMS) – RDBMS is for SQL, and for all modern database systems like MS SQL Server, IBM DB2, Oracle, MySQL, and Microsof