Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles on Trending Technologies
Technical articles with clear explanations and examples
Embedded SQL, Dynamic SQL, and SQLJ
Embedded SQL Embedded SQL is a method that combines SQL with a high−level programming language's features. It enables programmers to put SQL statements right into the source code files used to set up an application. Database operations may be carried out effortlessly by developers by adding SQL statements to the application code. The source code files having embedded SQL statements should be preprocessed before compilation because of the issue of interpretation of SQL statements by the high−level programming languages in embedded SQL. The terms EXEC SQL and END_EXEC must be used before and after each SQL statement in the source ...
Read MoreEmbedded SQL in DBMS
Embedded SQL is a powerful method that allows the integration of high−level programming languages with database management systems (DBMS). It acts as a bridge between applications and databases which helps in data manipulation and communication. Various database management systems offer embedded SQL, giving developers the freedom to select the one that best serves their requirements. Popular DBMS that support Embedded SQL are Altibase, IBM Db2, Microsoft SQL Server, Mimer SQL, Oracle Database, PostgreSQL, and SAP Sybase. Need of Embedded SQL The goal to make database interactions simpler for application developers and end users determines the demand for embedded SQL. ...
Read MoreWhy Small Businesses Are Prime Targets for Cyberattacks?
Small businesses, due to their lack of cybersecurity resources, have become an easy target for cybercriminals. Start-ups in most of the cases have weak security measures, which leaves them vulnerable to ransomware, data breaches, and other online dangers. This increasing danger highlights how important it is for small businesses to recognize their risks and take preventative measures to safeguard their operations.Why Small Businesses are Prime Targets for Cyberattacks?In this section, I have listed down some of the prime reasons why small businesses become victims of cyberattacks - Absence of Strict Security MeasuresSmall businesses may have limited resources, making it difficult to ...
Read MoreJava Program to insert styled text in a JTextPane Component
In this article we will learn to insert styled text into a JTextPane component in Java. The JTextPane component is a versatile text editor that supports rich text features, including the ability to style text with different fonts, colors, and sizes. By leveraging the StyledDocument and Style classes, you can insert styled text dynamically into a JTextPane using Java Swing. Insert styled text in a JTextPane component using the SimpleAttributeSet and StyleConstants classes. With that, we will also use StyledDocument. Java Swing The Swing API is a collection of flexible GUI components designed to simplify the development of Java-based front-end ...
Read MoreJava Program to find Product of unique prime factors of a number
In this article, we will learn to calculate the product of the unique prime factors of a given number using Java. Prime factorization plays a crucial role in many mathematical and computational problems, and understanding how to work with prime factors can help you solve complex challenges efficiently. Problem Statement Given a positive integer n, the task is to find the product of the unique prime factors of n. The objective is to calculate the product of all distinct prime factors of n that divide it exactly. Input 68 Output 34 Since the unique prime factors of 68 are 2 ...
Read MoreJava Program for GCD of more than two (or array) numbers
In this article, we will learn to calculate the GCD of more than two numbers in Java. We will discuss two approaches, the recursive method and an optimized approach using the Euclidean algorithm. The Greatest Common Divisor (GCD) of two or more integers is the largest integer that divides all the numbers without leaving a remainder. When it comes to an array of numbers, finding the GCD means determining the GCD of all the elements in the array. Problem Statement Given an array of integers, find the GCD of all the elements.Example −Input {7, 49, 177, 105, 119, 42} Output ...
Read MoreJava Program to convert from a java.util.Date Object to a java.sql.Date Object
In this article, we will learn to convert a java.util.Date object to a java.sql.Date object in Java. This is a common requirement when working with databases, as many database systems use the java.sql.Date class to represent date values. While java.util.Date is used for general date and time representation in Java, java.sql.Date is specifically designed to handle SQL-compatible date formats. java.util.Date The Date class in the java.util package representing a specific moment in time, measured in milliseconds since January 1, 1970, UTC (the "epoch"). It's a general-purpose date and time representation. java.sql.Date A subclass of ...
Read MoreWhy Educating Employees Is Key to Preventing Data Breaches?
Data breaches are the most common problem these days. With new emerging technologies, implementations are sometimes not done with proper security practises in mind, leading to data breaches. Organisations deploy every sophisticated product in the market, yet still, data breaches happen. Why? Human errors are the answer! In this article, let's explore why educating employees is the key to preventing data breaches in 2025 and beyond. What is a Data Breach? A data breach takes place when any private information is accessed by anyone without permission. This information or data can be anything such as your debit/credit card details, passwords, ...
Read MoreHow to prevent cookie leaks in a cross-site scripting attack
Cross-site scripting (XSS) attacks are among the most common vulnerabilities found in web applications. An attacker attends a user's browsing session, often deceptively by propelling a malicious script, but the user is using a trusted site. The most important effect of XSS is that it allows an attacker to steal sensitive cookies by unauthorized acquisition, causing identity theft or session hijacking.What XSS attacks are, how cookies are compromised because of them, and most importantly, how to implement effective safeguards against the leaking cookies during such attacks will all be revealed in this article.What is Cross-site Scripting?Cross-site scripting (XSS) is a ...
Read MoreDifference Between Password Spraying and Dictionary Attack
It is vital in cybersecurity to learn how to prevent different types of cyber attacks. Many different mechanisms are used by attackers when targeting user credentials; two of the most common types of attacks are dictionary attacks and password spraying. Both of these try to penetrate a password, but their approaches and situations are quite different. In this article, we will examine the differences between these two attack methods, and we will also explore how they work and what are the preventive measures. What is Password Spraying? One of these attack techniques is called password spraying where an attacker ...
Read More