Articles on Trending Technologies

Technical articles with clear explanations and examples

Java program to find the roots of a quadratic equation

Lakshmi Srinivas
Lakshmi Srinivas
Updated on 21-Oct-2024 15K+ Views

In this article, we will learn to find the roots of a quadratic equation using Java. The roots of a quadratic equation are determined by the following formula: $$x = \frac{-b\pm\sqrt[]{b^2-4ac}}{2a}$$ Here we will take input values for the coefficients 𝑎, 𝑏, and 𝑐 of the quadratic equation 𝑎 đ‘„ 2 + 𝑏 đ‘„ + ...

Read More

What is Cryptography? (Definition, Process, and Types)

Ayushi Bhargava
Ayushi Bhargava
Updated on 21-Oct-2024 7K+ Views

The study of secure communications techniques that enable only the sender and the intended recipient of messages to read its contents is known as cryptography. The word "kryptos" comes from the Greek word "kryptos, " which means "hidden." It is closely linked to encryption, which is the process of scrambling plaintext into ciphertext and then back again when it's received. In addition, cryptography includes techniques such as microdots and merging to obfuscate information in photographs. Ancient Egyptians were known to ...

Read More

What are the classification of security attacks in information security?

Ginni
Ginni
Updated on 21-Oct-2024 3K+ Views

There are various classification of security attack is as follows − Cryptanalytic attacks These attacks are combination of statistical and algebraic techniques objective at make sure the secret key of a cipher. These technique inspect the numerical properties of the cryptographic algorithms and aims at discovering distinguishers of the output distribution of cryptographic algorithms from the uniform distribution. Non-cryptanalytic attacks Non-cryptanalytic attacks do not exploit the numerical weakness of the cryptographic algorithm. There are three objective of security are confidentiality, integrity and availability can be very much vulnerable by this type of attack. Attacks threatening confidentiality Attacks threatening the confidentiality ...

Read More

What are the applications of cryptography in information security?

Ginni
Ginni
Updated on 21-Oct-2024 5K+ Views

There are various applications of cryptography which are as follows − Secrecy in Transmission Some existing secrecy systems for transmission access a private key system for converting transmitted data because it is the quickest approach that functions with rational guarantee and low overhead. If the multiple conversing parties is minute, key distribution is implemented periodically with a courier service and key preservation based on physical security of the keys over the method of use and destruction after new keys are disseminated. Secrecy in Storage Secrecy in storage is frequently preserved by a one-key system where the user provide the key ...

Read More

What are the basic terms used in cryptography in information security?

Ginni
Ginni
Updated on 21-Oct-2024 4K+ Views

Cryptography is an automated mathematical tool that plays an important role in network security. It supports the confidentiality and integrity of information and provide authentication and non-repudiation to the users. Cryptography is frequently used in distributed applications to transfer recognition and authentication information from one system to another over a network. Cryptographic authentication systems validate a user based on the awareness or control of a cryptographic key. Cryptographic authentication systems can be based on private key cryptosystems or public key cryptosystems. Cryptographic approach can encrypt the biometric templates or images which are saved in a database. It can enhance the ...

Read More

How Netflix Warms Petabytes of Cache Data

Bhavya jaiswal
Bhavya jaiswal
Updated on 21-Oct-2024 249 Views

As one of the world's biggest streaming services, Netflix has a problem: to delivery high-quality video content to millions of users at any time. One part of this complex problem is so-called caching warmup: the strategy of storing copies of frequently accessed data closer to the users to reduce latency and make the streams smoother.Read this article to understand the several strategies and technologies that Netflix adopted in order to warm its cache up as efficiently as possible to give its viewers' the best possible viewing experience.Predictive Caching Predictive caching is the fundamental technique used by Netflix to predict what ...

Read More

Java program to find the area of a parallelogram

AmitDiwan
AmitDiwan
Updated on 21-Oct-2024 702 Views

In this article, we will understand how to find the area of a parallelogram using Java. A parallelogram has two pairs of parallel equal opposite sides. It has a base and a height which is the perpendicular distance between the base and its opposite parallel side. The area of a parallelogram is calculated using the formula − base * height i.e. b x h Problem Statement Write a program in Java to find the area of a parallelogram. Below is a demonstration of the same − Input Base : 6 Height : 8 Output Area parallelogram is ...

Read More

Java program to get date for all the days of the current week

Krantik Chavan
Krantik Chavan
Updated on 18-Oct-2024 1K+ Views

In this article, we will learn to get date for all the days of the current week using Java. We will use the java.time package to get the current date and calculate the dates for the rest of the week based on the current day.  Steps to get date for all the days of the current week Following are the steps to get date for all the days of the current week − First we will import the DayOfWeek and LocalDate from java.time and Arrays class from java.util. We will get the current ...

Read More

Java program to display table with columns in the output using Formatter

Samual Sam
Samual Sam
Updated on 18-Oct-2024 1K+ Views

In this article, we will learn to display a table with columns in the output using Formatter in Java. The table will have headings and show different calculations of an array of floating-point numbers. The first column will display the original number, the second will display the number rounded up, and the third will display the number rounded down. Problem Statement Write a Java program to display a table with columns in the output using Formatter. Input double arr[] = { 1.7, 2.5, 3.1, 4.5, 5.7, 6.9, 7.7, 8.9, 9.1 }; Output The point list... Points1 Points2 Points3 1.70 2.00 1.00 2.50 ...

Read More

Java program to display Floyd\'s triangle

Pranay Arora
Pranay Arora
Updated on 18-Oct-2024 1K+ Views

In this article, we are going to see how to display Floyd’s Triangle using Java. Floyd's triangle is a popular right-angled triangular array consisting of natural numbers. It is formed by starting with the number 1 at the top of the triangle, and then incrementing each subsequent number by 1 as you move down the rows of the triangle. The first row contains only 1 number which is 1 itself and each subsequent row contains 1 more number than the previous row. The triangle has n rows where n can be any positive whole number. The total number of values in ...

Read More
Showing 31821–31830 of 61,297 articles
Advertisements