In this article, we will understand how to check whether the given string is a pangram in Java. A string is a pangram string if it contains all the characters of the alphabet ignoring the case of the alphabet. Here, we will be using two different approaches: using the main() method and using encapsulation. Problem Statement Given a string write a program in Java to find whether the string is pangram or not. Below is a demonstration of the same − Input Input string: Abcdefghijklmnopqrstuvwxyz Output Yes, the string is a pangram Different approaches Following are the steps to check whether ... Read More
In this article, we will learn how to fill elements in a long array in Java using the Arrays.fill() method. This method allows us to assign a specific long value to all elements of the array. The Arrays.fill() function is a simple way to initialize or overwrite the values in an array. It requires two parameters: the array to be filled and the value to be stored in each element. Problem StatementGiven a long array of size 5, write a Java program to fill each element of the array with the value 125 using the Arrays.fill() method.Input longArray = new ... Read More
In this article, we will learn how to find the nth multiple of a given number in the Fibonacci series using Java. The Fibonacci series is a sequence where each number is the sum of the two preceding ones. We will use loops, conditional statements, and the modulus operator to find the position of the nth multiple of a specific number in the series. Problem StatementGiven a number and its multiple positions, find the position of the nth multiple of a number in the Fibonacci series. Input A number whose multiple is to be found: 9The nth ... Read More
In this article, we will learn how to swap two numbers using the XOR bitwise operator in Java. The XOR operator is a powerful tool that allows you to perform bitwise operations, and one of its interesting properties is that it can be used to swap two variables without using a temporary variable. This method is efficient and can be used when you need a fast swapping mechanism. Problem StatementGiven two integers, write a Java program to swap their values using the XOR operator.Input Two integers are provided by the user.Output The values of the two integers after swapping. ... Read More
Introduction Access networks are means by which internet service providers (ISPs) provide internet connectivity to their customers. They are final part of infrastructure that connects end-users to internet. Access networks can be wired or wireless and have different characteristics that make them suitable for different applications. Wired Access Networks Wired access networks are a type of computer network infrastructure that uses physical cables or wires to connect devices to internet or a local network. They are typically installed in buildings or homes to provide a stable and reliable connection to internet or other devices within network. Wired access networks have ... Read More
SQL Injection is a common security vulnerability. It occurs when an attacker manipulates a web application's database queries by injecting malicious SQL code. One of the most critical areas for SQL Injection exploitation is the login page of an application. When a user enters their credentials, these inputs are typically used to construct a database query to verify the user’s identity. If the application does not properly sanitize these inputs, an attacker can bypass authentication by injecting SQL statements that modify the intended query, granting them unauthorized access. What is SQL Injection? SQL injection is a code injection technique that ... Read More
In today's digital world, cyber attacks are becoming increasingly sophisticated, and organizations must continuously monitor and improve their security measures. Penetration testing, commonly known as pen testing, is a crucial step in identifying vulnerabilities and weaknesses in an organization's systems, networks, and applications. One critical area that needs to be tested is the organization's Active Directory (AD). This article will discuss Active Directory pen testing, why it is essential, and some examples of AD vulnerabilities. What is Active Directory? Active Directory is a directory service developed by Microsoft for managing and organizing information about users, computers, and other resources in ... Read More
ExcelJS is a JavaScript library that provides a convenient solution for working with '.xlsx' files, allowing you to read, manipulate, and save data programmatically using Node.js. In this tutorial, we'll walk through the steps for reading from and writing to Excel files in Node.js using ExcelJS. You'll learn how to initialize a workbook, read data from existing Excel files, dynamically build new worksheets, and save updates. Each section includes practical examples to help you apply the concepts in real-world scenarios. Prerequisite You should have a basic understanding of JavaScript You should ... Read More
In this article, we will show you how to find the minimum distance from each cell in a binary matrix to the nearest cell that contains the digit 1. We will see brute force as well as optimized approaches. Problem Statement Given a binary matrix, our task is to calculate the minimum distance for each cell to the nearest cell that contains the value 1, and if the current cell itself has 1 as a value, the distance will be 0. If the input matrix is as follows - 0 0 1 1 1 0 0 0 0 The ... Read More
Introduction PPP (Point-to-Point Protocol) is a network protocol that allows communication between two devices over a point-to-point connection. It is a widely used protocol for establishing and managing Internet connections over dial-up, DSL, and other types of connections. PPP uses a variety of commands to configure and manage communication session between two devices. One such command is "ADD PPP" command. In this article, we will discuss ADD PPP command in PPP configuration, its significance, and various examples of its usage. What is ADD PPP Command? The ADD PPP command is a configuration command used to create a new PPP session ... Read More
 
 Data Structure
 Data Structure Networking
 Networking RDBMS
 RDBMS Operating System
 Operating System Java
 Java MS Excel
 MS Excel iOS
 iOS HTML
 HTML CSS
 CSS Android
 Android Python
 Python C Programming
 C Programming C++
 C++ C#
 C# MongoDB
 MongoDB MySQL
 MySQL Javascript
 Javascript PHP
 PHP 
		 
		 
		 
		 
		 
		