The one sample Kolmogorov-Smirnov test is used to check whether a data set follows certain distribution of not.For Example, if we have a vector called X and we want to know whether values in X follow normal distribution or not then we can use the command given below −ks.test(X,"pnorm")Check out the below Examples to understand how it works.Example 1Following snippet creates a sample data frame −x1
HCL ConnectionsHCL Connections was founded by IBM and later acquired by HCL in 2019.It's an enterprise collaboration tool that makes it easier for teams to work together more effectively. It is used by both individuals and small/big enterprises. It uses the 2.0 development of the web.They support many types of Plug-ins like Microsoft Outlook, HCL Lotus Notes, HCL Sametime, etc.The pricing starts from 6 $/Month. They do not have a free version.HCL Connections offer their users free 5 GB of storage and maximum storage of 1 TB for paid users with a maximum file size of 2 GB.It is supported ... Read More
DropBoxDropbox is a cloud storage file, synchronization, personal cloud, and client software provided by Dropbox, Inc. Dropbox is an American Corporation headquartered in San Francisco, California. It was created as a start-up company in 2007 by Drew Houston and Arash Ferdowsi, students from MIT. They work on practically all platforms, such as Windows, Mac OS, iOS, Android, and web browsers.The cloud service marketplace is projected to grow in popularity as individuals seek to access their digital information from several locations and devices. DropBox is credited with inventing the storage cloud concept, but it now faces competition.Following are some of the ... Read More
Origin of CryptographyAll great civilizations have strived to send communications in a secure manner. Only the Mesopotamians, ancient Greeks, ancient Chinese, and Spartans utilized encryption to keep their transmissions secret. Though these civilizations utilized advanced cryptography at the time, they were not impenetrable. Throughout the years, cryptography has progressed to a point where our brains are unable to decipher it on their own anymore.As of now, quantum cryptography is the most sophisticated kind of encryption that exists. Although Stephen Wiesner initially proposed it in the 1970s, it was first published in 1983. It's no secret that quantum cryptography is a ... Read More
What is Cybersecurity?Before we can understand what cybersecurity is and what types of risks and vulnerabilities it contains, we must first comprehend the cyberspace. The term "cyberspace" refers to a collection of communication networks, databases, embedded processors, the internet, and controllers used to exchange electronic documents. Telephone wires, coaxial cables, electromagnetic waves, and fiber-optic connections create a global network environment.Though cyberspace and the Internet are sometimes used interchangeably, the Internet is actually a part of cyberspace. To put it another way, cyberspace is a networked Internet environment.Cyber-security can be defined as the process of defending cyberspace from assault, abuse, harm, ... Read More
What is Subnetting?Subnetting is a process of separating a single physical network into several logical subnetworks (subnets).A network segment and a host segment make up an IP address subnets formed by extracting bits from an IP address's host component and establishing several smaller sub-networks within a more extensive network.Subnetting enables a business to expand its network without securing a new network number from its Internet Service Provider (ISP). Subnetting reduces network traffic while also hiding network complexity.Subnetting is required when a single network number must be distributed across multiple parts of a local area network.Subnets were created to alleviate the ... Read More
Classical CryptographyClassical cryptography employs a number of mathematical approaches to prevent eavesdroppers from learning the contents of encrypted transmissions. The most widely used and widely embraced among them are given below. Throughout the article, the transmitter is referred to as 'Alice, ' the receiver is referred to as 'Bob, ' and an eavesdropper is referred to as 'Eve.'Quantum CryptographyIt is a kind of cryptography that uses "quantum mechanics". The creation of a quantum channel necessitates the use of polarising filters at both the transmitter and receiver ends. As a result, at the transmitter end, we can send pictures with a ... Read More
To increase the distance between boxplots created by using ggplot2, we can reduce the widths of the boxplots and hence the distance between the plots will be automatically increased. This will be required when we have large number of categories for which the boxplots are created.Check out the below given example to understand how it can be done.ExampleFollowing snippet creates a sample data frame −Group
The matrices stored in an array cannot directly have zero at lower triangular or upper triangular positions because assignment in arrays is not straight forward. Therefore, to set lower triangular matrices to zero stored in an R array, we can use for loop.Check out the below given example to understand how it can be done.ExampleFollowing snippet creates a sample array −Array
To combine list elements of different sizes in R, we can use expand.grid function. For Example, if we have a list called LIST that contains elements of different sizes then we can combine those items by using the command given below −expand.grid(LIST)Example 1To combine list elements of different sizes in R, use the following snippet −List1
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP