Create Date Column in R Excluding Weekends

Nizamuddin Siddiqui
Updated on 28-Oct-2021 07:33:11

3K+ Views

If we have a vector of dates that contains all days in a week then we can use that vector to create a date column by excluding weekends with the help of subsetting the vector as shown in the below Examples. After subsetting the vector, we will just need to pass the vector in data.frame function.Example 1Consider the below vector of dates −x

Change Border Line Type in Base R Boxplot

Nizamuddin Siddiqui
Updated on 28-Oct-2021 07:23:02

827 Views

The default boxplot in R has straight border line type that display end point(s) excluding outliers. To change these border lines from a boxplot, we can use staplelty argument.For Example, if we have a vector called X then we can create the boxplot of X with different border line type by using the command boxplot(X,staplelty=15). The argument can take different values. Check out the below Examples to understand how it works.ExampleConsider the below vector −x

Use of Callbacks in Layered Architecture

Ayushi Bhargava
Updated on 28-Oct-2021 07:18:51

487 Views

Layered ArchitectureA layered architecture splits a system into many groups, each of which contains code that addresses a specific issue area, and these groups are referred to as layers.The majority of enterprise-level apps have a three-layer high-level application architecture.The Presentation layerThe Business layerThe Persistence layerWhat is a Callback?A callback, sometimes known as a "call-after" function in computer programming, is any executable code that is supplied as an argument to other code, with the expectation that the other code will call back (execute) the input at a specific time. This execution can take place at once, as in a synchronous callback, ... Read More

Types of Wireless and Mobile Device Attacks

Ayushi Bhargava
Updated on 28-Oct-2021 07:17:33

2K+ Views

SMiShingWith the widespread usage of cellphones, smishing has grown more prevalent. Short Message Service (SMS) is used by SMiShing to transmit fraudulent text messages or links. By calling, the crooks deceive the user. Victims may provide sensitive information like credit card numbers, account numbers, and so on. When a user visits a website, he or she may unwittingly download malware that infects the device.War DrivingWar driving is a method employed by attackers to locate entrance points wherever they are. They may drive about and acquire a massive quantity of information in a short period of time because of the availability ... Read More

Types of VPN and Its Protocols

Ayushi Bhargava
Updated on 28-Oct-2021 07:14:43

2K+ Views

VPN is an abbreviation for Virtual Private Network. It allows a person to safely and discreetly connect to a private network over the Web. VPN establishes a secure channel known as a VPN tunnel, through which all Internet traffic and conversation is routed.Remote Access VPNA Remote Access VPN allows people to connect to a private network and remotely access all of its resources and services. The person's connection to the private network is made over the Internet, and the connectivity is safe and confidential. Remote Access VPN is beneficial to both residential and business users.While away from the office, a ... Read More

TCP Client-Server Program to Check Palindrome String

Ayushi Bhargava
Updated on 28-Oct-2021 07:10:30

2K+ Views

A Palindrome is a word, phrase, or sequence that reads the same backward as forward, e.g., "madam" or "nurses run".TCP Client-Server ProgramClient and server configuration in which a client connects transmits a string to the server, and the server displays the original string and sends a confirmation to the client through socket connection whether the string is a palindrome or not.Input − WOWOutput − PalindromeInput − soapOutput − Not PalindromeHow Does It Work?First, establish a client-server connection.After the connection is established, the client utilizes the send system function to deliver the user input string to the server.The server will wait ... Read More

Change Whisker Line Type in Base R Boxplot

Nizamuddin Siddiqui
Updated on 28-Oct-2021 06:58:19

1K+ Views

The default boxplot in R has dotted whisker lines and if we want to change it to something else, we can use the whisklty argument.For Example, if we have a vector called X then we can create the boxplot of X with different whisker line by using the command boxplot(X,whisklty=1). The argument can take different values.Check out the Examples given below to understand how it works.ExampleConsider the vector given below −x

TCP and UDP in Transport Layer

Ayushi Bhargava
Updated on 28-Oct-2021 06:52:54

3K+ Views

Layer 3 or the Network layer employs IP, or Internet Protocol, which is a connectionless protocol that processes each packet independently, resulting in a lack of transmission dependability. When data is transmitted from one host to another, each packet, even though it belongs to the same session, may travel a distinct path. This implies that the packets could or might not arrive in the correct order. As a result, IP’s dependability is reliant on higher-layer protocols.Transmission Control Protocol (TCP)TCP is a protocol that allows data to be sent from one computer to another. TCP is a layer 4 protocol that ... Read More

What is Secure Socket Layer (SSL)

Ayushi Bhargava
Updated on 28-Oct-2021 06:51:45

17K+ Views

Secure Sockets LayerSecure Sockets Layer (SSL) is a standard technique for transmitting documents securely across a network. SSL technology, created by Netscape, establishes a secure connection between a Web server and a browser, ensuring private and secure data transmission. SSL communicates using the Transport Control Protocol (TCP).The term "socket" in SSL refers to the method of sending data via a network between a client and a server.A Web server requires an SSL certificate to establish a secure SSL connection while using SSL for safe Internet transactions. SSL encrypts network connection segments atop the transport layer, a network connection component above ... Read More

Synchronous Optical Network (SONET) in Computer Networks

Ayushi Bhargava
Updated on 28-Oct-2021 06:49:04

8K+ Views

SONET is a standardized digital communication protocol that uses a fiber optic medium to transfer huge amounts of data across great distances. Multiple digital data streams are transmitted via optical fiber at the same time utilizing LEDs and laser beams in SONET.Synchronous optical networking (SONET) and synchronous digital hierarchy (SDH) are established protocols that use lasers or highly coherent light from light-emitting diodes to transport multiple digital bit streams simultaneously across optical fiber (LEDs). Data can also be transmitted over an electrical link at modest transmission rates. The technique was created to replace the plesiochronous digital hierarchy (PDH) system for ... Read More

Advertisements