Iterate Through getElementsByClassName in JavaScript

AmitDiwan
Updated on 21-Oct-2024 18:03:56

11K+ Views

To iterate elements by className in JavaScript, we will be using getElementsByClassName() method. It is used for getting the collection of all the elements in the document with specified classname. In this article we are having three div elements each having same class name. Our task is to iterate elements by className in JavaScript. Approaches to Iterate Elements by ClassName Here is a list of approaches to iterate elements by className in JavaScript which we will be discussing in this article with stepwise explaination and complete example codes. Iterate Elements by ClassName using for loop ... Read More

IoT, Edge Computing and Data Sustainability

Devang Delvadiya
Updated on 21-Oct-2024 18:03:05

241 Views

By now, you must have gotten a clear picture of IoT and how it is aiding us by making our lives easier. IoT connects sensor devices and the internet for those new to this technology. These devices have sensors that collect the data and send it to the cloud over the internet. Now in the cloud, all the data processing happens. In simpler terms, sensors collect data and send it to the data centre, where it will be analyzed, and commands sent back to sensors. The entire process takes time, and processes are delayed. But then, how do we come ... Read More

Compute Sum of Numbers in a List Using While Loop in Java

Bharti Kumari
Updated on 21-Oct-2024 17:42:02

746 Views

In this article, we will learn to compute the sum of numbers in a list using Java with a while-loop. We will look at two examples: one that sums a list of integers and another that sums a list of double values. For each example, we will create an ArrayList to store the numbers, and then use a while-loop to iterate through the list. During the iteration, we will add each number to a variable called "sum, " which will keep track of the total. This will help you understand how to use loops and ArrayLists in Java effectively. Different ... Read More

Get Seconds Since the Beginning of the Java Epoch

Samual Sam
Updated on 21-Oct-2024 17:41:50

943 Views

In this article, we will learn to get the seconds since the beginning of the Java epoch. To get the seconds since the beginning of epochs, you need to use Instant. The method here used is ofEpochSecond() method. The epoch is the number of seconds that have elapsed since 00::00:00 Thursday, 1 January 1970. Get the seconds with ChronoUnit.SECONDS โˆ’ long seconds = Instant.ofEpochSecond(0L).until(Instant.now(), ChronoUnit.SECONDS); Stepsย to retrieve seconds since Epoch Following are the stepsย to retrieve seconds since Epoch โˆ’ First, we will import the Instant and ChronoUnit classes from the java.time and java.time.temporal packages. ... Read More

Find Roots of a Quadratic Equation in Java

Lakshmi Srinivas
Updated on 21-Oct-2024 17:40:26

14K+ Views

In this article, we will learn to find the roots of a quadratic equation using Java. The roots of a quadratic equation are determined by the following formula: $$x = \frac{-b\pm\sqrt[]{b^2-4ac}}{2a}$$ Here we will take input values for the coefficients ๐‘Ž, ๐‘, and ๐‘ of the quadratic equation ๐‘Ž ๐‘ฅ 2 + ๐‘ ๐‘ฅ + ... Read More

Insert Image in HTML Page

Lokesh Badavath
Updated on 21-Oct-2024 14:57:03

95K+ Views

To insert an image in HTML page, is a very common and easy task that enhances the appearence of any web page. It makes a web age look more attractive. In this article, our task is to insert an image in HTML page. We have used three different approaches using HTML tags and CSS properties to insert an image in HTML page. Approaches to Insert an Image in HTML Page Here is a list of approaches to insert an image in HTML page which we will be discussing in this article with stepwise explaination and complete example codes. ... Read More

What is Cryptography: Definition, Process, and Types

Ayushi Bhargava
Updated on 21-Oct-2024 14:43:56

7K+ Views

The study of secure communications techniques that enable only the sender and the intended recipient of messages to read its contents is known as cryptography. The word "kryptos" comes from the Greek word "kryptos, " which means "hidden." It is closely linked to encryption, which is the process of scrambling plaintext into ciphertext and then back again when it's received. In addition, cryptography includes techniques such as microdots and merging to obfuscate information in photographs. Ancient Egyptians were known to ... Read More

Classification of Security Attacks in Information Security

Ginni
Updated on 21-Oct-2024 14:38:17

3K+ Views

There are various classification of security attack is as follows โˆ’ Cryptanalytic attacks These attacks are combination of statistical and algebraic techniques objective at make sure the secret key of a cipher. These technique inspect the numerical properties of the cryptographic algorithms and aims at discovering distinguishers of the output distribution of cryptographic algorithms from the uniform distribution. Non-cryptanalytic attacks Non-cryptanalytic attacks do not exploit the numerical weakness of the cryptographic algorithm. There are three objective of security are confidentiality, integrity and availability can be very much vulnerable by this type of attack. Attacks threatening confidentiality Attacks threatening the confidentiality ... Read More

Applications of Cryptography in Information Security

Ginni
Updated on 21-Oct-2024 14:29:41

5K+ Views

There are various applications of cryptography which are as follows โˆ’ Secrecy in Transmission Some existing secrecy systems for transmission access a private key system for converting transmitted data because it is the quickest approach that functions with rational guarantee and low overhead. If the multiple conversing parties is minute, key distribution is implemented periodically with a courier service and key preservation based on physical security of the keys over the method of use and destruction after new keys are disseminated. Secrecy in Storage Secrecy in storage is frequently preserved by a one-key system where the user provide the key ... Read More

Basic Terms Used in Cryptography in Information Security

Ginni
Updated on 21-Oct-2024 14:26:44

3K+ Views

Cryptography is an automated mathematical tool that plays an important role in network security. It supports the confidentiality and integrity of information and provide authentication and non-repudiation to the users. Cryptography is frequently used in distributed applications to transfer recognition and authentication information from one system to another over a network. Cryptographic authentication systems validate a user based on the awareness or control of a cryptographic key. Cryptographic authentication systems can be based on private key cryptosystems or public key cryptosystems. Cryptographic approach can encrypt the biometric templates or images which are saved in a database. It can enhance the ... Read More

Advertisements