To iterate elements by className in JavaScript, we will be using getElementsByClassName() method. It is used for getting the collection of all the elements in the document with specified classname. In this article we are having three div elements each having same class name. Our task is to iterate elements by className in JavaScript. Approaches to Iterate Elements by ClassName Here is a list of approaches to iterate elements by className in JavaScript which we will be discussing in this article with stepwise explaination and complete example codes. Iterate Elements by ClassName using for loop ... Read More
By now, you must have gotten a clear picture of IoT and how it is aiding us by making our lives easier. IoT connects sensor devices and the internet for those new to this technology. These devices have sensors that collect the data and send it to the cloud over the internet. Now in the cloud, all the data processing happens. In simpler terms, sensors collect data and send it to the data centre, where it will be analyzed, and commands sent back to sensors. The entire process takes time, and processes are delayed. But then, how do we come ... Read More
In this article, we will learn to compute the sum of numbers in a list using Java with a while-loop. We will look at two examples: one that sums a list of integers and another that sums a list of double values. For each example, we will create an ArrayList to store the numbers, and then use a while-loop to iterate through the list. During the iteration, we will add each number to a variable called "sum, " which will keep track of the total. This will help you understand how to use loops and ArrayLists in Java effectively. Different ... Read More
In this article, we will learn to get the seconds since the beginning of the Java epoch. To get the seconds since the beginning of epochs, you need to use Instant. The method here used is ofEpochSecond() method. The epoch is the number of seconds that have elapsed since 00::00:00 Thursday, 1 January 1970. Get the seconds with ChronoUnit.SECONDS โ long seconds = Instant.ofEpochSecond(0L).until(Instant.now(), ChronoUnit.SECONDS); Stepsย to retrieve seconds since Epoch Following are the stepsย to retrieve seconds since Epoch โ First, we will import the Instant and ChronoUnit classes from the java.time and java.time.temporal packages. ... Read More
In this article, we will learn to find the roots of a quadratic equation using Java. The roots of a quadratic equation are determined by the following formula: $$x = \frac{-b\pm\sqrt[]{b^2-4ac}}{2a}$$ Here we will take input values for the coefficients ๐, ๐, and ๐ of the quadratic equation ๐ ๐ฅ 2 + ๐ ๐ฅ + ... Read More
To insert an image in HTML page, is a very common and easy task that enhances the appearence of any web page. It makes a web age look more attractive. In this article, our task is to insert an image in HTML page. We have used three different approaches using HTML tags and CSS properties to insert an image in HTML page. Approaches to Insert an Image in HTML Page Here is a list of approaches to insert an image in HTML page which we will be discussing in this article with stepwise explaination and complete example codes. ... Read More
The study of secure communications techniques that enable only the sender and the intended recipient of messages to read its contents is known as cryptography. The word "kryptos" comes from the Greek word "kryptos, " which means "hidden." It is closely linked to encryption, which is the process of scrambling plaintext into ciphertext and then back again when it's received. In addition, cryptography includes techniques such as microdots and merging to obfuscate information in photographs. Ancient Egyptians were known to ... Read More
There are various classification of security attack is as follows โ Cryptanalytic attacks These attacks are combination of statistical and algebraic techniques objective at make sure the secret key of a cipher. These technique inspect the numerical properties of the cryptographic algorithms and aims at discovering distinguishers of the output distribution of cryptographic algorithms from the uniform distribution. Non-cryptanalytic attacks Non-cryptanalytic attacks do not exploit the numerical weakness of the cryptographic algorithm. There are three objective of security are confidentiality, integrity and availability can be very much vulnerable by this type of attack. Attacks threatening confidentiality Attacks threatening the confidentiality ... Read More
There are various applications of cryptography which are as follows โ Secrecy in Transmission Some existing secrecy systems for transmission access a private key system for converting transmitted data because it is the quickest approach that functions with rational guarantee and low overhead. If the multiple conversing parties is minute, key distribution is implemented periodically with a courier service and key preservation based on physical security of the keys over the method of use and destruction after new keys are disseminated. Secrecy in Storage Secrecy in storage is frequently preserved by a one-key system where the user provide the key ... Read More
Cryptography is an automated mathematical tool that plays an important role in network security. It supports the confidentiality and integrity of information and provide authentication and non-repudiation to the users. Cryptography is frequently used in distributed applications to transfer recognition and authentication information from one system to another over a network. Cryptographic authentication systems validate a user based on the awareness or control of a cryptographic key. Cryptographic authentication systems can be based on private key cryptosystems or public key cryptosystems. Cryptographic approach can encrypt the biometric templates or images which are saved in a database. It can enhance the ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP