When you write for someone else who pays you just for your efforts and has claimed over the content you created as per your agreement with him, it is ghostwriting. In other words, it's like conceiving a surrogate baby whom you can't claim. However, you needn't get tensed about this aspect of ghostwriting because it is a vast niche today and there are scores of people all over the world who are doing it day in and out.Digital MarketingTake the case of the vast and fast-growing digital marketing industry. Depending on the size of their operations, these online businesses upload ... Read More
Hamming code is a block code that is capable of detecting up to two simultaneous bit errors and correcting single-bit errors. It was developed by R.W. Hamming for error correction.In this coding method, the source encodes the message by inserting redundant bits within the message. These redundant bits are extra bits that are generated and inserted at specific positions in the message itself to enable error detection and correction. When the destination receives this message, it performs recalculations to detect errors and find the bit position that has error.Hamming Code for Single Error CorrectionThe procedure for single error correction by ... Read More
The char_length() can be used to display the length of a string. Let us see an example to get the length of the string included as a parameter.mysql> select char_length('John');The following is the output.+---------------------+ | char_length('John') | +---------------------+ | 4 | +---------------------+ 1 row in set (0.00 sec)The length() function can be used to display the length of string measured in bytes. In many cases characters and bytes gives the same length.Here is an example of length()mysql> select length('Tim'); The following is ... Read More
The impact of technology has been nothing short of phenomenal on the lives of people with disabilities. Nothing articulates this better than the statement by Mary Pat Radabaugh, Director of IBM National Support Center for Persons with Disabilities - "For most people, technology makes things easier.Technology Makes Things PossibleFor people with disabilities, technology makes things possible." That's one of the most accurate observations on the matter and it is based on a whole list of examples that could be found across different parts of the world. In fact, there's a term that has been coined specifically for this kind of ... Read More
It really depends on your comfort level at your place of work and that's as basic as it gets. The irony here is that you just can't afford to feel comfortable in any place of work for the simple reason that these places aren't designed for comfort. You have to operate like a special forces soldier in enemy territory, alert and alive to the slightest movement in your immediate vicinity or beyond.Find Your Comfort In DiscomfortAs they say in the special forces, you sleep with one eye open and your boots on and you will have to find your comfort ... Read More
Using share preference, we can store or retrieve values as key and value pair. There are five different methods are available in share preference as shown below −Edit() − It going to edit shared preference valuescommit() − it going to commit shared preference values in xml fileapply() − It going to commit back changes from editor to shared preference.remove(String key) − It going to remove key and vales from shared preference use key.Put() − It going to put key and values to shared preference xml.A sample example syntax of shared preference as shown below −final SharedPreferences sharedPreferences = getSharedPreferences("USER", MODE_PRIVATE);In ... Read More
Whenever you find that your content has been copied, don't wait to take action but at the same time, don't jump the gun by shooting off a legal notice right away. That would be your last resort and before that, you need to try a few easier methods to sort out the problem.Intimate with A Polite NoteYou could begin by sending a mail-in polite but firm language so that the copier gets the message that he's dealing with someone who knows how things work online. Get a screenshot of the copied content on his webpage and highlight it in red ... Read More
We can convert JS date time to MySQL datetime with the help of toISOString() function.Let us see an example of JavaScript.Example Live Demo Web Page Design document.writeln(new Date().toISOString().slice(0, 19).replace('T', ' ')); Current Date is displayed above... OutputThe following is the output.2018-11-23 11:14:38 Current Date is displayed above...
This example demonstrate about How to set ImageView in edittext while entering text.Step 1 − Create a new project in Android Studio, go to File ⇒ New Project and fill all required details to create a new project.Step 2 − Add the following code to res/layout/activity_main.xml. In the above code, we have taken edit text and added background as background.xml.Step 3 − Add the following code to drawable/ background.xml Step 4 − Add the following code to java/MainActivity.xmlpackage com.example.myapplication; import android.annotation.TargetApi; import android.graphics.Bitmap; import android.graphics.BitmapFactory; import android.graphics.Canvas; import android.graphics.Color; ... Read More
This example demonstrate about How to set Image View in edit text.Step 1 − Create a new project in Android Studio, go to File ⇒ New Project and fill all required details to create a new project.Step 2 − Add the following code to res/layout/activity_main.xml. In the above code, we have taken edit text and added background as background.xml.Step 3 − Add the following code to drawable/ background.xml Let's try to run your application. I assume you have connected your actual Android Mobile device with your computer. To run the ... Read More