Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles on Trending Technologies
Technical articles with clear explanations and examples
Difference between Magnetic Tape and Magnetic Disk
Both Magnetic Tape and Magnetic Disk are the type of non-volatile magnetic memory and used to store the data. On the basis of architecture and features we can distinguish between both Magnetic Tape Memory and Magnetic Disk Memory. Following are the important differences between Magnetic Tape Memory and Magnetic Disk Memory.Sr. No.KeyMagnetic Tape MemoryMagnetic Disk Memory1DefinitionMagnetic tape is type of non-volatile memory uses thin plastic ribbon is used for storing data and as data use to be stored on ribbon so data read/write speed is slower due to which is mainly used for data backups.On other hand Magnetic Disk is ...
Read MoreDifference between Where and Having
Both Where and Having are the two keywords used in SQL query to filter and summarize the data that is retrieved from database based on given condition.On the basis of features of both keywords we can distinguish between Where and Having as follows −Sr. No.KeyWhereHaving1DefinitionWHERE clause in SQL query specifies search conditions for the rows returned by the it and limits rows to a specific row-set. In case if user wants to get the particular records based on some specific classification or condition then using ‘where’ clause is useful.The WHERE clause is used to specify the required condition (on aggregate ...
Read MoreNumber of Paths with Max Score in C++
Suppose we have a square board of characters. We can move on the board starting at the bottom right square marked with the character 'S'. Now we need to reach the top left square marked with the character 'E'. The other squares are labeled either with a numeric character from 1 to 9 or with an obstacle 'X'. In one move we can go up, left or up-left only when there is no obstacle there.We have to find the list of two numbers: the first number is the maximum sum of the numeric characters we can collect, and the second ...
Read MoreBinary Tree Cameras in C++
Suppose we have a binary tree; we place cameras on the nodes of the tree. Now each camera at a node can monitor its parent, itself, and its children. We have to find the minimum number of cameras needed to monitor all nodes of the tree.So, if the input is like −then the output will be 1, because only one camera is enough to track all.To solve this, we will follow these steps −Define one set called covered, of type TreeNode (Tree node has left, right and data field)Define a function solve(), this will take node, parent, if node is ...
Read MoreWhat is the difference between BLOB and CLOB datatypes?
Blob and Clob together are known as LOB(Large Object Type). The following are the major differences between Blob and Clob data types.BlobClobThe full form of Blob is a Binary Large Object.The full form of Clob is Character Large Object.This is used to store large binary data.This is used to store large textual data.This stores values in the form of binary streams.This stores values in the form of character streams.Using this you can stores files like videos, images, gifs, and audio files.Using this you can store files like text files, PDF documents, word documents etc.MySQL supports this with the following datatypes:TINYBLOBBLOBMEDIUMBLOBLONGBLOBMySQL ...
Read MoreExplain Try/Catch/Finally block in PowerShell
Try/Catch block in PowerShell is to handle the errors which are produced in the script. To be specific, the errors should be terminating errors. The Finally block in the PowerShell is not mandatory to write each time along with Try/Catch but it will be executed regardless the error occurs or not.So when you use the Try block, the Catch block is mandatory but not Finally block.Try/Catch block with Terminating error − Below is the example of Terminating error without finally block.Exampletry{ This is not allowed "This is Allowed" } catch{ Write-Host "Error occured" -BackgroundColor DarkRed }OutputPS C:\WINDOWS\system32> ...
Read MoreCount divisors of n that have at-least one digit common with n in Java
We are given with a number let’s say, num and the task is to calculate the divisor of a given number thereby count the divisors of num that have at least one digit common with n.Input − num = 24Output − Count is 4Explanation − we will perform the following steps −Firstly, calculate the divisors of a given numberDivisors of 24 are − 1, 2, 3, 4, 6, 8, 12, 24Secondly, check which divisor have at least one digit that matches with the digits of a number2, 4, 12, 24 are the divisors that contain the digit that matches with ...
Read MoreStream of Characters in C++
Suppose we want to implement the StreamChecker class as follows −StreamChecker(words) − This is the constructor, this initializes the data structure with the given words.query(letter) − This returns true when for some k >= 1, the last k characters queried (in order from oldest to newest, including this letter just queried) spell one of the words in the given list.So, if the input is like word list = ["ce", "g", "lm"], then call query many times for [a, b, c, e, f, g, h, i, j, k, l, m], then the output will be true for e, g, m, and ...
Read MoreEPC Gen 2 Tag Identification Layer
Tag identification layer of Electronic Product Code (EPC) Gen 2 lays down the method by which the readers can receive the identifiers from the tags. EPC Gen 2 (second generation) RFID (Radio Frequency Identification) network has two main components, tags and readers. RFID tags are affixed on objects with EPC encoded on them for identification. EPC helps to check identities of objects like inventory, assets and people, and track them. Readers are the intelligent part of the system that tracks the tags. The tag identification layer addresses the multiple access problem of getting messages from unknown number of tags.Working PrincipleIn ...
Read MoreWhat is backscatter?
Backscatter is a method that uses an incident radio-frequency (RF) signal to transmit data without a battery or power source. It employs passive reflection and modulation of the incoming RF signal, and converts it into tens or hundreds of microwatts of electricity, that can be encoded for data communications.It differs from other wireless communications since the communication is half duplex in nature, i.e. both the sender and receiver cannot transmit simultaneously. The mains advantage of backscattering is that it’s low energy requirements and low complexity of deployment.Architecture of backscatter communicationsA basic backscatter communication system has two main components: tags, and ...
Read More