Anagrams − An anagram is a word or a phrase formed by rearranging the alphabets of another word or phrase, usually once. Some examples of anagrams are given below − Top - Pot Silent - Listen Post - Stop Dog - God Problem Statement Given an array of words arr[]. For the given array print all the anagrams together. Sample Example 1 Input arr[] = {“star”, “god”, “vile”, “save”, “evil”, “care”, “arts”, “race”, “dog”, “vase”} Output arts star care race dog god evil vile save vase ... Read More
Given a scenario of a company where meetings are held during fixed time slots. These slots might be overlapping or distant. Thus, optimizing meeting efficiency is important in order to accommodate maximum meetings without any conflicts between schedules. In the problem given, we’ll be going through such an optimizing meeting efficiency problem. Problem Statement Given a two-dimensional array time[][] containing the start time and end time of all the meetings that are scheduled for that day. The task is to find the time interval when most of the meetings are occurring. Sample Example 1 Input: time[][] = {{1, 5}, {2, 6}, {3, 7}, {4, ... Read More
In order to design efficient data structures for specific operations, the time and space complexity of the given operations for the data structure created is important. Looking into some basic operations and how they can be efficiently optimized − insert() − Inserts an element to the data structure Dynamic Arrays, Hash Tables, Binary Search Trees and Balanced Search Trees like AVL Trees or Red-Black Trees are the most efficient choice of data structures providing O(1) complexity for insertions operation. delete() − Deletes an element from the data structure Hash tables approach the deletion process in O(1) time while Binary Search Trees and Balanced Search ... Read More
The N-ary tree is a tree data structure where each node can have a maximum of N children where N is a positive integer (N >= 0). N-ary trees are used in many applications like file systems, organizational charts and syntax trees in programming languages. Example of N-ary tree with N = 4. A / / \ \ B C D E / | \ ... Read More
Symmetric Key Cryptography In symmetric key cryptography, an individual key is used for both encryption and decryption. The sender needs the key to encrypt the plaintext and sends the cipher document to the receiver. The receiver used the similar key (or ruleset) to decrypt the message and recover the plaintext. Because an individual key is used for both functions, symmetric key cryptography is also known as symmetric encryption. Symmetric key cryptography schemes are usually categorized such as stream ciphers or block ciphers. Stream ciphers works on a single bit (byte or computer word) at a time and execute some form ... Read More
What is Reveal.js? Reveal.js is an open-source HTML framework which helps users to create different types of presentations for free. Open web technologies are used to develop presentations on the Reveal.js framework. You can use CSS to change the style of your presentation. You can also use JavaScript API to enhance your presentation. You can run the program on any of the web browsers. Price Plans of Reveal.js Reveal.js is a free tool and you can use all its features without paying any money. Why Reveal.js Alternatives? Customization options are limited The dashboard of the app needs improvement Working ... Read More
What is React? React is a JavaScript library and is used to develop the frontend of web applications. The library came into the picture in 2013 and now it is being widely used to develop user interfaces. Dynamic web applications can be easily created you have to write less code in comparison to JavaScript and this code can add more functionalities to the app being developed. Applications developed on this platform perform well. Price Plans of React React is an open-source and free library and there is no need to pay for anything to use the framework. Why React Alternatives? ... Read More
IEEE 802.3 is a set of standards and protocols that define Ethernet-based networks. Ethernet technologies are primarily used in LANs, though they can also be used in MANs and even WANs. IEEE 802.3 defines the physical layer and the medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks.IEEE 802.3 Popular VersionsThere are a number of versions of IEEE 802.3 protocol. The most popular ones are.IEEE 802.3: This was the original standard given for 10BASE-5. It used a thick single coaxial cable into which a connection can be tapped by drilling into the cable to the ... Read More
Full Wave Rectifier is a diode circuit which is used to transform the complete cycle of Alternating Voltage (AC Supply) to Direct Voltage (DC Supply).In full wave rectification, current flows through the load in the same direction for the complete cycle of input AC Supply.Types of Full Wave RectifiersCentre Tap Full Wave RectifierFull Wave Bridge RectifierCentre Tap Full Wave RectifierThe circuit of centre tap full wave rectifier consists of following main components −Two DiodesA centre-tapped transformerA load resistanceWorking of Centre – Tap FWR CircuitPositive Half CycleDuring the positive half cycle of input AC voltage, the end A of secondary winding ... Read More
What is Mojeek? Mojeek is a search engine which provides search results on the basis of its own index of web pages. It does not rely on other search engines to provide results. Mojeek has its own crawler that helps in making an index. Different sets of results will always be found for a query. It also uses its own ranking algorithm to give rank to web pages and URLs. Why Mojeek Alternatives? A large index is needed to provide search results The user interface needs improvement How to Choose a Mojeek Alternative? There are many advantages to ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP