A Unijunction Transistor (UJT) is a three-terminal semiconductor device. The main characteristics of UJT is when it is triggered, the emitter current increases re-generatively until it is limited by emitter power supply. Due to this characteristic feature, it is used in applications like switching pulse generator, saw-tooth wave generator etc.Construction of UJTThe UJT consists of an n-type silicon semiconductor bar with an electrical on each end. The terminals of these connections are called Base terminals (B1 and B2). Near to base B2, a pn-junction is formed between a p-type emitter and the n-type silicon bar. The terminal of this junction ... Read More
ProblemDrawing of ER model of university database application considering the constraints −A university has many departments.Each department has multiple instructors (one person is HOD). Here the HOD refers to the head of department.An instructor belongs to only one department.Each department offers multiple courses, each subject is taught by a single instructor.A student may enroll for many courses offered by different departments.SolutionFollow the steps given below to draw an Entity Relationship (ER) diagram for a University database application −Step 1 − Identifying the entity sets.The entity set has multiple instances in a given business scenario.As per the given constraints the entity ... Read More
Hamming DistanceHamming distance is a metric for comparing two binary data strings. While comparing two binary strings of equal length, Hamming distance is the number of bit positions in which the two bits are different.The Hamming distance between two strings, a and b is denoted as d(a, b).It is used for error detection or error correction when data is transmitted over computer networks. It is also using in coding theory for comparing equal length data words.Calculation of Hamming DistanceIn order to calculate the Hamming distance between two strings, and , we perform their XOR operation, (a⊕ b), and then count ... Read More
Both BJTs and FETs are transistors widely used in different types of electronic applications. Go through this article to find out the important features of BJTs and FETs and how they differ from each other in the way they function.What is BJT?BJT stands for Bipolar Junction Transistor. The BJT is the type of transistor in which the current flow is due to two types of charge carriers viz. electrons and holes. A BJT consists of three alternating layers of P-type and N-type semiconductor materials and two P-N junctions.When P-type semiconductor material is sandwiched between two N-type layers, the bipolar junction ... Read More
To delete the registry key using PowerShell, we can use the Remove-Item command. Remove-Item command removes the registry key from the path specified. For example, we have the registry key name NodeSoftware stored at the path HKLM, under the Software key.To delete the key we will use the below command.Remove-Item -Path HKLM:\SOFTWARE\NodeSoftware -Force -VerboseWe can also use the Get-Item command to retrieve the Key name and then use the Remove-Item after pipeline.Get-Item HKLM:\SOFTWARE\NodeSoftware | Remove-Item -Force -Verbose
JSON (JavaScript object notation) is a powerful data format to exchange data from server to client and vice versa. HTML tables are powerful tools to represent data in tabular format so that it becomes very easy to read, analyze and compare. It is very common in web development to convert JSON data into HTML tables. In this article, we will learn how to convert JSON data into HTML tables using Javascript as well as jQuery. By the end of this article, you will have a solid understanding of JSON to HTML table conversion. Convert JSON data into HTML tables using ... Read More
In Intel 8051, there are two 16-bit timer registers. These registers are known as Timer0 andTimer1. The timer registers can be used in two modes. These modes areTimer mode and the Counter mode. The only difference between these two modes is the source for incrementing the timer registers. Timer ModeIn the timer mode, the internal machine cycles are counted. So this register is incremented in each machine cycle. So when the clock frequency is 12MHz, then the timer register is incremented in each millisecond. In this mode it ignores the external timer input pin.Counter ModeIn the counter mode, the external events ... Read More
The reflected binary code or Gray code is an ordering of the binary numeral system such that two successive values differ in only one bit (binary digit). Gray codes are very useful in the normal sequence of binary numbers generated by the hardware that may cause an error or ambiguity during the transition from one number to the next. So, the Gray code can eliminate this problem easily since only one bit changes its value during any transition between two numbers.Conversion of Gray to Binary CodeGray codes are used in rotary and optical encoders, Karnaugh maps, and error detection. The ... Read More
An operating system is a construct that allows the user application programs to interact with the system hardware. Operating system by itself does not provide any function but it provides an atmosphere in which different applications and programs can do useful work.The major operations of the operating system are process management, memory management, device management and file management. These are given in detail as follows:Process ManagementThe operating system is responsible for managing the processes i.e assigning the processor to a process at a time. This is known as process scheduling. The different algorithms used for process scheduling are FCFS (first ... Read More
A database administrator (DBA) is a person or group in charge of implementing DBMS in an organization. The DBA job requires a high degree of technical expertise. DBA consists of a team of people rather than just one person.The primary role of Database administrator is as follows −Database designPerformance issuesDatabase accessibilityCapacity issuesData replicationTable MaintenanceResponsibilities of DBAThe responsibilities of DBA are as follows −Makes the decision concerning the content of the database.Plans the storage structure and access strategy.Provides the support to the users.Defines the security and integrity checks.Interpreter backup and recovery strategies.Monitoring the performance and responding to the changes in the ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP