Variables such as integers can be represent in two ways, i.e., signed and unsigned. Signed numbers use sign flag or can be distinguish between negative values and positive values. Whereas unsigned numbers stored only positive numbers but not negative numbers.Number representation techniques like: Binary, Octal, Decimal, and Hexadecimal number representation techniques can represent numbers in both signed and unsigned ways. Binary Number System is one the type of Number Representation techniques. It is most popular and used in digital systems. Binary system is used for representing binary quantities which can be represented by any device that has only two operating ... Read More
Private Keys and Public Keys terms are used in cryptography. These keys are used to encrypt/decrypt sensitive data. Read through this article to find out more about private and public keys and how they are different from each other.What is Private Key?The private key is used in both encryption as well as decryption. This key is shared between the sender and receiver of the encrypted sensitive information. The private key is also called "symmetric" because it is shared by both parties. Private key cryptography is faster than public-key cryptography mechanism.A private key is generally a lengthy, non-guessable sequence of bits ... Read More
Recursion and Iteration both repeatedly execute the set of instructions. Recursion occurs when a statement in a function calls itself repeatedly. The iteration occurs when a loop repeatedly executes until the controlling condition becomes false. The basic difference between recursion and iteration is that recursion is a process always applied to a function and iteration is applied to the set of instructions which we want to be executed repeatedly. Read through this article to find out more about Recursion and Iteration and how they are different from each other. What is Recursion? Recursion is defined as a process in which a function calls itself repeatedly. Recursion uses selection structure. If the recursion step does ... Read More
Both Routers and Switches are network connecting devices. Routers work at the network layer and are responsible to find the shortest path for a packet across the network, whereas Switches connect various devices in a network. Routers connect devices across multiple networks. Read through this article to find out more about these two network devices and how they operate to understand how they are different from each other. What is a Router? Routers are network connecting devices that determine the shortest path for a packet to take to get to its destination. A router's primary function is to connect ... Read More
A Unijunction Transistor (UJT) is a three-terminal semiconductor device. The main characteristics of UJT is when it is triggered, the emitter current increases re-generatively until it is limited by emitter power supply. Due to this characteristic feature, it is used in applications like switching pulse generator, saw-tooth wave generator etc.Construction of UJTThe UJT consists of an n-type silicon semiconductor bar with an electrical on each end. The terminals of these connections are called Base terminals (B1 and B2). Near to base B2, a pn-junction is formed between a p-type emitter and the n-type silicon bar. The terminal of this junction ... Read More
ProblemDrawing of ER model of university database application considering the constraints −A university has many departments.Each department has multiple instructors (one person is HOD). Here the HOD refers to the head of department.An instructor belongs to only one department.Each department offers multiple courses, each subject is taught by a single instructor.A student may enroll for many courses offered by different departments.SolutionFollow the steps given below to draw an Entity Relationship (ER) diagram for a University database application −Step 1 − Identifying the entity sets.The entity set has multiple instances in a given business scenario.As per the given constraints the entity ... Read More
Hamming DistanceHamming distance is a metric for comparing two binary data strings. While comparing two binary strings of equal length, Hamming distance is the number of bit positions in which the two bits are different.The Hamming distance between two strings, a and b is denoted as d(a, b).It is used for error detection or error correction when data is transmitted over computer networks. It is also using in coding theory for comparing equal length data words.Calculation of Hamming DistanceIn order to calculate the Hamming distance between two strings, and , we perform their XOR operation, (a⊕ b), and then count ... Read More
Both BJTs and FETs are transistors widely used in different types of electronic applications. Go through this article to find out the important features of BJTs and FETs and how they differ from each other in the way they function.What is BJT?BJT stands for Bipolar Junction Transistor. The BJT is the type of transistor in which the current flow is due to two types of charge carriers viz. electrons and holes. A BJT consists of three alternating layers of P-type and N-type semiconductor materials and two P-N junctions.When P-type semiconductor material is sandwiched between two N-type layers, the bipolar junction ... Read More
To delete the registry key using PowerShell, we can use the Remove-Item command. Remove-Item command removes the registry key from the path specified. For example, we have the registry key name NodeSoftware stored at the path HKLM, under the Software key.To delete the key we will use the below command.Remove-Item -Path HKLM:\SOFTWARE\NodeSoftware -Force -VerboseWe can also use the Get-Item command to retrieve the Key name and then use the Remove-Item after pipeline.Get-Item HKLM:\SOFTWARE\NodeSoftware | Remove-Item -Force -Verbose
JSON (JavaScript object notation) is a powerful data format to exchange data from server to client and vice versa. HTML tables are powerful tools to represent data in tabular format so that it becomes very easy to read, analyze and compare. It is very common in web development to convert JSON data into HTML tables. In this article, we will learn how to convert JSON data into HTML tables using Javascript as well as jQuery. By the end of this article, you will have a solid understanding of JSON to HTML table conversion. Convert JSON data into HTML tables using ... Read More