Custom Checkbox with CSS Appearance Property

AmitDiwan
Updated on 31-Oct-2023 14:16:58

2K+ Views

We use the appearance property to style an element according to the platform-native style of the user’s operating system. The custom checkbox looks different from the default checkbox, and after selecting it the appearance will change. Syntax The syntax of CSS appearance property is as follows − Selector { appearance: /*value*/; -webkit-appearance: /*value*/; /*for Safari and Chrome */ -moz-appearance: /*value*/; /*for Firefox */ } Create a Round Custom Checkbox To create a round custom checkbox, we have set the following style with border-radius and box-shadow. The appearance is set ... Read More

Check If Value Exists in Another Column

Shibanshu Manna
Updated on 31-Oct-2023 14:15:17

146K+ Views

When working with a large array of cells, manually cross-checking if a specific cell value is repeated in another column in the spreadsheet can be difficult and lead to skewed results. Fortunately, there are several options in Microsoft Excel that allow you to do this quickly and efficiently. In a few simple steps in this tutorial, we demonstrate how to use the Excel functions like VLOOKUP and MATCH to cheack if a value from one column exists in any other column in a worksheet. Method 1 Finding If Value Exists In Another Column Using VLOOKUP Function As shown in the ... Read More

CSMA with Collision Detection (CSMA/CD)

Rama Giri
Updated on 31-Oct-2023 14:10:36

75K+ Views

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a network protocol for carrier transmission that operates in the Medium Access Control (MAC) layer. It senses or listens whether the shared channel for transmission is busy or not, and defers transmissions until the channel is free. The collision detection technology detects collisions by sensing transmissions from other stations. On detection of a collision, the station stops transmitting, sends a jam signal, and then waits for a random time interval before retransmission.AlgorithmsThe algorithm of CSMA/CD is:When a frame is ready, the transmitting station checks whether the channel is idle or busy.If ... Read More

Difference Between Half Wave and Full Wave Rectifier

Manish Kumar Saini
Updated on 31-Oct-2023 14:06:59

84K+ Views

A rectifier is an electronic circuit that converts the alternating current (AC) into direct current (DC). The process of conversion of alternating current into direct current is known as rectification. The rectifier consists of semiconductor diodes to perform the rectification.Depending upon the type of conversion of AC into DC, i.e., half cycle of AC into DC or full cycle of AC into DC, the rectifiers are classified into two categories viz. −Half Wave RectifierFull Wave RectifierIn this article, we will discuss about the differences between half-wave rectifier and full-wave rectifier. Also, we will briefly discuss about the half-wave rectifier and ... Read More

Different Types of YouTube Video Categories

Revathi Reddy
Updated on 31-Oct-2023 13:58:45

79K+ Views

Do you produce YouTube videos? Are you struggling to receive the anticipated number of video views? You're definitely not doing something correctly. You might not be familiar with YouTube's functionality or SEO. Not to worry! This article was written to assist you in growing your YouTube channel. This blog's main goal is to help you understand how YouTube functions and the significance of the various YouTube video categories. So let's get going. Meaning of YouTube Video Categories On the YouTube platform, channels and videos can be arranged using YouTube video categories. It goes without saying that you will get ... Read More

Instruction Cycle in Computer Architecture

Ginni
Updated on 31-Oct-2023 13:56:42

91K+ Views

A program consisting of the memory unit of the computer includes a series of instructions. The program is implemented on the computer by going through a cycle for each instruction.In the basic computer, each instruction cycle includes the following procedures −It can fetch instruction from memory.It is used to decode the instruction.It can read the effective address from memory if the instruction has an indirect address.It can execute the instruction.After the following four procedures are done, the control switches back to the first step and repeats the similar process for the next instruction. Therefore, the cycle continues until a Halt ... Read More

Types of Addressing Modes

Ginni
Updated on 31-Oct-2023 13:52:16

77K+ Views

The operands of the instructions can be located either in the main memory or in the CPU registers. If the operand is placed in the main memory, then the instruction provides the location address in the operand field. Many methods are followed to specify the operand address. The different methods/modes for specifying the operand address in the instructions are known as addressing modes.Types of Addressing ModesThere are various types of Addressing Modes which are as follows −Implied Mode − In this mode, the operands are specified implicitly in the definition of the instruction. For example, the instruction "complement accumulator" is ... Read More

Techniques of Storage Allocation in Compiler Design

Ginni
Updated on 31-Oct-2023 13:50:45

58K+ Views

There are various storage allocation techniques are as follows −Static AllocationIt is the simplest allocation scheme in which allocation of data objects is done at compile time because the size of every data item can be determined by the compiler.Recursive Subprogram and Arrays of adjustable length are not permitted in a language. In static allocation, the compiler can decide the amount of storage needed by each data object. Thus, it becomes easy for a compiler to identify the address of these data in the activation record.FORTRAN uses this kind of storage allocation strategies.AdvantagesIt is easy to implement.It allows type checking ... Read More

Conversion of Binary to Gray Code

Ankith Reddy
Updated on 31-Oct-2023 13:38:45

79K+ Views

The reflected binary code or Gray code is an ordering of the binary numeral system such that two successive values differ in only one bit (binary digit). Gray codes are very useful in the normal sequence of binary numbers generated by the hardware that may cause an error or ambiguity during the transition from one number to the next. So, the Gray code can eliminate this problem easily since only one bit changes its value during any transition between two numbers.Conversion of Binary to Gray CodeGray codes are used in rotary and optical encoders, Karnaugh maps, and error detection. The ... Read More

Get Environment Variable Value Using PowerShell

Chirag Nagrekar
Updated on 31-Oct-2023 13:31:58

87K+ Views

Environment variables are an essential part of the Operating System. They store various information like the path of the system files and folders, the number of processors system running, current user details, and more. Processes and programs utilize these environment variables to retrieve the data for their execution.Environment variables in PowerShell are stored as PS drive (Env: ). To retrieve all the environment variables stored in the OS you can use the below command.Get-ChildItem -Path Env:Name                        Value ----                       ... Read More

Advertisements