Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles on Trending Technologies
Technical articles with clear explanations and examples
8085 program to convert gray to binary
Now let us see a program of Intel 8085 Microprocessor. This program will convert gray code to binary code.Problem StatementWrite an assembly language program for 8085 to convert gray code to binary code. The data is stored at address 8200H & store the result at memory location 8201H.DiscussionHere we are loading the number from memory and in each step we are performing right shift, and XOR the intermediate result with the previous one. Thus we are getting the result. In the following demonstration you can get the logic.C 1110 1011 (A) (EBH) 07H 0111 ...
Read MoreMYSQL: Can you pull results that match like 3 out of 4 expressions?
You can use CASE statement to get the results that match some expressions−SELECT *FROM yourTableName WHERE CASE WHEN yourColumnName1 = yourValue1 THEN 1 ELSE 0 END + CASE WHEN yourColumnName2 = yourValue2 THEN 1 ELSE 0 END + CASE WHEN yourColumnName3 = yourValue3 THEN 1 ELSE 0 END + . . CASE WHEN yourColumnNameN = yourValueN THEN 1 ELSE 0 END > = 3;To understand the above syntax, let us create a table. The query to create a table is as follows −mysql> create table UserInformation -> ( -> Id int NOT NULL AUTO_INCREMENT, ...
Read MoreWhat is Elliptic Curve Cryptography?
Elliptic curve cryptography is used to implement public key cryptography. It was discovered by Victor Miller of IBM and Neil Koblitz of the University of Washington in the year 1985. ECC popularly used an acronym for Elliptic Curve Cryptography. It is based on the latest mathematics and delivers a relatively more secure foundation than the first generation public key cryptography systems for example RSA.Elliptic CurvesIn 1985, cryptographic algorithms were proposed based on elliptic curves. An elliptic curve is the set of points that satisfy a specific mathematical equation. They are symmetrical.UsesWebsites make extensive use of ECC to secure customers’ hypertext ...
Read MoreHow to replace values of select return in MySQL?
You can use select case statement for this. The syntax is as follows.select yourColumnName1, yourColumnName2, ...N, case when yourColumnName=1 then 'true' else 'false' end as anyVariableName from yourTableName;To understand the above syntax, let us create a table. The query to create a table is as follows.mysql> create table selectReturnDemo -> ( -> Id int, -> Name varchar(100), -> isGreaterthan18 tinyint(1) -> ); Query OK, 0 rows affected (0.62 sec)Now you can insert some records in the table using insert command. The query is as follows.mysql> insert into selectReturnDemo values(1, 'Carol', 0); Query OK, 1 row affected (0.23 sec) mysql> ...
Read MoreHow to limit excessive use of mobile?
Today’s age is a technology-driven age. Mobile phones are the most used gadget at the moment. Be it rich or poor, young or old, mobiles have become a part and parcel for each one of us. However, the cell phone has a lot of adverse effects like back pain, stress, irritation, and depression, radiations harming us leading to different nervous disorders and the others.Limiting Mobile Phone UsagePlace the phone down on a hard surface if one is texting. One can even hold the phone in one hand and text with the other. This will increase the time of texting and ...
Read MoreHow to encrypt the MS word files?
A procedure should be followed for encrypting an MS word document. Encryption is nothing but protecting your document from a third party. First, let us look into the definition of encryption.What is Encryption? How do we use Encryption?The word encryption is derived from the Greek word Kryptos means hidden or a secret.There are certain algorithms to use encryption like RSA algorithms and Diffie-Hellman key exchange algorithms.These algorithms led to the use of encryption in commercial and consumer realms to protect data.The password is the best example of encryption.Encryption is used in sending data across all the networks and ATM is ...
Read MoreUpdate MySQL date and increment by one Year?
You can use in-built function date_add() from MySQL. The syntax is as follows −UPDATE yourTableName SET yourDateColumnName=DATE_ADD(yourDateColumnName, interval 1 year);To understand the above syntax, let us first create a table. The query to create a table is as follows −mysql> create table UpdateDate -> ( -> Id int, -> DueDate datetime -> ); Query OK, 0 rows affected (0.76 sec)Insert some records in the table using insert command. The query to insert record is as follows −mysql> insert into UpdateDate values(1001, '2012-5-21'); Query OK, 1 row affected (0.17 ...
Read MoreWhat is the best way to display in Terminal a MySQL SELECT returning too many fields?
To achieve this, you can use the following syntax in MySQL −select *from yourTableName\G;Here, G can be used for vertical purpose. You need to add yourTableName.Let us create a table in order to understand the above syntax. Creating a table with the help of CREATE command.The following is the query to create a table −mysql> create table TooManyFieldsreturnDemo -> ( -> Id int, -> Name varchar(100), -> Age int -> ); Query OK, 0 rows affected (0.64 sec)Now you can insert records in the table ...
Read MoreHow to search for exact string in MySQL?
You can use binary to search for exact string in MySQL. The syntax is as follows:SELECT * FROM yourTableName WHERE BINARY yourColumnName = yourStringValue;To understand the above syntax, let us create a table. The query to create a table is as follows:mysql> create table ExactSearch -> ( -> Id int NOT NULL AUTO_INCREMENT, -> UserId varchar(10), -> UserName varchar(20), -> PRIMARY KEY(Id) -> ); Query OK, 0 rows affected (0.69 sec)Insert some records in the table using insert command. The query is as follows:mysql> insert into ExactSearch(UserId, UserName) values('USER12', 'John'); Query OK, 1 row ...
Read MoreHow to subtract 30 days from the current datetime in MySQL?
To subtract 30 days from current datetime, first we need to get the information about current date time, then use the now() method from MySQL. The now() gives the current date time.The method to be used for this is DATE_SUB() from MySQL. Here is the syntax to subtract 30 days from current datetime.The syntax is as follows −DATE_SUB(NOW(), INTERVAL 30 DAY);The above syntax calculates the current datetime first and in the next step, subtracts 30 days. Let us first seethe query to get the current datetime −mysql> select now();Here is the output −+---------------------+ | now() ...
Read More