Articles on Trending Technologies

Technical articles with clear explanations and examples

8085 program to convert gray to binary

Vrundesha Joshi
Vrundesha Joshi
Updated on 30-Jul-2019 2K+ Views

Now let us see a program of Intel 8085 Microprocessor. This program will convert gray code to binary code.Problem StatementWrite an assembly language program for 8085 to convert gray code to binary code. The data is stored at address 8200H & store the result at memory location 8201H.DiscussionHere we are loading the number from memory and in each step we are performing right shift, and XOR the intermediate result with the previous one. Thus we are getting the result. In the following demonstration you can get the logic.C       1110 1011    (A) (EBH) 07H     0111 ...

Read More

MYSQL: Can you pull results that match like 3 out of 4 expressions?

Arjun Thakur
Arjun Thakur
Updated on 30-Jul-2019 122 Views

You can use CASE statement to get the results that match some expressions−SELECT *FROM yourTableName WHERE CASE WHEN yourColumnName1 = yourValue1 THEN 1 ELSE 0 END +    CASE WHEN yourColumnName2 = yourValue2 THEN 1 ELSE 0 END +    CASE WHEN yourColumnName3 = yourValue3 THEN 1 ELSE 0 END +    .    . CASE WHEN yourColumnNameN = yourValueN THEN 1 ELSE 0 END > = 3;To understand the above syntax, let us create a table. The query to create a table is as follows −mysql> create table UserInformation    -> (    -> Id int NOT NULL AUTO_INCREMENT, ...

Read More

What is Elliptic Curve Cryptography?

Ridhi Arora
Ridhi Arora
Updated on 30-Jul-2019 14K+ Views

Elliptic curve cryptography is used to implement public key cryptography. It was discovered by Victor Miller of IBM and Neil Koblitz of the University of Washington in the year 1985. ECC popularly used an acronym for Elliptic Curve Cryptography. It is based on the latest mathematics and delivers a relatively more secure foundation than the first generation public key cryptography systems for example RSA.Elliptic CurvesIn 1985, cryptographic algorithms were proposed based on elliptic curves. An elliptic curve is the set of points that satisfy a specific mathematical equation. They are symmetrical.UsesWebsites make extensive use of ECC to secure customers’ hypertext ...

Read More

How to replace values of select return in MySQL?

George John
George John
Updated on 30-Jul-2019 1K+ Views

You can use select case statement for this. The syntax is as follows.select yourColumnName1, yourColumnName2, ...N, case when yourColumnName=1 then 'true' else 'false' end as anyVariableName from yourTableName;To understand the above syntax, let us create a table. The query to create a table is as follows.mysql> create table selectReturnDemo -> ( -> Id int, -> Name varchar(100), -> isGreaterthan18 tinyint(1) -> ); Query OK, 0 rows affected (0.62 sec)Now you can insert some records in the table using insert command. The query is as follows.mysql> insert into selectReturnDemo values(1, 'Carol', 0); Query OK, 1 row affected (0.23 sec) mysql> ...

Read More

How to limit excessive use of mobile?

Ridhi Arora
Ridhi Arora
Updated on 30-Jul-2019 187 Views

Today’s age is a technology-driven age. Mobile phones are the most used gadget at the moment. Be it rich or poor, young or old, mobiles have become a part and parcel for each one of us. However, the cell phone has a lot of adverse effects like back pain, stress, irritation, and depression, radiations harming us leading to different nervous disorders and the others.Limiting Mobile Phone UsagePlace the phone down on a hard surface if one is texting. One can even hold the phone in one hand and text with the other. This will increase the time of texting and ...

Read More

How to encrypt the MS word files?

yashwanth sitamraju
yashwanth sitamraju
Updated on 30-Jul-2019 786 Views

A procedure should be followed for encrypting an MS word document. Encryption is nothing but protecting your document from a third party. First, let us look into the definition of encryption.What is Encryption? How do we use Encryption?The word encryption is derived from the Greek word Kryptos means hidden or a secret.There are certain algorithms to use encryption like RSA algorithms and Diffie-Hellman key exchange algorithms.These algorithms led to the use of encryption in commercial and consumer realms to protect data.The password is the best example of encryption.Encryption is used in sending data across all the networks and ATM is ...

Read More

Update MySQL date and increment by one Year?

Chandu yadav
Chandu yadav
Updated on 30-Jul-2019 1K+ Views

You can use in-built function date_add() from MySQL. The syntax is as follows −UPDATE yourTableName SET yourDateColumnName=DATE_ADD(yourDateColumnName, interval 1 year);To understand the above syntax, let us first create a table. The query to create a table is as follows −mysql> create table UpdateDate -> ( -> Id int, -> DueDate datetime -> ); Query OK, 0 rows affected (0.76 sec)Insert some records in the table using insert command. The query to insert record is as follows −mysql> insert into UpdateDate values(1001, '2012-5-21'); Query OK, 1 row affected (0.17 ...

Read More

What is the best way to display in Terminal a MySQL SELECT returning too many fields?

Arjun Thakur
Arjun Thakur
Updated on 30-Jul-2019 207 Views

To achieve this, you can use the following syntax in MySQL −select *from yourTableName\G;Here, G can be used for vertical purpose. You need to add yourTableName.Let us create a table in order to understand the above syntax. Creating a table with the help of CREATE command.The following is the query to create a table −mysql> create table TooManyFieldsreturnDemo -> ( -> Id int, -> Name varchar(100), -> Age int -> ); Query OK, 0 rows affected (0.64 sec)Now you can insert records in the table ...

Read More

How to search for exact string in MySQL?

George John
George John
Updated on 30-Jul-2019 1K+ Views

You can use binary to search for exact string in MySQL. The syntax is as follows:SELECT * FROM yourTableName WHERE BINARY yourColumnName = yourStringValue;To understand the above syntax, let us create a table. The query to create a table is as follows:mysql> create table ExactSearch    -> (    -> Id int NOT NULL AUTO_INCREMENT,    -> UserId varchar(10),    -> UserName varchar(20),    -> PRIMARY KEY(Id)    -> ); Query OK, 0 rows affected (0.69 sec)Insert some records in the table using insert command. The query is as follows:mysql> insert into ExactSearch(UserId, UserName) values('USER12', 'John'); Query OK, 1 row ...

Read More

How to subtract 30 days from the current datetime in MySQL?

Ankith Reddy
Ankith Reddy
Updated on 30-Jul-2019 5K+ Views

To subtract 30 days from current datetime, first we need to get the information about current date time, then use the now() method from MySQL. The now() gives the current date time.The method to be used for this is DATE_SUB() from MySQL. Here is the syntax to subtract 30 days from current datetime.The syntax is as follows −DATE_SUB(NOW(), INTERVAL 30 DAY);The above syntax calculates the current datetime first and in the next step, subtracts 30 days. Let us first seethe query to get the current datetime −mysql> select now();Here is the output −+---------------------+ | now() ...

Read More
Showing 60531–60540 of 61,297 articles
Advertisements