- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Rishi Raj has Published 131 Articles
Rishi Raj
9K+ Views
The transport layer is responsible for error-free, end-to-end delivery of data from the source host to the destination host. It corresponds to the transport layer of the OSI model.The functions of the transport layer are −It facilitates the communicating hosts to carry on a conversation.It provides an interface for the ... Read More
Rishi Raj
2K+ Views
The application layer (Layer 7) is the topmost layer of the OSI model. It specifies the interfaces and supports services to the end users for network access.The main functions of the application layer are as follows −It provides a virtual network terminal through which a user can log on to ... Read More
Rishi Raj
13K+ Views
A Local Area Network (LAN) is a private network that connects computers and devices within a limited area like a residence, an office, a building or a campus. On a small scale, LANs are used to connect personal computers to printers. However, LANs can also extend to a few kilometers ... Read More
Rishi Raj
2K+ Views
Like the binary search, it also separates the lists into sub-lists. This procedure divides the list into three parts using two intermediate mid values. As the lists are divided into more subdivisions, so it reduces the time to search a key value.The complexity of Ternary Search TechniqueTime Complexity: O(log3 n)Space ... Read More
Rishi Raj
2K+ Views
Bubble Sort is a comparison based sorting algorithm. In this algorithm adjacent elements are compared and swapped to make the correct sequence. This algorithm is simpler than other algorithms, but it has some drawbacks also. This algorithm is not suitable for a large number of data set. It takes much ... Read More
Rishi Raj
2K+ Views
In the Bucket Sorting technique, the data items are distributed in a set of buckets. Each bucket can hold a similar type of data. After distributing, each bucket is sorted using another sorting algorithm. After that, all elements are gathered on the main list to get the sorted form.The complexity ... Read More
Rishi Raj
2K+ Views
For the binary search technique, the lists are divided into equal parts. For the interpolation searching technique, the procedure will try to locate the exact position using interpolation formula. After finding the estimated location, it can separate the list using that location. As it tries to find exact location every ... Read More
Rishi Raj
4K+ Views
The HTML tag is used to get user input in HTML. To give a limit to the input field, use the min and max attributes, which is to specify a maximum and minimum value for an input field respectively.The max and min attributes are used with number, range, date, datetime, datetime-local, ... Read More
Rishi Raj
121 Views
The HTML tag is to process web forms with certificate management systems. On form submission, the private key gets stored locally and submits the public key to the server.Here are the attributes of the tag −AttributeValueDescriptionautofocusautofocusSpecifies that when the page loads the element automatically gets focus.challengechallengeSpecifies the ... Read More
Rishi Raj
431 Views
Following steps are mostly required to Troubleshoot any problem that occurred in production.As the first step, get the time frame from the user when a particular issue occurred. Get the logs for that particular time period.If logs are very large in size, use grep command to filter out errors.$ grep -o ... Read More