Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles by Bhanu Priya
Page 7 of 106
How to place two divs next to each other in HTML?
DIV tag is nothing but a division tag, the name itself indicates that it makes divisions for the content on the web pages. It helps in separating the data like text, images, navigation bar etc., we can also create particular sections by using the DIV tag. A DIV tag consists of open and close tags , and both these tags are compulsory if we want to divide the page. DIV tags can be styled with CSS or manipulated with JavaScript, it is easily styled by using the class or id attribute. Any sort of data can be placed inside ...
Read MoreExplain string library functions with suitable examples in C
String Library functionsThe predefined functions which are designed to handle strings are available in the library string.h. They are −strlen ()strcmp ()strcpy ()strncmp ()strncpy ()strrev ()strcat ()strstr ()strncat ()The strlen () functionIt returns the number of characters in a string.Syntaxint strlen (string name)Example#include main (){ char a[30] = “Hello”; int l; l = strlen (a); printf (“length of the string = %d”, l); getch (); }Outputlength of the string = 5The strcpy () functionIt is for copying source string into destination string.The length of the destination string >= source string.Syntaxstrcpy (Destination string, Source String);For ...
Read MoreExplain the END OF FILE (EOF) with a C Program
The End of the File (EOF) indicates the end of input.After we enter the text, if we press CTRL+Z, the text terminates i.e. it indicates the file reached end nothing to read.AlgorithmRefer to the algorithm given below for EOF.Step 1: Open file in write mode. Step 2: Until character reaches end of the file, write each character in filepointer. Step 3: Close file. Step 4: Again open file in read mode. Step 5: Reading the character from file until fp equals to EOF. Step 5: Print character on console. Step 6: Close file.ExampleFollowing is the C program for End of ...
Read MoreDifferentiate between the long-term, short-term, and medium-term schedulers.
Before working on the difference between all three schedulers, let us recall the concept of process scheduler.Process scheduler is a part of the Operating system which schedules the process. If the process is in ready, waiting and running state it schedules it correctly and is also responsible for the allocation of the CPU processor to a specific task within a time interval.Also, when the task or process is completed it doesn't allow the CPU to sit idle. It will allocate the other task depending on its current state. If the process was in ready state it will allocate it to ...
Read MoreC program to find the unique elements in an array.
ProblemFind the non-repeating element in an array by using the two loops. One is for the current element and the other is to check, if an element is already present in an array or not.SolutionConsider an example given below −15, 15, 16, 15, 13, 15Here, the non-repeated elements in an array are 16 and 13.AlgorithmRefer an algorithm given below for finding the unique or the non-repeated elements in an array.Step 1 − Declare an array and input the array elements at run time.Step 2 − Start traversing the array and check, if the current element is already present in an ...
Read MoreWhat are different types of DBMS languages?
Once data is stored or filled it requires manipulation like insertion, deletion, updating, and modification of data. For these operations a set of languages are provided by the database management system (DBMS). So, the database languages are used to read, update and store data in the database.The different types of DBMS languages are as follows −Data Definition Language (DDL) − Create, Drop, Truncate, Rename.Data Manipulation language (DML) − Select, Insert, Delete, Update.Data Control Language (DCL) − Revoke, Grant.Transaction Control Language (TCL) − Rollback, Commit.The DBMS languages are pictorially represented as follows −Data Definition Language (DDL)It is a language that allows ...
Read MoreWhat is an instruction set in a computer?
An instruction is a set of codes that the computer processor can understand. The code is usually in 1s and 0s, or machine language. It contains instructions or tasks that control the movement of bits and bytes within the processor.Example of some instruction sets −ADD − Add two numbers together.JUMP − Jump to designated RAM address.LOAD − Load information from RAM to the CPU.Types of Instruction SetGenerally, there are two types of instruction set used in computers.Reduced Instruction set Computer (RISC)A number of computer designers recommended that computers use fewer instructions with simple constructs so that they can be executed ...
Read MoreExplain about nested queries in DBMS
A nested query is a query that has another query embedded within it. The embedded query is called a subquery.A subquery typically appears within the WHERE clause of a query. It can sometimes appear in the FROM clause or HAVING clause.ExampleLet’s learn about nested queries with the help of an example.Find the names of employee who have regno=103The query is as follows −select E.ename from employee E where E.eid IN (select S.eid from salary S where S.regno=103);Student tableThe student table is created as follows −create table student(id number(10), name varchar2(20), classID number(10), marks varchar2(20)); Insert into student values(1, 'pinky', 3, ...
Read MoreWhat is tier-3 architecture in DBMS?
The overall design of the Database Management System (DBMS) depends on its architecture. A large amount of data on web servers, Personal Computers (PC) and other elements are linked with networks with the help of basic client or server architecture.PCs and workstations are part of Client architecture that are connected over the network. The architecture of DBMS depends on how the users are linked to the database.There are three kinds of DBMS Architecture, which are as follows −Tier-1 Architecture.Tier-2 Architecture.Tier-3 Architecture.Tier-3 ArchitectureThe 3-tier architecture contains one more layer between the client and the server.In this architecture, there is no direct ...
Read MoreWhat are Virtual Machines in Operating System?
A virtual machine (VM) is a virtual environment which functions as a virtual computer system with its own CPU, memory, network interface, and storage, created on a physical hardware system.VMs are isolated from the rest of the system, and multiple VMs can exist on a single piece of hardware, like a server. That means, it as a simulated image of application software and operating system which is executed on a host computer or a server.It has its own operating system and software that will facilitate the resources to virtual computers.Characteristics of virtual machinesThe characteristics of the virtual machines are as ...
Read More