Web Technologies
37.4K+ articles
DSA
22.8K+ articles
Python
21.3K+ articles
Java
10.8K+ articles
Mathematical
7.8K+ articles
Arrays
6.5K+ articles
C++
4.3K+ articles
Java-Functions
4.2K+ articles
PHP
3.9K+ articles
Java - util package
1.6K+ articles
Given an array arr[], the task is to calculate the maximum sum of elements from the array such that, if an ith element is picked, then arr[i] is added to the sum and i jum...
read more
Dynamic Programming
Greedy
misc
DSA
Arrays
JavaScript is based on functional programming. Therefore, functions are fundamental building blocks of JavaScript. So the function is called first-class citizens in JavaSc...
read more
misc
JavaScript
Web Technologies
Picked
Geeks Premier League
Geeks-Premier-League-2022
JavaScript-Questions
PeStudio is a tool to find suspicious artifacts within executable files to accelerate the first malware assessment. Using this tool, the analyst can easily spot the functi...
read more
Analysis of Algorithms
misc
How To
DSA
Honeypots are computer applications that collect information from hackers and other criminals. They can be used from a physical or a virtual location, and come in many for...
read more
misc
Ethical Hacking
This program is available on all Microsoft Windows servers (usually port 5985) that have this feature enabled. Of course, only if you have the credentials and permissions ...
read more
misc
Computer Networks
Ethical Hacking
Data warehousing is the act of gathering, compiling, and analyzing massive volumes of data from multiple sources to assist commercial decision-making processes is known as...
read more
misc
Information-Security
Data Warehouse
Data Engineering
The Structure of a wireless communication link involves several key components that work together and maintains the connection between the transmitter and the receiver. Ev...
read more
misc
Computer Subject
Computer Networks
GATE CS
Computer Networks Quiz
Software Engineering
GateCS2023
Computer Networks-Network Layer
Wireshark Wireless Functions
Electronics
Given a binary tree and a non negative integer k. Find and return the Kth maximum level sum in a binary tree. If the levels are less than k, return -1.Examples:Input: root...
read more
Tree
misc
Functional
ProGeek 2.0
DSA
According to NIST, the ability to protect or defend the use of cyberspace from cyber-attacks is known as cyber security. Now, for companies some exercises/strategies inclu...
read more
misc
Ethical Hacking
Cyber-security
In this Era of Cyber security, no user or devices outside or inside the organization network should be automatically trusted, regardless of their location or level of acce...
read more
misc
Ethical Hacking
Cyber-security
Organizations are always looking for methods to strengthen their defenses against possible attacks in the ever-evolving realm of cybersecurity. Many use a technique known ...
read more
misc
Difference Between
Ethical Hacking
Cyber-security
Unhandled errors in Node.js can lead to unexpected application crashes, data corruption, and poor user experiences. Effectively managing these errors is crucial for buildi...
read more
misc
JavaScript
Web Technologies
Node.js
NodeJS-Questions
Looking at the OSI model, it's evident that more than a few security protocols are required to be fully protected. All potential access points and sites where hackers coul...
read more
misc
Computer Networks
Ethical Hacking
CCNA
ing is a technique used to breach computer software or an entire computer security system, and with malicious intent. Though functionally the same as hacking, in...
read more
Technical Scripter
misc
Ethical Hacking
Information-Security
Cyber-security
In the digital world, terms like "megabit" and "megabyte" frequently pop up, especially when discussing internet speeds and data storage. Though they may sound similar, th...
read more
TechTips
misc
Computer Subject
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our
Cookie Policy
&
Privacy Policy
Got It !