title stringlengths 3 221 | text stringlengths 17 477k | parsed listlengths 0 3.17k |
|---|---|---|
Dependency tree of a Python Module | 19 Aug, 2020
Generally, many Python packages are dependent on other packages but how do we know that on which packages is a module dependent?
This is a python built-in module that can help us know the dependent packages but it shows all dependencies as a flat list, finding out which are the top-level packages and which... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n19 Aug, 2020"
},
{
"code": null,
"e": 157,
"s": 28,
"text": "Generally, many Python packages are dependent on other packages but how do we know that on which packages is a module dependent?"
},
{
"code": null,
"e": 424,
... |
Python – Add Space between Potential Words | 01 Sep, 2021
Given list of Strings, task is to add a space before sequence which begin with capital letters.
Input : test_list = [“gfgBest”, “forGeeks”, “andComputerScienceStudents”] Output : [‘gfg Best’, ‘for Geeks’, ‘and Computer Science Students’] Explanation : Words segregated by Capitals.
Input : test_list = [“Com... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n01 Sep, 2021"
},
{
"code": null,
"e": 124,
"s": 28,
"text": "Given list of Strings, task is to add a space before sequence which begin with capital letters."
},
{
"code": null,
"e": 310,
"s": 124,
"text": "Input : te... |
try and except in Python | To use exception handling in python, we first need to catch the all except clauses.
Python provides, “try” and “except” keywords to catch exceptions. The “try” block code will be executed statement by statement. However, if an exception occurs, the remaining “try” code will not be executed and the except clause will be... | [
{
"code": null,
"e": 1271,
"s": 1187,
"text": "To use exception handling in python, we first need to catch the all except clauses."
},
{
"code": null,
"e": 1518,
"s": 1271,
"text": "Python provides, “try” and “except” keywords to catch exceptions. The “try” block code will be exe... |
Saving a Pandas Dataframe as a CSV | 21 Aug, 2020
Pandas is an open source library which is built on top of NumPy library. It allows user for fast analysis, data cleaning & preparation of data efficiently. Pandas is fast and it has high-performance & productivity for users.
Most of the datasets you work with are called DataFrames. DataFrames is a 2-Dimens... | [
{
"code": null,
"e": 53,
"s": 25,
"text": "\n21 Aug, 2020"
},
{
"code": null,
"e": 278,
"s": 53,
"text": "Pandas is an open source library which is built on top of NumPy library. It allows user for fast analysis, data cleaning & preparation of data efficiently. Pandas is fast and... |
Python | Check if given words appear together in a list of sentence | 13 May, 2019
Given a list of sentences ‘sentence’ and a list of words ‘words’, write a Python program to find which sentence in the list of sentences consist of all words contained in ‘words’ and return them within a list.
Examples:
Input : sentence = ['I love tea', 'He hates tea', 'We love tea']
words = ['love... | [
{
"code": null,
"e": 53,
"s": 25,
"text": "\n13 May, 2019"
},
{
"code": null,
"e": 263,
"s": 53,
"text": "Given a list of sentences ‘sentence’ and a list of words ‘words’, write a Python program to find which sentence in the list of sentences consist of all words contained in ‘wo... |
Functions in Rust | 03 Mar, 2021
Functions are the block of reusable code that can perform similar related actions. You have already seen one of the most important functions in the language: the main function, which is the entry point of many programs. You’ve also seen the “fn” keyword, which allows you to declare new functions. Rust code... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n03 Mar, 2021"
},
{
"code": null,
"e": 483,
"s": 28,
"text": "Functions are the block of reusable code that can perform similar related actions. You have already seen one of the most important functions in the language: the main function... |
Python String Title method | 02 Dec, 2020
The title() function in python is the Python String Method which is used to convert the first character in each word to Uppercase and remaining characters to Lowercase in the string and returns a new string.
Syntax:
str.title()
parameters:str is a valid string which we need to convert.
return: This funct... | [
{
"code": null,
"e": 52,
"s": 24,
"text": "\n02 Dec, 2020"
},
{
"code": null,
"e": 261,
"s": 52,
"text": "The title() function in python is the Python String Method which is used to convert the first character in each word to Uppercase and remaining characters to Lowercase in the... |
CSS | :target Selector | 21 Dec, 2018
The target selector is used to represent a unique element (the target element) with an id matching the URL’s fragment. It can be used to style the current active target element. URLs with a # followed by an anchor name link to a certain element within a document. The element being linked to is the target e... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n21 Dec, 2018"
},
{
"code": null,
"e": 343,
"s": 28,
"text": "The target selector is used to represent a unique element (the target element) with an id matching the URL’s fragment. It can be used to style the current active target elemen... |
SUBSTRING() function in MySQL | 22 Sep, 2020
SUBSTRING() :function in MySQL is used to derive substring from any given string .It extracts a string with a specified length, starting from a given location in an input string. The purpose of substring is to return a specific portion of the string.
Syntax :
SUBSTRING(string, start, length)
OR
SUBSTRING(s... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n22 Sep, 2020"
},
{
"code": null,
"e": 279,
"s": 28,
"text": "SUBSTRING() :function in MySQL is used to derive substring from any given string .It extracts a string with a specified length, starting from a given location in an input stri... |
Groovy - any() & every() | Method any iterates through each element of a collection checking whether a Boolean predicate is valid for at least one element.
boolean any(Closure closure)
boolean every(Closure closure)
The condition to be met by the collection element is specified in the closure that must be some Boolean expression.
The find meth... | [
{
"code": null,
"e": 2501,
"s": 2372,
"text": "Method any iterates through each element of a collection checking whether a Boolean predicate is valid for at least one element."
},
{
"code": null,
"e": 2563,
"s": 2501,
"text": "boolean any(Closure closure) \nboolean every(Closure ... |
Java.io.BufferedOutputStream class in Java | 24 Jan, 2017
Java.io.BufferedInputStream class in Java
Java.io.BufferedOutputStream class implements a buffered output stream. By setting up such an output stream, an application can write bytes to the underlying output stream without necessarily causing a call to the underlying system for each byte written.
Fields
pro... | [
{
"code": null,
"e": 53,
"s": 25,
"text": "\n24 Jan, 2017"
},
{
"code": null,
"e": 95,
"s": 53,
"text": "Java.io.BufferedInputStream class in Java"
},
{
"code": null,
"e": 350,
"s": 95,
"text": "Java.io.BufferedOutputStream class implements a buffered output s... |
PyQt5 – checkState() method for Check Box | 22 Apr, 2020
There are basically two states in check box that are checked or unchecked, although using setTristate method we can add an intermediate state.
checkState method is used to check the state of the check box, it returns CheckState object but when we print it output will be as follows:
0 for un-checked state
2... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n22 Apr, 2020"
},
{
"code": null,
"e": 171,
"s": 28,
"text": "There are basically two states in check box that are checked or unchecked, although using setTristate method we can add an intermediate state."
},
{
"code": null,
... |
Dividing a Large file into Separate Modules in C/C++, Java and Python | 18 Jan, 2019
If you ever wanted to write a large program or software, the most common rookie mistake is to jump in directly and try to write all the necessary code into a single program and later try to debug or extend later.
This kind of approach is doomed to fail and would usually require re-writing from scratch.
So ... | [
{
"code": null,
"e": 54,
"s": 26,
"text": "\n18 Jan, 2019"
},
{
"code": null,
"e": 267,
"s": 54,
"text": "If you ever wanted to write a large program or software, the most common rookie mistake is to jump in directly and try to write all the necessary code into a single program a... |
How to verify Pyspark dataframe column type ? | 23 May, 2021
While working with a big Dataframe, Dataframe consists of any number of columns that are having different datatypes. For pre-processing the data to apply operations on it, we have to know the dimensions of the Dataframe and datatypes of the columns which are present in the Dataframe.
In this article, we ar... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n23 May, 2021"
},
{
"code": null,
"e": 313,
"s": 28,
"text": "While working with a big Dataframe, Dataframe consists of any number of columns that are having different datatypes. For pre-processing the data to apply operations on it, we ... |
Storage Classes in C++ | A storage class defines the scope (visibility) and life-time of variables and/or functions within a C++ Program. These specifiers precede the type that they modify. There are following storage classes, which can be used in a C++ Program
auto
register
static
extern
mutable
The auto storage class is the default storage c... | [
{
"code": null,
"e": 2689,
"s": 2452,
"text": "A storage class defines the scope (visibility) and life-time of variables and/or functions within a C++ Program. These specifiers precede the type that they modify. There are following storage classes, which can be used in a C++ Program"
},
{
"c... |
Matrix Multiplication in NumPy | 02 Sep, 2020
Let us see how to compute matrix multiplication with NumPy. We will be using the numpy.dot() method to find the product of 2 matrices.
For example, for two matrices A and B.
A = [[1, 2], [2, 3]]
B = [[4, 5], [6, 7]]
So, A.B = [[1*4 + 2*6, 2*4 + 3*6], [1*5 + 2*7, 2*5 + 3*7]
So the computed answer will be: ... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n02 Sep, 2020"
},
{
"code": null,
"e": 163,
"s": 28,
"text": "Let us see how to compute matrix multiplication with NumPy. We will be using the numpy.dot() method to find the product of 2 matrices."
},
{
"code": null,
"e": 357... |
Groovy - replaceAll() | Replaces all occurrences of a captured group by the result of a closure on that text.
void replaceAll(String regex, String replacement)
regex − the regular expression to which this string is to be matched.
regex − the regular expression to which this string is to be matched.
replacement − the string which would replac... | [
{
"code": null,
"e": 2324,
"s": 2238,
"text": "Replaces all occurrences of a captured group by the result of a closure on that text."
},
{
"code": null,
"e": 2375,
"s": 2324,
"text": "void replaceAll(String regex, String replacement)\n"
},
{
"code": null,
"e": 2445,
... |
Check if values of two arrays are the same/equal in JavaScript | We have two arrays of numbers, let’s say −
[2, 4, 6, 7, 1]
[4, 1, 7, 6, 2]
Assume, we have to write a function that returns a boolean based on the fact whether or not
they contain the same elements irrespective of their order.
For example −
[2, 4, 6, 7, 1] and [4, 1, 7, 6, 2] should yield true because they have the sam... | [
{
"code": null,
"e": 1105,
"s": 1062,
"text": "We have two arrays of numbers, let’s say −"
},
{
"code": null,
"e": 1137,
"s": 1105,
"text": "[2, 4, 6, 7, 1]\n[4, 1, 7, 6, 2]"
},
{
"code": null,
"e": 1289,
"s": 1137,
"text": "Assume, we have to write a function... |
How to use Predicate<T> and BiPredicate<T, U> in lambda expression in Java? | A Predicate<T> interface defined in java.util.function package. It represents a boolean-valued function with one argument. It is kind of a functional interface whose functional method is the test(). BiPredicate<T, U> interface is similar to the Predicate<T> interface with two arguments. It can be used as an assignment ... | [
{
"code": null,
"e": 1414,
"s": 1062,
"text": "A Predicate<T> interface defined in java.util.function package. It represents a boolean-valued function with one argument. It is kind of a functional interface whose functional method is the test(). BiPredicate<T, U> interface is similar to the Predicat... |
Print all Subsequences of String which Start with Vowel and End with Consonant in C++ | In this problem, we are given a string and we have to find the substring from the given string. The substring to be found should start with a vowel and end with constant character.
A string is an array of characters.
The substring that is to be generated in this problem can be generated by deleting some characters of t... | [
{
"code": null,
"e": 1243,
"s": 1062,
"text": "In this problem, we are given a string and we have to find the substring from the given string. The substring to be found should start with a vowel and end with constant character."
},
{
"code": null,
"e": 1279,
"s": 1243,
"text": "A... |
How to plot two histograms together in R? | Consider the below data frames −
> glucose <- data.frame(length = rnorm(100, 2.5))
> fructose <- data.frame(length = rnorm(500, 2.5))
We need to combine these two data frames but before that we have to make a new
column in each of these data frames to create their identification
> glucose$sweetener <- 'glucose'
> fru... | [
{
"code": null,
"e": 1095,
"s": 1062,
"text": "Consider the below data frames −"
},
{
"code": null,
"e": 1197,
"s": 1095,
"text": "> glucose <- data.frame(length = rnorm(100, 2.5))\n> fructose <- data.frame(length = rnorm(500, 2.5))"
},
{
"code": null,
"e": 1343,
... |
Collections.singleton() method in Java with example - GeeksforGeeks | 02 Jul, 2021
java.util.Collections.singleton() method is a java.util.Collections class method. It creates a immutable set over a single specified element. An application of this method is to remove an element from Collections like List and Set.
Syntax:
public static Set singleton(T obj)
and
public static List single... | [
{
"code": null,
"e": 24318,
"s": 24290,
"text": "\n02 Jul, 2021"
},
{
"code": null,
"e": 24550,
"s": 24318,
"text": "java.util.Collections.singleton() method is a java.util.Collections class method. It creates a immutable set over a single specified element. An application of thi... |
bar() function in C graphics | bar() function is a C graphics function that is used to draw graphics in the C programming language. The graphics.h header contains functions that work for drawing graphics. The bar() function is also defined in the header file.
void bar(int left, int top, int right, int bottom );
The bar() function is used to draw a b... | [
{
"code": null,
"e": 1291,
"s": 1062,
"text": "bar() function is a C graphics function that is used to draw graphics in the C programming language. The graphics.h header contains functions that work for drawing graphics. The bar() function is also defined in the header file."
},
{
"code": nu... |
C program to implement DFS traversal using Adjacency Matrix in a given Graph - GeeksforGeeks | 13 Jan, 2022
Given a undirected graph with V vertices and E edges. The task is to perform DFS traversal of the graph.
Examples:
Input: V = 7, E = 7Connections: 0-1, 0-2, 1-3, 1-4, 1-5, 1-6, 6-2See the diagram for connections:
Output : 0 1 3 4 5 6 2Explanation: The traversal starts from 0 and follows the following path... | [
{
"code": null,
"e": 25807,
"s": 25779,
"text": "\n13 Jan, 2022"
},
{
"code": null,
"e": 25912,
"s": 25807,
"text": "Given a undirected graph with V vertices and E edges. The task is to perform DFS traversal of the graph."
},
{
"code": null,
"e": 25922,
"s": 25912... |
How can one modify the outline color of a node in networkx using Matplotlib? | To modify the outline color of a node in networkx, we can use set_edgecolor() method.
Create a Pandas dataframe with from and to keys.
Return a graph from Pandas DataFrame containing an edge list.
Get the position of the nodes.
Draw the nodes of the graph using draw_networkx_nodes().
Set the outline color of the nodes ... | [
{
"code": null,
"e": 1148,
"s": 1062,
"text": "To modify the outline color of a node in networkx, we can use set_edgecolor() method."
},
{
"code": null,
"e": 1197,
"s": 1148,
"text": "Create a Pandas dataframe with from and to keys."
},
{
"code": null,
"e": 1259,
... |
How to add shadow to text using CSS ? - GeeksforGeeks | 15 Sep, 2020
The approach of this article is to add a shadow using text-shadow property in CSS. This property accepts a list of a comma-separated list of shadows to be applied to the text. The default value of the text-shadow property is “none”.
Syntax:
text-shadow: h-shadow v-shadow blur-radius color|none|initial|
Exa... | [
{
"code": null,
"e": 24985,
"s": 24957,
"text": "\n15 Sep, 2020"
},
{
"code": null,
"e": 25218,
"s": 24985,
"text": "The approach of this article is to add a shadow using text-shadow property in CSS. This property accepts a list of a comma-separated list of shadows to be applied ... |
Find sub-matrix with the given sum - GeeksforGeeks | 18 Aug, 2021
Given an N x N matrix and two integers S and K, the task is to find whether there exists a K x K sub-matrix with sum equal to S.
Examples:
Input: K = 2, S = 14, mat[][] = { { 1, 2, 3, 4 }, { 5, 6, 7, 8 }, { 9, 10, 11, 12 }, { 13, 14, 15, 16 }} Output: Yes 1 2 5 6 is the required 2 x 2 sub-matrix with elem... | [
{
"code": null,
"e": 24696,
"s": 24668,
"text": "\n18 Aug, 2021"
},
{
"code": null,
"e": 24825,
"s": 24696,
"text": "Given an N x N matrix and two integers S and K, the task is to find whether there exists a K x K sub-matrix with sum equal to S."
},
{
"code": null,
"e... |
C Program to Store Information of Students Using Structure - GeeksforGeeks | 18 Oct, 2019
Write a C program to store the information of Students using Structure. The information of each student to be stored is:
Each Student Record should have:
Name
Roll Number
Age
Total Marks
A structure is a user-defined data type in C/C++. A structure creates a data type that can be used to group ite... | [
{
"code": null,
"e": 24954,
"s": 24926,
"text": "\n18 Oct, 2019"
},
{
"code": null,
"e": 25075,
"s": 24954,
"text": "Write a C program to store the information of Students using Structure. The information of each student to be stored is:"
},
{
"code": null,
"e": 25150... |
Optimization of a weekly production plan with Python and Gurobi — Part 3 | by Soulard Baptiste | Towards Data Science | We studied in the previous articles how to spread the workload between several production lines to meet the demand while reducing labour, inventory, and shortage costs.
This model had some limitations and might not be used in a natural environment. Indeed, most of the time, the demand is a quantity to ship according to... | [
{
"code": null,
"e": 341,
"s": 172,
"text": "We studied in the previous articles how to spread the workload between several production lines to meet the demand while reducing labour, inventory, and shortage costs."
},
{
"code": null,
"e": 572,
"s": 341,
"text": "This model had so... |
Multi-Class Image Classification With Transfer Learning In PySpark | by Mohammed Innat | Towards Data Science | In this article, We’ll be using Keras (TensorFlow backend), PySpark, and Deep Learning Pipelines libraries to build an end-to-end deep learning computer vision solution for a multi-class image classification problem that runs on a Spark cluster. Spark is a robust open-source distributed analytics engine that can proces... | [
{
"code": null,
"e": 660,
"s": 172,
"text": "In this article, We’ll be using Keras (TensorFlow backend), PySpark, and Deep Learning Pipelines libraries to build an end-to-end deep learning computer vision solution for a multi-class image classification problem that runs on a Spark cluster. Spark is ... |
Python Program for Identity Matrix - GeeksforGeeks | 13 Jan, 2022
Introduction to Identity Matrix :
The dictionary definition of an Identity Matrix is a square matrix in which all the elements of the principal or main diagonal are 1’s and all other elements are zeros. In the below image, every matrix is an Identity Matrix.
In linear algebra, this is sometimes called a... | [
{
"code": null,
"e": 24301,
"s": 24273,
"text": "\n13 Jan, 2022"
},
{
"code": null,
"e": 24335,
"s": 24301,
"text": "Introduction to Identity Matrix :"
},
{
"code": null,
"e": 24563,
"s": 24335,
"text": " The dictionary definition of an Identity Matrix is a sq... |
Dart Programming - Variables | A variable is “a named space in the memory” that stores values. In other words, it acts a container for values in a program. Variable names are called identifiers. Following are the naming rules for an identifier −
Identifiers cannot be keywords.
Identifiers cannot be keywords.
Identifiers can contain alphabets and num... | [
{
"code": null,
"e": 2740,
"s": 2525,
"text": "A variable is “a named space in the memory” that stores values. In other words, it acts a container for values in a program. Variable names are called identifiers. Following are the naming rules for an identifier −"
},
{
"code": null,
"e": 2... |
What is different between constant and variable in C++? | Variable and constant are two commonly used mathematical concepts. Simply put, a variable is a value that is changing or that have the ability to change. A constant is a value which remains unchanged.
For example, if you have a program that has a list of 10 radii and you want to calculate the area for all of these circ... | [
{
"code": null,
"e": 1263,
"s": 1062,
"text": "Variable and constant are two commonly used mathematical concepts. Simply put, a variable is a value that is changing or that have the ability to change. A constant is a value which remains unchanged."
},
{
"code": null,
"e": 1601,
"s": ... |
How to copy Docker images from one host to another without using a repository? | If you have a Docker image in your own local machine and you want that image to be copied into another machine, there are two ways to do that. The first is by pushing that image to a repository such as the ones in Dockerhub registry. You need to have an account in Dockerhub and then you can use the Docker push command ... | [
{
"code": null,
"e": 1408,
"s": 1062,
"text": "If you have a Docker image in your own local machine and you want that image to be copied into another machine, there are two ways to do that. The first is by pushing that image to a repository such as the ones in Dockerhub registry. You need to have an... |
How do I print a Python datetime in the local timezone? | The easiest way in Python date and time to handle timezones is to use the pytz and tzlocal modules. These libraries allows accurate and cross platform timezone calculations. pytz brings the Olson tz database into Python. It also solves the issue of ambiguous times at the end of daylight saving time, which you can read ... | [
{
"code": null,
"e": 1444,
"s": 1062,
"text": "The easiest way in Python date and time to handle timezones is to use the pytz and tzlocal modules. These libraries allows accurate and cross platform timezone calculations. pytz brings the Olson tz database into Python. It also solves the issue of ambi... |
Reverse mapping an object in JavaScript | Suppose, we have an object like this −
const products = {
"Pineapple":38,
"Apple":110,
"Pear":109
};
All the keys are unique in themselves and all the values are unique in themselves.
We are required to write a function that accepts a value and returns its key. Let' say we have created a function findKey().
Fo... | [
{
"code": null,
"e": 1101,
"s": 1062,
"text": "Suppose, we have an object like this −"
},
{
"code": null,
"e": 1172,
"s": 1101,
"text": "const products = {\n \"Pineapple\":38,\n \"Apple\":110,\n \"Pear\":109\n};"
},
{
"code": null,
"e": 1255,
"s": 1172,
... |
Overview: State-of-the-Art Machine Learning Algorithms per Discipline & per Task | by Hucker Marius | Towards Data Science | Machine Learning algorithms are on the rise. Every year new techniques are presented that outdate the current leading algorithms. Some of them are only little advances or combinations of existing algorithms and others are newly created and lead to astonishing progress. For most techniques exist already great articles t... | [
{
"code": null,
"e": 1084,
"s": 172,
"text": "Machine Learning algorithms are on the rise. Every year new techniques are presented that outdate the current leading algorithms. Some of them are only little advances or combinations of existing algorithms and others are newly created and lead to astoni... |
Batch Script - SET | Displays the list of environment variables on the current system.
Set
@echo off
set
The above command displays the list of environment variables on the current system.
Print
Add Notes
Bookmark this page | [
{
"code": null,
"e": 2235,
"s": 2169,
"text": "Displays the list of environment variables on the current system."
},
{
"code": null,
"e": 2240,
"s": 2235,
"text": "Set\n"
},
{
"code": null,
"e": 2255,
"s": 2240,
"text": "@echo off \nset"
},
{
"code": n... |
Seaborn is actually quite good for data visualization | by Mostafa Gazar | Towards Data Science | Seaborn is a Python data visualization library based on matplotlib (it is the go to library for plotting in Python). Seaborn provides a high-level interface for drawing attractive and informative statistical graphics.
%matplotlib inlineimport matplotlib.pyplot as pltimport seaborn as sns
sns.set()
You can also customiz... | [
{
"code": null,
"e": 390,
"s": 172,
"text": "Seaborn is a Python data visualization library based on matplotlib (it is the go to library for plotting in Python). Seaborn provides a high-level interface for drawing attractive and informative statistical graphics."
},
{
"code": null,
"e": ... |
How to left align components vertically using BoxLayout with Java? | To align components vertically, use the BoxLayout −
JFrame frame = new JFrame();
frame.getContentPane().setLayout(new BoxLayout(frame.getContentPane(), BoxLayout.Y_AXIS));
Now, create a Panel and add some buttons to it. After that set left alignment of components which are already arranged vertically using Component.LE... | [
{
"code": null,
"e": 1114,
"s": 1062,
"text": "To align components vertically, use the BoxLayout −"
},
{
"code": null,
"e": 1234,
"s": 1114,
"text": "JFrame frame = new JFrame();\nframe.getContentPane().setLayout(new BoxLayout(frame.getContentPane(), BoxLayout.Y_AXIS));"
},
{... |
Access to Python’s configuration information | Configuration information of Python's installation can be accessed by the sysconfig module. For example the list of installation paths and the configuration variables specific to the installation platform.
The sysconfig module provides the following functions to access Configuration variables
With no arguments, this fu... | [
{
"code": null,
"e": 1268,
"s": 1062,
"text": "Configuration information of Python's installation can be accessed by the sysconfig module. For example the list of installation paths and the configuration variables specific to the installation platform."
},
{
"code": null,
"e": 1356,
... |
SQL - Comparison Operators | Consider the CUSTOMERS table having the following records −
SQL> SELECT * FROM CUSTOMERS;
+----+----------+-----+-----------+----------+
| ID | NAME | AGE | ADDRESS | SALARY |
+----+----------+-----+-----------+----------+
| 1 | Ramesh | 32 | Ahmedabad | 2000.00 |
| 2 | Khilan | 25 | Delhi | 1500.... | [
{
"code": null,
"e": 2513,
"s": 2453,
"text": "Consider the CUSTOMERS table having the following records −"
},
{
"code": null,
"e": 2543,
"s": 2513,
"text": "SQL> SELECT * FROM CUSTOMERS;"
},
{
"code": null,
"e": 3086,
"s": 2543,
"text": "+----+----------+----... |
grubby - Unix, Linux Command | On Intel x86 platforms, grub is the default bootloader and the
configuration file is in /boot/grub/grub.conf. On Intel ia64 platforms,
elilo mode is used and the default location for the configuration file
is /boot/grub/grub.conf. On PowerPC platforms, yaboot parsing
is used and the configuration file should be in /etc... | [
{
"code": null,
"e": 10917,
"s": 10581,
"text": "\nOn Intel x86 platforms, grub is the default bootloader and the\nconfiguration file is in /boot/grub/grub.conf. On Intel ia64 platforms,\nelilo mode is used and the default location for the configuration file\nis /boot/grub/grub.conf. On PowerPC plat... |
Groovy - find() | The find method finds the first value in a collection that matches some criterion.
Object find(Closure closure)
The condition to be met by the collection element is specified in the closure that must be some Boolean expression.
Return Value − The find method returns the first value found or null if no such element exi... | [
{
"code": null,
"e": 2321,
"s": 2238,
"text": "The find method finds the first value in a collection that matches some criterion."
},
{
"code": null,
"e": 2351,
"s": 2321,
"text": "Object find(Closure closure)\n"
},
{
"code": null,
"e": 2467,
"s": 2351,
"text"... |
MySQL - LOAD DATA Statement | Using the LOAD DATA statement, you can insert the contents of a file (from the server or a host) into a MySQL table. If you use the LOCAL clause, you can upload the local files contents int to a table.
Following is the syntax of the above statement −
LOAD DATA
[LOCAL]
INFILE 'file_name'
[REPLACE | IGNORE... | [
{
"code": null,
"e": 2535,
"s": 2333,
"text": "Using the LOAD DATA statement, you can insert the contents of a file (from the server or a host) into a MySQL table. If you use the LOCAL clause, you can upload the local files contents int to a table."
},
{
"code": null,
"e": 2584,
"s":... |
Logstash - Supported Inputs | Logstash supports a huge range of logs from different sources. It is working with famous sources as explained below.
System events and other time activities are recorded in metrics. Logstash can access the log from system metrics and process them using filters. This helps to show the user the live feed of the events in... | [
{
"code": null,
"e": 2172,
"s": 2055,
"text": "Logstash supports a huge range of logs from different sources. It is working with famous sources as explained below."
},
{
"code": null,
"e": 2515,
"s": 2172,
"text": "System events and other time activities are recorded in metrics. ... |
Convolutional Neural Network: Good Understanding of the Layers and an Image Classification Example | by Rashida Nasrin Sucky | Towards Data Science | The Convolutional Neural Network (CNN) is a multi-layered neural network that is known to be able to detect patterns and complex features. It has been useful in face detection, self-driving cars, and a lot more very complex tasks. In this article, I will give you a high-level idea of how a Convolutional Neural Network ... | [
{
"code": null,
"e": 498,
"s": 171,
"text": "The Convolutional Neural Network (CNN) is a multi-layered neural network that is known to be able to detect patterns and complex features. It has been useful in face detection, self-driving cars, and a lot more very complex tasks. In this article, I will ... |
Writing First C++ Program – Hello World Example | 15 Jul, 2022
C++ is a widely used Object Oriented Programming language and is fairly easy to understand. Learning C++ programming can be simplified into:
Writing your program in a text editor and saving it with correct extension(.CPP, .C, .CP)
Compiling your program using a compiler or online IDE
Understanding the b... | [
{
"code": null,
"e": 53,
"s": 25,
"text": "\n15 Jul, 2022"
},
{
"code": null,
"e": 197,
"s": 53,
"text": "C++ is a widely used Object Oriented Programming language and is fairly easy to understand. Learning C++ programming can be simplified into: "
},
{
"code": null,
... |
Minimum and Maximum Number of Nodes Between Critical Points | 25 Feb, 2022
Given an array arr[], return an array of size 2 consisting of 2 values, the first one the minDistance and the second one maxDistance. Here minDistance is the minimum distance between any two distinct critical points and maxDistance is the maximum distance between any two distinct critical points and by cha... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n25 Feb, 2022"
},
{
"code": null,
"e": 415,
"s": 28,
"text": "Given an array arr[], return an array of size 2 consisting of 2 values, the first one the minDistance and the second one maxDistance. Here minDistance is the minimum distance ... |
How to install requests in Python – For windows, linux, mac | 06 Oct, 2021
Requests is an elegant and simple HTTP library for Python, built for human beings. One of the most famous libraries for python used by developers al over the world. This article revolves around how one can install requests library of python in Windows/ Linux/ macOS, etc.
For installing requests in windows,... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n06 Oct, 2021"
},
{
"code": null,
"e": 300,
"s": 28,
"text": "Requests is an elegant and simple HTTP library for Python, built for human beings. One of the most famous libraries for python used by developers al over the world. This artic... |
How to animate 3D Graph using Matplotlib? | 20 Apr, 2022
Prerequisites: Matplotlib, NumPy
Graphical representations are always easy to understand and are adopted and preferable before any written or verbal communication. With Matplotlib we can draw different types of Graphical data. In this article, we will try to understand, How can we create a beautiful graph ... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n20 Apr, 2022"
},
{
"code": null,
"e": 61,
"s": 28,
"text": "Prerequisites: Matplotlib, NumPy"
},
{
"code": null,
"e": 401,
"s": 61,
"text": "Graphical representations are always easy to understand and are adopted and... |
How to clear all cookies using JavaScript ? | 29 Jan, 2020
Cookies provide a way for a client and server to interact and pass information via HTTP. This enables the client to store state information despite using HTTP which is a stateless protocol. When a browser requests a web page from a server, the server services the request and “forgets” about the visit. But ... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n29 Jan, 2020"
},
{
"code": null,
"e": 486,
"s": 28,
"text": "Cookies provide a way for a client and server to interact and pass information via HTTP. This enables the client to store state information despite using HTTP which is a state... |
Output of C Programs | Set 4 | 20 Jan, 2022
Predict the output of below programs
Question 1
c
#include‹stdio.h›int main(){ struct site { char name[] = "GeeksforGeeks"; int no_of_pages = 200; }; struct site *ptr; printf("%d",ptr->no_of_pages); printf("%s",ptr->name); getchar(); return 0;}
Output: Compiler erro... | [
{
"code": null,
"e": 54,
"s": 26,
"text": "\n20 Jan, 2022"
},
{
"code": null,
"e": 92,
"s": 54,
"text": "Predict the output of below programs "
},
{
"code": null,
"e": 105,
"s": 92,
"text": "Question 1 "
},
{
"code": null,
"e": 107,
"s": 105,
... |
Create a V8 Heap Snapshot in ElectronJS | 23 Jun, 2020
ElectronJS is an Open Source Framework used for building Cross-Platform native desktop applications using web technologies such as HTML, CSS, and JavaScript which are capable of running on Windows, macOS, and Linux operating systems. It combines the Chromium engine and NodeJS into a Single Runtime.
NodeJS ... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n23 Jun, 2020"
},
{
"code": null,
"e": 328,
"s": 28,
"text": "ElectronJS is an Open Source Framework used for building Cross-Platform native desktop applications using web technologies such as HTML, CSS, and JavaScript which are capable ... |
Python: Weight Conversion GUI using Tkinter | 15 Jan, 2021
Prerequisites: Python GUI – tkinterPython offers multiple options for developing a GUI (Graphical User Interface). Out of all the GUI methods, Tkinter is the most commonly used method. It is a standard Python interface to the Tk GUI toolkit shipped with Python. Python with Tkinter outputs the fastest and e... | [
{
"code": null,
"e": 54,
"s": 26,
"text": "\n15 Jan, 2021"
},
{
"code": null,
"e": 447,
"s": 54,
"text": "Prerequisites: Python GUI – tkinterPython offers multiple options for developing a GUI (Graphical User Interface). Out of all the GUI methods, Tkinter is the most commonly us... |
Python – Create Dictionary Of Tuples | 10 Oct, 2021
In this article, we will discuss how to create a dictionary of tuples in Python.
Here we will pass keys as tuples inside a dictionary
Syntax:
{(tuple1):value,(tuple2):value,.........,(tuple3):value}
Here tuple is a collection of elements that work as a key for some value
Example: Python program to create a... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n10 Oct, 2021"
},
{
"code": null,
"e": 109,
"s": 28,
"text": "In this article, we will discuss how to create a dictionary of tuples in Python."
},
{
"code": null,
"e": 162,
"s": 109,
"text": "Here we will pass keys as... |
Every Function You Can (Should) Use In Pandas for Time Series Data Manipulation | Towards Data Science | Recently, the Optiver Realized Volatility Prediction competition has been launched on Kaggle. As the name suggests, it is a time series forecasting challenge.
I wanted to participate, but it turns out my knowledge in time series couldn’t even begin to suffice to participate in a competition of such a magnitude. So, I a... | [
{
"code": null,
"e": 330,
"s": 171,
"text": "Recently, the Optiver Realized Volatility Prediction competition has been launched on Kaggle. As the name suggests, it is a time series forecasting challenge."
},
{
"code": null,
"e": 602,
"s": 330,
"text": "I wanted to participate, bu... |
Plot a black-and-white binary map in Matplotlib | To plot black-and-white binary map in matplotlib, we can create and add two subplots to the current figure using subplot() method, where nrows=1 and ncols=2. To display the data as a binary map, we can use greys colormap in imshow() method.
Create data using numpy
Add two sublots, nrows=1 and ncols=2. Consider index 1.... | [
{
"code": null,
"e": 1303,
"s": 1062,
"text": "To plot black-and-white binary map in matplotlib, we can create and add two subplots to the current figure using subplot() method, where nrows=1 and ncols=2. To display the data as a binary map, we can use greys colormap in imshow() method."
},
{
... |
SQLite - Views | A view is nothing more than a SQLite statement that is stored in the database with an associated name. It is actually a composition of a table in the form of a predefined SQLite query.
A view can contain all rows of a table or selected rows from one or more tables. A view can be created from one or many tables which de... | [
{
"code": null,
"e": 2823,
"s": 2638,
"text": "A view is nothing more than a SQLite statement that is stored in the database with an associated name. It is actually a composition of a table in the form of a predefined SQLite query."
},
{
"code": null,
"e": 3010,
"s": 2823,
"text"... |
HTML5 Canvas - Styles and Colors | HTML5 canvas provides the following two important properties to apply colors to a shape −
fillStyle
This attribute represents the color or style to use inside the shapes.
strokeStyle
This attribute represents the color or style to use for the lines around shapes.
By default, the stroke and fill color are set to black w... | [
{
"code": null,
"e": 2698,
"s": 2608,
"text": "HTML5 canvas provides the following two important properties to apply colors to a shape −"
},
{
"code": null,
"e": 2708,
"s": 2698,
"text": "fillStyle"
},
{
"code": null,
"e": 2779,
"s": 2708,
"text": "This attrib... |
JavaMail API - Core Classes | The JavaMail API consists of some interfaces and classes used to send, read, and delete e-mail messages. Though there are many packages in the JavaMail API, will cover the main two packages that are used in Java Mail API frequently: javax.mail and javax.mail.internet package. These packages contain all the JavaMail cor... | [
{
"code": null,
"e": 2412,
"s": 2071,
"text": "The JavaMail API consists of some interfaces and classes used to send, read, and delete e-mail messages. Though there are many packages in the JavaMail API, will cover the main two packages that are used in Java Mail API frequently: javax.mail and javax... |
JavaMail API - Bounced Messages | A message can be bounced for several reasons. This problem is discussed in depth at rfc1211. Only a server can determine the existence of a particular mailbox or user name. When the server detects an error, it will return a message indicating the reason for the failure to the sender of the original message.
There are m... | [
{
"code": null,
"e": 2380,
"s": 2071,
"text": "A message can be bounced for several reasons. This problem is discussed in depth at rfc1211. Only a server can determine the existence of a particular mailbox or user name. When the server detects an error, it will return a message indicating the reason... |
Algorithms | Sorting | Question 23 - GeeksforGeeks | 19 Nov, 2018
Suppose we are sorting an array of eight integers using quicksort, and we have just finished the first partitioning with the array looking like this:
2 5 1 7 9 12 11 10
Which statement is correct?(A) The pivot could be either the 7 or the 9.(B) The pivot could be the 7, but it is not the 9(C) The p... | [
{
"code": null,
"e": 24130,
"s": 24102,
"text": "\n19 Nov, 2018"
},
{
"code": null,
"e": 24280,
"s": 24130,
"text": "Suppose we are sorting an array of eight integers using quicksort, and we have just finished the first partitioning with the array looking like this:"
},
{
... |
Nuclei - Fast and Customizable Vulnerability Scanner - GeeksforGeeks | 28 Jul, 2021
Nuclei is a Fast and Customizable Vulnerability Scanner. Nuclei tool is Golang Language-based tool used to send requests across multiple targets based on nuclei templates leading to zero false positive or irrelevant results and provides fast scanning on various hosts. Nuclei have built-in support to automa... | [
{
"code": null,
"e": 25651,
"s": 25623,
"text": "\n28 Jul, 2021"
},
{
"code": null,
"e": 26275,
"s": 25651,
"text": "Nuclei is a Fast and Customizable Vulnerability Scanner. Nuclei tool is Golang Language-based tool used to send requests across multiple targets based on nuclei te... |
10's Complement of a decimal number - GeeksforGeeks | 07 Jul, 2021
Given a decimal number N. The task is to find 10’s complement of the number N.Example:
Input : 25
Output : 10's complement is : 75
Input : 456
Output : 10's complement is : 544
10’s complement of a decimal number can be found by adding 1 to the 9’s complement of that decimal number. It is just like 2s... | [
{
"code": null,
"e": 26173,
"s": 26145,
"text": "\n07 Jul, 2021"
},
{
"code": null,
"e": 26262,
"s": 26173,
"text": "Given a decimal number N. The task is to find 10’s complement of the number N.Example: "
},
{
"code": null,
"e": 26353,
"s": 26262,
"text": "I... |
Find the number of pairs such that their gcd is equals to 1 - GeeksforGeeks | 18 Mar, 2022
Given an array a of size N. The task is to find the number of pairs such that gcd(a[i], a[j]) is equal to 1, where 1 ≤ i < j ≤ N.
Examples:
Input : a[] = {1, 2, 4, 6} Output : 3 {1, 2}, {1, 4}, {1, 6} are such pairs
Input : a[] = {1, 2, 3, 4, 5, 6} Output : 11
Approach : The answer is to sum of μ(X) *... | [
{
"code": null,
"e": 26071,
"s": 26043,
"text": "\n18 Mar, 2022"
},
{
"code": null,
"e": 26202,
"s": 26071,
"text": "Given an array a of size N. The task is to find the number of pairs such that gcd(a[i], a[j]) is equal to 1, where 1 ≤ i < j ≤ N. "
},
{
"code": null,
... |
How to make Incremental and Decremental counter using HTML, CSS and JavaScript? - GeeksforGeeks | 26 Mar, 2021
While visiting different shopping websites like Flipkart and Amazon you have seen a counter on each product, that counter is used to specify the quantity of that product. Hence, counter is very useful part for many websites. In this article, we will design a counter using HTML, CSS, and JavaScript.
A sampl... | [
{
"code": null,
"e": 26621,
"s": 26593,
"text": "\n26 Mar, 2021"
},
{
"code": null,
"e": 26921,
"s": 26621,
"text": "While visiting different shopping websites like Flipkart and Amazon you have seen a counter on each product, that counter is used to specify the quantity of that p... |
SDN Controllers (Ryu and ODL) - GeeksforGeeks | 23 Oct, 2020
Before we move deeper with the SDN Controllers, let us understand what is SDN and SDN Controller.
Software-Defined Networks (SDN) :It is one of the biggest and on-going platforms in the area of Networks which makes the network flexible and agile. SDN overcomes all the demerits of Traditional Networks. The ... | [
{
"code": null,
"e": 25755,
"s": 25727,
"text": "\n23 Oct, 2020"
},
{
"code": null,
"e": 25853,
"s": 25755,
"text": "Before we move deeper with the SDN Controllers, let us understand what is SDN and SDN Controller."
},
{
"code": null,
"e": 26299,
"s": 25853,
"... |
Hello World in Tkinter - GeeksforGeeks | 17 May, 2020
Tkinter is the Python GUI framework that is build into the Python standard library. Out of all the GUI methods, tkinter is the most commonly used method as it provides the fastest and the easiest way to create the GUI application.
Lets start with the ‘hello world’ tutorial. Here is the explanation for the ... | [
{
"code": null,
"e": 25610,
"s": 25582,
"text": "\n17 May, 2020"
},
{
"code": null,
"e": 25841,
"s": 25610,
"text": "Tkinter is the Python GUI framework that is build into the Python standard library. Out of all the GUI methods, tkinter is the most commonly used method as it prov... |
C Library Functions - GeeksforGeeks | 13 Sep, 2021
The Standard Function Library in C is a huge library of sub-libraries, each of which contains the code for several functions. In order to make use of these libraries, link each library in the broader library through the use of header files. The definitions of these functions are present in their respective... | [
{
"code": null,
"e": 25478,
"s": 25450,
"text": "\n13 Sep, 2021"
},
{
"code": null,
"e": 25931,
"s": 25478,
"text": "The Standard Function Library in C is a huge library of sub-libraries, each of which contains the code for several functions. In order to make use of these librari... |
Fabric.js Image scaleX Property - GeeksforGeeks | 29 Jan, 2021
Fabric.js is a JavaScript library that is used to work with canvas. The canvas Image is one of the class of fabric.js that is used to create Image instances. The Image in Fabric.js is movable and can be stretched according to requirement. In this article, we will be using the scaleX property to set the hor... | [
{
"code": null,
"e": 26139,
"s": 26111,
"text": "\n29 Jan, 2021"
},
{
"code": null,
"e": 26481,
"s": 26139,
"text": "Fabric.js is a JavaScript library that is used to work with canvas. The canvas Image is one of the class of fabric.js that is used to create Image instances. The I... |
PyQt5 - Create a User form to get information - GeeksforGeeks | 03 Jan, 2022
In this article we will see how we can create a user form in PyQt5. A user form is basically a dialog box that makes a user data entry more controllable and easier to use for the user. Sometimes while creating a large user interface application there is need of creating user form in order to get essential ... | [
{
"code": null,
"e": 25457,
"s": 25429,
"text": "\n03 Jan, 2022"
},
{
"code": null,
"e": 25777,
"s": 25457,
"text": "In this article we will see how we can create a user form in PyQt5. A user form is basically a dialog box that makes a user data entry more controllable and easier... |
Python | Pandas Series.as_matrix() - GeeksforGeeks | 27 Feb, 2019
Pandas series is a One-dimensional ndarray with axis labels. The labels need not be unique but must be a hashable type. The object supports both integer- and label-based indexing and provides a host of methods for performing operations involving the index.
Pandas Series.as_matrix() function is used to conv... | [
{
"code": null,
"e": 26236,
"s": 26208,
"text": "\n27 Feb, 2019"
},
{
"code": null,
"e": 26493,
"s": 26236,
"text": "Pandas series is a One-dimensional ndarray with axis labels. The labels need not be unique but must be a hashable type. The object supports both integer- and label... |
Accessing array out of bounds in C/C++ | In a language such as Java, an exception such as java.lang.ArrayIndexOutOfBoundsException may occur if an array is accessed out of bounds. But there is no such functionality in C and undefined behaviour may occur if an array is accessed out of bounds.
A program that demonstrates this in C is given as follows.
Live Dem... | [
{
"code": null,
"e": 1314,
"s": 1062,
"text": "In a language such as Java, an exception such as java.lang.ArrayIndexOutOfBoundsException may occur if an array is accessed out of bounds. But there is no such functionality in C and undefined behaviour may occur if an array is accessed out of bounds."
... |
list remove() function in C++ STL - GeeksforGeeks | 20 Jun, 2018
The list::remove() is a built-in function in C++ STL which is used to remove elements from a list container. It removes elements comparing to a value. It takes a value as the parameter and removes all the elements from the list container whose value is equal to the value passed in the parameter of the func... | [
{
"code": null,
"e": 24602,
"s": 24574,
"text": "\n20 Jun, 2018"
},
{
"code": null,
"e": 24915,
"s": 24602,
"text": "The list::remove() is a built-in function in C++ STL which is used to remove elements from a list container. It removes elements comparing to a value. It takes a v... |
Ten random useful things in R that you might not know about | by Keith McNulty | Towards Data Science | Often I find myself telling my colleagues and fellow coders simple things that I use in R that really help me with the tasks that I need to progress on. These range from trivial shortcuts, to little known functions, to handy little tricks.
Because the R ecosystem is so rich and constantly growing, people can often miss... | [
{
"code": null,
"e": 411,
"s": 171,
"text": "Often I find myself telling my colleagues and fellow coders simple things that I use in R that really help me with the tasks that I need to progress on. These range from trivial shortcuts, to little known functions, to handy little tricks."
},
{
"... |
Java Substring Comparisons | Following is an example which compares Strings and portion of strings in Java? Explain with an example.
Live Demo
public class StringDemo {
public static void main(String[] args) {
String str1 = "tutorials point";
String str2 = str1.substring(10);
int result = str1.compareTo(str2);
// prints ... | [
{
"code": null,
"e": 1166,
"s": 1062,
"text": "Following is an example which compares Strings and portion of strings in Java? Explain with an example."
},
{
"code": null,
"e": 1176,
"s": 1166,
"text": "Live Demo"
},
{
"code": null,
"e": 1668,
"s": 1176,
"text"... |
How to create a TreeMap in reverse order in Java - GeeksforGeeks | 25 Oct, 2019
By default TreeMap elements in Java are sorted in ascending order of keys. However, we can create the TreeMap in reverse order using Collections.reverseOrder() method in Java and display the elements in descending order of keys.
The Collections.reverseOrderS() method in Java returns a Comparator that impos... | [
{
"code": null,
"e": 25463,
"s": 25435,
"text": "\n25 Oct, 2019"
},
{
"code": null,
"e": 25692,
"s": 25463,
"text": "By default TreeMap elements in Java are sorted in ascending order of keys. However, we can create the TreeMap in reverse order using Collections.reverseOrder() met... |
How to render plain text of HTML in Node.js ? - GeeksforGeeks | 10 Oct, 2021
Express Js is the web application framework based on Node.js web server functionality that helps us to create the application endpoints that respond based on the HTTP request (POST, GET, etc) method and the requested route. The res.sendFile() method of the express.js module is used to render a particular H... | [
{
"code": null,
"e": 26267,
"s": 26239,
"text": "\n10 Oct, 2021"
},
{
"code": null,
"e": 26621,
"s": 26267,
"text": "Express Js is the web application framework based on Node.js web server functionality that helps us to create the application endpoints that respond based on the H... |
How to create HTTPS Server with Node.js ? - GeeksforGeeks | 01 Oct, 2021
The HTTP protocol is one of the most important protocols for smooth communication between the networks but in the HTTP protocol, data is not encrypted so any sensitive information can be sniffed during the communication so there is another version of the HTTP i.e HTTPS that encrypts the data during the tra... | [
{
"code": null,
"e": 26401,
"s": 26373,
"text": "\n01 Oct, 2021"
},
{
"code": null,
"e": 26834,
"s": 26401,
"text": "The HTTP protocol is one of the most important protocols for smooth communication between the networks but in the HTTP protocol, data is not encrypted so any sensi... |
How to create five equal columns in Bootstrap ? - GeeksforGeeks | 19 Jun, 2019
Creating any number of equal columns in a ‘row’ was never as easier as it is now of Bootstrap 4.0+. With the introduction of ‘flexbox’ approach to the grid system, designers don’t have to worry about adding additional CSS to make it work. Here’s how it is done.
Go to the Bootstrap site and get the latest B... | [
{
"code": null,
"e": 26700,
"s": 26672,
"text": "\n19 Jun, 2019"
},
{
"code": null,
"e": 26962,
"s": 26700,
"text": "Creating any number of equal columns in a ‘row’ was never as easier as it is now of Bootstrap 4.0+. With the introduction of ‘flexbox’ approach to the grid system,... |
firstof - Django Template Tags - GeeksforGeeks | 27 Dec, 2021
A Django template is a text document or a Python string marked-up using the Django template language. Django being a powerful Batteries included framework provides convenience to rendering data in a template. Django templates not only allow passing data from view to template, but also provides some limited... | [
{
"code": null,
"e": 25561,
"s": 25533,
"text": "\n27 Dec, 2021"
},
{
"code": null,
"e": 26232,
"s": 25561,
"text": "A Django template is a text document or a Python string marked-up using the Django template language. Django being a powerful Batteries included framework provides... |
Python | String startswith() - GeeksforGeeks | 11 Jan, 2018
The startswith() method returns True if a string starts with the given prefix otherwise returns False.
Syntax :
str.startswith(prefix, start, end)
Parameters :
prefix : prefix ix nothing but a string which needs to be checked.
start : Starting position where prefix is needs to be checked within the string... | [
{
"code": null,
"e": 24682,
"s": 24654,
"text": "\n11 Jan, 2018"
},
{
"code": null,
"e": 24785,
"s": 24682,
"text": "The startswith() method returns True if a string starts with the given prefix otherwise returns False."
},
{
"code": null,
"e": 24794,
"s": 24785,
... |
Linear Regression using PyTorch - GeeksforGeeks | 17 Sep, 2021
Linear Regression is a very commonly used statistical method that allows us to determine and study the relationship between two continuous variables. The various properties of linear regression and its Python implementation have been covered in this article previously. Now, we shall find out how to impleme... | [
{
"code": null,
"e": 25499,
"s": 25471,
"text": "\n17 Sep, 2021"
},
{
"code": null,
"e": 26154,
"s": 25499,
"text": "Linear Regression is a very commonly used statistical method that allows us to determine and study the relationship between two continuous variables. The various p... |
Maximum execution time taken by a PHP Script - GeeksforGeeks | 25 Jan, 2022
One important aspect of PHP programs is that the maximum time taken to execute a script is 30 seconds. The time limit varies depending on the hosting companies but the maximum execution time is between 30 to 60 seconds. The user may get errors of maximum time limit exceeds due to some heavy import or expor... | [
{
"code": null,
"e": 26153,
"s": 26125,
"text": "\n25 Jan, 2022"
},
{
"code": null,
"e": 26927,
"s": 26153,
"text": "One important aspect of PHP programs is that the maximum time taken to execute a script is 30 seconds. The time limit varies depending on the hosting companies but... |
5 Must-Know Terms in Time Series Analysis | by Soner Yıldırım | Towards Data Science | A time series is a sequence of observations or measurements ordered in time. The first picture that comes to mind when talking about time series is usually stock prices. However, time series are ubiquitous.
Yearly rainfall amounts in a geographical location, the daily sales amount of a product in a supermarket, monthly... | [
{
"code": null,
"e": 379,
"s": 172,
"text": "A time series is a sequence of observations or measurements ordered in time. The first picture that comes to mind when talking about time series is usually stock prices. However, time series are ubiquitous."
},
{
"code": null,
"e": 600,
"s... |
How to copy readonly and hidden files/folders in the PowerShell? | To copy the readonly and hidden items from one location to another, you need to use the –Force parameter with Copy-Item cmdlet.
When you run the command without Force parameter for the readonly/hidden files, you will get the error. An example is given below.
Copy-Item D:\Temp\Readonlyfile.txt -Destination D:\TempConten... | [
{
"code": null,
"e": 1190,
"s": 1062,
"text": "To copy the readonly and hidden items from one location to another, you need to use the –Force parameter with Copy-Item cmdlet."
},
{
"code": null,
"e": 1321,
"s": 1190,
"text": "When you run the command without Force parameter for t... |
Learn Enough Python to be Useful: argparse | by Jeff Hale | Towards Data Science | If you plan to be a software developer with Python, you’ll want to be able to use argparse for your scripting needs. If you’re a data scientist, you’ll likely find yourself needing to port your code from a Jupyter Notebook to a reproducible script. For many newer data scientists this can be a step from a comfortable, h... | [
{
"code": null,
"e": 571,
"s": 171,
"text": "If you plan to be a software developer with Python, you’ll want to be able to use argparse for your scripting needs. If you’re a data scientist, you’ll likely find yourself needing to port your code from a Jupyter Notebook to a reproducible script. For ma... |
Function Wrappers in Python - GeeksforGeeks | 22 Jun, 2020
Wrappers around the functions are also knows as decorators which are a very powerful and useful tool in Python since it allows programmers to modify the behavior of function or class. Decorators allow us to wrap another function in order to extend the behavior of the wrapped function, without permanently m... | [
{
"code": null,
"e": 24053,
"s": 24025,
"text": "\n22 Jun, 2020"
},
{
"code": null,
"e": 24491,
"s": 24053,
"text": "Wrappers around the functions are also knows as decorators which are a very powerful and useful tool in Python since it allows programmers to modify the behavior o... |
LAN Technologies | ETHERNET - GeeksforGeeks | 24 Mar, 2022
A local Area Network (LAN) is a data communication network connecting various terminals or computers within a building or limited geographical area. The connection among the devices could be wired or wireless. Ethernet, Token Ring and Wireless LAN using IEEE 802.11 are examples of standard LAN technologies... | [
{
"code": null,
"e": 36201,
"s": 36173,
"text": "\n24 Mar, 2022"
},
{
"code": null,
"e": 36546,
"s": 36201,
"text": "A local Area Network (LAN) is a data communication network connecting various terminals or computers within a building or limited geographical area. The connection... |
Neo4j & DGL — a seamless integration | by Kristof Neys | Towards Data Science | This blog post was co-authored with Clair Sullivan and Mark Needham
The release of the Neo4j GDS library version 1.5, and the build-in machine learning models, has now given the Data Scientist that needs to perform a machine learning task on any graph in Neo4j two possible routes to a solution.
If time is of the essenc... | [
{
"code": null,
"e": 239,
"s": 171,
"text": "This blog post was co-authored with Clair Sullivan and Mark Needham"
},
{
"code": null,
"e": 467,
"s": 239,
"text": "The release of the Neo4j GDS library version 1.5, and the build-in machine learning models, has now given the Data Sci... |
Exercise Classification with Machine Learning (Part I) | by Trevor Phillips | Towards Data Science | In this two-part post we’re taking a deep dive into a specific problem: classifying videos of people performing various exercises.
The first post will focus on a more algorithmic approach using k-Nearest Neighbors to classify an unknown video, and in the second post, we’ll look at an exclusively machine learning (ML) a... | [
{
"code": null,
"e": 303,
"s": 172,
"text": "In this two-part post we’re taking a deep dive into a specific problem: classifying videos of people performing various exercises."
},
{
"code": null,
"e": 501,
"s": 303,
"text": "The first post will focus on a more algorithmic approac... |
strupr() function in c - GeeksforGeeks | 28 Sep, 2018
The strupr( ) function is used to converts a given string to uppercase.
Syntax:
char *strupr(char *str);
Parameter:
str: This represents the given string which we want to convert into uppercase.
Returns: It returns the modified string obtained after converting the characters of the given string str to upp... | [
{
"code": null,
"e": 24599,
"s": 24571,
"text": "\n28 Sep, 2018"
},
{
"code": null,
"e": 24671,
"s": 24599,
"text": "The strupr( ) function is used to converts a given string to uppercase."
},
{
"code": null,
"e": 24679,
"s": 24671,
"text": "Syntax:"
},
{
... |
Lexicographic rank of a string using STL - GeeksforGeeks | 12 Apr, 2019
You are given a string, find its rank among all its permutations sorted lexicographically.
Examples:
Input : str[] = "acb"
Output : Rank = 2
Input : str[] = "string"
Output : Rank = 598
Input : str[] = "cba"
Output : Rank = 6
We have already discussed solutions to find Lexicographic rank of string
In th... | [
{
"code": null,
"e": 26721,
"s": 26693,
"text": "\n12 Apr, 2019"
},
{
"code": null,
"e": 26812,
"s": 26721,
"text": "You are given a string, find its rank among all its permutations sorted lexicographically."
},
{
"code": null,
"e": 26822,
"s": 26812,
"text": ... |
GATE | GATE CS 2010 | Question 65 - GeeksforGeeks | 27 Jul, 2021
Which of the following statements are true?
I. Shortest remaining time first scheduling may cause starvation
II. Preemptive scheduling may cause starvation
III. Round robin is better than FCFS in terms of response time
(A) I only(B) I and III only(C) II and III only(D) I, II and IIIAnswer: (D)Explanation: ... | [
{
"code": null,
"e": 25627,
"s": 25599,
"text": "\n27 Jul, 2021"
},
{
"code": null,
"e": 25671,
"s": 25627,
"text": "Which of the following statements are true?"
},
{
"code": null,
"e": 25846,
"s": 25671,
"text": "I. Shortest remaining time first scheduling ma... |
map upper_bound() function in C++ STL - GeeksforGeeks | 03 Jun, 2020
The map::upper_bound() is a built-in function in C++ STL which returns an iterator pointing to the immediate next element just greater than k. If the key passed in the parameter exceeds the maximum key in the container, then the iterator returned points to the number of elements in the map container as key... | [
{
"code": null,
"e": 25762,
"s": 25734,
"text": "\n03 Jun, 2020"
},
{
"code": null,
"e": 26085,
"s": 25762,
"text": "The map::upper_bound() is a built-in function in C++ STL which returns an iterator pointing to the immediate next element just greater than k. If the key passed in... |
Maximize count of array elements required to obtain given sum - GeeksforGeeks | 23 Jan, 2022
Given an integer V and an array arr[] consisting of N integers, the task is to find the maximum number of array elements that can be selected from array arr[] to obtain the sum V. Each array element can be chosen any number of times. If the sum cannot be obtained, print -1.
Examples:
Input: arr[] = {25, 10... | [
{
"code": null,
"e": 26067,
"s": 26039,
"text": "\n23 Jan, 2022"
},
{
"code": null,
"e": 26342,
"s": 26067,
"text": "Given an integer V and an array arr[] consisting of N integers, the task is to find the maximum number of array elements that can be selected from array arr[] to o... |
Python - XML to JSON - GeeksforGeeks | 14 Aug, 2021
A JSON file is a file that stores simple data structures and objects in JavaScript Object Notation (JSON) format, which is a standard data interchange format. It is primarily used for transmitting data between a web application and a server.A JSON object contains data in the form of a key/value pair. The k... | [
{
"code": null,
"e": 25746,
"s": 25718,
"text": "\n14 Aug, 2021"
},
{
"code": null,
"e": 26938,
"s": 25746,
"text": "A JSON file is a file that stores simple data structures and objects in JavaScript Object Notation (JSON) format, which is a standard data interchange format. It i... |
Full Adder using Verilog HDL - GeeksforGeeks | 13 Sep, 2021
In this article, we will discuss the overview part of Full Adder using Verilog HDL. And the objective to understand the concept and will implement using Verilog HDL code for Full Adder. Let’s discuss it one by one.
Prerequisite – Full Adder in Digital Logic
Problem Statement : Write a Verilog HDL to design... | [
{
"code": null,
"e": 25706,
"s": 25678,
"text": "\n13 Sep, 2021"
},
{
"code": null,
"e": 25921,
"s": 25706,
"text": "In this article, we will discuss the overview part of Full Adder using Verilog HDL. And the objective to understand the concept and will implement using Verilog HD... |
jQuery | event.relatedTarget Property with Example - GeeksforGeeks | 12 Feb, 2019
The event.relatedTarget is an inbuilt property in jQuery that is used to find which element is being entered or gets exit on mouse movement.Syntax:
event.relatedTarget
Parameter: It does not accept any parameter because it is a property not a function.Return Value: It returns which element being entered o... | [
{
"code": null,
"e": 26002,
"s": 25974,
"text": "\n12 Feb, 2019"
},
{
"code": null,
"e": 26150,
"s": 26002,
"text": "The event.relatedTarget is an inbuilt property in jQuery that is used to find which element is being entered or gets exit on mouse movement.Syntax:"
},
{
"... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.