title stringlengths 3 221 | text stringlengths 17 477k | parsed listlengths 0 3.17k |
|---|---|---|
Sort an array of objects using Boolean property in JavaScript | 30 Jan, 2020
Given the JavaScript array containing Boolean values. The task is to sort the array on the basis of Boolean value with the help of JavaScript. Here 2 approaches are discussed here.Approach 1:
Use JavaScript Array.sort() method.
In Comparison condition, Use === operator to compare the Boolean objects.
Retur... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n30 Jan, 2020"
},
{
"code": null,
"e": 220,
"s": 28,
"text": "Given the JavaScript array containing Boolean values. The task is to sort the array on the basis of Boolean value with the help of JavaScript. Here 2 approaches are discussed ... |
getAttribute() – Passing data from Server to JSP | 03 Dec, 2018
Suppose some data at the Server side has been created and now in order to pass that information in a JSP page, there is a need of request.getAttribute() method. This, in fact differentiates the getAttribute() and getParameter() methods. The latter is used to pass Client side data to a JSP.
Implementation1)... | [
{
"code": null,
"e": 54,
"s": 26,
"text": "\n03 Dec, 2018"
},
{
"code": null,
"e": 345,
"s": 54,
"text": "Suppose some data at the Server side has been created and now in order to pass that information in a JSP page, there is a need of request.getAttribute() method. This, in fact... |
CSS | fill Property | 28 Nov, 2019
The fill property is a presentation attribute used to set the color of a SVG shape.
Syntax:
fill: <paint>
Property Values:
paint: It is used to set the color of the fill property. This paint be defined using color names, hex, rgb or hsl values. The default value is black. It can also be used with patterns ... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n28 Nov, 2019"
},
{
"code": null,
"e": 112,
"s": 28,
"text": "The fill property is a presentation attribute used to set the color of a SVG shape."
},
{
"code": null,
"e": 120,
"s": 112,
"text": "Syntax:"
},
{
... |
Sort DataFrame by column name in R | 26 Mar, 2021
Sorting is the process of ordering items. It can be ascending order, descending order, alphabetical order, numerical order. To sort a DataFrame by column name in R programming, we can use various methods as discussed below. To get a better understanding of how to sort DataFrame by column name, let’s take s... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n26 Mar, 2021"
},
{
"code": null,
"e": 349,
"s": 28,
"text": "Sorting is the process of ordering items. It can be ascending order, descending order, alphabetical order, numerical order. To sort a DataFrame by column name in R programming... |
How to get all HTML content from DOMParser excluding the outer body tag ? | 23 Feb, 2022
DOM (Document Object Model) allows us to dynamically access and manipulate the HTML data. All the text data from an HTML file can also be extracted using DOMParser. DOM parser returns an HTML/XML/SVG object. All the objects can be accessed using the [ ] operator in javascript. The HTML DOM Tree of objects:... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n23 Feb, 2022"
},
{
"code": null,
"e": 338,
"s": 28,
"text": "DOM (Document Object Model) allows us to dynamically access and manipulate the HTML data. All the text data from an HTML file can also be extracted using DOMParser. DOM parser... |
Two-Proportions Z-Test in R Programming | 16 Jul, 2020
The two-proportions z-test is used to compare two observed proportions. For example, let there are two groups of individuals:
Group A with lung cancer: n = 500
Group B, healthy individuals: n = 500
The number of smokers in each group is as follow:
Group A with lung cancer: n = 500, 490 smokers, pA = 490/50... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n16 Jul, 2020"
},
{
"code": null,
"e": 154,
"s": 28,
"text": "The two-proportions z-test is used to compare two observed proportions. For example, let there are two groups of individuals:"
},
{
"code": null,
"e": 188,
"s"... |
Building an Ensemble Learning Model Using Scikit-learn | by Eijaz Allibhai | Towards Data Science | Ensemble learning uses multiple machine learning models to try to make better predictions on a dataset. An ensemble model works by training different models on a dataset and having each model make predictions individually. The predictions of these models are then combined in the ensemble model to make a final predictio... | [
{
"code": null,
"e": 495,
"s": 172,
"text": "Ensemble learning uses multiple machine learning models to try to make better predictions on a dataset. An ensemble model works by training different models on a dataset and having each model make predictions individually. The predictions of these models ... |
Automating Real Estate Investment Analysis: Python Web Scraping Bot | by Josh Rab | Towards Data Science | The goal is to build a python web tool that is capable of analyzing investment properties. The tool will use data mining to find prices for properties, and then analyze the return rate.
Summary
Index
Motivations
The App
The Functions
Summary and Going Forward
The applications of bots or automation to trading and invest... | [
{
"code": null,
"e": 358,
"s": 172,
"text": "The goal is to build a python web tool that is capable of analyzing investment properties. The tool will use data mining to find prices for properties, and then analyze the return rate."
},
{
"code": null,
"e": 366,
"s": 358,
"text": "... |
Longest Mountain Subarray - GeeksforGeeks | 22 Sep, 2021
Given an array arr[] with N elements, the task is to find out the longest sub-array which has the shape of a mountain.
A mountain sub-array consists of elements that are initially in ascending order until a peak element is reached and beyond the peak element all other elements of the sub-array are in decre... | [
{
"code": null,
"e": 25943,
"s": 25915,
"text": "\n22 Sep, 2021"
},
{
"code": null,
"e": 26062,
"s": 25943,
"text": "Given an array arr[] with N elements, the task is to find out the longest sub-array which has the shape of a mountain."
},
{
"code": null,
"e": 26263,
... |
Bayesian Neural Networks: 1 Why Bother? | by Adam Woolf | Towards Data Science | This is the first chapter in a series on Bayesian Deep Learning. The next chapter is available here while the third is here.
I’m often asked to explain my quirky interest in Bayesian Neural Networks. So this is the start of a series about them. Therefore it’s safe for me to say this is the start of a series about the f... | [
{
"code": null,
"e": 297,
"s": 172,
"text": "This is the first chapter in a series on Bayesian Deep Learning. The next chapter is available here while the third is here."
},
{
"code": null,
"e": 901,
"s": 297,
"text": "I’m often asked to explain my quirky interest in Bayesian Neu... |
jQuery - Weather.js | Weather.js is a jQuery plugin to find the information about weather details.
A Simple of Weather.js example as shown below −
<!DOCTYPE html>
<html lang = "en">
<head>
<meta charset = "UTF-8">
<meta name = "viewport" content = "width = device-width,
initial-scale = 1">
<link rel = "styles... | [
{
"code": null,
"e": 2399,
"s": 2322,
"text": "Weather.js is a jQuery plugin to find the information about weather details."
},
{
"code": null,
"e": 2448,
"s": 2399,
"text": "A Simple of Weather.js example as shown below −"
},
{
"code": null,
"e": 8209,
"s": 2448... |
Tryit Editor v3.7 | Tryit: The padding-left property | [] |
How to auto increment with 1 after deleting data from a MySQL table? | For this, you can use TRUNCATE TABLE command. Let us first create a table −
mysql> create table DemoTable1796
(
StudentId int NOT NULL AUTO_INCREMENT PRIMARY KEY,
StudentName varchar(20)
);
Query OK, 0 rows affected (0.00 sec)
Insert some records in the table using insert command −
mysql> insert int... | [
{
"code": null,
"e": 1138,
"s": 1062,
"text": "For this, you can use TRUNCATE TABLE command. Let us first create a table −"
},
{
"code": null,
"e": 1309,
"s": 1138,
"text": "mysql> create table DemoTable1796\n (\n StudentId int NOT NULL AUTO_INCREMENT PRIMARY KEY,\n S... |
Java program to find the area of a circle | Area of a circle is the product of the square of its radius, and the value of PI, Therefore, to calculate the area of a rectangle
Get the radius of the circle.
Calculate the square of the radius.
Calculate the product of the value of PI and the value of the square of the radius.
Print the result.
import java.util.Scann... | [
{
"code": null,
"e": 1192,
"s": 1062,
"text": "Area of a circle is the product of the square of its radius, and the value of PI, Therefore, to calculate the area of a rectangle"
},
{
"code": null,
"e": 1222,
"s": 1192,
"text": "Get the radius of the circle."
},
{
"code": ... |
Tryit Editor v3.7 | Tryit: Use six of the animation properties | [] |
Isolation Forest and Spark. Main characteristics and ways to use... | by Maria Karanasou | Towards Data Science | Isolation Forest is an algorithm for anomaly / outlier detection, basically a way to spot the odd one out. We go through the main characteristics and explore two ways to use Isolation Forest with Pyspark.
Most existing model-based approaches to anomaly detection construct a profile of normal instances, then identify in... | [
{
"code": null,
"e": 376,
"s": 171,
"text": "Isolation Forest is an algorithm for anomaly / outlier detection, basically a way to spot the odd one out. We go through the main characteristics and explore two ways to use Isolation Forest with Pyspark."
},
{
"code": null,
"e": 644,
"s":... |
MySQL query to return a string as a result of IF statement? | Let us first create a table −
mysql> create table DemoTable
(
Id int NOT NULL AUTO_INCREMENT PRIMARY KEY,
EmployeeSalary int
);
Query OK, 0 rows affected (1.68 sec)
Insert some records in the table using insert command −
mysql> insert into DemoTable(EmployeeSalary) values(12000);
Query OK, 1 row affected (0.24 se... | [
{
"code": null,
"e": 1092,
"s": 1062,
"text": "Let us first create a table −"
},
{
"code": null,
"e": 1233,
"s": 1092,
"text": "mysql> create table DemoTable\n(\n Id int NOT NULL AUTO_INCREMENT PRIMARY KEY,\n EmployeeSalary int\n);\nQuery OK, 0 rows affected (1.68 sec)"
},
... |
How to create a mega menu (full-width dropdown menu in a navigation bar) with HTML and CSS? | Following is the code to create a mega menu using HTML and CSS −
Live Demo
<!DOCTYPE html>
<html>
<head>
<style>
body {
margin: 0;
padding: 0;
}
*,*::before,*::after{
box-sizing: border-box;
}
nav {
overflow: hidden;
background-color: rgb(2, 161, 127);
font-family: Arial, Helvetica, sans-serif;
}
nav... | [
{
"code": null,
"e": 1127,
"s": 1062,
"text": "Following is the code to create a mega menu using HTML and CSS −"
},
{
"code": null,
"e": 1138,
"s": 1127,
"text": " Live Demo"
},
{
"code": null,
"e": 3276,
"s": 1138,
"text": "<!DOCTYPE html>\n<html>\n<head>\n<s... |
Elasticsearch - SQL Access | It is a component that allows SQL-like queries to be executed in real-time against Elasticsearch. You can think of Elasticsearch SQL as a translator, one that understands both SQL and Elasticsearch and makes it easy to read and process data in real-time, at scale by leveraging Elasticsearch capabilities.
It has native ... | [
{
"code": null,
"e": 2887,
"s": 2581,
"text": "It is a component that allows SQL-like queries to be executed in real-time against Elasticsearch. You can think of Elasticsearch SQL as a translator, one that understands both SQL and Elasticsearch and makes it easy to read and process data in real-time... |
Deep Learning with Tensorflow: Part 1 — theory and setup | by Matteo Kofler | Towards Data Science | Hi everyone, welcome to this blog series about Tensorflow. In part 1, I’ll give you some basic information about the framework and I’ll show you how to set up your coding environment on Windows 10. Let’s dive into it.
TensorFlow is a framework created by Google for creating Deep Learning models. Deep Learning is a cate... | [
{
"code": null,
"e": 389,
"s": 171,
"text": "Hi everyone, welcome to this blog series about Tensorflow. In part 1, I’ll give you some basic information about the framework and I’ll show you how to set up your coding environment on Windows 10. Let’s dive into it."
},
{
"code": null,
"e": ... |
Count of Range Sum in C++ | Suppose we have an integer array nums, we have to find the number of range sums that lie in range [lower, upper] both inclusive. The range sum S(i, j) is defined as the sum of the elements in nums from index i to index j where i ≤ j.
So if the input is like [-3,6,-1], lower = -2 and upper = 2, then the result will be 2... | [
{
"code": null,
"e": 1296,
"s": 1062,
"text": "Suppose we have an integer array nums, we have to find the number of range sums that lie in range [lower, upper] both inclusive. The range sum S(i, j) is defined as the sum of the elements in nums from index i to index j where i ≤ j."
},
{
"code... |
Snowflake S3 integration. Access files stored in S3 as a regular... | by Amit Singh Rathore | Towards Data Science | Snowflake integration objects enable us to connect with external systems from Snowflake. In my last blog, we went through how to create an API integration to invoke an AWS Lambda. In this blog, we will see how we can integrate AWS S3 so that we can access data stored and query it in snowflake.
For snowflake to be able ... | [
{
"code": null,
"e": 467,
"s": 172,
"text": "Snowflake integration objects enable us to connect with external systems from Snowflake. In my last blog, we went through how to create an API integration to invoke an AWS Lambda. In this blog, we will see how we can integrate AWS S3 so that we can access... |
Ruby Integer abs() function with example - GeeksforGeeks | 09 Jan, 2020
The abs() function in Ruby returns the absolute value of the integer.
Syntax: (number).abs
Parameter: The function takes the integer whose absolute value is to be returned.
Return Value: The function returns the absolute value of the integer.
Example #1:
# Ruby program Integer abs() function # Initializin... | [
{
"code": null,
"e": 23491,
"s": 23463,
"text": "\n09 Jan, 2020"
},
{
"code": null,
"e": 23561,
"s": 23491,
"text": "The abs() function in Ruby returns the absolute value of the integer."
},
{
"code": null,
"e": 23582,
"s": 23561,
"text": "Syntax: (number).abs... |
Laravel - CSRF Protection | CSRF refers to Cross Site Forgery attacks on web applications. CSRF attacks are the unauthorized activities which the authenticated users of the system perform. As such, many web applications are prone to these attacks.
Laravel offers CSRF protection in the following way −
Laravel includes an in built CSRF plug-in, tha... | [
{
"code": null,
"e": 2692,
"s": 2472,
"text": "CSRF refers to Cross Site Forgery attacks on web applications. CSRF attacks are the unauthorized activities which the authenticated users of the system perform. As such, many web applications are prone to these attacks."
},
{
"code": null,
"... |
HTML5 using src using raw binary data | If an audio file is stored in database and then we want to use this file as a blob or binary in an application where audio source is according to session then binary data is returned through ${sessionScope.user.music}. To load the audio file in an audio tag, data:audio/mp3;base64 works well.
As for the image, image tag... | [
{
"code": null,
"e": 1355,
"s": 1062,
"text": "If an audio file is stored in database and then we want to use this file as a blob or binary in an application where audio source is according to session then binary data is returned through ${sessionScope.user.music}. To load the audio file in an audio... |
Debugging with Stetho in Android - GeeksforGeeks | 06 Jan, 2021
Stetho is an open-source debug library developed by Facebook. It allows you to use chrome debugging tools to troubleshoot network traffic., thus it provides a rich, interactive debugging experience for android developers. Stetho easily and smoothly debug network calls. It is a sophisticated debug bridge fo... | [
{
"code": null,
"e": 25062,
"s": 25034,
"text": "\n06 Jan, 2021"
},
{
"code": null,
"e": 25758,
"s": 25062,
"text": "Stetho is an open-source debug library developed by Facebook. It allows you to use chrome debugging tools to troubleshoot network traffic., thus it provides a rich... |
Important Artifacts In Windows-I | This chapter will explain various concepts involved in Microsoft Windows forensics and the important artifacts that an investigator can obtain from the investigation process.
Artifacts are the objects or areas within a computer system that have important information related to the activities performed by the computer u... | [
{
"code": null,
"e": 2128,
"s": 1953,
"text": "This chapter will explain various concepts involved in Microsoft Windows forensics and the important artifacts that an investigator can obtain from the investigation process."
},
{
"code": null,
"e": 2485,
"s": 2128,
"text": "Artifac... |
DoubleStream max() in Java with examples - GeeksforGeeks | 06 Dec, 2018
java.util.stream.DoubleStream in Java 8, deals with primitive doubles. It helps to solve the problems like finding maximum value in array, finding minimum value in array, sum of all elements in array, and average of all values in array in a new way. DoubleStream max() returns an OptionalDouble describing t... | [
{
"code": null,
"e": 24087,
"s": 24059,
"text": "\n06 Dec, 2018"
},
{
"code": null,
"e": 24475,
"s": 24087,
"text": "java.util.stream.DoubleStream in Java 8, deals with primitive doubles. It helps to solve the problems like finding maximum value in array, finding minimum value in... |
Compiler Design - Run-Time Environment | A program as a source code is merely a collection of text (code, statements etc.) and to make it alive, it requires actions to be performed on the target machine. A program needs memory resources to execute instructions. A program contains names for procedures, identifiers etc., that require mapping with the actual mem... | [
{
"code": null,
"e": 2538,
"s": 2193,
"text": "A program as a source code is merely a collection of text (code, statements etc.) and to make it alive, it requires actions to be performed on the target machine. A program needs memory resources to execute instructions. A program contains names for pro... |
Change the padding of a button with CSS | To change the padding of a button, use the padding property.
You can try to run the following code to change the button’s padding
Live Demo
<!DOCTYPE html>
<html>
<head>
<style>
.button {
background-color: yellow;
color: black;
text-align: center;
font-s... | [
{
"code": null,
"e": 1123,
"s": 1062,
"text": "To change the padding of a button, use the padding property."
},
{
"code": null,
"e": 1192,
"s": 1123,
"text": "You can try to run the following code to change the button’s padding"
},
{
"code": null,
"e": 1202,
"s": ... |
Erlang - Web Programming | In Erlang, the inets library is available to build web servers in Erlang. Let’s look at some of the functions available in Erlang for web programming. One can implement the HTTP server, also referred to as httpd to handle HTTP requests.
The server implements numerous features, such as −
Secure Sockets Layer (SSL)
Erlan... | [
{
"code": null,
"e": 2538,
"s": 2301,
"text": "In Erlang, the inets library is available to build web servers in Erlang. Let’s look at some of the functions available in Erlang for web programming. One can implement the HTTP server, also referred to as httpd to handle HTTP requests."
},
{
"c... |
C program to find the length of a string? | The string is actually a one-dimensional array of characters which is terminated by a null character '\0'. Thus a null-terminated string contains the characters that comprise the string followed by a null.
To find the length of a string we need to loop and count all words in the loop until the ‘\0’ character is matched... | [
{
"code": null,
"e": 1268,
"s": 1062,
"text": "The string is actually a one-dimensional array of characters which is terminated by a null character '\\0'. Thus a null-terminated string contains the characters that comprise the string followed by a null."
},
{
"code": null,
"e": 1384,
... |
Powershell - Delete Folder | Remove-Item cmdlet is used to delete a directory by passing the path of the directory to be deleted.
In this example, we'll delete a folder D:\Temp\Test Folder1
Type the following command in PowerShell ISE Console
Remove-Item 'D:\temp\Test Folder1'
You can see the Test Folder1 in Windows Explorer is deleted now.
In thi... | [
{
"code": null,
"e": 2135,
"s": 2034,
"text": "Remove-Item cmdlet is used to delete a directory by passing the path of the directory to be deleted."
},
{
"code": null,
"e": 2195,
"s": 2135,
"text": "In this example, we'll delete a folder D:\\Temp\\Test Folder1"
},
{
"code... |
Bubble sort in Java. | Following is the required program.
Live Demo
public class Tester {
static void bubbleSort(int[] arr) {
int n = arr.length;
int temp = 0;
for(int i = 0; i < n; i++){
for(int j = 1; j < (n-i); j++){
if(arr[j-1] > arr[j]){
//swap elements
... | [
{
"code": null,
"e": 1097,
"s": 1062,
"text": "Following is the required program."
},
{
"code": null,
"e": 1107,
"s": 1097,
"text": "Live Demo"
},
{
"code": null,
"e": 1965,
"s": 1107,
"text": "public class Tester {\n static void bubbleSort(int[] arr) { \n ... |
GATE | GATE-CS-2017 (Set 2) | Question 62 - GeeksforGeeks | 28 Jun, 2021
If a random variable X has a Poisson distribution with mean 5, then the expression E[(X + 2)2] equals _____.
Note: This question appeared as Numerical Answer Type.(A) 54(B) 55(C) 56(D) 57Answer: (A)Explanation:
Using Linearity of Expectation, we can write,
E[(X+2)2] = E[X2] + E[4X] + E[4]
In Poisson dist... | [
{
"code": null,
"e": 25695,
"s": 25667,
"text": "\n28 Jun, 2021"
},
{
"code": null,
"e": 25804,
"s": 25695,
"text": "If a random variable X has a Poisson distribution with mean 5, then the expression E[(X + 2)2] equals _____."
},
{
"code": null,
"e": 25906,
"s": 2... |
How to append a whole dataframe to a CSV in R ? - GeeksforGeeks | 30 May, 2021
A data frame in R programming language is a tabular arrangement of rows and columns arranged in the form of a table. A CSV file also contains data stored together to form rows stacked together. Content can be read from and written to the CSV file. Base R contains multiple methods to work with these files. ... | [
{
"code": null,
"e": 26487,
"s": 26459,
"text": "\n30 May, 2021"
},
{
"code": null,
"e": 26925,
"s": 26487,
"text": "A data frame in R programming language is a tabular arrangement of rows and columns arranged in the form of a table. A CSV file also contains data stored together ... |
How to use aplay and spd-say command in Linux? - GeeksforGeeks | 03 Aug, 2021
We can send the text to the terminal to play that as an audio clip. These are basically command-line audio player and works using Linux Sound Architecture. To send audio to the terminal to play, you can use aplay and spd-say command as shown below.
1. aplay: This command in linux is used to play the audio... | [
{
"code": null,
"e": 25489,
"s": 25461,
"text": "\n03 Aug, 2021"
},
{
"code": null,
"e": 25739,
"s": 25489,
"text": "We can send the text to the terminal to play that as an audio clip. These are basically command-line audio player and works using Linux Sound Architecture. To send... |
Kolmogorov-Smirnov Test (KS Test) - GeeksforGeeks | 10 Jun, 2020
Kolmogorov–Smirnov test a very efficient way to determine if two samples are significantly different from each other. It is usually used to check the uniformity of random numbers. Uniformity is one of the most important properties of any random number generator and Kolmogorov–Smirnov test can be used to te... | [
{
"code": null,
"e": 25545,
"s": 25517,
"text": "\n10 Jun, 2020"
},
{
"code": null,
"e": 25859,
"s": 25545,
"text": "Kolmogorov–Smirnov test a very efficient way to determine if two samples are significantly different from each other. It is usually used to check the uniformity of... |
What are the C programming concepts used as Data Structures - GeeksforGeeks | 13 Dec, 2021
Data-type in simple terms gives us information about the type of data. Example, integer, character, etc. Data-types in C language are declarations for the variables. Data-types are classified as:
Some of the examples of primitive data types are as follows
Variable named ch refers to the memory address 100... | [
{
"code": null,
"e": 26065,
"s": 26037,
"text": "\n13 Dec, 2021"
},
{
"code": null,
"e": 26261,
"s": 26065,
"text": "Data-type in simple terms gives us information about the type of data. Example, integer, character, etc. Data-types in C language are declarations for the variable... |
Min difference between maximum and minimum element in all Y size subarrays - GeeksforGeeks | 31 Aug, 2021
Given an array arr[] of size N and integer Y, the task is to find a minimum of all the differences between the maximum and minimum elements in all the sub-arrays of size Y.
Examples:
Input: arr[] = { 3, 2, 4, 5, 6, 1, 9 } Y = 3Output: 2Explanation:All subarrays of length = 3 are:{3, 2, 4} where maximum el... | [
{
"code": null,
"e": 26417,
"s": 26389,
"text": "\n31 Aug, 2021"
},
{
"code": null,
"e": 26590,
"s": 26417,
"text": "Given an array arr[] of size N and integer Y, the task is to find a minimum of all the differences between the maximum and minimum elements in all the sub-arrays o... |
Print characters in decreasing order of frequency - GeeksforGeeks | 25 Apr, 2022
Given string str, the task is to print the characters in decreasing order of their frequency. If the frequency of two characters is the same then sort them in descending order alphabetically.Examples:
Input: str = “geeksforgeeks” Output: e – 4 s – 2 k – 2 g – 2 r – 1 o – 1 f – 1Input: str = “bbcc” Output... | [
{
"code": null,
"e": 26019,
"s": 25991,
"text": "\n25 Apr, 2022"
},
{
"code": null,
"e": 26222,
"s": 26019,
"text": "Given string str, the task is to print the characters in decreasing order of their frequency. If the frequency of two characters is the same then sort them in desc... |
GATE | GATE-IT-2004 | Question 13 - GeeksforGeeks | 28 Jun, 2021
Let P be a singly linked list. Let Q be the pointer to an intermediate node x in the list. What is the worst-case time complexity of the best known algorithm to delete the node x from the list?(A) O(n)(B) O(log2 n)(C) O(logn)(D) O(1)Answer: (D)Explanation: A simple solution is to traverse the linked list u... | [
{
"code": null,
"e": 25743,
"s": 25715,
"text": "\n28 Jun, 2021"
},
{
"code": null,
"e": 26186,
"s": 25743,
"text": "Let P be a singly linked list. Let Q be the pointer to an intermediate node x in the list. What is the worst-case time complexity of the best known algorithm to de... |
Find all Array elements that are smaller than all elements to their right - GeeksforGeeks | 05 Apr, 2022
Given an array arr[] containing N positive integers. The task is to find all the elements which are smaller than all the elements to their right.
Examples:
Input: arr[] = {6, 14, 13, 21, 17, 19}Output: [6, 13, 17, 19]Explanation: All the elements in the output are following the condition.
Input: arr[] = {1... | [
{
"code": null,
"e": 27535,
"s": 27507,
"text": "\n05 Apr, 2022"
},
{
"code": null,
"e": 27681,
"s": 27535,
"text": "Given an array arr[] containing N positive integers. The task is to find all the elements which are smaller than all the elements to their right."
},
{
"co... |
Compiling a C program:- Behind the Scenes - GeeksforGeeks | 18 Nov, 2021
C is a mid-level language and it needs a compiler to convert it into an executable code so that the program can be run on our machine.
How do we compile and run a C program?Below are the steps we use on an Ubuntu machine with gcc compiler.
We first create a C program using an editor and save the file as... | [
{
"code": null,
"e": 25525,
"s": 25497,
"text": "\n18 Nov, 2021"
},
{
"code": null,
"e": 25661,
"s": 25525,
"text": "C is a mid-level language and it needs a compiler to convert it into an executable code so that the program can be run on our machine. "
},
{
"code": null,... |
Golang | Searching an element of int type in slice of ints - GeeksforGeeks | 28 Aug, 2019
In Go language slice is more powerful, flexible, convenient than an array, and is a lightweight data structure. The slice is a variable-length sequence which stores elements of a similar type, you are not allowed to store different type of elements in the same slice.In the Go slice, you can search an eleme... | [
{
"code": null,
"e": 25703,
"s": 25675,
"text": "\n28 Aug, 2019"
},
{
"code": null,
"e": 26555,
"s": 25703,
"text": "In Go language slice is more powerful, flexible, convenient than an array, and is a lightweight data structure. The slice is a variable-length sequence which store... |
Check if a Number is Odd or Even using Bitwise Operators - GeeksforGeeks | 11 Nov, 2021
Given a number N, the task is to check whether the number is even or odd using Bitwise Operators.Examples:
Input: N = 11 Output: OddInput: N = 10 Output: Even
Following Bitwise Operators can be used to check if a number is odd or even:
1. Using Bitwise XOR operator: The idea is to check whether the ... | [
{
"code": null,
"e": 26574,
"s": 26546,
"text": "\n11 Nov, 2021"
},
{
"code": null,
"e": 26683,
"s": 26574,
"text": "Given a number N, the task is to check whether the number is even or odd using Bitwise Operators.Examples: "
},
{
"code": null,
"e": 26737,
"s": 2... |
find_element_by_name() driver method - Selenium Python - GeeksforGeeks | 20 Oct, 2021
Selenium’s Python Module is built to perform automated testing with Python. Selenium Python bindings provide a simple API to write functional/acceptance tests using Selenium WebDriver. After you have installed selenium and checked out – Navigating links using get method, you might want to play more with Se... | [
{
"code": null,
"e": 24809,
"s": 24781,
"text": "\n20 Oct, 2021"
},
{
"code": null,
"e": 25510,
"s": 24809,
"text": "Selenium’s Python Module is built to perform automated testing with Python. Selenium Python bindings provide a simple API to write functional/acceptance tests usin... |
AbstractSequentialList in Java with Examples - GeeksforGeeks | 11 Nov, 2020
The AbstractSequentialList class in Java is a part of the Java Collection Framework and implements the Collection interface and the AbstractCollection class. It is used to implement an unmodifiable list, for which one needs to only extend this AbstractList Class and implement only the get() and the size() ... | [
{
"code": null,
"e": 24852,
"s": 24824,
"text": "\n11 Nov, 2020"
},
{
"code": null,
"e": 25168,
"s": 24852,
"text": "The AbstractSequentialList class in Java is a part of the Java Collection Framework and implements the Collection interface and the AbstractCollection class. It is... |
Adjusting the Image Contrast using CSS3 | To set image contrast in CSS, use filter contrast(%). Remember, the value 0 makes the image black, 100% is for original image and default. Rest, you can set any value of your choice, but values above 100% would make the image with more contrast.
Let us now see an example to adjust image contrast with CSS3 −
Live Demo
... | [
{
"code": null,
"e": 1308,
"s": 1062,
"text": "To set image contrast in CSS, use filter contrast(%). Remember, the value 0 makes the image black, 100% is for original image and default. Rest, you can set any value of your choice, but values above 100% would make the image with more contrast."
},
... |
Kotlin - Maps | Kotlin map is a collection of key/value pairs, where each key is unique, and it can only be associated with one value. The same value can be associated with multiple keys though. We can declare the keys and values to be any type; there are no restrictions.
A Kotlin map can be either mutable (mutableMapOf) or read-only ... | [
{
"code": null,
"e": 2682,
"s": 2425,
"text": "Kotlin map is a collection of key/value pairs, where each key is unique, and it can only be associated with one value. The same value can be associated with multiple keys though. We can declare the keys and values to be any type; there are no restrictio... |
On Average, You’re Using the Wrong Average — Part II | by Daniel McNichol | Towards Data Science | Real & Simulated Data + Summary Statistic Dynamics using R & BigQuery
Part I of this series built a practical & conceptual framework for understanding & using lesser known Pythagorean Means in data analysis. I went to lengths (~5k words) to build intuitions for a general audience, requiring little more than primary sch... | [
{
"code": null,
"e": 241,
"s": 171,
"text": "Real & Simulated Data + Summary Statistic Dynamics using R & BigQuery"
},
{
"code": null,
"e": 502,
"s": 241,
"text": "Part I of this series built a practical & conceptual framework for understanding & using lesser known Pythagorean Me... |
Tryit Editor v3.7 | Tryit: bigger HTML heading | [] |
Python - Check if a list is contained in another list | Given two different python lists we need to find if the first list is a part of the second list.
We can first apply the map function to get the elements of the list and then apply the join function to cerate a comma separated list of values. Next we use the in operator to find out if the first list is part of the secon... | [
{
"code": null,
"e": 1159,
"s": 1062,
"text": "Given two different python lists we need to find if the first list is a part of the second list."
},
{
"code": null,
"e": 1390,
"s": 1159,
"text": "We can first apply the map function to get the elements of the list and then apply th... |
C# | BitConverter.ToDouble() Method - GeeksforGeeks | 01 Feb, 2019
BitConverter.ToDouble() Method is used to return a double-precision floating point number converted from eight bytes at a specified position in a byte array.
Syntax:
public static double ToDouble (byte[] value, int startIndex);
Parameters:
value: It is an array of bytes.startIndex: It is the starting posit... | [
{
"code": null,
"e": 22891,
"s": 22863,
"text": "\n01 Feb, 2019"
},
{
"code": null,
"e": 23049,
"s": 22891,
"text": "BitConverter.ToDouble() Method is used to return a double-precision floating point number converted from eight bytes at a specified position in a byte array."
},... |
Generic Map In Java - GeeksforGeeks | 29 Oct, 2020
Java Arrays store items in an ordered collection and the values can be accessed using the index(an integer). Whereas HashMap stores as a Key/ Value pair. Using HashMap, we can store the items or values and these values can be accessed by indexes/ keys of any type be it Integer, String, Double, Character, o... | [
{
"code": null,
"e": 23868,
"s": 23840,
"text": "\n29 Oct, 2020"
},
{
"code": null,
"e": 24204,
"s": 23868,
"text": "Java Arrays store items in an ordered collection and the values can be accessed using the index(an integer). Whereas HashMap stores as a Key/ Value pair. Using Has... |
Git GitHub Getting Started | Go to GitHub and sign up for an account:
Note: Remember to use the same e-mail address you used in the Git config.
Now that you have made a GitHub account, sign in, and create a new Repo:
And fill in the relevant details:
We will go over the different options and what they mean later. But for
now, choose Public (if yo... | [
{
"code": null,
"e": 41,
"s": 0,
"text": "Go to GitHub and sign up for an account:"
},
{
"code": null,
"e": 115,
"s": 41,
"text": "Note: Remember to use the same e-mail address you used in the Git config."
},
{
"code": null,
"e": 188,
"s": 115,
"text": "Now th... |
Differences between org.simple.json and org.json libraries in Java? | The org.json.simple library allows us to read and write JSON data in Java. In other words, we can encode and decode the JSON object. The org.json.simple package contains important classes like JSONValue, JSONObject, JSONArray, JsonString and JsonNumber. We need to install the json-simple.jar file to execute a JSON prog... | [
{
"code": null,
"e": 1710,
"s": 1062,
"text": "The org.json.simple library allows us to read and write JSON data in Java. In other words, we can encode and decode the JSON object. The org.json.simple package contains important classes like JSONValue, JSONObject, JSONArray, JsonString and JsonNumber.... |
Construct the full k-ary tree from its preorder traversal - GeeksforGeeks | 01 Feb, 2022
Given an array that contains the preorder traversal of the full k-ary tree, construct the full k-ary tree and print its postorder traversal. A full k-ary tree is a tree where each node has either 0 or k children.
Examples:
Input : preorder[] = {1, 2, 5, 6, 7,
3, 8, 9, 10, 4}
... | [
{
"code": null,
"e": 25156,
"s": 25128,
"text": "\n01 Feb, 2022"
},
{
"code": null,
"e": 25369,
"s": 25156,
"text": "Given an array that contains the preorder traversal of the full k-ary tree, construct the full k-ary tree and print its postorder traversal. A full k-ary tree is a... |
Amazon Interview Experience for SDE-2 | 4 Years Experienced - GeeksforGeeks | 06 May, 2021
Virtual Interviews
I got a call from an Amazon recruiter via LinkedIn. She sent me the coding test link which I had to complete within a week. Once I completed the test, I got a call to schedule the interviews. All interviews were held on Amazon Chime as per schedule. Overall process took 1 month to comple... | [
{
"code": null,
"e": 25213,
"s": 25185,
"text": "\n06 May, 2021"
},
{
"code": null,
"e": 25232,
"s": 25213,
"text": "Virtual Interviews"
},
{
"code": null,
"e": 25592,
"s": 25232,
"text": "I got a call from an Amazon recruiter via LinkedIn. She sent me the cod... |
Java Program for Depth First Search or DFS for a Graph | 22 Jun, 2022
Depth First Traversal (or Search) for a graph is similar to Depth First Traversal of a tree. The only catch here is, unlike trees, graphs may contain cycles, so we may come to the same node again. To avoid processing a node more than once, we use a boolean visited array.
For example, in the following graph... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n22 Jun, 2022"
},
{
"code": null,
"e": 300,
"s": 28,
"text": "Depth First Traversal (or Search) for a graph is similar to Depth First Traversal of a tree. The only catch here is, unlike trees, graphs may contain cycles, so we may come to... |
Inplace rotate square matrix by 90 degrees | Set 1 | 30 Jun, 2022
Given a square matrix, turn it by 90 degrees in anti-clockwise direction without using any extra space.
Examples :
Input:
Matrix:
1 2 3
4 5 6
7 8 9
Output:
3 6 9
2 5 8
1 4 7
The given matrix is rotated by 90 degree
in anti-clockwise direction.
Input:
1 2 3 4
5 6 7 8
9 10 ... | [
{
"code": null,
"e": 52,
"s": 24,
"text": "\n30 Jun, 2022"
},
{
"code": null,
"e": 156,
"s": 52,
"text": "Given a square matrix, turn it by 90 degrees in anti-clockwise direction without using any extra space."
},
{
"code": null,
"e": 168,
"s": 156,
"text": "E... |
PostgreSQL – IN operator | 28 Aug, 2020
The PostgreSQL IN operator is used with the WHERE clause to check against a list of values.
The syntax for using IN operator with the WHERE clause to check against a list of values which returns a boolean value depending upon the match is as below:
Syntax: value IN (value1, value2, ...)
The syntax for usin... | [
{
"code": null,
"e": 52,
"s": 24,
"text": "\n28 Aug, 2020"
},
{
"code": null,
"e": 144,
"s": 52,
"text": "The PostgreSQL IN operator is used with the WHERE clause to check against a list of values."
},
{
"code": null,
"e": 301,
"s": 144,
"text": "The syntax fo... |
Custom C++ User Snippet in Visual Studio Code | 12 Mar, 2021
Snippets are the small portion of re-usable code wrapped in some prefix word, It allows programmers to bind a particular block of code in a single prefix keyword. Visual Studio Code is a Lightweight and powerful source code editor available in Windows, Linux, and macOS, It comes with many built-in snippets... | [
{
"code": null,
"e": 52,
"s": 24,
"text": "\n12 Mar, 2021"
},
{
"code": null,
"e": 631,
"s": 52,
"text": "Snippets are the small portion of re-usable code wrapped in some prefix word, It allows programmers to bind a particular block of code in a single prefix keyword. Visual Stud... |
Lodash | _.remove() Method | 23 Jan, 2022
The _.remove() method is used to remove all elements from the array that predicate returns True and returns the removed elements.
Syntax:
_.remove(array, function)
Parameters: This method accept two parameters as mentioned above and described below:
array: This parameter holds the array that need to be ... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n23 Jan, 2022"
},
{
"code": null,
"e": 158,
"s": 28,
"text": "The _.remove() method is used to remove all elements from the array that predicate returns True and returns the removed elements."
},
{
"code": null,
"e": 167,
... |
How to Write Data into Excel Sheet using Java? | 27 Nov, 2020
Handling files is an important part of any programming language. Java provides various in-built methods for creating, reading, updating, and deleting files. These methods are provided by the File class which is present in the java.io package. To perform file operations, Java uses the stream class.
To do op... | [
{
"code": null,
"e": 54,
"s": 26,
"text": "\n27 Nov, 2020"
},
{
"code": null,
"e": 353,
"s": 54,
"text": "Handling files is an important part of any programming language. Java provides various in-built methods for creating, reading, updating, and deleting files. These methods are... |
Jython - Loops | In general, statements in a program are executed sequentially: The first statement in a function is executed first, followed by the second, and so on. There may be a situation when you need to execute a block of code several number of times. Statements that provide such repetition capability are called looping statemen... | [
{
"code": null,
"e": 2405,
"s": 2081,
"text": "In general, statements in a program are executed sequentially: The first statement in a function is executed first, followed by the second, and so on. There may be a situation when you need to execute a block of code several number of times. Statements ... |
How to create side by side histograms in base R? | To create side by side histograms in base R, we first need to create a histogram using hist function by defining a larger limit of X-axis with xlim argument. After that we can create another histogram that has the larger mean and smaller standard deviation so that the bars do not clash with each other and add=T argumen... | [
{
"code": null,
"e": 1436,
"s": 1062,
"text": "To create side by side histograms in base R, we first need to create a histogram using hist function by defining a larger limit of X-axis with xlim argument. After that we can create another histogram that has the larger mean and smaller standard deviat... |
Assembly - Variables | NASM provides various define directives for reserving storage space for variables. The define assembler directive is used for allocation of storage space. It can be used to reserve as well as initialize one or more bytes.
The syntax for storage allocation statement for initialized data is −
[variable-name] define-di... | [
{
"code": null,
"e": 2307,
"s": 2085,
"text": "NASM provides various define directives for reserving storage space for variables. The define assembler directive is used for allocation of storage space. It can be used to reserve as well as initialize one or more bytes."
},
{
"code": null,
... |
C# | Stack Class - GeeksforGeeks | 20 Feb, 2019
Stack represents a last-in, first out collection of object. It is used when you need a last-in, first-out access to items. When you add an item in the list, it is called pushing the item and when you remove it, it is called popping the item. This class comes under System.Collections namespace.
Characterist... | [
{
"code": null,
"e": 22897,
"s": 22869,
"text": "\n20 Feb, 2019"
},
{
"code": null,
"e": 23192,
"s": 22897,
"text": "Stack represents a last-in, first out collection of object. It is used when you need a last-in, first-out access to items. When you add an item in the list, it is ... |
A Free And Powerful Labelling Tool Every Data Scientist Should Know | by Lai Woen Yon | Towards Data Science | As a data scientist, you will definitely need to train models to meet your organization’s needs. Most of the time, you require labelled data from within your company in order to build a customized solution.
You’re approached by a product manager one day who wants you to build a named entity recognition model to improve... | [
{
"code": null,
"e": 379,
"s": 172,
"text": "As a data scientist, you will definitely need to train models to meet your organization’s needs. Most of the time, you require labelled data from within your company in order to build a customized solution."
},
{
"code": null,
"e": 684,
"s... |
Java String codePointAt() Method | ❮ String Methods
Return the Unicode of the first character in a string (the Unicode value
of "H" is 72):
String myStr = "Hello";
int result = myStr.codePointAt(0);
System.out.println(result);
Try it Yourself »
The codePointAt() method returns the Unicode
value of the character at the specified index in a string.... | [
{
"code": null,
"e": 19,
"s": 0,
"text": "\n❮ String Methods\n"
},
{
"code": null,
"e": 110,
"s": 19,
"text": "Return the Unicode of the first character in a string (the Unicode value \n of \"H\" is 72):"
},
{
"code": null,
"e": 197,
"s": 110,
"text": "String... |
Getting started with Vim and Tmux for Python | by Denis Gontcharov | Towards Data Science | If you write code in multiple languages you may have found it tiresome to maintain an IDE for each. After some experimentation I found the combination of Vim and Tmux to be the ideal solution for my case. The main benefits are:
✓ One environment with support for any language
✓ Efficient keyboard-only file editing
✓ Eas... | [
{
"code": null,
"e": 400,
"s": 172,
"text": "If you write code in multiple languages you may have found it tiresome to maintain an IDE for each. After some experimentation I found the combination of Vim and Tmux to be the ideal solution for my case. The main benefits are:"
},
{
"code": null,... |
How can I remove the same element in the list by Python | Just remove return statement outside for block. It will work. Also last print statement should have remove_same instead of remaove_new
def remove_same(L1, L2):
L1_copy = L1[:]
for e in L1_copy:
if e in L2:
L1.remove(e)
return L1
L1 = [1,2,3,4]
L2 = [1,2,5,6]
print(remove_same(L1, L2))
... | [
{
"code": null,
"e": 1197,
"s": 1062,
"text": "Just remove return statement outside for block. It will work. Also last print statement should have remove_same instead of remaove_new"
},
{
"code": null,
"e": 1382,
"s": 1197,
"text": "def remove_same(L1, L2):\n L1_copy = L1[:]\n... |
Given a sequence of words, print all anagrams together using STL - GeeksforGeeks | 10 Jun, 2021
Given an array of words, print all anagrams together.
For example,
Input: array = {“cat”, “dog”, “tac”, “god”, “act”}
output: cat tac act, dog god
Explanation: cat tac and act are anagrams
and dog and god are anagrams as
they have the same set of characters.
Input: array = {“abc”, “def”, “ghi”}
output... | [
{
"code": null,
"e": 24682,
"s": 24654,
"text": "\n10 Jun, 2021"
},
{
"code": null,
"e": 24737,
"s": 24682,
"text": "Given an array of words, print all anagrams together. "
},
{
"code": null,
"e": 24751,
"s": 24737,
"text": "For example, "
},
{
"code":... |
Check if both halves of the string have same set of characters in Python | We can split a long string from the middle and check if the two halves are equal or not. The input string may have an odd or even number of characters. If it has an even number of characters, we divide the two halves by taking half of the length. But if the number of characters is odd then we ignore the middlemost char... | [
{
"code": null,
"e": 1431,
"s": 1062,
"text": "We can split a long string from the middle and check if the two halves are equal or not. The input string may have an odd or even number of characters. If it has an even number of characters, we divide the two halves by taking half of the length. But if... |
Minimize deletions from either end to remove Minimum and Maximum from Array - GeeksforGeeks | 15 Dec, 2021
Given array of integers arr[] of size N, the task is to find the count of minimum number of deletion operations to remove minimum and the maximum element from the array. The elements can only be deleted from either end of the array.
Examples:
Input: arr = [2, 10, 7, 5, 4, 1, 8, 6]Output: 5Explanation: The ... | [
{
"code": null,
"e": 24405,
"s": 24377,
"text": "\n15 Dec, 2021"
},
{
"code": null,
"e": 24638,
"s": 24405,
"text": "Given array of integers arr[] of size N, the task is to find the count of minimum number of deletion operations to remove minimum and the maximum element from the ... |
Edit Distance | Practice | GeeksforGeeks | Given two strings s and t. Return the minimum number of operations required to convert s to t.
The possible operations are permitted:
Insert a character at any position of the string.
Remove any character from the string.
Replace any character from the string with any other character.
Insert a character at any positi... | [
{
"code": null,
"e": 372,
"s": 238,
"text": "Given two strings s and t. Return the minimum number of operations required to convert s to t.\nThe possible operations are permitted:"
},
{
"code": null,
"e": 526,
"s": 372,
"text": "\nInsert a character at any position of the string.... |
What is the purpose of a self-executing function in JavaScript? | The purpose of a self-executing is that those variables declared in the self-executing function are only available inside the self-executing function.
Variables declared in the self-executing function are, by default, only available to code within the self-executing function.
It is an immediately invoked function expre... | [
{
"code": null,
"e": 1213,
"s": 1062,
"text": "The purpose of a self-executing is that those variables declared in the self-executing function are only available inside the self-executing function."
},
{
"code": null,
"e": 1339,
"s": 1213,
"text": "Variables declared in the self-... |
DateTime.FromFileTime() Method in C# - GeeksforGeeks | 28 Jan, 2019
DateTime.FromFileTime(Int64) Method is used to converts the specified Windows file time to an equivalent local time.
Syntax: public static DateTime FromFileTime (long fileTime);Here, it takes a Windows file time expressed in ticks.
Return Value: This method returns an object that represents the local time ... | [
{
"code": null,
"e": 23911,
"s": 23883,
"text": "\n28 Jan, 2019"
},
{
"code": null,
"e": 24028,
"s": 23911,
"text": "DateTime.FromFileTime(Int64) Method is used to converts the specified Windows file time to an equivalent local time."
},
{
"code": null,
"e": 24143,
... |
Denoising Noisy Documents. Computer Vision Techniques | by Chinmay Wyawahare | Towards Data Science | Numerous scientific papers, historical documentaries/artifacts, recipes, books are stored as papers be it handwritten/typewritten. With time, the paper/notes tend to accumulate noise/dirt through fingerprints, weakening of paper fibers, dirt, coffee/tea stains, abrasions, wrinkling, etc. There are several surface clean... | [
{
"code": null,
"e": 658,
"s": 171,
"text": "Numerous scientific papers, historical documentaries/artifacts, recipes, books are stored as papers be it handwritten/typewritten. With time, the paper/notes tend to accumulate noise/dirt through fingerprints, weakening of paper fibers, dirt, coffee/tea s... |
A Simple Guide to Automate Your Excel Reporting with Python | by Frank Andrade | Towards Data Science | Let’s face it; no matter what our job is, sooner or later, we will have to deal with repetitive tasks like updating a daily report in Excel. Things could get worse if you work for a company that doesn’t work with Python because you wouldn't be able to solve this problem by using only Python.
But don’t worry, you still ... | [
{
"code": null,
"e": 464,
"s": 171,
"text": "Let’s face it; no matter what our job is, sooner or later, we will have to deal with repetitive tasks like updating a daily report in Excel. Things could get worse if you work for a company that doesn’t work with Python because you wouldn't be able to sol... |
MySQL query to get the count of distinct records in a column | To get the count of distinct records, use DISTINCT along with COUNT(). Following is the syntax −
select count(DISTINCT yourColumnName) from yourTableName;
Let us first create a table −
mysql> create table DemoTable
-> (
-> Name varchar(20),
-> Score int
-> );
Query OK, 0 rows affected (0.67 sec)
Insert some records in ... | [
{
"code": null,
"e": 1159,
"s": 1062,
"text": "To get the count of distinct records, use DISTINCT along with COUNT(). Following is the syntax −"
},
{
"code": null,
"e": 1217,
"s": 1159,
"text": "select count(DISTINCT yourColumnName) from yourTableName;"
},
{
"code": null,... |
PHP Object Cloning | Creating copy of an object by simple assignment merely creates another reference to the one in memory. Hence, changes in attribute reflect both in original and duplicate object. PHP has clone keyword that creates a shallow copy of the object. However, if original object has other embedded object as one of its propertie... | [
{
"code": null,
"e": 1522,
"s": 1062,
"text": "Creating copy of an object by simple assignment merely creates another reference to the one in memory. Hence, changes in attribute reflect both in original and duplicate object. PHP has clone keyword that creates a shallow copy of the object. However, i... |
Write a C program of library management system using switch case | How to store the books-related information of library using C programming.
Step 1: Declare a structure which holds data members
Step 2: declare variables which are used for loop
Step 3: use switch case to work on each module
Step 4: case 1- for Adding book information
Case 2- for Display book information
... | [
{
"code": null,
"e": 1137,
"s": 1062,
"text": "How to store the books-related information of library using C programming."
},
{
"code": null,
"e": 1457,
"s": 1137,
"text": "Step 1: Declare a structure which holds data members\nStep 2: declare variables which are used for loop\nSt... |
GAVRO — Managed Big Data Schema Evolution | by Gary Strange | Towards Data Science | Managing schema changes has always proved troublesome for architects and software engineers. Building a big-data platform is no different and managing schema evolution is still a challenge that needs solving. NoSQL, Hadoop and the schema-on-read mantra have gone some way towards alleviating the trappings of strict sche... | [
{
"code": null,
"e": 691,
"s": 172,
"text": "Managing schema changes has always proved troublesome for architects and software engineers. Building a big-data platform is no different and managing schema evolution is still a challenge that needs solving. NoSQL, Hadoop and the schema-on-read mantra ha... |
How to use substring () in Android textview? | This example demonstrate about How to use substring () in Android textview.
Step 1 − Create a new project in Android Studio, go to File ⇒ New Project and fill all required details to create a new project.
Step 2 − Add the following code to res/layout/activity_main.xml.
<?xml version="1.0" encoding="utf-8"?>
<LinearLayo... | [
{
"code": null,
"e": 1138,
"s": 1062,
"text": "This example demonstrate about How to use substring () in Android textview."
},
{
"code": null,
"e": 1267,
"s": 1138,
"text": "Step 1 − Create a new project in Android Studio, go to File ⇒ New Project and fill all required details to... |
Banker's Algorithm in Operating System - GeeksforGeeks | 28 Dec, 2021
The banker’s algorithm is a resource allocation and deadlock avoidance algorithm that tests for safety by simulating the allocation for predetermined maximum possible amounts of all resources, then makes an “s-state” check to test for possible activities, before deciding whether allocation should be allowe... | [
{
"code": null,
"e": 27733,
"s": 27705,
"text": "\n28 Dec, 2021"
},
{
"code": null,
"e": 28966,
"s": 27733,
"text": "The banker’s algorithm is a resource allocation and deadlock avoidance algorithm that tests for safety by simulating the allocation for predetermined maximum possi... |
C++ Iterator Library - prev | It returns an iterator pointing to the element that it would be pointing to if advanced -n positions.
Following is the declaration for std::prev.
template <class BidirectionalIterator>
BidirectionalIterator prev (BidirectionalIterator it,
typename iterator_traits<BidirectionalIterator>::difference_type n = 1);... | [
{
"code": null,
"e": 2705,
"s": 2603,
"text": "It returns an iterator pointing to the element that it would be pointing to if advanced -n positions."
},
{
"code": null,
"e": 2749,
"s": 2705,
"text": "Following is the declaration for std::prev."
},
{
"code": null,
"e":... |
How to set an Android App's background image repeated? | This example demonstrates about How to set an Android App's background image repeated
Step 1 − Create a new project in Android Studio, go to File ⇒ New Project and fill all required details to create a new project.
Step 2 − Add the following code to res/drawable/app_background.xml.
<?xml version="1.0" encoding="utf-8"?... | [
{
"code": null,
"e": 1148,
"s": 1062,
"text": "This example demonstrates about How to set an Android App's background image repeated"
},
{
"code": null,
"e": 1277,
"s": 1148,
"text": "Step 1 − Create a new project in Android Studio, go to File ⇒ New Project and fill all required ... |
Array.Find() Method in C# | The Array.Find() method in C# is used to search for an element that matches the conditions defined by the specified predicate and returns the first occurrence within the entire Array.
Following is the syntax −
public static T Find<T> (T[] array, Predicate<T> match);
Above, the array is the one-dimensional, zero-based a... | [
{
"code": null,
"e": 1246,
"s": 1062,
"text": "The Array.Find() method in C# is used to search for an element that matches the conditions defined by the specified predicate and returns the first occurrence within the entire Array."
},
{
"code": null,
"e": 1272,
"s": 1246,
"text":... |
Sort in C++ Standard Template Library (STL) - GeeksforGeeks | 11 May, 2022
Sorting is one of the most basic functions applied to data. It means arranging the data in a particular fashion, which can be increasing or decreasing. There is a builtin function in C++ STL by the name of sort(). This function internally uses IntroSort. In more details it is implemented using hybrid of Qu... | [
{
"code": null,
"e": 26182,
"s": 26154,
"text": "\n11 May, 2022"
},
{
"code": null,
"e": 26736,
"s": 26182,
"text": "Sorting is one of the most basic functions applied to data. It means arranging the data in a particular fashion, which can be increasing or decreasing. There is a ... |
How to add table row in a table using jQuery? - GeeksforGeeks | 23 Apr, 2019
jQuery can be used to add table rows dynamically. This can be used in web applications where the user may need to add more rows if required.
Steps to add table row:
The required markup for the row is constructed.markup = "<tr><td> + information + </td></tr>"
markup = "<tr><td> + information + </td></tr>"
T... | [
{
"code": null,
"e": 24680,
"s": 24652,
"text": "\n23 Apr, 2019"
},
{
"code": null,
"e": 24821,
"s": 24680,
"text": "jQuery can be used to add table rows dynamically. This can be used in web applications where the user may need to add more rows if required."
},
{
"code": ... |
C/C++ program to implement CHECKSUM - GeeksforGeeks | 03 Dec, 2021
The Checksum is an error detection method that detected errors in data/message while it is transmitted from sender to receiver. This method is used by the higher layer protocols and makes use of the Checksum Generator on the Sender side and Checksum Checker on the Receiver side.
Examples:
Input: sent_messa... | [
{
"code": null,
"e": 26726,
"s": 26698,
"text": "\n03 Dec, 2021"
},
{
"code": null,
"e": 27006,
"s": 26726,
"text": "The Checksum is an error detection method that detected errors in data/message while it is transmitted from sender to receiver. This method is used by the higher l... |
Deep Linking in Android with Example - GeeksforGeeks | 04 Feb, 2021
Deep Linking is one of the most important features that is used by various apps to gather data inside their apps in the form of a URL link. So it becomes helpful for the users from other apps to easily share the data with different apps. In this article, we will take a look at the implementation of deep li... | [
{
"code": null,
"e": 25871,
"s": 25843,
"text": "\n04 Feb, 2021"
},
{
"code": null,
"e": 26203,
"s": 25871,
"text": "Deep Linking is one of the most important features that is used by various apps to gather data inside their apps in the form of a URL link. So it becomes helpful f... |
Build an Application for Screen Rotation Using Python - GeeksforGeeks | 30 Sep, 2021
In this article, we are going to write a python script for screen rotation and implement it with GUI.
The display can be modified to four orientations using some methods from the rotatescreen module, it is a small Python package for rotating the screen in a system.
pip install rotate-screen
Step 1) Import... | [
{
"code": null,
"e": 25647,
"s": 25619,
"text": "\n30 Sep, 2021"
},
{
"code": null,
"e": 25750,
"s": 25647,
"text": "In this article, we are going to write a python script for screen rotation and implement it with GUI. "
},
{
"code": null,
"e": 25914,
"s": 25750,
... |
Compute Log Normal Probability Density in R Programming - dlnorm() Function - GeeksforGeeks | 25 Jun, 2020
dlnorm() function in R Language is used to compute the log normal value of the probability density function. It also creates a plot of the log normal density.
Syntax: dlnorm(vec)
Parameters:vec: x-values for normal density
Example 1:
# R program to compute# log normal probability density # Creating x-valu... | [
{
"code": null,
"e": 25394,
"s": 25366,
"text": "\n25 Jun, 2020"
},
{
"code": null,
"e": 25553,
"s": 25394,
"text": "dlnorm() function in R Language is used to compute the log normal value of the probability density function. It also creates a plot of the log normal density."
}... |
Boundary Root to Leaf Path traversal of a Binary Tree - GeeksforGeeks | 15 Feb, 2022
Given a Binary Tree, the task is to print all Root to Leaf path of this tree in Boundary Root to Leaf path traversal.
Boundary Root to Leaf Path Traversal: In this traversal, the first Root to Leaf path(Left boundary) is printed first, followed by the last Root to Leaf path (Right boundary) in Reverse ord... | [
{
"code": null,
"e": 24938,
"s": 24910,
"text": "\n15 Feb, 2022"
},
{
"code": null,
"e": 25057,
"s": 24938,
"text": "Given a Binary Tree, the task is to print all Root to Leaf path of this tree in Boundary Root to Leaf path traversal. "
},
{
"code": null,
"e": 25379,
... |
Getting Started with Snowflake ❄️ | by Emile Gill | Towards Data Science | Whether you’ve heard of Snowflake Inc. from its record-breaking IPO this September, or from its ever-growing presence in data job ads, there is definitely a lot of hype around this company at the moment. In this article, we explore why, and how we can get started with its free trial.
A data warehouse is essential for a... | [
{
"code": null,
"e": 456,
"s": 171,
"text": "Whether you’ve heard of Snowflake Inc. from its record-breaking IPO this September, or from its ever-growing presence in data job ads, there is definitely a lot of hype around this company at the moment. In this article, we explore why, and how we can get... |
Java 16 - Environment Setup | We have set up the Java Programming environment online, so that you can compile and execute all the available examples online. It gives you confidence in what you are reading and enables you to verify the programs with different options. Feel free to modify any example and execute it online.
Try the following example u... | [
{
"code": null,
"e": 2383,
"s": 2090,
"text": "We have set up the Java Programming environment online, so that you can compile and execute all the available examples online. It gives you confidence in what you are reading and enables you to verify the programs with different options. Feel free to mo... |
InterpretML: Analysis of SVM and XGBoost models | by Michael Grogan | Towards Data Science | InterpretML by Microsoft is designed with the aim of expanding interpretability of machine learning models. In other words, make those models easier to understand and ultimately facilitate human interpretation.
Microsoft’s Interpret-Community is an extension of this repository, which includes additional interpretabilit... | [
{
"code": null,
"e": 383,
"s": 172,
"text": "InterpretML by Microsoft is designed with the aim of expanding interpretability of machine learning models. In other words, make those models easier to understand and ultimately facilitate human interpretation."
},
{
"code": null,
"e": 506,
... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.