• Main Menu
  • Programming

    • Random Number Vulnerability

      Random Number Vulnerability

      Computers are deterministic and are therefore predictable. Computers cannot, in and of themselves, generate truly random numbers. In the absence of outside input, computers can only create pseudo-random numbers.  In the words of John Von Neumann, “Anyone attempting to produce random numbers by purely arithmetic means is, of course, in a state of sin.” A

    • SDLC Methodology

      SDLC Methodology

      SDLC (Systems Development Life Cycle) is the process of creating or modifying existing systems and the models and methodologies that are used in the process. In the fields of software engineering and information systems, SDLC denotes a framework of methodologies aimed at the creation of an information/software system, i.e. the software development process. SDLC covers

    • The Prim Algorithm

      The Prim Algorithm

      Given a connected weighted graph G, it is often desired to create a spanning tree T for G such that the sum of the weights of the tree edges in T is as small as possible. Such a tree is called as minimum spanning tree and represents the most inexpensive way of connecting all the

    • Binary Tree – Searching a Node

      Binary Tree – Searching a Node

      An element in a binary search tree can be searched very quickly. A search operation on binary tree is similar to applying binary search technique to a sorted linear array. The element to be searched will be first compared with root node. If it matches with the root node then the search terminates. Otherwise search

    • Jar File

      Jar File

      JAR is an abbreviation for Java Archive. It is basically a file in archive format used to group and integrate Java classes, resources, metadata together which can then be easily distributed across Java platform. However the underlying file format is ZIP with a .jar extension. Every JAR file contains a manifest file which is normally

    • Function Templates

      Like class templates, we can also define function templates that could be used to create a family of functions with different argument types. The general format of a function template is as follows: template <class T> return-type function-name( argument of type T ) { // body of function with Type T } The function template

    • Java vs. JavaScript

      Java vs. JavaScript

      Java and JavaScript are two different programming languages meant for different purposes and functionality. Java is an application programming language designed to write stand-alone Java programs and web applications running on the Internet. JavaScript is a client-side scripting language specifically designed to work with various web technologies, but on the client’s end. To understand the

    • Send Tweets to your Twitter Account via PHP

      Send Tweets to your Twitter Account via PHP

      Posting status messages to a Twitter account via PHP is quite useful in many scenarios. Like automatically tweeting your blog’s latest content, tweeting list of facts, tips or quotes at regular intervals, tweeting daily news, etc. This article’s intention is to show how you can send a tweet to your Twitter account via PHP programming.

    • Pointers and Arrays

      Pointers and Arrays

      Arrays and pointers are very closely linked together. In most contexts, C++ treats the name of an array as if it were a pointer i.e. memory address of some element. C++ interprets an array name as the address of its first element. That is, if age is an int array to hold 10 integers then

    • Address Calculation Sort

      In this method, a function fn() is applied to each key. The result of this function determines into which of the several sub-files the record is to be placed. The function should have the property that x <= y, fn (x) <= fn (y). Such a function is called order preserving. Thus all of the

    } 411 queries in 0.330 seconds.