Found 34484 Articles for Programming

Partitioning Algorithms

Way2Class
Updated on 20-Jul-2023 15:33:25

4K+ Views

A typical algorithmic strategy is partitioning, which involves breaking a big issue into smaller subproblems that may be solved individually and then combining their solutions to solve the original problem. The fundamental concept underlying partitioning is to separate the input into subsets, solve each subset independently, and then combine the results to get the whole answer. From sorting algorithms to parallel computing, partitioning has a wide range of uses. The quicksort algorithm is a well-known illustration of partitioning. The effective sorting algorithm QuickSort uses partitioning to arrange an array of items. The algorithm divides the array into two subarrays: one ... Read More

Partition Allocation in Memory Management

Way2Class
Updated on 20-Jul-2023 15:30:51

3K+ Views

Operating systems must have memory management, which is responsible for allocating and controlling memory resources to active processes. Memory in a computer system is split up into several partitions, each of which is dedicated to a different process. Partition allocation is the name of this procedure. Several partition allocation techniques can be applied while managing memory. We shall examine the various partition allocation techniques in this post, as well as their benefits and drawbacks. Partition Allocation Methods Fixed and dynamic partition allocation techniques are the two primary categories of partition allocation methods used in memory management. The fixed partition allocation ... Read More

Parrot Operating System

Way2Class
Updated on 20-Jul-2023 15:28:56

283 Views

A free and open-source operating system called Parrot Operating System was created with security, privacy, and development in mind. It is based on Debian GNU/Linux and includes pre-installed tools for privacy protection, cryptography, computer forensics, and penetration testing. For various use cases, Parrot OS provides many versions including Home, Security, IoT, and Cloud. Moreover, it offers a virtual machine manager for managing virtualization platforms and a sandbox environment for testing programs. AnonSurf, a special utility available only in Parrot OS, enables users to anonymize their internet activity and conceal their identity. Moreover, the operating system is compatible with a ... Read More

Parbegin / Parend Concurrent Statement

Way2Class
Updated on 20-Jul-2023 15:27:04

300 Views

In hardware description languages like VHDL, a "parent" concurrent statement is used to establish a hierarchical design structure. It enables the creation and management of several processes within of a single organization. An illustration of a parent concurrent statement is as follows − entity my_entity is port ( clk: in std_logic; reset: in std_logic; data_in: in std_logic_vector(7 downto 0); data_out: out std_logic_vector(7 downto 0) ); end entity; architecture behavioral of my_entity is begin -- Parent Concurrent Statement parent_process: process(clk, reset) begin if reset = '1' then -- Reset condition data_out

Paged Segmentation and Segmented Paging

Way2Class
Updated on 20-Jul-2023 15:24:11

1K+ Views

Paged segmentation and segmented paging are two methods that operating systems use to manage computer memory allocation and address translation. Paged segmentation is a hybrid memory management scheme that combines segmentation and paging. Memory is divided into segments of different sizes, which are further divided into pages of fixed sizes. A segment table tracks segment location and size, while a page table tracks page location and corresponding physical addresses. When a program requests memory, the operating system allocates a segment of the required size and divides it into pages. Important aspects of paged segmentation Modern operating systems manage ... Read More

Operating System Hardening

Way2Class
Updated on 20-Jul-2023 15:17:33

161 Views

Operating system hardening involves protecting an operating system to lower its attack surface and improve its overall security posture. In order to do this, the operating system settings must be configured. Updates and patches must also be installed, unused programs and services must be disabled, and security measures like firewalls, intrusion detection systems, and antivirus software must be put in place. Operating system hardening reduces the amount of potential attack pathways that hackers might take in an effort to decrease the probability that an attack would be successful. Operating system hardening is an ongoing process that requires regular review and ... Read More

On Disk Data Structures

Way2Class
Updated on 20-Jul-2023 15:15:35

714 Views

Data is stored persistently on hard drives or other storage media using on-disk data structures, enabling access and modification even after a system restart or power loss. The retrieval, storage, and manipulation of data on the disc, which normally has longer access times and less bandwidth than memory, are all optimized by these data structures. The types of on-disk data structures, storage formats, data compression methods, indexing methods, sorting algorithms, performance concerns, and applications will all be covered in this article. What are On Disk Data Structures? On-disk data structures describe how data is kept on a tangible storage medium, ... Read More

How to find duplicate elements in a Stream in Java

Shriansh Kumar
Updated on 19-Jul-2023 19:06:38

7K+ Views

Finding duplicate elements in a stream of data is one of the common questions that is asked in Java interviews and even in the exams of many students. Java provides several ways to find duplicate elements, we will focus mainly on two ways: the first one is by using Set of Java Collection Framework and the other one is by using the built-in method of stream named Collections.frequency(). Java Program to find duplicate elements in a Stream Before discussing the different ways to get duplicate items from a collection of data, it is necessary to ... Read More

Create a Pong Game in Python using Pygame

Prince Yadav
Updated on 08-Nov-2023 11:40:41

1K+ Views

Python, a dynamic programming language, offers an array of possibilities, including game development. Pygame, a widely−used Python library, provides developers with a toolkit for creating 2D games. In this article, we will delve into the process of crafting a classic Pong game utilizing Python and Pygame. Pong, a simplistic yet captivating game, revolves around two paddles and a ball. Competing players aim to score points by propelling the ball past their opponent's paddle. By following the steps outlined in this guide, you will gain insights into setting up the development environment, initializing the game, creating game objects, implementing game logic, ... Read More

How to Find User Defined Objects From LinkedHashSet in Java?

Shriansh Kumar
Updated on 19-Jul-2023 18:49:36

152 Views

LinkedHashSet is a class of Java Collection Framework that implements the Set interface and extends the HashSet class. It is a linked list type of collection class. It stores and returns the objects in the order in which they were inserted, therefore it does not allow duplicate objects. In this article, we will use the built-in method 'contains()'' to find user-defined objects from LinkedHashSet. The user-defined objects are created with the help of constructors. Java Program to get User-Defined Objects from LinkedHashSet Let's have a brief introduction of two important in-built methods that we will use in our ... Read More

Advertisements