Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Data Structure Articles
Found 1,635 articles
On Disk Data Structures
On-disk data structures are specialized data organization methods designed for persistent storage on physical media like hard drives and SSDs. Unlike in-memory structures, they are optimized for the unique characteristics of disk storage — slower access times, block-based I/O, and persistence across system restarts. These structures form the foundation of file systems, databases, and other storage-intensive applications. What are On-Disk Data Structures? On-disk data structures define how data is physically organized and accessed on storage devices. They differ from memory-based structures in several key ways: Block-oriented access — Data is read/written in blocks rather than individual ...
Read MoreHash Functions and Hash Tables
Hashing is the process of generating a value from a text or a list of numbers using a mathematical function known as a hash function. Hash functions convert input data of arbitrary size into fixed-size hash values, which are used as indices in hash tables for efficient data storage and retrieval. Hash Functions Hash functions are algorithms that map data to fixed-size hash values. Here are the most commonly used hash functions − Division Method This is the simplest method to create a hash function. The hash function can be described as − h(k) ...
Read MoreBakery Algorithm in Process Synchronization
It is a prerequisite to understand the terms "process synchronization", "critical section", and "inter-process communication" before we proceed to discuss the Bakery Algorithm in Process Synchronization. What is Process Synchronization? In a multiprocessing system, process synchronization is a method of coordinating execution of multiple processes so it is ensured that all processes access shared resources in a controlled and predictable manner. The primary goal of process synchronization is to avoid the problem of race conditions in the system. It also resolves many other issues related to synchronization in a concurrent system. Therefore, process synchronization ensures that multiple ...
Read MoreTransmission mode
Communication is defined as the transfer or sharing of data between any two individuals through a medium and the medium can be wired or wireless. In a computer network, the OSI (Open System Interconnection) model has seven layers for the communication networks. The first layer of OSI is the Physical layer that uses the Transmission mode for transferring the raw data to other devices using a physical medium. Transmission mode refers to the process of transferring data from one point to another over a particular network. The channel between the two devices can be buses or networks, and communication ...
Read MoreBasic Frame Structure of HDLC
HDLC stands for High-level Data Link Control which is a collection of protocols that ensures communication purposes among nodes or network points. It was developed by the International Organization for Standardization (ISO). The data to be transmitted is organized in the form of frames which when transferred to the destination is acknowledged for its appropriate arrival. It can be applied to both point-to-point connections and multipoint connections as it is a bit-oriented protocol. The system of Automatic Repeat Request is implemented via HDLC and also full-duplex communications could be done with the help of HDLC. Due to its high ...
Read MoreTrusted Systems in Network Security
A Trusted System is a computer system that provides users with assurance that no malicious or harmful software can compromise system security. In network security, trusted systems implement multi-layered security (MLS) approaches to protect data and infrastructure from cyberattacks, malware, and unauthorized access. With organizations increasingly adopting cloud storage, wireless networks, and remote applications, the challenges of protecting network resources have grown significantly. Trusted systems address these challenges by enforcing strict security policies that cannot be altered by applications or unauthorized users. Network Security and Multilayered Defense Network Security encompasses the protection of data, network infrastructure, and ...
Read MoreWhy does Youtube use TCP not UDP?
YouTube, the world's largest video streaming platform, uses TCP (Transmission Control Protocol) instead of UDP (User Datagram Protocol) for delivering video content to ensure reliable, high-quality streaming experiences for billions of users worldwide. While both protocols have their strengths, YouTube's choice of TCP is driven by specific requirements for video-on-demand services where data integrity and complete delivery take priority over minimal latency. TCP vs UDP for Video Streaming Feature TCP UDP Reliability Guaranteed delivery with error correction No delivery guarantee Connection Connection-oriented (3-way handshake) Connectionless Data ...
Read MoreWhat do you mean by interfaces and services?
In networking, interfaces and services define how different layers communicate and interact within a network protocol stack. Understanding these concepts is fundamental to grasping how data flows through layered network architectures. A network service is functionality provided by one layer to the layer above it. Services define what operations are available, while interfaces specify how these services are accessed. Each layer acts as a service provider to the layer above and a service user of the layer below. Key Components of Interfaces and Services Entities and Peer Entities An entity is an active element within each ...
Read MoreJavaScript Program to Find Longest Common Prefix Using Word by Word Matching
Prefixes are substrings that start from the zeroth index of a string and can be of any size from 1 to the complete length of the string. We are given a set of strings and need to find the longest common prefix among all of them using JavaScript. We'll implement word-by-word matching approach where we compare characters at the same position across all strings. Input arr = ["zefkefgh", "zefkdefij", "zeffdzy", "zefkdabacd"]; Output zef Explanation From all the given strings, the first three ...
Read MoreJavaScript Program to Find Minimum Insertions to Form a Palindrome
We are given a string and we have to find the minimum number of characters that we need to insert at any position to make the string a palindrome. A palindrome is a string that reads the same forwards and backwards. This problem can be solved using dynamic programming - we'll explore three approaches: recursive, memoization, and tabulation. Understanding the Problem For example, to make "abc" a palindrome, we need to insert 2 characters to get "abcba" or "cbabc". The key insight is that if characters at both ends match, we can focus on the substring between them. ...
Read More