Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Aviance School is one of the largest web solutions platform in India for developers to learn and share their programming knowledge and build their careers.
Advantages of Lined list
1. Stack and queues can be easily implemented using linked list
2. As size of linked list can increase or decrease at run time so there is no memory wastage.
Disadvantages of Lined list :
1. Random access to element is not possible, but in array you can access any element by its index.
2. Extra memory space is required for the pointer with each element in the linked list.
A linked list is a dynamic data structure where each element or node is made up of two items – the data and a pointer which points to the next node. The first node is called a head and if the list is empty then the value of head is NULL.
Types of linked list:
1. Simple Linked List
2. Doubly Linked List
3. Circular Linked List
CLUSTERED INDEX
1. Clustered indexes are stored physically on the table.
2. A table can have a single clustered index
3. Requires less memory space
4. Faster
NONCLUSTERED INDEX
1.Non-clustered indexes are stored separately
2. A table can have multiple nonclustered indexes
3. Requires more memory space
4. Slower
Keywords are predefined reserved words, which possess special meaning.
Identifier is a unique name given to a particular variable, function or label of class in the program.
“FOREIGN KEY” is used to create a table level constraint
“REFERENCES KEY” can be used to create column level constraint only.
A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. You can add a one-way hash (encryption) of the message content using your public and private key pair.
Constants refer to fixed values that the program may not alter and they are called literals. Constants can be of any of the basic data types and can be divided into Integer Numerals, Floating-Point Numerals, Characters, Strings and Boolean Values.
A computer network is mainly of four types:
LAN(Local Area Network)
PAN(Personal Area Network)
MAN(Metropolitan Area Network)
WAN(Wide Area Network)
A code can be used again and again. Inheritance enhances the properties of the class, which means that property of the parent class will automatically be inherited by the base class. It can define more specialized classes by adding new details.
#include <iostream>
using namespace std;
int main()
{
int n, i, m=0, fl=0;
cout << “Enter the Number to check Prime: “;
cin >> n;
m=n/2;
for(i = 2; i <= m; i++)
{
if(n % i == 0)
{
cout<<“Number is not Prime.”<<endl;
fl=1;
break;
}
}
if (fl==0)
cout << “Number is Prime.”<<endl;
return 0;
}
1. malloc() takes a single argument, while calloc() takes two.
2. malloc() does not initialize the memory allocated, while calloc() initializes the allocated memory to ZERO.
UNIX is a full fledged operating system.
Linux is just a kernel of many free operating systems like Arch Linux,Linux Mint, Red Hat, Ubuntu.
In object-oriented programming, encapsulation refers to the bundling of data with the methods that operate on that data, or the restricting of direct access to some of an object’s components.
In object-oriented programming, encapsulation refers to the bundling of data with the methods that operate on that data, or the restricting of direct access to some of an object’s components.
#include<stdio.h>
#include<stdlib.h>
int main()
{
int a=20, b=40;
printf(“Before swap a=%d b=%d”,a,b);
a=a*b;
b=a/b;
a=a/b;
printf(“\nAfter swap a=%d b=%d”,a,b);
return 0;
}
The difference between a read-only memory (ROM) and a random-access memory (RAM) chip:
1. ROM can hold data without power and RAM cannot.
2. ROM is meant for permanent storage, and RAM is for temporary storage.
Normalization is the process of reducing the duplication of the data. “NF” refers to “normal form” .
The three main types of normalization are
1NF
2NF
3NF
Normalization is also known as data normalization.
Constraints are the rules enforced on the data columns of a table. These are used to limit the type of data that can go into a table. This ensures the accuracy and reliability of the data in the database. Constraints could be either on a column level or a table level.
For every operating system separate JVM is available which is capable to read the . class file or byte code. An important point to be noted is that while JAVA is platform–independent language, the JVM is platform–dependent. Different JVM is designed for different OS and byte code is able to run on different OS
#include <stdio.h>
#include <math.h>
void main()
{
int num, sum = 0, rem = 0, cube = 0, temp;
printf (“enter a num”);
scanf(“%d”, &num);
temp = num;
while (num != 0)
{
rem = num % 10;
cube = pow(rem, 3);
sum = sum + cube;
num = num / 10;
}
if (sum == temp)
printf (“The given no is armstrong number”);
else
printf (“The given no is not a armstrong number”);
}