Tutorial by Examples: io

Lets following are the class definition class A def a; end end module B def b; end end class C < A include B def c; end end What are the instance methods of C? C.instance_methods # [:c, :b, :a, :to_json, :instance_of?...] What are the instance methods that declare...
Haystack: The string in which given pattern needs to be searched. Needle: The pattern to be searched. Time complexity: Search portion (strstr method) has the complexity O(n) where n is the length of haystack but as needle is also pre parsed for building prefix table O(m) is required for building p...
Callback functions in JavaScript Callback functions are common in JavaScript. Callback functions are possible in JavaScript because functions are first-class citizens. Synchronous callbacks. Callback functions can be synchronous or asynchronous. Since Asynchronous callback functions may be more c...
Detailed instructions on getting nuget set up or installed.
Debugging questions. When question is related to debugging specific exception always provide relevant traceback. While it is advisable to remove duplicated outputs (from different executors or attempts) don't cut tracebacks to a single line or exception class only. Performance questions. Dependin...
An example of a configuration function in SQL is the @@SERVERNAME function. This function provides the name of the local server that's running SQL. SELECT @@SERVERNAME AS 'Server' ServerSQL064 In SQL, most data conversions occur implicitly, without any user intervention. To perform any convers...
In your routes/index.js Here user is the model for the userSchema router.post('/login', function(req, res, next) { if (!req.body.username || !req.body.password) { return res.status(400).json({ message: 'Please fill out all fields' }); } passpor...
A common requirement for a Java application is that can be deployed by copying a single file. For simple applications that depend only on the standard Java SE class libraries, this requirement is satisfied by creating a JAR file containing all of the (compiled) application classes. Things are not ...
Assume that I have a file named in.txt: $ cat in.txt a b a c a d I only want to replace the a\nc with deleted, but not a\nb or a\nd. $ sed -e ':loop # create a branch/label named `loop` $!{ N # append the next line of input into the pattern space /\n$/!b...
Encyption happens by replacing each letter of the alfabet with an other letter. The keys can be showed with this circle. Here is a shift of 8 chars used. Here will the A replaced by T, B by U, C by V etc. So will next string encrypted: OriginalEncryptedHELLO WORLDAXEEH PHKEW
Decription happens by the same cicle showed in the encryption example. Example: EncryptedOriginalAXEEH PHKEWHELLO WORLD
class Program { static void Main(string[] args) { string serverName = "INTACT-ETL"; string databaseName = "SOMEDB"; string collectionName = "TestCol"; //Build Connection string ...
The basic use of fit is best explained by a simple example: f(x) = a + b*x + c*x**2 fit [-234:320][0:200] f(x) ’measured.dat’ using 1:2 skip 4 via a,b,c plot ’measured.dat’ u 1:2, f(x) Ranges may be specified to filter the data used in fitting. Out-of-range data points are ignored. (T. W...
SQL has two logical functions – CHOOSE and IIF. The CHOOSE function returns an item from a list of values, based on its position in the list. This position is specified by the index. In the syntax, the index parameter specifies the item and is a whole number, or integer. The val_1 … val_n paramete...
First, Go to Tools > NuGet Package Manager > Package Manager Console. Enter this Command "Install-Package Plugin.Facebook" in Package Manger Console. Now all the file is automatically created. Video : Login with Facebook in Xamarin Forms Other Authentication by using Pl...
From the Welcome to Android Studio dialogue box, select New Project... to open the Create New Project dialog. In the New Android Application dialog, under Application name, specify an appropriate application name. The remainder of this tutorial uses BasicMapSolution as the application name....
When using the Oozie Proxy job submission API for submitting the Oozie Hive, Pig, and Sqoop actions. To pass any configuration to the action, is required to be in below format. For Hive action: oozie.hive.options.size : The number of options you'll be passing to Hive action. oozie.hive.options....
Before we use the IncludeFile method, we need to : Declare std_internal_LibFiles globally Initialize it with a new dictionary Dim std_internal_LibFiles Set std_internal_LibFiles = CreateObject("Scripting.Dictionary")
using MailKit.Net.Smtp; using MimeKit; using MimeKit.Text; using System.Threading.Tasks; namespace Project.Services { /// Using a static class to store sensitive credentials /// for simplicity. Ideally these should be stored in /// configuration files public static class C...
Before starting with deletion I just want to put some lights on what is a Binary search tree(BST), Each node in a BST can have maximum of two nodes(left and right child).The left sub-tree of a node has a key less than or equal to its parent node's key. The right sub-tree of a node has a key greater ...

Page 263 of 322