Skip to content

NTSEQ:- A IT Infrastructure and Cyber Security Blogs

Author:

Java Program to print Floyd’s triangle

Floyd’s triangle is a right-angled triangular array of natural numbers,It is defined by filling the rows of the triangle with

Continue reading

sys.dm_exec_sessions in SQL Server

sys.dm_exec_sessions will give information about each session connected to SQL Server. This DMV is similar to running sp_who2 stored procedure

Continue reading

sys.dm_exec_connections in SQL Server

sys.dm_exec_connections : – sys.dm_exec_connections DMV shows all the connection to SQL Server and sys.dm_exec_connections is the most common DMV used

Continue reading

Python program to implement Binary Search

Binary Search :- Binary Search is applied on the sorted array or list of large size. Binary search compares the

Continue reading

Python Program to Implement Linear Search

Linear search is one of the simplest search algorithms in which targeted item in sequentially matched with each item in

Continue reading

Java Program to Find the Median of two Sorted Arrays

In This below Java Program going to find the median of two sorted arrays using binary search approach. In this

Continue reading

Java Program To Find all Palindromic Substrings in a String

Given a String, We have to find all the palindromic sub-strings from the given string. Example:- Input_String =”helloworld” Output:-[ll, r,

Continue reading

How To Find Longest Substring Without Repeating Characters In Java?

Java Program To Find Longest Substring Without Repeating Characters In Java :- Going to write a java program  to find

Continue reading

What is Checkpoint in SQL Server ?

Checkpoint is an internal process that writes all the dirty pages (from the buffer cache to the physical disk) to

Continue reading

Differences between HashMap and HashTable in Java

Difference between HashMap and HashTable in Java  HasMap HashTable HashMap method is not Synchronized HashTable every method is synchronized multiple

Continue reading

Posts pagination

«Previous Posts 1 … 7 8 9 10 11 … 34 Next Posts»
  • C Programming
  • C++
  • Cyber Security
  • Interview FAQ
  • Java
  • Linux
  • MySQL
  • Netseq.com
  • Oracle
  • PHP
  • Python
  • SQL
  • SQL Server -DBA
  • Active Directory Security: Strategies to Safeguard Your Organization
  • PowerShell scripts for Active Directory (AD)
  • Top 50 Essential Active Directory PowerShell Commands and Administrative Tools
  • Critical Windows Event ID’s to SOC Team Must Monitor
  • Top Cybersecurity Threats in 2025 and How to Protect Yourself
WordPress Theme: Wellington by ThemeZee.