Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 16, 2023Guarding Against Social Engineering and Phishing: A Comprehensive Guide to Online SecuritySocial engineering and phishing attacks are becoming increasingly sophisticated and prevalent, making it essential for individuals and organizations to be aware of them and take steps to protect themselves. We will explore the critical facets of cybe...DiscussChronicles of CyberSafetyOnline security
Karelle Hoflerkarellehofler.hashnode.dev·Sep 16, 2023Stacks in JavaA stack is a linear data structure that follows the Last In First Out(LIFO) principle. This means the last element inserted inside the stack is the first to be removed. Think of a stack as a pile of plates. You would typically grab the container that...Discuss #2Articles1Week
Karelle Hoflerkarellehofler.hashnode.dev·Sep 14, 2023How to Use the Position Property in CSSCSS has many properties for styling web pages and web apps; one of those properties you may use is the position property. There are 5 different types of positions: Absolute Fixed Relative Sticky Static In this article, you will learn about all...Discuss #2Articles1Week
Karelle Hoflerkarellehofler.hashnode.dev·Sep 10, 2023Preorder, Inorder, Postorder Traversal with Binary Trees: Leetcode Solution Provided in JavaPreorder, Inorder, and Postorder are three of the four ways to traverse a binary tree. These approaches are the three ways to do a depth-first search of a binary tree. Preorder Traversal - involves accessing the root first, then visiting its left ch...Discuss2Articles1Week
Karelle Hoflerkarellehofler.hashnode.dev·Sep 7, 2023Getting Over Your Shyness With Showcasing Your Projects and How to Get StartedYou have to get over your shyness when it comes to showcasing your dev skills. It is important that you showcase your work because it helps you grow your skills and get recognition. Getting feedback, good and bad, will let you know what you need to i...Discuss·1 like2Articles1Week
Karelle Hoflerkarellehofler.hashnode.dev·Sep 3, 2023Big O NotationBig O notation is primarily used to describe the upper bound or worst-case time complexity of an algorithm. It provides an estimation of how an algorithm's runtime will grow as the input size increases to its largest possible value. In this article, ...Discuss·5 likes·33 reads2Articles1Week
Karelle Hoflerkarellehofler.hashnode.dev·Aug 31, 2023RecursionRecursion is a programming method where a function calls itself until it solves a problem by breaking it down into smaller instances of the same problem. Imagine you have a set of nesting dolls. Each doll can have a smaller doll inside. Recursion is...Discuss2Articles1Week
Karelle Hoflerkarellehofler.hashnode.dev·Aug 26, 2023Binary Search: What It is and How to Implement ItBinary search is an important algorithm for computer programmers to know because it is a very efficient way to search for an element in a sorted list. The time complexity of binary search is O(log n). This makes binary search much faster than other s...Discuss2Articles1Week
Karelle Hoflerkarellehofler.hashnode.dev·Aug 22, 20233 Tips for Using Tailwind for Effective Frontend StylingTailwind.css has grown in popularity and has been the go-to CSS framework for a couple of years now. The utility framework allows for quick and easy styling and is very flexible. Though it is a fairly easy framework to learn, it can be a little overw...Discuss·38 reads2Articles1Week
Chetan Thapliyaltech-transitions.hashnode.dev·Aug 11, 2023Mastering Control Flow in Go (Blog 8 of the Go Series)Control flow is a fundamental concept in programming that enables you to dictate the order in which statements are executed in your code. It allows you to make decisions, repeat actions, and create logical structures in your programs. In this article...Discuss·30 readsGolangGo Language