AlgorithmSecurityHash vs Encrypt vs Encode Hashing converting a given key into another smaller and fixed-size value…Daniel NguyenApril 12, 2024 4 min
AlgorithmArrayMutator Methods. push() - 0(1) Add a new element to the end of the array. pop() - 0(1) Delete the…Daniel NguyenApril 10, 2024 1 min
AlgorithmBit ManipulationAND Only true if both input bits are true: OR True if any input bit is true XOR True if one and only…Daniel NguyenApril 10, 2024 1 min
AlgorithmBig “Oh” notationBig “Oh” notation Big O notation describes the complexity of an algorithm as a function of the size…Daniel NguyenApril 09, 2024 1 min
Algorithm2 Pointers & Heap2-pointers use 2 pointers (variables) to keep track of the index of array or string. there are…Daniel NguyenMarch 18, 2024 1 min
AlgorithmDFS and BFSDFS - Depth First Search an algorithm to search/ traversing the graph data structure recursive…Daniel NguyenMarch 17, 2024 1 min