Edit Photo
0
Creator of this website
EditEdit credential:
Creator of this website
See all of my projects here:
https://frogitecture.com
Follow frogitecture:
https://twitter.com/frogitecture
https://www.youtube.com/channel/UCY_TSxjnpuI6Erywx92njSw
Follow WriTeach:
https://www.facebook.com/writeach/
https://twitter.com/teachwri
Study with Flashcards:
https://justflashcards.com
About you:
(Type [url]https://www.site.com[/url] to create links)Learn about the difference between the keyword var and val in Kotlin.
Learn how to create a Pythagorean theorem calculator in Python.
When a derived-class object is instantiated, a chain of constructor calls begins. Similarly, when a derived-class object is destroyed, destructor calls begins
Two very common access specifier in C++ are public and private. Here I introduce the access specifier protected and give you an example of how you can use it.
Inheritance is a form of software reuse in which a class can use another class’s methods and members and modify them.
This article goes through how to overload relational operators in C++. Create your own user-defined types and use overloaded operators with them.
What is the Go-Back-N Protocol? How does it work?
Read about four different ways of Parameter Passing Methods
Type checking prevents type errors to happen.
Read about the subscript range and storage bindings.
Learn how to measure execution time of algorithms in C++
Deleting an account in Android with Firebase Authentication
Changing a password in Android with Firebase Authentication
Changing email in Android with Firebase Authentication
Changing a display name in Android Studio with firebase auth
Learn how to change profile picture with firebase auth
Learn how to verify emails with Firebase Auth in Android
Learn how to reset a password in firebase auth, android java
Implementing register and login forms with firebase auth
Implementing the building blocks for the firebase app
Setup your Android app to support firebase authentication
Implementation of quicksort with tail call optimization
Create enhanced Flashcards and maximize your grades
Introduction to the Merkle-Hellman Knapsack Cipher
Introduction to the knapsack problem
Introduction to cryptography methods that uses a public key
An introduction to the ElGamal cryptosystem