Home|Explained Simply

Straight to the point articles covering the basic theory on various technology topics

SQL UPDATE Statement

The SQL UPDATE statement modifies the data of one or more records in a table.  It has the following syntax: UPDATE table_name SET column_name = value [, column_name = value ...] [WHERE condition]; Parameters: UPDATE table_name  - The name of the table to update.SET column_name  -  Indicates which columns to modify and the values they should be

2019-08-25T11:48:17+03:00By |Categories: Explained Simply|Tags: |0 Comments

Time Complexity Of Algorithms

Algorithms are ubiquitous and are used in almost every aspect of our lives. Choosing the right algorithm for performing a specific task is no trivial matter. In the best case scenario, the algorithm not only performs its job, but it does it using the least amount of resources. The most relevant resources when it comes

2019-06-18T05:53:51+03:00By |Categories: Explained Simply|Tags: |0 Comments

SQL SELECT Statement

What is SQL SELECT statement? The SQL SELECT statement is used to fetch data from a database table which returns the data in the form of a result table. These result tables are called result sets. Basic syntax SELECT column1, column2, column3 FROM table_name; The query contains two keywords - SELECT and FROM. The SELECT

2019-07-09T22:16:28+03:00By |Categories: Explained Simply|Tags: |0 Comments

SQL INSERT Statement

The SQL INSERT INTO statement is used to add new records to a database. INSERT INTO table_name (column_name [, column_name...]) VALUES (value [, value…]); Parameters: INSERT INTO table_name  - The name of the table where a new row will be inserted.column_name  -  Indicates the column names where the data will be added. VALUES value – Specifies

2019-07-16T05:08:03+03:00By |Categories: Explained Simply|Tags: |0 Comments

Basic Authentication With Nginx

Basic authentication with Nginx requires an installation of Nginx and htpasswd. We have to create a password file with users and passwords and add this file to Nginx. The password file The first step is the creation of a password file with htpasswd tool using the following command: htpasswd -c .htpasswd user The flag -c

2019-05-26T23:28:35+03:00By |Categories: Explained Simply|0 Comments

Good Practices for Using Cookies

When cookies first appeared in 1994, they were completely allowed by browsers and their usage depended entirely on what developers had in mind. However, a few years after that, due to concerns about privacy and tracking, web developers were advised to obey some practices that make cookie usage safer. Nowadays, some practices are even required

2019-06-16T21:57:14+03:00By |Categories: Explained Simply|0 Comments

The Difference Between Accuracy And Precision

One of the most common scenarios in embedded system design is the need for getting information from the surrounding environment. This is done by using various types of sensors (e.g temperature, humidity, pressure, etc. ). The data from these sensors always have some difference from the real true value being measured. Our goal as designers

2019-05-07T21:23:45+03:00By |Categories: Explained Simply|0 Comments

B-tree vs. Binary Tree

B-Trees and binary trees are both non-linear data structures and while their names may sound similar, they’re very different in nature. In this article, we will compare them to make them easier to distinguish. B-Tree B-tree is a self-balancing tree data structure in which a node can have more than two children. The height of

2019-04-07T13:17:28+03:00By |Categories: Explained Simply|Tags: |0 Comments


Breadth-First Search (BFS) and Depth-First Search (DFS) are algorithms for traversing graphs. Traversal is the process of accessing each vertex (node) of a data structure in a systematic well-defined order. Choosing the algorithm depends on the type of data you are dealing with. There are generally two types of traversal and the main difference between

2019-10-24T21:47:52+03:00By |Categories: Explained Simply|Tags: , |2 Comments

What is JSON Web Token?

JWT or JSON Web Token is JSON base standard for credential access (RFC 7519). The token contains access claims. For example the authentication server can generate token with claim "edit article" and the user with this claim can access functionality in REST API to "edit article". What is JWT structure? Typically JWT looks like: xxxx.yyyy.zzzz

2019-01-06T23:49:44+02:00By |Categories: Explained Simply|Tags: |0 Comments
Go to Top