1
0
mirror of https://github.com/kamranahmedse/developer-roadmap.git synced 2025-09-02 13:52:46 +02:00

Remove geeksforgeeks links

This commit is contained in:
Kamran Ahmed
2025-03-13 11:48:33 +00:00
parent e27146d549
commit fda56a5d30
46 changed files with 9 additions and 82 deletions

View File

@@ -68,7 +68,7 @@ Usually saved in a .js file extension, this code will show **"Sign up on roadmap
### Java vs. JavaScript: Execution and runtime
Java is often used for server-side programming. It is a compiled language that requires a [Java Virtual Machine](https://www.geeksforgeeks.org/jvm-works-jvm-architecture/) **(JVM)** to run Java code. Before running your code, it's compiled into bytecode, a platform-independent format. The JVM then executes the bytecode to ensure that Java programs run on any system with JVM installed. It makes Java a good choice for large-scale applications that run on any operating system. These operating systems include Windows, macOS, Linux, and mobile devices.
Java is often used for server-side programming. It is a compiled language that requires a Java Virtual Machine **(JVM)** to run Java code. Before running your code, it's compiled into bytecode, a platform-independent format. The JVM then executes the bytecode to ensure that Java programs run on any system with JVM installed. It makes Java a good choice for large-scale applications that run on any operating system. These operating systems include Windows, macOS, Linux, and mobile devices.
![](https://assets.roadmap.sh/guest/java-vs-javascript-execution-and-runtime-csnnz.png)

View File

@@ -5,7 +5,3 @@ The rise in popularity of NoSQL databases provided a flexible and fluidity with
- **B**asically **A**vailable
- **S**oft state
- **E**ventual consistency
Visit the following resources to learn more:
- [@article@BASE Model vs. ACID Model](https://www.geeksforgeeks.org/acid-model-vs-base-model-for-database/)

View File

@@ -4,5 +4,4 @@ DCL includes commands such as GRANT and REVOKE which mainly deal with the rights
Visit the following resources to learn more:
- [@article@DCL](https://en.wikipedia.org/wiki/Data_Control_Language)
- [@article@DCL Commands](https://www.geeksforgeeks.org/sql-ddl-dql-dml-dcl-tcl-commands/)
- [@article@DCL](https://en.wikipedia.org/wiki/Data_Control_Language)

View File

@@ -13,10 +13,3 @@ Here is the list of some of the most commonly used scheduling algorithms:
- **Multi-level Feedback Queue Scheduling:** The processes are divided into different queues based on their priority. The process with the highest priority is allocated the CPU first. If a process is preempted, it is moved to the next queue. It is a preemptive algorithm.
- **Highest Response Ratio Next(HRRN):** CPU is allotted to the next process which has the highest response ratio and not to the process having less burst time. It is a Non-Preemptive algorithm.
- **Lottery Scheduling:** The process is allocated the CPU based on a lottery system. It is a preemptive algorithm.
Visit the following resources to learn more
- [@video@Introduction to CPU Scheduling](https://youtu.be/EWkQl0n0w5M?si=Lb-PxN_t-rDfn4JL)
- [@article@CPU Scheduling in Operating Systems - geeksforgeeks](https://www.geeksforgeeks.org/cpu-scheduling-in-operating-systems/)
- [@article@Lottery Scheduling for Operating Systems - geeksforgeeks](https://www.geeksforgeeks.org/lottery-process-scheduling-in-operating-system/)
- [@article@Program for Round Robin Scheduling for the same Arrival time - geeksforgeeks](https://www.geeksforgeeks.org/program-for-round-robin-scheduling-for-the-same-arrival-time/)

View File

@@ -7,5 +7,4 @@ Visit the following resources to learn more:
- [@article@What is DNS cache poisoning? | DNS spoofing](https://www.cloudflare.com/learning/dns/dns-cache-poisoning/)
- [@article@What Is DNS Poisoning?](https://www.fortinet.com/resources/cyberglossary/dns-poisoning)
- [@article@DNS Spoofing or DNS Cache poisoning](https://www.geeksforgeeks.org/dns-spoofing-or-dns-cache-poisoning/)
- [@article@DNS Poisoning (DNS Spoofing): Definition, Technique & Defense](https://www.okta.com/identity-101/dns-poisoning/)

View File

@@ -4,5 +4,4 @@
Learn more from the following resources:
- [@article@What is a loopback address?](https://www.geeksforgeeks.org/what-is-a-loopback-address/)
- [@article@Understanding the loopback address and loopback interfaces](https://study-ccna.com/loopback-interface-loopback-address/)

View File

@@ -14,4 +14,3 @@ This knowledge is essential for designing, implementing, and maintaining effecti
Learn more from the following resources:
- [@article@What are Network Protocols?](https://www.solarwinds.com/resources/it-glossary/network-protocols)
- [@article@Types of Network Topology](https://www.geeksforgeeks.org/types-of-network-topology/)

View File

@@ -4,5 +4,4 @@
Learn more from the following resources:
- [@article@What is an operating system?](https://www.geeksforgeeks.org/what-is-an-operating-system/)
- [@video@What is an operating system as fast as possible](https://www.youtube.com/watch?v=pVzRTmdd9j0)

View File

@@ -1,7 +1,3 @@
# Port Blocking
Port blocking is an essential practice in hardening the security of your network and devices. It involves restricting, filtering, or entirely denying access to specific network ports to minimize exposure to potential cyber threats. By limiting access to certain ports, you can effectively safeguard your systems against unauthorized access and reduce the likelihood of security breaches.
Learn more from the following resources:
- [@article@What is port blocking with LAN?](https://www.geeksforgeeks.org/what-is-port-blocking-within-lan/)
Port blocking is an essential practice in hardening the security of your network and devices. It involves restricting, filtering, or entirely denying access to specific network ports to minimize exposure to potential cyber threats. By limiting access to certain ports, you can effectively safeguard your systems against unauthorized access and reduce the likelihood of security breaches.

View File

@@ -4,5 +4,4 @@
Learn more from the following resources:
- [@article@What is a protocol analyzer?](https://www.geeksforgeeks.org/what-is-protocol-analyzer/)
- [@video@Protocol Analyzers](https://www.youtube.com/watch?v=hTMhlB-o0Ow)

View File

@@ -1,7 +1,3 @@
# route
The `route` command is a network utility used to view and manipulate the IP routing table on Unix-like and Windows systems. It allows users to display the current routes that data packets take, as well as add, modify, or delete routes for network traffic. This command is often used in network troubleshooting and configuration to control how data flows between different networks and subnets. By specifying routes manually, administrators can define specific paths for network traffic, bypassing default routes and optimizing performance or security.
Learn more from the following resources:
- [@article@How to check the routing table in Linux](https://www.geeksforgeeks.org/route-command-in-linux-with-examples/)
The `route` command is a network utility used to view and manipulate the IP routing table on Unix-like and Windows systems. It allows users to display the current routes that data packets take, as well as add, modify, or delete routes for network traffic. This command is often used in network troubleshooting and configuration to control how data flows between different networks and subnets. By specifying routes manually, administrators can define specific paths for network traffic, bypassing default routes and optimizing performance or security.

View File

@@ -4,5 +4,4 @@ A star network topology is a configuration where all devices (nodes) are connect
Learn more from the following resources:
- [@article@Advantages and Disadvantages of Star Topology](https://www.geeksforgeeks.org/advantages-and-disadvantages-of-star-topology/)
- [@video@Star Topology](https://www.youtube.com/watch?v=EQ3rW22-Py0)

View File

@@ -4,5 +4,4 @@ In networking and cybersecurity, a handshake is a process of establishing a secu
Learn more from the following resources:
- [@article@TCP 3-Way Handshake Process](https://www.geeksforgeeks.org/tcp-3-way-handshake-process/)
- [@video@TLS Handshake Explained](https://www.youtube.com/watch?v=86cQJ0MMses)

View File

@@ -11,7 +11,6 @@ Data Analysts, as ambassadors of this domain, employ these types, to answer vari
Visit the following resources to learn more:
- [@article@Data Analytics and its type](https://www.geeksforgeeks.org/data-analytics-and-its-type/)
- [@article@The 4 Types of Data Analysis: Ultimate Guide](https://careerfoundry.com/en/blog/data-analytics/different-types-of-data-analysis/)
- [@video@Descriptive vs Diagnostic vs Predictive vs Prescriptive Analytics: What's the Difference?](https://www.youtube.com/watch?v=QoEpC7jUb9k)
- [@video@Types of Data Analytics](https://www.youtube.com/watch?v=lsZnSgxMwBA)

View File

@@ -4,5 +4,4 @@ Data structures are crucial in the field of computer science and coding because
Learn more from the following links:
- [@article@Why Data Structures and Algorithms Are Important to Learn?](https://www.geeksforgeeks.org/why-data-structures-and-algorithms-are-important-to-learn/)
- [@video@What are Data Structures? Why is it Important?](https://www.youtube.com/watch?v=18V8Avz2OH8)

View File

@@ -4,6 +4,5 @@ Heap Sort is an efficient, comparison-based sorting algorithm. It utilizes a dat
Learn more from the following resources:
- [@article@Heap Sort - W3Schools](https://www.geeksforgeeks.org/heap-sort/)
- [@article@Heap Sort Visualize](https://www.hackerearth.com/practice/algorithms/sorting/heap-sort/tutorial/)
- [@video@Heap sort in 4 minutes](https://www.youtube.com/watch?v=2DmK_H7IdTo)

View File

@@ -5,5 +5,4 @@ Linear search is one of the simplest search algorithms. In this method, every el
Learn more from the following resources:
- [@article@DSA Linear Search - W3Schools](https://www.w3schools.com/dsa/dsa_algo_linearsearch.php)
- [@article@Linear Search - GeeksForGeeks](https://www.geeksforgeeks.org/linear-search/)
- [@video@Learn Linear Search in 3 minutes](https://www.youtube.com/watch?v=246V51AWwZM)

View File

@@ -4,5 +4,4 @@ An **AVL tree** is a type of binary search tree that is self-balancing, which me
Learn more from the following links:
- [@article@AVL Tree Data Structure](https://www.geeksforgeeks.org/introduction-to-avl-tree/)
- [@video@AVL trees in 5 minutes — Intro & Search](https://www.youtube.com/watch?v=DB1HFCEdLxA)

View File

@@ -4,5 +4,4 @@ B-Tree is a self-balanced search tree data structure that maintains sorted data
Learn more from the following links:
- [@article@Introduction of B-Tree](https://www.geeksforgeeks.org/introduction-of-b-tree-2/)
- [@video@B-trees in 4 minutes — Intro](https://www.youtube.com/watch?v=FgWbADOG44s)

View File

@@ -4,6 +4,4 @@
Learn more from the following resources:
- [@article@Introduction of B Tree](https://www.geeksforgeeks.org/introduction-of-b-tree-2/)
- [@article@Introduction of B+ Tree](https://www.geeksforgeeks.org/introduction-of-b-tree/)
- [@video@B Trees and B+ Trees. How they are useful in Databases](https://www.youtube.com/watch?v=aZjYr87r1b8)

View File

@@ -4,5 +4,4 @@ A **Skip List** is a probabilistic data structure that allows efficient search,
Learn more from the following resources:
- [@article@Skip List Efficient Search, Insert and Delete in Linked List](https://www.geeksforgeeks.org/skip-list/)
- [@video@Skip Lists](https://www.youtube.com/watch?v=NDGpsfwAaqo)

View File

@@ -4,5 +4,4 @@ ISAM, which stands for Indexed Sequential Access Method, is a type of disk stora
Learn more from the following resources:
- [@article@ISAM in Database](https://www.geeksforgeeks.org/isam-in-database/)
- [@video@DBMS - Index Sequential Access Method (ISAM)](https://www.youtube.com/watch?v=EiW1VVPor10)

View File

@@ -4,5 +4,4 @@ Backtracking is a powerful algorithmic technique that aims to solve a problem in
Learn more from the following links:
- [@article@Backtracking Algorithm](https://www.geeksforgeeks.org/backtracking-algorithms/)
- [@video@What is backtracking?](https://www.youtube.com/watch?v=Peo7k2osVVs)

View File

@@ -4,5 +4,4 @@ Greedy algorithms follow the problem-solving heuristic of making the locally opt
Learn more from the following links:
- [@article@Greedy Algorithm Tutorial Examples, Application and Practice Problem](https://www.geeksforgeeks.org/introduction-to-greedy-algorithm-data-structures-and-algorithm-tutorials/)
- [@video@Greedy Algorithms Tutorial ](https://www.youtube.com/watch?v=bC7o8P_Ste4)

View File

@@ -4,5 +4,4 @@ Randomised algorithms are a type of algorithm that employs a degree of randomnes
Learn more from the following links:
- [@article@Randomized Algorithms](https://www.geeksforgeeks.org/randomized-algorithms/)
- [@video@Algorithm Classification Randomized Algorithm](https://www.youtube.com/watch?v=J_EVG6yCOz0)

View File

@@ -4,5 +4,4 @@ Divide and conquer is a powerful algorithm design technique that solves a proble
Learn more from the following links:
- [@article@Introduction to Divide and Conquer Algorithm](https://www.geeksforgeeks.org/introduction-to-divide-and-conquer-algorithm/)
- [@video@Divide & Conquer Algorithm In 3 Minutes](https://www.youtube.com/watch?v=YOh6hBtX5l0)

View File

@@ -4,5 +4,4 @@ Recursion is a method where the solution to a problem depends on solutions to sh
Learn more from the following links:
- [@article@Introduction to Recursion](https://www.geeksforgeeks.org/introduction-to-recursion-2/)
- [@video@Recursion in 100 Seconds](https://www.youtube.com/watch?v=rf60MejMz3E)

View File

@@ -4,7 +4,6 @@
Learn more from the following links:
- [@article@Dynamic Programming (DP) Tutorial with Problems](https://www.geeksforgeeks.org/introduction-to-dynamic-programming-data-structures-and-algorithm-tutorials/)
- [@article@Getting Started with Dynamic Programming in Data Structures and Algorithms](https://medium.com/@PythonicPioneer/getting-started-with-dynamic-programming-in-data-structures-and-algorithms-126c7a16775c)
- [@video@What Is Dynamic Programming and How To Use It](https://www.youtube.com/watch?v=vYquumk4nWw&t=4s)
- [@video@5 Simple Steps for Solving Dynamic Programming Problems](https://www.youtube.com/watch?v=aPQY__2H3tE)

View File

@@ -4,7 +4,6 @@ The **two-pointer technique** is a strategy that can be used to solve certain ty
Learn more from the following links:
- [@article@Two Pointers Technique](https://www.geeksforgeeks.org/two-pointers-technique/)
- [@article@Two Pointers Technique](https://medium.com/@johnnyJK/data-structures-and-algorithms-907a63d691c1)
- [@article@Mastering the Two Pointers Technique: An In-Depth Guide](https://lordkonadu.medium.com/mastering-the-two-pointers-technique-an-in-depth-guide-3c2167584ccc)
- [@video@Visual introduction Two Pointer Algorithm](https://www.youtube.com/watch?v=On03HWe2tZM)

View File

@@ -4,6 +4,5 @@ The **Sliding Window Technique** is an algorithmic paradigm that manages a subse
Learn more from the following links:
- [@article@Sliding Window Technique](https://www.geeksforgeeks.org/window-sliding-technique/)
- [@article@Mastering Sliding Window Techniques](https://medium.com/@rishu__2701/mastering-sliding-window-techniques-48f819194fd7)
- [@video@Sliding window technique](https://www.youtube.com/watch?v=p-ss2JNynmw)

View File

@@ -5,4 +5,3 @@ Bind mounts have limited functionality compared to volumes. When you use a bind
Visit the following resources to learn more:
- [@official@Docker Bind Mounts](https://docs.docker.com/storage/bind-mounts/)
- [@article@How to Use Bind Mount in Docker?](https://www.geeksforgeeks.org/how-to-use-bind-mount-in-docker/)

View File

@@ -4,6 +4,5 @@ Artificial Neural Networks (ANN) are a branch of machine learning that draw insp
Visit the following resources to learn more:
- [@article@Artificial Neural Networks (ANN)](https://www.geeksforgeeks.org/artificial-neural-networks-and-its-applications/)
- [@article@What is ANN?](https://www.coursera.org/articles/artificial-neural-network)
- [@article@What is Neural Network?](https://www.ibm.com/topics/neural-networks)

View File

@@ -4,6 +4,5 @@ Computer Graphics is a subfield of computer science that studies methods for dig
Visit the following resources to learn more:
- [@article@What is Computer Graphics?](https://www.geeksforgeeks.org/introduction-to-computer-graphics/)
- [@article@Introduction to Computer Graphics](https://open.umn.edu/opentextbooks/textbooks/420)
- [@video@How do Video Game Graphics Work?](https://www.youtube.com/watch?v=C8YtdC8mxTU)

View File

@@ -5,4 +5,3 @@
Visit the following resources to learn more:
- [@article@MCTS Algorithm](https://en.wikipedia.org/wiki/Monte_Carlo_tree_search/)
- [@article@Monte Carlo Tree Search](https://www.geeksforgeeks.org/ml-monte-carlo-tree-search-mcts/)

View File

@@ -6,6 +6,5 @@ Visit the following resources to learn more:
- [@official@How to add collaborators to your personal projects](https://docs.github.com/en/account-and-profile/setting-up-and-managing-your-personal-account-on-github/managing-access-to-your-personal-repositories/inviting-collaborators-to-a-personal-repository)
- [@official@Adding outside collaborators to repositories in your organization](https://docs.github.com/en/organizations/managing-user-access-to-your-organizations-repositories/managing-outside-collaborators/adding-outside-collaborators-to-repositories-in-your-organization)
- [@article@What are github collaborators](https://www.geeksforgeeks.org/what-are-github-collaborators/)
- [@article@How to Add Collaborators to Your GitHub Repository](https://www.blinkops.com/blog/how-to-add-collaborators-to-your-github-repository)
- [@video@Using Github for Team collaboration](https://youtu.be/4nyIS58ORWw?si=yK5LCONNVm9OIUK5)

View File

@@ -4,5 +4,4 @@ This scope restricts the variable that is declared inside a specific block, from
Visit the following resources to learn more:
- [@article@JavaScript Scope](https://www.w3schools.com/js/js_scope.asp)
- [@article@Block Scoping in JavaScript](https://www.geeksforgeeks.org/javascript-es2015-block-scoping)
- [@article@JavaScript Scope](https://www.w3schools.com/js/js_scope.asp)

View File

@@ -4,5 +4,4 @@ The relational model is an approach to organizing and structuring data using tab
Learn more from the following resources:
- [@article@What is the Relational Model?](https://www.postgresql.org/docs/7.1/relmodel-oper.html)
- [@article@The Relational Model](https://www.geeksforgeeks.org/relational-model-in-dbms/)
- [@article@What is the Relational Model?](https://www.postgresql.org/docs/7.1/relmodel-oper.html)

View File

@@ -4,7 +4,6 @@ Loops are used to execute a block of code repeatedly.
Visit the following resources to learn more:
- [@article@Loops in Python](https://www.geeksforgeeks.org/loops-in-python/)
- [@article@Python "while" Loops (Indefinite Iteration)](https://realpython.com/python-while-loop/)
- [@article@Python "for" Loops (Definite Iteration)](https://realpython.com/python-for-loop/#the-guts-of-the-python-for-loop)
- [@video@Python For Loops](https://www.youtube.com/watch?v=KWgYha0clzw)

View File

@@ -4,5 +4,4 @@ Lists in Redis are ordered collections of string elements, allowing operations s
Learn more from the following resources:
- [@official@Redis Lists](https://redis.io/docs/latest/develop/data-types/lists/)
- [@article@Complete Guide to Redis Lists](https://www.geeksforgeeks.org/complete-guide-to-redis-lists/)
- [@official@Redis Lists](https://redis.io/docs/latest/develop/data-types/lists/)

View File

@@ -4,5 +4,4 @@ Pipelining in Redis is a technique that allows clients to send multiple commands
Learn more from the following resources:
- [@official@Redis Pipelining](https://redis.io/docs/latest/develop/use/pipelining/)
- [@article@Complete Guide to Redis Pipelining](https://www.geeksforgeeks.org/complete-guide-to-redis-pipelining/)
- [@official@Redis Pipelining](https://redis.io/docs/latest/develop/use/pipelining/)

View File

@@ -12,7 +12,3 @@ To support the laid-out activities specific skills are required. From my experie
- Balance
- Consult
- Market
Visit the following resources to learn more:
- [@article@Software Architect Skills](https://www.geeksforgeeks.org/software-architects-skills/)

View File

@@ -5,7 +5,3 @@ Architecture can be done on several “levels” of abstractions. The level infl
- **Application Level:** The lowest level of architecture. Focus on one single application. Very detailed, low level design. Communication is usually within one development team.
- **Solution Level:** The mid-level of architecture. Focus on one or more applications which fulfill a business need (business solution). Some high, but mainly low-level design. Communication is between multiple development teams.
- **Enterprise Level:** The highest level of architecture. Focus on multiple solutions. High level, abstract design, which needs to be detailed out by solution or application architects. Communication is across the organization.
Visit the following resources to learn more:
- [@article@Software Engineering Architecture](https://www.geeksforgeeks.org/software-engineering-architectural-design/)

View File

@@ -13,5 +13,4 @@ The `TCP/IP model` defines how devices should transmit data between them and ena
Visit the following resources to learn more:
- [@article@What is Transmission Control Protocol TCP/IP? - Fortinet](https://www.fortinet.com/resources/cyberglossary/tcp-ip#:~:text=The%20TCP%2FIP%20model%20defines,exchanged%20and%20organized%20over%20networks.)
- [@article@TCP/IP Model](https://www.geeksforgeeks.org/tcp-ip-model/)
- [@article@What is TCP/IP and How Does it Work?](https://www.techtarget.com/searchnetworking/definition/TCP-IP)git reset

View File

@@ -1,7 +1,3 @@
# Architect Tools
Architect tools are software tools that help architects to design, document, and manage software architectures. These tools can be used to create architecture diagrams, generate code, and automate the software development process.
Visit the following resources to learn more:
- [@article@Top 10 Software Architecture Tools in 2024](https://www.geeksforgeeks.org/software-architecture-tools/)

View File

@@ -24,7 +24,3 @@ type User = {
education: Education;
};
```
Learn more from the following links:
- [@official@Geeksforgeeks.org - Hybrid Types](https://www.geeksforgeeks.org/what-are-hybrid-types-in-typescript/#:~:text=Hybrid%20types%20are%20a%20combination,properties%20like%20a%20regular%20object.)

View File

@@ -4,5 +4,4 @@ Vue.js is an open-source ModelViewViewModel front-end JavaScript framework
Visit the following resources to learn more:
- [@official@Binding Events](https://vuejs.org/guide/essentials/event-handling)
- [@article@Vue.js Event Handling](https://www.geeksforgeeks.org/vue-js-event-handling/)
- [@official@Binding Events](https://vuejs.org/guide/essentials/event-handling)