Programming hero
223 subscribers
63 photos
5 videos
22 links
HTML, CSS, JS, Python, C/C++, Java...
Download Telegram
Seven Python Libraries for Different Uses

Selenium ↣ Automation
Openpyxl ↣ Handling Excel sheets
Tensorflow ↣ Machine Learning
Numpy ↣ Mathematics
Pandas ↣ Data Analysis
OpenCV ↣ Computer vision
Pytorch ↣ Natural Language Processing
Comment output
Programming hero
Comment output
Options
Anonymous Quiz
25%
A
73%
B
2%
C
0%
D
What's the output?
Programming hero
What's the output?
Options
Anonymous Quiz
38%
A
26%
B
34%
C
2%
D
🔥71
Programming hero
Tooltips are good for UX, they help identify the purpose of items on the screen. #CodeSmart
Tooltips are good for UX, they help identify the purpose of items on the screen.

#CodeSmart
👍1
#JSQuiz
What's the output
Programming hero
#JSQuiz What's the output
Options
Anonymous Quiz
32%
A
34%
B
22%
C
12%
D
👍1
Awesome Software Architecture 🕶

Curated list of awesome articles and resources to learn and practice about software architecture, patterns and principles. this repository will be updated continuously, keep yourself up to date.

[ Github ] : kutt.it/awsArch

〰️〰️〰️〰️〰️〰️
#Architecture
1
🎲 10 Myths vs Facts 🎲

1. A strong password is enough to keep your business safe.
1. Two-factor authentication and data monitoring is also needed.

2. Small and medium-sized businesses are not targeted by h*ckers.
2. Small businesses made up over half of the year's breach victims.

3. Only certain companies are vulnerable to cyberattacks.
3. Any business with sensitive information is vulnerable to cyberattacks.

4. Antivirus softwares keeps you completely safe.
4. Softwares can't protect against all cyberattacks.

5. Cybersecurity threats comes from outside.
5. Insider threats are just likely, and harder to detect.

6. Cybersecurity is solely the IT department's responsibility.
6. All employees play a role in keeping a company cybersafe.

7. If wifi has a password, it's secure.
7. All public wifi can be compromised, even with a password.

8. You'll know right away if your computer is infected.
8. Modern malware is stealthy, and hard to detect.

9. Personal devices don't need to be secured at work.
9. All smart devices, including wearable, can compromise a network system.

10. Complete cybersecurity can be achieved.
10. New threats are emerging everyday.
👍5