DEV Community

DEV Challenges

This is the official tag for submissions and announcements related to DEV Challenges.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Big O Notation

Big O Notation

Comments
1 min read
ASCII (248 chars)

ASCII (248 chars)

Comments
1 min read
A Trigger Analogy

A Trigger Analogy

Comments
1 min read
naive explanation of cryptography.

naive explanation of cryptography.

1
Comments
1 min read
Recursion

Recursion

Comments
1 min read
Hooks - One Byte Explainer

Hooks - One Byte Explainer

Comments
1 min read
Cryptographic Security: Safeguarding Data

Cryptographic Security: Safeguarding Data

Comments
1 min read
AES: The Power of Advanced Encryption Standard for Data Security

AES: The Power of Advanced Encryption Standard for Data Security

Comments
1 min read
IPFS: The Decentralized Future of File Storage in 256 Characters

IPFS: The Decentralized Future of File Storage in 256 Characters

Comments
1 min read
File locking vs Row Level Locking

File locking vs Row Level Locking

Comments
1 min read
Backstage for AI's Decision-Making Process

Backstage for AI's Decision-Making Process

Comments
1 min read
SHA-256: The Heartbeat of Cryptographic Security in 256 Characters

SHA-256: The Heartbeat of Cryptographic Security in 256 Characters

Comments
1 min read
Quamtum Computing and its importance

Quamtum Computing and its importance

1
Comments
1 min read
Schönhage–Strassen algorithm in 256 chars or less (hopefully)

Schönhage–Strassen algorithm in 256 chars or less (hopefully)

Comments
1 min read
Shamir Secret Sharing in 256 characters or less

Shamir Secret Sharing in 256 characters or less

Comments
1 min read
Binary Search: Find It in Half the Time

Binary Search: Find It in Half the Time

Comments
1 min read
A* Algorithm in One Byte

A* Algorithm in One Byte

1
Comments
1 min read
One Byte Explainer : Cluster Computing

One Byte Explainer : Cluster Computing

Comments
1 min read
Assymetric Encryption in 256 characters or less

Assymetric Encryption in 256 characters or less

Comments
1 min read
RFID - low wave radio communications

RFID - low wave radio communications

1
Comments
1 min read
Activation Functions: The Secret Sauce of Neural Networks

Activation Functions: The Secret Sauce of Neural Networks

Comments
1 min read
Data Dynamics: Exploring Information Theory Essentials

Data Dynamics: Exploring Information Theory Essentials

Comments
1 min read
Blockchain

Blockchain

Comments
2 min read
Hashing

Hashing

Comments
1 min read
Lock / Mutex to an 8th grader

Lock / Mutex to an 8th grader

2
Comments
1 min read
Type conversions (Also known as Type Casting) in Python

Type conversions (Also known as Type Casting) in Python

1
Comments
1 min read
If Else In Python

If Else In Python

2
Comments
1 min read
Compiler In One Byte

Compiler In One Byte

Comments 1
1 min read
For Loops in Python

For Loops in Python

1
Comments
2 min read
P=NP? 256 chars

P=NP? 256 chars

Comments
1 min read
Dead lock due to Circular Wait

Dead lock due to Circular Wait

Comments
1 min read
From Chaos to Order: The Art of Hashing in CS

From Chaos to Order: The Art of Hashing in CS

Comments
1 min read
What is a Queue?

What is a Queue?

1
Comments
1 min read
What is a stack?

What is a stack?

Comments
1 min read
The Golden Key of Cloud Computing

The Golden Key of Cloud Computing

Comments
1 min read
Machine Learning: The Crystal Ball of Data

Machine Learning: The Crystal Ball of Data

Comments
1 min read
Understanding Recursion: A Function’s Self-Call

Understanding Recursion: A Function’s Self-Call

Comments
1 min read
What is a Computer Programming Language?

What is a Computer Programming Language?

1
Comments
1 min read
Computer Science Challenge: Algorithm

Computer Science Challenge: Algorithm

Comments
1 min read
Binary Tree

Binary Tree

Comments
1 min read
"this" Keyword in OOP

"this" Keyword in OOP

Comments
1 min read
## Bytes, Bites, and Bodily Functions: A Culinary Analogy for Computer Science

## Bytes, Bites, and Bodily Functions: A Culinary Analogy for Computer Science

1
Comments
1 min read
explanation is "Hash Function in Computer Science."

explanation is "Hash Function in Computer Science."

2
Comments
1 min read
Deadlock : Computer Science challenge

Deadlock : Computer Science challenge

2
Comments
1 min read
Quantum Superposition Explored: Simulation Insights and Code Generation

Quantum Superposition Explored: Simulation Insights and Code Generation

5
Comments
1 min read
Twilio Challenge: Can You Beat Gemini? AI-Powered Game of Tic Tac Toe

Twilio Challenge: Can You Beat Gemini? AI-Powered Game of Tic Tac Toe

10
Comments 2
2 min read
P vs NP Problem

P vs NP Problem

2
Comments
2 min read
AI to the world Care

AI to the world Care

Comments
1 min read
The Halting Problem

The Halting Problem

Comments
1 min read
Networking to a 5th Grader in 256 words.

Networking to a 5th Grader in 256 words.

2
Comments
2 min read
Binary Tree

Binary Tree

1
Comments
1 min read
The stack data structure

The stack data structure

Comments
1 min read
One Byte Explainer - Closures

One Byte Explainer - Closures

1
Comments
1 min read
Understanding Big O Notation with a Library Analogy

Understanding Big O Notation with a Library Analogy

Comments
1 min read
Compilers: The Bridge Between Human and Machine Code

Compilers: The Bridge Between Human and Machine Code

3
Comments
1 min read
One Byte Explainer - Promise

One Byte Explainer - Promise

1
Comments
1 min read
Greedy Algorithms 🎂🍰

Greedy Algorithms 🎂🍰

4
Comments
1 min read
Understanding Algorithms: The Building Blocks of Problem Solving

Understanding Algorithms: The Building Blocks of Problem Solving

Comments
1 min read
Thrashing - One Byte Explainer

Thrashing - One Byte Explainer

9
Comments
1 min read
One Byte Explainer: OOPs

One Byte Explainer: OOPs

6
Comments
1 min read
loading...