본문 바로가기

분류 전체보기

(31)
🐳 List of Things to Be Done * Check the Deadline for Each Test & Interview*Dev-ops(web) /// Base_Database/Network/Operating System/◻︎ Hiring Process (National/Foreign-Branch, International) - Computer Science(AG/DA) / IT-Infra(Data/Cloud)◻︎ Exam - Cryptography, Crime Countmeasure Theory, System, Convergence Security // Graduation◻︎ Freelancer Work (Application/Project-Processing/Test)- Fundamental Learning (Git, Swift/iOS)..
Overall Process 💻 Development - Programming Language - Grammar/Structure/Mechanism (Swift) + Algorithm (Time/Space_Complexity) * What/When/How to Use (Interactive, Implementation and Optimization)- Framework & Environment (Cocoa touch, UIkit, SwiftUI)- Libraries & APIs (JSON/Codable, URLSession/Alamofire)+ Network Protocol (Policy-Setting/Caching)- Debugging & Error Handling- Unit Tests (XCTest) - TDD- Build &..
Hacker Rank_2/54 tests (Easy, Min-Max Sum) While solving basic problems from the beginning, I should also practice summarizing problems written in English.And plan to organize Swift grammar thoroughly starting from the basics.Given five positive integers, find the minimum and maximum values that can be calculated by summing exactly four of the five integers. Then print the respective minimum and maximum values as a single line of two spa..
Hacker Rank_1/54 tests (Easy, Plus Minus) Given an array of integers, calculate the ratios of its elements that are positive, negative, and zero. Print the decimal value of each fraction on a new line with 6 places after the decimal.Note: This challenge introduces precision problems. The test cases are scaled to six decimal places, though answers with absolute errors of up to 10(-4) are acceptable. Examplearr = [1, 1, -1, -1, 0]Results ..
Public key (Asymmetric key) Previous Learning) The Advantages of symmetric keys: The ciphertext size is small, and the process of encryption and decryption is very fast.Then, how can transfer the secret key to the public channel? Asymmetric(Public)-Key Cryptography?  Encryption key is public, decryption key is secret. ▪︎ 단계 1) Public-key Encryption (공개 키 암호)- 암호화/복호화 키 상이 + 암호화 키 공개 가능(비밀 키 공유 필요X) - 인터넷 프로토콜의 초석- 암호화 키를 이..
Moon River from Breakfast at Tiffany’s " data-ke-type="html">HTML 삽입미리보기할 수 없는 소스  Moon river, wider than a mileI'm crossing you in style somedayOh, dream maker, you heart breakerWherever you're goin', I'm goin' your wayTwo drifters, off to see the worldThere's such a lot of world to seeWe're after the same rainbow's endWaitin' 'round the bendMy huckleberry friendMoon river and me  Finishing things that need to be doneDrinking coffee..
Updated_Hacker Rank (Intermediate, Equal) Dynamic ProgrammingDivide complex problems into simpler sub-problems. - Tabulation (Bottom-Up) - Iteration(반복문) : For a large set of inputs  →  Make the results one by one.   - Memoization (Top/Deep-Down): Recursion(재귀함수) : For a small set of inputs  →  Save each result to use next. [Problem Summary]▪︎ Each colleague has some chocolates (The number of chocolates each colleague has initially ▪︎ ..
Gone With The Wind No, my dear, I'm not in love with you, no more than you are with me, and if I were, you would be the last person I'd ever tell. God help the man who ever really loves you. You'd break his heart, my darling, cruel, destructive little cat who is so careless and confident she doesn't even trouble to sheathe her claws.How can't I help loving you? You have all the passion for life that I lack. That k..