Snowflake has one cool function called HASH_AGG which returns a 64 bit signed hash value over the set of inputs column. As the snowflake document itself mentioned, “HASH_AGG is not a cryptographic hash function and should not be used as such”. We can use it to compare whether two columns or sets of columns value are identical or not.
If you have installed Jupyter notebook in your system and still getting an “‘Jupyter-lab’ is not recognized as an internal or external command, operable program or batch file.” then this quick tutorial is for you…
Let’s talk about something new about google hacks today. Did you ever know about google
Google is indeed a buzzword in the world of internet. Today, almost everyone is on the web and Google is the most visited website for searching anything (as google is a search engine). No matter what you’re looking for, you start with a simple search.
The list is a built-in data type. Which store collection of different types of data which can be string, integer, float, date, etc. In this tutorial, we will learn how to create a list, its properties, and the different methods applied to lists.
To identify the processes in the operating system each process is assigned a process identification number(PID). As Operating System supports multiprogramming, it needs to keep track of all processes. Process Control Block is used to track the process execution status.