<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Devansh Tayal</title>
    <description>The latest articles on DEV Community by Devansh Tayal (@devansh2005).</description>
    <link>https://dev.to/devansh2005</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F492535%2F22aa9ea4-c992-4fa3-9d9d-a1c56c4f5e13.png</url>
      <title>DEV Community: Devansh Tayal</title>
      <link>https://dev.to/devansh2005</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/devansh2005"/>
    <language>en</language>
    <item>
      <title>Unveiling the Distinction: Privacy is Not Security</title>
      <dc:creator>Devansh Tayal</dc:creator>
      <pubDate>Mon, 07 Aug 2023 15:34:32 +0000</pubDate>
      <link>https://dev.to/devansh2005/unveiling-the-distinction-privacy-is-not-security-453p</link>
      <guid>https://dev.to/devansh2005/unveiling-the-distinction-privacy-is-not-security-453p</guid>
      <description>&lt;p&gt;In an era where personal information is more valuable than ever, the terms "privacy" and "security" are often used interchangeably. While they are undoubtedly interconnected, it's important to understand that privacy and security are distinct concepts, each with its own set of implications and considerations. In this blog post, we'll delve into the differences between privacy and security and shed light on why one cannot be a substitute for the other.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Cp0fKpAx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/81hx17x1x2yin6ushxsw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Cp0fKpAx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/81hx17x1x2yin6ushxsw.png" alt="Image description" width="790" height="151"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before choosing the right attribute between the Security and Privacy, let us understand the meaning of both with an easy example.  &lt;/p&gt;

&lt;p&gt;Buying the Antivirus gives us the security options like web-plugins, password manager, malicious website blocker etc. Our Security gets improved but our Privacy got drained. We are putting our trust in a third party apps that is scanning every file that is in our storage, every program we download, we open, that app has an eye on all of our activities&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Defining Privacy and Security&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Privacy&lt;/strong&gt; refers to the right of individuals to control their personal information and the extent to which that information is disclosed to others. It involves the management of data in a way that respects an individual's autonomy and ensures that sensitive information is handled with care.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security,&lt;/strong&gt; on the other hand, is the practice of safeguarding data, systems, and assets against various threats, such as unauthorized access, cyberattacks, or physical breaches. Security measures are implemented to prevent, detect, and respond to potential risks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Focus and Scope:&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Privacy&lt;/strong&gt;: Primarily centers around the individual's control over their personal data, including its collection, use, and sharing. &lt;br&gt;
&lt;strong&gt;Security&lt;/strong&gt;: Concerned with protecting data and systems from a wide range of threats and vulnerabilities, both internal and external.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Objectives:&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Privacy&lt;/strong&gt;: Aims to empower individuals with choices regarding their personal information, promoting transparency and consent.&lt;br&gt;
&lt;strong&gt;Security&lt;/strong&gt;: Strives to ensure the confidentiality, integrity, and availability of data, reducing the risk of unauthorized access or data breaches.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Measures:&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Privacy&lt;/strong&gt;: Involves practices such as data minimization, informed consent, and transparency about data handling practices.&lt;br&gt;
&lt;strong&gt;Security&lt;/strong&gt;: Encompasses encryption, access controls, firewalls, intrusion detection systems, and incident response plans.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Impact:&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Privacy&lt;/strong&gt;: Affects individuals' trust, autonomy, and perception of how their information is treated by organizations.&lt;br&gt;
&lt;strong&gt;Security&lt;/strong&gt;: Mitigates risks and prevents potential damages, maintaining the stability and operations of systems and data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why Privacy is Not Security&lt;/strong&gt;&lt;br&gt;
While privacy and security are intertwined, they address different dimensions of data protection. Focusing solely on security measures does not necessarily guarantee privacy, and vice versa. Consider a scenario where a company implements robust security protocols to safeguard customer data. While these measures protect against external threats, they may not address concerns about how the company uses or shares the collected data with third parties, affecting the privacy aspect.&lt;/p&gt;

&lt;p&gt;Moreover, breaches of privacy can occur even in the absence of security breaches. An organization might misuse or mishandle personal data without any external attack on its systems. Conversely, a security breach may involve unauthorized access to systems without necessarily exposing private information if data is encrypted.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Striking the Balance&lt;/strong&gt;&lt;br&gt;
The key lies in striking a balance between privacy and security. Organizations should adopt comprehensive strategies that encompass both aspects. Effective privacy practices enhance an individual's trust in the organization's security measures, while robust security measures provide a foundation for maintaining privacy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;br&gt;
Now, want to be Secure or Private? &lt;br&gt;
From my perspective, it is not possible to move with either Security or Privacy. It is very much important to have Security as well as Privacy measures at the same time in the 21st century.&lt;br&gt;
We can achieve security without Privacy but privacy cannot be achieved without Security&lt;/p&gt;

</description>
    </item>
    <item>
      <title>To let the beginners know their career goals who have opted data science.</title>
      <dc:creator>Devansh Tayal</dc:creator>
      <pubDate>Wed, 18 Aug 2021 07:31:44 +0000</pubDate>
      <link>https://dev.to/devansh2005/to-let-the-beginners-know-their-career-goals-who-have-opted-data-science-88j</link>
      <guid>https://dev.to/devansh2005/to-let-the-beginners-know-their-career-goals-who-have-opted-data-science-88j</guid>
      <description>&lt;h1&gt;
  
  
  Data Science : To be the known, loving, trending Keyword among the student nowadays. Yes, before understanding it as a job or career, it is opted by many students.
&lt;/h1&gt;

&lt;h3&gt;
  
  
  Data Science was the best job and was on position no. 1 from 2016-2019. But due to falling crises it has been ranked 3rd by America in 2020 with the medium salary of $118,370 per annum. Data Science is the vastly growing field and provides large number of opportunities to number of peoples.[1]
&lt;/h3&gt;

&lt;h1&gt;
  
  
  Career Opportunities in Data Science[2]
&lt;/h1&gt;

&lt;h3&gt;
  
  
  There are many roles in the field of Data Science
&lt;/h3&gt;

&lt;p&gt;To start with the clear learning in Data Science one should know what to learn to get the perfect role in the industry. Let’s understand with your skills and interest in which data science role you are perfect in or you need to be perfect.&lt;br&gt;
Skills are marked with numbers from 1-10 as their codes Programming - &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Programming        -  “1”&lt;/li&gt;
&lt;li&gt;Business Intelligence – “2”&lt;/li&gt;
&lt;li&gt;Database Management – “3”&lt;/li&gt;
&lt;li&gt;Statistics                - “4”&lt;/li&gt;
&lt;li&gt;Data Wrangling        -“5”&lt;/li&gt;
&lt;li&gt;Machine Learning      -“6”&lt;/li&gt;
&lt;li&gt;Deep Learning         -“7”&lt;/li&gt;
&lt;li&gt;Mathematics and Linear Algebra-“8”&lt;/li&gt;
&lt;li&gt;Cloud             -“9”&lt;/li&gt;
&lt;li&gt;Big Data              -“10”&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Roles Skills
&lt;/h1&gt;

&lt;h2&gt;
  
  
  1. Data Analyst
&lt;/h2&gt;

&lt;p&gt;i) Advance- 1, 2, 5&lt;br&gt;
ii) Basic - 3, 4, 6, 8, 10&lt;/p&gt;

&lt;h1&gt;
  
  
  2. Data Administrator
&lt;/h1&gt;

&lt;p&gt;i) Advance- 1, 3, 5&lt;br&gt;
ii) Basic - 9&lt;/p&gt;

&lt;h1&gt;
  
  
  3. ML: Engineer
&lt;/h1&gt;

&lt;p&gt;i) Advance- 1 , 2, 5&lt;br&gt;
ii) Basic - 3, 4, 6, 8, 10&lt;/p&gt;

&lt;h1&gt;
  
  
  4. BI Developer
&lt;/h1&gt;

&lt;p&gt;i) Advance- 1 , 4, 5&lt;br&gt;
ii) Basic - 3&lt;/p&gt;

&lt;h1&gt;
  
  
  5. Data Engineer
&lt;/h1&gt;

&lt;p&gt;i) Advance- 1, 3, 4, 5, 10&lt;br&gt;
ii) Basic - 2, 6, 7&lt;/p&gt;

&lt;h1&gt;
  
  
  6. Data Scientist
&lt;/h1&gt;

&lt;p&gt;i) Advance- 1, 2, 3, 4, 5, 6, 7,8&lt;br&gt;
ii) Basic - 9, 10&lt;/p&gt;

&lt;h1&gt;
  
  
  7. Data Architect
&lt;/h1&gt;

&lt;p&gt;i) Advance- 1, 3, 4, 6, 7, 8, 10&lt;br&gt;
ii) Basic - 9&lt;/p&gt;

&lt;h5&gt;
  
  
  I personally suggest all the starting learners to have a knowledge in R/Python. Both the languages are the good source of inbuilt statistics and many data science libraries. Follow someone who has already passed the path you are going to pass. This will help you to learn in a smarter way. May be you will not do the same mistake your mentor has done.
&lt;/h5&gt;

&lt;h3&gt;
  
  
  -As told to a coder, be consistent and don’t loose hope.
&lt;/h3&gt;

&lt;h3&gt;
  
  
  -Not all businessman rides in Mercedes.
&lt;/h3&gt;

&lt;h3&gt;
  
  
  -Good luck Scientists !
&lt;/h3&gt;

&lt;h1&gt;
  
  
  References
&lt;/h1&gt;

&lt;p&gt;[1] “Data Scientist Salary Guide - Master’s in Data Science.” &lt;a href="https://www.mastersindatascience.org/resources/data-scientist-salary-guide/"&gt;https://www.mastersindatascience.org/resources/data-scientist-salary-guide/&lt;/a&gt; (accessed Jun. 02, 2020).&lt;br&gt;
[2] “Top 9 Job Roles in the World of Data Science for 2020.” &lt;a href="https://www.mygreatlearning.com/blog/different-data-science-jobs-roles-industry/"&gt;https://www.mygreatlearning.com/blog/different-data-science-jobs-roles-industry/&lt;/a&gt; (accessed Jun. 02, 2020).&lt;/p&gt;

</description>
      <category>datascience</category>
      <category>machinelearning</category>
      <category>bigdata</category>
      <category>cloud</category>
    </item>
    <item>
      <title>Command Prompt Tricks</title>
      <dc:creator>Devansh Tayal</dc:creator>
      <pubDate>Thu, 29 Apr 2021 02:56:28 +0000</pubDate>
      <link>https://dev.to/devansh2005/command-prompt-tricks-1jg5</link>
      <guid>https://dev.to/devansh2005/command-prompt-tricks-1jg5</guid>
      <description>&lt;h1&gt;
  
  
  You can change color using the following command in cmd.
&lt;/h1&gt;

&lt;p&gt;color color-code&lt;/p&gt;

&lt;h1&gt;
  
  
  The following command will give you a list of all the colors you can use in cmd:
&lt;/h1&gt;

&lt;p&gt;help color&lt;/p&gt;

&lt;h1&gt;
  
  
  The following command will change the color of the terminal:
&lt;/h1&gt;

&lt;p&gt;color 04&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--cnjAE6jM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lt2sd21yttffnehrbs5e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--cnjAE6jM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lt2sd21yttffnehrbs5e.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  You can change the prompt text in the cmd using the following command:
&lt;/h1&gt;

&lt;p&gt;prompt devansh@cmd$G&lt;/p&gt;

&lt;p&gt;here $G is a special character for the '&amp;gt;' symbol&lt;/p&gt;

&lt;h1&gt;
  
  
  Change Title in CMD
&lt;/h1&gt;

&lt;p&gt;If you want to change the title in cmd, you can simply use the title command followed by the title. Following title command will change the cmd title to "Hacking in progress...":&lt;/p&gt;

&lt;p&gt;title Changing in progress...&lt;/p&gt;

&lt;h1&gt;
  
  
  Watch star wars movie in CMD
&lt;/h1&gt;

&lt;p&gt;Do you know that you can watch star wars movies in the cmd? Well if you don't, you need to fire the following command and you should be welcomed with the star wars movie:&lt;br&gt;
telnet towel.blinkenlights.nl&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Tgv1zYZK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/d64wx3h1s1qppli8pi89.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Tgv1zYZK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/d64wx3h1s1qppli8pi89.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If telnet doesn't work, make sure you turn it on by going into the Windows Features and clicking telnet!&lt;br&gt;
Start&amp;gt;Turn windows features on and off&amp;gt;Check telnetHide your folders using CMD&lt;/p&gt;

&lt;h1&gt;
  
  
  Hide a Folder
&lt;/h1&gt;

&lt;p&gt;If you want to hide a folder named "devansh" in a directory, you can use the following command:&lt;/p&gt;

&lt;p&gt;Attrib +h +s +r devansh &lt;/p&gt;

&lt;p&gt;Once your folder is hidden, you can show it again by firing the following command:&lt;/p&gt;

&lt;p&gt;Attrib -h -s -r devansh&lt;/p&gt;

&lt;h1&gt;
  
  
  Create a Folder with reserved names (Like aux, con, etc.)
&lt;/h1&gt;

&lt;p&gt;Do you know that you cannot create a folder named aux or con in windows? &lt;/p&gt;

&lt;p&gt;These are the reserved names that windows use for internal purposes.&lt;br&gt;
You can still create a folder named con or aux by firing the following command in cmd:&lt;/p&gt;

&lt;p&gt;md con\&lt;br&gt;
md aux\ &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--MeEmlhfu--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ajaait2josqczox3kwg2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MeEmlhfu--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ajaait2josqczox3kwg2.png" alt="image"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  View all the installed programs on your PC
&lt;/h1&gt;

&lt;p&gt;You can view all the installed programs on your pc by firing the following command:&lt;/p&gt;

&lt;p&gt;wmic product get name&lt;/p&gt;

&lt;h1&gt;
  
  
  If you know some other trick, feel free to share it. Have fun!
&lt;/h1&gt;

</description>
    </item>
    <item>
      <title>DSA</title>
      <dc:creator>Devansh Tayal</dc:creator>
      <pubDate>Tue, 27 Apr 2021 09:01:39 +0000</pubDate>
      <link>https://dev.to/devansh2005/dsa-1352</link>
      <guid>https://dev.to/devansh2005/dsa-1352</guid>
      <description>&lt;h1&gt;
  
  
  What is the worst-case time complexity of the following algorithm to delete the node from the list?
&lt;/h1&gt;

&lt;p&gt;// Find next node using next pointer&lt;br&gt;
struct node *temp = node_ptr-&amp;gt;next;&lt;br&gt;
// Copy data of next node to this node&lt;br&gt;
node_ptr-&amp;gt;data = temp-&amp;gt;data;&lt;br&gt;
// Unlink next node&lt;br&gt;
node_ptr-&amp;gt;next = temp-&amp;gt;next;&lt;br&gt;
// Delete next node&lt;br&gt;
free(temp);&lt;/p&gt;

&lt;p&gt;a) O(n)&lt;br&gt;
b) O(log2 n)&lt;br&gt;
c) O(logn)&lt;br&gt;
d) O(1)&lt;/p&gt;

&lt;p&gt;(d)&lt;br&gt;
Explanation: It is a Fast solution to delete a particular node from the linked list is to copy the data from the next node to the node to be deleted and delete the next node.Time complexity of this approach is O(1).&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Btech percentage doesn't matter is a myth. Let me explain with 3 reasons!
</title>
      <dc:creator>Devansh Tayal</dc:creator>
      <pubDate>Sun, 28 Feb 2021 14:29:22 +0000</pubDate>
      <link>https://dev.to/devansh2005/btech-percentage-doesn-t-matter-is-a-myth-let-me-explain-with-3-reasons-4o9d</link>
      <guid>https://dev.to/devansh2005/btech-percentage-doesn-t-matter-is-a-myth-let-me-explain-with-3-reasons-4o9d</guid>
      <description>&lt;p&gt;Let's say 2 students, Ram and Shyam go for placements, Ram has 86% and Shyam has 65%. (#Reason1 if you don't have at least 65% you won't be able to appear even for written)&lt;/p&gt;

&lt;p&gt;Ram-Shyam both clear written and reach the interview round, whom will the interviewer appreciate more? (#Reason2 higher percentage gives you edge in interviews)&lt;/p&gt;

&lt;p&gt;Shyam's low percentage will not matter only if he has a solid coding profile (Codechef, Codeforces etc) or he has a solid dev profile (GitHUB, Full Stack).&lt;/p&gt;

&lt;p&gt;Or if Shyam is able to give satisfactory explanation when interviews asks why he has low percentage?&lt;/p&gt;

&lt;p&gt;Net net, in on-campus you can get selected with low percentages as well but having higher grade will not harm either!&lt;/p&gt;

&lt;p&gt;Reason3 &lt;/p&gt;

&lt;p&gt;For off campus, surely percentage is a key criteria for companies to shortlist/prioritize among thousands of applicants.&lt;/p&gt;

&lt;p&gt;I know its not a perfect criteria, but it is not going to change at least by the time you appear for placements. So morals are good but you need to be practical as well.&lt;/p&gt;

&lt;p&gt;Let me know what you think&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Output for this Python code</title>
      <dc:creator>Devansh Tayal</dc:creator>
      <pubDate>Thu, 03 Dec 2020 16:50:00 +0000</pubDate>
      <link>https://dev.to/devansh2005/output-for-this-python-code-ecp</link>
      <guid>https://dev.to/devansh2005/output-for-this-python-code-ecp</guid>
      <description>&lt;p&gt;Underscores in numbers....&lt;/p&gt;

&lt;p&gt;bigger_number= 14_000_000_000&lt;/p&gt;

&lt;p&gt;1-&amp;gt; print(bigger_number)&lt;br&gt;
2-&amp;gt; print (type(bigger_number))&lt;/p&gt;

</description>
      <category>python</category>
      <category>variables</category>
      <category>output</category>
    </item>
    <item>
      <title>GITHUNT</title>
      <dc:creator>Devansh Tayal</dc:creator>
      <pubDate>Wed, 18 Nov 2020 08:07:07 +0000</pubDate>
      <link>https://dev.to/devansh2005/githunt-bip</link>
      <guid>https://dev.to/devansh2005/githunt-bip</guid>
      <description>&lt;p&gt;One of the favorite chrome extension for those who love to contribute to open source. It gives the repositories which are most starred and loved by the open source contributors. &lt;/p&gt;

&lt;p&gt;We can filter the projects by the indulge language and time. &lt;br&gt;
Come on lets use this extension together contributors.&lt;/p&gt;

</description>
      <category>github</category>
      <category>githunt</category>
      <category>chromeextension</category>
      <category>opensource</category>
    </item>
    <item>
      <title>Beginners Program</title>
      <dc:creator>Devansh Tayal</dc:creator>
      <pubDate>Wed, 21 Oct 2020 10:28:55 +0000</pubDate>
      <link>https://dev.to/devansh2005/beginners-program-20ll</link>
      <guid>https://dev.to/devansh2005/beginners-program-20ll</guid>
      <description>&lt;p&gt;If you are an absolute beginner, learning basic language only.&lt;/p&gt;

&lt;p&gt;A list of questions that you can follow for starting coding, (hackerrank).&lt;/p&gt;

&lt;p&gt;C++ : &lt;a href="https://www.hackerrank.com/domains/cpp"&gt;https://www.hackerrank.com/domains/cpp&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;JAVA : &lt;a href="https://www.hackerrank.com/domains/java"&gt;https://www.hackerrank.com/domains/java&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Python : &lt;a href="https://www.hackerrank.com/domains/python"&gt;https://www.hackerrank.com/domains/python&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Data Structures : &lt;a href="https://www.hackerrank.com/domains/data-structures"&gt;https://www.hackerrank.com/domains/data-structures&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Algorithms : &lt;a href="https://www.hackerrank.com/domains/algorithms"&gt;https://www.hackerrank.com/domains/algorithms&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I find these most helpful for beginners, if you have done this level. You must practice on Leetcode.&lt;/p&gt;

&lt;p&gt;Go to this link, select different topics and difficulty level : &lt;a href="https://leetcode.com/problemset/all/?topicSlugs=array&amp;amp;difficulty=Easy"&gt;https://leetcode.com/problemset/all/?topicSlugs=array&amp;amp;difficulty=Easy&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Something for open source
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;Everyone has heard of Gsoc when it comes to open source. To be true it's not easy if you are really a beginner. But the another program "Hacktoberfest" , the yearly event of october where one can participate who is really a beginner. If even learning the git/github or like how to make contributions you can sign-up for the program. It gives swags too which might be a motivation for a beginner.&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>beginners</category>
      <category>hacktoberfest</category>
      <category>hackerrank</category>
      <category>opensource</category>
    </item>
    <item>
      <title>Hacktoberfest 2020</title>
      <dc:creator>Devansh Tayal</dc:creator>
      <pubDate>Sat, 17 Oct 2020 07:55:24 +0000</pubDate>
      <link>https://dev.to/devansh2005/hacktoberfest-2020-59d6</link>
      <guid>https://dev.to/devansh2005/hacktoberfest-2020-59d6</guid>
      <description>&lt;h2&gt;
  
  
  What I Learned From Hacktoberfest
&lt;/h2&gt;

&lt;p&gt;Its not necessary to have knowledge of everything when you work in open source. I learn when I work. I bring the bottom-up approach to contribute. Well, I reviewed the code for cpython and was a contributor to Python Turtle(the learning platform for python). Moreover I found the community really responsive and helpful. The guys with great status are communicating and  were helpful to me. I learn a lot from them. &lt;/p&gt;

</description>
      <category>hacktoberfest</category>
    </item>
  </channel>
</rss>
