Skip to main content

Introduction To ReactJS - JavaScript

React JS Intro

React JS Intro
(Image by - Sharma Guides | Subham232330)


What is ReactJS?

* ReactJS is a free and open-source JavaScript library for building user interfaces using a component-based concept.
* ReactJS is also known as React, React Js.
* React is maintained by Facebook.
* ReactJS is not a framework, it is a library.


Examples of ReactJS websites:-

Facebook, Discord, Netflix, Dropbox


Advantages of ReactJS

1. DOM Virtuality
2. Easy Testing
3. SEO Friendly
4. Blazing Fast
5. Efficient Debugging


Prerequisites

HTML
CSS
JavaScript
ES6:- let, const, arrow function, classes, object literals, spread operators.


Comments

Popular posts from this blog

Indexing in DBMS

Indexing in DBMS Indexing is used to optimize the performance of a database by minimizing the number of disk accesses required when a query is processed.  The index is a type of data structure. It is used to locate and access the data in a database table quickly. Index structure: Indexes can be created using some database columns. The first column of the database is the search key that contains a copy of the primary key or candidate key of the table. The values of the primary key are stored in sorted order so that the corresponding data can be accessed easily.  The second column of the database is the data reference. It contains a set of pointers holding the address of the disk block where the value of the particular key can be found. Indexing Methods Ordered indices The indices are usually sorted to make searching faster. The indices which are sorted are known as ordered indices. Example: Suppose we have an employee table with thousands of record and each of which is 10 byte...

SQL Injection

SQL Injection The SQL Injection is a code penetration technique that might cause loss to our database. It is one of the most practiced web hacking techniques to place malicious code in SQL statements, via webpage input. SQL injection can be used to manipulate the application's web server by malicious users. SQL injection generally occurs when we ask a user to input their username/userID. Instead of a name or ID, the user gives us an SQL statement that we will unknowingly run on our database. For Example - we create a SELECT statement by adding a variable "demoUserID" to select a string. The variable will be fetched from user input (getRequestString). demoUserI = getrequestString("UserId"); demoSQL = "SELECT * FROM users WHERE UserId =" +demoUserId; Types of SQL injection attacks SQL injections can do more harm other than passing the login algorithms. Some of the SQL injection attacks include: Updating, deleting, and inserting the data: An attack can mo...

Schedule in DBMS

Schedule A series of operation from one transaction to another transaction is known as schedule. It is used to preserve the order of the operation in each of the individual transaction. 1. Serial Schedule The serial schedule is a type of schedule where one transaction is executed completely before starting another transaction. In the serial schedule, when the first transaction completes its cycle, then the next transaction is executed. For example: Suppose there are two transactions T1 and T2 which have some operations. If it has no interleaving of operations, then there are the following two possible outcomes: Execute all the operations of T1 which was followed by all the operations of T2.  Execute all the operations of T1 which was followed by all the operations of T2.  In the given (a) figure, Schedule A shows the serial schedule where T1 followed by T2. In the given (b) figure, Schedule B shows the serial schedule where T2 followed by T1. 2. Non-serial Schedule If interle...