From fda56a5d302456eb36c9d3748a0094c38fe4a01b Mon Sep 17 00:00:00 2001 From: Kamran Ahmed <kamranahmed.se@gmail.com> Date: Thu, 13 Mar 2025 11:48:33 +0000 Subject: [PATCH] Remove geeksforgeeks links --- src/data/guides/java-vs-javascript.md | 2 +- .../computer-science/content/base@q3nRhTYS5wg9tYnQe2sCF.md | 4 ---- .../computer-science/content/dcl@4bUmfuP2qgcli8I2Vm9zh.md | 3 +-- .../content/scheduling-algorithms@Ge2nagN86ofa2y-yYR1lv.md | 7 ------- .../content/dns-poisoning@urtsyYWViEzbqYLoNfQAh.md | 1 - .../content/loopback@W_oloLu2Euz5zRSy7v_T8.md | 1 - .../content/networking-knowledge@gSLr-Lc119eX9Ig-kDzJ2.md | 1 - .../content/operating-systems@UY6xdt_V3YMkZxZ1hZLvW.md | 1 - .../content/port-blocking@W7bcydXdwlubXF2PHKOuq.md | 6 +----- .../content/protocol-analyzers@K05mEAsjImyPge0hDtsU0.md | 1 - .../cyber-security/content/route@xFuWk7M-Vctk_xb7bHbWs.md | 6 +----- .../cyber-security/content/star@P0ZhAXd_H-mTOMr13Ag31.md | 1 - .../content/understand-handshakes@zQx_VUS1zRmF4zCGjJD5-.md | 1 - .../types-of-data-analytics@Lsapbmg-eMIYJAHpV97nO.md | 1 - .../101-importance-of-datastructures.md | 1 - .../content/105-sorting-algorithms/105-heap-sort.md | 1 - .../content/106-search-algorithms/100-linear-search.md | 1 - .../content/107-tree-data-structure/102-avl-trees.md | 1 - .../content/107-tree-data-structure/103-b-trees.md | 1 - .../110-complex-data-structures/100-b-bplus-trees.md | 2 -- .../content/110-complex-data-structures/101-skip-list.md | 1 - .../content/110-complex-data-structures/102-isam.md | 1 - .../112-problem-solving-techniques/101-backtracking.md | 1 - .../102-greedy-algorithms.md | 1 - .../103-randomised-algorithms.md | 1 - .../104-divide-and-conquer.md | 1 - .../112-problem-solving-techniques/105-recursion.md | 1 - .../106-dynamic-programming.md | 1 - .../107-two-pointer-techniques.md | 1 - .../108-sliding-window-technique.md | 1 - .../docker/content/104-data-persistence/102-bind-mounts.md | 1 - .../artificial-neural-network@AoH2r4EOHyZd8YaV24rBk.md | 1 - .../content/computer-graphics@lIb5MeDoqVj6HycveOgTS.md | 1 - .../game-developer/content/mcts@QD9TfZn3yhGPVwiyJ6d0V.md | 1 - .../content/collaborators@r-u1vTpUyuvsB0revOU0C.md | 1 - .../javascript/content/block@uqEzHYx13Y2EpvTTRzykn.md | 3 +-- .../content/relational-model@mDVbjdVN0spY7dI_8k1YW.md | 3 +-- .../roadmaps/python/content/loops@Dvy7BnNzK55qbh_SgOk8m.md | 1 - .../roadmaps/redis/content/lists@4-C4XqACUp4nvcMIj6djF.md | 3 +-- .../redis/content/pipelining@LHlwjN3WHYUBUafzzwsWQ.md | 3 +-- .../important-skills-to-learn@lBtlDFPEQvQ_xtLtehU0S.md | 4 ---- .../levels-of-architecture@2sR4KULvAUUoOtopvsEBs.md | 4 ---- .../content/tcpip-model@UCCT7-E_QUKPg3jAsjobx.md | 1 - .../content/tools@SuMhTyaBS9vwASxAt39DH.md | 4 ---- .../content/hybrid-types@lvtTSHH9yBTCiLng8btnI.md | 4 ---- .../vue/content/binding-events@b7iXwtUnELg_ShbCyTrNA.md | 3 +-- 46 files changed, 9 insertions(+), 82 deletions(-) diff --git a/src/data/guides/java-vs-javascript.md b/src/data/guides/java-vs-javascript.md index e94a1b129..a36c72aa3 100644 --- a/src/data/guides/java-vs-javascript.md +++ b/src/data/guides/java-vs-javascript.md @@ -68,7 +68,7 @@ Usually saved in a .js file extension, this code will show **"Sign up on roadmap ### Java vs. JavaScript: Execution and runtime -Java is often used for server-side programming. It is a compiled language that requires a [Java Virtual Machine](https://www.geeksforgeeks.org/jvm-works-jvm-architecture/) **(JVM)** to run Java code. Before running your code, it's compiled into bytecode, a platform-independent format. The JVM then executes the bytecode to ensure that Java programs run on any system with JVM installed. It makes Java a good choice for large-scale applications that run on any operating system. These operating systems include Windows, macOS, Linux, and mobile devices. +Java is often used for server-side programming. It is a compiled language that requires a Java Virtual Machine **(JVM)** to run Java code. Before running your code, it's compiled into bytecode, a platform-independent format. The JVM then executes the bytecode to ensure that Java programs run on any system with JVM installed. It makes Java a good choice for large-scale applications that run on any operating system. These operating systems include Windows, macOS, Linux, and mobile devices.  diff --git a/src/data/roadmaps/computer-science/content/base@q3nRhTYS5wg9tYnQe2sCF.md b/src/data/roadmaps/computer-science/content/base@q3nRhTYS5wg9tYnQe2sCF.md index a5f7178d3..2ebe4eed3 100644 --- a/src/data/roadmaps/computer-science/content/base@q3nRhTYS5wg9tYnQe2sCF.md +++ b/src/data/roadmaps/computer-science/content/base@q3nRhTYS5wg9tYnQe2sCF.md @@ -5,7 +5,3 @@ The rise in popularity of NoSQL databases provided a flexible and fluidity with - **B**asically **A**vailable - **S**oft state - **E**ventual consistency - -Visit the following resources to learn more: - -- [@article@BASE Model vs. ACID Model](https://www.geeksforgeeks.org/acid-model-vs-base-model-for-database/) \ No newline at end of file diff --git a/src/data/roadmaps/computer-science/content/dcl@4bUmfuP2qgcli8I2Vm9zh.md b/src/data/roadmaps/computer-science/content/dcl@4bUmfuP2qgcli8I2Vm9zh.md index dcc4deecc..14a994f6f 100644 --- a/src/data/roadmaps/computer-science/content/dcl@4bUmfuP2qgcli8I2Vm9zh.md +++ b/src/data/roadmaps/computer-science/content/dcl@4bUmfuP2qgcli8I2Vm9zh.md @@ -4,5 +4,4 @@ DCL includes commands such as GRANT and REVOKE which mainly deal with the rights Visit the following resources to learn more: -- [@article@DCL](https://en.wikipedia.org/wiki/Data_Control_Language) -- [@article@DCL Commands](https://www.geeksforgeeks.org/sql-ddl-dql-dml-dcl-tcl-commands/) \ No newline at end of file +- [@article@DCL](https://en.wikipedia.org/wiki/Data_Control_Language) \ No newline at end of file diff --git a/src/data/roadmaps/computer-science/content/scheduling-algorithms@Ge2nagN86ofa2y-yYR1lv.md b/src/data/roadmaps/computer-science/content/scheduling-algorithms@Ge2nagN86ofa2y-yYR1lv.md index 59cae801a..35a026358 100644 --- a/src/data/roadmaps/computer-science/content/scheduling-algorithms@Ge2nagN86ofa2y-yYR1lv.md +++ b/src/data/roadmaps/computer-science/content/scheduling-algorithms@Ge2nagN86ofa2y-yYR1lv.md @@ -13,10 +13,3 @@ Here is the list of some of the most commonly used scheduling algorithms: - **Multi-level Feedback Queue Scheduling:** The processes are divided into different queues based on their priority. The process with the highest priority is allocated the CPU first. If a process is preempted, it is moved to the next queue. It is a preemptive algorithm. - **Highest Response Ratio Next(HRRN):** CPU is allotted to the next process which has the highest response ratio and not to the process having less burst time. It is a Non-Preemptive algorithm. - **Lottery Scheduling:** The process is allocated the CPU based on a lottery system. It is a preemptive algorithm. - -Visit the following resources to learn more - -- [@video@Introduction to CPU Scheduling](https://youtu.be/EWkQl0n0w5M?si=Lb-PxN_t-rDfn4JL) -- [@article@CPU Scheduling in Operating Systems - geeksforgeeks](https://www.geeksforgeeks.org/cpu-scheduling-in-operating-systems/) -- [@article@Lottery Scheduling for Operating Systems - geeksforgeeks](https://www.geeksforgeeks.org/lottery-process-scheduling-in-operating-system/) -- [@article@Program for Round Robin Scheduling for the same Arrival time - geeksforgeeks](https://www.geeksforgeeks.org/program-for-round-robin-scheduling-for-the-same-arrival-time/) diff --git a/src/data/roadmaps/cyber-security/content/dns-poisoning@urtsyYWViEzbqYLoNfQAh.md b/src/data/roadmaps/cyber-security/content/dns-poisoning@urtsyYWViEzbqYLoNfQAh.md index 11996189a..f46313fe9 100644 --- a/src/data/roadmaps/cyber-security/content/dns-poisoning@urtsyYWViEzbqYLoNfQAh.md +++ b/src/data/roadmaps/cyber-security/content/dns-poisoning@urtsyYWViEzbqYLoNfQAh.md @@ -7,5 +7,4 @@ Visit the following resources to learn more: - [@article@What is DNS cache poisoning? | DNS spoofing](https://www.cloudflare.com/learning/dns/dns-cache-poisoning/) - [@article@What Is DNS Poisoning?](https://www.fortinet.com/resources/cyberglossary/dns-poisoning) -- [@article@DNS Spoofing or DNS Cache poisoning](https://www.geeksforgeeks.org/dns-spoofing-or-dns-cache-poisoning/) - [@article@DNS Poisoning (DNS Spoofing): Definition, Technique & Defense](https://www.okta.com/identity-101/dns-poisoning/) diff --git a/src/data/roadmaps/cyber-security/content/loopback@W_oloLu2Euz5zRSy7v_T8.md b/src/data/roadmaps/cyber-security/content/loopback@W_oloLu2Euz5zRSy7v_T8.md index f2a2d223d..0402b583c 100644 --- a/src/data/roadmaps/cyber-security/content/loopback@W_oloLu2Euz5zRSy7v_T8.md +++ b/src/data/roadmaps/cyber-security/content/loopback@W_oloLu2Euz5zRSy7v_T8.md @@ -4,5 +4,4 @@ Learn more from the following resources: -- [@article@What is a loopback address?](https://www.geeksforgeeks.org/what-is-a-loopback-address/) - [@article@Understanding the loopback address and loopback interfaces](https://study-ccna.com/loopback-interface-loopback-address/) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/networking-knowledge@gSLr-Lc119eX9Ig-kDzJ2.md b/src/data/roadmaps/cyber-security/content/networking-knowledge@gSLr-Lc119eX9Ig-kDzJ2.md index 6501cf92e..a8f0e407a 100644 --- a/src/data/roadmaps/cyber-security/content/networking-knowledge@gSLr-Lc119eX9Ig-kDzJ2.md +++ b/src/data/roadmaps/cyber-security/content/networking-knowledge@gSLr-Lc119eX9Ig-kDzJ2.md @@ -14,4 +14,3 @@ This knowledge is essential for designing, implementing, and maintaining effecti Learn more from the following resources: - [@article@What are Network Protocols?](https://www.solarwinds.com/resources/it-glossary/network-protocols) -- [@article@Types of Network Topology](https://www.geeksforgeeks.org/types-of-network-topology/) diff --git a/src/data/roadmaps/cyber-security/content/operating-systems@UY6xdt_V3YMkZxZ1hZLvW.md b/src/data/roadmaps/cyber-security/content/operating-systems@UY6xdt_V3YMkZxZ1hZLvW.md index bef60333e..841e99ef7 100644 --- a/src/data/roadmaps/cyber-security/content/operating-systems@UY6xdt_V3YMkZxZ1hZLvW.md +++ b/src/data/roadmaps/cyber-security/content/operating-systems@UY6xdt_V3YMkZxZ1hZLvW.md @@ -4,5 +4,4 @@ Learn more from the following resources: -- [@article@What is an operating system?](https://www.geeksforgeeks.org/what-is-an-operating-system/) - [@video@What is an operating system as fast as possible](https://www.youtube.com/watch?v=pVzRTmdd9j0) diff --git a/src/data/roadmaps/cyber-security/content/port-blocking@W7bcydXdwlubXF2PHKOuq.md b/src/data/roadmaps/cyber-security/content/port-blocking@W7bcydXdwlubXF2PHKOuq.md index 9d8c58403..687cc4b5d 100644 --- a/src/data/roadmaps/cyber-security/content/port-blocking@W7bcydXdwlubXF2PHKOuq.md +++ b/src/data/roadmaps/cyber-security/content/port-blocking@W7bcydXdwlubXF2PHKOuq.md @@ -1,7 +1,3 @@ # Port Blocking -Port blocking is an essential practice in hardening the security of your network and devices. It involves restricting, filtering, or entirely denying access to specific network ports to minimize exposure to potential cyber threats. By limiting access to certain ports, you can effectively safeguard your systems against unauthorized access and reduce the likelihood of security breaches. - -Learn more from the following resources: - -- [@article@What is port blocking with LAN?](https://www.geeksforgeeks.org/what-is-port-blocking-within-lan/) +Port blocking is an essential practice in hardening the security of your network and devices. It involves restricting, filtering, or entirely denying access to specific network ports to minimize exposure to potential cyber threats. By limiting access to certain ports, you can effectively safeguard your systems against unauthorized access and reduce the likelihood of security breaches. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/protocol-analyzers@K05mEAsjImyPge0hDtsU0.md b/src/data/roadmaps/cyber-security/content/protocol-analyzers@K05mEAsjImyPge0hDtsU0.md index 76fd6dde5..104ad38c6 100644 --- a/src/data/roadmaps/cyber-security/content/protocol-analyzers@K05mEAsjImyPge0hDtsU0.md +++ b/src/data/roadmaps/cyber-security/content/protocol-analyzers@K05mEAsjImyPge0hDtsU0.md @@ -4,5 +4,4 @@ Learn more from the following resources: -- [@article@What is a protocol analyzer?](https://www.geeksforgeeks.org/what-is-protocol-analyzer/) - [@video@Protocol Analyzers](https://www.youtube.com/watch?v=hTMhlB-o0Ow) diff --git a/src/data/roadmaps/cyber-security/content/route@xFuWk7M-Vctk_xb7bHbWs.md b/src/data/roadmaps/cyber-security/content/route@xFuWk7M-Vctk_xb7bHbWs.md index a32397be9..93eabb5af 100644 --- a/src/data/roadmaps/cyber-security/content/route@xFuWk7M-Vctk_xb7bHbWs.md +++ b/src/data/roadmaps/cyber-security/content/route@xFuWk7M-Vctk_xb7bHbWs.md @@ -1,7 +1,3 @@ # route -The `route` command is a network utility used to view and manipulate the IP routing table on Unix-like and Windows systems. It allows users to display the current routes that data packets take, as well as add, modify, or delete routes for network traffic. This command is often used in network troubleshooting and configuration to control how data flows between different networks and subnets. By specifying routes manually, administrators can define specific paths for network traffic, bypassing default routes and optimizing performance or security. - -Learn more from the following resources: - -- [@article@How to check the routing table in Linux](https://www.geeksforgeeks.org/route-command-in-linux-with-examples/) +The `route` command is a network utility used to view and manipulate the IP routing table on Unix-like and Windows systems. It allows users to display the current routes that data packets take, as well as add, modify, or delete routes for network traffic. This command is often used in network troubleshooting and configuration to control how data flows between different networks and subnets. By specifying routes manually, administrators can define specific paths for network traffic, bypassing default routes and optimizing performance or security. \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/star@P0ZhAXd_H-mTOMr13Ag31.md b/src/data/roadmaps/cyber-security/content/star@P0ZhAXd_H-mTOMr13Ag31.md index 5c4e49bdc..00d43bda1 100644 --- a/src/data/roadmaps/cyber-security/content/star@P0ZhAXd_H-mTOMr13Ag31.md +++ b/src/data/roadmaps/cyber-security/content/star@P0ZhAXd_H-mTOMr13Ag31.md @@ -4,5 +4,4 @@ A star network topology is a configuration where all devices (nodes) are connect Learn more from the following resources: -- [@article@Advantages and Disadvantages of Star Topology](https://www.geeksforgeeks.org/advantages-and-disadvantages-of-star-topology/) - [@video@Star Topology](https://www.youtube.com/watch?v=EQ3rW22-Py0) \ No newline at end of file diff --git a/src/data/roadmaps/cyber-security/content/understand-handshakes@zQx_VUS1zRmF4zCGjJD5-.md b/src/data/roadmaps/cyber-security/content/understand-handshakes@zQx_VUS1zRmF4zCGjJD5-.md index 39e4612fa..e6abc4328 100644 --- a/src/data/roadmaps/cyber-security/content/understand-handshakes@zQx_VUS1zRmF4zCGjJD5-.md +++ b/src/data/roadmaps/cyber-security/content/understand-handshakes@zQx_VUS1zRmF4zCGjJD5-.md @@ -4,5 +4,4 @@ In networking and cybersecurity, a handshake is a process of establishing a secu Learn more from the following resources: -- [@article@TCP 3-Way Handshake Process](https://www.geeksforgeeks.org/tcp-3-way-handshake-process/) - [@video@TLS Handshake Explained](https://www.youtube.com/watch?v=86cQJ0MMses) \ No newline at end of file diff --git a/src/data/roadmaps/data-analyst/content/types-of-data-analytics@Lsapbmg-eMIYJAHpV97nO.md b/src/data/roadmaps/data-analyst/content/types-of-data-analytics@Lsapbmg-eMIYJAHpV97nO.md index 87792656b..3e6069cb6 100644 --- a/src/data/roadmaps/data-analyst/content/types-of-data-analytics@Lsapbmg-eMIYJAHpV97nO.md +++ b/src/data/roadmaps/data-analyst/content/types-of-data-analytics@Lsapbmg-eMIYJAHpV97nO.md @@ -11,7 +11,6 @@ Data Analysts, as ambassadors of this domain, employ these types, to answer vari Visit the following resources to learn more: -- [@article@Data Analytics and its type](https://www.geeksforgeeks.org/data-analytics-and-its-type/) - [@article@The 4 Types of Data Analysis: Ultimate Guide](https://careerfoundry.com/en/blog/data-analytics/different-types-of-data-analysis/) - [@video@Descriptive vs Diagnostic vs Predictive vs Prescriptive Analytics: What's the Difference?](https://www.youtube.com/watch?v=QoEpC7jUb9k) - [@video@Types of Data Analytics](https://www.youtube.com/watch?v=lsZnSgxMwBA) diff --git a/src/data/roadmaps/datastructures-and-algorithms/content/102-data-structures/101-importance-of-datastructures.md b/src/data/roadmaps/datastructures-and-algorithms/content/102-data-structures/101-importance-of-datastructures.md index b35ed3cf6..4bcb846db 100644 --- a/src/data/roadmaps/datastructures-and-algorithms/content/102-data-structures/101-importance-of-datastructures.md +++ b/src/data/roadmaps/datastructures-and-algorithms/content/102-data-structures/101-importance-of-datastructures.md @@ -4,5 +4,4 @@ Data structures are crucial in the field of computer science and coding because Learn more from the following links: -- [@article@Why Data Structures and Algorithms Are Important to Learn?](https://www.geeksforgeeks.org/why-data-structures-and-algorithms-are-important-to-learn/) - [@video@What are Data Structures? Why is it Important?](https://www.youtube.com/watch?v=18V8Avz2OH8) diff --git a/src/data/roadmaps/datastructures-and-algorithms/content/105-sorting-algorithms/105-heap-sort.md b/src/data/roadmaps/datastructures-and-algorithms/content/105-sorting-algorithms/105-heap-sort.md index 62f9383ce..3ddaa5e5e 100644 --- a/src/data/roadmaps/datastructures-and-algorithms/content/105-sorting-algorithms/105-heap-sort.md +++ b/src/data/roadmaps/datastructures-and-algorithms/content/105-sorting-algorithms/105-heap-sort.md @@ -4,6 +4,5 @@ Heap Sort is an efficient, comparison-based sorting algorithm. It utilizes a dat Learn more from the following resources: -- [@article@Heap Sort - W3Schools](https://www.geeksforgeeks.org/heap-sort/) - [@article@Heap Sort Visualize](https://www.hackerearth.com/practice/algorithms/sorting/heap-sort/tutorial/) - [@video@Heap sort in 4 minutes](https://www.youtube.com/watch?v=2DmK_H7IdTo) diff --git a/src/data/roadmaps/datastructures-and-algorithms/content/106-search-algorithms/100-linear-search.md b/src/data/roadmaps/datastructures-and-algorithms/content/106-search-algorithms/100-linear-search.md index 195d5e690..374916f6a 100644 --- a/src/data/roadmaps/datastructures-and-algorithms/content/106-search-algorithms/100-linear-search.md +++ b/src/data/roadmaps/datastructures-and-algorithms/content/106-search-algorithms/100-linear-search.md @@ -5,5 +5,4 @@ Linear search is one of the simplest search algorithms. In this method, every el Learn more from the following resources: - [@article@DSA Linear Search - W3Schools](https://www.w3schools.com/dsa/dsa_algo_linearsearch.php) -- [@article@Linear Search - GeeksForGeeks](https://www.geeksforgeeks.org/linear-search/) - [@video@Learn Linear Search in 3 minutes](https://www.youtube.com/watch?v=246V51AWwZM) diff --git a/src/data/roadmaps/datastructures-and-algorithms/content/107-tree-data-structure/102-avl-trees.md b/src/data/roadmaps/datastructures-and-algorithms/content/107-tree-data-structure/102-avl-trees.md index 09d558f9f..b508b1d01 100644 --- a/src/data/roadmaps/datastructures-and-algorithms/content/107-tree-data-structure/102-avl-trees.md +++ b/src/data/roadmaps/datastructures-and-algorithms/content/107-tree-data-structure/102-avl-trees.md @@ -4,5 +4,4 @@ An **AVL tree** is a type of binary search tree that is self-balancing, which me Learn more from the following links: -- [@article@AVL Tree Data Structure](https://www.geeksforgeeks.org/introduction-to-avl-tree/) - [@video@AVL trees in 5 minutes — Intro & Search](https://www.youtube.com/watch?v=DB1HFCEdLxA) diff --git a/src/data/roadmaps/datastructures-and-algorithms/content/107-tree-data-structure/103-b-trees.md b/src/data/roadmaps/datastructures-and-algorithms/content/107-tree-data-structure/103-b-trees.md index 8393a2b66..32161c0cc 100644 --- a/src/data/roadmaps/datastructures-and-algorithms/content/107-tree-data-structure/103-b-trees.md +++ b/src/data/roadmaps/datastructures-and-algorithms/content/107-tree-data-structure/103-b-trees.md @@ -4,5 +4,4 @@ B-Tree is a self-balanced search tree data structure that maintains sorted data Learn more from the following links: -- [@article@Introduction of B-Tree](https://www.geeksforgeeks.org/introduction-of-b-tree-2/) - [@video@B-trees in 4 minutes — Intro](https://www.youtube.com/watch?v=FgWbADOG44s) diff --git a/src/data/roadmaps/datastructures-and-algorithms/content/110-complex-data-structures/100-b-bplus-trees.md b/src/data/roadmaps/datastructures-and-algorithms/content/110-complex-data-structures/100-b-bplus-trees.md index 522637cee..8322446fc 100644 --- a/src/data/roadmaps/datastructures-and-algorithms/content/110-complex-data-structures/100-b-bplus-trees.md +++ b/src/data/roadmaps/datastructures-and-algorithms/content/110-complex-data-structures/100-b-bplus-trees.md @@ -4,6 +4,4 @@ Learn more from the following resources: -- [@article@Introduction of B Tree](https://www.geeksforgeeks.org/introduction-of-b-tree-2/) -- [@article@Introduction of B+ Tree](https://www.geeksforgeeks.org/introduction-of-b-tree/) - [@video@B Trees and B+ Trees. How they are useful in Databases](https://www.youtube.com/watch?v=aZjYr87r1b8) diff --git a/src/data/roadmaps/datastructures-and-algorithms/content/110-complex-data-structures/101-skip-list.md b/src/data/roadmaps/datastructures-and-algorithms/content/110-complex-data-structures/101-skip-list.md index 9d70dec4f..d22c15fc4 100644 --- a/src/data/roadmaps/datastructures-and-algorithms/content/110-complex-data-structures/101-skip-list.md +++ b/src/data/roadmaps/datastructures-and-algorithms/content/110-complex-data-structures/101-skip-list.md @@ -4,5 +4,4 @@ A **Skip List** is a probabilistic data structure that allows efficient search, Learn more from the following resources: -- [@article@Skip List – Efficient Search, Insert and Delete in Linked List](https://www.geeksforgeeks.org/skip-list/) - [@video@Skip Lists](https://www.youtube.com/watch?v=NDGpsfwAaqo) diff --git a/src/data/roadmaps/datastructures-and-algorithms/content/110-complex-data-structures/102-isam.md b/src/data/roadmaps/datastructures-and-algorithms/content/110-complex-data-structures/102-isam.md index 0896668cc..0bf9d32ac 100644 --- a/src/data/roadmaps/datastructures-and-algorithms/content/110-complex-data-structures/102-isam.md +++ b/src/data/roadmaps/datastructures-and-algorithms/content/110-complex-data-structures/102-isam.md @@ -4,5 +4,4 @@ ISAM, which stands for Indexed Sequential Access Method, is a type of disk stora Learn more from the following resources: -- [@article@ISAM in Database](https://www.geeksforgeeks.org/isam-in-database/) - [@video@DBMS - Index Sequential Access Method (ISAM)](https://www.youtube.com/watch?v=EiW1VVPor10) diff --git a/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/101-backtracking.md b/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/101-backtracking.md index 1e562c47f..087676732 100644 --- a/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/101-backtracking.md +++ b/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/101-backtracking.md @@ -4,5 +4,4 @@ Backtracking is a powerful algorithmic technique that aims to solve a problem in Learn more from the following links: -- [@article@Backtracking Algorithm](https://www.geeksforgeeks.org/backtracking-algorithms/) - [@video@What is backtracking?](https://www.youtube.com/watch?v=Peo7k2osVVs) diff --git a/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/102-greedy-algorithms.md b/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/102-greedy-algorithms.md index 2fe93c845..14c65e495 100644 --- a/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/102-greedy-algorithms.md +++ b/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/102-greedy-algorithms.md @@ -4,5 +4,4 @@ Greedy algorithms follow the problem-solving heuristic of making the locally opt Learn more from the following links: -- [@article@Greedy Algorithm Tutorial – Examples, Application and Practice Problem](https://www.geeksforgeeks.org/introduction-to-greedy-algorithm-data-structures-and-algorithm-tutorials/) - [@video@Greedy Algorithms Tutorial ](https://www.youtube.com/watch?v=bC7o8P_Ste4) diff --git a/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/103-randomised-algorithms.md b/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/103-randomised-algorithms.md index bbcf340ad..4d6326737 100644 --- a/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/103-randomised-algorithms.md +++ b/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/103-randomised-algorithms.md @@ -4,5 +4,4 @@ Randomised algorithms are a type of algorithm that employs a degree of randomnes Learn more from the following links: -- [@article@Randomized Algorithms](https://www.geeksforgeeks.org/randomized-algorithms/) - [@video@Algorithm Classification Randomized Algorithm](https://www.youtube.com/watch?v=J_EVG6yCOz0) diff --git a/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/104-divide-and-conquer.md b/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/104-divide-and-conquer.md index 2c79279a9..84acc08cf 100644 --- a/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/104-divide-and-conquer.md +++ b/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/104-divide-and-conquer.md @@ -4,5 +4,4 @@ Divide and conquer is a powerful algorithm design technique that solves a proble Learn more from the following links: -- [@article@Introduction to Divide and Conquer Algorithm](https://www.geeksforgeeks.org/introduction-to-divide-and-conquer-algorithm/) - [@video@Divide & Conquer Algorithm In 3 Minutes](https://www.youtube.com/watch?v=YOh6hBtX5l0) diff --git a/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/105-recursion.md b/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/105-recursion.md index ed60e3ba5..6a51c19e5 100644 --- a/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/105-recursion.md +++ b/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/105-recursion.md @@ -4,5 +4,4 @@ Recursion is a method where the solution to a problem depends on solutions to sh Learn more from the following links: -- [@article@Introduction to Recursion](https://www.geeksforgeeks.org/introduction-to-recursion-2/) - [@video@Recursion in 100 Seconds](https://www.youtube.com/watch?v=rf60MejMz3E) diff --git a/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/106-dynamic-programming.md b/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/106-dynamic-programming.md index 901916ea4..686948180 100644 --- a/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/106-dynamic-programming.md +++ b/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/106-dynamic-programming.md @@ -4,7 +4,6 @@ Learn more from the following links: -- [@article@Dynamic Programming (DP) Tutorial with Problems](https://www.geeksforgeeks.org/introduction-to-dynamic-programming-data-structures-and-algorithm-tutorials/) - [@article@Getting Started with Dynamic Programming in Data Structures and Algorithms](https://medium.com/@PythonicPioneer/getting-started-with-dynamic-programming-in-data-structures-and-algorithms-126c7a16775c) - [@video@What Is Dynamic Programming and How To Use It](https://www.youtube.com/watch?v=vYquumk4nWw&t=4s) - [@video@5 Simple Steps for Solving Dynamic Programming Problems](https://www.youtube.com/watch?v=aPQY__2H3tE) diff --git a/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/107-two-pointer-techniques.md b/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/107-two-pointer-techniques.md index 29055ccb5..c7d705e2b 100644 --- a/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/107-two-pointer-techniques.md +++ b/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/107-two-pointer-techniques.md @@ -4,7 +4,6 @@ The **two-pointer technique** is a strategy that can be used to solve certain ty Learn more from the following links: -- [@article@Two Pointers Technique](https://www.geeksforgeeks.org/two-pointers-technique/) - [@article@Two Pointers Technique](https://medium.com/@johnnyJK/data-structures-and-algorithms-907a63d691c1) - [@article@Mastering the Two Pointers Technique: An In-Depth Guide](https://lordkonadu.medium.com/mastering-the-two-pointers-technique-an-in-depth-guide-3c2167584ccc) - [@video@Visual introduction Two Pointer Algorithm](https://www.youtube.com/watch?v=On03HWe2tZM) diff --git a/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/108-sliding-window-technique.md b/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/108-sliding-window-technique.md index 90efe43b7..3c36d6b94 100644 --- a/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/108-sliding-window-technique.md +++ b/src/data/roadmaps/datastructures-and-algorithms/content/112-problem-solving-techniques/108-sliding-window-technique.md @@ -4,6 +4,5 @@ The **Sliding Window Technique** is an algorithmic paradigm that manages a subse Learn more from the following links: -- [@article@Sliding Window Technique](https://www.geeksforgeeks.org/window-sliding-technique/) - [@article@Mastering Sliding Window Techniques](https://medium.com/@rishu__2701/mastering-sliding-window-techniques-48f819194fd7) - [@video@Sliding window technique](https://www.youtube.com/watch?v=p-ss2JNynmw) diff --git a/src/data/roadmaps/docker/content/104-data-persistence/102-bind-mounts.md b/src/data/roadmaps/docker/content/104-data-persistence/102-bind-mounts.md index 21eae9cef..eb81f5773 100644 --- a/src/data/roadmaps/docker/content/104-data-persistence/102-bind-mounts.md +++ b/src/data/roadmaps/docker/content/104-data-persistence/102-bind-mounts.md @@ -5,4 +5,3 @@ Bind mounts have limited functionality compared to volumes. When you use a bind Visit the following resources to learn more: - [@official@Docker Bind Mounts](https://docs.docker.com/storage/bind-mounts/) -- [@article@How to Use Bind Mount in Docker?](https://www.geeksforgeeks.org/how-to-use-bind-mount-in-docker/) diff --git a/src/data/roadmaps/game-developer/content/artificial-neural-network@AoH2r4EOHyZd8YaV24rBk.md b/src/data/roadmaps/game-developer/content/artificial-neural-network@AoH2r4EOHyZd8YaV24rBk.md index 2ad2ec3c0..69828ff2a 100644 --- a/src/data/roadmaps/game-developer/content/artificial-neural-network@AoH2r4EOHyZd8YaV24rBk.md +++ b/src/data/roadmaps/game-developer/content/artificial-neural-network@AoH2r4EOHyZd8YaV24rBk.md @@ -4,6 +4,5 @@ Artificial Neural Networks (ANN) are a branch of machine learning that draw insp Visit the following resources to learn more: -- [@article@Artificial Neural Networks (ANN)](https://www.geeksforgeeks.org/artificial-neural-networks-and-its-applications/) - [@article@What is ANN?](https://www.coursera.org/articles/artificial-neural-network) - [@article@What is Neural Network?](https://www.ibm.com/topics/neural-networks) diff --git a/src/data/roadmaps/game-developer/content/computer-graphics@lIb5MeDoqVj6HycveOgTS.md b/src/data/roadmaps/game-developer/content/computer-graphics@lIb5MeDoqVj6HycveOgTS.md index 879aaf7b2..5230019d9 100644 --- a/src/data/roadmaps/game-developer/content/computer-graphics@lIb5MeDoqVj6HycveOgTS.md +++ b/src/data/roadmaps/game-developer/content/computer-graphics@lIb5MeDoqVj6HycveOgTS.md @@ -4,6 +4,5 @@ Computer Graphics is a subfield of computer science that studies methods for dig Visit the following resources to learn more: -- [@article@What is Computer Graphics?](https://www.geeksforgeeks.org/introduction-to-computer-graphics/) - [@article@Introduction to Computer Graphics](https://open.umn.edu/opentextbooks/textbooks/420) - [@video@How do Video Game Graphics Work?](https://www.youtube.com/watch?v=C8YtdC8mxTU) diff --git a/src/data/roadmaps/game-developer/content/mcts@QD9TfZn3yhGPVwiyJ6d0V.md b/src/data/roadmaps/game-developer/content/mcts@QD9TfZn3yhGPVwiyJ6d0V.md index 21ec4023d..341934baf 100644 --- a/src/data/roadmaps/game-developer/content/mcts@QD9TfZn3yhGPVwiyJ6d0V.md +++ b/src/data/roadmaps/game-developer/content/mcts@QD9TfZn3yhGPVwiyJ6d0V.md @@ -5,4 +5,3 @@ Visit the following resources to learn more: - [@article@MCTS Algorithm](https://en.wikipedia.org/wiki/Monte_Carlo_tree_search/) -- [@article@Monte Carlo Tree Search](https://www.geeksforgeeks.org/ml-monte-carlo-tree-search-mcts/) diff --git a/src/data/roadmaps/git-github/content/collaborators@r-u1vTpUyuvsB0revOU0C.md b/src/data/roadmaps/git-github/content/collaborators@r-u1vTpUyuvsB0revOU0C.md index 6bd5812e6..4e4f6ff54 100644 --- a/src/data/roadmaps/git-github/content/collaborators@r-u1vTpUyuvsB0revOU0C.md +++ b/src/data/roadmaps/git-github/content/collaborators@r-u1vTpUyuvsB0revOU0C.md @@ -6,6 +6,5 @@ Visit the following resources to learn more: - [@official@How to add collaborators to your personal projects](https://docs.github.com/en/account-and-profile/setting-up-and-managing-your-personal-account-on-github/managing-access-to-your-personal-repositories/inviting-collaborators-to-a-personal-repository) - [@official@Adding outside collaborators to repositories in your organization](https://docs.github.com/en/organizations/managing-user-access-to-your-organizations-repositories/managing-outside-collaborators/adding-outside-collaborators-to-repositories-in-your-organization) -- [@article@What are github collaborators](https://www.geeksforgeeks.org/what-are-github-collaborators/) - [@article@How to Add Collaborators to Your GitHub Repository](https://www.blinkops.com/blog/how-to-add-collaborators-to-your-github-repository) - [@video@Using Github for Team collaboration](https://youtu.be/4nyIS58ORWw?si=yK5LCONNVm9OIUK5) \ No newline at end of file diff --git a/src/data/roadmaps/javascript/content/block@uqEzHYx13Y2EpvTTRzykn.md b/src/data/roadmaps/javascript/content/block@uqEzHYx13Y2EpvTTRzykn.md index 8c84ada3a..211e5b8d9 100644 --- a/src/data/roadmaps/javascript/content/block@uqEzHYx13Y2EpvTTRzykn.md +++ b/src/data/roadmaps/javascript/content/block@uqEzHYx13Y2EpvTTRzykn.md @@ -4,5 +4,4 @@ This scope restricts the variable that is declared inside a specific block, from Visit the following resources to learn more: -- [@article@JavaScript Scope](https://www.w3schools.com/js/js_scope.asp) -- [@article@Block Scoping in JavaScript](https://www.geeksforgeeks.org/javascript-es2015-block-scoping) +- [@article@JavaScript Scope](https://www.w3schools.com/js/js_scope.asp) \ No newline at end of file diff --git a/src/data/roadmaps/postgresql-dba/content/relational-model@mDVbjdVN0spY7dI_8k1YW.md b/src/data/roadmaps/postgresql-dba/content/relational-model@mDVbjdVN0spY7dI_8k1YW.md index b2f4c388d..c9d69ccec 100644 --- a/src/data/roadmaps/postgresql-dba/content/relational-model@mDVbjdVN0spY7dI_8k1YW.md +++ b/src/data/roadmaps/postgresql-dba/content/relational-model@mDVbjdVN0spY7dI_8k1YW.md @@ -4,5 +4,4 @@ The relational model is an approach to organizing and structuring data using tab Learn more from the following resources: -- [@article@What is the Relational Model?](https://www.postgresql.org/docs/7.1/relmodel-oper.html) -- [@article@The Relational Model](https://www.geeksforgeeks.org/relational-model-in-dbms/) \ No newline at end of file +- [@article@What is the Relational Model?](https://www.postgresql.org/docs/7.1/relmodel-oper.html) \ No newline at end of file diff --git a/src/data/roadmaps/python/content/loops@Dvy7BnNzK55qbh_SgOk8m.md b/src/data/roadmaps/python/content/loops@Dvy7BnNzK55qbh_SgOk8m.md index f1e947839..e569608bf 100644 --- a/src/data/roadmaps/python/content/loops@Dvy7BnNzK55qbh_SgOk8m.md +++ b/src/data/roadmaps/python/content/loops@Dvy7BnNzK55qbh_SgOk8m.md @@ -4,7 +4,6 @@ Loops are used to execute a block of code repeatedly. Visit the following resources to learn more: -- [@article@Loops in Python](https://www.geeksforgeeks.org/loops-in-python/) - [@article@Python "while" Loops (Indefinite Iteration)](https://realpython.com/python-while-loop/) - [@article@Python "for" Loops (Definite Iteration)](https://realpython.com/python-for-loop/#the-guts-of-the-python-for-loop) - [@video@Python For Loops](https://www.youtube.com/watch?v=KWgYha0clzw) diff --git a/src/data/roadmaps/redis/content/lists@4-C4XqACUp4nvcMIj6djF.md b/src/data/roadmaps/redis/content/lists@4-C4XqACUp4nvcMIj6djF.md index 8ad63ec2f..60c5a752b 100644 --- a/src/data/roadmaps/redis/content/lists@4-C4XqACUp4nvcMIj6djF.md +++ b/src/data/roadmaps/redis/content/lists@4-C4XqACUp4nvcMIj6djF.md @@ -4,5 +4,4 @@ Lists in Redis are ordered collections of string elements, allowing operations s Learn more from the following resources: -- [@official@Redis Lists](https://redis.io/docs/latest/develop/data-types/lists/) -- [@article@Complete Guide to Redis Lists](https://www.geeksforgeeks.org/complete-guide-to-redis-lists/) \ No newline at end of file +- [@official@Redis Lists](https://redis.io/docs/latest/develop/data-types/lists/) \ No newline at end of file diff --git a/src/data/roadmaps/redis/content/pipelining@LHlwjN3WHYUBUafzzwsWQ.md b/src/data/roadmaps/redis/content/pipelining@LHlwjN3WHYUBUafzzwsWQ.md index e7d34a9ce..df685b512 100644 --- a/src/data/roadmaps/redis/content/pipelining@LHlwjN3WHYUBUafzzwsWQ.md +++ b/src/data/roadmaps/redis/content/pipelining@LHlwjN3WHYUBUafzzwsWQ.md @@ -4,5 +4,4 @@ Pipelining in Redis is a technique that allows clients to send multiple commands Learn more from the following resources: -- [@official@Redis Pipelining](https://redis.io/docs/latest/develop/use/pipelining/) -- [@article@Complete Guide to Redis Pipelining](https://www.geeksforgeeks.org/complete-guide-to-redis-pipelining/) \ No newline at end of file +- [@official@Redis Pipelining](https://redis.io/docs/latest/develop/use/pipelining/) \ No newline at end of file diff --git a/src/data/roadmaps/software-architect/content/important-skills-to-learn@lBtlDFPEQvQ_xtLtehU0S.md b/src/data/roadmaps/software-architect/content/important-skills-to-learn@lBtlDFPEQvQ_xtLtehU0S.md index 2a6d3b94c..938a8ac36 100644 --- a/src/data/roadmaps/software-architect/content/important-skills-to-learn@lBtlDFPEQvQ_xtLtehU0S.md +++ b/src/data/roadmaps/software-architect/content/important-skills-to-learn@lBtlDFPEQvQ_xtLtehU0S.md @@ -12,7 +12,3 @@ To support the laid-out activities specific skills are required. From my experie - Balance - Consult - Market - -Visit the following resources to learn more: - -- [@article@Software Architect Skills](https://www.geeksforgeeks.org/software-architects-skills/) \ No newline at end of file diff --git a/src/data/roadmaps/software-architect/content/levels-of-architecture@2sR4KULvAUUoOtopvsEBs.md b/src/data/roadmaps/software-architect/content/levels-of-architecture@2sR4KULvAUUoOtopvsEBs.md index ba56b5894..52f97c43d 100644 --- a/src/data/roadmaps/software-architect/content/levels-of-architecture@2sR4KULvAUUoOtopvsEBs.md +++ b/src/data/roadmaps/software-architect/content/levels-of-architecture@2sR4KULvAUUoOtopvsEBs.md @@ -5,7 +5,3 @@ Architecture can be done on several “levels” of abstractions. The level infl - **Application Level:** The lowest level of architecture. Focus on one single application. Very detailed, low level design. Communication is usually within one development team. - **Solution Level:** The mid-level of architecture. Focus on one or more applications which fulfill a business need (business solution). Some high, but mainly low-level design. Communication is between multiple development teams. - **Enterprise Level:** The highest level of architecture. Focus on multiple solutions. High level, abstract design, which needs to be detailed out by solution or application architects. Communication is across the organization. - -Visit the following resources to learn more: - -- [@article@Software Engineering Architecture](https://www.geeksforgeeks.org/software-engineering-architectural-design/) \ No newline at end of file diff --git a/src/data/roadmaps/software-architect/content/tcpip-model@UCCT7-E_QUKPg3jAsjobx.md b/src/data/roadmaps/software-architect/content/tcpip-model@UCCT7-E_QUKPg3jAsjobx.md index 8ea19b0f4..487e914bb 100644 --- a/src/data/roadmaps/software-architect/content/tcpip-model@UCCT7-E_QUKPg3jAsjobx.md +++ b/src/data/roadmaps/software-architect/content/tcpip-model@UCCT7-E_QUKPg3jAsjobx.md @@ -13,5 +13,4 @@ The `TCP/IP model` defines how devices should transmit data between them and ena Visit the following resources to learn more: - [@article@What is Transmission Control Protocol TCP/IP? - Fortinet](https://www.fortinet.com/resources/cyberglossary/tcp-ip#:~:text=The%20TCP%2FIP%20model%20defines,exchanged%20and%20organized%20over%20networks.) -- [@article@TCP/IP Model](https://www.geeksforgeeks.org/tcp-ip-model/) - [@article@What is TCP/IP and How Does it Work?](https://www.techtarget.com/searchnetworking/definition/TCP-IP)git reset \ No newline at end of file diff --git a/src/data/roadmaps/software-architect/content/tools@SuMhTyaBS9vwASxAt39DH.md b/src/data/roadmaps/software-architect/content/tools@SuMhTyaBS9vwASxAt39DH.md index d6b0fb073..d106280d2 100644 --- a/src/data/roadmaps/software-architect/content/tools@SuMhTyaBS9vwASxAt39DH.md +++ b/src/data/roadmaps/software-architect/content/tools@SuMhTyaBS9vwASxAt39DH.md @@ -1,7 +1,3 @@ # Architect Tools Architect tools are software tools that help architects to design, document, and manage software architectures. These tools can be used to create architecture diagrams, generate code, and automate the software development process. - -Visit the following resources to learn more: - -- [@article@Top 10 Software Architecture Tools in 2024](https://www.geeksforgeeks.org/software-architecture-tools/) \ No newline at end of file diff --git a/src/data/roadmaps/typescript/content/hybrid-types@lvtTSHH9yBTCiLng8btnI.md b/src/data/roadmaps/typescript/content/hybrid-types@lvtTSHH9yBTCiLng8btnI.md index 71bcc588f..b7de10023 100644 --- a/src/data/roadmaps/typescript/content/hybrid-types@lvtTSHH9yBTCiLng8btnI.md +++ b/src/data/roadmaps/typescript/content/hybrid-types@lvtTSHH9yBTCiLng8btnI.md @@ -24,7 +24,3 @@ type User = { education: Education; }; ``` - -Learn more from the following links: - -- [@official@Geeksforgeeks.org - Hybrid Types](https://www.geeksforgeeks.org/what-are-hybrid-types-in-typescript/#:~:text=Hybrid%20types%20are%20a%20combination,properties%20like%20a%20regular%20object.) diff --git a/src/data/roadmaps/vue/content/binding-events@b7iXwtUnELg_ShbCyTrNA.md b/src/data/roadmaps/vue/content/binding-events@b7iXwtUnELg_ShbCyTrNA.md index cefbe6931..2102d5672 100644 --- a/src/data/roadmaps/vue/content/binding-events@b7iXwtUnELg_ShbCyTrNA.md +++ b/src/data/roadmaps/vue/content/binding-events@b7iXwtUnELg_ShbCyTrNA.md @@ -4,5 +4,4 @@ Vue.js is an open-source Model–View–ViewModel front-end JavaScript framework Visit the following resources to learn more: -- [@official@Binding Events](https://vuejs.org/guide/essentials/event-handling) -- [@article@Vue.js Event Handling](https://www.geeksforgeeks.org/vue-js-event-handling/) +- [@official@Binding Events](https://vuejs.org/guide/essentials/event-handling) \ No newline at end of file