## Integration of Common platforms to SharePoint online list

Is it possible to integrate WhatsApp/facebook/ we chat/ Google forms to integrate with SharePoint online list? I am hoping input of SharePoint online list to be one of these for easy access to people who don’t have direct access to SharePoint…

## When to use the gestalt principle of common region?

The image below uses lines to separate various graphics, but could also use different backgrounds, which is something pretty common when designing dashboards. My question is, wouldn’t the principle of proximity be enough to group the related images and text and separate them from the other elements? When do we use this principle?

## Connect to Common Data Service API from SpFx

We are interested in connecting to the Common Data Service API from a SpFx webpart which can be done via Postman using the following application ID:

‘00000007-0000-0000-c000-000000000000’: ‘Dynamics CRM Online’

Which in the AAD has the name “Common Data Service”.

Trying to do this using the AadHttpClient we add the following in package-solution.json:

``  {     "resource": "Common Data Service",     "scope": "user_impersonation"   } ``

However when this is approved by Tenant Admin it adds a different app:

’82f77645-8a66-4745-bcdf-9706824f9ad0′: ‘PowerApps Runtime Service’

Which also is named “Common Data Service” however shows up as “Previous version CDS OBSOLETE – DO NOT USE” in “SharePoint Online Client Extensibility Web Application Principal – Permissions” section.

So have the following questions:

1. Will this approach work for accessing the Common Data Service API if we can get around the obsolete ‘PowerApps Runtime Service’ application?
2. Is there a way of getting around this?

We have tried using the objectid in the “Resource” field but this caused an error upon approval (which is noted in the docs).

## Common Encryption types with keys stored in Base64

I am a noob 🙂

I am attempting to recover a password from a piece of software. The software has a XML file contains three fields that appear important to this process: `Password Value`, `EncryptionKey Value`, and `PasswordEncoding Value`. `PasswordEncoding Value` is set to 12000 (in case that helps).

The other two fields appear to be base64 strings that, when decoded, seem to be nonprintable characters.

I want to use Python to try to find the type of enc used in hopes of decrypting the `Password Value` field. What are common types of Encryption that would store data in base64 in a xml file? This is from a Windows app.

Thank you

## What Are Some Of The Common Lists Used When Designing A Page?

What are some of the common lists used when designing a page?

Website Design Company in Bangalore | Web Designing Company in Bangalore | Web Design Companies in Bangalore | Website Development Company in Bangalore | Web Development Company in Bangalore | Web…

What Are Some Of The Common Lists Used When Designing A Page?

## Standard or common way to secure a destination-email-address of a contact-form

I have a website with a minimal HTML-CSS-JavaScript contact form but I desire to hide the destination email address of that form from the HTML source code so that form users would not be able to find it in HTML source codes from their web browsers.
I considered putting the destination email address in a configuration file and refer this configuration file somehow but the reference itself might appear in source code and expose the file containing the email so people could browse that file and find the email.

What is the standard or common way to secure a destination email address of a contact form?

## What are some common and advanced web server exploits?

Currently, I am testing my own website for vulnerabilities and had a question. I know the basic of pentesting such as sql injection, cross site scripting, etc. I wanted to know on what common methods or exploits that I am still missing, and what are some advanced techniques? My end goal is to find ways to receive total control of the site or to affect it.

## Whats the common name for this Asset?

if you have a google account and you are logged in you have the option to choose a little image that will show up everytime you are logged in. This is quite common across many websites and apps etc. Would you call this Avatar-Image? I am not sure how to name this? Thx a lot! Mike

## Counting common values in two arrays

given two arrays of integers A and B of size m, with values in the range [-n,n]. I want an algorithm to count how many common values are in A and B , if a value is repeated we only count it once , for example : $$A=\{2,2,14,3\}$$ and $$B=\{1,2,14,14,5\}$$ the algorithm should return 2 . Problem is I need to do this in $$O(m)$$ time.

My attempt was to create an array $$C$$, of size $$2n$$. and increment all the values of $$A$$ and $$B$$ by $$n$$, and count the values of $$A$$ like: $$C[A[i]] = 1$$ that would take me $$O(m)$$ time , and $$O(1)$$ time to create the array. then going over $$B$$ and counting how many $$1’s$$ I encounter in $$C$$.

So far it sounds good, however I have no idea what’s in $$C$$ in the first place and it could be that there’s a $$1$$ in there already and that would increment the counter falsely , and initializing $$C$$ would take $$O(n)$$ time.

Any ideas? Thanks ahead.

## What makes a common programming language non-context-sensitive but RE?

I have a vague understanding that a (sane) programming language is RE as they are Turing-complete, being able to describe any Turing machine.

But I cannot pinpoint what aspect makes a programming language RE, not context-sensitive. For example, I’m guessing the variables in any scope structures like `for` can be described in a context-sensitive grammar with a fairly bulky (but finite) number of production rules.

One wild guess is that it’s because of pointers or references, making it impossible to describe with a finite number of production rules. Can anyone teach me about why it is?