How to Safely Store your Data in the Cloud make money online

How to Safely Store your Data in the Cloud What exactly is the cloud? It is basically the collection of  computers on the internet that companies are using to offer their services. One cloud service that is being offered is a revolutionary storage method for your data. From music files to pictures to sensitive documents, the cloud invisibly backs up your files and folders and alleviates the potentially endless and costly search for extra storage space.  An alternative to buying an external hard drive or deleting old files to make room for new ones, cloud storage is convenient and cost-effective. It works by storing your files on a server out in the internet somewhere rather than on your local hard drive. (For a more technical discussion of cloud computing basics, read more here.) This allows you to back up, sync, and access your data across multiple devices as long as they have internet capability. However, if you wish to store information virtually, you must consider the a…
Read more about How to Safely Store your Data in the Cloud make money online
  • 0

Multiplexing techniques

12. Describe the Multiplexing techniques for digital signal transmission.     Multiplexing is a technology to transfer digital or analog data in daily use devices like telephone and television. Here, we discuss the various multiplexing technologies used for data transmission. Multiplexing is a method of combining multiple analog massage signals or digital data streams into one signal. The objective of this technology is to share an expensive medium for transmitting multiple signals. Actually, the low-level communication signals are divided into high-level logical channels using this technology. Furthermore, each channel is then used for transmitting one message signal or data stream.   Time Division   The time division multiplexing technology uses a multiplexor to collect and store incoming signals from the slow lines connected to it by distributing a time slot on the fast link to each in turn. The message signals are sent one after another. They are then received and s…
Read more about Multiplexing techniques
  • 0

Explain embedded SQL

Explain embedded SQL.   Embedded SQL is a method of inserting inline SQL statements or queries into the code of a programming language, which is known as a host language.    Because the host language cannot parse SQL, the inserted SQL is parsed by an embedded SQL preprocessor.   Embedded SQL is a robust and convenient method of combining the computing power of a programming language with SQL's specialized data management and manipulation capabilities.  
Read more about Explain embedded SQL
  • 0

Explain any three aggregate functions with examples

Explain any three aggregate functions with examples.   Aggregate Functions are keywords in SQL used to manipulate values within columns for output purposes. A function is a command always used in conjunction with a column name or expression. There are several types of functions in SQL.  An aggregate function is used to provide summarization information for an SQL statement, such as counts, totals, and averages.   MIN      - returns the smallest value in a given column   MAX     - returns the largest value in a given column   SUM    - returns the sum of the numeric values in a given column   AVG     - returns the average value of a given column   COUNT- returns the total number of values in a given column   COUNT(*) - returns the number of rows in a table   SQL Aggregate Functions: SQL Aggregate Functions operate on complete sets of data and return a single result. PointBase supports five Aggregate Functions: AVG, COUNT, MAX, MIN, and SUM.   AVG The AVG Function returns the ave…
Read more about Explain any three aggregate functions with examples
  • 0

Explain Database architecture

Explain Database architecture   There are following three levels or layers of DBMS architecture:   • External Level   •Conceptual Level   • Internal Level   Objective of the Three Level Architecture   The objective of the three level architecture is to separate each user's view of the database from the Way the database is physically represented. There are several reasons why this separation is desirable:     • Each user should be able to access the same data, but have a different customized view of the data. Each user should be able to change the way he or she views the data, and this change should not affect other users.   • Users should not have to deal directly with physical database storage details, such as indexing or hashing. In other words a user's interaction with the database should be independent of storage considerations.   • The Database Administrator (DBA) should be able to change the database storage structures without affecting the user's views. . The internal st…
Read more about Explain Database architecture
  • 0

Explain ACID properties.

Explain ACID properties   Explain ACID properties.    ACID (Atomicity, Consistency, Isolation, Durability) is a set of properties that guarantee that database transactions are processed reliably. In the context of databases, a single logical operation on the data is called a transaction. For example, a transfer of funds from one bank account to another, even involving multiple changes such as debiting one account and crediting another, is a single transaction. Atomicity : Atomicity requires that each transaction be "all or nothing": if one part of the transaction fails, the entire transaction fails, and the database state is left unchanged. An atomic system must guarantee atomicity in each and every situation, including power failures, errors, and crashes. To the outside world, a committed transaction appears (by its effects on the database) to be indivisible ("atomic"), and an aborted transaction does not happen.   Consistency : The consistency property ensures that any transa…
Read more about Explain ACID properties.
  • 0

Explain normalization in Database

Explain normalization.       Explain normalization.   In creating a database, normalization is the process of organizing it into tables in such a way that the results of using the database are always unambiguous and as intended. Normalization may have the effect of duplicating data within the database and often results in the creation of additional tables. (While normalization tends to increase the duplication of data, it does not introduce redundancy, which is unnecessary duplication.) Normalization is typically a refinement process after the initial exercise of identifying the data objects that should be in the database, identifying their relationships, and defining the tables required and the columns within each table.   First normal form (1NF). This is the "basic" level of normalization and generally corresponds to the definition of any database, namely:   It contains two-dimensional tables with rows and columns.   Each column corresponds to a sub-object or an attribute o…
Read more about Explain normalization in Database
  • 0

Define XML and explain the structure of XML

Define XML and explain the structure of XML.       Define XML and explain the structure of XML.     XML stands for extensible markup language. XML was developed around 1996 and is a subset of SGML. It's documents conform to SGML. XML was made less complicated than SGML to enable its use on the web. XML uses the ISO 10646 (Unicode) standard for encoding characters.   XML Structure   This page provides a description of XML structure including the document parts, the prologue, and provides a simple XML example document.   Document Parts   Prolog   Document Element (root element)   The Prologue : The prologue, equivalent to the header in HTML, may include the following:   An XML declaration (optional) such as: <?xml version="1.0"?> A DTD or reference to one (optional). An example reference to an external DTD file:   <!DOCTYPE LANGLIST SYSTEM "langlist.dtd">   Processing instructions - An example processing instruction that causes style to be determined by a style shee…
Read more about Define XML and explain the structure of XML
  • 0

Explain Network and Relational data models

7. Explain Network and Relational data models.   Explain Network and Relational data models   The network model is a database model conceived as a flexible way of representing objects and their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object types are nodes and relationship types are arcs, is not restricted to being a hierarchy or lattice. The relational model for database management is a database model based on first-order predicate logic, first formulated and proposed in 1969.  In the relational model of a database, all data is represented in terms of tuples, grouped into relations. A database organized in terms of the relational model is a relational database.   In the relational model, related records are linked together with a "key".  The purpose of the relational model is to provide a declarative method for specifying data and queries: users directly state what information the database contains and what information…
Read more about Explain Network and Relational data models
  • 0

Define deadlock with example

6. Define deadlock with example.   Define deadlock with example In a database, a deadlock is a situation that occurs when two or more different database sessions have some data locked, and each database session requests a lock on the data that another, different, session has already locked. Because the sessions are waiting for each other, nothing can get done, and the sessions just waste time instead. This scenario where nothing happens because of sessions waiting indefinitely for each other is known as deadlock. Database deadlock example:   Suppose we have two database sessions called A and B. Let’s say that session A requests and has a lock on some data – and let’s call the data Y. And then session B has a lock on some data that we will call Z. But now, lets say that session A needs a lock on data Z in order to run another SQL statement, but that lock is currently held by session B. And, let’s say that session B needs a lock on data Y, but that lock is currently held…
Read more about Define deadlock with example
  • 0