Database Normalization Forms and Indexing Techniques

1NF: A table is in 1NF if:

  1. The domain of each attribute contains only atomic values.
  2. The value of each attribute contains only a single value from that domain.

Functional Dependency: Y is functionally dependent on X in T if for each set x belonging to R.X there is precisely one corresponding set y belonging to R.Y.

Full Functional Dependency: Y is fully functionally dependent on X in T if Y is functionally dependent on X and Y is not functionally dependent on any proper subset of X.

Insertion Anomaly:

Read More

Interactive Video with Legends and Resizing


>


 



—————————————————–















Read More

Design Patterns and OCL

Design Patterns

Structural Patterns

– Adapters, Bridges, Facades, and Proxies are variations on a single theme:

  • Reduce coupling between two or more classes
  • Introduce an abstract class to enable future extensions

– Encapsulate complex structures

Behavioral Patterns

– Here we are concerned with algorithms and the assignment of responsibilities between objects: Who does what?

– Behavioral patterns allow us to characterize complex control flows that are difficult to follow at runtime.

Creational Patterns

– Here

Read More

Linking, Loading, and Distributed Systems in Operating Systems

I. Linking & Loading

1. Syntactic and Semantic Analysis

The parser performs syntactic and semantic analysis. It can be generated automatically using tools like Yacc or Bison. Parsers are generated based on a grammar, typically in Backus-Naur Form (BNF).

2. Intermediate Code

An example of intermediate code in Java is the ‘.class’ file.

3. Background

The operating system (OS) is responsible for starting programs. For a program to execute, it must be loaded into memory within a process’s address space.

Read More

Understanding Proxy Servers and Email Services

What is a Proxy Cache Server?

A proxy cache server centralizes and controls internet traffic between a local network and the internet. It acts as an intermediary, masking the IP addresses of devices on the local network. The proxy server has two network interfaces:

  • One connected to the LAN
  • Another connected to the internet

Functions of Proxy Cache Servers:

  • Allow web access to devices not directly connected to the internet
  • Control web access
  • Control traffic between the LAN and internet
  • Enhance network security
  • Control
Read More

Understanding Active Directory, DNS, and Network Security

Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)

Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) is an automatic tunneling protocol used by Windows workstation operating systems that emulates an IPv6 link using an IPv4 network.

Active Directory

Active Directory-integrated zones follow a multimaster update model, meaning that all such zones contain a read/write copy of the zone and can make changes to the zone information. Therefore, primary and secondary distinctions are not necessary.

Read More