Database Normalization Forms and Indexing Techniques
1NF: A table is in 1NF if:
- The domain of each attribute contains only atomic values.
- The value of each attribute contains only a single value from that domain.
Functional Dependency: Y is functionally dependent on X in T if for each set x belonging to R.X there is precisely one corresponding set y belonging to R.Y.
Full Functional Dependency: Y is fully functionally dependent on X in T if Y is functionally dependent on X and Y is not functionally dependent on any proper subset of X.
Insertion Anomaly:
Read MoreInteractive Video with Legends and Resizing
>
—————————————————–
Design Patterns and OCL
Design Patterns
Structural Patterns
– Adapters, Bridges, Facades, and Proxies are variations on a single theme:
- Reduce coupling between two or more classes
- Introduce an abstract class to enable future extensions
– Encapsulate complex structures
Behavioral Patterns
– Here we are concerned with algorithms and the assignment of responsibilities between objects: Who does what?
– Behavioral patterns allow us to characterize complex control flows that are difficult to follow at runtime.
Creational Patterns
– Here
Read MoreLinking, Loading, and Distributed Systems in Operating Systems
I. Linking & Loading
1. Syntactic and Semantic Analysis
The parser performs syntactic and semantic analysis. It can be generated automatically using tools like Yacc or Bison. Parsers are generated based on a grammar, typically in Backus-Naur Form (BNF).
2. Intermediate Code
An example of intermediate code in Java is the ‘.class’ file.
3. Background
The operating system (OS) is responsible for starting programs. For a program to execute, it must be loaded into memory within a process’s address space.
Read MoreUnderstanding Proxy Servers and Email Services
What is a Proxy Cache Server?
A proxy cache server centralizes and controls internet traffic between a local network and the internet. It acts as an intermediary, masking the IP addresses of devices on the local network. The proxy server has two network interfaces:
- One connected to the LAN
- Another connected to the internet
Functions of Proxy Cache Servers:
- Allow web access to devices not directly connected to the internet
- Control web access
- Control traffic between the LAN and internet
- Enhance network security
- Control
Understanding Active Directory, DNS, and Network Security
Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) is an automatic tunneling protocol used by Windows workstation operating systems that emulates an IPv6 link using an IPv4 network.
Active Directory
Active Directory-integrated zones follow a multimaster update model, meaning that all such zones contain a read/write copy of the zone and can make changes to the zone information. Therefore, primary and secondary distinctions are not necessary.
Read More