Skip to main content

Posts

Showing posts from May, 2018

OnePlus Nord2 5g review

OnePlus Nord 2 is an upcoming mobile by OnePlus. The phone is rumored to come with a 6.43-inch touchscreen display. OnePlus Nord 2 is expected to be powered by an octa-core MediaTek Dimensity 1200 processor and come with 8GB of RAM. The OnePlus Nord 2 is rumoured to run Android 11 and is expected to be powered by a 4500mAh battery. As far as the cameras are concerned, the OnePlus Nord 2 is rumored to pack a triple camera setup featuring a 50-megapixel primary camera; an 8-megapixel camera, and a 2-megapixel camera. The rear camera setup has autofocus. It is rumored to sport a single camera setup for selfies, a 32-megapixel primary camera. OnePlus Nord 2 is based on Android 11 and packs 128GB of inbuilt storage. The OnePlus Nord 2 is tipped to be a dual-SIM (GSM and GSM) mobile that will accept Nano-SIM and Nano-SIM cards. Connectivity options on the OnePlus Nord 2 are said to include Wi-Fi 802.11 a/b/g/n/ac/Yes, GPS, USB Type-C, 3G, and 4G (with support for Band 40 used by some LTE net

How can a local area network (LAN) be secured?

There are many different ways to provide security for local area networks (LANs). Many of these apply to the common types of hardware that are used for these small, local network setups. One common strategy is to install a firewall resource behind a single access point, such as an initial wireless router. It’s also appropriate to use specific security protocols like WPA or WPA2 for password encryption on traffic coming in from the internet. Designers may also want to secure other routers and switches that serve different parts of the network. Administrators can also filter traffic using a detailed knowledge of trusted network areas. Many of these strategies rely on specialized authentication policies where network traffic is scrutinized to prevent different kinds of unauthorized access. Some can use "tunnel" technologies like VPN or otherwise lock down various access points for more precision control. Users can also control security, i.e. control packets, through diff

What is the difference between a mobile hotspot and tethering?

Mobile  hotspots  and  tethering  services offer similar results for users, but work a little bit differently. A mobile hotspot is an offering by various  telecom  providers that consists of an adapter or device that allows computer users to hook up to the internet from wherever they happen to be. Mobile hotspots are advertised as an alternative to the traditional practice of logging onto a  local area network  or other  wireless network from a PC. Although mobile hotspots could be used for other kinds of devices, they are most commonly associated with laptop computers, because laptop computers are a type of "hybrid" device that may roam, but doesn’t usually come with built-in mobile  Wi-Fi . Tethering is slightly different. A tethering strategy involves connecting one device without Wi-Fi to another device that has Wi-Fi connectivity. For example, a user could tether a laptop to a  smartphone  through cabling or through a wireless connection. This would allow for using

How can passwords be stored securely in a database?

The issue of storing passwords in a database is one that requires looking closely at data encryption and  security protocols  that will stop these valuable pieces of data from being hacked or stolen. Experts have come up with some fairly reliable standards for keeping stored passwords in a database more secure. In addition to principles and strategies for password protection, it helps to promote the use of relatively strong passwords that resist easy guesses by hackers. In addition, engineers and administrators must look at the vulnerability of traffic coming into or out of a database, to prevent different types of password theft. One fundamental part of password security, in terms of database storage, is called a  hash function . A hash function is a complex function that changes a text password into a more complex set of characters by using more complex operations than a familiar mathematical operation such as multiplication. Using hashes and  hexadecimal  formats can help thos

what is Decomposition?

Decomposition  in DBMS is nothing but another name for  Normalization . Decomposition  or  Normalization  is a systematic way of ensuring that a database structure is suitable for general-purpose querying and free of certain undesirable characteristics—insertion, update, and deletion anomalies—that could lead to a loss of data integrity

secret bloger demo

A L superkey is a combination of columns that uniquely identifies any row within a relational database management system (RDBMS) table. A candidate key is a closely related concept where the superkey is reduced to the minimum number of columns required to uniquely identify each row. # First Last Handle 1 Mark Otto @mdo 2 Jacob Thornton @fat 3 Larry the Bird @twitter First Name Last Name Hero Title Bruce Wayne Batman Peter Parker Spiderman Bruce Banner The Hulk Clark Kent Superman Button Small Button Medium Button Large Demo Button Demo Button Demo Button Download Button Download Button Download Button

what is candidate key?

A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. This is usually the best among the candidate keys to use for identification. When a key is composed of more than one column, it is known as a composite key.

what is composite key?

A composite key , in the context of relational databases, is a combination of two or more columns in a table that can be used to uniquely identify each row in the table. Uniqueness is only guaranteed when the columns are combined; when taken individually the columns do not guarantee uniqueness.

what is Foreign Key?

A  foreign key  (FK) is a column or combination of columns that is  used to  establish and enforce a link between the data in two tables. You can create a  foreign key  by defining a  FOREIGN KEY  constraint when you create or modify a table.

what is Primary Key ?

A primary key is a special relational database table column (or combination of columns) designated to uniquely identify all table records. A primary key’s main features are: It must contain a unique value for each row of data. It cannot contain null values. A primary key is either an existing table column or a column that is specifically generated by the database according to a defined sequence.

what is Functional Dependency?

Functional dependency is a relationship that exists when one attribute uniquely determines another attribute. If R is a relation with attributes X and Y, a functional dependency between the attributes is represented as X->Y, which specifies Y is functionally dependent on X. Here X is a determinant set and Y is a dependent attribute. Each value of X is associated with precisely one Y value. Functional dependency in a database serves as a constraint between two sets of attributes. Defining functional dependency is an important part of relational database design and contributes to aspect normalization.

what is Boyce-Codd Normal Form (BCNF)?

Boyce-Codd Normal Form (BCNF) is one of the forms of database normalization. A database table is in BCNF if and only if there are no non-trivial functional dependencies of attributes on anything other than a superset of a candidate key.  BCNF is also sometimes referred to as 3.5NF, or 3.5 Normal Form.

what is Third Normal Form (3NF)?

Third normal form (3NF) is the third step in normalizing a database and it builds on the first and second normal forms, 1NF and 2NF. 3NF states that all column reference in referenced data that are not dependent on the primary key should be removed. Another way of putting this is that only foreign key columns should be used to reference another table, and no other columns from the parent table should exist in the referenced table.

what is graphics?

A graphic is an image or visual representation of an object. Therefore, computer graphics are simply images displayed on a computer screen. Graphics are often contrasted with text, which is comprised of characters, such as numbers and letters, rather than images. Computer graphics can be either two or three-dimensional. Early computers only supported 2D monochrome graphics, meaning they were black and white (or black and green, depending on the monitor). Eventually, computers began to support color images. While the first machines only supported 16 or 256 colors, most computers can now display graphics in millions of colors. 2D graphics come in two flavors — raster and vector. Raster graphics are the most common and are used for digital photos, Web graphics, icons, and other types of images. They are composed of a simple grid of pixels, which can each be a different color. Vector graphics, on the other hand are made up of paths, which may be lines, shapes, letters, or other scal