Posts

How can a local area network (LAN) be secured?

What is the difference between a mobile hotspot and tethering?

How can passwords be stored securely in a database?

what is Decomposition?

secret bloger demo

what is candidate key?

what is composite key?

what is Foreign Key?

what is Primary Key ?

what is Functional Dependency?

what is Boyce-Codd Normal Form (BCNF)?

what is Third Normal Form (3NF)?

what is Second Normal Form (2NF)?

what is First Normal Form (1NF)?

What is Normalization in dbms?

what is graphics?