To check if a number is divisible by2 or not, you need to first find the remainder.If the remainder of the number when it is divided by 2 is 0, then it would be divisible by 2.Let’s say our number is 10, we will check it using the following if-else −// checking if the number is divisible by 2 or not if (num % 2 == 0) { Console.WriteLine("Divisible by 2 "); } else { Console.WriteLine("Not divisible by 2"); }The following is an example to find whether the number is divisible by 2 or not −Example Live Demousing System; ... Read More
Database SecurityDatabase security has many different layers, but the key aspects are:AuthenticationUser authentication is to make sure that the person accessing the database is who he claims to be. Authentication can be done at the operating system level or even the database level itself. Many authentication systems such as retina scanners or bio-metrics are used to make sure unauthorized people cannot access the database.AuthorizationAuthorization is a privilege provided by the Database Administer. Users of the database can only view the contents they are authorized to view. The rest of the database is out of bounds to them.The different permissions for ... Read More
A centralized database is stored at a single location such as a mainframe computer. It is maintained and modified from that location only and usually accessed using an internet connection such as a LAN or WAN. The centralized database is used by organisations such as colleges, companies, banks etc.As can be seen from the above diagram, all the information for the organisation is stored in a single database. This database is known as the centralized database.AdvantagesSome advantages of Centralized Database Management System are −The data integrity is maximised as the whole database is stored at a single physical location. This ... Read More
A relationship is an important part of any Entity relationship diagram as it shows the relation between two different entities. In an n - ary relationship, the n shows the number of entities in the relationship. It can be anything but the most popular relationships are unary, binary and ternary where the number of entities respectively are one, two and three.More information about Unary, Binary and Ternary relationships is as follows −Unary RelationshipWhen there is a relationship between two entities of the same type, it is known as a unary or recursive relationship. This means that the relationship is between ... Read More
process Burst time A 4 B 1 C 8 D 1time slice=10 unitA B C D A C C C 0 2 3 5 6 8 10 12 14So A will complete 8 cycles.
The different types of functions in Oracle are −Oracle String FunctionsOracle Numeric FunctionsOracle Date FunctionsMore details about these functions are given as follows −Oracle String FunctionsThe following are the Oracle String Functions −ASCII(str)This function returns the ASCII or numeric value of the first word in the string str provided. If it is an empty string, it returns 0. For example:SQL> SELECT ASCII('Apple'); +---------------------------------------------------------+ | ASCII('Apple') | +---------------------------------------------------------+ | 65 | +---------------------------------------------------------+ 1 row in set (0.00 sec)This returns the ASCII value of A i.e. 65 as it is the first character in the string.CONCAT(str1, str2…..strn)This function returns the string that ... Read More
In a distributed database management system, the database is not stored at a single location. Rather, it may be stored in multiple computers at the same place or geographically spread far away. Despite all this, the distributed database appears as a single database to the user. A diagram to better explain this is as follows:As seen in the figure, the components of the distributed database can be in multiple locations such as India, Canada, Australia, etc. However, this is transparent to the user i.e the database appears as a single entity.Types of Distributed Database Management SystemThe following are the types ... Read More
Locks are an integral part to maintain concurrency control in DBMS. A transaction in any system implementing lock based concurrency control cannot read or write a statement until it has obtained the required locks.There are two types of locks in Lock based protocols. These are:Binary Locks - These can only be in one of two states, locked or unlocked.Shared/Exclusive Locks - Shared locks are acquired when only read operation is to be performed. Shared locks can be shared between multiple transactions as there is no data being altered. Exclusive locks are used when write operation is performed. Only the transaction holding the ... Read More
While exporting the data from MySQL table to a text file we can use ‘FIELDS TERMINATED BY’, ‘ENCLOSED BY’, ‘LINES TERMINATED BY’ and other options too to put the values of fields in different settings of the text file. It can be illustrated with the help of the following example −ExampleSuppose we are having following data from table ‘Student_info’ −mysql> Select * from Student_info; +------+---------+------------+------------+ | id | Name | Address | Subject | +------+---------+------------+------------+ | 101 | YashPal | Amritsar | History | | 105 | Gaurav | Chandigarh | Literature | | ... Read More
In C#, a structure is a value type data type. It helps you to make a single variable hold related data of various data types. The struct keyword is used for creating a structure.When you define a class, you define a blueprint for a data type.The following are the differences between classes and structures in C# −Classes are reference types and structs are value typesUnlike classes, structures cannot inherit other structures or classes.Structures cannot be used as a base for other structures or classes.When you create a struct object using the New operator, it gets created and the appropriate constructor ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP