Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Kristi Castro
Page 7 of 8
Bootstrap 4 .border-right-0 class
Use the border-right-0 class in Bootstrap to remove the right border.To remove the right border − Rectangle is missing the right border. Style the div as −.mystyle { width: 350px; height: 170px; margin: 10px; }You can try to run the following code to implement the border-right- 0 class −Example Bootstrap Example .mystyle { width: 350px; height: 170px; margin: 10px; } Heading Two Rectangle is missing the right border.
Read MoreBootstrap Event when the modal is about to be hidden
The hide.bs.modal event in Bootstrap fires when the modal is about to be hidden.Firstly, hide the Bootstrap modal on button click −$("#button1").click(function(){ $("#newModal").modal("hide"); });Now, use the hide.bs.modal class and generate the alert when the modal is about to hide on button click −$("#newModal").on('hide.bs.modal', function () { alert('The modal is about to be hidden.'); });Let us see an example stating the usage of hide.bs.modal event −Example Bootstrap Example #button1 { width: ...
Read MoreDisplay flex items vertically in Bootstrap 4
To display flex items vertically, use the flex-column class in Bootstrap 4 −Now set the flex-items in it − One Two Three Four Five Let us see an example to learn how to learn how to display flex-column class − Example Bootstrap Example Example of Flex Column Stating the usage of flex column class: One Two Three Four Five
Read MoreHow to validate email using jQuery?
To validate email using jQuery, use the regex pattern. You can try to run the following code to learn how to validate email using jQuery −Example $(document).ready(function() { $('.error').hide(); $('#submit').click(function(){ var name = $('#name').val(); var email = $('#email').val(); if(name== ''){ $('#name').next().show(); return false; } if(email== ''){ $('#email').next().show(); ...
Read MoreThree Level Architecture of Database
The ANSI-SPARC database architecture is the basis of most of the modern databases.The three levels present in this architecture are Physical level, Conceptual level and External level.The details of these levels are as follows −Physical LevelThis is the lowest level in the three level architecture. It is also known as the internal level. The physical level describes how data is actually stored in the database. In the lowest level, this data is stored in the external hard drives in the form of bits and at a little high level, it can be said that the data is stored in files ...
Read MoreWhat are Shell Commands?
The shell is the command interpreter on the Linux systems. It the program that interacts with the users in the terminal emulation window. Shell commands are instructions that instruct the system to do some action.Some of the commonly used shell commands are −basenameThis command strips the directory and suffix from filenames. It prints the name of the file with all the leading directory components removed. It also removes a trailing suffix if it is specified.Example of basename is as follows −$ basename country/city.txtThis gets the name of the file i.e. city which is present in folder country.city.txtcatThis command concatenates and ...
Read MoreSecurity, Integrity and Authorization in DBMS
Database SecurityDatabase security has many different layers, but the key aspects are:AuthenticationUser authentication is to make sure that the person accessing the database is who he claims to be. Authentication can be done at the operating system level or even the database level itself. Many authentication systems such as retina scanners or bio-metrics are used to make sure unauthorized people cannot access the database.AuthorizationAuthorization is a privilege provided by the Database Administer. Users of the database can only view the contents they are authorized to view. The rest of the database is out of bounds to them.The different permissions for ...
Read MoreLimitations of Database Management System
Database Management System is quite useful compared to the file based management system. However, it does have some disadvantages. Some of those are as follows −More CostlyCreating and managing a database is quite costly. High cost software and hardware is required for the database. Also highly trained staff is required to handle the database and it also needs continuous maintenance. All of these ends up making a database quite a costly venture.High ComplexityA Database Management System is quite complex as it involves creating, modifying and editing a database. Consequently, the people who handle a database or work with it need ...
Read MoreFile-based Data Management System
The systems that are used to organize and maintain data files are known as file based data systems. These file systems are used to handle a single or multiple files and are not very efficient. FunctionalitiesThe functionalities of a File-based Data Management System are as follows −A file based system helps in basic data management for any user.The data stored in the file based system should remain consistent. Any transactions done in the file based system should not alter the consistency property. The file based system should not allow any illegal or potentially hazardous operations to occur on the data.The file based ...
Read MoreWhy do we need a Database
A database is a collection of data, usually stored in electronic form. A database is typically designed so that it is easy to store and access information.A good database is crucial to any company or organisation. This is because the database stores all the pertinent details about the company such as employee records, transactional records, salary details etc.The various reasons a database is important are −Manages large amounts of dataA database stores and manages a large amount of data on a daily basis. This would not be possible using any other tool such as a spreadsheet as they would simply ...
Read More