Moumita

Moumita

113 Articles Published

Articles by Moumita

Page 10 of 12

Difference between ACL and SCO Link in Bluetooth

Moumita
Moumita
Updated on 11-Sep-2020 6K+ Views

Two types of data links are defined by Bluetooth link layers−Synchronous Connection Oriented (SCO) LinkAsynchronous Connection-Less (ACL) LinkSCO is a symmetric, point-to-point link between the master device and the slave device connected via Bluetooth.ACL is a point – to – multipoint link for transmitting general data packets using Bluetooth connection. ACL is used for irregular traffic between a master device and one or more slave devices.Differences between SCO and ACLSCOACL1SCO provides a circuit switched connection, where a dedicated, point-to-point link is established between the master device and the slave device before communication starts.ACL is a packet oriented link, i.e. the ...

Read More

After updating any value in a particular view, will MySQL updates the same in the base table and its associated views (if any)?

Moumita
Moumita
Updated on 22-Jun-2020 149 Views

Yes, MySQL will update the value, if it is updated in a view, in the base table as well as in its associated views. To illustrate it we are taking the example of table Student_info having the following data −mysql> Select * from student_info; +------+---------+------------+------------+ | id   | Name    | Address    | Subject    | +------+---------+------------+------------+ | 101  | YashPal | Amritsar   | History    | | 105  | Gaurav  | Chandigarh | Literature | | 125  | Raman   | Shimla     | Computers  | | NULL | Ram     | Jhansi   ...

Read More

What are the privileges required to use triggers?

Moumita
Moumita
Updated on 22-Jun-2020 300 Views

We must have SUPER privileges to create or destroy triggers with the help of a CREATE or DROP statement. Other than that if the triggered statements use OLD or NEW then there are some additional privileges as follows which we require −To assign the value of a column with SET NEW.column_name = value then we must have the UPDATE privilege for the column.To use NEW.column_name in an expression to refer to the new value of a column, we must have the SELECT privilege for the column.

Read More

How can we get some starting number of characters from the data stored in a MySQL table's column?

Moumita
Moumita
Updated on 22-Jun-2020 190 Views

To get some starting number of characters from the data stored in the MySQL table’s column, we can use MySQL LEFT() function. It will return the number of characters specified as its argument. We need to provide the name of the column, having the particular record from which we want to get starting characters, as its first argument. To demonstrate it we are taking the example of a table named ‘examination_btech’ having the following examination details of students −mysql> Select * from examination_btech; +-----------+----------+--------+ | RollNo | Name | Course | +-----------+----------+--------+ | ...

Read More

How can we insert a new row into a MySQL table?

Moumita
Moumita
Updated on 20-Jun-2020 1K+ Views

With the help of INSERT INTO command, a new row can be inserted into a table.SyntaxINSERT INTO table_name values(value1, value2, …)ExampleSuppose we have a table named ‘Employee’ with three columns ‘Emp_id’, ‘Emp_name’ and ‘Emp_Sal’ then with the help of following query we can add new rows to the table −mysql> INSERT INTO Employee values(110, 'Aarav', 50000); Query OK, 1 row affected (0.07 sec) mysql> INSERT INTO Employee values(200, 'Raman', 28000); Query OK, 1 row affected (0.10 sec) mysql> Select * from Employee; +---------+-------------+-----------+ | Emp_id  | Emp_name    | Emp_sal   | +---------+-------------+-----------+ | 110     |Aarav ...

Read More

Best practice for variable and method naming in Java

Moumita
Moumita
Updated on 17-Jun-2020 744 Views

All Java components require names. Names used for classes, variables and methods are called identifiers. In Java, there are several points to remember about identifiers. They are as follows -All identifiers should begin with a letter (A to Z or a to z), currency character ($) or an underscore (_). After the first character, identifiers can have any combination of characters.A keyword cannot be used as an identifier. Most importantly, identifiers are case sensitive. Examples of legal identifiers: age, $salary, _value, __1_value. Examples of illegal identifiers: 123abc, -salary.

Read More

EPC Gen 2 Tag Identification Layer

Moumita
Moumita
Updated on 03-Jun-2020 780 Views

Tag identification layer of Electronic Product Code (EPC) Gen 2 lays down the method by which the readers can receive the identifiers from the tags. EPC Gen 2 (second generation) RFID (Radio Frequency Identification) network has two main components, tags and readers. RFID tags are affixed on objects with EPC encoded on them for identification. EPC helps to check identities of objects like inventory, assets and people, and track them. Readers are the intelligent part of the system that tracks the tags. The tag identification layer addresses the multiple access problem of getting messages from unknown number of tags.Working PrincipleIn ...

Read More

What is backscatter?

Moumita
Moumita
Updated on 03-Jun-2020 2K+ Views

Backscatter is a method that uses an incident radio-frequency (RF) signal to transmit data without a battery or power source. It employs passive reflection and modulation of the incoming RF signal, and converts it into tens or hundreds of microwatts of electricity, that can be encoded for data communications.It differs from other wireless communications since the communication is half duplex in nature, i.e. both the sender and receiver cannot transmit simultaneously. The mains advantage of backscattering is that it’s low energy requirements and low complexity of deployment.Architecture of backscatter communicationsA basic backscatter communication system has two main components: tags, and ...

Read More

EPC Gen 2 Physical Layer

Moumita
Moumita
Updated on 03-Jun-2020 647 Views

Physical layer of Electronic Product Code (EPC) Gen 2 defines method of transmission of bits across the network. EPC is a universal identifier encoded on RFID (Radio Frequency Identification) tags to check identities of objects like inventory, assets and people, and track them. The second generation of this technology, as laid down by EPCglobal Tag Data Standard, is called EPC Gen 2.EPC Gen 2 RFID network has two main components, tags and readers. Tags are affixed on objects that enables them to be identified or tracked. Readers are the intelligent part of the system that tracks the tags. The physical ...

Read More

EPC Gen 2 Architecture

Moumita
Moumita
Updated on 03-Jun-2020 847 Views

EPC or Electronic Product Code is a universal identifier that are encoded on RFID (Radio Frequency Identification) tags to check identities of objects like inventory, assets and people, and track them. The second generation of this technology, as laid down by EPCglobal Tag Data Standard, is called EPC Gen 2.The architecture of EPC Gen 2, RFID network has two main components −Tags or labels − They are affixed on objects so that they can be identified or tracked.Readers or interrogators − They are the intelligent part of the system that tracks the tags.The architecture is shown as below −RFID tags ...

Read More
Showing 91–100 of 113 articles
« Prev 1 8 9 10 11 12 Next »
Advertisements