Database Objectives and Architecture: A Comprehensive Look

Objectives of a Database

  • Data Independence: Ensuring independence between data and the applications that use them. This includes:
    • Physical Independence: The ability to modify the physical schema without affecting the higher levels.
    • Logical Independence: Changes to the conceptual schema do not necessitate modifications to application programs.
  • Minimal Data Redundancy: Minimizing unnecessarily repeated data to avoid inconsistencies. Providing mechanisms to monitor operations on the database.
  • Versatility
Read More

Understanding Access Control in C++ Inheritance

Protected Members

A protected member is inaccessible to all clients at all levels. If a protected data member is inherited, it is not accessible to the clients of this derived class, no matter what the access control is.

Protected items are things you need to write your functions, but you do not want any client to know about. For example, ListError.

Example

  • class base

    • private a // base’s client cannot use; cannot be passed down either
    • protected b // base’s client cannot use; can be passed down
    • public c
Read More

QBA 1720 Exam 2: Key Concepts & Excel Functions

QBA 1720 Exam 2 Note Sheet

Key Concepts and Formulas

  1. Measures of Central Tendency:

    • Mean (Average): =AVERAGE(range)

    • Median: =MEDIAN(range)

    • Mode: =MODE.SNGL(range)

  2. Measures of Variability:

    • Standard Deviation: =STDEV.S(range)

    • Variance: =VAR.S(range)

    • 68-95 Rule:

      1. 68% of data is within 1 standard deviation.

      2. 95% of data is within 2 standard deviations.

  3. COUNTIFS Function:

    • Counts based on multiple conditions: =COUNTIFS(criteria_range1,criteria1,[criteria_range2,criteria2],…)

    • Example: Count the number of students who

Read More

Public and Private Keys: Understanding Encryption and Security

Public and Private Keys: Understanding Encryption

Public Key

The encryption key is shared publicly with many people. However, only the person or company that created the key can decrypt the information.

Private Key

The creator is the only one who knows how to encode and decode. They can only read or hide the information from those to whom they provide instructions.

Symmetric and Asymmetric Encryption: Main Problems

Symmetric Encryption

  • Requires a secure channel for key exchange.
  • Does not guarantee authenticity
Read More

Understanding Operating Systems: Functions and Usage

An operating system is a program or set of programs that allows you to manage the resources of a computer. It starts working when you turn on the computer, enabling user interaction. The operating system manages the installation, configuration, usage, and maintenance of software and computer hardware. There are two main types:

  • Windows: A commercial operating system owned by Microsoft. They have developed a family of operating systems that have evolved over time.
  • Linux: A free and open-source operating
Read More

Pioneers and Key Concepts in Computing and Technology

Blaise Pascal: Computing Pioneer

Blaise Pascal was a mathematician, physicist, French philosopher, and theologian, considered one of the fathers of computing. He strongly influenced the development of modern economics and social sciences, creating mechanical calculators and contributing to the mathematical theory of probability. He died at the age of 39.

The Pascaline: An Early Calculator

The Pascaline, invented by Pascal, was the first prototype calculator. However, it was not very efficient, and

Read More