This document provides an overview of database management systems (DBMS). It discusses DBMS architecture, data models including entity-relationship and relational models, data schemas, data independence, and the entity-relationship model. It also covers relational data modeling, Codd's 12 rules for relational databases, and mapping from entity-relationship diagrams to relational schemas. The intended audience is computer science graduates and prerequisites include basic computer concepts.
Data Structures and Algorithms (DSA) Tutorial for Beginners - Learn Data Structures and Algorithm using c, C++ and Java in simple and easy steps starting from basic to advanced concepts with examples
This document provides an overview of cryptography. It begins by explaining the origins of cryptography in ancient civilizations and how it has evolved over time. It then discusses the components of a cryptosystem, including plaintext, encryption/decryption algorithms and keys. Finally, it outlines different types of cryptosystems and their basic functions in encrypting and decrypting data to provide confidentiality during transmission.
This document provides an overview of data communication and computer networks. It discusses different types of computer networks including personal area networks (PAN), local area networks (LAN), metropolitan area networks (MAN), wide area networks (WAN) and internetworks. It also describes common LAN technologies like Ethernet, Fast Ethernet and Gigabit Ethernet. Additionally, it covers various network topologies, models, security aspects and layers of the OSI model.
This document provides an overview of wireless communication. It discusses key topics such as features of wireless communication including transmission distance and applications. It also outlines some advantages of wireless communication such as mobility and lack of need for wires. Finally, it introduces various terms used in mobile telephony and multiple access techniques including FDMA, TDMA, CDMA and more that allow multiple users to access the network simultaneously.
Hibernate is an object-relational mapping tool for Java that takes care of mapping Java classes to database tables. It provides a simple API for storing and retrieving objects and handles common data persistence tasks. The core classes in Hibernate's architecture include Configuration, SessionFactory, and Session. Configuration handles configuration files and mappings. SessionFactory is a thread-safe object that is used to create Session instances. Session represents a conversation between the application and the database.
Data communications refers to the transmission of this digital data between two or more computers and
a computer network or data network is a telecommunications network that allows computers to
exchange data. The physical connection between networked computing devices is established using
either cable media or wireless media. The best-known computer network is the Internet.
This tutorial will teach you basics of Data Communication and Computer Network (DCN) and will also
take you through various advance concepts related to Data Communication and Computer Network.
Computer Organization refers to the level of abstraction above the digital logic level, but below the operating system level.
At this level, the major components are functional units or subsystems that correspond to specific pieces of hardware built
from the lower level building blocks described in the previous module.
This tutorial gives a complete understanding on Computer Logical Organization starting from basic computer overview till its
advanced architecture
IntelliJ IDEA is a powerful and popular integrated development environment for Java. This tutorial provides an introduction to IntelliJ IDEA, including how to install and configure it, get familiar with its visual elements and settings, and create a first Java project. It also discusses deeper features like projects, modules, libraries, and build tools integration.
MyBatis is a persistence framework that automates mapping between SQL databases and objects in Java. This tutorial provides an overview of MyBatis and teaches how to perform CRUD operations using MyBatis including configuration files, mapping files, POJOs, and Java code. It also covers more advanced topics like annotations, stored procedures, and dynamic SQL.
This document provides an overview and tutorial for Hibernate, an open source object-relational mapping tool for Java. It begins with introductions to object-relational mapping, Hibernate's advantages, architecture, and environment setup. The bulk of the document then covers configuring Hibernate, using sessions to manage persistence, mapping Java objects to database tables, and examples of implementing different types of associations.
MongoDB is an open-source document database that provides high performance and scalability. It uses collections and documents where collections are groups of documents and documents are sets of key-value pairs that can have different fields. MongoDB has databases which contain collections and each database gets its own set of files.
Mj example case_study_layout_intro_completedqhccit
This document provides a case study report on evaluating the computer system at Hillcrest Christian College. It includes questionnaires from an IT technician, teacher, and student that provide perspectives on the current state of the computer system. The report first gives an overview of the system, including its purpose, hardware, software, networking, and human considerations. It then provides recommendations for potential improvements in each of these areas. The evaluation concludes that while the system generally supports the college's goals well, some upgrades could allow it to better exploit new technologies and fulfill its purpose into the future.
Kaaahwa Armstrong completed a field attachment at Uganda Broadcasting Corporation (UBC) from June to August 2016. During this time, they worked under the supervision of several managers in the IT department. Their duties included networking tasks like cable termination, router configuration, and setting up local area networks. They also installed and configured operating systems, databases, and websites. Through hands-on experience with computer repair, networking, and software installation, Armstrong gained valuable practical skills to supplement their university computer science education. While the attachment provided valuable learning opportunities, challenges included limited equipment and understanding new technical concepts. Overall, the internship helped Armstrong apply their academic knowledge in a real-world work environment.
Please turn on the main power switch now.
Student: *turns on main power switch*
Instructor: Thank you. Now please turn on the Gateway power switch.
Student: *turns on Gateway power switch*
Instructor: Great, now the system should be booting up. Let's give it a few moments. While we wait, are there any other questions so far?
Once the system is fully booted, the touch panel will be ready for use. Let's try turning on the projector using the touch panel. Please select the "Projector" button now.
Student: *selects Projector button on touch panel*
Instructor: Excellent! You've now
This document provides a participant guide for an online training session titled "Creating Movement & Momentum in the Virtual Classroom". The guide includes information on objectives, activities, tools, and instructions. It outlines 6 activities to help participants interact and collaborate in virtual classrooms. The activities utilize tools like audio breakout rooms, file sharing, and annotation tools to move participation beyond a passive experience.
This document is the technical reference manual for Oracle HRMS Release 11i. It provides information about the underlying database structure of Oracle HRMS, including database diagrams, lists of tables and views, and detailed descriptions of each table and view. The manual is intended to help technical users integrate Oracle HRMS with other systems, write custom reports, and access Oracle HRMS data. It explains how to use the manual properly and provides examples of common tasks it can be used for, such as identifying relevant tables for an integration project or report. The manual also describes how not to use it, such as for planning modifications to Oracle HRMS or writing data directly into non-interface tables.
The document outlines 10 steps for selecting a learning management system (LMS): 1) conducting an LMS needs assessment, 2) researching LMS vendors, 3) conducting vendor demonstrations, 4) narrowing the list of vendors, 5) developing and distributing a request for proposal, 6) preparing the company for change, 7) evaluating proposals and shortlisting vendors, 8) conducting final vendor presentations and selecting a vendor, 9) negotiating contracts and service agreements, and 10) getting ready for implementation. The first step of conducting an LMS needs assessment involves identifying requirements, stakeholders, and success metrics through interviews and analysis.
Here are some tips for interviewees:
- Research the company beforehand so you can speak intelligently about them and the role. Understand their mission, values, products/services and culture.
- Have a few stories prepared from your background that highlight relevant experiences and skills for the role. Practice telling them concisely.
- Dress professionally and make eye contact with the interviewer. Smile and be friendly.
- Listen carefully to questions and take a moment to think before answering. Address what the interviewer is asking.
- Ask questions too. Prepare a few in advance that show your interest in the company and role.
- Bring copies of your resume and a notepad/pen
The document provides an overview of the training organization Zone24x7. It describes Zone24x7 as a technological company that provides hardware and software solutions. It details Zone24x7's organizational structure, products and services, partners and clients, and an assessment of its current position including strengths, weaknesses and suggestions. The training experience involved working on various software development projects at Zone24x7 to gain exposure to tools, technologies and company practices.
The document provides an overview of database management systems and related concepts. It discusses the characteristics of DBMS, including storing data in a structured way to facilitate retrieval and manipulation. It also describes the main users of a DBMS, including administrators, designers, and end users. Additionally, it outlines the common 3-tier architecture of a DBMS, separating the database, application, and user tiers.
The document provides an overview of database management systems (DBMS). It discusses that a DBMS stores and retrieves user data with efficiency and security. It has a 3-tier architecture with the database tier containing the database and query processing, the logical tier containing business logic, and the presentation tier for user interfaces. The document also covers data models, schemas, normalization, transactions, concurrency control, and other DBMS concepts.
The document provides an overview of database management systems (DBMS). It discusses that a DBMS stores and retrieves user data with efficiency and security. It has a 3-tier architecture with the database tier containing the database and query processing, the logical tier containing business logic, and the presentation tier for user interfaces. The document also covers data models, schemas, normalization, transactions, and other core DBMS concepts.
This document provides an overview of data communication and computer networks. It discusses different types of computer networks including personal area networks (PAN), local area networks (LAN), metropolitan area networks (MAN), wide area networks (WAN) and internetworks. It also describes common LAN technologies like Ethernet, Fast Ethernet and Gigabit Ethernet. Additionally, it covers various network topologies, models, security aspects and layers of the OSI model.
This document provides an overview of data communication and computer networks. It discusses different types of computer networks including personal area networks (PAN), local area networks (LAN), metropolitan area networks (MAN), wide area networks (WAN) and internetworks. It also describes common LAN technologies like Ethernet, Fast Ethernet and Gigabit Ethernet. Additionally, it covers various network topologies, models, security aspects and layers of the OSI model.
Data communication computer_network_tutorialMaulen Bale
This document provides an overview of data communication and computer networks. It discusses different types of computer networks including personal area networks (PAN), local area networks (LAN), metropolitan area networks (MAN), wide area networks (WAN) and internetworks. It also describes common LAN technologies like Ethernet, Fast Ethernet and Gigabit Ethernet. Additionally, it covers various network topologies and the layered network model including the OSI model and TCP/IP model. The document serves as an introduction to data communication and computer networks.
Computer Organization refers to the level of abstraction above the digital logic level, but below the operating system level.
At this level, the major components are functional units or subsystems that correspond to specific pieces of hardware built
from the lower level building blocks described in the previous module.
This tutorial gives a complete understanding on Computer Logical Organization starting from basic computer overview till its
advanced architecture
IntelliJ IDEA is a powerful and popular integrated development environment for Java. This tutorial provides an introduction to IntelliJ IDEA, including how to install and configure it, get familiar with its visual elements and settings, and create a first Java project. It also discusses deeper features like projects, modules, libraries, and build tools integration.
MyBatis is a persistence framework that automates mapping between SQL databases and objects in Java. This tutorial provides an overview of MyBatis and teaches how to perform CRUD operations using MyBatis including configuration files, mapping files, POJOs, and Java code. It also covers more advanced topics like annotations, stored procedures, and dynamic SQL.
This document provides an overview and tutorial for Hibernate, an open source object-relational mapping tool for Java. It begins with introductions to object-relational mapping, Hibernate's advantages, architecture, and environment setup. The bulk of the document then covers configuring Hibernate, using sessions to manage persistence, mapping Java objects to database tables, and examples of implementing different types of associations.
MongoDB is an open-source document database that provides high performance and scalability. It uses collections and documents where collections are groups of documents and documents are sets of key-value pairs that can have different fields. MongoDB has databases which contain collections and each database gets its own set of files.
Mj example case_study_layout_intro_completedqhccit
This document provides a case study report on evaluating the computer system at Hillcrest Christian College. It includes questionnaires from an IT technician, teacher, and student that provide perspectives on the current state of the computer system. The report first gives an overview of the system, including its purpose, hardware, software, networking, and human considerations. It then provides recommendations for potential improvements in each of these areas. The evaluation concludes that while the system generally supports the college's goals well, some upgrades could allow it to better exploit new technologies and fulfill its purpose into the future.
Kaaahwa Armstrong completed a field attachment at Uganda Broadcasting Corporation (UBC) from June to August 2016. During this time, they worked under the supervision of several managers in the IT department. Their duties included networking tasks like cable termination, router configuration, and setting up local area networks. They also installed and configured operating systems, databases, and websites. Through hands-on experience with computer repair, networking, and software installation, Armstrong gained valuable practical skills to supplement their university computer science education. While the attachment provided valuable learning opportunities, challenges included limited equipment and understanding new technical concepts. Overall, the internship helped Armstrong apply their academic knowledge in a real-world work environment.
Please turn on the main power switch now.
Student: *turns on main power switch*
Instructor: Thank you. Now please turn on the Gateway power switch.
Student: *turns on Gateway power switch*
Instructor: Great, now the system should be booting up. Let's give it a few moments. While we wait, are there any other questions so far?
Once the system is fully booted, the touch panel will be ready for use. Let's try turning on the projector using the touch panel. Please select the "Projector" button now.
Student: *selects Projector button on touch panel*
Instructor: Excellent! You've now
This document provides a participant guide for an online training session titled "Creating Movement & Momentum in the Virtual Classroom". The guide includes information on objectives, activities, tools, and instructions. It outlines 6 activities to help participants interact and collaborate in virtual classrooms. The activities utilize tools like audio breakout rooms, file sharing, and annotation tools to move participation beyond a passive experience.
This document is the technical reference manual for Oracle HRMS Release 11i. It provides information about the underlying database structure of Oracle HRMS, including database diagrams, lists of tables and views, and detailed descriptions of each table and view. The manual is intended to help technical users integrate Oracle HRMS with other systems, write custom reports, and access Oracle HRMS data. It explains how to use the manual properly and provides examples of common tasks it can be used for, such as identifying relevant tables for an integration project or report. The manual also describes how not to use it, such as for planning modifications to Oracle HRMS or writing data directly into non-interface tables.
The document outlines 10 steps for selecting a learning management system (LMS): 1) conducting an LMS needs assessment, 2) researching LMS vendors, 3) conducting vendor demonstrations, 4) narrowing the list of vendors, 5) developing and distributing a request for proposal, 6) preparing the company for change, 7) evaluating proposals and shortlisting vendors, 8) conducting final vendor presentations and selecting a vendor, 9) negotiating contracts and service agreements, and 10) getting ready for implementation. The first step of conducting an LMS needs assessment involves identifying requirements, stakeholders, and success metrics through interviews and analysis.
Here are some tips for interviewees:
- Research the company beforehand so you can speak intelligently about them and the role. Understand their mission, values, products/services and culture.
- Have a few stories prepared from your background that highlight relevant experiences and skills for the role. Practice telling them concisely.
- Dress professionally and make eye contact with the interviewer. Smile and be friendly.
- Listen carefully to questions and take a moment to think before answering. Address what the interviewer is asking.
- Ask questions too. Prepare a few in advance that show your interest in the company and role.
- Bring copies of your resume and a notepad/pen
The document provides an overview of the training organization Zone24x7. It describes Zone24x7 as a technological company that provides hardware and software solutions. It details Zone24x7's organizational structure, products and services, partners and clients, and an assessment of its current position including strengths, weaknesses and suggestions. The training experience involved working on various software development projects at Zone24x7 to gain exposure to tools, technologies and company practices.
The document provides an overview of database management systems and related concepts. It discusses the characteristics of DBMS, including storing data in a structured way to facilitate retrieval and manipulation. It also describes the main users of a DBMS, including administrators, designers, and end users. Additionally, it outlines the common 3-tier architecture of a DBMS, separating the database, application, and user tiers.
The document provides an overview of database management systems (DBMS). It discusses that a DBMS stores and retrieves user data with efficiency and security. It has a 3-tier architecture with the database tier containing the database and query processing, the logical tier containing business logic, and the presentation tier for user interfaces. The document also covers data models, schemas, normalization, transactions, concurrency control, and other DBMS concepts.
The document provides an overview of database management systems (DBMS). It discusses that a DBMS stores and retrieves user data with efficiency and security. It has a 3-tier architecture with the database tier containing the database and query processing, the logical tier containing business logic, and the presentation tier for user interfaces. The document also covers data models, schemas, normalization, transactions, and other core DBMS concepts.
This document provides an overview of data communication and computer networks. It discusses different types of computer networks including personal area networks (PAN), local area networks (LAN), metropolitan area networks (MAN), wide area networks (WAN) and internetworks. It also describes common LAN technologies like Ethernet, Fast Ethernet and Gigabit Ethernet. Additionally, it covers various network topologies, models, security aspects and layers of the OSI model.
This document provides an overview of data communication and computer networks. It discusses different types of computer networks including personal area networks (PAN), local area networks (LAN), metropolitan area networks (MAN), wide area networks (WAN) and internetworks. It also describes common LAN technologies like Ethernet, Fast Ethernet and Gigabit Ethernet. Additionally, it covers various network topologies, models, security aspects and layers of the OSI model.
Data communication computer_network_tutorialMaulen Bale
This document provides an overview of data communication and computer networks. It discusses different types of computer networks including personal area networks (PAN), local area networks (LAN), metropolitan area networks (MAN), wide area networks (WAN) and internetworks. It also describes common LAN technologies like Ethernet, Fast Ethernet and Gigabit Ethernet. Additionally, it covers various network topologies and the layered network model including the OSI model and TCP/IP model. The document serves as an introduction to data communication and computer networks.
This CSS tutorial provides an overview of CSS and its syntax. It discusses the different types of CSS selectors including type, universal, descendant, class, ID, child, and attribute selectors. It also covers the different methods of including CSS like embedded, inline, and external styles as well as the concept of CSS rule overriding.
The document provides an overview and tutorial about Cascading Style Sheets (CSS). It discusses what CSS is, its advantages, who creates and maintains it, the different CSS versions, CSS syntax including different types of selectors, and how to include CSS in HTML documents.
D3.js is a JavaScript library used for manipulating documents based on data. It allows binding arbitrary data to Document Object Model (DOM) elements. The key aspects covered in the document include:
- D3.js allows creating interactive data visualizations in the browser. It uses widely supported standards like HTML, CSS, SVG and JavaScript.
- The document discusses installing D3.js library, setting up an editor and web server for development.
- Core concepts like DOM, SVG, and how D3.js uses them to render visualizations are explained. This provides background for working with D3.js.
Chef is an open source configuration management tool that uses recipes and cookbooks to automate infrastructure. It follows a client-server architecture where cookbooks are developed on a workstation, uploaded to a Chef server, and used to configure nodes. Setting up Chef involves installing the Chef development kit (ChefDK) on a workstation, initializing a Git repository, and registering nodes with the Chef server to allow management via recipes and cookbooks.
This document provides an overview and introduction to Chef, an open-source configuration management tool. It discusses the key building blocks of Chef including cookbooks, roles, environments, nodes and the Chef client run. It also covers how to set up the Chef workstation, clients, Test Kitchen and Knife tools. The document is intended for those wanting to understand Chef's features and how to use it to automate infrastructure provisioning and management.
- General settings allow configuring basic site information like site title, tagline, URL, email address, and timezone.
- It sets the membership option to allow or block new user registrations.
- The default role for new users can be selected as subscriber, contributor, author, editor or administrator.
- Date, time and week start formats can be customized.
- The site language for the WordPress dashboard can also be chosen.
The document provides an overview of WordPress general settings. It describes the various fields on the general settings page like site title, tagline, WordPress address, site address, email address, membership settings, user role, timezone, date format, time format, week start day, and language. It also explains how to access the general settings page and save the changes made to the general settings.
BDD focuses on providing a shared process and tools to promote communication between software developers and business analysts. It uses examples written in a readable language to illustrate desired system behaviors. BDD emerged from test-driven development, which uses automated tests to drive development. A key BDD practice is specification by example, which involves collaboratively writing examples to illustrate requirements and then automating these examples as tests.
An embedded system is a microcontroller-based computer system designed to perform specific tasks. It can be an independent system or part of a larger system. This tutorial explains the steps to design and use an embedded system and focuses on the 8051 microcontroller. It covers topics like processors, architecture, tools, peripherals, I/O programming, assembly language and more to help students learn embedded systems and 8051 microcontrollers.
In commerce, supply chain management, the management of the flow of goods and services, between businesses and locations, and includes the movement and storage of raw materials, of work-in-process inventory, and of finished goods as well as end to end order fulfillment from point of origin to point of consumption.
This document provides an introduction to data structures and algorithms. It discusses how data structures store data efficiently and how they are used in enterprise applications. The target audience is computer science graduates and software professionals looking to learn about data structures and algorithms. Basic prerequisites include understanding C programming, text editors, and executing programs. The document outlines different sections to be covered, including basics of data structures and algorithms, asymptotic analysis, common algorithms like greedy, divide and conquer, and dynamic programming, and specific data structures like arrays.
This document provides an overview of cosmology and summarizes some of the major discoveries in the field. It introduces concepts like the expanding universe, Hubble's law, and the Big Bang theory. It also explains cosmological phenomena such as the cosmic microwave background radiation and discusses evidence that has helped scientists understand dark matter and dark energy. The tutorial is intended for students and early-career astronomers who want to learn more about cosmological observations and theories.
This document provides an overview of control systems and their analysis. It introduces various modeling methods for control systems including mathematical models using differential equations and transfer functions. It also discusses modeling of mechanical systems, block diagrams, time response analysis, stability analysis and other fundamental control systems concepts. The document contains 17 chapters and is intended to teach readers about analyzing and improving the performance of control systems.
This document provides an overview of computer logical organization. It discusses key concepts such as analog versus digital signals, different number systems including binary, and binary codes. It also covers topics like number system conversions, error detection/correction, and complement arithmetic which are important aspects of computer logical organization. The intended audience is students pursuing computer science degrees. Basic computer knowledge is assumed as a prerequisite.
This document provides an overview of computer fundamentals. It explains that a computer accepts raw data as input, processes it under a set of instructions, and produces output which is saved for future use. It is intended for beginners and advanced learners, covering topics such as hardware, software, operating systems, and how to get the most value from computers. The document also provides information on computer components, memory types, number systems, and how to purchase a computer.
This document provides an overview of compiler design. It describes the different phases of a compiler including lexical analysis, syntax analysis, and code generation. It also outlines the overall architecture of a compiler, discussing the analysis and synthesis phases. The document is intended for students interested in learning the basic principles of compilers.
This document provides an overview of communication technologies and networking. It begins by discussing the history of communication from early speech to the development of the telephone and telecommunication networks. It then outlines how computer networks have revolutionized modern communication. The document will cover the evolution of networks from ARPANET to the Internet, networking hardware and software components, and concepts of global communication. It is designed for readers interested in learning the basic concepts of how networks function.
This document provides an overview of biometrics and biometric systems. It discusses the basic components of a biometric system, including sensors to capture biometric data, a processing unit, a database to store templates, and an output interface. It also outlines the general process a biometric system uses for identification and verification. The document introduces key biometrics concepts and terminology. It describes the evolution of biometrics and some common applications of biometric systems.
This document provides an introduction to basic computer concepts. It discusses that a computer receives input, processes it based on instructions, and provides output. It also notes that computers can perform repetitive tasks without error. The document then outlines that it will discuss the parts of a computer and microprocessors that enable efficient and correct task completion. It provides information on intended audience and prerequisites. Finally, it includes copyright information and a table of contents to guide the reader.
This document provides an overview of basic computer science concepts. It discusses the major components of a computer system including hardware, software, input/output devices. It also describes common operating systems like Windows and Unix, as well as network types including local area networks, metropolitan area networks, and wide area networks. The document is designed for students preparing for competitive exams to provide foundational computer science knowledge with no prerequisites.
This document provides an introduction to basic electronic components. It begins by discussing semiconductor physics concepts like quantum numbers, energy bands, and the Pauli exclusion principle. It then covers components like resistors, capacitors, inductors, and transistors. Resistors are discussed in terms of symbols, color coding, circuit connections in series and parallel, and types of resistors. Capacitors are similarly covered regarding symbols, how they work, color coding, capacitive reactance, temperature coefficients, and circuit connections. The document is intended for readers who want preliminary knowledge of basic electronic components.
The document discusses the objectives and fundamentals of auditing. It explains that the main objective of auditing is to ensure the financial reliability of an organization and provide an independent opinion on whether the books of accounts show a true and fair view. It also discusses the three main types of fraud that can be detected through auditing - misappropriation of cash, goods, and manipulation of accounts.
This document provides an overview of artificial neural networks (ANN). It describes ANN as parallel computing devices modeled after the human brain, with the objective of performing computational tasks faster than traditional systems. The document outlines some key concepts of ANN including its basic components like neurons and connections between neurons. It also discusses different types of ANN models and learning methods, including supervised and unsupervised learning. Finally, it notes that ANN can be useful for tasks like pattern recognition, classification, approximation, and data clustering.
This document provides an introduction to the topic of artificial intelligence. It discusses the goals and history of AI, as well as key areas of research like intelligent systems, search algorithms, fuzzy logic systems, natural language processing, and expert systems. The intended audience is students beginning their study of AI who want a broad overview of the field.
This document provides an overview of antennas used in communication systems. It begins by describing the intended audience, which are readers looking to learn about antenna fundamentals, parameters, types, and design considerations. The document then outlines topics that will be covered, including basic antenna terms, parameters, near and far field patterns, radiation patterns, beam width, polarization, and more. It also lists prerequisites of basic electromagnetic wave and communication system concepts. The document aims to explain how to calculate antenna parameters and select an appropriate antenna type for different applications.
This document provides an overview of analog communication techniques. It discusses various modulation techniques used in analog communication systems, including amplitude modulation (AM), double sideband suppressed carrier (DSBSC), single sideband suppressed carrier (SSBSC), and vestigial sideband (VSBSC) modulation. It also covers angle modulation techniques such as frequency modulation (FM) and phase modulation. The document provides mathematical expressions to describe the different modulation techniques and discusses modulators and demodulators used for each type of modulation.
The document discusses transistors and amplifiers. It begins by providing an overview of transistors, including their construction with emitter, base and collector terminals. It describes the operation of PNP and NPN transistors and their biasing. Transistors can be used as amplifiers by configuring them in common base, common emitter or common collector modes. Proper biasing and operating point selection are required for faithful amplification. Later sections cover various types of single-stage and multi-stage transistor amplifiers, including classifications, coupling methods, and considerations for power amplifiers.
This document provides an overview of agile software development methodology. It discusses that agile is used to build software incrementally using short 1-4 week iterations aligned with changing business needs, rather than a single 6-18 month predictive process. It also describes key agile roles like the Scrum Master who facilitates the team and removes blocks, and the Product Owner who prioritizes features. Finally, it explains that agile uses daily stand-ups, demos, and retrospectives to frequently get working software in front of stakeholders for feedback.
This document provides an overview of financial accounting. It introduces key concepts such as the accounting process, accounting concepts and conventions, journals, ledgers, subsidiary books, trial balances, and financial statements. It also discusses cost and management accounting, explaining tools like marginal costing, standard costing, variance analysis, cost-volume-profit analysis, and break-even charts. The target audience is beginners pursuing education in financial accounting or business management.
This document provides an overview and tutorial on the Ruby programming language. It discusses Ruby's history and design, intended audience, prerequisites, and copyright information. It then outlines the table of contents which covers topics like Ruby syntax, classes and objects, variables, operators, and more. Each topic is explained across multiple chapters in the document to give a complete understanding of Ruby.
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetSritoma Majumder
Introduction
All the materials around us are made up of elements. These elements can be broadly divided into two major groups:
Metals
Non-Metals
Each group has its own unique physical and chemical properties. Let's understand them one by one.
Physical Properties
1. Appearance
Metals: Shiny (lustrous). Example: gold, silver, copper.
Non-metals: Dull appearance (except iodine, which is shiny).
2. Hardness
Metals: Generally hard. Example: iron.
Non-metals: Usually soft (except diamond, a form of carbon, which is very hard).
3. State
Metals: Mostly solids at room temperature (except mercury, which is a liquid).
Non-metals: Can be solids, liquids, or gases. Example: oxygen (gas), bromine (liquid), sulphur (solid).
4. Malleability
Metals: Can be hammered into thin sheets (malleable).
Non-metals: Not malleable. They break when hammered (brittle).
5. Ductility
Metals: Can be drawn into wires (ductile).
Non-metals: Not ductile.
6. Conductivity
Metals: Good conductors of heat and electricity.
Non-metals: Poor conductors (except graphite, which is a good conductor).
7. Sonorous Nature
Metals: Produce a ringing sound when struck.
Non-metals: Do not produce sound.
Chemical Properties
1. Reaction with Oxygen
Metals react with oxygen to form metal oxides.
These metal oxides are usually basic.
Non-metals react with oxygen to form non-metallic oxides.
These oxides are usually acidic.
2. Reaction with Water
Metals:
Some react vigorously (e.g., sodium).
Some react slowly (e.g., iron).
Some do not react at all (e.g., gold, silver).
Non-metals: Generally do not react with water.
3. Reaction with Acids
Metals react with acids to produce salt and hydrogen gas.
Non-metals: Do not react with acids.
4. Reaction with Bases
Some non-metals react with bases to form salts, but this is rare.
Metals generally do not react with bases directly (except amphoteric metals like aluminum and zinc).
Displacement Reaction
More reactive metals can displace less reactive metals from their salt solutions.
Uses of Metals
Iron: Making machines, tools, and buildings.
Aluminum: Used in aircraft, utensils.
Copper: Electrical wires.
Gold and Silver: Jewelry.
Zinc: Coating iron to prevent rusting (galvanization).
Uses of Non-Metals
Oxygen: Breathing.
Nitrogen: Fertilizers.
Chlorine: Water purification.
Carbon: Fuel (coal), steel-making (coke).
Iodine: Medicines.
Alloys
An alloy is a mixture of metals or a metal with a non-metal.
Alloys have improved properties like strength, resistance to rusting.
This presentation was provided by Bill Kasdorf of Kasdorf & Associates LLC and Publishing Technology Partners, during the fifth session of the NISO training series "Accessibility Essentials." Session Five: A Standards Seminar, was held May 1, 2025.
Title: A Quick and Illustrated Guide to APA Style Referencing (7th Edition)
This visual and beginner-friendly guide simplifies the APA referencing style (7th edition) for academic writing. Designed especially for commerce students and research beginners, it includes:
✅ Real examples from original research papers
✅ Color-coded diagrams for clarity
✅ Key rules for in-text citation and reference list formatting
✅ Free citation tools like Mendeley & Zotero explained
Whether you're writing a college assignment, dissertation, or academic article, this guide will help you cite your sources correctly, confidently, and consistent.
Created by: Prof. Ishika Ghosh,
Faculty.
📩 For queries or feedback: [email protected]
A measles outbreak originating in West Texas has been linked to confirmed cases in New Mexico, with additional cases reported in Oklahoma and Kansas. The current case count is 817 from Texas, New Mexico, Oklahoma, and Kansas. 97 individuals have required hospitalization, and 3 deaths, 2 children in Texas and one adult in New Mexico. These fatalities mark the first measles-related deaths in the United States since 2015 and the first pediatric measles death since 2003.
The YSPH Virtual Medical Operations Center Briefs (VMOC) were created as a service-learning project by faculty and graduate students at the Yale School of Public Health in response to the 2010 Haiti Earthquake. Each year, the VMOC Briefs are produced by students enrolled in Environmental Health Science Course 581 - Public Health Emergencies: Disaster Planning and Response. These briefs compile diverse information sources – including status reports, maps, news articles, and web content– into a single, easily digestible document that can be widely shared and used interactively. Key features of this report include:
- Comprehensive Overview: Provides situation updates, maps, relevant news, and web resources.
- Accessibility: Designed for easy reading, wide distribution, and interactive use.
- Collaboration: The “unlocked" format enables other responders to share, copy, and adapt seamlessly. The students learn by doing, quickly discovering how and where to find critical information and presenting it in an easily understood manner.
CURRENT CASE COUNT: 817 (As of 05/3/2025)
• Texas: 688 (+20)(62% of these cases are in Gaines County).
• New Mexico: 67 (+1 )(92.4% of the cases are from Eddy County)
• Oklahoma: 16 (+1)
• Kansas: 46 (32% of the cases are from Gray County)
HOSPITALIZATIONS: 97 (+2)
• Texas: 89 (+2) - This is 13.02% of all TX cases.
• New Mexico: 7 - This is 10.6% of all NM cases.
• Kansas: 1 - This is 2.7% of all KS cases.
DEATHS: 3
• Texas: 2 – This is 0.31% of all cases
• New Mexico: 1 – This is 1.54% of all cases
US NATIONAL CASE COUNT: 967 (Confirmed and suspected):
INTERNATIONAL SPREAD (As of 4/2/2025)
• Mexico – 865 (+58)
‒Chihuahua, Mexico: 844 (+58) cases, 3 hospitalizations, 1 fatality
• Canada: 1531 (+270) (This reflects Ontario's Outbreak, which began 11/24)
‒Ontario, Canada – 1243 (+223) cases, 84 hospitalizations.
• Europe: 6,814
This chapter provides an in-depth overview of the viscosity of macromolecules, an essential concept in biophysics and medical sciences, especially in understanding fluid behavior like blood flow in the human body.
Key concepts covered include:
✅ Definition and Types of Viscosity: Dynamic vs. Kinematic viscosity, cohesion, and adhesion.
⚙️ Methods of Measuring Viscosity:
Rotary Viscometer
Vibrational Viscometer
Falling Object Method
Capillary Viscometer
🌡️ Factors Affecting Viscosity: Temperature, composition, flow rate.
🩺 Clinical Relevance: Impact of blood viscosity in cardiovascular health.
🌊 Fluid Dynamics: Laminar vs. turbulent flow, Reynolds number.
🔬 Extension Techniques:
Chromatography (adsorption, partition, TLC, etc.)
Electrophoresis (protein/DNA separation)
Sedimentation and Centrifugation methods.
How to Manage Purchase Alternatives in Odoo 18Celine George
Managing purchase alternatives is crucial for ensuring a smooth and cost-effective procurement process. Odoo 18 provides robust tools to handle alternative vendors and products, enabling businesses to maintain flexibility and mitigate supply chain disruptions.
A measles outbreak originating in West Texas has been linked to confirmed cases in New Mexico, with additional cases reported in Oklahoma and Kansas. The current case count is 795 from Texas, New Mexico, Oklahoma, and Kansas. 95 individuals have required hospitalization, and 3 deaths, 2 children in Texas and one adult in New Mexico. These fatalities mark the first measles-related deaths in the United States since 2015 and the first pediatric measles death since 2003.
The YSPH Virtual Medical Operations Center Briefs (VMOC) were created as a service-learning project by faculty and graduate students at the Yale School of Public Health in response to the 2010 Haiti Earthquake. Each year, the VMOC Briefs are produced by students enrolled in Environmental Health Science Course 581 - Public Health Emergencies: Disaster Planning and Response. These briefs compile diverse information sources – including status reports, maps, news articles, and web content– into a single, easily digestible document that can be widely shared and used interactively. Key features of this report include:
- Comprehensive Overview: Provides situation updates, maps, relevant news, and web resources.
- Accessibility: Designed for easy reading, wide distribution, and interactive use.
- Collaboration: The “unlocked" format enables other responders to share, copy, and adapt seamlessly. The students learn by doing, quickly discovering how and where to find critical information and presenting it in an easily understood manner.
Contact Lens:::: An Overview.pptx.: OptometryMushahidRaza8
A comprehensive guide for Optometry students: understanding in easy launguage of contact lens.
Don't forget to like,share and comments if you found it useful!.
"Basics of Heterocyclic Compounds and Their Naming Rules"rupalinirmalbpharm
This video is about heterocyclic compounds, which are chemical compounds with rings that include atoms like nitrogen, oxygen, or sulfur along with carbon. It covers:
Introduction – What heterocyclic compounds are.
Prefix for heteroatom – How to name the different non-carbon atoms in the ring.
Suffix for heterocyclic compounds – How to finish the name depending on the ring size and type.
Nomenclature rules – Simple rules for naming these compounds the right way.
Common rings – Examples of popular heterocyclic compounds used in real life.
Real GitHub Copilot Exam Dumps for SuccessMark Soia
Download updated GitHub Copilot exam dumps to boost your certification success. Get real exam questions and verified answers for guaranteed performance
APM event hosted by the Midlands Network on 30 April 2025.
Speaker: Sacha Hind, Senior Programme Manager, Network Rail
With fierce competition in today’s job market, candidates need a lot more than a good CV and interview skills to stand out from the crowd.
Based on her own experience of progressing to a senior project role and leading a team of 35 project professionals, Sacha shared not just how to land that dream role, but how to be successful in it and most importantly, how to enjoy it!
Sacha included her top tips for aspiring leaders – the things you really need to know but people rarely tell you!
We also celebrated our Midlands Regional Network Awards 2025, and presenting the award for Midlands Student of the Year 2025.
This session provided the opportunity for personal reflection on areas attendees are currently focussing on in order to be successful versus what really makes a difference.
Sacha answered some common questions about what it takes to thrive at a senior level in a fast-paced project environment: Do I need a degree? How do I balance work with family and life outside of work? How do I get leadership experience before I become a line manager?
The session was full of practical takeaways and the audience also had the opportunity to get their questions answered on the evening with a live Q&A session.
Attendees hopefully came away feeling more confident, motivated and empowered to progress their careers
Understanding P–N Junction Semiconductors: A Beginner’s GuideGS Virdi
Dive into the fundamentals of P–N junctions, the heart of every diode and semiconductor device. In this concise presentation, Dr. G.S. Virdi (Former Chief Scientist, CSIR-CEERI Pilani) covers:
What Is a P–N Junction? Learn how P-type and N-type materials join to create a diode.
Depletion Region & Biasing: See how forward and reverse bias shape the voltage–current behavior.
V–I Characteristics: Understand the curve that defines diode operation.
Real-World Uses: Discover common applications in rectifiers, signal clipping, and more.
Ideal for electronics students, hobbyists, and engineers seeking a clear, practical introduction to P–N junction semiconductors.
*Metamorphosis* is a biological process where an animal undergoes a dramatic transformation from a juvenile or larval stage to a adult stage, often involving significant changes in form and structure. This process is commonly seen in insects, amphibians, and some other animals.
How to manage Multiple Warehouses for multiple floors in odoo point of saleCeline George
The need for multiple warehouses and effective inventory management is crucial for companies aiming to optimize their operations, enhance customer satisfaction, and maintain a competitive edge.
How to manage Multiple Warehouses for multiple floors in odoo point of saleCeline George
Distributed dbms tutorial
2. i
AboutthisTutorial
Distributed Database Management System (DDBMS) is a type of DBMS which manages a
number of databases hoisted at diversified locations and interconnected through a
computer network. It provides mechanisms so that the distribution remains oblivious to
the users, who perceive the database as a single database.
This tutorial discusses the important theories of distributed database systems. A number
of illustrations and examples have been provided to aid the students to grasp the intricate
concepts of DDBMS.
Audience
This tutorial has been prepared for students pursuing either a master’s degree or a
bachelor’s degree in Computer Science, particularly if they have opted for distributed
systems or distributed database systems as a subject.
Prerequisites
This tutorial is an advanced topic that focuses of a type of database system. Consequently,
it requires students to have a reasonably good knowledge on the elementary concepts of
DBMS. Besides, an understanding of SQL will be an added advantage.
Copyright&Disclaimer
Copyright 2016 by Tutorials Point (I) Pvt. Ltd.
All the content and graphics published in this e-book are the property of Tutorials Point (I)
Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish
any contents or a part of contents of this e-book in any manner without written consent
of the publisher.
We strive to update the contents of our website and tutorials as timely and as precisely as
possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt.
Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our
website or its contents including this tutorial. If you discover any errors on our website or
in this tutorial, please notify us at [email protected]
3. ii
TableofContents
About this Tutorial............................................................................................................................................i
Audience...........................................................................................................................................................i
Prerequisites.....................................................................................................................................................i
Copyright & Disclaimer.....................................................................................................................................i
Table of Contents ............................................................................................................................................ ii
PART 1: DDBMS – BASICS............................................................................................................1
1. DDBMS – DBMS Concepts.........................................................................................................................2
Database and Database Management System................................................................................................2
Database Schemas...........................................................................................................................................3
Types of DBMS.................................................................................................................................................3
Operations on DBMS .......................................................................................................................................5
2. DDBMS – Distributed Databases...............................................................................................................8
Distributed Database Management System....................................................................................................8
Factors Encouraging DDBMS ...........................................................................................................................9
Advantages of Distributed Databases .............................................................................................................9
Adversities of Distributed Databases ............................................................................................................10
PART 2: DISTRIBUTED DATABASE DESIGN.................................................................................11
3. DDBMS – Distributed Database Environments........................................................................................12
Types of Distributed Databases.....................................................................................................................12
Distributed DBMS Architectures ...................................................................................................................13
Architectural Models.....................................................................................................................................14
Design Alternatives........................................................................................................................................17
4. DDBMS – Design Strategies.....................................................................................................................19
Data Replication ............................................................................................................................................19
Fragmentation...............................................................................................................................................20
Vertical Fragmentation..................................................................................................................................20
Horizontal Fragmentation .............................................................................................................................21
Hybrid Fragmentation ...................................................................................................................................21
5. DDBMS – Distribution Transparency.......................................................................................................22
Location Transparency ..................................................................................................................................22
Fragmentation Transparency ........................................................................................................................22
Replication Transparency ..............................................................................................................................22
Combination of Transparencies....................................................................................................................23
6. DDBMS – Database Control.....................................................................................................................24
Authentication...............................................................................................................................................24
Access Rights .................................................................................................................................................24
Semantic Integrity Control ............................................................................................................................25
4. iii
PART 3: QUERY OPTIMIZATION.................................................................................................27
7. DDBMS – Relational Algebra for Query Optimization .............................................................................28
Query Optimization Issues in DDBMS ...........................................................................................................28
Query Processing...........................................................................................................................................28
Relational Algebra .........................................................................................................................................29
Translating SQL Queries into Relational Algebra...........................................................................................32
Computation of Relational Algebra Operators..............................................................................................33
Computation of Selection..............................................................................................................................34
Computation of Joins.....................................................................................................................................34
8. DDBMS – Query Optimization in Centralized Systems.............................................................................36
Query Parsing and Translation ......................................................................................................................36
Approaches to Query Optimization...............................................................................................................38
9. DDBMS – Query Optimization in Distributed Systems.............................................................................39
Distributed Query Processing Architecture...................................................................................................39
Mapping Global Queries into Local Queries..................................................................................................39
Distributed Query Optimization ....................................................................................................................40
PART 4: CONCURRENCY CONTROL............................................................................................43
10. DDBMS – Transaction Processing Systems ..............................................................................................44
Transactions ..................................................................................................................................................44
Transaction Operations .................................................................................................................................44
Transaction States .........................................................................................................................................45
Desirable Properties of Transactions.............................................................................................................45
Schedules and Conflicts.................................................................................................................................46
Serializability..................................................................................................................................................47
11. DDBMS – Controlling Concurrency..........................................................................................................48
Locking Based Concurrency Control Protocols..............................................................................................48
Timestamp Concurrency Control Algorithms ................................................................................................48
Optimistic Concurrency Control Algorithm ...................................................................................................49
Concurrency Control in Distributed Systems.................................................................................................50
12. DDBMS – Deadlock Handling ..................................................................................................................52
What are Deadlocks?.....................................................................................................................................52
Deadlock Handling in Centralized Systems....................................................................................................52
Deadlock Handling in Distributed Systems....................................................................................................54
PART 5: FAILURE AND RECOVERY..............................................................................................57
13. DDBMS – Replication Control..................................................................................................................58
Synchronous Replication Control ..................................................................................................................58
Asynchronous Replication Control ................................................................................................................59
Replication Control Algorithms .....................................................................................................................59
14. DDBMS – Failure & Commit ....................................................................................................................62
Soft Failure ....................................................................................................................................................62
Hard Failure...................................................................................................................................................62
Network Failure.............................................................................................................................................62
5. iv
Commit Protocols..........................................................................................................................................63
Transaction Log .............................................................................................................................................63
15. DDBMS – Database Recovery..................................................................................................................65
Recovery from Power Failure ........................................................................................................................65
Recovery from Disk Failure............................................................................................................................65
Checkpointing................................................................................................................................................66
Transaction Recovery Using UNDO / REDO...................................................................................................67
16. DDBMS – Distributed Commit Protocols .................................................................................................69
Distributed One-phase Commit.....................................................................................................................69
Distributed Two-phase Commit ....................................................................................................................69
Distributed Three-phase Commit..................................................................................................................70
PART 6: DISTRIBUTED DBMS SECURITY .....................................................................................71
17. DDBMS – Database Security & Cryptography..........................................................................................72
Database Security and Threats......................................................................................................................72
Measures of Control......................................................................................................................................72
What is Cryptography?..................................................................................................................................72
Conventional Encryption Methods................................................................................................................73
Public Key Cryptography................................................................................................................................73
Digital Signatures...........................................................................................................................................74
18. DDBMS – Security in Distributed Databases............................................................................................75
Communications Security..............................................................................................................................75
Data Security .................................................................................................................................................75
Data Auditing.................................................................................................................................................76
7. 6
For proper functioning of any organization, there’s a need for a well-maintained database. In
the recent past, databases used to be centralized in nature. However, with the increase in
globalization, organizations tend to be diversified across the globe. They may choose to
distribute data over local servers instead of a central database. Thus, arrived the concept of
Distributed Databases.
This chapter gives an overview of databases and Database Management Systems (DBMS). A
database is an ordered collection of related data. A DBMS is a software package to work upon
a database. A detailed study of DBMS is available in our tutorial named “Learn DBMS”. In this
chapter, we revise the main concepts so that the study of DDBMS can be done with ease. The
three topics covered are database schemas, types of databases and operations on databases.
DatabaseandDatabaseManagementSystem
A database is an ordered collection of related data that is built for a specific purpose. A
database may be organized as a collection of multiple tables, where a table represents a real
world element or entity. Each table has several different fields that represent the characteristic
features of the entity.
For example, a company database may include tables for projects, employees, departments,
products and financial records. The fields in the Employee table may be Name, Company_Id,
Date_of_Joining, and so forth.
A database management system is a collection of programs that enables creation and
maintenance of a database. DBMS is available as a software package that facilitates definition,
construction, manipulation and sharing of data in a database. Definition of a database includes
description of the structure of a database. Construction of a database involves actual storing
of the data in any storage medium. Manipulation refers to the retrieving information from the
database, updating the database and generating reports. Sharing of data facilitates data to
be accessed by different users or programs.
Examples of DBMS Application Areas
Automatic Teller Machines
Train Reservation System
Employee Management System
Student Information System
1. DDBMS – DBMS CONCEPTS
8. 7
Examples of DBMS Packages
MySQL
Oracle
SQL Server
dBASE
FoxPro
PostgreSQL, etc.
DatabaseSchemas
A database schema is a description of the database which is specified during database design
and subject to infrequent alterations. It defines the organization of the data, the relationships
among them, and the constraints associated with them.
Databases are often represented through the three-schema architecture or ANSI-SPARC
architecture. The goal of this architecture is to separate the user application from the
physical database. The three levels are:
Internal Level having Internal Schema – It describes the physical structure, details
of internal storage and access paths for the database.
Conceptual Level having Conceptual Schema – It describes the structure of the
whole database while hiding the details of physical storage of data. This illustrates the
entities, attributes with their data types and constraints, user operations and
relationships.
External or View Level having External Schemas or Views – It describes the
portion of a database relevant to a particular user or a group of users while hiding the
rest of database.
TypesofDBMS
There are four types of DBMS.
Hierarchical DBMS
In hierarchical DBMS, the relationships among data in the database are established so that
one data element exists as a subordinate of another. The data elements have parent-child
relationships and are modelled using the “tree” data structure. These are very fast and simple.
9. 8
Network DBMS
Network DBMS in one where the relationships among data in the database are of type many-
to-many in the form of a network. The structure is generally complicated due to the existence
of numerous many-to-many relationships. Network DBMS is modelled using “graph” data
structure.
`
Relational DBMS
In relational databases, the database is represented in the form of relations. Each relation
models an entity and is represented as a table of values. In the relation or table, a row is
called a tuple and denotes a single record. A column is called a field or an attribute and
denotes a characteristic property of the entity. RDBMS is the most popular database
management system.
For example: A Student Relation
Field
S_Id Name Year Stream
Hierarchical DBMS
Network DBMS
10. 9
Tuple 1 Ankit Jha 1 Computer Science
2 Pushpa Mishra 2 Electronics
5 Ranjini Iyer 2 Computer Science
Object Oriented DBMS
Object-oriented DBMS is derived from the model of the object-oriented programming
paradigm. They are helpful in representing both consistent data as stored in databases, as
well as transient data, as found in executing programs. They use small, reusable elements
called objects. Each object contains a data part and a set of operations which works upon the
data. The object and its attributes are accessed through pointers instead of being stored in
relational table models.
For example: A simplified Bank Account object-oriented database –
Distributed DBMS
A distributed database is a set of interconnected databases that is distributed over the
computer network or internet. A Distributed Database Management System (DDBMS)
manages the distributed database and provides mechanisms so as to make the databases
transparent to the users. In these systems, data is intentionally distributed among multiple
nodes so that all computing resources of the organization can be optimally used.
OperationsonDBMS
The four basic operations on a database are Create, Retrieve, Update and Delete.
CREATE database structure and populate it with data – Creation of a database relation
involves specifying the data structures, data types and the constraints of the data to
be stored.
Example: SQL command to create a student table:
CREATE TABLE STUDENT
(
Bank_Account
Acc_No
Balance
debitAmount( )
creditAmount( )
getBalance( )
Customer
Cust_ID
Name
Address
Phone
0 ..*
11. 10
ROLL INTEGER PRIMARY KEY,
NAME VARCHAR2(25),
YEAR INTEGER,
STREAM VARCHAR2(10)
);
Once the data format is defined, the actual data is stored in accordance with the format
in some storage medium.
12. 11
End of ebook preview
If you liked what you saw…
Buy it from our store @ https://store.tutorialspoint