answersLogoWhite

0

📱

Database Programming

Databases are collections of tables that maintain and display information, often collaboratively; this information can be used for interaction with an application or gaining general knowledge. Questions about database engines and modifying or using them belong in this category.

8,803 Questions

What does a learning management system do for you?

A smooth teaching and learning process are enabled with the help of various features of LMS. LMS provides customised development programs and helps teachers to add course materials, Time Tables etc to make all teaching methods digital. Some of the features of LMS which makes it beneficial.

Customizable Academic: You can add your academic resources like course materials, libraries, Time Tables etc. You can easily manage your data according to your requirements in the Customizable Academic Configuration.

Progress Reports: With the personalised AI based system. Students can check their progress reports in one place which benefits both teachers and students to make further progress. LMS monitored students progress and notified teachers to advise more.

Personal Manager: Teachers can manage their lectures and courses effectively in LMS with their personal Manager. LMS generates reports and assignments and adds start and end time which helps students to complete and meet the assignment deadline.

Motivational Design: LMS provides a smooth user experience to understand better and also entertain to meet up their end goal. By making challenges in course material students enjoy while doing tasks which builds their interest in learning.

What is the difference between SQL and SQLPlus?

Structured Query Language, abbreviated as SQL, is a programming language. It is designed to manage data stored in relational databases. Various commands or operations like Select, Group by, Insert, Modify, etc, are implemented using SQL to fetch, retrieve or add data to the database. It can be used in correlation with other programming languages like Python or Java, to build applications. Any tool or application can communicate with the Oracle server using the command language SQL. Oracle SQL has numerous extensions. A SQL statement that you enter is saved in memory's "SQL buffer" and stays there until you write another SQL statement. An Oracle tool called SQLPlus identifies and sends SQL statements to the Oracle9i Server for execution. It has a built-in command language. It is a client program allowing users to enter SQL and PL/SQL commands and execute them. SQLPlus comes with the Oracle installation. It is commonly used to develop and run SQL and PL/SQL statements, scripts, and reports.

SQL

SQLPLus

is a language used to access data from the Oracle server by talking with it.

Recognizes SQL statements and sends them to the server

Is based on American National Standards Institute (ANSI)-standard SQL

Is Oracle's interface for running SQL statements proprietary?

manipulates the database's data and table definitions.

does not permit changing of database values

employs a termination character to carry out directives right away.

does not need termination characters and immediately carries out commands.

Uses functions to perform some formatting

Uses commands to format data

What is the difference between data capture and data entry?

Dta capture means to collect data from external and internal resources. Whereas data entry means to store the captured data for further use. If the captured data did not stored then it can be lost. Keep this data in some form like records, and most important in database is known as data entry.

What is data independence and why is it lacking in file systems?

Data independence is:

• A type of computerized database system that keeps data separate from other computer programs that make use of that particular data.

• A key feature of data independence is ensuring that the data cannot be recognized by other programs on the system.

• The information can still be accessed from another point on the system but not though specific programs.

• It simplifies the management of a complex database system which may in turn make staff become more productive as information is easier to locate. This is due to data access becoming improved and the system being made more user-friendly.

• The storage structure of the information by other applications becomes restricted to prevent the stored data from becoming corrupt.

• This type of system may be useful in an environment where more than one database is in place. It makes keeping and maintaining the information found on either a single or multiple database in one office space much easier to control.

• If a workplace does not have data independence systems in place, files become inflexible and some information may become corrupt by other programs. Other programs will be prevented from being able to access the data when programs in the source code are processed and lack data independence.

What is concatenation and when will it be useful?

Concatenation is the joining of two vectors to produce a new vector. The new vector simply appends one vector to the other. A vector is an array of variables of the same type. Concatenation is most commonly used to join two strings together (string concatenation). A string is simply an array of type char.

What is the relationship between HIPPA and database design?

This is a very broad question, especially in that HIPAA strives to be "transparent" in that it will not define what methodology is acceptable, but rather, will tell you how to ascertain if your choice is properly made. There is no particular technology described under HIPAA.

The relationship between DB design and HIPAA is that, if HIPAA applies to the company who owns or uses the database, then the database (and lots else) much be created in such a manner that it allows for compliance with this law.

As for DB design, the following factors will have a somewhat unique effect:

  • Role Based access. While not a requirement under HIPAA, it turns out that some parties may access some data and others may not. Your design should take this into account.
  • Protected Health Information (PHI). Access to certain fields (PHI) may be restricted, and you'll need to show the steps you took to ensure this information is not released, either accidentally or through foul play. You may also need to track legal access to PHI.
  • Archiving. HIPAA requires archival storage of data, but it doesn't say how long, depending instead on "best practices". I'd make this selectable, and I'd back up my reasoning for this in my documentation.
  • Disaster Planning and Recovery. HIPAA requires that you maintain backups in such a manner that a disaster will neither destroy or limit access to live or archival data for any longer than need be. How long is not stated -- see Risk Assessment.
  • "Break Glass" initiative. HIPAA states that it does not sanction failures in delivery of health care as a result of implementing this law. In this case, it means you can lock down PHI based on roles, or secure in any number of ways, but if a doctor in an ER needs that patient information, there must be a means of overriding security and (a) allowing access to critical PHI as well as (b) tracking that abnormal access. In other words, in an emergency, you need to be able to break the glass and get to the PHI if you need it.
  • Risk Assessment. HIPAA enforcement focuses on intent and due dilligence. Even if you make a mistake, it'll go a lot easier on you if you've researched your decisions and documented them in a RIsk Assessment. This is a pretty formal procedure and, if you haven't done one before, consider getting help.

This of course isn't all. COnsidering the scope of HIPAA, it's easy to see that all the possible changes in database design wouldn't even fit into a thesis, much less an online response.

User:Cjonb18:03, 3 Jun 2008 (UTC)

Write a program to print 'hello' in output?

Ah, the infamous "Hello World" program.

I'm assuming you have a compiler (if not Dev-C++ if a good)

the code is as follows:

#include <iostream>

using namespace std;

int main()

{

cout << "Hello World" << endl;

system("PAUSE");

return 0;

}

What is the limitation of linear queue and how do you overcome using circular queue?

in linear queue when any element is pop out than we do size-1 value changing ie

like in the pile of coin when we take out the last coin then all changes there places so likewise we have to change the position of each element.....

we can overcome by circular one as we have to change the value of the first and last not the values changes in the array....

but circular queue also had limitation that

either u have to use it as size-1 queue or

it will show you full even though it is empty fully....as first==last...

What is the difference between 4 point system and 10 point system in fabric inspection?

Well A 4-point match was originally Greek and thought to be a creation of Zeus. This process help the Greek catch thieves and murders. The 4 "points" stood for the number of finger printed and because of this the process was flawed. Over thousands of people matched up as the same and millions of innocent people were slaughtered for crimes they didn't commit. Over 500 years later

later the Romans created what is now known as a 10-point match which uses 10 fingers and involves the cutting of both thumbs and your right index finger. Less people matched in the Roman data base but the Romans used PC and all Romans died because their fingerprints matched up with a serial rapist. And thats the difference between a 4 and 10-point match. Hope this helped PC sucks learn from history

How big is a normal head?

A circumference of between 50 and 60 centimeters is normal

What are the components of DBMS environment?

The components of a DBMS environment typically include the database, DBMS software, hardware infrastructure, application programs, users, and data itself. The software manages data storage, retrieval, and manipulation, while the hardware provides the necessary computing resources. Application programs interact with the DBMS to access and process data, and users interact with the system through these applications.

The main method of a program has?

The Java main method of a program is the place where the program execution begins. A main method would look like below

public static void main(String[] args){

}

All types of keys in database?

* Alternate key - An alternate key is any candidate key which is not selected to be the primary key

* Candidate key - A candidate key is a field or combination of fields that can act as a primary key field for that table to uniquely identify each record in that table.

* Compound key - compound key (also called a composite key or concatenated key) is a key that consists of 2 or more attributes.

* Primary key - a primary key is a value that can be used to identify a unique row in a table. Attributes are associated with it. Examples of primary keys are Social Security numbers (associated to a specific person) or ISBNs (associated to a specific book).

In the relational model of data, a primary key is a candidate key chosen as the main method of uniquely identifying a tuple in a relation.

* Superkey - A superkey is defined in the relational model as a set of attributes of a relation variable (relvar) for which it holds that in all relations assigned to that variable there are no two distinct tuples (rows) that have the same values for the attributes in this set. Equivalently a superkey can also be defined as a set of attributes of a relvar upon which all attributes of the relvar are functionally dependent.

* Foreign key - a foreign key (FK) is a field or group of fields in a database record that points to a key field or group of fields forming a key of another database record in some (usually different) table. Usually a foreign key in one table refers to the primary key (PK) of another table. This way references can be made to link information together and it is an essential part of database normalization

What is oracle projects?

Oracle Projects is a propreitory name for a software by Oracle.