Internet of Things (IoT) and its Impact on Our Lives A technological trend that started in its infancy years ago is now proliferating: the use of the Internet of Things (IoT). The term IoT was coined in 1982, as described by research by Farooq, Waseem, Mazhar, Khairi, and Kamal (2015). They describe the first IoT …
Read MoreUnderstanding Data Transmission Wired vs Wireless and Their Impact
Gain an Understanding Data Transmission: Wired vs. Wireless and Their Impact Transmissions are impacted by different problems depending on the method of data transmission. The two types of data communications or transmissions are guided and unguided transmission, as Comer (2014) discusses. Guided media or wire …
Read MoreUnderstanding Broadband Technologies DSL, Cable, Fiber, Cellular, and More
Feb 28, 2024 · 5 min read · technology internet economy communication networks infrastructure connectivity ·What is Broadband? Different Types of Broadband Technologies Explained What Is Broadband? Broadband has grown worldwide, promoted by policymakers, network operators, and content providers, but it does not have a single standardized definition worldwide, as described by Kelly (2012). Broadband can mean multiple aspects …
Read MoreTypes of Computer Failures Database failures can usually be categorized into transaction, system, or media failures. Failed transactions in the middle of the execution can occur for many reasons, as described by Elmasri & Navathe (2015). Most Common Failures: The most common failures are described as computer …
Read MoreDescribe how disaster recovery from catastrophic failures is handled. Illustrate in detail Catastrophes can be broken down into two subcategories: physical problems and catastrophes. Physical catastrophes can be air conditioner failures, power issues, fire, or hacking attacks. Catastrophic errors are usually caused by …
Read MorePreventive Measures Against SQL Injection Attacks An SQL injection attack occurs by having an attacker inject a string input into the application; these changes or manipulate the SQL statement to the attacker’s advantage, as described by Elmasri & Navathe (2015). They indicate that an SQL injection attack inflicts …
Read MoreWhat Is Meant by the Closure of a Set of Functional Dependencies? A functional dependency is a one-way dependency between two attributes at any given time. For a unique attribute of value A there is one value of the attribute B associated with it through the relation. Even if the values for the attribute change, there …
Read MoreThe Reasons For Having Variable-Length Records And The Use Of Separator Characters There may be many reasons for a file having variable-length records, as described by Elmasri & Navathe (2015). They are described as one field that may need to be a varying size, a field that may contain a repeating group or value, a …
Read MoreUnderstanding Database Anomalies - Insertion, Deletion, and Modification
Insertion, Deletion, and Modification Anomalies Are Considered Bad An insertion anomaly is a situation that arises when one is prevented from inserting data into a relation because the complete primary key is not available. No part of a primary key can be null. Harrington (2009) points out that insertion anomalies …
Read MoreDemystifying SQL Retrieval Queries A Step-by-Step Breakdown
Feb 15, 2024 · 4 min read · database-programming sql-tutorial data-management relational-databases ·How Is SQL Query Retrieved, and Conceptually, What Is The Order oF Executing Each of The Six Clauses? SQL or the Structured Query Language described by Bowman, Emerson, & Darnovsky (1997) was proposed in 1970 by Dr. E. F. Codd at IBM and developed the SQL language over the next decade at research facilities and …
Read More