Red Rose Schools About Red Rose Group Student Corner Red Rose Schools Contact Red Rose School Download Academic Calender
 
 

 

Page:     10  of  22   << Prev     |   Next >>

Search results:  219

Input operation

Posted Date : 7/8/2011

The process of entering data and instruction into the computer system called input operation.A computer can accept data (input)form a wide range variety of input devices ranging from simple keyboard to complex equipment like Magnetic ink character reader (MICR)which directly input.

 

Azhar islam   (XI)

Red Rose Berasia Road

   

input devices

Posted Date : 7/7/2011

Camera - most cameras like this are used during live conversations. The camera transmits a picture from one computer to another, or can be used to record a short video. Compact Disc (CD) - CDs store information. The CD can then be put into another computer, and the information can be opened and added or used on the second computer. Note: A CD-R or CD-RW can also be used as an OUTPUT device. Keyboard - The keyboard is a way to input letters or numbers into different applications or programs. A keyboard also has special keys that help operate the computer. Mouse - The mouse is used to open and close files, navigate web sites, and click on a lot of commands (to tell the computer what to do) when using different applications. Digital Camera - A digital camera can be used to take pictures. It can be hooked up to a computer to transfer the pictures from the camera to the computer. Some digital cameras hold a floppy disk, and the floppy disk can be taken out of the camera and put directly into the computer. Drawing Tablet - A drawing tablet is similar to a white board, except you use a special pen to write on it and it~s connected to the computer. Then the word or image you draw can be saved on the computer. Microphone - A microphone is used to record sound. The sound is then saved as a sound file on the computer. Scanner - A scanner is used to copy pictures or other things and save them as files on the computer. Disk Drive - A disk drive can hold a CD or a floppy disk. It reads the information on the disk so that the computer can use it. Joystick - A joystick is used to move the cursor from place to place, and to click on various items in programs. A joystick is used mostly for computer games. Touch Screen - A touch screen is a computer screen or other screen that you can touch with your finger to enter information. Examples of touch screens include a smart board, a microwave, a dishwasher, or an ATM at a bank. Bar Code Scanner - A bar code scanner scans a little label that has a bar code on it. The information is then saved on the computer. Bar code scanners are used in libraries a lot.

 

prerna sharma   (XI)

Red Rose Berasia Road

   

Input Devices

Posted Date : 7/7/2011

Input device From Wikipedia, the free encyclopedia In computing, an input device is any peripheral (piece of computer hardware equipment) used to provide data and control signals to an information processing system such as a computer or other information appliance. Input and output devices make up the hardware interface between a computer and a scanner or 6DOF controller. Many input devices can be classified according to: modality of input (e.g. mechanical motion, audio, visual, etc.) the input is discrete (e.g. key presses) or continuous (e.g. a mouse~s position, though digitized into a discrete quantity, is fast enough to be considered continuous) the number of degrees of freedom involved (e.g. two-dimensional traditional mice, or three-dimensional navigators designed for CAD applications) Pointing devices, which are input devices used to specify a position in space, can further be classified according to: Whether the input is direct or indirect. With direct input, the input space coincides with the display space, i.e. pointing is done in the space where visual feedback or the cursor appears. Touchscreens and light pens involve direct input. Examples involving indirect input include the mouse and trackball. Whether the positional information is absolute (e.g. on a touch screen) or relative (e.g. with a mouse that can be lifted and repositioned) Direct input is almost necessarily absolute, but indirect input may be either absolute or relative. For example, digitizing graphics tablets that do not have an embedded screen involve indirect input and sense absolute positions and are often run in an absolute input mode, but they may also be set up to simulate a relative input mode where the stylus or puck can be lifted and repositioned. Contents [hide] 1 Keyboards 2 Pointing devices 3 High-degree of freedom input devices 4 Composite devices 5 Imaging and Video input devices 6 Audio input devices 7 Further Reading Keyboards Main article: Computer keyboard A ~keyboard~ is a human interface device which is represented as a layout of buttons. Each button, or key, can be used to either input a linguistic character to a computer, or to call upon a particular function of the computer. Traditional keyboards use spring-based buttons, though newer variations employ virtual keys, or even projected keyboards. Examples of types of keyboards include: Computer keyboard Keyer Chorded keyboard LPFK Pointing devices Main article: Pointing device A computer mouse A pointing device is any human interface device that allows a user to input spatial data to a computer. In the case of mice and touch screens, this is usually achieved by detecting movement across a physical surface. Analog devices, such as 3D mice, joysticks, or pointing sticks, function by reporting their angle of deflection. Movements of the pointing device are echoed on the screen by movements of the cursor, creating a simple, intuitive way to navigate a computer~s GUI. High-degree of freedom input devices Some devices allow many continuous degrees of freedom as input. These can be used as pointing devices, but are generally used in ways that don~t involve pointing to a location in space, such as the control of a camera angle while in 3D applications. These kinds of devices are typically used in CAVEs, where input that registers 6DOF is required. Composite devices Wii Remote with attached strap Input devices, such as buttons and joysticks, can be combined on a single physical device that could be thought of as a composite device. Many gaming devices have controllers like this. Technically mice are composite devices, as they both track movement and provide buttons for clicking, but composite devices are generally considered to have more than two different forms of input. Game controller Gamepad (or joypad) Paddle (game controller) Wii Remote Imaging and Video input devices Video input devices are used to digitize images or video from the outside world into the computer. The information can be stored in a multitude of formats depending on the user~s requirement. digital camera Webcam Image scanner Fingerprint scanner Barcode reader 3D scanner Laser rangefinder Medical Imaging Computed tomography Magnetic resonance imaging Positron emission tomography Medical ultrasonography Audio input devices In the fashion of video devices, audio devices are used to either capture or create sound. In some cases, an audio output device can be used as an input device, in order to capture produced sound. Microphone MIDI keyboard or other digital musical instrument Further Reading N. P. Milner. 1988. A review of human performance and preferences with different input devices to computer systems. In Proceedings of the Fourth Conference of the British Computer Society on People and computers IV, D. M. Jones and R. Winder (Eds.). Cambridge University Press, New York, NY, USA, 341-362. ISBN 0-521-36553-8

 

syed amaan ahmed   (XI)

Red Rose Berasia Road

   

input devices

Posted Date : 7/7/2011

is any hardware device that sends data to the computer, without any input devices, a computer would only be a display device and not allow users to interact with it, much like a TV. In the picture to the right, is a Logitech trackball mouse and an example of an input device. Below is a complete listing of all the different computer input devices that can be used on a computer. * Barcode reader * Digital camera * Gamepad * Joystick * Keyboard * Microphone * MIDI keyboard * Mouse (pointing device) * Remote * Scanner * Webcam Also see: HID, Input, Input/output device, Keyboard definitions, Mouse definitions, Output device, Pointing device * Useful links * Home * Site map * Computer help * News * Q&A * What~s new * Tools * Print page * E-mail page * Edit page * Share page * Category * Dictionary * Related pages * I - Definitions * Solved? * Were you able to locate the answer to your question? * Yes * No

 

ayushi soni   (XI)

Red Rose Berasia Road

   

If I Were Invisable

Posted Date : 7/5/2011

If you were invisible, would you live your life differently? Think about this for a moment. If you were invisible and no one could see you no matter what you did, what would you be doing right now? What would you choose to do with the rest of your life? Let’s take it one step further, and imagine that as well as being invisible, you have no name and no identity. Would you live your life differently if nothing that you did could ever be traced back to you? Would you still want to write that book or record that album if you couldn’t put your name on the cover? Taking the time to think about your answers to this question will help you find balance in your life. How? It will help you align with your true purpose. Your answers will help you see where you are being of service to others, and where you are possibly wasting time trying to please your ego. Let me give you an example. When I completed this exercise, I came to the conclusion that if I were invisible and nothing I did mattered, I would still clean and organize my home on a regular basis. Yeah – it’s kind of crazy, I know, but I would do that for my husband as well as for myself. It is very important to me for him to be comfortable in his surroundings and even though he doesn’t realize how much time, effort, and energy cooking, cleaning, laundry, and organizing the house requires, I know he would be a mess without it. (Come to think of it, I am sort of invisible in this regard – aren’t we all? But that’s another post!) The other thing I would do if I were invisible is go around whispering in people’s ears – “You can do it!” I would be that voice that you sometimes hear when no one is around that motivates and inspires you to become your best. I would encourage everyone I could. Want to lose weight? You can do it! Want to go back to school? You can do it! Want to go for that promotion? You can do it! Want to start your own business? You can do it! Want to quit your job and stay at home with your kids? You can do it! Whatever your heart is calling you toward, you can do it! So, in my daily efforts of writing books, speaking, preparing seminars, designing websites, etc., all of it falls into my passion and true purpose. All of the organizing, cooking, cleaning, writing, speech preparing, web designing etc. – all of it, as long as it is within the guidelines of helping and motivating others, (or myself), is time well-spent. At the end of the session my higher self reminded me that I am not invisible, and that that is on purpose – by design of a Higher Power. I am visible so that I can motivate, educate, and inspire others to be their best and reach their full potential. It’s a good feeling to know that I am living a life, fully visible, in line with my true self. But now it’s your turn: What would you do if you were invisible? Make a list of the things you would continue to do, and then a list of what you would no longer do. How many of the latter could you let go of now? Think about how much more freedom letting go of those things would give you to do the things that align with your true purpose. As you begin doing more of what your inner being calls you toward, you will find more things in that realm that please you. Living a life full of purpose requires that we remain true to our “invisible” selves. Until next time, Live Joyfully!

 

yusuf   (XII)

Red Rose Berasia Road

   

universe

Posted Date : 7/5/2011

Universe - Wikipedia, the free encyclopedia The universe is commonly defined as the totality of everything that exists, including all physical matter and energy, the planets, stars, galaxies,

 

anam arshi khan   (XI)

Red Rose Berasia Road

   

laser surgery

Posted Date : 7/5/2011

Laser surgery is surgery using a laser to cut tissue instead of a scalpel. Examples include the use of a laser scalpel in otherwise conventional surgery, and soft tissue laser surgery, in which the laser beam vaporizes soft tissue with high water content. Laser resurfacing is a technique in which molecular bonds of a material are dissolved by a laser. Laser surgery is commonly used on the eye. Techniques used include LASIK, which is used to correct near and far-sightedness in vision, and photorefractive keratectomy, a procedure which permanently reshapes the cornea using an excimer laser to remove a small amount of tissue. Green laser surgery is used for the treatment/reduction of enlarged prostates. Laser surgery is much safer than normal surgery as it makes no physical contact so no infections are spread. The word Laser is an acronym, meaning: Light amplification by stimulated emission of radiation.

 

kirti   (XI)

Red Rose Berasia Road

   

blood donation

Posted Date : 7/5/2011

Blood is donated by many persons in different categories. If at all a person who is in critical condition he would need blood in urgent manner so that his life can be safer without any worries. However the blood donation has been classified as paid and non paid. Paid donation has been very rare in almost all well developed countries and it is more or less fine in poor countries. Usually each country has maximum number of blood centers to help the poor people at the time of emergency so that they can be saved from lethality of the issue. However, some people may be paid for the blood that they are giving irrespective of the sex and religion. Also there are lots of voluntary services in this country to donate blood at critical times and for which they never require money at all. Lists of both paid and non paid centers are present in this era and hence they are so helpful in getting blood transfused. However, these paid centers are not maximum in numbers and all including government do not appreciate these centers or persons who want to donate blood for ... see more Read more: http://www.kosmix.com/topic/blood_donation#ixzz1RC8GitpN

 

shreya   (XI)

Red Rose Berasia Road

   

Albert Einstein

Posted Date : 7/5/2011

Albert Einstein was born at Ulm, in Württemberg, Germany, on March 14, 1879. Six weeks later the family moved to Munich, where he later on began his schooling at the Luitpold Gymnasium. Later, they moved to Italy and Albert continued his education at Aarau, Switzerland and in 1896 he entered the Swiss Federal Polytechnic School in Zurich to be trained as a teacher in physics and mathematics. In 1901, the year he gained his diploma, he acquired Swiss citizenship and, as he was unable to find a teaching post, he accepted a position as technical assistant in the Swiss Patent Office. In 1905 he obtained his doctor~s degree. During his stay at the Patent Office, and in his spare time, he produced much of his remarkable work and in 1908 he was appointed Privatdozent in Berne. In 1909 he became Professor Extraordinary at Zurich, in 1911 Professor of Theoretical Physics at Prague, returning to Zurich in the following year to fill a similar post. In 1914 he was appointed Director of the Kaiser Wilhelm Physical Institute and Professor in the University of Berlin. He became a German citizen in 1914 and remained in Berlin until 1933 when he renounced his citizenship for political reasons and emigrated to America to take the position of Professor of Theoretical Physics at Princeton*. He became a United States citizen in 1940 and retired from his post in 1945.

 

kirti   (XI)

Red Rose Berasia Road

   

my ip lesson

Posted Date : 7/5/2011

Definition of front end Applications Front end is a user interface or that part of a software or a website that a user sees on the screen, and acts on to enter commands or to access other parts of the software or website. This Software’s are basically GUI (Graphical User Interface) Software’s created for user friendly data entry….Front software for basically GUI software created for user friendly data entry and it is easy to use. &n bsp; &n bsp; Front end and back end are generalized terms that refer to the initial and the end stages of a process.[citation needed] The front end is responsible for collecting input in various forms from the user and processing it to conform to a specification the back end can use. The front end is an interface between the user and backend. Front end may refer to: · &nbs p; &nbs p; &nbs p; The front of a vehicle body · &nbs p; &nbs p; &nbs p; Front-end load, a charge in investing · &nbs p; &nbs p; &nbs p; Front End Loader, a band · &nbs p; &nbs p; &nbs p; Front-end loader, construction equipment Definition of Back-end Applications Backend software is that software which helps the user to store the data in tabular format. These contain some of the loading and commands for generating quarry for searching any result OR Backend software is basically database software…… … …MORE APPLICATION AREAS OF DATABASE Every software or package has two parts front-end and back-end. In any official or business field we need to store and process the data through the use of any software package. INVENTORY CONTROL Inventory control is a list of goods and material held available in stock by a business. Inventory control is to determine and maintain an optimum level of investment in the inventory. OBJECTIVE TYPE QUES.:- Q-1: Choose the correct Answers: (1) Back end is related to-? Ans-Database (2) Which is not type of tax-? Ans-Fees (3) Salary based accounting system is-? Ans-Payroll Accounting ________________________ ________________________ ________________________ ___________________ Q-2: Fill in the blanks: (1) &nb sp; &nb sp; Serial no. is always used for Invoice management system. (2) &nb sp; &nb sp; Graphics are the part of Front-end system (3) &nb sp; &nb sp; In client server system the server is called Back-end. ________________________ ________________________ ________________________ ____________________ Q-3: State True or False: (1) &nb sp; &nb sp; SYBASE is a Front end tool: False (2) &nb sp; &nb sp; HRD system deals the personal information of employees: True (3) &nb sp; &nb sp; Client server application is a Hardware concept: False ________________________ ________________________ ________________________ _______ Q-4: Match the column: (1) &nb sp; &nb sp; TUI &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; (a)Technical user Interface (2) &nb sp; &nb sp; GUI &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; (b)Graphical User Interface (3) &nb sp; &nb sp; VB &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; (c)Front end (4) &nb sp; Tables (d)Back end .Model of System Development Life Cycle…. System Development Life Cycle The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application. Various SDLC methodologies have been developed to guide the processes involved, including the waterfall model (which was the original SDLC method); rapid application development (RAD); joint application development (JAD); the fountain model; the spiral model; build and fix; and synchronize-and-stabiliz e. Often, several models are combined into some sort of hybrid methodology. Documentation is crucial regardless of the type of model chosen or devised for any application, and is usually done in parallel with the development process. Some methods work better for specific types of projects, but in the final analysis, the most important factor for the success of a project may be how closely the particular plan was followed. In general, an SDLC methodology follows these steps: 1. &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; If there is an existing system, its deficiencies are identified. This is accomplished by interviewing users and consulting with support personnel. 2. &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; The new system requirements are defined including addressing any deficiencies in the existing system with specific proposals for improvement. 3. &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; The proposed system is designed. Plans are created detailing the hardware, operating systems, programming, and security issues. 4. &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; The new system is developed. The new components and programs must be obtained and installed. Users of the system must be trained in its use, and all aspects of performance must be tested. If necessary, adjustments must be made at this stage. 5. &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; &nbs p; The system is put into use. This can be done in various ways. The new system can phased in, according to application or location, and the old system gradually replaced. In some cases, it may be more cost-effective to shut down the old system and implement the new system all at once. Types of System development Life Cycle 1. Requirements It includes all the basic details used for generating any application software or any of the financial accounting system / business related financial system. 2. System analysis The goal of system analysis is to determine where the problem is in an attempt to fix the system. This step involves breaking down the system in different pieces to analyze the situation, analyzing project goals, breaking down what needs to be created and attempting to engage users so that definite requirements can be defined. Requirements analysis sometimes requires individuals/teams from client as well as service provider sides to get detailed and accurate requirements; often there has to be a lot of communication to and from to understand these requirements. Requirement gathering is the most crucial aspect as many times communication gaps arise in this phase and this leads to validation errors and bugs in the software program. 3. Design In systems design the design functions and operations are described in detail, including screen layouts, business rules, process diagrams and other documentation. The output of this stage will describe the new system as a collection of modules or subsystems. The design stage takes as its initial input the requirements identified in the approved requirements document. For each requirement, a set of one or more design elements will be produced as a result of interviews, workshops, and/or prototype efforts. 4. Coding A coding includes the creation of database and linking of software together in Front-End and Back-End with specific command, syntax and instructions required for linking. 5. Testing The code is tested at various levels in software testing. Unit, system and user acceptance testing’s often performed. This is a grey area as many different opinions exist as to what the stages of testing are and how much if any iteration occurs. Iteration is not generally part of the waterfall model, but usually some occur at this stage. In the testing the whole system is test one by one 6. Acceptance It includes the deliverable software which is already tested and granted which has to be implemented over the system operations porting and fulfilling the requirements OBJECTIVES Q-1CHOOSE THE CORRECT ANSWER: 1. The answer of HOW and WHAT is given by Ans-(a) Analysis 2. Database schema is the output of- Ans-(b) Design 3. Data Model are used for- &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; &n bsp; Ans-(b) Database Q-2Fill in the blanks: 1. Network model is defined by CODASYL in 1971 year. 2. Object oriented database uses feature of Object Oriented language. 3. Table concept is used in Relational language. Q-3True and False: 1. SQL is a standard Language for RDBMS-(TRUE) 2. Feasibility study checks the possibility of system-(TRUE) 3. Coding Phase is related to programming-(TRUE) Q-4Match the column: 1. ROW &nb sp; &nb sp; &nb sp; Tuple 2. COLUMN Attribute 3. RDBMS & nbsp; & nbsp; Edger codd 4. SDLC &n bsp; &n bsp; &n bsp; Attribute INTRODUCTION to Entity Relationship Model: We have covered the concepts of relational databases in "Introduction to Databases," how to access such databases in "Accessing Databases with SQL," creation of web pages with forms in "Creating Web Pages" and "Web Forms for Database Queries," and CGI programming to interface between web pages and databases and to process data in "CGI Programs and Web Forms" and "CGI Programs in C++ Using the My SQL C API," "In Genomic Data," "Genomic Sequence Comparison," and "Searching Genomic Databases," we studied some of the algorithms to process genomic data and how to use these algorithms in conjunction with the above tasks. Until now, however, we have employed existing databases. The current module, "Relational Database Development," and "Creating and Changing Databases with SQL" discuss how we can design and produce databases. The ability to do so is important for development of databases for our own use or for larger computational science applications. Throughout this discussion, we consider the "College Physics Example" of the module "Computational Science and Web-Accessed Databases" as well as other applications. Entities and Entity Sets · An entity is an object that exists and is distinguishable from other objects. For instance, John Harris with S.I.N. 890-12-3456 is an entity, as he can be uniquely identified as one particular person in the universe. · An entity may be concrete (a person or a book, for example) or abstract (like a holiday or a concept). · An entity set is a set of entities of the same type (e.g., all persons having an account at a bank). · Entity sets need not be disjoint. For example, the entity set employee (all employees of a bank) and the entity set customer (all customers of the bank) may have members in common. · An entity is represented by a set of attributes. o E.g. name, S.I.N., street, city for ``customer~~ entity. o The domain of the attribute is the set of permitted values (e.g. the telephone number must be seven positive integers). · Formally, an attribute is a function which maps an entity set into a domain. o Every entity is described by a set of (attribute, data value) pairs. o There is one pair for each attribute of the entity set. . · The concept of an entity set corresponds to the programming language type definition. · A variable of a given type has a particular value at a point in time. · Thus, a programming language variable corresponds to an entity in the E-R model. Attributes It is possible to define a set of entities and the relationships among them in a number of different ways. The main difference is in how we deal with attributes. · &nbs p; &nbs p; Consider the entity set employee with attributes employee-name and phone-number. · &nbs p; &nbs p; We could argue that the phone be treated as an entity itself, with attributes phone-number and location. · &nbs p; &nbs p; Then we have two entity sets, and the relationship set Epping defining the association between employees and their phones. · &nbs p; &nbs p; This new definition allows employees to have several (or zero) phones. · &nbs p; &nbs p; New definition may more accurately reflect the real world. · &nbs p; &nbs p; We cannot extend this argument easily to making employee-name an entity. Mapping Constraints An E-R scheme may define certain constraints to which the contents of a database must conform. · Mapping Cardinalities: express the number of entities to which another entity can be associated via a relationship. For binary relationship sets between entity sets A and B, the mapping cardinality must be one of: 1. &nbs p; One-to-one: An entity in A is associated with at most one entity in B, and an entity in B is associated with at most one entity in A. (Figure 2.3) 2. One-to-many: An entity in A is associated with any number in B. An entity in B is associated with at most one entity in A. (Figure 2.4) 3. &nbs p; Many-to-one: An entity in A is associated with at most one entity in B. An entity in B is associated with any number in A. (Figure 2.5) 4. &nbs p; Many-to-many: Entities in A and B are associated with any number from each other. Objectives: Q1 Choose the correct answer: 1. &nbs p; &nbs p; &nbs p; Key attributes represents: Ans-Primary Key 2. &nbs p; &nbs p; &nbs p; ER Model is a: Conceptual: Ans-Model 3 ; ; Only one entity set is used in: Ans-Ternary & nbsp; & nbsp; Q2. Fill in the blanks: 1. &nbs p; Mapping is used to show the Association of entities. 2. &nbs p; Weak entity set is associate with Owner entity set. 3. &nbs p; Value of Derived Attribute is determined by Base Attribute. Q3. Stay true or false: 1. &nbs p; Ternary relationship has three entity set: True 2. &nbs p; Weak entity sets may have primary key: False 3. &nbs p; ER Model could be converted in to Relation Model: True Q4. Match the column: 1. Composite Attribute &nb sp; &nb sp; Sub Attribute 2. Multivalued Attribute &nb sp; &nb sp; Many values 3. Binary Relationship Two entity set 4. Weak Entity Owner Entity Types of SQL Statements The tables in the following sections provide a functional summary of SQL statements and are divided into these categories: · Data Definition Language (DDL) Statements · Data Manipulation Language (DML) Statements · Transaction Control Statements · Session Control Statements · System Control Statement · Embedded SQL Statements 1. Data Definition Language (DDL) Statements Data definition language (DDL) statements let you to perform these tasks: · Create, alter, and drop schema objects · Grant and revoke privileges and roles · Analyze information on a table, index, or cluster · Establish auditing options · Add comments to the data dictionary The CREATE; ALTER, and DROP commands require exclusive access to the specified object. For example, an ALTER TABLE statement fails if another user has an open transaction on the specified table. The GRANT, REVOKE, ANALYZE, AUDIT, and COMMENT commands do not require exclusive access to the specified object. For example, you can analyze a table while other users are updating the table. Oracle Database implicitly commits the current transaction before and after every DDL statement. Many DDL statements may cause Oracle Database to recompile or reauthorize schema objects. For information on how Oracle Database recompiles and reauthorizes schema objects and the circumstances under which a DDL statement would cause this, see Oracle Database Concepts. DDL statements are supported by PL/SQL with the use of the DBMS_SQL package. 2.Data Manipulation Language (DML) Statements Data manipulation language (DML) statements access and manipulate data in existing schema objects. These statements do not implicitly commit the current transaction. The data manipulation language statements are: CALL DELETE EXPLAIN PLAN INSERT LOCK TABLE MERGE SELECT UPDATE The SELECT statement is a limited form of DML statement in that it can only access data in the database. It cannot manipulate data in the database, although it can operate on the accessed data before returning the results of the query. 3.Transaction Control Statements Transaction control statements manage changes made by DML statements. The transaction control statements are: COMMIT ROLLBACK SAVEPOINT SET TRANSACTION All transaction control statements, except certain forms of the COMMIT and ROLLBACK commands, are supported in PL/SQL. For information on the restrictions, see COMMIT and ROLLBACK . 4.Session Control Statements Session control statements dynamically manage the properties of a user session. These statements do not implicitly commit the current transaction. PL/SQL does not support session control statements. The session control statements are: 1. ALTER SESSION 2. SET ROLE 5.System Control Statement The single system control statement, ALTER SYSTEM, dynamically manages the properties of an Oracle Database instance. This statement does not implicitly commit the current transaction and is not supported in PL/SQL. 6. Embedded SQL Statements Embedded SQL statements place DDL, DML, and transaction control statements within a procedural language program. Embedded SQL is supported by the Oracle recompiles and is documented in the following books: · Pro*COBOL Programmer~s Guide · Pro*C/C++ Programmer~s Guide · Oracle SQL*Module for Ada Programmer~s Guide Embedded SQL statements are: OPEN CLOSE DECLARE CONNECT FETCH Objectives Ques: 1 Choose the correct answer: 1. SQl is a standard language by- Ans- ANSI 2. PL/SQL commands by- Ans-Embedded SQL 3. Alter modifies- Ans-Table Structure ________________________ ________________________ ________________________ ___________ Ques: 2 fill in the Blanks of the following: 1. DDL commands are specially made for Database Objects. 2. All operations are cancelled by ROLLBACK command. 3. DML statements arte used for data ________________________ ________________________ ________________________ ___________ Ques: 3 State True or False: 1. COMMIT is used to save all operations-(TRUE) 2. Session control statements are not supported in PL/SQL-(TRUE) 3. DROP command is used to drop a column-(FALSE) Ques: 4 match the column: 1. GRANT & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; (a) DDL 2. MERGE (b) DML 3. SAVEPOINT &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; (C) TCS &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; &nb sp; .Meta data- Meta data are ‘data about data’ of any sort in any media. An item of metadata may describe an individual datum, or content item, or content item, or a collection of data including multiple content items. The word Meta comes from the Greek, where it means ‘after’ or ‘beyond’. Metadata are used facilitate the understanding, characteristics, use and management of data. .Data Dictionary- A data structure which stores meta-data is called Data dictionary. Usually it means a table in a data base that stores the names, fields, types, length, and other Characteristics of the field in the database tables. An active data dictionary is automatically updated as changes occur in the database. A passive data dictionary must be annually updated. &nbs p; &nbs p; &nbs p; &nbs p; The data dictionary is a more general software utility used by designers, users, and administrator for information recourses management. The data dictionary may maintain information on system hardware, software, documentation, users and other aspects. .Data Warehouse- Abbreviated DW, a collection of data designed to support management decision making. Data warehouses contain a wide variety of data that present a coherent picture of business conditions at a single point in time. Development of a data warehouse includes development of systems to extract data from operating systems plus installation of a warehouse database system that provides managers flexible access to the data. The term data warehousing generally refers to the combination of many different databases across an entire enterprise. Contrast with data mart. .Data Mining- Data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cuts costs, or both. Data mining software is one of a number of analytical tools for analyzing data. It allows users to analyze data from many different dimensions or angles, categorize it, and summarize the relationships identified. Technically, data mining is the process of finding correlations or patterns among dozens of fields in large relational databases. The three major data mining techniques are:- · Classes: Stored data is used to locate data in predetermined groups. For example, a restaurant chain could mine customer purchase data to determine when customers visit and what they typically order. This information could be used to increase traffic by having daily specials. · Clusters: Data items are grouped according to logical relationships or consumer preferences. For example, data can be mined to identify market segments or consumer affinities. · Sequential patterns: Data is mined to anticipate behavior patterns and trends. For example, an outdoor equipment retailer could predict the likelihood of a backpack being purchased based on a consumer~s purchase of sleeping bags and hiking shoes .Object-Oriented Modeling Object-Oriented Modeling, or OOM, (Object Oriented Programming - OOP)is a modeling paradigm mainly used in computer programming. Prior to the rise of OOM, the dominant paradigm was procedural programming, which emphasized the use of discreet reusable code blocks that could stand on their own, take variables, perform a function on them, and return values. The Object-Oriented paradigm assists the programmer to address the complexity of a problem domain by considering the problem not as a set of functions that can be performed but primarily as a set of related, interacting Objects. The modeling task then is specifying, for a specific context, those Objects (or the Class the Objects belongs to), their respective set of Properties and Methods, shared by all Objects members of the Class. For more discussion, see Object-oriented analysis and design and Object-oriented programming. The description of these Objects is a Schema. As an example, in a model of a Payroll System, a Company is an Object. An Employee is another Object. Employment is a Relationship or Association. An Employee Class (or Object for simplicity) has Attributes like Name, Birth date, etc. The Association itself may be considered as an Object, having Attributes, or Qualifiers like Position, etc. An Employee Method may be Promote, Raise, etc. The Model description or Schema may grow in complexity to require a Notation. Many notations have been proposed, based on different paradigms, diverged, and converged in a more popular one known as UML. UML (Unifying Modeling language) UML History The development of UML began in late 1994 when Grady Booch and Jim RumBaugh of Rational Software Corporation began their work on unifying the Booch and OMT (Object Modeling Technique) methods. In the fall of 1995, Ivar Jacobson and his Objector Company joined Rational and this unification effort, merging in the OOSE (Object-Oriented Software Engineering) method.1 As the primary authors of the Booch, OMT, and OOSE methods, Grady Booch, Jim Rumbaugh, and Ivar Jacobson were motivated to create a unified modeling language for three reasons. First, these methods were already evolving toward each other independently. It made sense to continue that evolution together rather than apart, eliminating the potential for any unnecessary and gratuitous differences that would further confuse users. Second, by unifying the semantics and notation, they could bring some stability to the object-oriented marketplace, allowing projects to settle on one mature modeling language and letting tool builder’s focus on delivering more useful features. Third, they expected that their collaboration would yield improvements in all three earlier methods, helping them to capture lessons learned and to address problems that none of their methods previously handled well.1 The efforts of Booch, RumBaugh, and Jacobson resulted in the release of the UML 0.9 and 0.91 documents in June and October of 1996. During 1996, the UML authors invited and received feedback from the general community. They incorporated this feedback, but it was clear that additional focused attention was still required.1 While Rational was bringing UML together, efforts were being made on achieving the broader goal of an industry standard modeling language. In early 1995, Ivars Jacobson (then Chief Technology Officer of Objector) and Richard Solely (then Chief Technology Officer of OMG) decided to push harder to achieve standardization in the methods marketplace. In June 1995, an OMG-hosted meeting of all major methodologists (or their representatives) resulted in the first worldwide agreement to seek methodology standards, under the aegis of the OMG process.1 During 1996, it became clear that several organizations saw UML as strategic to their business. A Request for Proposal (RFP) issued by the Object Management Group (OMG) provided the catalyst for these organizations to join forces around producing a joint RFP response. Rational established the UML Partners consortium with several organizations willing to dedicate resources to work toward a strong UML 1.0 definition. .Client/Server Model of computing:- & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; & nbsp; To truly understand how much of the Internet operates, including the Web, it is important to understand the concept of client/server computing. The client/server model is a form of distributed computing where one program (the client) communicates with another program (the server) for the purpose of exchanging information. -The client~s responsibility is usually to: 1. &nbs p; Handle the user interface. 2. &nbs p; Translate the user~s request into the desired protocol. 3. &nbs p; Send the request to the server. 4. &nbs p; Wait for the server~s response. 5. &nbs p; Translate the response into "human-readable" results. 6. &nbs p; Present the results to the user. -The server~s functions include: 1. &nbs p; Listen for a client~s query. 2. &nbs p; Process that query. 3. &nbs p; Return the results back to the client. -A typical client/server interaction goes like this: 1. &nbs p; The user runs client software to create a query. 2. &nbs p; The client connects to the server. 3. &nbs p; The client sends the query to the server. 4. &nbs p; The server analyzes the query. 5. &nbs p; The server computes the results of the query. 6. &nbs p; The server sends the results to the client. 7. &nbs p; The client presents the results to the user. A typical client/server interaction This client/server interaction is a lot like going to a French restaurant. At the restaurant, you (the user) are presented with a menu of choices by the waiter (the client). After making your selections, the waiter takes note of your choices, translates them into French, and presents them to the French chef (the server) in the kitchen. After the chef prepares your meal, the waiter returns with your diner (the results). Hopefully, the waiter returns with the items you selected, but not always; sometimes things get "lost in the translation." Flexible user interface development is the most obvious advantage of client/server computing. It is possible to create an interface that is independent of the server hosting the data. Therefore, the user interface of a client/server application can be written on a Macintosh and the server can be written on a mainframe. Clients could be also written for DOS- or UNIX-based computers. This allows information to be stored in a central server and disseminated to different types of remote computers. Since the user interface is the responsibility of the client, the server has more computing resources to spend on analyzing queries and disseminating information. This is another major advantage of client/server computing; it tends to use the strengths of divergent computing platforms to create more powerful applications. Although it’s computing and storage capabilities are dwarfed by those of the mainframe, there is no reason why a Macintosh could not be used as a server for less demanding applications. In short, client/server computing provides a mechanism for disparate computers to cooperate on a single computing task. _________X______________ ____________________x___ _______________________x ___________ Modules Introduction Many sitemap components serve a purpose regardless how the input is obtained. Still, to provide a wide range of components to quickly get you up to speed, variants for different inputs exist. Modules allow creating generic components and plug-in input or output later. This document will explain how modules work and how to make use of them. If you plan on writing your own modules, it is highly recommended to read Developing with Apache Avalon. It is a very good description of the underlying rationale and principles. Types of Modules Currently, three different types of modules exist: Input modules provide means to enumerate attributes and to retrieve them, output modules allow storing of data and exhibit transaction like semantics, database modules encapsulate different mechanisms for auto increment columns of various database management systems. Please refer to the javadoc documentation of these interfaces. Input modules are modeled after request attributes. The main difference is, that every method takes two additional arguments, the request object and a configuration object. The configuration object is used to allow arbitrarily complex instructions for the input module. Apart from that, input modules are more or less a drop-in replacement. Output modules are again very similar to using request attributes. Basically, they provide a method to set an attribute to a value. Again, a request and a configuration object is the only change to request attributes. A fundamental difference is, however, that output modules should exhibit transactional behavior. Database modules, actually named Auto Increment Module, contain configuration information how to retrieve a value for an auto increment column. It is possible to obtain the value before inserting a row, while inserting as part of the SQL or after successful insert. If the value is obtained before inserting, it can be generated externally. Currently, supported database management systems include HSQL, Informix, My SQL, and querying the database for the current max value. Procedures Visual Studio 2010 ·Visual Studio 2008 A procedure is a block of Visual Basic statements enclosed by a declaration statement (Function, Sub, Operator, Get, and Set) and a matching End declaration. All executable statements in Visual Basic must be within some procedure. Calling a Procedures You invoke a procedure from some other place in the code. This is known as a procedure call. When the procedure is finished running, it returns control to the code that invoked it, which is known as the calling code. The calling code is a statement, or an expression within a statement, that specifies the procedure by name and transfers control to it. Types of Procedures: 1. Sub Procedures: A Sub procedure is a series of Visual Basic statements enclosed by the Sub and End Sub statements. The Sub procedure performs a task and then returns control to the calling code, but it does not return a value to the calling code. Each time the procedure is called, its statements are executed, starting with the first executable statement after the Sub statement and ending with the first End Sub, Exit Sub, or Return statement encountered. You can define a Sub procedure in modules, classes, and structures. It is Public by default, which means you can call it from anywhere in your application that has access to the module, class, or structure in which you defined it. The term, method, describes a Sub or Function procedure that is accessed from outside its defining module, class, or structure. For more information, see Class Methods. A Sub procedure can take arguments, such as constants, variables, or expressions, which are passed to it by the calling code. Declaration Syntax The syntax for declaring a Sub procedure is as follows: [modifiers ] Sub sub name [(parameter list)] ‘Statements of the Sub procedure. End Sub 2. Function Procedures: A Function procedure is a series of Visual Basic statements enclosed by the Function and End Function statements. The Function procedure performs a task and then returns control to the calling code. When it returns control, it also returns a value to the calling code. Each time the procedure is called, its statements run, starting with the first executable statement after the Function statement and ending with the first End Function, Exit Function, or Return statement encountered. You can define a Function procedure in a module, class, or structure. It is Public by default, which means you can call it from anywhere in your application that has access to the module, class, or structure in which you defined it. A Function procedure can take arguments, such as constants, variables, or expressions, which are passed to it by the calling code. Declaration Syntax The syntax for declaring a Function

 

yusuf   (XII)

Red Rose Berasia Road

   

Page:     10  of  22   << Prev    |   Next >>

 
 
 
 
 Powered by: Bit-7 Informatics