Posts

Showing posts from June, 2024

About me

Image
  A BRIEF INTRODUCTION Tech Notes is your go-to hub for all things tech! We specialize in coding, hacking, artificial intelligence, database systems, software development models, and more. Dive into our curated collection of articles, tutorials, and guides crafted by industry experts. Stay updated on emerging technologies and innovative trends shaping the future. Whether you're a seasoned developer, a curious enthusiast, or a budding tech aficionado, join our vibrant community and embark on a journey of continuous learning and exploration. Welcome to Tech Notes—where knowledge meets innovation! TEAM MEMBERS     1. Aiush Sharma (me)                                                                2. Sahil Neupane (co-host)   OUR SERVICES Tech Notes offers a comprehensive suite of services tailored to your tech ne...

Database Management System (DBMS)

Image
 Database Management System (DBMS) Database:  Database is the collection of related data of an organization. For eg: Student marks in different subjects.  Database Management System (DBMS): Used for creating and constructing of database. Advantages: 1.Sharing of database:' It allows to share database among different network for communication. 2.Minimise redundancy: The database table should have primary key that doesnot allow to make any duplicate records. So,that it minimises the duplication of data within database. 3.Easy to access: Records can be easily accessed by the use of key constraints. 4.Inconsistency: DBMS allows to show the modified data within the records. It doesnot allow to save or to show the previous data with relation of other tables. 5.Less Space: It occupies less space due to the compressed form of database in table. 6. Backup and recovery We can store huge amount of data as backup and can easily recover in case of loss through server, Disadvantages: 1...

Recend Trend In Technology

Image
  Artificial Intelligence (AI) AI, or artificial intelligence, refers to the simulation of human intelligence processes by machines, especially computer systems. These processes include learning (the acquisition of information and rules for using the information), reasoning (using rules to reach approximate or definite conclusions), and self-correction. AI encompasses various subfields, such as machine learning, natural language processing, computer vision, robotics, and more. The goal of AI is to create systems that can perform tasks that would typically require human intelligence, such as problem-solving, decision-making, understanding natural language, recognizing patterns, and adapting to new situations TYPES OF AI On the basis of Capability: Artificial intelligence can be categorized based on capability into three types: 1. Narrow AI (Weak AI) : This type of AI is designed and trained for a specific task or set of tasks. Narrow AI systems are specialized to perform a narrow ra...

Cyber data security

Image
    Cyber data security Data security is protection of data in database system against unauthorised access , modification , failure , missing and destruction .  There are following types of data security control methods , they are: 1. Authentication: Authentication is a method of allowing user to access database by Database Administrator. It contains rules and protocols. For eg:- Login System for logging in users. 2. Authorisation: It is a set of rules and limitations made by DBA for stopping the user from misusing power of database which has also many rules and regulations. For eg: A normal user cannot access google database directly. 3.Flow control: It is done by DBA for regulating the flow of data in database . It is the act of supervising and finding faults in the function of database. For eg : CCTV control  4.Encryption: It is a method in which plain text is converted into ASC code by encryption and cipur text is generated and it is decrypted by using cipur t...