Tag Archives: COMPUTER SCIENCE

File system Vs database systems (advantages database )

File system Vs Database systems

file system vs database system
file system vs database system

File system: In computing, a file system or filesystem is used to control how data is stored and retrieved. Without a file system, information placed in a storage medium would be one large body of data with no way to tell where one piece of information stops and the next begins. Continue reading File system Vs database systems (advantages database )

Types of databases and database applications – tutorial 2

Database Types and database applications

database types and applications
Database types and applications
  • Numeric and Textual Databases – Traditional database systems.
  • Multimedia Databases – store pictures, video clips, and sound images.
  • Geographic Information Systems (GIS) – store and analyze maps, weather data, and satellite images.
  • Data Warehouses and OLAP – extract and analyze useful information from very large databases for decision making .
  • Real – time and Active Databases – used in controlling industrial and manufacturing processes.

Continue reading Types of databases and database applications – tutorial 2

Basic Definitions Database Systems Tutorial 1 Unit 1

Basic definitions

basic Definitions

  • Database: A collection of related data
  • Data : Known facts that can be recorded and have an implicit meaning, Ex: names, registration  number, age etc..
  • Mini-world: Some part of the real world about which data is stored in a database. Ex: a school’s student information and other functionalities.
  • Database Management System (DBMS): A software package/system to facilitate the creation and maintenance of a computerized database.
  • Database System: The DBMS software together with the data itself. Sometimes, the applications are also included.

Continue reading Basic Definitions Database Systems Tutorial 1 Unit 1

Generate all the strings of length n drawn from 0…k-1

Generate all the strings of length n

Suppose you are an array of size n and k value as something you have generate all possible strings of size k i.e generate all the strings.

Title

Try to solve the problem on your own first use this compiler post you Continue reading Generate all the strings of length n drawn from 0…k-1

Generate all the strings of n bits assume an array

Generate all the strings of n bits. Assume A[0. . . n-1] is an array of size n

Suppose you enter an array size.  You have to display all possible combination of bits 0’s and 1’s  of size n i.e stings of n bits

Title

Try to solve the problem before looking at the answer Continue reading Generate all the strings of n bits assume an array

Implement an Echo UDP server in C

Implement an Echo UDP server in C

The Echo Protocol is a service in the Internet Protocol Suite defined in RFC 862. … A host may connect to a server that supports the Echo Protocol using the Transmission Control Protocol (TCP)( echo UDP) or the User Datagram Protocol (UDP) on the well-known port number 7. Continue reading Implement an Echo UDP server in C

Message transfer from client to server using UDP in C

Implement a message transfer from client to server process using UDP.

 

  • UDP is a simple transport-layer protocol. The application writes a message to a UDP socket, which is then encapsulated in a UDP datagram, which is further encapsulated in an IP datagram, which is sent to the destination.

Title

Continue reading Message transfer from client to server using UDP in C

C program for file transfer using TCP

File transfer using TCP

 

Concept of file transfer

There are three steps in file transfer

a)Connection Establishment,

b)Data Transfer,

c)Connection Termination

Now here a client is sending a file to a server, over a TCP socket.

The server does some processing on the file and sends it back to the client. Continue reading C program for file transfer using TCP

Socket Programming – Introduction Lab programs

Socket Programming

 

Title

Client Server Model

  • The client connects to the other process, the server, typically to make a request for information .
  • A close imitation of such a model is a phone call between two persons.
  • The client need to know the address of the server beforehand but the server need not know the address of the client.
  • Once a connection is established, both sides can send and receive information.
  • A socket is one end of an inter-process communication channel.
  • The two processes each establish their own socket.

Continue reading Socket Programming – Introduction Lab programs

Master Theorem For Divide And Conquer

Master Theorem For Divide And Conquer

Master theorem states that all divide and conquer algorithms divide the problem into sub-problems, each of which is part of the original problem, and then solve each of these sub-problems  to compute the final answer. Continue reading Master Theorem For Divide And Conquer