REVIEW OF DATABASE AND PROMINENT PROGRAMMES
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 1
Abstract
Databases and database systems have become an essential component of everyday life in modern society. In the course of a day, most of us encounter several activities that involve some interaction with a database. For example, if we go to the bank to deposit or withdraw funds, if we make a hotel or airline reservation, if we access a computerized library catalog to search for a bibliographic item, or if we buy some item such as a book, toy, or computer- form on internet vendor through it Web page, there might be chances that our activities will involve someone or some computer program accessing a database, even purchasing items from a supermarket nowadays in many cases involves an automatic update of the database that keeps the inventory of supermarket items. So in this paper we will talk about how to manage the different type of data involved in any form in the database.
Authors and Affiliations
Dr. Vinod Kumar, Gagandeep Raheja, Sukhpreet Singh
CRYPTOGRAPHY
To prevent the dissemination of sensitive information from the database to unauthorized users or outside competitive or hostile agents, an organization must establish effective security policies. The art of protecting in...
Classification of Cancer of The Lungs Using SVM and ANN
Accurate diagnosis of cancer plays an important role in order to save human life. The results of the diagnosis indicate by the medical experts are mostly differentiated based on the experience of different medical expert...
Feedback Based Conflict Identification and Resolution using Duplicate Elimination and Ranking Techniques
Increase in the amount of data provides a huge scope for data analysts to operate and leverage information from them. Problems arise when the data varies in formats and their storage mechanisms become heterogeneous. Henc...
A Survey on Design Methods for Secure Software Development
Software provide services that may come with some vulnerabilities or risks. Attackers perform actions that break security of system through threats and cause a failure. To avoid security vulnerability, there are many sec...
Mobile IPTV: Implications for Education
Mobile IPTV (Internet Protocol Television) provides digital content which users watch as a television broadcast via the Internet on a mobile device. This paper presents the development of IPTV, Suan Dusit Internet Broadc...