Computer Science Wiki

            • Amazon Machine Image (AMI)
            • Connect to an EC2 instance
            • EC2 - Elastic Compute Cloud
            • EC2 Image Builder
            • EC2 Purchase Options
            • EC2 Sizing and Configuration Options
            • Security and Permissions
            • Types of EC2 Instances
          • ASG - Auto Scaling Group
          • ECR - Elastic Container Registry
          • ECS - Elastic Container Service
          • ELB - Elastic Load Balancer
          • Amazon Athena
          • Amazon Aurora
          • Amazon ElastiCache
          • Amazon Glue
          • Amazon Managed Blockchain
          • Amazon Neptune
          • Amazon QLDB
          • Amazon QuickSight
          • Amazon Timestream
          • DMS - Database Migration Service
          • DocumentDB
          • DynamoDB
          • EMR - Elastic MapReduce
          • RDS - Relational Database Service
          • RDS Deployment Options
          • Redshift
          • AWS Identity and Access Management (IAM)
          • IAM Guidelines and Best Practices
          • IAM Security Tools
          • IAM Users, Groups, Roles, and Policies
          • Serverless and AWS Lambda
            • Amazon FSx
            • EBS - Elastic Block Store
            • EBS Snapshot
            • EC2 Instance Store
            • EFS - Elastic File System
            • Amazon S3
            • Amazon S3 Bucket Policies
            • Amazon S3 Encryption
            • Amazon S3 Replication (CRR & SRR)
            • Amazon S3 Security
            • Amazon S3 Static Website Hosting
            • Amazon S3 Storage Class
            • Amazon S3 Versioning
          • AWS Snow Family
          • AWS Storage Gateway
          • Edge Computing with AWS Snow Family
        • AWS Command Line Interface (CLI)
        • AWS Region and Availability Zone
        • AWS Shared Responsibility Model
        • Pricing of the AWS
      • Cloud Computing
      • Scalability and High Availability in Cloud Computing
      • The Delivery of Cloud Services
      • The Deployment Models of the Cloud
      • Traditional Computing VS Cloud Computing
      • Types of Cloud Computing Services
        • Address Resolution Protocol (ARP)
        • Application Layer
        • Border Gateway Protocol (BGP)
        • Determine if destination outside the LAN
        • DNS Nameserver
        • DNS Record
        • DNS Resolution
        • Domain Name System (DNS)
        • Hypertext Transfer Protocol (HTTP)
        • Internet Control Message Protocol (ICMP)
        • Internet Layer
        • Internet Protocol (IP)
        • Internet Protocol Suite
        • Link Layer
        • Reaching destinations outside the LAN
        • Simple Mail Transfer Protocol (SMTP)
        • SMTP Commands
        • TCP Port
        • Transport Layer
      • Circuit Switching VS Packet Switching
      • Computer Networks
      • Ethernet
      • LAN and WAN
      • Network Layered Architecture
        • Role of Management and Board in the Cybersecurity Picture
          • Business Information System Ethics
          • Business Information Systems (BIS)
          • Business Process (BP)
          • Business Process Management (BPM)
          • Business Process Model and Notation (BPMN)
          • Databases and Data Modelling
          • Information System (IS)
          • IS Five Components Example
          • Porter's Five Forces Analysis
          • Porter's Four Competitive Strategies
          • Porter's Value Chain Model
          • Process Improvement
          • Strategy and Competitive Advantage
          • What Is Business
          • Computing Project Management
          • Introduction to IT Project Management
          • IT Project Cost - Tools and Techniques
            • Information Architecture (IA)
            • Understanding Users - Information Collection
            • What is Usability
          • Human Computer Interaction (HCI)
          • Interview
      • Computing Research and Cross-Disciplinary Studies
        • Asymmetric Cryptography
        • Caesar Cipher
        • Diffie-Hellman Key Exchange
        • Digital Certificate
        • Digital Signature
        • Hash Algorithms
        • Hash Extension Attack
        • HMAC Key Derivation Function (HKDF)
        • HTTP Secure (HTTPS)
        • Key Distribution
        • Message Authentication Code (MAC)
        • Network Attacks and Preventions
        • Network Security and Cryptography
        • One-Time Pad (OTP)
        • Password Based Attacks
        • RSA Algorithm
        • Secure Shell (SSH)
        • Stream Cipher and Block Cipher
        • Symmetric Cryptography
        • Transport Layer Security (TLS)
        • Vigenère Cipher
      • Cyber Security and Security Engineering
      • Cybersecurity Culture and Framework
      • Human Factors in Cybersecurity
      • Number Theory and Abstract Algebra in Cryptography
      • Principle of Psychological Acceptability
      • Security Concepts
      • System Security and Access Control
      • Usability and Security of Passwords
            • Hill-Climbing Search
            • Optimisation Problems
            • Informed Search - A* Search
            • Informed Search - Greedy Search
            • Minimax Algorithm
            • Uninformed Search - Breadth-First Search (BFS)
            • Uninformed Search - Depth-First Search (DFS)
            • Uninformed Search - Iterative Deepening Search (IDS)
            • Uninformed Search - Uninformed Cost Search (UCS)
          • Problem Solving and Search
        • Game Playing
          • 1R Algorithm
          • K-Nearest Neighbour (Classification)
          • K-NN Issue - Curse of Dimensionality
          • Supervised Machine Learning
          • Weighted Nearest Neighbour
          • Unsupervised Learning - Association Rule learning
          • Unsupervised Learning - Clustering
          • Unsupervised Machine Learning
        • Machine Learning (ML)
      • Computational Data Science and Artificial Intelligence (AI)
          • Divide and Conquer
          • Divide and Conquer Master theorem Examples
          • Divide and Conquer Unrolling Examples
          • Integer Multiplication
          • Maxima Set
          • Binary Search
          • Graph Breadth-First Search (BFS)
          • Graph Depth-First Search (DFS)
          • Bubble Sort
          • Merge Sort
          • Selection Sort
          • Count Character
          • Dijkstras Shortest Path
          • MST - Kruskal's Algorithm
          • MST - Prim's Algorithm
          • Range Query in BST
        • Greedy Algorithm
        • Abstract Data Type (ADT)
        • ADT - Binary Tree
        • ADT - Disjoint Set
        • ADT - Graph
        • ADT - Map
        • ADT - Priority Queue
        • ADT - Set
        • ADT - Tree
        • AVL Tree
        • Binary Search Tree (BST)
        • Hash Table
        • Heap
        • Linked List
      • Big-O Notation and Algorithm Complexities
      • Data Structure and Algorithms Cheat Sheet
      • Data Structures and Algorithms
      • Pseudocode Conventions
      • Sequence and Series
      • Database Systems
      • Relational Database Management System (RDBMS)
      • Relational Database Normalisation
          • Bash
          • Bash Basic Operators
          • Bash Process Management
          • File Manipulation
          • File Permission
          • Network Configuration and Troubleshooting
          • Regular Expressions (Regex)
          • Text Processing and Manipulation
          • Work with Variables
        • Bit Masking
        • Character Representation
        • Data Representation
        • Number System Conversion
        • Operating Systems (OS)
        • Process management and System calls
        • Processes and Memory Management
        • Shell
        • Unix Systems
              • Basic Git Commands
              • Getting a Git repository
              • Git
              • Git Configuration
              • Git Distributed Workflows
              • Git Internals 1 - Introduction to Git
              • Git Internals 2 - Git Objects
              • Git Internals 3 - Git Branches
              • Git Internals 4 - Git Merge
              • Git Transfer Protocol
              • Record Changes to the Repository
            • Version Control System
          • DevOps
          • Docker
          • GitHub Actions
          • YAML
          • HTML
              • Java Database Connectivity (JDBC)
              • Reflection API
              • Stream API
                • Apache Maven
              • Java Enterprise Edition (Java EE)
              • Servlet and Apache Tomcat
                  • Java-Based Configuration 1 - Intro & Bean Annotation
                  • Java-Based Configuration 2 - Dependency Injection (DI) & Wiring
                  • XML-Based Configuration 1 - Intro & Spring Bean
                  • XML-Based Configuration 2 - Dependency Injection (DI) & Wiring
                  • XML-Based Configuration 3 - Autowiring
                • Spring and Spring Boot
                • Spring JDBC
                • Model View Controller (MVC)
              • Apache Tomcat
              • Annotation
              • Enum 1 - Enum Class
              • Enum 2 - Natural Ordering
              • Exception
              • Exception Hierarchy
              • Lambda Expressions
              • User Input using BufferReader and Scanner
                • Collections Class
                • Comparable Interface
                • Comparator Interface
                • Generics
                • Java Collections Framework Overview
                • Vector
                • Character
                • Integer Class
                • Literals
                • String Class
                • StringBuffer
                • StringBuilder
                • Type Casting
                • Abstraction
                • Class and Object
                • Dynamic Method Dispatch (Runtime Polymorphism)
                • Encapsulation
                • Inheritance
                • Nested Class
                • Object Class
                • Polymorphism
                • Access Modifier
                • Autoboxing and Unboxing
                • Do-While Loop
                • Final Keyword
                • Static Keyword
              • Java Standard Edition (Java SE) and Java Programming
              • JVM Performance Tuning
              • Java Threads and Multiple Threads
              • Thread Safety
              • Compile Time VS Runtime
              • How Does Java Work
              • Java Platform
              • Java Platform Overview
              • JIT Compilation and Java bytecode
              • JVM Class Loader Sub-System
              • JVM Overview
              • JVM Runtime Data Area
            • Java
                • Dunder Method New VS Init
                • Keyword Self VS Cls
              • Dunder Methods
              • For Loops
              • Generator and the yield Keyword
              • Lambda
              • Ternary Operator
            • Python
            • Behavioural Patterns
            • Behavioural Patterns - Command Pattern
            • Behavioural Patterns - Iterator Pattern
            • Behavioural Patterns - Memento Pattern
            • Behavioural Patterns - Observer Pattern
            • Behavioural Patterns - State Pattern
            • Behavioural Patterns - Strategy Pattern
            • Behavioural Patterns - Template Method Pattern
            • Creational Patterns
            • Creational Patterns - Builder Pattern
            • Creational Patterns - Factory Method Pattern
            • Creational Patterns - Prototype Pattern
            • Creational Patterns - Singleton Pattern
            • Software Design Patterns
            • Structural Patterns
            • Structural Patterns - Adapter Pattern
            • Structural Patterns - Decorator Pattern
            • Structural Patterns - Facade Pattern
          • Code Reviews
          • GRASP Design Principles
          • Low Coupling Principle
          • SOLID Design Principles
            • Analysis Modelling
            • Behavioural Modelling
            • Behavioural State Machine
            • Class Responsibility Collaboration (CRC) Cards
            • Functional Modelling
            • Structural Modelling
            • Requirement Elicitation and Analysis
            • Software Requirement Engineering
            • Software Requirement Specification (SRS)
            • User Requirement Specification (URS)
            • Vision & Scope Document
            • UML - Activity Diagram
            • UML - Class Diagram
            • UML - Use Case Diagram
            • UML Diagrams
            • UML-Sequence Diagram
          • Design
          • Implementation
          • Planing
          • Software Development Life Cycle (SDLC)
          • Software Development Methodologies
          • Assumptions of Blackbox Testing
          • Black and White Box Testing
          • Boundary Value Test
          • Building Effective Test Suites
          • Equivalence Partitioning
          • Random Choice Test Design
          • RIPR Model For Failure Observation
          • Software Testing
        • Coupling and Cohesion
        • Dependency
        • Web and Application Development
      • CODE_OF_CONDUCT
      • Contributor Manual
      • Design Specifications
      • First Time Contributor
      • Tired?
      • Wiki Design Principles
    Home

    ❯

    Database Systems

    Folder: Database-Systems

    3 items under this folder.

    • May 14, 2025

      Database Systems

      • May 14, 2025

        Relational Database Management System (RDBMS)

        • May 14, 2025

          Relational Database Normalisation



          Computer Science Wiki is licensed under CC BY 4.0