Text
Quiz
<h2>Simple Quiz</h2> <form id="quizForm"> <fieldset> <legend>Question 1: What is the capital of France?</legend> <label><input type="radio" name="q1" value="a"> Paris</label><br> <label><input type="radio" name="q1" value="b"> Berlin</label><br> <label><input type="radio" name="q1" value="c"> Madrid</label><br> <label><input type="radio" name="q1" value="d">…
0 notes
Text
CompTIA CySA+ CS0-003: Attack surface reduction
Attack surface reduction is simply ensuring all the places where attackers can take advantage of to compromise your network and its devices are properly secured, leaving attackers with fewer attack points. Attack surface is any area of your oganization’s network that is susceptible to attacks. APIs are common attack vector and you can lessen its attack surface by securing APIs by using things…
View On WordPress
0 notes
Text
What should I work on to help run longer without legs hurting
Muscles and flexibility are both required for long distance running. For muscles, glutes, quadriceps, hip flexor, core, hamstring, and calf muscles are necessary to lessen impact to your joints. These muscles are necessary to ensure your legs can take training with high volume, intensity, and frequency. For glutes, squats, deadlift, and hip thrusts are recommended. For quadriceps, goblet…

View On WordPress
0 notes
Text
VaR quick overview
Value at risk basically measures the risk of loss of all the investment. So, if there is value at risk of 1% for one million dollars for the year, it means there’s 1% chance you’ll lose one million dollars for the year. It is a statistic that quantifies the extent of potential loss within a defined time frame. Value at risk or VaR is commonly used by risk managers to control and measure risk…

View On WordPress
0 notes
Text
Computation and visualization: Structured data vs unstructured data
Data can be divided into structured and unstructured. Structured data are well defined while unstructured data are not. Simply put, structured data has a schema. Structured data are simply easy to manage and structure due to its simplicity and comes with numerous tools that can help one analyze it like SQL or other database tools. Structured data are simply numbers, dates, and strings while…

View On WordPress
0 notes
Text
Database management: Normalization (first normal form, second normal form, third normal form, boyce-codd normal form, fourth normal form)
Normalization requires understanding of two concepts, which are functional dependency and prime attribute type. Before we go over different steps to normalize data, let’s go over the two concepts. Functional dependency occurs between two sets of attribute types of a relation. So in a relation supplier (x, y), we have the attribute types x and y. Functional dependency x->y implies that value of x…
View On WordPress
0 notes
Text
Database management: Relational model
Relational model doesn’t have standard graphical representation and is simply set of tuples, which is why it’s used for logical/internal modeling and not conceptual modeling. Relational model is used to build out logical and internal data models and is represented as a collection of relations, which is basically a table of values or entity types. In a relational model, entity type is relation,…
View On WordPress
0 notes
Text
Database management: EER model simply explained
Before you press forward with the EER model explanation, please read ER model explanation, which is the building block for the EER model. EER (enhanced entity relationship model) is an extension of the ER model and simply adds three new data modeling concepts: specialization, categorization, and aggregation. Specialization is simply breaking down entity types into its subclasses. For example,…
View On WordPress
0 notes
Text
Database management: Conceptual models
Conceptual model focuses on data requirements of business and consists of the following three models (ER, EER and UML) which builds upon each other. Its focus is to collect business data requirements, so it is implementation independent. This is the first model that must be created before moving onto logical model and external data model. Let’s go over the ER (entity relationship) model first,…
View On WordPress
0 notes
Text
Database management: Relational databases/logical model
Relational databases are derived from relational/logical model. The relational/logical model is based on first order predicate logic and set theory and has no graphical representation unlike EER. The relational model is represented in sets of tuples, or set of ordered list of attribute values for an entity. Relation is set of tuples and each tuple is a representation of entity like a student or a…

View On WordPress
0 notes
Text
Database management: Conceptual models for database design (UML model)
UML model builds upon the ER model and EER model we reviewed previously. Unified modeling language is an object oriented system modeling notation that focuses on behavioral modeling, process, and application architecture on top of the data requirements. There are four big terms to know before pushing forward, which are class, object, variable, and method. Class is simply entity types like people,…

View On WordPress
0 notes
Text
Database management: DBMS categorization
DBMS can be categorized in numerous ways based on factors like architecture, data model, simultaneous access, and usage. If you were to categorize DBMS based on usage, you’ll have transaction processing, analytical processing, NoSQL, multimedia, spatial, sensor, mobile, and open source DBMSs. If you were to categorize it based on architecture, you’d have centralized, client-server, n-tier,…

View On WordPress
0 notes
Text
Computation and visualization for analytics: Structured vs unstructured data
Data needs to be visually represented and presented to facilitate understanding. There are two types of data, which are structured and unstructured. Structured is a quantiative data while unstructured is qualitative, which is why structured is more easily understood by machine language. Relational database can easily input, search, and manipulate structured data using relational database…
View On WordPress
0 notes
Text
Digital Manufacturing: What is ipynb extension?
What is ipynb extension? The ipynb file extension stands for “Interactive Python Notebook” or “juypter notebook” and is ran on jupyter environment. The difference between py and ipynb is that .py is a regular python file with just the codes while ipynb is a python notebook that has descriptive contents with the codes. With interactive python notebook, you can store and share documents that…
View On WordPress
0 notes
Text
CompTIA CySA+ CS0-003: Secure coding best practices
Open worldwide application security project has secure coding practices quick reference guide that helps focus on secure coding requirements for easy reference. It is a great tool for development teams to quickly understand and refer to for secure coding practices. For the purpose of cybersecurity analyst exam, you need to know input validation, output encoding, session management,…
View On WordPress
0 notes
Text
CompTIA CySA+ CS0-003: Maintenance windows
Maintenance windows is simply time windows on when maintenance will occur. Administrators can schedule a single or recurring maintenance windows for specific systems or part of a network. An alert is created for all those who are affected to ensure users are aware. Alerts should include details like upcoming date/time, what event will be occurring during the maintenance period, and when it will…

View On WordPress
0 notes
Text
CompTIA CySA+ CS0-003: Remote code execution
Remote code execution is a broad term that is used when an attacker simply executes malicious code remotely. This is different from malicious code executing by itself and usually occurs by attacker taking advantage of zero day software vulnerabilities. Attacker will identify a vulnerability in software or hardware that isn’t patched yet and will leverage that to remotely execute code on the…

View On WordPress
0 notes