Candidate Key

Other Tutorials
We call the candidate key of a relation (or simply key) to the attribute or set of attributes that have the property of uniquely identifying a tuple within the relation. The keys are the basic tuple level addressing mechanism in a relational system, that is, it is the only way, guaranteed by the system, to locate a specific tuple. Let’s …

Binary Code

Other Tutorials
Perhaps one of the most used numbering systems in the world is the binary code, because although it is true that the numbering system that we usually use is the decimal system, the binary code is used by computers and by all devices computers for everyday use. It is for this reason, that this binary language is very important for …

Functional dependence: what is it?

Other Tutorials
The concept of functional dependence appears in several contexts of mathematics and logic and refers to certain mathematical entities can be expressed as mathematical functions of other entities. The concept of functional dependence is a generalization of the concept of linear dependence. It is said that a set of functions is functionally dependent when there is a functional relationship between …

What is a Loopback plug?

Other Tutorials
A loopback plug allows us to test if the Ethernet transmission and reception electronics are working correctly, with it we can easily locate damaged ports in network cards or in a switch. In addition, this tool is necessary for laboratory or test environments, in which we need our Ethernet network adapter to detect connection to the cable and if is …

What are the Functional Testing?

Other Tutorials
The functional tests are usually the last tests that are carried out at the time of giving the pass to production to any type of software. This type of tests are also called “Black Box”, since the “Tester” focuses on analyzing the input and output data to define test cases that will be ready before the start of these. The …

What are VPN Concentrators?

Software
In today’s society, any company needs to be up-to-date on all the topics of networks, computing and technology, to offer a better service to its customers and to have greater security and be protected from computer attacks that may come from outside. In addition, a better network system and better equipment makes it easier for employees to carry out their …