If you are not sure if the website you would like to visit is secure, you can verify it here. Enter the website address of the page and see parts of its content and the thumbnail images on this site. None (if any) dangerous scripts on the referenced page will be executed. Additionally, if the selected site contains subpages, you can verify it (review) in batches containing 5 pages.
favicon.ico: cswhiteboard.blogspot.com - Computer Science Whiteboard.

site address: cswhiteboard.blogspot.com

site title: Computer Science Whiteboard

Our opinion (on Tuesday 12 May 2026 3:07:19 UTC):

GREEN status (no comments) - no comments
After content analysis of this website we propose the following hashtags:



Meta tags:
description=Data structures and algorithms, programming language, software engineering, SaaS, PaaS, data science, database, networking, system design, complexity;

Headings (most frequently used words):

2016, sunday, may, computer, science, whiteboard, tuesday, february, 21, 2017, june, 29, thursday, 26, about, me, blog, archive, database, concepts, housing, price, prediction, using, machine, learning, techniques, access, aws, linux, instance, over, ssh, trie,

Text of the page (most frequently used words):
the (74), and (48), #database (33), key (33), data (31), for (27), form (21), that (20), your (20), are (19), normal (19), relational (18), attributes (15), dependency (15), ssh (14), share (13), used (13), instance (13), relation (13), domain (13), which (12), databases (12), you (11), from (11), this (10), one (10), set (10), user (10), all (10), constraints (10), can (9), not (9), only (9), with (9), will (9), access (9), olap (9), trie (8), have (8), tree (7), there (7), file (7), ec2 (7), model (7), systems (7), non (7), anomalies (7), multivalued (7), may (6), science (6), password (6), two (6), pem (6), sudo (6), modeling (6), warehouse (6), constraint (6), aaron (5), zhao (5), computer (5), facebook (5), such (5), but (5), value (5), when (5), words (5), very (5), linux (5), aws (5), into (5), option (5), com (5), username (5), techniques (5), sql (5), first (5), nosql (5), oltp (5), schema (5), normalization (5), functional (5), values (5), superkey (5), 2016 (4), structure (4), pinterest (4), blogthis (4), email (4), comments (4), posted (4), node (4), example (4), valid (4), also (4), store (4), over (4), region (4), compute (4), amazonaws (4), learning (4), codd (4), system (4), language (4), tuples (4), than (4), dimensional (4), design (4), performance (4), schemas (4), denormalization (4), general (4), candidate (4), dependencies (4), every (4), concepts (3), about (3), labels (3), given (3), has (3), integer (3), since (3), considered (3), while (3), time (3), use (3), many (3), its (3), they (3), log (3), web (3), find (3), doc (3), different (3), pwd (3), following (3), etc (3), restart (3), using (3), prediction (3), machine (3), software (3), known (3), query (3), approach (3), relations (3), means (3), other (3), entity (3), relationship (3), same (3), transaction (3), computing (3), processing (3), transactions (3), often (3), second (3), some (3), another (3), minimal (3), between (3), sets (3), special (3), join (3), fields (3), trivial (3), table (3), most (3), june (2), february (2), 2017 (2), blog (2), home (2), what (2), especially (2), powerful (2), dealing (2), uses (2), trie_example (2), get (2), tea (2), return (2), word (2), complexity (2), space (2), called (2), radix (2), binary (2), how (2), creating (2), able (2), via (2), click (2), obtain (2), yes (2), successfully (2), steps (2), enter (2), new (2), add (2), line (2), init (2), out (2), sunday (2), housing (2), price (2), organization (2), maintain (2), management (2), maintaining (2), where (2), terms (2), applications (2), emphasize (2), support (2), does (2), involve (2), logical (2), multidimensional (2), even (2), according (2), end (2), queries (2), oriented (2), enterprise (2), analysis (2), intelligence (2), sources (2), current (2), historical (2), analytical (2), reports (2), examples (2), detailed (2), online (2), characterized (2), effectiveness (2), multi (2), usually (2), star (2), latency (2), operations (2), large (2), number (2), insert (2), update (2), delete (2), contain (2), 3nf (2), read (2), adding (2), include (2), attribute (2), cause (2), types (2), theory (2), requires (2), therefore (2), case (2), role (2), 4nf (2), defined (2), variable (2), holds (2), distinct (2), rows (2), super (2), these (2), follow (2), field (2), boyce (2), conditions (2), 5nf (2), keys (2), specifies (2), thus (2), however (2), expensive (2), whiteboard (2), simple, theme, powered, blogger, archive, view, complete, profile, subscribe, posts, atom, know, think, ordered, similar, necessary, both, let, look, commonly, letters, above, wikipedia, takes, string, input, outputs, match, null, associated, define, english, kind, lot, lengthy, optimized, solve, problem, matching, letter, each, children, search, thursday, options, obtained, before, account, portal, instances, list, right, connect, public, dns, address, path, client, note, default, name, happens, refer, details, asks, rsa, fingerprint, just, type, logged, after, previous, now, don, always, need, useradd, bin, bash, root, passwd, retype, sudoer, optional, visudo, enable, sshd_config, change, service, sshd, passwordauthentication, individual, research, paper, wrote, during, college, years, digital, whose, based, proposed, 1970, various, rdbms, virtually, structured, querying, managing, consistent, order, predicate, logic, described, 1969, edgar, represented, grouped, organized, originally, referring, provides, mechanism, storage, retrieval, modeled, tabular, existed, late, 1960s, did, moniker, until, surge, popularity, early, twenty, century, triggered, needs, companies, google, amazon, increasingly, big, real, sometimes, like, languages, names, necessarily, level, any, physical, flat, files, warehousing, consultant, ralph, kimball, technique, intended, around, understandability, him, although, useful, capture, should, avoided, delivery, dwh, edw, reporting, core, component, business, dws, central, repositories, integrated, more, disparate, single, place, knowledge, workers, throughout, could, range, annual, quarterly, comparisons, trends, daily, sales, relatively, low, volume, complex, aggregations, response, measure, widely, mining, aggregated, typically, few, hours, opposed, marts, expected, closer, day, analyze, multiple, perspectives, three, basic, roll, consolidation, drill, down, slicing, dicing, short, fast, integrity, environments, measured, per, transactional, norm, process, trying, improve, expense, losing, write, redundant, copies, grouping, motivated, scalability, needing, carry, numbers, performs, degree, materialised, views, implement, storing, count, objects, joined, fact, dimension, models, been, extended, snowflake, prebuilt, summarisation, cubes, degrees, apply, vialiations, poorly, designed, anomaly, constrains, prevent, redundancy, less, possibility, describes, full, contrast, certain, present, tuple, generating, plays, involved, assigned, upon, functionally, dependent, records, common, proper, subset, must, atomic, actor, warrior, beast, repeating, depend, wanted, needed, transitive, least, hold, either, superset, thereof, said, implied, contains, permissible, uniquely, identify, row, achieved, consequence, definition, domains, enforcing, restraints, causes, met, avoids, temporal, reason, avoid, having, clear, easily, test, would, normally, require, programming, stored, procedures, trigger, variety, execute, split, much, easier, build, convert, lesser, numerous, building, remains, difficult, task, experienced, programmers, eliminates, problems, found, tends, costly, achieve, fifth, fourth, slightly, stronger, third, tuesday, personal, experience, topics, limited, structures, algorithms, engineering, cloud, networking, artificial,


Text of the page (random words):
computer science whiteboard computer science whiteboard a blog about computer science and my personal experience in learning cs topics include but are limited to data structures and algorithms software engineering cloud computing data science database networking system design artificial intelligence and complexity tuesday february 21 2017 database concepts relational database a relational database is a digital database whose organization is based on the relational model of data as proposed by e f codd in 1970 the various software systems used to maintain relational databases are known as a relational database management system rdbms virtually all relational database systems use sql structured query language as the language for querying and maintaining the database relational model the relational model rm for database management is an approach to managing data using a structure and language consistent with first order predicate logic first described in 1969 by edgar f codd where all data is represented in terms of tuples grouped into relations a database organized in terms of the relational model is a relational database nosql a nosql originally referring to non sql non relational or not only sql database provides a mechanism for storage and retrieval of data which is modeled in means other than the tabular relations used in relational databases such databases have existed since the late 1960s but did not obtain the nosql moniker until a surge of popularity in the early twenty first century triggered by the needs of web 2 0 companies such as facebook google and amazon com nosql databases are increasingly used in big data and real time web applications nosql systems are also sometimes called not only sql to emphasize that they may support sql like query languages dimensional modeling dimensional modeling dm names a set of techniques and concepts used in data warehouse design it is considered to be different from entity relationship modeling er dimensional modeling does not necessarily involve a relational database the same modeling approach at the logical level can be used for any physical form such as multidimensional database or even flat files according to data warehousing consultant ralph kimball dm is a design technique for databases intended to support end user queries in a data warehouse it is oriented around understandability and performance according to him although transaction oriented er is very useful for the transaction capture it should be avoided for end user delivery data warehouse in computing a data warehouse dw or dwh also known as an enterprise data warehouse edw is a system used for reporting and data analysis and is considered a core component of business intelligence dws are central repositories of integrated data from one or more disparate sources they store current and historical data in one single place and are used for creating analytical reports for knowledge workers throughout the enterprise examples of reports could range from annual and quarterly comparisons and trends to detailed daily sales analysis olap and oltp online analytical processing olap is characterized by a relatively low volume of transactions queries are often very complex and involve aggregations for olap systems response time is an effectiveness measure olap applications are widely used by data mining techniques olap databases store aggregated historical data in multi dimensional schemas usually star schemas olap systems typically have data latency of a few hours as opposed to data marts where latency is expected to be closer to one day the olap approach is used to analyze multidimensional data from multiple sources and perspectives the three basic operations in olap are roll up consolidation drill down and slicing dicing 4 online transaction processing oltp is characterized by a large number of short on line transactions insert update delete oltp systems emphasize very fast query processing and maintaining data integrity in multi access environments for oltp systems effectiveness is measured by the number of transactions per second oltp databases contain detailed and current data the schema used to store transactional databases is the entity model usually 3nf 5 normalization is the norm for data modeling techniques in this system denormalization in computing denormalization is the process of trying to improve the read performance of a database at the expense of losing some write performance by adding redundant copies of data or by grouping data it is often motivated by performance or scalability in relational database software needing to carry out very large numbers of read operations data warehouse as an example performs some degree of denormalization examples of denormalization techniques include 1 materialised views which may implement the following a storing the count of the many objects in a one to many relationship as an attribute of the one relation b adding attributes to a relation from another relation with which it will be joined 2 star schemas which are also known as fact dimension models and have been extended to snowflake schemas 3 prebuilt summarisation or olap cubes normalization there are degrees of normalization you can apply to your database design in general vialiations of normal form will cause different types of anomalies anomalies a poorly designed database can cause anomalies in the data e g update delete insert anomaly constrains can prevent some anomalies minimal redundancy less possibility of anomalies functional dependency in relational database theory a functional dependency is a constraint between two sets of attributes in a relation from a database in other words functional dependency is a constraint that describes the relationship between attributes in a relation multivalued dependency in database theory a multivalued dependency is a full constraint between two sets of attributes in a relation in contrast to the functional dependency the multivalued dependency requires that certain tuples be present in a relation therefore a multivalued dependency is a special case of tuple generating dependency the multivalued dependency plays a role in the 4nf database normalization a multivalued dependency is a special case of a join dependency with only two sets of values involved i e it is a binary join dependency superkey a superkey is defined in the relational model of database organization as a set of attributes of a relation variable for which it holds that in all relations assigned to that variable there are no two distinct tuples rows that have the same values for the attributes in this set a super key can be defined as a set of attributes of a relation schema upon which all attributes of the schema are functionally dependent candidate key in the relational model of databases a candidate key of a relation is a minimal superkey for that relation that is a set of attributes such that 1 the relation does not have two distinct tuples e g rows or records in common database language with the same values for these attributes which means that the set of attributes is a superkey 2 there is no proper subset of these attributes for which 1 holds which means that the set is minimal first normal form 1 types values must be atomic e g actor id role 1 warrior beast 2 no repeating attributes fields second normal form 1 follow first normal form 2 non key fields depend on the key field e g no fields from another entity are wanted only fk is needed third normal form 1 follow second normal form 2 has no transitive dependencies no dependencies from one non key field to another boyce codd normal form 3 5nf slightly stronger than 3nf a relational schema r is in boyce codd normal form if and only if for every one of its dependencies x y at least one of the following conditions hold 1 x y is a trivial functional dependency y x 2 x is a super key for schema r fourth normal form a table is in 4nf if and only if for every one of its non trivial multivalued dependencies x y x is a superkey that is x is either a candidate key or a superset thereof fifth normal form a table is said to be in the 5nf if and only if every non trivial join dependency in it is implied by the candidate keys domain key normal form domain key normal form dk nf is a normal form used in database normalization which requires that the database contains no constraints other than domain constraints and key constraints a domain constraint specifies the permissible values for a given attribute while a key constraint specifies the attributes that uniquely identify a row in a given table the domain key normal form is achieved when every constraint on the relation is a logical consequence of the definition of keys and domains and enforcing key and domain restraints and conditions causes all constraints to be met thus it avoids all non temporal anomalies the reason to use domain key normal form is to avoid having general constraints in the database that are not clear domain or key constraints most databases can easily test domain and key constraints on attributes general constraints however would normally require special database programming in the form of stored procedures often of the trigger variety that are expensive to maintain and expensive for the database to execute therefore general constraints are split into domain and key constraints it s much easier to build a database in domain key normal form than it is to convert lesser databases which may contain numerous anomalies however successfully building a domain key normal form database remains a difficult task even for experienced database programmers thus while the domain key normal form eliminates the problems found in most databases it tends to be the most costly normal form to achieve posted by aaron zhao at 6 11 pm no comments email this blogthis share to x share to facebook share to pinterest sunday june 5 2016 housing price prediction using machine learning techniques this is an individual research paper i wrote during my college years for machine learning posted by aaron zhao at 7 41 pm no comments email this blogthis share to x share to facebook share to pinterest labels computer science housing price prediction machine learning prediction sunday may 29 2016 access aws linux instance over ssh how to access your aws linux instance over ssh there are two options 1 access with your pem key file which you obtained from aws when creating an instance 2 access with password before you will be able to ssh into your instance via option 2 you will have to set up the account and password via option 1 option 1 steps 1 log into your aws web portal and find your linux instance in the instances list 2 right click on the instance and click on the connect option 3 you will find your public dns address e g ec2 your instance us your region compute amazonaws com 4 find your pem key file path e g user doc my key file pem and do ssh in your client by ssh i user doc my key file pem ec2 user ec2 your instance us your region compute amazonaws com note ec2 user is the default user name for your linux instance if it happens to be different refer to this for details of how to obtain it if it asks you about rsa key fingerprint just type yes 5 if you have successfully logged into the instance over ssh after previous 4 steps you will now be able to set up password access over ssh to your instance so that you don t always need your pem key file option 2 set up password access 1 ssh i user doc my key file pem ec2 user ec2 your instance us your region compute amazonaws com 2 cd 3 sudo useradd s bin bash m d home username g root username 4 sudo passwd username enter new pwd retype new pwd 5 add the user as a sudoer optional sudo visudo and add the following line to the file username all all all all 6 enable password access sudo vi etc ssh sshd_config and change passwordauthentication from no to yes 7 restart ssh service by sudo etc init d ssh restart or sudo etc init d sshd restart 9 log out and log in using ssh username ec2 your instance us your region compute amazonaws com enter pwd posted by aaron zhao at 2 06 pm no comments email this blogthis share to x share to facebook share to pinterest labels aws linux ssh ssh password access thursday may 26 2016 trie what is a trie data structure if you know what a tree data structure is you can think of a trie as an ordered tree such that it is similar to a binary search tree but it it not necessary to have both key and value given a node of the tree the node has a value if and only if it has a valid key let s look at an example trie is especially powerful and commonly used when dealing with letters and words the above is a trie example from wikipedia that uses words as key and integer as value it takes string as an input and outputs an integer value if there is a match so trie_example get tea will return an integer 3 and trie_example get te will return null since there is no value associated with that node tea is considered a valid key while te is not since we define the key is valid if it is a valid english word this kind of trie can be very powerful in time complexity when dealing with words but it also uses a lot of space especially when there are lengthy words a space optimized trie called radix tree can be used to solve this problem use word matching as an example radix tree will not only store one letter in each node but as many as its children they share posted by aaron zhao at 8 07 pm no comments email this blogthis share to x share to facebook share to pinterest labels computer science data structure tree trie home subscribe to posts atom about me aaron zhao view my complete profile blog archive 2017 1 february 1 database concepts 2016 3 june 1 may 2 simple theme powered by blogger
Thumbnail images (randomly selected): * Images may be subject to copyright.GREEN status (no comments)

Verified site has: 22 subpage(s). Do you want to verify them? Verify pages:

1-5 6-10 11-15 16-20 21-22


Top 50 hastags from of all verified websites.

Supplementary Information (add-on for SEO geeks)*- See more on header.verify-www.com

Header

HTTP/1.1 200 OK
Content-Type text/html; charset=UTF-8
Expires Tue, 12 May 2026 03:07:18 GMT
Date Tue, 12 May 2026 03:07:18 GMT
Cache-Control private, max-age=0
Last-Modified Fri, 30 Aug 2024 13:54:34 GMT
ETag W/ d33434cda0d136238612045d037d925453e4a06732a34a5f5022874774a58982
Content-Encoding gzip
X-Content-Type-Options nosniff
X-XSS-Protection 1; mode=block
Content-Length 15102
Server GSE
Connection close

Meta Tags

title="Computer Science Whiteboard"
content="width=1100" name="viewport"
content="text/html; charset=UTF-8" http-equiv="Content-Type"
content="blogger" name="generator"
content="Data structures and algorithms, programming language, software engineering, SaaS, PaaS, data science, database, networking, system design, complexity" name="description"
content="htt???/cswhiteboard.blogspot.com/" property="og:url"
content="Computer Science Whiteboard" property="og:title"
content="Data structures and algorithms, programming language, software engineering, SaaS, PaaS, data science, database, networking, system design, complexity" property="og:description"
name="google-adsense-platform-account" content="ca-host-pub-1556223355139109"
name="google-adsense-platform-domain" content="blogspot.com"
content="Computer Science Whiteboard" itemprop="name"
content="Data structures and algorithms, programming language, software engineering, SaaS, PaaS, data science, database, networking, system design, complexity" itemprop="description"
content="5907343535373801187" itemprop="blogId"
content="4762552765138943560" itemprop="postId"
content="htt????/www.blogger.com/profile/01052292262051622751" itemprop="url"
content="htt???/cswhiteboard.blogspot.com/2017/02/database-concepts.html" itemprop="url"
content="5907343535373801187" itemprop="blogId"
content="1196650364815798874" itemprop="postId"
content="htt????/www.blogger.com/profile/01052292262051622751" itemprop="url"
content="htt???/cswhiteboard.blogspot.com/2016/06/housing-price-prediction-using-machine.html" itemprop="url"
content="5907343535373801187" itemprop="blogId"
content="7597570445903673289" itemprop="postId"
content="htt????/www.blogger.com/profile/01052292262051622751" itemprop="url"
content="htt???/cswhiteboard.blogspot.com/2016/05/how-to-access-your-aws-linux-instance.html" itemprop="url"
content="htt????/upload.wikimedia.org/wikipedia/commons/thumb/b/be/Trie_example.svg/400px-Trie_example.svg.png" itemprop="image_url"
content="5907343535373801187" itemprop="blogId"
content="3808523972926655588" itemprop="postId"
content="htt????/www.blogger.com/profile/01052292262051622751" itemprop="url"
content="htt???/cswhiteboard.blogspot.com/2016/05/so-what-is-trie-data-structure.html" itemprop="url"

Load Info

page size15102
load time (s)0.243423
redirect count0
speed download62148
server IP 142.251.209.129
* all occurrences of the string "http://" have been changed to "htt???/"