Posts

Indian Cyber laws and Deficiencies

Image
Indian Cyber laws and Deficiencies Introduction: Cybercrime is defined as any crime where a computer is either the target of the crime or is used as a tool to conduct the crime, such as child pornography, hate crimes, etc. It can be best defined as offenses committed against people or businesses of people with a criminal motive in order to ruin the victim's reputation or cause physical or mental harm to the victim immediately or indirectly using modern telecommunications networks, especially the internet. In simple terms, we can state that cybercrime consists of illicit conduct. Cybercrimes can entail serious offenses like fraud, robbery, forgery, mischief, and defamation, all of which are subject to scrutiny under the Indian penal law (IPC). A variety of modern offenses that may be handled under the Information Technology Act, of 2000, have also been sparked by the misuse of computer technology. The term "cybercrime" can refer to various acts, including those with a crim...

Active Databases and Triggers

Image
                           Active Databases and Triggers Introduction Databases are a collection of organized information that can easily be accessed, managed and updated. Database systems are very important to startups, business because they communicate information related to your sales transactions, product inventory, customer profiles and marketing activities. Active databases and Triggers are interrelated to each other because they can be defined as a database with a set of associated triggers is generally called an active database. Active Databases Active databases are very difficult to maintain because of the complexity that arises in understanding the effect of these triggers. In such a database, DBMS initially verifies whether the particular trigger specified in the statement that modifies the database is activated or not, prior to executing the statement.      If the trigger is active...