Page 387 - Informatics_Practices_Fliipbook_Class12
P. 387
A D
Adding Rows to a DataFrame 55 Data Definition Language (DDL) 132
Add-ons and Plug-ins 254 Data Manipulation Language (DML) 132
Adware 275 Data Manipulation 54
Aggregate Functions 10, 161 Database Management System (DBMS) 124
Aggregation 49, 62 DataFrame 30, 31
ALTER TABLE statement 142 DATE 134
Alternate Keys 130 DATE() 160
antivirus 277 DAY() 161
Apache 282 DAYNAME() 161
append() 7, 8 DECIMAL(L, D) 133
ARPANET 223 DEFAULT constraint 137
astype() 6 delimiter 34
Attribute 125 Denial of Service 276
AVG() 164 DESCRIBE TABLE 139
B describe() 9, 10, 47
Bar Graph 107 Digital Footprints 268
BETWEEN Operator 153 Digital Rights Management 280
black hat hackers 271 Displaying a Point 90
boot sector virus 274 DISTINCT clause 151
Bridge 233 Domain Constraint 132
broadcasting 11, 55 DROP TABLE Statement 142
Bus Topology 225 Dropping Columns 59
C Dropping Rows from a DataFrame 59
Candidate Key 129 E
cardinality 128 Eavesdropping 273
Channel 221, 222 Entity Integrity Constraint 131
CHAR(L) or CHARACTER(L) 134 Entity 125
CHECK constraint 138 EQUI JOIN vs NATURAL JOIN 199
Clear cookies 278 Evolution of Networking 222
color 94 E-waste Management 284
columnIndex 42 F
Components of a Computer Network 221 Fabrication 271
concat() 56, 57, 58 File Infectors 274
Constraint 125 Firewall 277
Cookies 254 FLOAT(p) 133
Copyright Infringement 279 Foreign Key 130, 131
Copyright 278 Free and Open Source Licence 281
COUNT() 161 FROM clause 148
CREATE DATABASE statement 134 G
CREATE TABLE statement 135 Gateway 235
Creative Commons 281 General Public License (GPL) 281
Cyber Bullying 273 grid() 96
Cyber Forensics 284 GROUP BY CLAUSE 164
Cyber Threats 271 Grouping 61
Cyber Trolls 273
Cybercrime 282 H
Cyberlaw 284 Hacking 271
HAVING CLAUSE 165
373
Index 373

