Data is a set of discrete or continuous values that convey information by representing quantity, quality, fact, statistics, or other basic units of meaning, or simply sequences of symbols that can be formally understood.
Data Structure is a branch of computer Science that deals with how data can be stored, organized, and retrieved in the most efficient way possible.
There are six operations involving Data Structures:
▪ Searching
▪ Insertion
▪ Deletion
▪ Sorting
▪ Merging
▪ Updating
Primitive Data Structures is the most elementary kind of data used in programming language composed of character, number, and Boolean.
There are eight types of primitive data structures:
▪ byte
▪ short
▪ int
▪ long
▪ float
▪ double
▪ char
▪ boolean
Non-Primitive Data Structures are objects or instances constructed by the programmer rather than defined by the programming language.
There are five types of Linear Data Structures:
▪ Array
▪ Stack
▪ Queue
▪ Linked List
▪ Hash Tables
There are Two Types of
Non-Linear Data Structures:
▪ Tree Data Structure
▪ Graph Data Structure
This presentation discusses the following topics:
Basic features of R
Exploring R GUI
Data Frames & Lists
Handling Data in R Workspace
Reading Data Sets & Exporting Data from R
Manipulating & Processing Data in R
This presentation discusses the following topics:
Basic features of R
Exploring R GUI
Data Frames & Lists
Handling Data in R Workspace
Reading Data Sets & Exporting Data from R
Manipulating & Processing Data in R
Its the first phase of the compiler,useful in generating lexemes ,tokens and matching of the pattern.Its helpful in solving GATE/ UGCNET problems.For more insight refer http://tutorialfocus.net/
Object Oriented Methodology (OOM) is a system development approach encouraging and facilitating re-use of software components. We enforce our concern on components re-usability of existing component using Java Language .
This slide contain description about the line, circle and ellipse drawing algorithm in computer graphics. It also deals with the filled area primitive.
Its the first phase of the compiler,useful in generating lexemes ,tokens and matching of the pattern.Its helpful in solving GATE/ UGCNET problems.For more insight refer http://tutorialfocus.net/
Object Oriented Methodology (OOM) is a system development approach encouraging and facilitating re-use of software components. We enforce our concern on components re-usability of existing component using Java Language .
This slide contain description about the line, circle and ellipse drawing algorithm in computer graphics. It also deals with the filled area primitive.
Complete book Database management systems Handbook 3rd edition by Muhammad Sharif
#DBMS
#RDBMS
#DATABASE MANAGEMENT SYSTEMS HANDBOOK
#DATABASE COMPLETE BOOK HANDBOOK
DATABASE SYSTEMS BY MUHAMMAD SHARIF
DATABASE SYSTEMS HANDBOOK BY MUHAMMAD SHARIF
Complete book Database management systems Handbook 3rd edition by Muhammad Sharif
#DBMS
#RDBMS
#DATABASE MANAGEMENT SYSTEMS HANDBOOK
#DATABASE COMPLETE BOOK HANDBOOK
DATABASE SYSTEMS BY MUHAMMAD SHARIF
DATABASE SYSTEMS HANDBOOK BY MUHAMMAD SHARIF
Full book Database system Handbook 3rd edition by Muhammad Sharif
I'm DBA in SKMCHRC and I have did this book by title: Database systems handbook.
Its other names are: Database management systems, Database systems basic conecpts
Database services and Relational Database management systems handbook:
Author name is Muhammad Sharif.
#Database_systems_handbook
#Database_Management_Systems
#Relational Database_management systems
#DBMS
#RDBMS
Complete Full book Database system Handbook 3rd edition by Muhammad Sharif
I'm DBA in SKMCHRC and I have did this book by title: Database systems handbook.
Its other names are: Database management systems, Database systems basic conecpts
Database services and Relational Database management systems handbook:
Author name is Muhammad Sharif.
#Database_systems_handbook
#Database_Management_Systems
#Relational Database_management systems
#DBMS
#RDBMS
Complete book Database management systems Handbook 3rd edition by Muhammad Sharif
#DBMS
#RDBMS
#DATABASE MANAGEMENT SYSTEMS HANDBOOK
#DATABASE COMPLETE BOOK HANDBOOK
DATABASE SYSTEMS BY MUHAMMAD SHARIF
DATABASE SYSTEMS HANDBOOK BY MUHAMMAD SHARIF
TITLE: DATABASE SYSTEMS HANDBOOK
Which data structure is it? What are the various data structure kinds and wha...Tutort Academy
Data structures matter because they boost efficiency. Efficiency: By using the appropriate data structures, programmers can create code that runs faster and uses less memory. Reusability: By employing standard data structures, programmers can abstract the crucial operations that are carried out over numerous Data structures using libraries that are specific to Data Structures.
basics of data structure operations
understand the concept of formulas in Excel.
learn the basic syntax for creating formulas.
practice using common functions
apply formulas to solve real-world problems or analyze
provided datasets.
understand the concept of formulas in Excel.
learn the basic syntax for creating formulas.
practice using common functions
apply formulas to solve real-world problems or analyze
provided datasets.
PURPOSE OF EXCEL FORMULA
Automate Calculations
Formulas replace manual calculations, making your spreadsheet dynamic and responsive to changes in input data.
Data Analysis
Formulas enable you to extract insights from raw data, such as finding averages, identifying trends, or comparing values.
Decision Making
Formulas can use conditional logic to help you make
data-driven decisions.
Operators refers to symbols that indicate the arithmetic operation to be performed in a formula.
Cell References also known as “cell address” is a component of the excel formula that indicates the location of data within the spreadsheet.
Functions are predefined formulas in Excel that perform specific calculations which streamlines complex operations.
Relative references are cell references in formulas that adjust automatically when you copy or fill the formula into other cells.
An absolute reference is a cell reference in an Excel formula that remains fixed when the formula is copied or filled into other cells.
A function requires syntax which refers to the exact way a function must be written to perform properly.
The SUM function adds values from individual cells, cell ranges, multiple cell ranges or its combination.
The SUMIF function is used to compute for the sum of numbers inside a specified range that satisfies specific conditions.
The SUMIFS function, one of the Excel functions that adds all the numbers that meet multiple criteria.
The COUNT function calculates the total number of cells that contain numerical values, including numbers found inside the given list of inputs.
The COUNTIF function is used to count numbers of values within a specified range that satisfies specific criteria.
The COUNTIFS function is function in Excel that tallies the number of cells within a specified range that meet one or more specified conditions.
HCI Lesson 2 - Components of Human-Computer Interaction (HCI).pdfROWELL MARQUINA
At the end of the lesson, students will be able to:
understand the components of human-computer interaction,
explain different types of interaction styles,
evaluate the evolving scope of HCI.
Interface in HCI
An interface is the point of contact and communication between a human user and a computer system. It consists of the hardware and software elements that enable a user to input commands or data, receive outputs, and interact with the system to accomplish their goals.
Types of Interfaces in HCI
Graphical User Interfaces (GUIs): These are the most common today, featuring visual elements like windows, icons, menus, and pointers (WIMP). They are intuitive and generally easier to learn.
Command-Line Interfaces (CLIs): Primarily text-based. Users give commands through typed instructions. While less intuitive initially, they can be powerful for experienced users.
Voice User Interfaces (VUIs): Enable interaction via spoken commands and may offer speech-based output. Think of systems like Siri or Alexa.
Natural User Interfaces (NUIs): Aim to create more seamless interaction through gestures, touch, or even body movement recognition (e.g., some gaming systems).
Tangible User Interfaces (TUIs): Involve physical objects or environments as a way to control or manipulate digital information.
Key Roles of an Interface in HCI
Input: Allows users to provide commands, data, or instructions to the system (keyboard, mouse, microphone, touchscreens, etc.).
Output: How the system presents information back to the user (monitors, speakers, visual feedback, haptic responses, etc.).
Facilitation: Interfaces bridge the gap between how humans think and how computers operate, aiding in task completion.
Good HCI Interface Design
Intuitive: Easy to understand and use, even for novice users.
Efficient: Allows users to accomplish tasks quickly with minimal errors.
Responsive: Provides timely feedback to user actions.
Aesthetic: Visually pleasing and aligns with the overall system design.
Context in HCI
Context refers to the circumstances or environment within which an interaction between a user and a computer system takes place. It encompasses a wide range of factors that can influence how a user experiences and interacts with technology.
Key Types of Context in HCI
Physical Context:
Location (home, office, outdoors)
Ambient conditions (noise, lighting, temperature)
Devices being used (desktop, smartphone, wearable tech)
Social Context:
Presence of others (working solo or collaboratively)
Social roles and relationships (e.g., teacher and student)
Cultural norms
Task Context:
The user's goals and intentions
The steps involved in completing a task
The tools or resources available
Temporal Context:
Time of day
Duration of interaction
Interruptions or distractions
Informational Context:
Data the user is working with
Previous interactions with the system
HCI Lesson 1 - Introduction to Human-Computer Interaction.pdfROWELL MARQUINA
At the end of the lesson, students will be able to:
define Human-Computer Interaction (HCI),
identify the core focus areas of Human-Computer Interaction,
explain User-Centered Design and its importance.
DS Lesson 2 - Subsets, Supersets and Power Set.pdfROWELL MARQUINA
At the end of the session, students will be able to:
define the terms subsets and supersets;
identify subsets and superset
explain the concept of a power set and its notation.
find the power set of a given finite set.
According to Jerry Durlak, privacy is a fundamental aspect of human existence that encompasses four distinct components referred to as rights (solitude, anonymity, intimacy, reserve). These rights can be categorized into two.
The first category comprises three rights that an individual can employ to restrict access to individuals seeking personal information.
The second category refers to the rights that an individual can utilize to manage the quantity and significance of personal information disclosed.
Philosophers struggle with the task of precisely defining privacy. Discussions concerning privacy mostly focus on the concept of access, which refers to either being physically close to a person or having knowledge about that person.
A conflict arises between the individual’s right to limit access to oneself and the external parties’ right to obtain access, involving their desires, rights, and obligations.
Intellectual Property Rights (IPRs) are rights established to safeguard moral and economic entitlements of an individual or group for their original ideas, inventions, or creative expressions.
Intellectual Property (IP) is composed of creations, including but not limited to inventions, literary and artistic works, designs, symbols, names, pictures, computer code, etc.
Before the acknowledgment of intellectual properties, only tangible and material properties were given value and protection by the state. The intrinsic value of intangible properties such as ideas, inventions, and creative expressions was only later recognized because of their ability to satisfy the user.
ITSP Lesson 1 - Ethics and Ethical Theories.pdfROWELL MARQUINA
Ethics originated from the Greek word "ethos," meaning "way of living." It is a branch of philosophy that deals with the study how people behave especially in social situations.
Ethics is a set of firmly established principles that determine the distinction between morally correct and incorrect actions.
ITSP Lesson 1 - Ethics and Ethical Theories.pdfROWELL MARQUINA
Ethics originated from the Greek word "ethos," meaning "way of living." It is a branch of philosophy that deals with the study how people behave especially in social situations.
It is founded on logical reasons behind our moral choices.
Ethics is a set of firmly established principles that determine the distinction between morally correct and incorrect actions.
It revolves around concepts such as human rights, responsibilities, societal welfare, fairness, justice, and certain virtues.
ETHICAL PRINCIPLES:
Beneficence is an ethical principle which focuses on taking actions that will benefit or “do good” to other people.
It can be classified as kindness, charity, compassion, or mercy towards other people.
Nonmaleficence is the ethical principle of avoiding causing intentional harm toward another human being.
The principle asserts that causing harm to others, even for the greater good, is unacceptable.
Autonomy refers to the ethical principle that acknowledges people’s right to make choices for themselves based on their values and beliefs.
Justice is an ethical principle that emphasizes on the significance of equal treatment for all individuals, irrespective of their social status or position.
Utilitarianism is an ethical theory that places the ethical value of an action based on its consequences.
In utilitarianism, moral judgments and actions are determined by their ability to produce the most favorable outcomes while immoral decisions and actions are characterized by their tendency to yield unpleasant consequences.
Deontology is an ethical theory that states that adherence to a universally accepted set of rules determines what is morally right or wrong.
Actions that follow the developed set of rules can be seen as moral, but actions that go against them is considered immoral.
The rights-based ethical theory refers to the standards set for evaluating the rightness or wrongness of an action or decision based on how it respects a person's rights.
Any actions or decisions that violates the rights of an individual is considered an immoral act.
Virtue-based ethics pertains to an ethical theory in which the determination of moral correctness is based on an examination of the qualities and attributes associated with a morally upright and dignified individual.
Actions that adhere to the qualities determined by society are considered moral acts, while actions that do not adhere to the said qualities are considered immoral.
CHF Lesson 2 - Software and Software Categories.pdfROWELL MARQUINA
Software is the collection of data, programs, procedures, routines and instructions that tell a computer or electronic device how to run, work and execute specific tasks.
System software is a program intended to ensure that the computer's hardware and applications installed to it are running smoothly and efficiently.
Application software is a type of computer program that performs a specific personal, educational, or business function.
SOFTWARE DISTRIBUTION MODELS
SOFTWARE INSTALLATION MODELS
Animation Lesson 4 - Tools and Equipment in Animation.pdfROWELL MARQUINA
familiarize with the tools, equipment, and paraphernalia used in animation,
appreciate the benefit of proper maintenance of tools, equipment, and paraphernalia;
identify common malfunctions in tools, equipment, and paraphernalia;
discuss the guidelines in proper use and maintenance of tools, equipment, and paraphernalia; and
demonstrate the procedures in accomplishing forms (job order slips, requisition slips, borrower’s slips, and incident reports).
DSA Lesson 2 - Algorithm and Flowcharting.pdfROWELL MARQUINA
An algorithm refers to a series of well-defined instructions on how to accomplish a task or solve a specific problem.
Giving directions on how to get to somebody’s house is an algorithm.
The steps on how to change a light bulb is an algorithm.
The steps to compute the for average is also an algorithm.
In creating an algorithm, it is very important to determine the exact goal or expected product first. The goal or expected product of the algorithm is called OUTPUT.
After determining the output, the next step is to identify the necessary materials or elements needed to accomplish the task. The elements needed for the program is called INPUT.
If the input and output are already identified, it is time to list the steps needed to accomplish the task. The steps needed to accomplish the task is referred to as the PROCESS.
A program refers to a set of commands that provide instructions to a computer on how to perform a specific task.
A programming language is an artificial language developed to provide a communication link between humans and computers.
Low Level Language is a type of programming language that is machine dependent and provides little to no abstraction in the interface between programmers and the machine.
A High-Level Language is a user-friendly programming language that allows programmers to write their programs using natural language.
Machine Language
Assembly Language
Procedural Language
Object - Oriented Language
A conditional statement in Python programming is a type of statement that compares the values of two or more operands.
An operand refers to the data that is used by the program either for comparison, manipulation, or mathematical operation. An operand can be:
▪ a value inputted by the user
▪ a value set by the programmer inside the program
The results of the comparison using a conditional statement can result to either a TRUE or FALSE response.
▪ The TRUE response signifies that the values of operands are equal to one another or it is within the range provided by one of the operands.
▪ The FALSE response indicates that the values of operands are not equal to one another or it is outside the range provided by one of the operands.
Animation Lesson 3 - Occupational Health and Safety Procedures.pdfROWELL MARQUINA
discuss what is hazard and risk,
classify the types of workplace hazards,
define occupational health and safety procedures,
Identify the methods implemented by the company in controlling the hazards.
Animation Lesson 2 - Environment and Market (Updated).pdfROWELL MARQUINA
discuss what environment and market;
identify industries that employs animators;
identify the market players and their roles;
know how to identify customer’s profile;
make use of consumer analysis to identify customer’s needs and wants;
conduct consumer/market analysis.
enumerate animation studio products and services;
Animation Lesson 3 - Occupational Health and Safety Procedures.pdfROWELL MARQUINA
discuss what is hazard and risk,
classify the types of workplace hazards,
define occupational health and safety procedures,
Identify the methods implemented by the company in controlling the hazards.
Personal Entrepreneurial Competencies (PECs).pdfROWELL MARQUINA
define PECS;
discuss what is characteristics, skill, and lifestyle;
enumerate the personal characteristics that an aspiring animator must possess;
itemize the skills required in pursuing a career in animation; and
align individual traits, characteristics, attributes, and skills to that of and an animation practitioner.
After going through this module, you are expected to:
1. identify industries that employs animators;
2. enumerate products and services that an animation studio can offer;
3. know how to identify customer’s profile;
4. make use of consumer analysis to identify customer’s needs and wants; and
5. conduct consumer/market analysis.
1.discuss what is a Scanner class;
2.know how to import and make use of the Scanner class;
3.select the appropriate input methods in accommodating user’s input/s; and
4.create a program that will require input/s from the user.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
3. What is Data?
Data is a set of discrete or continuous
values that convey information by
representing quantity, quality, fact,
statistics, or other basic units of
meaning, or simply sequences of
symbols that can be formally
understood.
IMAGE SOURCE: https://businessfig.com/wp-content/uploads/2023/02/how-to-learn-big-data-7-places-to-start-in-2022.jpg
It is commonly arranged into tables
to provide more context and
definition to it.
4. What is Data?
The term "data" was first used to
refer to "transmissible and storable
computer information" in 1946.
IMAGE SOURCE: https://upload.wikimedia.org/wikipedia/commons/thumb/6/6d/Data_types_-_en.svg/1200px-Data_types_-_en.svg.png
Examples of Data:
▪ name
▪ height
▪ address
▪ temperature
▪ salary
▪ device model number
5. What is Data Structure?
IMAGE SOURCE: https://miro.medium.com/v2/resize:fit:753/1*3hSAy-MRkYgKIp6ybUdjjw.png
Data Structure is a branch of computer Science that deals with how
data can be stored, organized, and retrieved in the most efficient way
possible.
7. Why Learn Data Structure?
IMAGE SOURCE: https://c8.alamy.com/comp/2DAKBX0/data-volume-analysis-and-computer-science-industry3d-illustrationdata-structure-and-information-tools-for-
networking-business-2DAKBX0.jpg
Two of the most significant areas of
computer science are data structure
and algorithms.
▪ Proficiency in data structures
enable us to organize and store
data in the most efficient way
possible.
▪ Proficiency in algorithms enable us
to process that data more
meaningfully.
8. OBJECTIVES OF DATA STRUCTURE
CORRECTNESS
It entails that the data structure implementation should always
adhere to the set specifications and the outputs is grounded in
the expectations set for the program.
EFFICIENCY
Data structures must also be efficient. It should process data
fast without consuming a lot of computer resources, such as
memory space.
9. FEATURES OF DATA STRUCTURE:
ROBUSTNESS
All computer program must yield accurate responses for every
possible input by the user. Programs should be able to respond
accurately with valid and invalid inputs.
ADAPTABILITY
Computer programs are expected to be able to adjust to evolving
technologies and industry conventions.
REUSABILITY
Computer programs must be able to reuse the resources they use to
help future applications.
11. OPERATIONS ON DATA STRUCTURE
There are six operations involving Data Structures:
▪ Searching
▪ Insertion
▪ Deletion
▪ Sorting
▪ Merging
▪ Updating
12. OPERATIONS ON DATA STRUCTURE
SEARCHING
Searching is the process of locating a certain data within a given data
structure.
INSERTION
Insertion refers to the method of adding a new element to a data structure.
DELETION
Deletion is a method use to remove data from a data structures.
SORTING
Sorting is the action of organizing the data elements in a data
structure in a predetermined order (ascending or descending).
13. OPEARTIONS ON DATA STRUCTURES
MERGING
Merging can be considered simply appending a group of elements from
one data structure after elements from another data structure with the
same element structure.
UPDATING
Updating is a method where a data structure is revisited for performing
specific changes.
15. CLASSIFICATION OF DATA STRUCTURES
Data Structures can be classified
into two categories:
▪ Primitive Data Structure
▪Non-Primitive Data Structure
IMAGE SOURCE: https://static.javatpoint.com/ds/images/primitive-vs-non-primitive-data-structure.png
17. Primitive Data Structures is the
most elementary kind of data used
in programming language
composed of character, number,
and Boolean.
IMAGE SOURCE: https://www.shiksha.com/online-courses/articles/wp-content/uploads/sites/11/2022/05/image-162.png
These data types are also known as
simple Data Types since they
include characters that cannot be
further subdivided.
PRIMITIVE DATA STRUCTURES
18. byte refers to 8-bit signed two's complement integers that ranges from -128 to 127
short refers to 16-bit signed two's complement integer that ranges from -32,768 to 32,767
int
refers to 32-bit signed two's complement integer that ranges from -2,147,483,648 to
2,147,483,647
long
refers to 64-bit two's complement integer that ranges from -9,223,372,036,854,775,808
to 9,223,372,036,854,775,807
float
refers to single-precision 32-bit IEEE 754 floating point numbers that has a precision of
up to 7-digits after the decimal point.
double
refers to single-precision 64-bit IEEE 754 floating point numbers that has a precision of
up to 15-digits after the decimal point.
char
refers to a single 16-bit Unicode character that is used to store a single character. It can
be a single letter, number, or symbol.
Boolean
refers to the data type that can only store any of the two reserved values of either true
or false.
PRIMITIVE DATA STRUCTURES
20. NON-PRIMITIVE DATA STRUCTURES
Non-Primitive Data Structures are objects
or instances constructed by the
programmer rather than defined by the
programming language.
IMAGE SOURCE: https://www.shiksha.com/online-courses/articles/wp-content/uploads/sites/11/2022/05/image-166.png
They are also known as "reference
variables" or "object references" since
they refer to a memory region where the
data is stored.
21. NON-PRIMITIVE DATA STRUCTURES
We can divide these data structures
into two sub-categories based on the
structure and placement of the data:
▪ Linear Data Structures
▪ Non-Linear Data Structures
IMAGE SOURCE: https://cdn.discuss.boardinfinity.com/original/2X/2/21a0512ec5a8a8c9175277c007f783a01b2c08e2.png
23. LINEAR DATA STRUCTURES
The Linear Data Structure is the
data structure where data
elements are constructed
sequentially or follow a linear
trend. The elements are
adjacently attached and in a
specified order.
IMAGE SOURCE: https://cdn.discuss.boardinfinity.com/original/2X/2/21a0512ec5a8a8c9175277c007f783a01b2c08e2.png
24. LINEAR DATA STRUCTURES
There are five types of Linear Data Structures:
▪ Array
▪ Stack
▪ Queue
▪ Linked List
▪ Hash Tables
25. LINEAR DATA STRUCTURES
ARRAY
Is a type of linear data structure that stores elements of the
same data type in memory locations that are adjacent to each
other. Each element in an array is given an index number for
easier identification.
IMAGE SOURCE: https://www.geeksforgeeks.org/c-arrays/
26. LINEAR DATA STRUCTURES
STACK
A stack is a linear data structure
characterized by the LIFO (Last-In-
First-Out) approach, whereby
items are added and removed like
a pile, with new elements placed on
top of existing ones.
IMAGE SOURCE: https://miro.medium.com/v2/resize:fit:1400/1*tQ9Y11OdaMnhXwbfCF-edA.gif
27. LINEAR DATA STRUCTURES
Push method is used to enter
an element to the pile.
IMAGE SOURCE: https://miro.medium.com/v2/resize:fit:1400/1*tQ9Y11OdaMnhXwbfCF-edA.gif
Pop method is used to remove
an element from the file.
28. LINEAR DATA STRUCTURES
QUEUE
A queue is a linear data structure that employs the First In, First Out
(FIFO) approach for accessing its elements. Within the queue,
adding items to the list occurs exclusively at one end, whereas
removing items from the list occurs solely at the opposite end.
IMAGE SOURCE: https://ds1-iiith.vlabs.ac.in/exp/breadth-first-search/images/circular%20queue.gif
29. LINEAR DATA STRUCTURES
LINKED LIST
The linked list is the type of
linear data structure that stores
data elements through
interconnected nodes, with
each node containing the data
and the address to the next
node in the sequence.
IMAGE SOURCE: https://scaler-topics-articles-md.s3.us-west-2.amazonaws.com/insertion-operation-of-linked-list.gif
30. LINEAR DATA STRUCTURES
HASH TABLES
Hash tables are a type of linear
data structure that uses a hash
function to generate a key that
points to the address and value
of each element.
IMAGE SOURCE: https://scaler-topics-articles-md.s3.us-west-2.amazonaws.com/insertion-operation-of-linked-list.gif
32. NON-LINEAR DATA STRUCTURES
A Non-Linear Data Structure is a
type of data structure in which the
arrangement of data elements
does not follow a sequential or
linear trend. In these type of data
structure, the data elements are
stored in hierarchical or a
network-based structure.
IMAGE SOURCE: https://cdn.discuss.boardinfinity.com/original/2X/2/21a0512ec5a8a8c9175277c007f783a01b2c08e2.png
33. NON-LINEAR DATA STRUCTURES
There are Two Types of
Non-Linear Data Structures:
▪ Tree Data Structure
▪ Graph Data Structure
IMAGE SOURCE: https://cdn.discuss.boardinfinity.com/original/2X/2/21a0512ec5a8a8c9175277c007f783a01b2c08e2.png
34. NON-LINEAR DATA STRUCTURES
TREE DATA STRUCTURE
A tree is a type of data structure
that hierarchically organizes data.
It is a compilation of
interconnected nodes linked
together via edges. In each
structure, every node possesses a
parent node and may have an
arbitrary number of child nodes.
IMAGE SOURCE: https://res.cloudinary.com/practicaldev/image/fetch/s--zaYuwulZ--
/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/w0z2pz1f7th1k0ut8rbr.gif
35. NON-LINEAR DATA STRUCTURES
GRAPH DATA STRUCTURE
Graphs Data Structures are non-
linear data structures composed of a
finite number of interconnected
vertices and edges.
IMAGE SOURCE: https://miro.medium.com/v2/resize:fit:1208/1*SSSa5VrhhjNrXDdWTBGXlA.gif
The vertices (nodes) are responsible
for storing the data elements, while
the edges conveys the relationships
between the vertices.
36. INTRODUCTION TO
DATA STRUCTURES
MR. ROWELL L. MARQUINA
Professional Lecturer,
Polytechnic University of the Philippines
Email Address:
rowell.marquina001@deped.gov.ph
sirrowellmarquina@gmail.com
rmarquina@mitis.edu.ph