Tuesday, May 16, 2023

THE RULE OF BRAHMACHARYA( INTRO .)

 BRAHMACHARYA :-



Brahmacharya is a term rooted in Indian philosophy and spirituality, particularly in the context of Hinduism and Jainism. It is often translated as "celibacy" or "chastity," but its meaning extends beyond just abstaining from sexual activity. 


In its broader sense, Brahmacharya refers to the practice of self-control and moderation in various aspects of life, including physical desires, speech, thoughts, and actions. It is one of the five key ethical principles, or yamas  in the classical yoga philosophy .

While Brahmacharya can be interpreted as celibacy, it is not limited to avoiding sexual activity. It encompasses the conservation and redirection of one's vital energy or life force, known as "prana," towards spiritual pursuits and personal growth. This can involve channeling one's energy into creative endeavors, intellectual pursuits, or spiritual practices, such as meditation, self-reflection, and study.


Brahmacharya is considered an essential virtue for those seeking spiritual progress and self-realization. It helps individuals cultivate discipline, focus, and inner strength. By practicing moderation and self-control, individuals aim to transcend physical and mental cravings and attachments, ultimately leading to spiritual awakening.


It's worth noting that interpretations and practices of Brahmacharya can vary among different traditions and individuals. While some may choose to observe strict celibacy, others may adopt a more flexible approach, focusing on mindful and responsible expression of their sexuality within the context of a committed relationship.


In Jainism, Brahmacharya is one of the fundamental vows taken by monks and nuns, alongside non-violence (ahimsa), truthfulness (satya), non-stealing (asteya), and non-possessiveness (aparigraha). For renunciates, Brahmacharya involves complete abstinence from sexual activity and the renunciation of all worldly attachments.


Overall, Brahmacharya is a principle that encourages individuals to lead a balanced and disciplined life, fostering personal and spiritual growth through the practice of self-control and moderation.


SOME RULE OF BRAHMACHARYA  (IN SHORT.)

The rules or guidelines for practicing Brahmacharya can vary depending on the individual's spiritual path, cultural background, and personal interpretation. Here are some general principles that are often associated with the practice of Brahmacharya:


1. Sexual restraint: Brahmacharya often involves abstaining from sexual activity or maintaining celibacy. This can mean refraining from engaging in sexual intercourse, as well as avoiding sexual fantasies, pornography, and excessive sexual thoughts. It encourages individuals to redirect their energy towards spiritual pursuits and self-improvement.



2. Mindful relationships: For individuals who choose to engage in relationships, Brahmacharya promotes the cultivation of healthy, balanced, and respectful relationships. It encourages individuals to approach relationships with awareness, integrity, and emotional maturity, fostering love, compassion, and mutual support.


3. Self-control in thoughts and actions: Brahmacharya extends beyond sexual restraint and encompasses self-control in all aspects of life. It involves moderation in food, sleep, speech, and behavior. Practitioners strive to maintain a disciplined and balanced lifestyle, avoiding excessive indulgence or extremes.


4. Cultivating purity: Brahmacharya emphasizes the cultivation of purity in thoughts, intentions, and actions. It encourages individuals to purify their minds from negative emotions, destructive desires, and harmful attachments. This purification process involves self-reflection, meditation, and the development of virtues such as honesty, kindness, and compassion.


5. Energy conservation: One of the key aspects of Brahmacharya is the conservation and redirection of vital energy or life force, known as "prana." Practitioners aim to conserve and harness this energy for personal growth, spiritual practices, and higher states of consciousness. This can be achieved through mindfulness, meditation, breath control techniques, and other spiritual practices.


6. Intellectual and spiritual pursuits: Brahmacharya emphasizes the pursuit of knowledge, wisdom, and spiritual growth. Practitioners engage in the study of sacred texts, philosophical inquiries, and spiritual practices to deepen their understanding and connection with the divine or higher reality.


It's important to note that the practice of Brahmacharya is a personal choice and can vary in its interpretation and application. Some individuals may choose to observe strict celibacy, while others may adopt a more moderate approach in their relationships and lifestyle. The underlying principle is to cultivate self-control, balance, and spiritual awareness in all aspects of life.


                                                                  ...




Saturday, May 13, 2023

#How to gain weight Ayurvedic way?

#How to gain  weight   Ayurvedic way?


According to Ayurveda, weight gain can be achieved by balancing the three doshas (vata, pitta, and kapha) and improving the digestion and metabolism. Here are some Ayurvedic tips for healthy weight gain:



1. Start the day with a healthy breakfast: A nutritious breakfast that includes healthy fats, protein, and complex carbohydrates can help improve metabolism and provide energy throughout the day.



2. Consume warm and nourishing foods: Eating warm, cooked, and nourishing foods can help stimulate digestion and increase the absorption of nutrients. Avoid cold, raw, and processed foods.



3. Use healthy oils: Adding healthy oils such as ghee, coconut oil, or sesame oil to your meals can provide the necessary healthy fats to support weight gain.



4. Include spices and herbs: Spices such as ginger, black pepper, and cinnamon can help improve digestion and metabolism, while herbs like  kaunch beej , safed musli powder ashwagandha and 

shatavari can support weight gain.





5. Practice mindful eating: Eat slowly, chew your food well, and avoid distractions while eating to improve digestion and absorption.



6. Reduce stress: Chronic stress can affect digestion and metabolism, leading to weight loss. Practice stress-reducing techniques such as yoga, meditation, or breathing exercises.



7. Get adequate sleep: Getting enough restful sleep is essential for maintaining a healthy weight. Aim for 7-8 hours of sleep each night.



Remember, healthy weight gain is a gradual process and requires a balanced and consistent approach. Consult with an Ayurvedic practitioner to personalize a plan for your unique body type and needs.


some best exercise for wait gain .

                               

for detials visit next post


Sunday, May 7, 2023

#HOW TO BE HEALTHY IN BUSY LIFE ?

 HOW TO BE HEALTHY IN BUSY LIFE ?



Maintaining a healthy lifestyle can be challenging, especially when you have a busy schedule. However, with a few small changes to your daily routine, you can prioritize your health and well-being.

 Here are some tips on how to be healthy in a busy life:


1. Prioritize sleep: Ensure you get at least 7-8 hours of sleep every night to help you feel rested and refreshed.

                                               Photo by bruce mars on Unsplash

2. Plan meals: Prepare and plan your meals in advance to avoid reaching for unhealthy snacks or fast food when you’re busy.

                                                          Photo by Arteum.ro on Unsplash


3. Stay hydrated: Keep a water bottle with you and aim to drink at least 8-10 glasses of water a day.


                                                   Photo by Nigel Msipa on Unsplash

4. Exercise regularly: Even if you don't have time to hit the gym, try to incorporate physical activity into your daily routine, like taking the stairs instead of the elevator or going for a walk during your lunch break.


                                                Photo by Jonathan Borba on Unsplash

5. Take breaks: Take short breaks during the day to stretch, meditate or simply relax to reduce stress levels.


                                                     Photo by Jared Rice on Unsplash

6. Practice self-care: Set aside some time each day for activities you enjoy, such as reading, taking a bath, or listening to music.

                                                Photo by Marcela Laskoski on Unsplash



7. Reduce screen time: Limit your time spent on electronic devices and try to disconnect from technology for a while each day.

By implementing these habits into your daily routine, you can maintain a healthy lifestyle, even if you have a busy schedule.






Friday, September 9, 2022

what is mapping and its type:

 Mapping:

                 The process to convert a request from external level and result between view levels is called mapping. It defines the correspondence between three view levels; the mapping description is also stored in data dictionary.

In detail, three view levels are described by means of three schemas. Schemas are stored in data dictionary. In DBMS, each user refers only to its own external schemas. Hence, the DBMS must transform a request on a specified external schema into a request against conceptual schema and then into a request against internal schema to store and retrieve data to and from the database. DBMS is responsible for mapping between these three types of schemas.


There are two types of mapping:

 1. External conceptual mapping 

2. Conceptual physical mapping

1. External conceptual mapping

It defines the correspondence between a particular external view and the conceptual view. It shows that which object on the conceptual level corresponds to the object requested on a particular user’s external view. In case of any changes between the views the mapping must be changed accordingly.


2. Conceptual physical mapping:

 It defines the correspondence between the conceptual view and physical view i.e. database stored in physical storage device. It shows how conceptual records are stored and retrieved to and from the storage device. Overall, it describes that how conceptual records are physically stored. If the structure of stored database changed then mapping must also be changed accordingly

Friday, September 2, 2022

what is Data Independence.&types.

 Data Independence:-

                                The architecture of the DBMS can be viewed as a 3-level system comprising the                                            following:  

 The internal or the physical level where the data resides. The conceptual level which is the level of the DBMS functions. The external level is the level of the application programs or the end user. Changes in the lower level without affecting the upper level is data independence. 

In simple words, the ability to modify a schema definition in one level without affecting a schema definition in the next higher level is called data independence.

There are two levels of data independence:

 i) Physical data independence

 ii) Logical data independence

i) Physical data independence: It is the ability to modify the schema definition at the physical level without affecting the schema at the conceptual level.

ii) Logical data independence: It is the ability to modify the conceptual schema without causing any changes in the schema at view level. It ensures that the application programs remain the same, modifications at the conceptual level are necessary whenever logical structures of the database get altered because of some unavoidable reasons. External Leve


Wednesday, August 17, 2022

what is Hashing and Types of hashing?

 Hashing:   

Hashing is yet another method used for making retrieval faster. It provides direct access to record on the basis of the value of a specific field called the hash_field. Here, when a new record is inserted, it is physically stored at an address which is computed by applying a mathematical function (hash function) to the value of the hash field. Thus, for every new record, hash address=f (hash_field), where f is the hash function.

 Later, when a record is to be retrieved, the same hash function is used to compute the address where the record is stored. Retrievals are faster since a direct access is provided and there is no search involved in the process.

 As example of the typical hash function is given by a numeric hash field, say an id, modulus a very large prime number. As hashing relates a field value to the address of the record, multiple hash fields will map a record to multiple addresses at the same time. Hence, there can be only one hash field per file.

 Example: Consider the example of the Student table. Let Stuid be the hash field and the hash function be defined as ((Stuid mod 10000)*64+1025). The records with Stuid 10001, 10002, 10003 etc. will be stored at addresses 1089, 1153, 1217 etc. respectively. 

Types of hashing: 

There are two types of hashing: 

 i) Static hashing 

 ii) Dynamic hashing

i) Static Hashing has the number of fixed primary pages in the directory. Thus, when a bucket is full, we need an overflow bucket to store any additional records that hash to the full bucket. This can be done with a link to an overflow page, or a linked list of overflow pages. The linked list can be separate for each bucket, or the same for all buckets that overflow. When searching for a record, the original bucket is accessed first, then the overflow buckets. Provided there are many keys that hash to the same bucket, locating a record may require accessing multiple pages on disk, which greatly degrades performance.

ii) Dynamic hashing: The problem of lengthy searching of overflow buckets is solved by Dynamic Hashing. In Dynamic Hashing the size of the directory grows with the number of collisions to accommodate new records and avoid long overflow page chains. Extendible and Linear Hashing are two dynamic hashing techniques.


Indexing: Indexing is another common method for making retrievals faster. Consider the example of CUSTOMER table. The following query is based on Customer's city. “Retrieve the records of all customers who reside in Delhi" Here a sequential search on the CUSTOMER table has to be carried out and all records with the value 'Delhi' in the Cust_City field have to be retrieved. 

The time taken for this operation depends on the number of pages to be accessed. If the records are randomly stored, the page accesses depends on the volume of data. If the records are stored physically together, the number of pages depends on the size of each record alsoIf such queries based on Cust_City field are very frequent in the application, steps can be taken to improve the performance of these queries. Creating an Index on Cust_City is one such method. This results in the scenario as shown below.





A new index file is created. The number of in file is same as that of the data file. The index file has two fields in each record. One field contains the value of the Cust_City field and the second contains a pointer to the actual data record in the CUSTOMER table.


Whenever a query based on Cust_City field occurs, a search is carried out on the Index file. Here, it is to be noted that this search will be much faster than a sequential search in the CUSTOMER table, if the records are stored physically together. This is because of the much smaller size of the index record due to which each page will be able to contain number of records.


When the records with value 'Delhi' in the Cust_City field in the index file are located, the pointer in the second field of the records can be followed to directly retrieve the corresponding CUSTOMER records.


Thus the access involves a Sequential access on the index ne and a Direct access on the actual data file.

Retrieval Speed v/s Update Speed : Though indexes help making retrievals faster, they slow down updates on the table since updates on the base table demand update on the index field as well.


It is possible to create an index with multiple fields i.e., index on field combinations. Multiple indexes can also be created on the same table simultaneously though there may be a limit on the maximum number of indexes that can be created on a table.

 

Tuesday, August 16, 2022

Characteristics and Benefits/Advantages of a Database?

 Characteristics and Benefits/Advantages of a Database:

 There are a number of characteristics that distinguish the database approach from the file-based system or approach. This chapter describes the benefits (and features) of the database system.


 1. Self-describing nature of a database system:

 A database system is referred to as self-describing because it not only contains the database itself, but also metadata which defines and describes the data and relationships between tables in the database. 

This information is used by the DBMS software or database users if needed. This separation of data and information about the data makes a database system totally different from the traditional file-based system in which the data definition is part of the application programs.

 2. Insulation (Cover) between program and data: 

In the file-based system, the structure of the data files is defined in the application programs so if a user wants to change the structure of a file, all the programs that access that file might need to be changed as well. On the other hand, in the database approach, the data structure is stored in the system catalogue and not in the programs. 

Therefore, one change is all that is needed to change the structure of a file. This insulation between the programs and data is also called program-data independence.

 3. Support for multiple views of data: 

A database supports multiple views of data. A view is a subset of the database, which is defined and dedicated for particular users of the system. Multiple users in the system might have different views of the system. Each view might contain only the data of interest to a user or group of users.

 4. Sharing of data and multiuser system:

 Current database systems are designed for multiple users. That is, they allow many users to access the same database at the same time. This access is achieved through features called concurrency control strategies. These strategies ensure that the data accessed are always correct and that data integrity is maintained. 

The design of modern multiuser database systems is a great improvement from those in the past which restricted usage to one person at a time. 


5. Control of data redundancy:

 In the database approach, ideally, each data item is stored in only one place in the database. In some cases, data redundancy still exists to improve system performance, but such redundancy is controlled by application programming and kept to minimum by introducing as little redundancy as possible while designing the database.


 6. Data sharing: 

The integration of all the data, for an organisation, within a database system has many advantages. First, it allows for data sharing among employees and others who have access to the system. Second, it gives users the ability to generate more information from a given amount of data that would be possible without the integration. 

7. Enforcement of integrity constraints: 

Database management systems must provide the ability to define and enforce certain constraints to ensure that users enter valid information and maintain data integrity.

 A database constraint is a restriction or rule that dictates what can be entered or edited in a table such as a postal code using a certain format or adding a valid city in the City field. There are many types of database constraints. 

Data type, for example, determines the sort of data permitted in a field, for example numbers only. Data uniqueness such as the primary key ensures that no duplicates are entered. Constraints can be simple (field based) or complex (programming).


 8. Restriction of unauthorized access

Not all users of a database system will have the same accessing privileges. For example, one user might have read-only access (i.e., the ability to read a file but not make changes), while another might have read and write privileges, which is the ability to both read and modify a file. For this reason, a database management system should provide a security subsystem to create and control different types of user accounts and restrict unauthorized access.

 9. Data independence:

 Another advantage of a database management system is how it allows for data independence. In other words, the system data descriptions or data describing data (metadata) are separated from the application programs. This is possible because changes to the data structure are handled by the database management system and are not embedded in the program itself.

 10. Transaction processing:

A database management system must include concurrency control subsystems. This feature ensures that data remains consistent and valid during transaction processing even if several users update the same information.

 11. Provision for multiple views of data: 

By its very nature, a DBMS permits many users to have access to its database either individually or simultaneously. It is not important for users to be aware of how and where the data they access is stored. 


12. Backup and recovery facilities:

Backup and recovery are methods that allow you to protect your data from loss. The database system provides a separate process, from that of a network backup, for backing up and recovering data. If a hard drive fails and the database stored on the hard drive is not accessible, the only way to recover the database is from a backup.

 If a computer system fails in the middle of a complex update process, the recovery subsystem is responsible for making sure that the database is restored to its original state. These are two more benefits of a database management system

What is Database Engine and Query Processor?

        1. What is Database Engine? 

  •  It is the heart of the DBMS. It stores, updates, and retrieves data. It also increases the speed and scalability of a database.

          2. What is Query Processor? 

  • It is the functional component of DBMS. It’s function is to break down query statement (given by user) into instruction understood by the DBMS. It helps the database system to access and update data.


1. Clustering:

 The method of storing logically related records physically together is called clustering. In this process, if the page containing the requested record is already in the memory, retrieval from the disk is not necessary. In such a situation, time taken for the whole operation will be less. Thus, if records which are frequently used together are placed physically together, more records will be in the same page. 

Hence, the number of pages to be retrieved will be less and this reduces the number of disk accesses which in turn gives a better performance. 

For example: Assume that the customer record size is 128 bytes and the typical size of a page retrieved by the file manager is 1KB (1024 bytes). If there is no clustering, it can be assumed that the customer records are stored at Random physical locations. In the worst case scenario, each record may be placed in a different page.

 Hence, a query to retrieve 100 records with consecutive customer id’s (say 1000, 10002) will require 100 pages to be accessed, which in turn translates to 100 disk accesses. 

 But, if the records are clustered, a page can contain 8 records. Hence, the no. of pages to be accessed for retrieving the 100 consecutive records will be ceil (100/8) =13 i.e. only 13 disk accesses will be required to obtain the query results. Thus, in the above example, clustering improves the speed by a factor of 7.7

  •  There are two types of clustering: 
  1.  Intra-file clustering.
  2.  Inter-file clustering 


  1.  Intra-file clustering: 
  •    When clustered records belong to the same files (tables), this is called intra-file         clustering.

 2. Inter-file clustering:
  • When clustered records belong to different files (tables), this is called inter-file clustering. This type of clustering may be required to enhance the speed of queries retrieving related records from more than one table. Here, interleaving of records is used.

Saturday, August 13, 2022

How many types of DBMS?

 Types of DBMS:

 There are six types of DBMS. They are as follows: 

1. Hierarchical DBMS 

2. Network DBMS 

3. Relational DBMS 

4. Distributed DBMS 

5. Object Oriented DBMS 

6. Object Relational DBMS

 1. Hierarchical DBMS:

 It is called HDBMS because it is based on hierarchical DBMS. This data model was developed by IBM in 1968 and introduced in IMS (Information Management System). This model is like structure of a tree with the records forming the nodes and fields forming the branches of the tree. In this model, a parent record can have several child records but a child can have only one parent record. 



  •  Advantages of HDBMS: 

1. It is very simple, analytical and natural method of implementing record relationships. 

2. This model is useful when there is some hierarchical character in the database. 

3. It is most popularly used data model by everyone because it is very easy to adopt, implement and modify. 

  • Disadvantages of HDBMS: 

1. It cannot represent all the relationships that occurred in the real world.

 2. It cannot demonstrate the overall data model for the enterprise because of the non-availability of actual data at the time of designing the data model.

 3. This data model is used only when there is hierarchical character in the concerned database. It cannot represent many to many relationship.

 4. Insert anomaly/problem: it is not possible to insert data about a new dependent if its superior record is not available.

 5. Delete anomaly: Deleting data in a hierarchical database lets to loss of many information.

 6. Update anomaly: In HDBMS, Updation of record and data is also an another problem. For example, suppose you want to change the address of a student from Delhi to Patna, then you will face two problems: 

a) You need to search the entire database to find every occurrence of that particular student and make changes everywhere. Wherever his/her details is appearing, if you miss out a single occurrence, you will face inconsistency problem. 

b) The student might shown as being in Patna at one place and at Kankarbagh another place.

WHAT IS THE FUNCTION OF DBMS?

 FUNCTIONS OF DBMS: 

The major functions of DBMS are as follows:

 i) Data Definition: The DBMS defines the structure of the data in the application. These include defining and modifying the record structure. The type and size of fields and the various constraints/ conditions to be satisfied by the data in each field.

 ii) Data Manipulation: After defining the data structure data needs to be inserted, modified or deleted. 

iii)Data Security and Integrity: The DBMS contains functions which handle the security and integrity of data in the application. These can be easily invoked by the application and hence, the application programmer need not code these functions in his/her program. 

iv)Data Recovery and Concurrency: Recovery of data after a system failure and concurrent access of records by multiple users are also handled by the DBMS.

 v) Data Dictionary Maintenance: Maintaining data dictionary which contains the data definition of the application is also considered as one of the functions of DBMS. 

vi)Performance: Optimising the performance of the queries is one of the important functions of DBMS. Hence, it has a set of programs forming the query optimiser which evaluates the different implementation of the query and choose the best about them. Thus, the DBMS provides an environment that is both convenient and efficient to use when there is a large volume of data and many transactions to be processed.

Friday, August 12, 2022

History of DBMS or Different People Behind DBMS:-

 History of DBMS or Different People Behind DBMS:-

 As the use of computers in maintaining data increased in late 1960’s the DBTG (Database Task Group) of CODASYL (Conference on Data System Languages) was set up to propose DBMS standards.

 Charles Bachman who was working for the development of the first commercial DBMS IDS (Integrated Data Store) data model (1964 onwards) introduced the earliest diagrammatic techniques for representing relationships database called data structure diagrams.

 The database standards specifications were published by the CODASYL committee, which was referred to as CODASYL DBTG 1971 report. This report contains scheme and subscheme DDL and DML for use with COBOL. A revised report (CODASYL1971) was made in 1978 and other revision was made in 1881.

 A relational model was proposed by E.F.Codd in 1970 in a paper. Relational algebra and theoretical foundations for the relational model were discussed by Codd in his subsequent papers published in 1971, 1972 and 1974. The first hierarchical DBMS-IMS (Information Management System) was developed by IBM in late 1960’s.

 However, there are very few documents available regarding theoretical emergence of hierarchical model. The most popular SQL (Structured Query Language) was described by Boyce etal in 1975. A lot of work has been done to produce the DBMS now in use. Some of the contributors are – Chamberlin, Date etc. ANSI outlined original SQL standard in 1986 which was revised in 1992. 

Users of DBMS:-

 1. DBA (Database Administrator): A database administrator (short form DBA) is a person responsible for the installation, configuration, upgrade, administration, monitoring and maintenance of physical databases.

 The role includes the development and design of database strategies, monitoring and improving database performance and capacity, and planning for future expansion requirements. They may also plan, co-ordinate and implement security measures to safeguard the database.


Role of DBA: 

The person who has control over both programs and data of the system is called Database Administrator (DBA). The functions of DBA include the following: 

i) Schema definition:

The DBA creates the original database schema by writing a set of definitions that is translated by the DDL compiler in a set of tables that are stored permanently in the data dictionary.

 ii) Storage structure and access method definition:

DBA creates appropriate storage structures and access methods by writing a set of definitions which is translated by data storage and data definition language compiler. 

iii) Schema and physical-organisation modification:

 Programmers accomplish the modifications either to schema or physical storage organisation by writing a set of definitions used by DDL or data storage compiler to generate modifications to appropriate internal system.

 iv)Granting data access authorisation: 

The granting of different types of authorisation allows the DBA to regulate which parts of the database various users can access. 

v) Integrity constraint specifications: The data values stored in the database must satisfy certain types of consistency constraints. Example: Account balance cannot fall below Rs.1000/- in case transaction is done by cheque. Such a constraint must be defined explicitly by the DBA. 

2. Database Designers:

 Database designer are responsible for designing the database objects. The database objects like tables, columns, their data types, forms and reports must be properly designed as per the requirement so that those can be flexibly used by the users. The database designers have to frequently communicate with all the prospective database users, understand and study their requirements. They develop the view of database that supports the requirements. Once the database design is complete they assist DBA.

3. Application Programmers: 

Those people who write the codes of the programs according to the designs suggested by the database designers are called application programmers. They also test, debug, document and maintain these programs.

 4. End Users:

Those people who access the database for different purposes are called end users. They are categorised as follows:

 i) Casual end users.

ii) Naive or Parametric end users.

 iii) Sophisticated end users .

iv) Stand alone users.

What is Information technology?

 What is Information technology?

 The methods used to collect and store the data, process the data into information and communicate the information all over the world is Information Technology.  

This technology is a revolution sweeping across the world. It is interesting to know that 75% of all information generated in the entire history of mankind has been generated in the last 30 years.

Thursday, August 11, 2022

.What is the difference between data and information?

 Q.What is the difference between data and information? 

Ans. The major differences between data and information are as follows