Open in app

Sign In

Write

Sign In

Anetshelani Maselesele
Anetshelani Maselesele

14 Followers

Home

About

Jan 11

‘What’s Your Move’ — a book review

A wise lady (Nicolette Mashile) once said “it isn’t how much you make, but how much you keep” — Page 30, that sets you apart from all the others. If you have read my two book reviews before, you know that I use a Book Review Template recommended by Ali…

Money Mindset

4 min read

‘What’s Your Move’ — a book review
‘What’s Your Move’ — a book review
Money Mindset

4 min read


Oct 5, 2022

Stay Close — Book Review

A fictional-based thriller by Harlan Coben I read ‘Stay Close’ over a month ago and I just never got the time to do a review on it. But I have managed to spare 30 minutes to finally get it out of the way. I am going to use a Fiction…

Stayclose

3 min read

Stay Close — Book Review
Stay Close — Book Review
Stayclose

3 min read


Aug 27, 2022

‘Show Your Work’ — a review

So, sometime last month I read a book called “Show Your Work” by Austin Kleon and I had promised that my next article will be a review of this book. With that being said, I am going to use a book review template that was recommended by Ali Abdaal. How…

Show Your Work

3 min read

‘Show Your Work’ — a review
‘Show Your Work’ — a review
Show Your Work

3 min read


Jul 19, 2022

5 books, 5 lessons

So, one day I decided I needed to get back to my productivity routine — I’ve been slacking a bit since school started. One way that I wanted to do this was to go back to writing short articles, but I didn’t know where to start. …

Lessons Learned

3 min read

5 lessons I learnt from 5 books
5 lessons I learnt from 5 books
Lessons Learned

3 min read


Apr 24, 2022

Computer crime: File sharing and piracy

Almost everybody has some kind of a digital device these days — it could be your smart phone, tablet, or even your personal computer. Unfortunately, these devices have been exacerbating the old traditional crimes. Crimes committed through digital devices are called computer crimes, referred to as cybercrimes hereafter. One of…

Cybercrime

2 min read

Computer crime: File sharing and piracy
Computer crime: File sharing and piracy
Cybercrime

2 min read


Feb 11, 2022

Differentiating between Authentication and Authorization

It is highly unlikely that we all have not heard the words 'authentication' and ‘authorization’. I will try and use a common real life example to explain the difference between the two. Remember the day you went to the store to purchase your favorite cheese? You got to the point…

Authentication

2 min read

Differentiating between Authentication and Authorization
Differentiating between Authentication and Authorization
Authentication

2 min read


Jul 17, 2021

How to print a triangle pattern in SQL

In this short article, I will take you guys through printing a basic triangle pattern in SQL. Before we start, remember that SQL syntax may differ depending on the Database Management System (DBMS) that you are using. We will use MS SQL Server syntax in this article. This article was…

Sql

3 min read

How to print a triangle pattern in SQL
How to print a triangle pattern in SQL
Sql

3 min read


May 10, 2021

Converting to Third Normal Form (3NF) in databases

In the previous section we discussed how to convert to 2NF. Now let’s look at converting to 3NF: Converting to 3NF This is about removing the transitive dependencies by identifying the determinant of each transitive dependency, which then becomes a primary key of a new table and then assigning the…

Normalization

3 min read

Converting to Third Normal Form (3NF) in databases
Converting to Third Normal Form (3NF) in databases
Normalization

3 min read


May 10, 2021

Converting to Second Normal Form (2NF) in Databases

In the previous section we discussed how to convert to the first normal form. Now let’s look at converting to 2NF. Converting to the 2NF involves removing the partial dependencies by: Identifying the determinants for each partial dependency and assigning the corresponding attributes. Writing out the entire composite primary key…

Normalization

2 min read

Converting to Second Normal Form (2NF) in Databases
Converting to Second Normal Form (2NF) in Databases
Normalization

2 min read


May 10, 2021

Converting to First Normal Form (1NF) in Databases

In the previous section, we discussed some basic knowledge regarding normalization in databases. To efficiently convert a table to 1NF, you need to identify a Primary Key that when used, it should be able to return only one record from the table. …

Normalization

2 min read

Converting to First Normal Form (1NF) in Databases
Converting to First Normal Form (1NF) in Databases
Normalization

2 min read

Anetshelani Maselesele

Anetshelani Maselesele

14 Followers
Following
  • Nontsikelelo Ndlazi

    Nontsikelelo Ndlazi

  • Ivhani Maselesele

    Ivhani Maselesele

  • Dineomagolego

    Dineomagolego

  • Litswanelo Phosholi

    Litswanelo Phosholi

  • Sas'kay Chauque

    Sas'kay Chauque

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech