Notes, abstracts, papers, exams and problems of Computers

Sort by
Subject
Level

Shell script

Classified in Computers

Written at on English with a size of 2.47 KB.

Ejercicio de descuentos:

#!/bin/bash

read -p "¿Desea el billete también de vuelta? (s/n): " idavuelta

until [ $idavuelta=="s" ] || [ $idavuelta=="n" ]; do

read -p "¿Desea el billete también de vuelta? (s/n): " idavuelta

done

read -p "¿Tiene carnet joven? (s/n): " carnetjoven

until [ $carnetjoven="s" ] || [ $carnetjoven="n" ]; do

read -p "¿Tiene carnet joven? (s/n): " carnetjoven

done

descuento=0 billete=20

if [ $idavuelta="s" ]; then

descuento=20

billete=" expr $billete \* 2'

fi

if [ $carnetjoven="s" ]j then

descuento=30

fi

costefinal=`expr $billete \* \( 100 - $descuento \) / 100`

echo "El precio final del billete es $costefinal"



Ejercicio de medias:

#!/bin/bash

acu=0

cont=0

read -p "Introduce un numero: " num

while [ $num -ne 0 ]; do

acu=`expr $acu + $num`

cont=... Continue reading "Shell script" »

dsdfs

Classified in Computers

Written at on English with a size of 7.22 KB.

Kako si lep danes 

What is Lorem Ipsum?

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

What is Lorem Ipsum?

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard... Continue reading "dsdfs" »

What is the time of the pet

Classified in Computers

Written at on English with a size of 11.32 KB.


DIRECTORY COMMANDS


– Directory commands: Commands that work with directories (pwd, ls, cd, mkdir, rmdir)


– File commands: Commands that allow you to manage files (cp, mv, sort, cut, paste, diff, rm, uniq)


pwd it lets you know where you are in the tree


Basic listing (ls): Displays files and directories in your current directory.


-F  To distinguish between files and directories

-a  show hidden files starting with a dot (.)

 -l parameter to produce a long listing.


Allows you to make copy of a file

– cp [option] source destination 

 -i option for interactive mode to give you a warning before overwriting an already existing file. 

 -p option to preserve file access or modification times of the original file for the copied file.


Copy from current

... Continue reading "What is the time of the pet" »

In order for changes to a Host's Firewall to be committed, what command must be used?

Classified in Computers

Written at on English with a size of 4.18 KB.

Create a domain: Server Manager, Add Roles and Features, Active Directory Domain Services. Add a computer to the domain: Control Panel, System, Change Settings, Computer Name, Change, Member of, Input domain. Create local and domain accounts and place the user accounts into built-in groups: Domain Accounts: Control Panel, System, Administrative Tools, AD Users and Computers, Right click new user and create the user, Right click on the user you created, Add to group, Find now, Click on group to add. Local Accounts: Login to local host, System, Administrative Tools, Computer Management, Local Users and Groups, Right click on users, New user, Right click on the user you just made, Click on properties, Member of, Add to a group. Add Server 2008
... Continue reading "In order for changes to a Host's Firewall to be committed, what command must be used?" »

Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway

Classified in Computers

Written at on English with a size of 4.69 KB.

HOSTàROUTER: 1

ENABLE

CONFIGURE TERMINAL

INTERFACE GIGABITETHERNET 0/0

IP ADDRESS 192.168.1.126 255.255.255.224

NO SHUTDOWN

EXIT

INTERFACE GIGABITEETHERNET 0/1

IP ADDRESS 192.168.1.158 255.255.255.240

NO SHUTDOWN

HOSTàSWITCH 2

ENABLE

CONFIFURE TERMINAL

INTERFACE VLAN 1

IP ADDRESS 192.168.1.157 255.255.255.240

NO SHUTDOWN

HOST/ROUTER 3

EXIT (LLEGAR AL CONFIGURE TERMINAL)

HOSTNAME MIDDLE

ENABLE SECRET CISCO

LINE CONSOLE 0

PASSWORD CLASS

LOGIN

EXIT

SECURITY PASSWORD MIN-LENGTH 10

SERVICE PASSWORD ENCRYPTION

IP DOMAIN-NAME CISCO

CRYPTON KEY GENERATE RSA

1024

EXIT

USERNAME CICLOS

LINE VTY 0 4

LOGIN LOCAL

TRANSPORT INPUT SSH

EXIT

INTERFACE GIBABITEETHERNET 0/0

IPV6 ADDRESS 2001:DB8:ACAD:A::1/64

IPV6 ADDRESS FE80::1 LIN

EXIT

GIBABITETHERNET 0/1

IPV6 ADDRESS 2001:DB8:ACAD:B::1/64

IPV6

... Continue reading "Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway" »

Understanding Computer Viruses and Network Topologies

Classified in Computers

Written at on English with a size of 5.9 KB.

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.[1] When this replication succeeds, the affected areas are then said to be 'infected' with a computer virus.[2][3]

Virus writers use social engineering deceptions and exploit detailed knowledge of security vulnerabilities to initially infect systems and to spread the virus. The vast majority of viruses target systems running Microsoft Windows,[4][5][6] employing a variety of mechanisms to infect new hosts,[7] and often using complex anti-detection/stealth strategies to evade antivirus software.[8][9][10][11] Motives for creating viruses can include seeking profit (e.g., with ransomware), desire... Continue reading "Understanding Computer Viruses and Network Topologies" »

Content

Classified in Computers

Written at on English with a size of 9.51 KB.

Javascript Continued

  1. The document.GetElementById() method returns the DOM node whose id attribute is the same as the method's parameter.
    Ex: document.GetElementById("early_languages") returns the p node in the HTML below.

  2. The document.GetElementsByTagName() method returns an array containing all the DOM nodes whose type is the same as the method's parameter.
    Ex: document.GetElementsByTagName("li") returns a list of the four li nodes from in the HTML below.

  3. The document.GetElementsByClassName() method returns an array containing all the DOM nodes whose class attribute matches the method's parameter.
    Ex: document.GetElementsByClassName("traditional") returns an array containing the ol node with the class attribute matching the word traditional.

... Continue reading "Content" »

Using Proximity, White Space, Alignment, Contrast, and Repetition in Design

Classified in Computers

Written at on English with a size of 1.05 KB.

Proximity

Proximity is all about using visual spaces to show relationships in your content. We can group the items in blocks of text or elements in the graphic to take visual emphasis.

White Space

White space, also known as negative space, refers to the spaces between your content, between lines, and even the margins. White space defines and separates different sections.

Alignment

We can separate text boxes, images, etc. by imagining their content as a range inside of a grid. Centering the images to the text and using equal size margins can create a visually pleasing alignment.

Contrast

Contrast means that one item is different from another. We can create contrast using color, size, shape, or contrasting styles of text. Hierarchy, a visual technique... Continue reading "Using Proximity, White Space, Alignment, Contrast, and Repetition in Design" »

Statistics and Trigonometry: Student Weights and Cosine Function

Classified in Computers

Written at on English with a size of 1.9 KB.

Weight of 30 Students - Minimum, Maximum, Average and Standard Deviation - Histogram

a = [71 82 65 75 77 91 59 84 89 81 73 91 82 75 96 85 69 76 81 92 84 79 77 95 81 79 84 85 76 82]

a = Columns 1 through 12

71 82 65 75 77 91 59 84 89 81 73 91

Columns 13 through 24

82 75 96 85 69 76 81 92 84 79 77 95

Columns 25 through 30

81 79 84 85 76 82

Maximum: 96

Minimum: 59

Average: 80.5333

Standard Deviation: 8.4516

Histogram

Plot the value of the cosine within [0 2π] with a step of π/20.

Label the axes and add a title.

Add to that graph the sine function. Use hold command.

Place legends to distinguish both graphic

x = 0:pi/20:2*pi

0 0.1571 0.3142 0.4712 0.6283 0.7854 0.9425 1.0996 1.2566

1.4137 1.5708 1.7279 1.8850 2.0420 2.1991 2.3562 2.5133 2.6704

2.8274 2.9845 3.1416... Continue reading "Statistics and Trigonometry: Student Weights and Cosine Function" »

The employer shall conduct" + "risk assessment

Classified in Computers

Written at on English with a size of 4.47 KB.

Phases:

Starting point: definition of all requirements, general, preliminary project | Choice of some Subset of system’s functions | Detail project and implementation of the System’s part realizing chosen functions. | Testing of the done part of the System and delivery to the client. | Repetition of the process.




-Planning (Objective setting) | Specific objectives for that phase of the Project are defined | Constraints on the Process and the product are identified|Detailed management plan Is drawn up|Project risks are Identified | Alternative strategies may be planned

-Risk Analysis (assessment and reduction) | For each of identified Risks a detailed analysis is carried out | Reduction of risk | Phase can Include prototype building

- Construction

... Continue reading "The employer shall conduct" + "risk assessment" »