Notes, abstracts, papers, exams and problems of Computers

Sort by
Subject
Level

Shell script

Classified in Computers

Written at on English with a size of 2.47 KB.

Ejercicio de descuentos:

#!/bin/bash

read -p "¿Desea el billete también de vuelta? (s/n): " idavuelta

until [ $idavuelta=="s" ] || [ $idavuelta=="n" ]; do

read -p "¿Desea el billete también de vuelta? (s/n): " idavuelta

done

read -p "¿Tiene carnet joven? (s/n): " carnetjoven

until [ $carnetjoven="s" ] || [ $carnetjoven="n" ]; do

read -p "¿Tiene carnet joven? (s/n): " carnetjoven

done

descuento=0 billete=20

if [ $idavuelta="s" ]; then

descuento=20

billete=" expr $billete \* 2'

fi

if [ $carnetjoven="s" ]j then

descuento=30

fi

costefinal=`expr $billete \* \( 100 - $descuento \) / 100`

echo "El precio final del billete es $costefinal"



Ejercicio de medias:

#!/bin/bash

acu=0

cont=0

read -p "Introduce un numero: " num

while [ $num -ne 0 ]; do

acu=`expr $acu + $num`

cont=... Continue reading "Shell script" »

dsdfs

Classified in Computers

Written at on English with a size of 7.22 KB.

Kako si lep danes 

What is Lorem Ipsum?

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

What is Lorem Ipsum?

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard... Continue reading "dsdfs" »

What is the time of the pet

Classified in Computers

Written at on English with a size of 11.32 KB.


DIRECTORY COMMANDS


– Directory commands: Commands that work with directories (pwd, ls, cd, mkdir, rmdir)


– File commands: Commands that allow you to manage files (cp, mv, sort, cut, paste, diff, rm, uniq)


pwd it lets you know where you are in the tree


Basic listing (ls): Displays files and directories in your current directory.


-F  To distinguish between files and directories

-a  show hidden files starting with a dot (.)

 -l parameter to produce a long listing.


Allows you to make copy of a file

– cp [option] source destination 

 -i option for interactive mode to give you a warning before overwriting an already existing file. 

 -p option to preserve file access or modification times of the original file for the copied file.


Copy from current

... Continue reading "What is the time of the pet" »

In order for changes to a Host's Firewall to be committed, what command must be used?

Classified in Computers

Written at on English with a size of 4.18 KB.

Create a domain: Server Manager, Add Roles and Features, Active Directory Domain Services. Add a computer to the domain: Control Panel, System, Change Settings, Computer Name, Change, Member of, Input domain. Create local and domain accounts and place the user accounts into built-in groups: Domain Accounts: Control Panel, System, Administrative Tools, AD Users and Computers, Right click new user and create the user, Right click on the user you created, Add to group, Find now, Click on group to add. Local Accounts: Login to local host, System, Administrative Tools, Computer Management, Local Users and Groups, Right click on users, New user, Right click on the user you just made, Click on properties, Member of, Add to a group. Add Server 2008
... Continue reading "In order for changes to a Host's Firewall to be committed, what command must be used?" »

Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway

Classified in Computers

Written at on English with a size of 4.69 KB.

HOSTàROUTER: 1

ENABLE

CONFIGURE TERMINAL

INTERFACE GIGABITETHERNET 0/0

IP ADDRESS 192.168.1.126 255.255.255.224

NO SHUTDOWN

EXIT

INTERFACE GIGABITEETHERNET 0/1

IP ADDRESS 192.168.1.158 255.255.255.240

NO SHUTDOWN

HOSTàSWITCH 2

ENABLE

CONFIFURE TERMINAL

INTERFACE VLAN 1

IP ADDRESS 192.168.1.157 255.255.255.240

NO SHUTDOWN

HOST/ROUTER 3

EXIT (LLEGAR AL CONFIGURE TERMINAL)

HOSTNAME MIDDLE

ENABLE SECRET CISCO

LINE CONSOLE 0

PASSWORD CLASS

LOGIN

EXIT

SECURITY PASSWORD MIN-LENGTH 10

SERVICE PASSWORD ENCRYPTION

IP DOMAIN-NAME CISCO

CRYPTON KEY GENERATE RSA

1024

EXIT

USERNAME CICLOS

LINE VTY 0 4

LOGIN LOCAL

TRANSPORT INPUT SSH

EXIT

INTERFACE GIBABITEETHERNET 0/0

IPV6 ADDRESS 2001:DB8:ACAD:A::1/64

IPV6 ADDRESS FE80::1 LIN

EXIT

GIBABITETHERNET 0/1

IPV6 ADDRESS 2001:DB8:ACAD:B::1/64

IPV6

... Continue reading "Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway" »

Content

Classified in Computers

Written at on English with a size of 9.51 KB.

Javascript Continued

  1. The document.GetElementById() method returns the DOM node whose id attribute is the same as the method's parameter.
    Ex: document.GetElementById("early_languages") returns the p node in the HTML below.

  2. The document.GetElementsByTagName() method returns an array containing all the DOM nodes whose type is the same as the method's parameter.
    Ex: document.GetElementsByTagName("li") returns a list of the four li nodes from in the HTML below.

  3. The document.GetElementsByClassName() method returns an array containing all the DOM nodes whose class attribute matches the method's parameter.
    Ex: document.GetElementsByClassName("traditional") returns an array containing the ol node with the class attribute matching the word traditional.

... Continue reading "Content" »

I is correct ii is correct

Classified in Computers

Written at on English with a size of 5.66 KB.

Editing data:

Information gathered during data collection may lack uniformity. Example: Data collected through questionnaire and schedules may have answers which may not be ticked at proper places, or some questions may be left unanswered. Sometimes information may be given in a form which needs reconstruction in a category designed for analysis, e.G., converting daily/monthly income in annual income and so on. The researcher has to take a decision as to how to edit it.

Editing also needs that data are relevant and appropriate and errors are modified. Occasionally, the investigator makes a mistake and records and impossible answer. “How much red chilies do you use in a month” The answer is written as “4 kilos”. Can a family of three members... Continue reading "I is correct ii is correct" »

The employer shall conduct" + "risk assessment

Classified in Computers

Written at on English with a size of 4.47 KB.

Phases:

Starting point: definition of all requirements, general, preliminary project | Choice of some Subset of system’s functions | Detail project and implementation of the System’s part realizing chosen functions. | Testing of the done part of the System and delivery to the client. | Repetition of the process.




-Planning (Objective setting) | Specific objectives for that phase of the Project are defined | Constraints on the Process and the product are identified|Detailed management plan Is drawn up|Project risks are Identified | Alternative strategies may be planned

-Risk Analysis (assessment and reduction) | For each of identified Risks a detailed analysis is carried out | Reduction of risk | Phase can Include prototype building

- Construction

... Continue reading "The employer shall conduct" + "risk assessment" »

Ils half scale deflection

Classified in Computers

Written at on English with a size of 1.96 KB.

LOOKUP function uses a TRUE lookup type. with NESTED function,you include that function inside.Excel provides CONDITIONAL FORMAT tools, tools you can identify.Enter a row_num,column_num,area_num,excel display ERROR MESSAGE.30 MOVING AVERAGE trendline is used to smooth out the data. goal seek uses AN ITERATIVE approach to finding the right input. X-AXISLABELS identify the category plotted on the x-axis. Excel rounds the display, EQUAL OR GREATER THAN HALF. excel can contain CONSTANT CELL REFERENCE. in this case you enter range as FIRST argument. Dun and Bradstreet 1 to 4. COUNTIF(F3:F13,>_=1). 15DIGITS. Select the cell containing the text you want to change.Click the down arrow next to the size box on the format bar. Typically, the
... Continue reading "Ils half scale deflection" »

What is the time of the pet

Classified in Computers

Written at on English with a size of 2.81 KB.

What is a shapefile?

A shapefile is an Esri vector data storage format for storing the location, shape, and attributes of geographic features. It is stored as a set of related files and contains one feature class. Google Earth, an Online Satellite Imagery (OSI) Technique, is a tool for generating shapefiles.

Question 2: In your project, what geometric analysis tool have you used? How was the experience? Give one example / some examples.

One example:

We used ArcGIS to create a few population maps of To Kwa Wan.

We first selected the population and working population data from the C&SD department. Second, we opened TPUs with the population data in ArcGIS. The area of the TPUs was then calculated based on Hong Kong 1980 Grid, and hence the population... Continue reading "What is the time of the pet" »