Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Cloud Machine Learning Workflow and Content Delivery Optimization

Posted by Anonymous and classified in Computers

Written on in English with a size of 3.81 KB

Steps for Training a Machine Learning Project in the Cloud

Definition: Cloud ML Project Training

Training an ML Project in the Cloud means utilizing cloud-based resources and services to build, train, and optimize a Machine Learning model.

The Seven Key Steps in Cloud ML Training

  1. Data Collection: Gather and upload the dataset to cloud storage.
  2. Data Preprocessing: Clean and prepare data using cloud notebooks or specialized processing services.
  3. Model Selection: Choose the appropriate algorithm or utilize a pre-built model architecture.
  4. Training: Use scalable cloud compute resources (GPUs/TPUs) for intensive model training.
  5. Evaluation: Test model accuracy and performance using validation data.
  6. Hyperparameter Tuning: Optimize model parameters for better
... Continue reading "Cloud Machine Learning Workflow and Content Delivery Optimization" »

C Implementation of Queues, Linked Lists, and Search Algorithms

Classified in Computers

Written on in English with a size of 17.79 KB

Circular Queue Implementation Using Linked Lists

This C program demonstrates the implementation of a circular queue using a linked list structure. The queue handles integer data.

Data Structure Definition

#include <stdio.h>
#include <stdlib.h>

typedef struct QueueType {
    int Data;
    struct QueueType *Next;
} QUEUE;

QUEUE *Front = NULL; // Pointer to the front of the queue
QUEUE *Rear = NULL;  // Pointer to the rear of the queue

// Function prototypes
void Enqueue(int Num);
int Dequeue();
void DisplayQueue();
int Menu();

Enqueue Operation

The Enqueue function inserts a number into the circular queue. It handles memory allocation and maintains the circular link by ensuring Rear->Next always points to Front.

void Enqueue(int Num)
... Continue reading "C Implementation of Queues, Linked Lists, and Search Algorithms" »

Java Code Examples: User Name Generation and Repair Scheduling

Classified in Computers

Written on in English with a size of 6.34 KB

This document presents Java code snippets demonstrating two distinct functionalities: user name generation and management, and a car repair scheduling system. Each section includes method implementations with explanations of their purpose and logic.

User Name Management System

The UserName class is designed to generate and manage potential user names based on a user's first and last names. It also provides functionality to filter out names that are already in use.

UserName Class Constructor

This constructor initializes a UserName object, populating a list of possible user names. It assumes that firstName and lastName are valid strings containing only letters and have a length greater than zero.

import java.util.ArrayList;

public class UserName {

... Continue reading "Java Code Examples: User Name Generation and Repair Scheduling" »

Blue Prism RPA Roles, Governance, and ROM Foundations Q&A

Classified in Computers

Written on in English with a size of 16.07 KB

RPA Governance and Demand Pipeline Management

Demand Pipeline Prioritization Steps

Which of the following does not describe the “Prioritization” step as part of managing the demand pipeline?

R: Helping a friend

Head of Robotic Automation Role and Responsibility

Which of the following statements are true when describing the role and responsibility of the Head of Robotic Automation?

R: All of the above

RPA Governance Board Objectives

Select from the below which statement best describes the Demand Generation objective within the RPA Governance Board?

R: Identify quality RPA automation opportunities

Select from the below which statement best describes the Demand Management objective within the RPA Governance Board?

R: Responsible for defining and prioritizing

... Continue reading "Blue Prism RPA Roles, Governance, and ROM Foundations Q&A" »

BPSK and QPSK Modulation Techniques with Python

Classified in Computers

Written on in English with a size of 4.97 KB

BPSK Signal Generation

This section demonstrates the generation of a Binary Phase Shift Keying (BPSK) signal using Python.

import numpy as np
import matplotlib.pyplot as plt

def bpsk_detect(modulated_signal, carrier):
    return np.sign(modulated_signal * carrier)

message_frequency = 10
carrier_frequency = 20
sampling_frequency = 30 * carrier_frequency
t = np.arange(0, 4/carrier_frequency, 1/sampling_frequency)
message = np.sign(np.cos(2 * np.pi * message_frequency * t) + np.random.normal(scale = 0.01, size = len(t)))
carrier = np.cos(2 * np.pi * sampling_frequency/carrier_frequency * t)
modulated_signal = carrier * message
detected_message = bpsk_detect(modulated_signal, carrier)

plt.figure(figsize=(12, 8))
plt.subplot(4, 1, 1)
plt.plot(t,
... Continue reading "BPSK and QPSK Modulation Techniques with Python" »

Core Concepts in Compiler Design and Language Runtime

Classified in Computers

Written on in English with a size of 10.45 KB

Core Concepts in Compiler Design

Compiler

Compiler: Translates entire source code to target code before execution. It requires a full parse and upfront error checking, then executes the generated target code.

Interpreter

Interpreter: Executes source code incrementally (line-by-line or statement-by-statement). It translates and executes on the fly, and may partially execute ill-formed programs until an error is encountered.

LVar vs. x86 Architecture

LVar: Features nested expressions, implicit control flow (represented by an Abstract Syntax Tree - AST), and an unlimited number of logical variables.

x86: Characterized by flat instructions, atomic operands (registers/memory), explicit control flow (jumps), and a limited set of registers. Compilation passes... Continue reading "Core Concepts in Compiler Design and Language Runtime" »

Object-Oriented Programming Examples: Delphi and C++

Posted by Anonymous and classified in Computers

Written on in English with a size of 9.22 KB

Introduction to OOP Concepts

This document presents practical code examples demonstrating fundamental Object-Oriented Programming (OOP) concepts in both Delphi (Pascal) and C++. It covers class definitions, object instantiation, properties, events, static members, inheritance, polymorphism, memory management, and exception handling.

Delphi Object-Oriented Programming

The following Delphi code illustrates the creation of classes, properties, events, and static members, along with their usage in a console application.


program Cheat;
{$APPTYPE CONSOLE}

uses
  SysUtils, Classes;

type
  TNotify = procedure(Sender: TObject) of object;

  TEngine = class
    procedure Start;
    begin
      Writeln('Engine Started');
    end;
  end;

  TCar = class
... Continue reading "Object-Oriented Programming Examples: Delphi and C++" »

C Linked List Student Data Management Systems

Posted by Anonymous and classified in Computers

Written on in English with a size of 14.42 KB

C Linked List Implementations for Student Data

This document presents two distinct C language implementations for managing student records using linked lists: a singly linked list and a circular linked list. Both examples demonstrate fundamental data structure operations such as adding, deleting, searching, and displaying student information.

1. Singly Linked List Implementation

This section details a student management system built using a singly linked list. Students are stored in ascending order of their roll numbers, and duplicate roll numbers are prevented.

Core Structure and Global Head

The Student structure defines the data for each node, including roll number, total marks, average, and a pointer to the next student. The head pointer always... Continue reading "C Linked List Student Data Management Systems" »

File System Journaling: Mechanisms, ext3, and NTFS Recovery

Posted by Anonymous and classified in Computers

Written on in English with a size of 3.75 KB

Journaling Motivation and Necessity

File System Check (FSck) ensures metadata consistency after crashes but is slow and requires deep file system knowledge. Recovery time should ideally depend on the number of recent writes.

File System Transactions and ACID Properties

Transactions provide ACID guarantees:

  • Atomicity
  • Consistency
  • Isolation
  • Durability

These are used to treat file system operations (like file creation) as transactions. Recovery ensures committed transactions are applied and uncommitted ones are discarded.

ext3 Journaling File System

ext3 is a journaling file system using physical redo logging, adding journaling to existing ext2 structures.

Redo Logging Mechanism in ext3

The process involves writing updates to a journal first, then committing... Continue reading "File System Journaling: Mechanisms, ext3, and NTFS Recovery" »

Programming Language Concepts: Expressions, Control Flow, and Subprograms

Posted by Anonymous and classified in Computers

Written on in English with a size of 4.81 KB

Expressions and Operators Fundamentals

Expressions Defined

What constitutes a valid expression in programming?

Understanding Operators

Operator Definition and Types

An operator is a symbol that represents a computation. What are the three primary types of operators?

  • Unary: Operates on one operand (e.g., -x).
  • Binary: Operates on two operands (e.g., x + y).
  • Ternary: Operates on three operands (e.g., (a > b) ? a : b).

Order of Operation and Precedence

How is the order of operation determined? What mechanisms can be used to change the default order of operation?

Order is typically governed by Operator Precedence Rules and Associativity Rules (e.g., left-to-right). Parentheses can be used to override the default order.

Conditional Expressions

What is a conditional... Continue reading "Programming Language Concepts: Expressions, Control Flow, and Subprograms" »