C++ Concepts: Exception Handling to Friend Functions
Classified in Computers
Written on in
English with a size of 3.16 KB
Exception Handling | Operator Overloading |
Classified in Computers
Written on in
English with a size of 3.16 KB
Exception Handling | Operator Overloading |
Classified in Computers
Written on in
English with a size of 3.23 KB
This code demonstrates matrix multiplication in CUDA, leveraging shared memory for optimization. It includes two examples: a kernel using shared memory and a host-side implementation using the Thrust library.
The following CUDA kernel performs matrix multiplication using shared memory to optimize data access:
__global__ void matMulShared(int *A, int *B, int *C, int rowsA, int colsA, int colsB) {
__shared__ int tile_A[TILE_SIZE][TILE_SIZE], tile_B[TILE_SIZE][TILE_SIZE];
int row = blockIdx.y * TILE_SIZE + threadIdx.y, col = blockIdx.x * TILE_SIZE + threadIdx.x, temp = 0;
for (int i = 0; i < (colsA + TILE_SIZE - 1) / TILE_SIZE; ++i) {
if (row <Use these filters to quickly isolate traffic based on common protocols:
Classified in Computers
Written on in
English with a size of 7.67 KB
-PE: Quickly check if host is up.
-sn: Disable port scanning (host discovery).
-n: Disables DNS resolution (checks IP online without looking up hostnames).
-O: OS detection.
-A: OS detection, Version detection, Script scanning, traceroute.
-sV: Service detection (banner info, version).
-vV: Provides verbose output.
-sC: Scan with default scripts for additional info gathering.
--min-rate=5000: Ensures scan sends at least 5k packets per second.
nmap --script smb-enum-shares.nse -p 445 (ip): List shares and their properties.
To see scripts starting with X: ls /path/X
To execute script with script tracing: sudo nmap -script=smb-os-discovery -script-trace target_ip
To enumerate the SMB share files: sudo nmap -script=smb-enum-shares target_ip
Vulnerability... Continue reading "Nmap, Netcat, and Metasploit Commands Cheat Sheet" »
These instructions are used to move data between registers, memory, and I/O ports.
| Instruction | Use |
|---|---|
MOV | Transfer data between registers or memory locations |
PUSH / POP | Perform stack operations (store/retrieve data) |
XCHG | Exchange contents of two operands |
IN / OUT | Input from or output to a port |
LEA | Load Effective Address |
LDS / LES | Load Pointer and Segment Register |
XLAT | Translate byte using a lookup table |
These instructions perform basic mathematical operations.
| Instruction | Use |
|---|---|
ADD / SUB | Addition / Subtraction |
ADC / SBB | Add/Subtract with Carry/Borrow |
INC / DEC | Increment / Decrement a value |
MUL / IMUL | Unsigned / Signed Multiplication |
DIV / IDIV | Unsigned / Signed Division |
NEG | Two's Complement (Negation) |
CMP | Compare operands |
Training an ML Project in the Cloud means utilizing cloud-based resources and services to build, train, and optimize a Machine Learning model.
Classified in Computers
Written on in
English with a size of 17.79 KB
This C program demonstrates the implementation of a circular queue using a linked list structure. The queue handles integer data.
#include <stdio.h>
#include <stdlib.h>
typedef struct QueueType {
int Data;
struct QueueType *Next;
} QUEUE;
QUEUE *Front = NULL; // Pointer to the front of the queue
QUEUE *Rear = NULL; // Pointer to the rear of the queue
// Function prototypes
void Enqueue(int Num);
int Dequeue();
void DisplayQueue();
int Menu();The Enqueue function inserts a number into the circular queue. It handles memory allocation and maintains the circular link by ensuring Rear->Next always points to Front.
void Enqueue(int Num)... Continue reading "C Implementation of Queues, Linked Lists, and Search Algorithms" »Classified in Computers
Written on in
English with a size of 6.34 KB
This document presents Java code snippets demonstrating two distinct functionalities: user name generation and management, and a car repair scheduling system. Each section includes method implementations with explanations of their purpose and logic.
The UserName class is designed to generate and manage potential user names based on a user's first and last names. It also provides functionality to filter out names that are already in use.
This constructor initializes a UserName object, populating a list of possible user names. It assumes that firstName and lastName are valid strings containing only letters and have a length greater than zero.
import java.util.ArrayList;
public class UserName {
Classified in Computers
Written on in
English with a size of 16.07 KB
Which of the following does not describe the “Prioritization” step as part of managing the demand pipeline?
R: Helping a friend
Which of the following statements are true when describing the role and responsibility of the Head of Robotic Automation?
R: All of the above
Select from the below which statement best describes the Demand Generation objective within the RPA Governance Board?
R: Identify quality RPA automation opportunities
Select from the below which statement best describes the Demand Management objective within the RPA Governance Board?
R: Responsible for defining and prioritizing
... Continue reading "Blue Prism RPA Roles, Governance, and ROM Foundations Q&A" »Classified in Computers
Written on in
English with a size of 4.97 KB
This section demonstrates the generation of a Binary Phase Shift Keying (BPSK) signal using Python.
import numpy as np
import matplotlib.pyplot as plt
def bpsk_detect(modulated_signal, carrier):
return np.sign(modulated_signal * carrier)
message_frequency = 10
carrier_frequency = 20
sampling_frequency = 30 * carrier_frequency
t = np.arange(0, 4/carrier_frequency, 1/sampling_frequency)
message = np.sign(np.cos(2 * np.pi * message_frequency * t) + np.random.normal(scale = 0.01, size = len(t)))
carrier = np.cos(2 * np.pi * sampling_frequency/carrier_frequency * t)
modulated_signal = carrier * message
detected_message = bpsk_detect(modulated_signal, carrier)
plt.figure(figsize=(12, 8))
plt.subplot(4, 1, 1)
plt.plot(t,... Continue reading "BPSK and QPSK Modulation Techniques with Python" »