C++ Code Examples: Essential Algorithms & Programs
Classified in Computers
Written on in
English with a size of 5.54 KB
C++ Code Examples: Essential Algorithms & Programs
Here are some fundamental C++ code examples covering various algorithms and programming concepts:
Factorial Calculation | String Length Finder |
Database Fundamentals: Normalization, Storage, and SQL Queries
Classified in Computers
Written on in
English with a size of 4.08 KB
This document summarizes key concepts and solutions from previous database exam questions.
Relational Schema with Functional Dependencies
- Schema: R(A, B, C, D, E, F)
- Dependencies: C → F, E → A, EC → D, A → B
- Candidate Keys: CE
- Prime Attributes: C, E
- Second Normal Form (2NF):
- No, because of partial dependencies:
- C → F (partial dependency)
- E → A, B (partial dependency)
- No, because of partial dependencies:
EMP_DEPT Table Analysis
- Functional Dependencies:
- Ssn → Ename, Bdate, Address, Dnumber, Dname, Dmgr_ssn
- Dnumber → Dname, Dmgr_ssn
- Dmgr_ssn → Dnumber, Dname
- Dname → Dnumber, Dmgr_ssn
- First Normal Form (1NF):
- Split names into first_name and last_name.
- Second Normal Form (2NF):
- Already in 2NF because there are no partial dependencies.
EMP_PROJ Table Normalization
- Functional Dependencies:
React Hooks & Redux: Essential Concepts for Developers
React Hooks and Essential Libraries
useState Hook
Purpose
Purpose: Adds state to functional components.
Import
import { useState } from 'react';Syntax
const [state, setState] = useState(initialValue);Update Methods
setState(newValue);setState(prevState => ...);(for updates based on previous state)
Example
import React, { useState } from 'react';
function Counter() {
const [count, setCount] = useState(0);
return (
<div>
<p>Count: {count}</p>
<button onClick={() => setCount(count + 1)}>Increment</button>
</div>
);
}useEffect Hook
Purpose
Purpose: Performs side effects such as data fetching, subscriptions, or direct DOM manipulations.
Import
import { useEffect } from 'react';Syntax
useEffect(... Continue reading "React Hooks & Redux: Essential Concepts for Developers" »Practical Machine Learning Labs in TensorFlow and PyTorch
Lab 1: Basic TensorFlow Computation Graph
This example demonstrates how to define and execute a simple computation graph in TensorFlow using the @tf.function decorator, which converts a Python function into a high-performance TensorFlow graph.
import tensorflow as tf
# Define a simple computation graph
@tf.function # Converts Python function into a TensorFlow graph
def my_graph(x, y):
return x * y + 5 # Simple equation: (x * y) + 5
# Create TensorFlow constants (nodes)
x = tf.constant(3.0)
y = tf.constant(4.0)
# Run the computation graph
result = my_graph(x, y)
# Print the result
# Convert tensor to a NumPy array to see the value
print(f"Result of (x * y) + 5: {result.numpy()}")Lab 2: Simple Linear Regression with Keras
Here, we build,... Continue reading "Practical Machine Learning Labs in TensorFlow and PyTorch" »
Cheat Sheets: Definition, Academic Use, and Technical Reference
Classified in Computers
Written on in
English with a size of 3.02 KB
What is a Cheat Sheet? Definition and Terminology
A cheat sheet or crib sheet is a concise set of notes used for quick reference. The term may also be rendered as cheatsheet.
Academic Use and Exam Preparation
Cheat sheets are so named because they may be used by students without the instructor's knowledge to cheat on a test. However, in many educational settings, particularly high school or undergraduate studies, rote memorization is often less important than basic education or intense graduate studies. Therefore, students may be permitted to consult their own notes during the exam, which is not considered cheating.
The act of preparing a so-called cheat sheet is also an educational exercise. For this reason, students are typically only allowed... Continue reading "Cheat Sheets: Definition, Academic Use, and Technical Reference" »
dsdfs
Classified in Computers
Written on in
English with a size of 7.22 KB
Kako si lep danes
What is Lorem Ipsum?
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.
What is Lorem Ipsum?
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard... Continue reading "dsdfs" »
Programming Concepts: Constants, Constructs, and Operators
Classified in Computers
Written on in
English with a size of 1.72 KB
Programming Fundamentals
What is a Constant?
A constant is a data value that remains unchanged during the execution of a program.
Three Programming Constructs
The three fundamental programming constructs are: selection, iteration, and sequence.
Logical Operators
One example of a logical operator is AND.
- Operator: and
- Description: Logical AND: True if both operands are true.
- Syntax:
x and y
Functions vs. Procedures
Difference: A function is typically used to calculate a value from a given input, while a procedure is a set of commands executed in a specific order.
Similarity: Functions must return a value, but in stored procedures, it is optional. Procedures can return zero or multiple values. Functions usually have only input parameters, whereas procedures... Continue reading "Programming Concepts: Constants, Constructs, and Operators" »
Java Arithmetic Operations Web App
Classified in Computers
Written on in
English with a size of 1.24 KB
Arithmetic Operations in Java
Input Form
- Addition
- Subtraction
- Multiplication
- Division
<% String num1Str = request.getParameter("num1"); String num2Str = request.getParameter("num2"); String operation = request.getParameter("operation"); if (num1Str != null && num2Str != null && !num1Str.isEmpty() && !num2Str.isEmpty() && operation != null) { double num1 = Double.parseDouble(num1Str); double num2 = Double.parseDouble(num2Str); double result = 0; switch (operation) { case "add": result = num1 + num2; out.println("
Result: " + result + "
"); break; case "subtract": result = num1 - num2; out.println("
Result: " + result + "
"); break; case "multiply": result = num1 * num2; out.println("... Continue reading "Java Arithmetic Operations Web App" »
Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway
Classified in Computers
Written on in
English with a size of 4.69 KB
HOSTàROUTER: 1
ENABLE
CONFIGURE TERMINAL
INTERFACE GIGABITETHERNET 0/0
IP ADDRESS 192.168.1.126 255.255.255.224
NO SHUTDOWN
EXIT
INTERFACE GIGABITEETHERNET 0/1
IP ADDRESS 192.168.1.158 255.255.255.240
NO SHUTDOWN
HOSTàSWITCH 2
ENABLE
CONFIFURE TERMINAL
INTERFACE VLAN 1
IP ADDRESS 192.168.1.157 255.255.255.240
NO SHUTDOWN
HOST/ROUTER 3
EXIT (LLEGAR AL CONFIGURE TERMINAL)
HOSTNAME MIDDLE
ENABLE SECRET CISCO
LINE CONSOLE 0
PASSWORD CLASS
LOGIN
EXIT
SECURITY PASSWORD MIN-LENGTH 10
SERVICE PASSWORD ENCRYPTION
IP DOMAIN-NAME CISCO
CRYPTON KEY GENERATE RSA
1024
EXIT
USERNAME CICLOS
LINE VTY 0 4
LOGIN LOCAL
TRANSPORT INPUT SSH
EXIT
INTERFACE GIBABITEETHERNET 0/0
IPV6 ADDRESS 2001:DB8:ACAD:A::1/64
IPV6 ADDRESS FE80::1 LIN
EXIT
GIBABITETHERNET 0/1
IPV6 ADDRESS 2001:DB8:ACAD:B::1/64
IPV6
... Continue reading "Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway" »Understanding Computer Viruses and Network Topologies
Classified in Computers
Written on in
English with a size of 5.9 KB
A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.[1] When this replication succeeds, the affected areas are then said to be 'infected' with a computer virus.[2][3]
Virus writers use social engineering deceptions and exploit detailed knowledge of security vulnerabilities to initially infect systems and to spread the virus. The vast majority of viruses target systems running Microsoft Windows,[4][5][6] employing a variety of mechanisms to infect new hosts,[7] and often using complex anti-detection/stealth strategies to evade antivirus software.[8][9][10][11] Motives for creating viruses can include seeking profit (e.g., with ransomware), desire... Continue reading "Understanding Computer Viruses and Network Topologies" »