Notes, abstracts, papers, exams and problems of Computers

Sort by
Subject
Level

Understanding Mobile Development: The Viewport Meta Tag

Classified in Computers

Written at on English with a size of 735 bytes.

Mobile Development: The Viewport Meta Tag

The viewport meta tag is crucial for responsive web design on mobile devices. It controls how the browser displays a webpage on different screen sizes. Here's a breakdown of its key attributes:

Key Attributes

  • width: Defines the viewport width. Typically set to device-width, which matches the device's screen width.
  • initial-scale: Sets the initial zoom level. A value of 1 ensures the webpage is displayed at 100% zoom initially.
  • user-scalable: A boolean attribute. Setting it to no prevents users from zooming in or out.

Cybersecurity Fundamentals: Principles and Practices

Classified in Computers

Written at on English with a size of 7.68 KB.

**CIA Triad: Core Security Principles**

The CIA Triad consists of Confidentiality, Integrity, and Availability. These are the fundamental goals of information security.

**Threat Modeling: Proactive Security**

Threat modeling involves system decomposition and emphasizes security by design.

**Kerckhoffs's Principle: System Security**

Kerckhoffs's Principle states that:

  1. Security should not depend on the secrecy of the system's design, but only on the secrecy of the key.
  2. The system should be usable.
  3. Keys must be easy to change.

**One-Time Pad: Unbreakable Encryption**

A One-Time Pad is an algorithm that XORs the message with a randomly generated key of equal length. It is secure if:

  1. The key is truly random.
  2. The key is as long as the message.
  3. Each key is used
... Continue reading "Cybersecurity Fundamentals: Principles and Practices" »

Navigation

Classified in Computers

Written at on English with a size of 2.47 KB.

Website design means planning, creation and updating 

of websites.  PHP: is an acronym for "PHP: Hypertext 

Preprocessor", is a server scripting language, and a 

powerful tool for making dynamic and interactive Web 

pages.   HTML‐ Hyper Text Markup Language ,   CSS

‐ Cascading Style Sheets and    JavaScript‐JS the 

programming language of HTML and the Web. 

JQuery: is a JavaScript Library.

WORKING WITH THE TEXT  1.‐   a. Tim Berners‐Lee; 

b. Involves information architecture, website structure, 

user interface, website layout,  colors, contrasts. 

c. Static website  d. Dynamic website  2. True. A Web 

designer uses html, css and JavaScript.  3. HTML:... Continue reading "Navigation" »

Digital Graphics and Media: Terms and Definitions

Classified in Computers

Written at on English with a size of 3.97 KB.

Digital Graphics and Media: Key Terms

Image Fundamentals

  • Pixel: Individual dots that make up bitmap graphics.
  • Dots Per Inch (DPI): Also known as printer resolution. The number of dots of color a printer can produce in a certain amount of space.
  • Pixels Per Inch (PPI): The measurement of pixelation on an output device, such as a computer screen.
  • 300 PPI: The typical PPI needed for professional and commercial prints, such as advertising hoardings, for acceptable quality.
  • Megapixel: A unit used to measure the resolution of digital cameras, referring to one million pixels.
  • Bit Depth: Refers to the number of colors in an image.

Vector vs. Bitmap Graphics

  • Vector Graphics: Graphics stored as a series of mathematical shapes and properties that can be independently
... Continue reading "Digital Graphics and Media: Terms and Definitions" »

Creating BIM'S: A Collaborative Game Development Story

Classified in Computers

Written at on English with a size of 3.63 KB.

Scene 1:

  • Everyone shows up in a round table with computers thinking on what is the new game they will create.

  • Poster: Brainstorm of ideas

  • Carla: What game should we create now?

  • Andrea: We can create a city!

  • Bernardo: Yes! Let’s create a game that allows creating and simulating the life of your own avatar.

  • Ines: That will be perfect! We can design clothes and accessories for the avatars

  • Cuesta: That is a great idea, and it will not take too much time to code.

  • Carla: We can also adapt the game so people can play using their smartphones.

  • Everyone: Great let's call it... BIM’S!

Scene 2:

  • Cuesta: You sit down in front of a computer and start typing codes. Let’s start with the coding

    • Question to Bernardo: Bernardo, do you remember the coding of how to make

... Continue reading "Creating BIM'S: A Collaborative Game Development Story" »

Criptografía y Seguridad de Redes

Classified in Computers

Written at on English with a size of 2.89 KB.

Double DES

Use 2 keys to encrypt. Meet in the middle attack. Find E(M1) = D(C1).

ECB

Each block is encoded with the same key, information leakage can occur with repeated messages, parallelizable. Block replay attack – While monitoring. (Find and play repeated messages)

CBC

Used with a key – but not secret. Plaintext can produce different ciphers based on IV -> limits info leaks. Patterns still emerge for long messages. The problem – no integrity.

Diffie Hellman

  1. Choose two large primes: p and g.
  2. Choose a and b from [1, p-2].
  3. Calculate A/B = g^[a/b] mod p.
  4. Calculate s = B/A^[a/b] mod p.
  5. k = SHA256(s)
  6. Use k as the key for CBC.

Vulnerable to Man-in-the-Middle attack: Change A and B to p.

RSA

  1. Generate 2 large distinct primes p and q.
  2. n = pq, phi = (p-1)
... Continue reading "Criptografía y Seguridad de Redes" »

Cybersecurity Essentials: Threats, Controls, and Encryption

Classified in Computers

Written at on English with a size of 4.71 KB.

CIA Triad

The CIA Triad consists of Confidentiality, Integrity, and Availability. Related concepts include Authentication, Accountability, and Auditability.

Types of Harm

  • Interception
  • Interruption
  • Modification
  • Fabrication

Web Technologies

HTML

  • GET: Embeds parameters into the URL.
  • POST: Sends data directly to the server; more secure.

PHP

  • PUT: Used to create or replace a file at the specified URL. Sends data like POST, more suitable for uploading files.

Penetration Testing

5 Steps to Penetration Testing:

  1. Reconnaissance
  2. Scanning
  3. Gaining Access
  4. Maintaining Access
  5. Clearing Tracks

Security Controls

  • Prevention: Outright stopping an attack.
  • Deterrence: Making an attack harder.
  • Deflection: Making a target less attractive.
  • Mitigation: Lessening the harm.
  • Detection: Identifying
... Continue reading "Cybersecurity Essentials: Threats, Controls, and Encryption" »

Understanding Networking: Cables, Protocols, and Topologies

Classified in Computers

Written at on English with a size of 3.27 KB.

NETWORKING

1- Characteristics of Electronic Cables

Impedance, attenuation, and capacitance are crucial in electronic cables.

Impedance:

Resistance to electron movement in an AC circuit, measured in ohms (Ω).

Attenuation:

Resistance to electron flow, measured in db/m.

Capacitance:

Energy storage in a cable, measured in picofarads (pF).

2- Physical Description of Cables

Twisted Pair: Protects against crosstalk and noise.

Coaxial Cable: Consists of copper conductor, plastic insulation, and shielding.

Fiber-Optic Cable: Core, cladding, buffer, strengthening material, and outer jacket.

3- UTP vs. STP

Shielding reduces electrical noise in STP but makes installation complex.

4- Crimping RJ-45 UTP Cables

Creates straight-through and crossover cables for connecting... Continue reading "Understanding Networking: Cables, Protocols, and Topologies" »

Customer Feedback and Catalog Request Form

Classified in Computers

Written at on English with a size of 1.22 KB.

Customer Feedback and Catalog Request

Please fill out this form to provide feedback on the event and indicate your preferences for receiving our catalog.

Personal Information

Name:

[Name Field]

Surname:

[Surname Field]

Password:

[Password Field]

Event Feedback

Did you enjoy the event?

Please write your comments here.

Yes, I would like to receive the catalog.

Payment Method

Preferred Payment Method:

  • Credit Card
  • Postal Order
  • Cash on Delivery (Unavailable)

Catalog Language

In which language would you like to receive the catalog?

  • Spanish
  • English
  • German (Unavailable)

Address Details

Type of street:

Street Avenue Square Other

Preferred Means of Transport

Preferred Means of Transport:

Plane Train Ship Bus Van

Destination

Destination:

Athens Dublin Istanbul Lisbon London Oslo Paris... Continue reading "Customer Feedback and Catalog Request Form" »

Functions, Arguments, and Recursion in Programming

Classified in Computers

Written at on English with a size of 4.58 KB.

Functions and Arguments

A function is a module of program code that takes input (arguments) and produces output (a return value).

  • Arguments allow us to customize the operation performed by the function.
  • The return value is often the result of executing the code.
  • Calling a function causes the code in a function to execute. If called again, it will execute again.

To document a function, use a multi-line comment immediately after the def line.

Local Variables

Local variables are variables used inside functions.

  • They are accessible/usable within that function only.
  • This refers to the variable's scope.

Global Variables

Global variables are variables used outside of a function.

  • Global variables' scope includes both inside and outside of functions.
  • However, since
... Continue reading "Functions, Arguments, and Recursion in Programming" »