Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Understanding Data Storage and Binary Number Representation

Classified in Computers

Written on in English with a size of 221.76 KB

Data Storage Conversion:

  • 1 gigabyte (GB) equals 1,024 megabytes (MB).
  • 1 megabyte (MB) equals 1,024 kilobytes (KB).
  • To convert gigabytes to kilobytes, multiply by 1,024 twice. For example: 1 GB = 1,024 MB * 1,024 KB = 1,048,576 KB.
  • To convert gigabytes to megabytes, multiply by 1,024. For example: 1 GB = 1,024 MB
  • To convert 20 megabytes to bytes: 20 MB = 20 * 1,024 KB * 1,024 bytes = 20,971,520 bytes
  • To convert 2 gigabytes to kilobytes: 2 GB = 2 * 1,024 MB * 1,024 KB = 2,097,152 KB

Example: SHKRONJA A has a value of 1010, B - 1011, C - 1100, D - 1101, E - 1110, F - 1111.

Binary Number Representations

There are three main ways to represent signed numbers in binary:

1. Signed Magnitude

  • Positive Numbers: Standard binary representation.
  • Negative Numbers: The
... Continue reading "Understanding Data Storage and Binary Number Representation" »

Adding Files, Modifying Files, Readers-Writers, Deadlock Prevention, Kernel and User Spaces, Cache Misses, TLB Lookups, Disk Access

Classified in Computers

Written on in English with a size of 4.49 KB

Adding Files

/usr/src/test_kernel/SystemCalls/test_call.c: Creates sys call pointer, Exports the pointer so that syscall module can access it, Define sys call wrapper. /usr/src/test_kernel/SystemCalls/Makefile: obj-y :=test_call.o compiles files directly into kernel.

Modifying Files

/usr/src/test_kernel/SystemModule/syscallModule.c: Holds module code, Implements sys call behaviour Registers syscall pointer to the proper syscall handler. /usr/src/test_kernel/SystemModule/Makefile obj-m :=syscallmodule.o Compiles file as a module.

/usr/src/test_kernel/arch/x86/entry/syscalls/syscall_64.tbl: Add system call to the table. /usr/src/test_kernel/include/linux/syscalls.h: Define the sys call prototype. /usr/src/test_kernel/Makefile: Add the SystemCalls... Continue reading "Adding Files, Modifying Files, Readers-Writers, Deadlock Prevention, Kernel and User Spaces, Cache Misses, TLB Lookups, Disk Access" »

Mechatronics Engineer Job Description

Classified in Computers

Written on in English with a size of 2.19 KB

Mechatronics engineers are responsible for designing mechanical equipment. Combining their knowledge of computer, mechanical, and electrical engineering, they develop various automated products, such as cameras, cars, and aircraft. The engineering process typically involves designing and assembling components, testing products in development, making improvements, and evaluating finished products. Engineers must also assess equipment and publish reports outlining production factors, such as practical use, safety, and cost.

Work Areas:

  • Electronics Development Unit
  • Software Development Unit
  • Project Management Unit
  • Biomechanical Development Unit including our Mechanical Shop and Scientific Glassblower

Mechanical Engineer Job Duties:

  • Evaluates mechanical
... Continue reading "Mechatronics Engineer Job Description" »

Layered Security Model and IT Infrastructure Best Practices

Classified in Computers

Written on in English with a size of 4.11 KB

10LayerModelSecurity,10Security policies and mandates.9,Oversight of end-to-end processes to ensure compliance with enterprise security policies. Audit trails for the threads.8Security roles and responsibilities. Standard security practices as they relate to activities and exchanges. Security Architecture. Personnel security requirements. 3.10. Management7Application service security (e.g., integrity of the service and application code) and content security (e.g., security labels). Security of user access to IT. Privilege management. 6Framework service security (e.g., integrity of the service and application code of the framework). Content security labeling service and label checking service. Software-based content encryption/decryption services... Continue reading "Layered Security Model and IT Infrastructure Best Practices" »

Software Engineering Concepts: A Comprehensive Guide

Classified in Computers

Written on in English with a size of 7.04 KB

Module 9: Firebase Application

Realtime Database

A cloud-hosted database. Data is stored as JSON and synchronized in real-time to every connected client. Provides easy-to-use services for authentication (email/password, 3rd-party providers like Google/Facebook).

Cloud Firestore

A flexible and scalable database for mobile, web, and development. It offers synchronization, offline support, and ACID transactions.

Cloud Functions

...

Hosting

CSS/JavaScript

Cloud Storage

Provides robust, secure file uploads and downloads for Firebase apps.

Module 10: UML Diagrams

Structural Diagrams

  • Class Diagram: Shows class hierarchy, fields/attributes, and relevant methods.

How to Read

  • Visibility:
    • +: Public
    • -: Private
    • #: Protected (accessed only by child classes)
  • Relationships:
... Continue reading "Software Engineering Concepts: A Comprehensive Guide" »

Revit Elements and Tools: A Comprehensive Dictionary

Classified in Computers

Written on in English with a size of 4.2 KB

Annotation Elements

Used to notate and clarify the information presented.

Annotate Ribbon

Buttons: Aligned, Linear, Angular, Radial, Diameter, Arc Length, Spot Elevation, Spot Coordinate, Spot Slope, Detail Line, Region, Component, Revision Cloud, Detail Group, Insulation, Text, Check Spelling, Find/Replace, Tag By Category, Tag All, Beam Annotations, Multi-Category, Material Tag, Area Tag, Room Tag, Space Tag, View Reference, Tread Number, Keynote, Duct Legend, Pipe Legend, Color Fill Legend, and Symbol.

Annotate Ribbon Tab

Panels: Dimension, Detail, Text, Tag, Color Fill, and Symbol.

Application Menu

File access and management tools are grouped in this menu. This menu is designated by the large ‘R’ in the top left corner of the Revit screen.... Continue reading "Revit Elements and Tools: A Comprehensive Dictionary" »

Advantages of E-Governance and PHP Features

Classified in Computers

Written on in English with a size of 2.72 KB

Advantages of E-Governance

  • Improves delivery and efficiency of government services.
  • Improved government interactions with business and industry.
  • Citizen empowerment through access to information.
  • More efficient government management

Features of PHP

  • Simple: It is very simple and easy to use, as compared to other scripting languages.
  • Interpreted: It is an interpreted language, i.e. there is no need for compilation.

Supported Datatypes in PHP

  • String: A string is a sequence of characters. A string can be any text inside quotes. You can use single or double-quotes.
  • Integer: An integer data type is a non-decimal number between -2,147,483,648 and 2,147,483,647.
  • Float (floating point numbers): A float (floating-point number) is a number with a decimal point or
... Continue reading "Advantages of E-Governance and PHP Features" »

Which of the following statements is true?,

Classified in Computers

Written on in English with a size of 10.36 KB

infile.Read(1)
'T'
>>>
infile.Read(5)
'he 3 '
>>>
infile.Readline()
'lines in this file end with the new line
character.\n'
>>>
infile.Read()
'\nThere is a blank line above this line.\n'
>>>
infile.Close()

outfile = open('test.Txt', 'w')
>>>
outfile.Write('T')
1
>>>
outfile.Write('his is the first line.')
22
>>>
outfile.Write(' Still the first line...\n')
25
>>>
outfile.Write('Now we are in the second line.\n')
31
>>>
outfile.Write('Non string value like '+str(5)+' must be converted first.\n')
49
>>>
outfile.Write('Non string value like {} must be converted first.\n'.Format(5))
49
>>> outfile.Close()

if temp > 86:
print('It is hot!')
print('Be sure to drink liquids.')
else:
print(... Continue reading "Which of the following statements is true?," »

Database Security, AutoML, and Data Lake Table Joining

Classified in Computers

Written on in English with a size of 3.65 KB

Acid Rain: Concurrency-Related Attacks in Database-Backed Web Applications

Motivation:

  • 12 popular self-hosted e-commerce applications (deployed over 2M websites, representing over 50% of all e-commerce websites)
  • 22 critical ACIDRain attacks identified and verified
  • Flexcoin -> Bankrupted

Problem Definition:

An application is vulnerable if:

  • Anomalies Possible: Under concurrent API access, the application may exhibit behaviors (i.e., anomalies) that could not have arisen under serial execution.
  • Sensitive Invariants: The anomalies arising from concurrent access lead to violations of application invariants.

Solution:

  • Execute API calls against a live application and database to generate a (possibly sequential) trace of database activity.
  • Analyze the trace
... Continue reading "Database Security, AutoML, and Data Lake Table Joining" »

Understanding Computer Fundamentals: Output Devices, Formatting, and Software Features

Classified in Computers

Written on in English with a size of 2.49 KB

Understanding Computer Fundamentals

Output Devices

Plotter

A plotter is a specialized output device that generates images on paper, similar to a printer but with a distinct approach. Plotters excel at producing large-scale drawings or images, such as construction plans or blueprints. They can be connected to the same port typically used by a printer.

Tab Stops

Tab stops simplify document formatting. By default, they are set at 0.5-inch intervals from the left margin, allowing for easy creation of elements like tables of contents or indexes without manual adjustments.

Formatting and Data Visualization

Importance of Pie Charts

Pie charts effectively illustrate relative proportions or contributions to a whole using a single data series. Their effectiveness... Continue reading "Understanding Computer Fundamentals: Output Devices, Formatting, and Software Features" »