Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Assembly Language Programming: Code Analysis and Solutions

Posted by Anonymous and classified in Computers

Written on in English with a size of 4.63 KB

Assembly Language Code Analysis and Solutions

Section 1: Instruction Correctness Check

.data

calculate WORD 100
wVal DWORD 2

Instructions:

  1. mov bl, calculate
  2. mov ax, wVal

Question 1: Are the above two instructions correct? If not, justify your claim. [2 marks]

Answer:

Both instructions are incorrect.

  • For the mov operation, the operands must generally be of the same size.
  • In instruction 1, bl is 8 bits (1 byte), but calculate is defined as a WORD (16 bits or 2 bytes). The operand sizes do not match.
  • In instruction 2, ax is 16 bits (2 bytes), but wVal is defined as a DWORD (32 bits or 4 bytes). The operand sizes do not match.

Section 2: Loop Pseudo-code

Question 2: Write the pseudo-code for the loop that calculates the sum of the integers 3 + 2 + 1. [2 marks]

... Continue reading "Assembly Language Programming: Code Analysis and Solutions" »

Python Fundamentals: Strings, Lists, Math, and Plotting Examples

Posted by Anonymous and classified in Computers

Written on in English with a size of 6.74 KB

P1: Python String Manipulation Techniques

Demonstrating String Operations

s = "hello"
print(s.capitalize())
print(s.upper())
print(s.rjust(100))
print(s.center(100))
print(s.replace('l','(M)'))
print(s)
print("don't")

Indexing

a = 'symbiosis2024'
print(a[2])

Negative Indexing

print(a[-1])
print(a[-6])

Slicing

print(a[9:12])
print(a[9:])
print(a[9:-1])
print(a[:8])
print(a[-12:-1])

Stride [start index:end index:step size]

print(a[0:13:2])
print(a[0::2])

Concatenation

b = 'hello'
c = 'world'
d = b + c
print(d)
e = b + " " + c
print(e)

Repetition

f = a * 3
print(f)
g = "2024"
print(g * 2)
print(a + '2')

Reversing a String

print(a[::-1])

Split

h = "sspu"
print(h.split()) # Returns a list
i = "05/08/2024"
print(i.split("/"))
j = "14:20:25"
print(j.split("
... Continue reading "Python Fundamentals: Strings, Lists, Math, and Plotting Examples" »

Nmap, Netcat, and Metasploit Commands Cheat Sheet

Classified in Computers

Written on in English with a size of 7.67 KB

Nmap Options

-PE: Quickly check if host is up.

-sn: Disable port scanning (host discovery).

-n: Disables DNS resolution (checks IP online without looking up hostnames).

-O: OS detection.

-A: OS detection, Version detection, Script scanning, traceroute.

-sV: Service detection (banner info, version).

-vV: Provides verbose output.

-sC: Scan with default scripts for additional info gathering.

--min-rate=5000: Ensures scan sends at least 5k packets per second.

nmap --script smb-enum-shares.nse -p 445 (ip): List shares and their properties.


To see scripts starting with X: ls /path/X

To execute script with script tracing: sudo nmap -script=smb-os-discovery -script-trace target_ip

To enumerate the SMB share files: sudo nmap -script=smb-enum-shares target_ip

Vulnerability... Continue reading "Nmap, Netcat, and Metasploit Commands Cheat Sheet" »

Assembly Instruction Set Categories and Functions

Posted by Anonymous and classified in Computers

Written on in English with a size of 5.73 KB

🧾 Data Transfer Instructions

These instructions are used to move data between registers, memory, and I/O ports.

InstructionUse
MOVTransfer data between registers or memory locations
PUSH / POPPerform stack operations (store/retrieve data)
XCHGExchange contents of two operands
IN / OUTInput from or output to a port
LEALoad Effective Address
LDS / LESLoad Pointer and Segment Register
XLATTranslate byte using a lookup table

➕ Arithmetic Instructions

These instructions perform basic mathematical operations.

InstructionUse
ADD / SUBAddition / Subtraction
ADC / SBBAdd/Subtract with Carry/Borrow
INC / DECIncrement / Decrement a value
MUL / IMULUnsigned / Signed Multiplication
DIV / IDIVUnsigned / Signed Division
NEGTwo's Complement (Negation)
CMPCompare operands
... Continue reading "Assembly Instruction Set Categories and Functions" »

Cloud Machine Learning Workflow and Content Delivery Optimization

Posted by Anonymous and classified in Computers

Written on in English with a size of 3.81 KB

Steps for Training a Machine Learning Project in the Cloud

Definition: Cloud ML Project Training

Training an ML Project in the Cloud means utilizing cloud-based resources and services to build, train, and optimize a Machine Learning model.

The Seven Key Steps in Cloud ML Training

  1. Data Collection: Gather and upload the dataset to cloud storage.
  2. Data Preprocessing: Clean and prepare data using cloud notebooks or specialized processing services.
  3. Model Selection: Choose the appropriate algorithm or utilize a pre-built model architecture.
  4. Training: Use scalable cloud compute resources (GPUs/TPUs) for intensive model training.
  5. Evaluation: Test model accuracy and performance using validation data.
  6. Hyperparameter Tuning: Optimize model parameters for better
... Continue reading "Cloud Machine Learning Workflow and Content Delivery Optimization" »

Android and iOS Mobile App Development Solutions

Posted by Anonymous and classified in Computers

Written on in English with a size of 11.74 KB

RecyclerView Features and GridView Implementation

1. List and explain any three features of RecyclerView. Develop an Android application to display any five programming languages in GridView.

  • View Recycling: Reuses views to improve performance and reduce memory usage.
  • ViewHolder Pattern: Stores item views to avoid repeated findViewById() calls.
  • Flexible Layout: Supports LinearLayoutManager, GridLayoutManager, and StaggeredGridLayoutManager.

Example: XML and Java

Java Code:

GridView gridView = findViewById(R.id.gridView);
String[] languages = {"C", "C++", "Java", "Python", "Kotlin"};
ArrayAdapter<String> adapter = new ArrayAdapter<>(this, android.R.layout.simple_list_item_1, languages);
gridView.setAdapter(adapter);

API Types and Data Passing

... Continue reading "Android and iOS Mobile App Development Solutions" »

C Implementation of Queues, Linked Lists, and Search Algorithms

Classified in Computers

Written on in English with a size of 17.79 KB

Circular Queue Implementation Using Linked Lists

This C program demonstrates the implementation of a circular queue using a linked list structure. The queue handles integer data.

Data Structure Definition

#include <stdio.h>
#include <stdlib.h>

typedef struct QueueType {
    int Data;
    struct QueueType *Next;
} QUEUE;

QUEUE *Front = NULL; // Pointer to the front of the queue
QUEUE *Rear = NULL;  // Pointer to the rear of the queue

// Function prototypes
void Enqueue(int Num);
int Dequeue();
void DisplayQueue();
int Menu();

Enqueue Operation

The Enqueue function inserts a number into the circular queue. It handles memory allocation and maintains the circular link by ensuring Rear->Next always points to Front.

void Enqueue(int Num)
... Continue reading "C Implementation of Queues, Linked Lists, and Search Algorithms" »

Java Code Examples: User Name Generation and Repair Scheduling

Classified in Computers

Written on in English with a size of 6.34 KB

This document presents Java code snippets demonstrating two distinct functionalities: user name generation and management, and a car repair scheduling system. Each section includes method implementations with explanations of their purpose and logic.

User Name Management System

The UserName class is designed to generate and manage potential user names based on a user's first and last names. It also provides functionality to filter out names that are already in use.

UserName Class Constructor

This constructor initializes a UserName object, populating a list of possible user names. It assumes that firstName and lastName are valid strings containing only letters and have a length greater than zero.

import java.util.ArrayList;

public class UserName {

... Continue reading "Java Code Examples: User Name Generation and Repair Scheduling" »

Blue Prism RPA Roles, Governance, and ROM Foundations Q&A

Classified in Computers

Written on in English with a size of 16.07 KB

RPA Governance and Demand Pipeline Management

Demand Pipeline Prioritization Steps

Which of the following does not describe the “Prioritization” step as part of managing the demand pipeline?

R: Helping a friend

Head of Robotic Automation Role and Responsibility

Which of the following statements are true when describing the role and responsibility of the Head of Robotic Automation?

R: All of the above

RPA Governance Board Objectives

Select from the below which statement best describes the Demand Generation objective within the RPA Governance Board?

R: Identify quality RPA automation opportunities

Select from the below which statement best describes the Demand Management objective within the RPA Governance Board?

R: Responsible for defining and prioritizing

... Continue reading "Blue Prism RPA Roles, Governance, and ROM Foundations Q&A" »

BPSK and QPSK Modulation Techniques with Python

Classified in Computers

Written on in English with a size of 4.97 KB

BPSK Signal Generation

This section demonstrates the generation of a Binary Phase Shift Keying (BPSK) signal using Python.

import numpy as np
import matplotlib.pyplot as plt

def bpsk_detect(modulated_signal, carrier):
    return np.sign(modulated_signal * carrier)

message_frequency = 10
carrier_frequency = 20
sampling_frequency = 30 * carrier_frequency
t = np.arange(0, 4/carrier_frequency, 1/sampling_frequency)
message = np.sign(np.cos(2 * np.pi * message_frequency * t) + np.random.normal(scale = 0.01, size = len(t)))
carrier = np.cos(2 * np.pi * sampling_frequency/carrier_frequency * t)
modulated_signal = carrier * message
detected_message = bpsk_detect(modulated_signal, carrier)

plt.figure(figsize=(12, 8))
plt.subplot(4, 1, 1)
plt.plot(t,
... Continue reading "BPSK and QPSK Modulation Techniques with Python" »