Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway

Classified in Computers

Written on in English with a size of 4.69 KB

HOSTàROUTER: 1

ENABLE

CONFIGURE TERMINAL

INTERFACE GIGABITETHERNET 0/0

IP ADDRESS 192.168.1.126 255.255.255.224

NO SHUTDOWN

EXIT

INTERFACE GIGABITEETHERNET 0/1

IP ADDRESS 192.168.1.158 255.255.255.240

NO SHUTDOWN

HOSTàSWITCH 2

ENABLE

CONFIFURE TERMINAL

INTERFACE VLAN 1

IP ADDRESS 192.168.1.157 255.255.255.240

NO SHUTDOWN

HOST/ROUTER 3

EXIT (LLEGAR AL CONFIGURE TERMINAL)

HOSTNAME MIDDLE

ENABLE SECRET CISCO

LINE CONSOLE 0

PASSWORD CLASS

LOGIN

EXIT

SECURITY PASSWORD MIN-LENGTH 10

SERVICE PASSWORD ENCRYPTION

IP DOMAIN-NAME CISCO

CRYPTON KEY GENERATE RSA

1024

EXIT

USERNAME CICLOS

LINE VTY 0 4

LOGIN LOCAL

TRANSPORT INPUT SSH

EXIT

INTERFACE GIBABITEETHERNET 0/0

IPV6 ADDRESS 2001:DB8:ACAD:A::1/64

IPV6 ADDRESS FE80::1 LIN

EXIT

GIBABITETHERNET 0/1

IPV6 ADDRESS 2001:DB8:ACAD:B::1/64

IPV6

... Continue reading "Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway" »

Understanding Computer Viruses and Network Topologies

Classified in Computers

Written on in English with a size of 5.9 KB

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.[1] When this replication succeeds, the affected areas are then said to be 'infected' with a computer virus.[2][3]

Virus writers use social engineering deceptions and exploit detailed knowledge of security vulnerabilities to initially infect systems and to spread the virus. The vast majority of viruses target systems running Microsoft Windows,[4][5][6] employing a variety of mechanisms to infect new hosts,[7] and often using complex anti-detection/stealth strategies to evade antivirus software.[8][9][10][11] Motives for creating viruses can include seeking profit (e.g., with ransomware), desire... Continue reading "Understanding Computer Viruses and Network Topologies" »

Intel 8051 Microcontroller Architecture and Features

Classified in Computers

Written on in English with a size of 3.35 KB

The Intel 8051 is an 8-bit microcontroller, meaning most available operations are limited to 8 bits. There are three basic "sizes" of the 8051: Short, Standard, and Extended. The Short and Standard chips are often available in DIP (Dual In-line Package) form, but the Extended 8051 models often have a different form factor and are not "drop-in compatible."

Key Features of the Intel 8051

  • 4 KB on-chip program memory.
  • 128 bytes on-chip data memory (RAM).
  • 32 bytes devoted to register banks.
  • 16 bytes of bit-addressable memory.
  • 80 bytes of general-purpose memory.
  • Four register banks.
  • 128 user-defined software flags.
  • 8-bit data bus.
  • 16-bit address bus.
  • 16-bit timers (usually 2, but may have more or less).
  • 3 internal and 2 external interrupts.
  • Bit as well as byte-
... Continue reading "Intel 8051 Microcontroller Architecture and Features" »

Content

Classified in Computers

Written on in English with a size of 9.51 KB

Javascript Continued

  1. The document.GetElementById() method returns the DOM node whose id attribute is the same as the method's parameter.
    Ex: document.GetElementById("early_languages") returns the p node in the HTML below.

  2. The document.GetElementsByTagName() method returns an array containing all the DOM nodes whose type is the same as the method's parameter.
    Ex: document.GetElementsByTagName("li") returns a list of the four li nodes from in the HTML below.

  3. The document.GetElementsByClassName() method returns an array containing all the DOM nodes whose class attribute matches the method's parameter.
    Ex: document.GetElementsByClassName("traditional") returns an array containing the ol node with the class attribute matching the word traditional.

... Continue reading "Content" »

Using Proximity, White Space, Alignment, Contrast, and Repetition in Design

Classified in Computers

Written on in English with a size of 1.05 KB

Proximity

Proximity is all about using visual spaces to show relationships in your content. We can group the items in blocks of text or elements in the graphic to take visual emphasis.

White Space

White space, also known as negative space, refers to the spaces between your content, between lines, and even the margins. White space defines and separates different sections.

Alignment

We can separate text boxes, images, etc. by imagining their content as a range inside of a grid. Centering the images to the text and using equal size margins can create a visually pleasing alignment.

Contrast

Contrast means that one item is different from another. We can create contrast using color, size, shape, or contrasting styles of text. Hierarchy, a visual technique... Continue reading "Using Proximity, White Space, Alignment, Contrast, and Repetition in Design" »

Network Design Fundamentals and Methodologies

Classified in Computers

Written on in English with a size of 4.22 KB

Key Network Concepts and Design Principles

Essential Network Terminology

Usability
The ease with which network users can access the network and its services. This includes goals for simplifying user tasks.
Management (Fault, Configuration, Accounting, Performance, Security)
The five key areas of network management: Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management.
Bandwidth
The data-carrying capacity of a circuit, measured in bits per second (bits/sec).
Throughput
The quantity of error-free data transmitted per unit of time by a circuit, measured in bits/bytes per second or packets per second.
Five Nines
High availability of service, commonly taken to mean 99.999% uptime.
Silent Failure
A
... Continue reading "Network Design Fundamentals and Methodologies" »

Computer Architecture Basics and Performance

Posted by thorng and classified in Computers

Written on in English with a size of 3.43 KB

Introduction to Architecture

  • Instruction Set Architecture (ISA): An assembly language programmer's view of the microprocessor.
  • Assembler: Translates symbolic assembly language code into binary machine language code.

Computer Performance Metrics

  • Execution Time (Response Time): Time to complete a program or task.
  • Throughput (Bandwidth): Number of programs or tasks completed per time unit.
  • Execution Time (texec, i.e., elapsed time, wall time, real time, response time): Elapsed seconds from start to finish. Includes:
    • Executing instructions
    • Disk access
    • Memory access
    • I/O activities
    • OS overhead
  • User CPU Time (tcpu(user)): Seconds the CPU spends executing the program's instructions.
  • System CPU Time (tcpu(sys)): Seconds the CPU spends executing OS (kernel) instructions
... Continue reading "Computer Architecture Basics and Performance" »

Java Sudoku Solver: Backtracking Algorithm Implementation

Classified in Computers

Written on in English with a size of 5.57 KB

Building a Sudoku Solver in Java with Backtracking

This document presents a Java implementation of a Sudoku solver, utilizing a classic backtracking algorithm. The code demonstrates how to represent a Sudoku board, check for valid moves, and recursively find a solution to the puzzle.

Initial Sudoku Puzzle Setup

The Sudoku board is represented as a 2D integer array. A value of 0 indicates an empty cell that needs to be filled.

int[][] board = {
  { 8, 0, 0, 0, 0, 0, 0, 0, 0 },
  { 0, 0, 3, 6, 0, 0, 0, 0, 0 },
  { 0, 7, 0, 0, 9, 0, 2, 0, 0 },
  { 0, 5, 0, 0, 0, 7, 0, 0, 0 },
  { 0, 0, 0, 0, 4, 5, 7, 0, 0 },
  { 0, 0, 0, 1, 0, 0, 0, 3, 0 },
  { 0, 0, 1, 0, 0, 0, 0, 6, 8 },
  { 0, 0, 8, 5, 0, 0, 0, 1, 0 },
  { 0, 9, 0, 0, 0, 0, 4, 0, 0 }
};

Implementing

... Continue reading "Java Sudoku Solver: Backtracking Algorithm Implementation" »

"entirely belongs to" shareholding

Classified in Computers

Written on in English with a size of 359.9 KB

Chapter 1 Introduction to Services

3.1. Service Terminology Service

a service is a software program that makes its functionality available via a technical interface, called a service contract.

Image

Figure 3.1. The symbol used to represent an abstract service.

Service Contract

The symbol used to represent a service contract is displayed in Figure 3.2.

Image

Service Capability

A service contract can be broken down into a set of service capabilities, each of which expresses a function offered by the service to other software programs.

Image

Figure 3.4. A Purchase Order service contract with four service capabilities.

Service Consumer

A service consumer is software program when it accesses and invokes a service—or, when it sends a message to a service capability


Service

... Continue reading ""entirely belongs to" shareholding" »

10 Usability Heuristics for User Interface Design

Classified in Computers

Written on in English with a size of 2.46 KB

1. Visibility of System Status

The system should always keep users informed about what is going on, through appropriate feedback within a reasonable time.

2. Match Between System and the Real World

The system should speak the user's language, with words, phrases, and concepts familiar to the user, rather than system-oriented terms. Follow real-world conventions, making information appear in a natural and logical order.

3. User Control and Freedom

Users often choose system functions by mistake and will need a clearly marked "emergency exit" to leave the unwanted state without having to go through an extended dialogue. Support undo and redo.

4. Consistency and Standards

Users should not have to wonder whether different words, situations, or actions... Continue reading "10 Usability Heuristics for User Interface Design" »