Notes, abstracts, papers, exams and problems of Computers

Sort by
Subject
Level

Ils half scale deflection

Classified in Computers

Written at on English with a size of 1.96 KB.

LOOKUP function uses a TRUE lookup type. with NESTED function,you include that function inside.Excel provides CONDITIONAL FORMAT tools, tools you can identify.Enter a row_num,column_num,area_num,excel display ERROR MESSAGE.30 MOVING AVERAGE trendline is used to smooth out the data. goal seek uses AN ITERATIVE approach to finding the right input. X-AXISLABELS identify the category plotted on the x-axis. Excel rounds the display, EQUAL OR GREATER THAN HALF. excel can contain CONSTANT CELL REFERENCE. in this case you enter range as FIRST argument. Dun and Bradstreet 1 to 4. COUNTIF(F3:F13,>_=1). 15DIGITS. Select the cell containing the text you want to change.Click the down arrow next to the size box on the format bar. Typically, the
... Continue reading "Ils half scale deflection" »

Webpage Design and Security Threats

Classified in Computers

Written at on English with a size of 3.5 KB.

Design of Webpages

There are 2 distinct phases:

  • Layout: it organizes written and multimedia spaces and contents.
  • Interface: is the set of commands and methods that facilitate the interaction between the user and the system

We cannot move ahead with the creation of a web page without knowing what we want to show, the topic and the quantity of information that we will put in it. We shall also decide the title of the web page, its header and its logo, since they will give a sensation of continuity and greater professionalism.

CMS

The Content Management Systems (CMS) are applications installed on the server that enable us the creation of dynamic web pages and allow us to design the site independently of the content. When we administer a CMS, we define... Continue reading "Webpage Design and Security Threats" »

Latitude of the position

Classified in Computers

Written at on English with a size of 3.03 KB.

ROM: primary memory that is used to read data
USB: slot in the motherboard you can play in imput devices
HEADSET: output that is used to listen and to speak
CRASH: a failure that causes the rebooting of the OS
RELIABLE: the quality of being trustwerthy
VIRUS: malicious software that damages the pc
TROJAN: a hamful software that spies you pc
ZOMBIE: hacked computer contralled externally
TIME-BOMB: a malicious program that executes it self at a specific time
JUNK: a software tool that it is used fot deleting files
PRINTER: a periphoral divace that it is used to convent digital documents in to paper
TABLET: a computer portable
REFOUND: the amount cash that is obtained in exchange for a purchase
CRACKING: the action of malicious hacking
SERVER: a computer that
... Continue reading "Latitude of the position" »

"entirely belongs to" shareholding

Classified in Computers

Written at on English with a size of 359.9 KB.

Chapter 1 Introduction to Services

3.1. Service Terminology Service

a service is a software program that makes its functionality available via a technical interface, called a service contract.

Image

Figure 3.1. The symbol used to represent an abstract service.

Service Contract

The symbol used to represent a service contract is displayed in Figure 3.2.

Image

Service Capability

A service contract can be broken down into a set of service capabilities, each of which expresses a function offered by the service to other software programs.

Image

Figure 3.4. A Purchase Order service contract with four service capabilities.

Service Consumer

A service consumer is software program when it accesses and invokes a service—or, when it sends a message to a service capability


Service

... Continue reading ""entirely belongs to" shareholding" »

Action disvalue

Classified in Computers

Written at on English with a size of 1.69 KB.

Initialization: Prior to the first iteration of the loop, we have k = p, so that the subarray A[p..K-1]is empty. This empty subarray contains the k – p = 0 smallest elements of L and R, and since i = j = 1, both L[i] and R[j] are the smallest elements of their arrays that have not been copied back into A. Maintenance: To see that each iteration maintains the loop invariant, let us first suppose that L[i] <= R[j]. Then L[i] is the smallest element not yet copied back into A. Because A[p..K-1]contains the k - p smallest elements, after line 14 copies L[i]into A[k], the subarray A[p..K] will contain the k – p + 1 smallest elements. Incrementing k (in the for loop update) and i (in line 15) reestablishes the loop invariant for the next iteration.... Continue reading "Action disvalue" »

Java Programming Concepts and Examples

Classified in Computers

Written at on English with a size of 10.2 KB.

Palindrome

  1. Start
  2. Read the string
  3. Calculate the length of the string
  4. Initialize rev
  5. Initialize i=length=1
  6. Repeat until i>=0
    1. rev=rev+char at position I of the string
    2. i=i-1
  7. If string=rev:print “palindrome”
  8. Else print “not palindrome”
  9. Stop

import java.util.Scanner; import java.util.Scanner; class Test { public static void main(String args[]){ Scanner sc = new Scanner(System.in); System.out.print("Enter the String:"); String str = sc.nextLine(); int flag = 0; int len = str.length(); for(int i=0;i


Inheritance

  1. Create a class employee with given variables and method print the salary
  2. Create two sub classes of class employee named officer and manager include the variable specilaization in officer class and department in manager class
  3. Create a class with main
... Continue reading "Java Programming Concepts and Examples" »

Understanding Operating Systems: Functions, Performance, and Multithreading

Classified in Computers

Written at on English with a size of 217.89 KB.

WEEK 1: Software that Manages Computer Hardware

Operating System as an Abstract Machine, Service Provider, and Resource Manager. OS Objectives: Convenience, Efficiency, and Ability to Evolve.

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 2+ubasMN7QAAAABJRU5ErkJggg==

Performance Indices

Arrival Time, Service Time, Turnaround Time, Normalized Turnaround Time. First-Come-First-Served (FCFS) Scheduling Policy.

Microprocessor and DMA Activity

Impact of Microprocessor Bus Configuration and DMA Activity on System Speed.

Memory System and Cache

Cache and Main Memory Access Time, Average Access Time Calculation.

A colorful bar chart with numbers  Description automatically generated with medium confidence

iOS and Android

Similarities and Differences between iOS and Android.

Job Execution and CPU Utilization

CPU Utilization for Uniprogramming and Multiprogramming.

Direct Memory Access (DMA)

Coordination, Memory Operations Completion,... Continue reading "Understanding Operating Systems: Functions, Performance, and Multithreading" »

eyes

Classified in Computers

Written at on English with a size of 2.87 KB.

Security:

This principle requires the person or agency in control of the personal data to implement organizational and technical measures to ensure the data is secure. It requires the controller to offer protection against:

  • Unlawful destruction or accidental loss
  • Alteration
  • Unauthorized disclosure or access
  • All other form of unlawful processing

In particular when the data is transmitted over a network. If the controller is not doing the processing themselves they must provide guarantees that the specified security measures are being carried out.

Pre Processing a Biometrics Image for Feature Extraction:

Case Study: Finger Prints:

Fingerprint ID is often based on minutiae and or the location or the direction of fingerprint of the ridge endings and bifurcations... Continue reading "eyes" »

Setting Up a Backend Project with Node.js

Classified in Computers

Written at on English with a size of 5.14 KB.

To start a backend project.

- npm init

Then make a file with whatever entry point you named it as, for example, server.js

Once package.json is created:

  • npm i <package>
  • connect-mongo (store sessions in DB)
  • dotenv (for config files, environment variables)
  • express
  • mongoose
  • express-sessions (sessions and cookies)
  • method-override (to use PUT, UPDATE, DELETE requests)
  • moments (date formatting)
  • morgan (logging)
  • passport (authentication)

npm i -D <package>

  • nodemon (Update every file change instantly without having to restart the server)
  • cross-env (To update environment variables in script definition itself)

After installing the dependencies, edit the scripts in package.json

"start": "cross-env NODE_ENV=production node server.js",
"dev": "cross-env NODE_ENV=
... Continue reading "Setting Up a Backend Project with Node.js" »

Doubly Linked List Implementation in C

Classified in Computers

Written at on English with a size of 4.75 KB.

Types definition


#include <stdbool.h>


#include <stdlib.h>


Struct Definition


typedef int tItemL;
typedef struct tNode* tPosL; //Ptr to tNode
struct tNode {
tItemL data;
tPosL next;
tPosL prev;
};
typedef tPosL tList;


Prototypes


void createEmptyList(tList *L);
bool createNode(tPosL* p);
bool insertItem(tItemL d, tPosL p, tList *L);
void updateItem(tItemL d, tPosL p, tList* L);
tPosL findItem(tItemL d,tList L);
bool isEmptyList(tList L);
tItemL getItem(tPosL p, tList L);
tPosL first(tList L);
tPosL last(tList L);
tPosL previous(tPosL p, tList L);
tPosL next(tPosL p,tList L);
void deleteAtPosition(tPosL p , tList *L);
void deleteList(tList *L);


Function Definitions


#include "doubly_linked_list.h"
bool isEmptyList(tList L) { return (L == NULL); }
void... Continue reading "Doubly Linked List Implementation in C" »