Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Presidency University Website

Classified in Computers

Written on in English with a size of 2.83 KB

{ "titl":"Presidency University Websit", "tag": [ "HTM", "CS", "JavaScrip", "Bootstra", "AngularJ", "jQuer" ], "conten":"

Problem Statement:

Mr. Kiran Student of Presidency University wants to create an attractive web page for Presidency University using HTML and CSS with following specifications.

  •   Split the web page into two parts using frames, top section 20% and bottom section 80%.

  •   Place your college logo at the top of the page withmenu’s (About, Academic, Admission,

    Facilities, etc). Createhyperlink for all menus.

  •   Create a web page about the college linked at the bottom of the frame.

  •   Create a web page about the Academic linked at the bottom of the frame.

  •   Create a web page about the admission, list out the departments,

... Continue reading "Presidency University Website" »

Cybersecurity Fundamentals: Threats, CIA Triangle, and System Components

Classified in Computers

Written on in English with a size of 3.63 KB

Essential Concepts in Information Security

Threat vs. Threat Agent: Key Distinctions

The word “threat” usually stands for a category of things that pose a potential danger. Viruses, worms, and other types of malware, for example, are threats. A “threat agent,” by contrast, is a specific threat, or a specific type of virus, worm, or other malware. For example, the Blaster Worm is a threat agent.

Vulnerability vs. Exposure in Security Systems

Vulnerability is a fault within the system, such as software package flaws, unlocked doors, or an unprotected system port. It leaves things open to an attack or damage.

Exposure is a single instance when a system is open to damage. Vulnerabilities can in turn be the cause of exposure.

Infrastructure Protection

... Continue reading "Cybersecurity Fundamentals: Threats, CIA Triangle, and System Components" »

Evolution of the Web and Information Management

Posted by silviagc__ and classified in Computers

Written on in English with a size of 9.83 KB

THE WEB:

1. WEB1.0, WEB 2.0, WEB 3.0:

-WEB 1.0 or the read-only web: In the 1990s, information on the Internet was only for reading. It was a network of documents and people could not interact with the content. For example, they couldn’t give their opinions, ask for information or register as users. In addition, the information online was not updated very frequently. Almost everything that people used online was also part of the World Wide Web (www).

WEB 2.0 or the social network:

This was developed during the first decade of the 21st century. In this new web, information became bidirectional. Users could not only receive information, but also create and share it. New services appeared and became popular, such as email, chats, videoconferences,... Continue reading "Evolution of the Web and Information Management" »

Predicting Boston House Prices and Ionosphere Data Analysis with Machine Learning

Classified in Computers

Written on in English with a size of 5.24 KB

Boston Housing Data Analysis

library(mlbench)
install.packages("dplyr")
library(dplyr)
library(ggplot2)
library(reshape2)
data("BostonHousing")
housing <- BostonHousing
str(housing)

housing %>%   ggplot(aes(x = medv)) +
  stat_density() +
  labs(x = "Median Value ($1000s)", y = "Density", title = "Density Plot of Median Value House Price in Boston") +
  theme_minimal()

summary(housing$medv)

housing %>%   select(c(crim, rm, age, rad, tax, lstat, medv)) %>%   melt( id.vars = "medv") %>%   ggplot(aes(x = value, y = medv, colour = variable)) +
  geom_point(alpha = 0.7) +
  stat_smooth(aes(colour = "black")) +
  facet_wrap(~variable, scales = "free", ncol = 2) +
  labs(x = "Variable Value", y = "Median House Price ($1000s)") +
  theme_minimal(

... Continue reading "Predicting Boston House Prices and Ionosphere Data Analysis with Machine Learning" »

Vulnerabilities in Von Neumann Architecture and Security Threats Explained

Classified in Computers

Written on in English with a size of 3.57 KB

Vulnerabilities in Von Neumann Architecture

The system architect of the von Neumann is the way that it can allow direct memory access to the low level languages like C and C++.

If the program goes and tries to access the memory out of bound by allocating code injection to the system, it allows the system to access the memory out of the stack which causes buffer overflow and the attacker can access the other memory from the allocated stack. This way an attacker can get access to the system. Therefore von Neumann architecture is vulnerable to code injection, the effect of the buffer overflow.

Understanding Threats and Attacks

Threats

  • It is a potential security violation that might exploit vulnerability of the system or assets.
  • Threats can be accidental,
... Continue reading "Vulnerabilities in Von Neumann Architecture and Security Threats Explained" »

Java Programming Examples

Classified in Computers

Written on in English with a size of 1.18 KB

Transpose of a Matrix

This code demonstrates how to find the transpose of a matrix in Java.

Sorting Algorithm

This code implements a simple sorting algorithm to arrange elements in ascending order.

Complex Number Operations

This code shows how to perform operations on complex numbers in Java, such as addition.

Static Members

This code explains the concept of static members in Java and how to use them.

Function Overloading

This code demonstrates function overloading in Java, where multiple functions can have the same name but different parameters.

Derived Class and Inheritance

This code illustrates the concept of inheritance in Java, where a derived class inherits properties and methods from a base class.

Multilevel Inheritance

This code demonstrates multilevel... Continue reading "Java Programming Examples" »

JavaScript Cheat Sheet: Arrays, Functions, Objects & More

Classified in Computers

Written on in English with a size of 4.2 KB

JavaScript Cheat Sheet

JavaScript Arrays

var cars = ["Mercedes", "Tesla","Volvo"];

  • pop(): Removes the last element of an array.
  • push(): Adds a new element at the end of an array.
  • concat(): Joins various arrays into a single array.
  • reverse(): Reverses the order of elements in an array.
  • indexOf(): Returns the first index of a given element in an array.
  • lastIndexOf(): Returns the last index of a given element in an array.
  • join(): Combines elements of an array into a single string.
  • sort(): Sorts array elements based on a condition.

Global Functions

These functions are built-in to every browser that runs JavaScript:

  • parseFloat(): Parses the argument and returns a floating-point number.
  • parseInt(): Parses the argument and returns an integer.
  • Number(): Returns a
... Continue reading "JavaScript Cheat Sheet: Arrays, Functions, Objects & More" »

Computer Hardware and Software Components

Classified in Computers

Written on in English with a size of 3.85 KB

Computer Hardware and Software Components

Computer hardware is the collection of physical elements that constitutes a computer system. It refers to the physical parts or components of a computer, such as the monitor, mouse, keyboard, etc. All of these are physical objects that can be touched. In contrast, software is a set of instructions that can be stored and run by hardware. Software is any set of machine-readable instructions that directs a computer's processor to perform specific operations. A combination of hardware and software forms a usable computing system.

Operating System (OS)

An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating

... Continue reading "Computer Hardware and Software Components" »

Essential Web and Software Terminology Definitions

Classified in Computers

Written on in English with a size of 3.47 KB

Essential Web and Software Terminology

Web Navigation and Structure

  • External Hyperlink

    A hyperlink that opens a webpage located on a remote computer. External hyperlinks provide the links that tie the Web together and rely on HTML anchor tags.

  • Back Button

    A basic control used across various technologies. In a web browser, a back button allows an end user to navigate to a previously viewed webpage. A back button is also a feature of smartphone software and other consumer-oriented technologies.

  • Navigation Structure

    When using navigation requests, for each BSP application, determine the initial page, the navigation methods, and the target pages in a table with navigation paths.

  • Refresh

    An act or function of updating the display on a screen.

Web Elements

... Continue reading "Essential Web and Software Terminology Definitions" »

Understanding Operating Systems: File, Task, and User Management

Classified in Computers

Written on in English with a size of 2.74 KB

File Management

File management is the system an operating system uses to organize and keep track of data. The operating system stores data in units called files, determines how files are stored, efficiently uses available storage space, creates a record of all file usage, and carries out every task related to files and folders.

File names typically have this structure:

filename.extension

Task and User Management

Task Management

Task management is the part of the operating system that controls the running of one or more programs on a computer simultaneously. Today's widely used operating systems support multitasking, allowing multiple tasks to run concurrently, taking turns using the computer's resources.

User Management

With user management, the operating... Continue reading "Understanding Operating Systems: File, Task, and User Management" »