Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Understanding JavaScript Events and Methods

Classified in Computers

Written on in English with a size of 5.51 KB

Javascript

The async attribute allows the browser to process the web page concurrently with loading and processing the JavaScript.

The defer attribute allows the browser to load the web page concurrently with loading the JavaScript, but the JavaScript is not processed until the web page is completely loaded.script src="bootstrap.js" async>script>

A change event is caused by an element value being modified. Ex: Selecting an item in a radio button group causes a change event.

An input event is caused when the value of an input or textarea element is changed.

A load event is caused when the browser completes loading a resource and dependent resources. Usually load is used with the body element to execute code once all the web page's CSS, JavaScript,

... Continue reading "Understanding JavaScript Events and Methods" »

Java Control Statements and Operators

Classified in Computers

Written on in English with a size of 5.46 KB


◦ Performs an action if a condition is true and performs a different action if the condition is false.

◦ Double-selection statement—selects between two different actions (or groups of actions).

}switch statement

◦ Performs one of several actions, based on the value of an expression.

◦ Multiple-selection statement—selects among many different actions (or groups of actions).

Iteration Statements in Java

}Four iteration statements (also called iteration statements or looping statements)

◦ Perform statements repeatedly while a loop-continuation condition remains true.

}


while and for statements perform the action(s) in their bodies zero or more times

◦ if the loop-continuation condition is initially false, the body will not execute.

}The do…while... Continue reading "Java Control Statements and Operators" »

Predictive Modeling Techniques in Data Mining

Classified in Computers

Written on in English with a size of 4.25 KB

CH6

Predictive Modeling Techniques

61) Predictive modeling is perhaps the most commonly practiced branch in data mining. What are three of the most popular predictive modeling techniques?

Answer:

  • Artificial neural networks
  • Support vector machines
  • k-nearest neighbor

62) Why have neural networks shown much promise in many forecasting and business classification applications?

Answer: Because of their ability to "learn" from the data, their nonparametric nature (i.e., no rigid assumptions), and their ability to generalize.

Understanding Neural Networks

63) Each ANN is composed of a collection of neurons that are grouped into layers. One of these layers is the hidden layer. Define the hidden layer.

Answer: A hidden layer is a layer of neurons that takes input... Continue reading "Predictive Modeling Techniques in Data Mining" »

Algorithm Analysis: Time and Space Complexity

Classified in Computers

Written on in English with a size of 4.5 KB

Space Complexity

  • Analysis of the space complexity of an algorithm or program is the amount of memory it needs to run to completion.
  • The space needed by a program consists of the following components:
  • Fixed space requirements: Independent of the number and size of the program's input and output. It includes:
  • Instruction Space (Space needed to store the code)
  • Space for simple variables
  • Space for constants
  • Variable space requirements: This component consists of:
  • Space needed by structured variables whose size depends on the particular instance I of the problem being solved
  • Space required when a function uses recursion

Total Space Complexity

S(P) of a program is:

S(P) = C + Sp(I)

Here Sp(I) is the variable space requirements of program P working on an instance... Continue reading "Algorithm Analysis: Time and Space Complexity" »

Digital Technology: Applications and Considerations

Classified in Computers

Written on in English with a size of 2.22 KB

E-Voting

Considerations

  • Voter ID
  • Candidate ID and Voter ID
  • Representing information in text format
  • Secure section for additional fields
  • Providing a set number of options to reduce data input errors

Data Collection Methods

Questionnaires

Advantages: Less labor-intensive than interviews.

Disadvantages: Poorly designed questions (e.g., overuse or lack of closed questions) can lead to misunderstandings.

Interviews

Advantages: Provide more detailed information than questionnaires; allow for face-to-face interaction.

Disadvantages: Time-consuming; require skilled interviewers.

BYOD at Xingu Academy

Technical Aspects

  • MAC address and IP address management
  • Voice recognition software: Converts analog speech to digital sound, then to text using a sound database. Matches
... Continue reading "Digital Technology: Applications and Considerations" »

C++ Cheat Sheet: Structs, Classes, Pointers, Arrays, and More

Classified in Computers

Written on in English with a size of 6.65 KB


```c++
    //input 
    int main(int argc, char * argv[]){ // or char ** argv
        const char* strs[] = {"Hello", "World!"};
        const char str[] = {"Hello"};
        const int arr[] = {1,2,3};
        std::cout << *strs<< std::endl;
        std::cout << str << std::endl;
        std::cout << arr << std::endl;
        std::cout << *arr << std::endl;
        std::cout << *str << std::endl;
        std::cout << *(strs + 1)<
    } 
    //output
    Hello
    Hello
    0x77d02fb38050
    1
    H
    World!
    void insert(int array[], int size, int item, int num_copies){
    for(int * i = array; i < array + size - num_copies;
... Continue reading "C++ Cheat Sheet: Structs, Classes, Pointers, Arrays, and More" »

Comprehensive Guide to Digital Certificates, Security Protocols, and Computer Architecture

Posted by Lijia and classified in Computers

Written on in English with a size of 6.87 KB

Data Items in a Digital Certificate

  • Serial Number
  • Certificate Authority (CA) that issued the certificate
  • CA Digital Signature
  • Name of company/organization/individual owning the certificate
  • Subject Public Key
  • Validity Period of the certificate
  • Hashing Algorithm

Conditions for Message Authenticity

  • Digital Certificate
  • Inclusion of Public Key
  • Use of Public Key to hash the received message and produce a message digest
  • Comparison of the generated hash to the digital signature

Usage of Encrypted Message Digest

  • Financial Transactions
  • Legal Documents
  • Software Distribution

Process of Digital Signature

  1. Software is put through a hashing algorithm.
  2. The hash total is encrypted with a private key.
  3. The software and encrypted digest hash/digital signature are sent.
  4. The receiver
... Continue reading "Comprehensive Guide to Digital Certificates, Security Protocols, and Computer Architecture" »

Knowledge Value Chain Business: Definition and Phases

Classified in Computers

Written on in English with a size of 1.63 KB

  1. Knowledge Value Chain Business: Definition and Phases
  2. Knowledge management refers to the set of business processes developed in organizations to create, store, transfer, and apply knowledge.

Knowledge management increases the ability of the organization to learn from its environment and to incorporate knowledge into its business processes.

Phases:

  • Knowledge Acquisition: The organization acquires knowledge in a number of ways, depending on the type of knowledge they seek. The first knowledge management systems sought to build corporate repositories of documents, reports, presentations, and best practices.
  • Knowledge Storage: The knowledge storage generally involves the creation of a database document management system that digitizes, indexes, and
... Continue reading "Knowledge Value Chain Business: Definition and Phases" »

Which of the following statements is true?,

Classified in Computers

Written on in English with a size of 6.7 KB

  • Learning Objectives:

Understand binding and typing and namespaces  

  • A binding is an association between an entity and an attribute, such as between a variable and its type or value, or between an operation and a symbol

Understand variable scope  Be able to identify both static and dynamic scope

  • Variablescope is the range of statements in which the variable is visible

  • A variable is visible in a statement if it can be referenced or assigned in that statement

  • Static scoping is when the scope of a variable is determined prior to program execution and is unchanged throughout (can be located prior to execution) 

  • Dynamic scoping is when the scope is determined at run time and can change during execution

Understand basic types and their implementation

  • The

... Continue reading "Which of the following statements is true?," »

Módulo 1: Conceptos básicos de informática

Classified in Computers

Written on in English with a size of 1.73 KB

Módulo 1

1- 1c 2a 3d 4e 5f 6b

2.-

  1. keep records
  2. make video calls
  3. access the Internet
  4. dispense money
  5. store information
  6. store ringtones

3.-

1f 2e 3d 4a 5c 6b

4.-

  1. The CPU is a chip which acts as the brain of a computer
  2. A hacker is a person who invades a network's privacy
  3. A modem is an electric device that enables a computer to communicate with another over telephone lines
  4. A software engineer is someone who writes computer programs
  5. The mobile phone is a device that people use for communicating with each other

5.-

1e 2b 3g 4d 5f 5a 7c

6.-

  1. Do you need any help?
  2. We're looking for a portable computer
  3. They are both very fast
  4. What's the storage capacity of the hard disk?
  5. It has a 15.4" LCD screen
  6. How much do they cost?
  7. You're obviously getting a faster computer, with more memory

7.

... Continue reading "Módulo 1: Conceptos básicos de informática" »