Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway
Classified in Computers
Written on in English with a size of 15.07 KB
Classified in Computers
Written on in English with a size of 15.07 KB
Classified in Computers
Written on in English with a size of 1.46 KB
HARDWARE- Are the physical part of the computer: both the box and the internal components and the elements connected to it.
Is the largest card with a printed circuit you see when you open a computer. All the other computer components are inserted on it, includes connectors or communication ports with peripherals and can also incorporate video, audio, and network devices.
Is the most important part of a computer. It is responsible for processing data, performing arithmetical-logical operations, and controlling all the other devices. It is characterized by its working frequency, measured in hertz, which determines its operating speed.
Universal serial bus, permits interconnection with practically any device. Standard... Continue reading "Hardware: The Physical Components of a Computer" »
Classified in Computers
Written on in English with a size of 2.95 KB
A network is a number of computers linked together to allow the sharing of resources. A server usually provides services like file storage and email.
There are two main types of networks:
There are two main types of email:
Classified in Computers
Written on in English with a size of 2.57 KB
A server stores data to be used by other computers on a network. A server could be a specialized machine, or it can be a normal PC running server software. The server stores data and responds to requests for data or files, such as web pages.
There are many different types of servers. Some popular examples follow.
Web servers host websites and generally handle requests for static information such as HTML pages or images. They are used to manage the website on the server and often include FTP software, which can easily host and share large files. The Apache web server is a popular type of open-source web server software.
Many websites are classed as web applications, which contain programming and... Continue reading "Introduction to Computer Networks" »
Classified in Computers
Written on in English with a size of 5.67 KB
As we learned in the previous page, Python syntax can be executed by writing directly in the Command Line:
>>> print("Hello, World!")
Hello, World!
Indentation refers to the spaces at the beginning of a code line.
Where in other programming languages the indentation in code is for readability only, the indentation in Python is very important.
Python uses indentation to indicate a block of code.
if5 > 2:
print("Five is greater than two!")
Python will give you an error if you skip the indentation:
if5 > 2:
print("Five is greater than two!")
Comments can be used to explain Python code.
Comments can be used to make the code more readable.
Comments can be used to prevent execution when testing... Continue reading "Python Syntax, Indentation, Comments, Variables, Data Types, Numbers, Casting, and Strings" »
Classified in Computers
Written on in English with a size of 10.2 KB
Telephone communication
it has been the medium used as the first contact with a company. It is used to arrange meetings , interviews or to ask for information, so the impression of the first telephone call is very important
Telephone means and equipment
Fixed individual devices
Private branch exchanges (PBX): it connects calls between two destinations or ends
Mobile devices:
PDA (Personal Digital Assistant) it`s like a small computer (Internet and electronic mail)
Smartphone: A PDA with video, camera, radio, MP3 player or television
Services: Internet, e-mail, videoconference, camera, audio and Video quality player, an agenda, GPS,....
3. Additional services offered by the telephone equipment
3.1 Common features(a,b,c,)
Fixed telephony: -
Notice
... Continue reading "Radio nav" »Classified in Computers
Written on in English with a size of 2.83 KB
Write-back cache: A store only writes data to the cache and marks the corresponding line as dirty. The modified line is written to the lower level of the memory hierarchy only when it is evicted.
Write-through cache: Data is written to the caches and the memory every time a store is executed.
Compulsory miss: A cache miss caused by the first access, a cold start effect.
Capacity miss: A cache miss due to the capacity limitation. Even with full associativity, it cannot accommodate all the working sets of an application.
Conflict miss: A cache miss that... Continue reading "Understanding Cache Memory and CPU Hazards" »
Classified in Computers
Written on in English with a size of 4.2 KB
Software design involves several key dimensions:
A problem is decomposed into subproblems that are worked on independently. This approach can be applied recursively for complex problems and allows managers to allocate work to multiple people.
Design is viewed as a set of procedures that are composed:
In this approach, the main steps are not fixed. The user has choices with few constraints, and there is typically a main loop to find the next operation.
This... Continue reading "Software Design Principles and UML Diagrams Explained" »
Classified in Computers
Written on in English with a size of 1.9 KB
At the transport layer, each set of data flowing between a source application and a destination application is known as a conversation (Figure 1). A host may have multiple applications that are communicating across the network simultaneously. Each of these applications communicates with one or more applications on one or more remote hosts. It is the responsibility of the transport layer to maintain and track these multiple conversations.
Data must be prepared to be sent across the media in manageable pieces. Most networks have a limitation on the amount of data that can be included in a single packet. Transport layer protocols have services... Continue reading "Responsibilities of the Transport Layer" »
Classified in Computers
Written on in English with a size of 5.84 KB