Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Microsoft Word & Computer Basics: Key Features Explained

Classified in Computers

Written on in English with a size of 4.08 KB

Key Concepts in Microsoft Word and Computer Applications

1. Microsoft Word Application Type

Which type of computer application is Microsoft Word an example of?

Word processing

2. Touchscreen Right-Click

Which action enables you to right-click on a touchscreen?

Press and hold for a few seconds

3. Word 2016 Document Starting Point

A preformatted document used as a starting point in Word 2016 is known as what?

A template

4. Wordwrap Functionality

Word uses wordwrap. If a word does not fit at the end of a line, what happens to that word?

It is automatically moved to the next line.

5. Understanding Inline Objects

What does inline object refer to?

A picture or object positioned directly in the text at the insertion point, just like a character in a sentence.

6.

... Continue reading "Microsoft Word & Computer Basics: Key Features Explained" »

Understanding Data Storage and Binary Number Representation

Classified in Computers

Written on in English with a size of 221.76 KB

Data Storage Conversion:

  • 1 gigabyte (GB) equals 1,024 megabytes (MB).
  • 1 megabyte (MB) equals 1,024 kilobytes (KB).
  • To convert gigabytes to kilobytes, multiply by 1,024 twice. For example: 1 GB = 1,024 MB * 1,024 KB = 1,048,576 KB.
  • To convert gigabytes to megabytes, multiply by 1,024. For example: 1 GB = 1,024 MB
  • To convert 20 megabytes to bytes: 20 MB = 20 * 1,024 KB * 1,024 bytes = 20,971,520 bytes
  • To convert 2 gigabytes to kilobytes: 2 GB = 2 * 1,024 MB * 1,024 KB = 2,097,152 KB

Example: SHKRONJA A has a value of 1010, B - 1011, C - 1100, D - 1101, E - 1110, F - 1111.

Binary Number Representations

There are three main ways to represent signed numbers in binary:

1. Signed Magnitude

  • Positive Numbers: Standard binary representation.
  • Negative Numbers: The
... Continue reading "Understanding Data Storage and Binary Number Representation" »

Kernel System Calls, Synchronization, and OS Concepts

Classified in Computers

Written on in English with a size of 6.51 KB

Implementing a New System Call in the Kernel

Required Files to Add

  • /usr/src/test_kernel/SystemCalls/test_call.c:
    • Creates system call pointer.
    • Exports the pointer so that the system call module can access it.
    • Defines the system call wrapper.
  • /usr/src/test_kernel/SystemCalls/Makefile: obj-y := test_call.o (Compiles files directly into the kernel).

System Module Implementation

  • /usr/src/test_kernel/SystemModule/syscallModule.c:
    • Holds module code.
    • Implements system call behavior.
    • Registers system call pointer to the proper system call handler.
  • /usr/src/test_kernel/SystemModule/Makefile: obj-m := syscallmodule.o (Compiles file as a module).

Required Files to Modify

  • /usr/src/test_kernel/arch/x86/entry/syscalls/syscall_64.tbl: Add the system call to the table.
  • /usr/
... Continue reading "Kernel System Calls, Synchronization, and OS Concepts" »

Mechatronics Engineer Job Description

Classified in Computers

Written on in English with a size of 2.19 KB

Mechatronics engineers are responsible for designing mechanical equipment. Combining their knowledge of computer, mechanical, and electrical engineering, they develop various automated products, such as cameras, cars, and aircraft. The engineering process typically involves designing and assembling components, testing products in development, making improvements, and evaluating finished products. Engineers must also assess equipment and publish reports outlining production factors, such as practical use, safety, and cost.

Work Areas:

  • Electronics Development Unit
  • Software Development Unit
  • Project Management Unit
  • Biomechanical Development Unit including our Mechanical Shop and Scientific Glassblower

Mechanical Engineer Job Duties:

  • Evaluates mechanical
... Continue reading "Mechatronics Engineer Job Description" »

Networking Essentials: Devices, Protocols, Topologies

Classified in Computers

Written on in English with a size of 3.67 KB

Network Fundamentals: LANs and WANs

  • A Local Area Network (LAN) covers a small geographical area, such as a single site or building (e.g., a school or a college).

  • A Wide Area Network (WAN) covers a large geographical area. Most WANs are formed by connecting several LANs, with the internet being a prime example.

Virtual Private Networks (VPNs) Explained

A Virtual Private Network (VPN) is programming that creates a safe, encrypted connection over a less secure network. It provides business travelers with secure access to software applications hosted on proprietary networks. To gain access to a restricted resource through a VPN, the user must be authorized to use the VPN application and provide one or more authentication factors, such as a password.... Continue reading "Networking Essentials: Devices, Protocols, Topologies" »

Digital Media Fundamentals: Audio, Video, and Compression Standards

Classified in Computers

Written on in English with a size of 6.6 KB

This section addresses key concepts regarding digital media processing, file formats, and data requirements.

  1. Stereo vs. Mono Audio Data Requirements

    Question: What is the difference between stereo and mono audio?

    Answer: Stereo audio usually requires twice as much data as mono audio.

  2. Quickest Audio Format for Web Download

    Question: Which audio format would be quickest to download from a website?

    Answer: AAC (Advanced Audio Coding).

  3. Audio File Format Compatibility

    Statement: All audio file formats will work on all media players.

    Answer: FALSE. Compatibility depends on the specific media player and the codecs supported.

  4. Defining Bit Depth

    Question: What is bit depth?

    Answer: Bit depth is the number of bits it is possible to have in each sample or frame of

... Continue reading "Digital Media Fundamentals: Audio, Video, and Compression Standards" »

Essential Definitions and Theorems in Graph Theory

Classified in Computers

Written on in English with a size of 103.48 KB

M1: Fundamental Graph Definitions

Walks, Paths, and Circuits

Walk

A Walk is a finite alternating sequence of vertices and edges, beginning and ending with vertices, such that each edge is incident with the vertices preceding and following it. No edge appears more than once in a walk, though a vertex may appear multiple times.

  • Closed Walk: A walk that begins and ends at the same vertex.
  • Open Walk: A walk that begins and ends at different vertices.

Path

A Path is an open walk in which no vertex appears more than once. The number of edges in a path is called the length of the path. A self-loop can be included in a walk but not in a path. The terminal vertices of a path are of degree 1, and the remaining intermediate vertices are of degree 2.

Circuit

A... Continue reading "Essential Definitions and Theorems in Graph Theory" »

Layered Security Model and IT Infrastructure Best Practices

Classified in Computers

Written on in English with a size of 4.11 KB

10LayerModelSecurity,10Security policies and mandates.9,Oversight of end-to-end processes to ensure compliance with enterprise security policies. Audit trails for the threads.8Security roles and responsibilities. Standard security practices as they relate to activities and exchanges. Security Architecture. Personnel security requirements. 3.10. Management7Application service security (e.g., integrity of the service and application code) and content security (e.g., security labels). Security of user access to IT. Privilege management. 6Framework service security (e.g., integrity of the service and application code of the framework). Content security labeling service and label checking service. Software-based content encryption/decryption services... Continue reading "Layered Security Model and IT Infrastructure Best Practices" »

Software Engineering Concepts: A Comprehensive Guide

Classified in Computers

Written on in English with a size of 7.04 KB

Module 9: Firebase Application

Realtime Database

A cloud-hosted database. Data is stored as JSON and synchronized in real-time to every connected client. Provides easy-to-use services for authentication (email/password, 3rd-party providers like Google/Facebook).

Cloud Firestore

A flexible and scalable database for mobile, web, and development. It offers synchronization, offline support, and ACID transactions.

Cloud Functions

...

Hosting

CSS/JavaScript

Cloud Storage

Provides robust, secure file uploads and downloads for Firebase apps.

Module 10: UML Diagrams

Structural Diagrams

  • Class Diagram: Shows class hierarchy, fields/attributes, and relevant methods.

How to Read

  • Visibility:
    • +: Public
    • -: Private
    • #: Protected (accessed only by child classes)
  • Relationships:
... Continue reading "Software Engineering Concepts: A Comprehensive Guide" »

Revit Elements and Tools: A Comprehensive Dictionary

Classified in Computers

Written on in English with a size of 4.2 KB

Annotation Elements

Used to notate and clarify the information presented.

Annotate Ribbon

Buttons: Aligned, Linear, Angular, Radial, Diameter, Arc Length, Spot Elevation, Spot Coordinate, Spot Slope, Detail Line, Region, Component, Revision Cloud, Detail Group, Insulation, Text, Check Spelling, Find/Replace, Tag By Category, Tag All, Beam Annotations, Multi-Category, Material Tag, Area Tag, Room Tag, Space Tag, View Reference, Tread Number, Keynote, Duct Legend, Pipe Legend, Color Fill Legend, and Symbol.

Annotate Ribbon Tab

Panels: Dimension, Detail, Text, Tag, Color Fill, and Symbol.

Application Menu

File access and management tools are grouped in this menu. This menu is designated by the large ‘R’ in the top left corner of the Revit screen.... Continue reading "Revit Elements and Tools: A Comprehensive Dictionary" »