Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Python Syntax, Indentation, Comments, Variables, Data Types, Numbers, Casting, and Strings

Classified in Computers

Written on in English with a size of 5.67 KB

Python Syntax

As we learned in the previous page, Python syntax can be executed by writing directly in the Command Line:

>>> print("Hello, World!")
Hello, World!

Python Indentation

Indentation refers to the spaces at the beginning of a code line.

Where in other programming languages the indentation in code is for readability only, the indentation in Python is very important.

Python uses indentation to indicate a block of code.

if5 > 2:
    print("Five is greater than two!")

Python will give you an error if you skip the indentation:

if5 > 2:
print("Five is greater than two!")

Python Comments

Comments can be used to explain Python code.

Comments can be used to make the code more readable.

Comments can be used to prevent execution when testing... Continue reading "Python Syntax, Indentation, Comments, Variables, Data Types, Numbers, Casting, and Strings" »

Radio nav

Classified in Computers

Written on in English with a size of 10.2 KB

  1. Telephone communication

it has been the medium used as the first contact with a company. It is used to arrange meetings , interviews or to ask for information, so the impression of the first telephone call is very important

  1. Telephone means and equipment

Fixed individual devices

Private branch exchanges (PBX):  it connects calls between two destinations or ends

Mobile devices:

PDA (Personal Digital Assistant) it`s like a small computer (Internet and electronic mail)

Smartphone:  A PDA with video, camera, radio, MP3 player  or television

Services: Internet, e-mail, videoconference, camera, audio and  Video quality player, an agenda, GPS,....

3. Additional services offered by the telephone equipment

3.1 Common features(a,b,c,)

  1. Fixed telephony: -

Notice

... Continue reading "Radio nav" »

Understanding Cache Memory and CPU Hazards

Classified in Computers

Written on in English with a size of 2.83 KB

1. General Questions (35%)

1.1. (5%) What is the difference between a write-back cache and a write-through cache?

Write-back cache: A store only writes data to the cache and marks the corresponding line as dirty. The modified line is written to the lower level of the memory hierarchy only when it is evicted.

Write-through cache: Data is written to the caches and the memory every time a store is executed.

1.2. (15%) Name the 3 Cs in cache misses and provide a brief explanation for each C.

Compulsory miss: A cache miss caused by the first access, a cold start effect.

Capacity miss: A cache miss due to the capacity limitation. Even with full associativity, it cannot accommodate all the working sets of an application.

Conflict miss: A cache miss that... Continue reading "Understanding Cache Memory and CPU Hazards" »

Software Design Principles and UML Diagrams Explained

Classified in Computers

Written on in English with a size of 4.2 KB

Dimensions of Software Design

Software design involves several key dimensions:

  • Problem solving
  • Modeling
  • Specification
  • Organizing the solution
  • Communication
  • Economics and reuse
  • Maintenance and evolution

Design Approaches

Divide-and-Conquer

A problem is decomposed into subproblems that are worked on independently. This approach can be applied recursively for complex problems and allows managers to allocate work to multiple people.

Procedural Design

Design is viewed as a set of procedures that are composed:

  • Sequentially
  • Conditionally
  • Iteratively
  • Hierarchically

Borderline Procedural Design

In this approach, the main steps are not fixed. The user has choices with few constraints, and there is typically a main loop to find the next operation.

Event-Driven Design

This... Continue reading "Software Design Principles and UML Diagrams Explained" »

Responsibilities of the Transport Layer

Classified in Computers

Written on in English with a size of 1.9 KB

Transport Layer Responsibilities

Tracking Individual Conversations

At the transport layer, each set of data flowing between a source application and a destination application is known as a conversation (Figure 1). A host may have multiple applications that are communicating across the network simultaneously. Each of these applications communicates with one or more applications on one or more remote hosts. It is the responsibility of the transport layer to maintain and track these multiple conversations.

Segmenting Data and Reassembling Segments

Data must be prepared to be sent across the media in manageable pieces. Most networks have a limitation on the amount of data that can be included in a single packet. Transport layer protocols have services... Continue reading "Responsibilities of the Transport Layer" »

Computer Terminology Glossary

Classified in Computers

Written on in English with a size of 5.84 KB

A

  • ATTACHMENT: A file that is sent with an email.
  • BANDWIDTH: A measurement of the amount of information that a computer network can send or receive. High bandwidth allows images and websites to load quickly on the Internet.
  • BANNER: A rectangular graphic on a website that advertises a business.
  • CASE: An enclosure that holds the computer's components.
  • CODE: A set of words and symbols that give instructions to a computer.
  • CONTENT: The material on a web page, including text and graphics.
  • CROP: To cut off unwanted parts of an image.
  • DATABASE: A large group of data organized in a computer system. It allows you to search and find information easily.
  • DESKTOP: Everything that a user sees on a computer screen.
  • DESKTOP COMPUTER: A computer that is small enough to
... Continue reading "Computer Terminology Glossary" »

Understanding Open Standards, Smart Grids, and VoIP

Classified in Computers

Written on in English with a size of 3.04 KB

Key Features of an Open Standard

An "open standard" is characterized by two primary features:

  • Consensus-based: Developed through a consensus-driven process, ensuring no interested parties are excluded.
  • Publicly Available: Specifications are accessible to the public.

Smart Grid: Definition and Advantages

The smart grid represents the integration of telecommunications and informatics with the power/electricity grid.

Benefits of the Smart Grid:

  • Energy savings and improved consumption management.
  • Cost reduction.
  • Enhanced system reliability.
  • Improved electricity routing via intelligent switches.

OSI Model: Layer Identification

The 7-layer OSI model includes:

  • Layer 1: Physical
  • Layer 2: Data Link
  • Layer 3: Network

Advantages of IP over TDM for Businesses

Businesses

... Continue reading "Understanding Open Standards, Smart Grids, and VoIP" »

Data Mining and Machine Learning Techniques: A Comprehensive Overview

Classified in Computers

Written on in English with a size of 4.37 KB

KDD-- CRISP-DM = business understanding, data understanding, data prep, modeling, evaluation, deployment-- KDD- selection, preprocessing, transformation, mining, interp/eval-- classification = most frequently used, machine learning (supervised), output is nominal or ordinal categorical in nature -- assessment methods = predictive accuracy, speed, robustnest, scalability, interpretability-- confusion matrix formulae = accuracy = (TP + TN)/(TP+TN+FP+FN); true positive rate = (TP)/(TP+FN); true negative = TN/(TN+FP); precision = (TP)/(TP+FP); recall = (TP)/(TP+FN) -- overfitting = excessively complex model, can give bad predictions, underfitting- too flexible, also gives bad predictions-- k-fold cross validation- split data into k mutually exclusive... Continue reading "Data Mining and Machine Learning Techniques: A Comprehensive Overview" »

Web Requests, Concurrency Control & Distributed Systems

Classified in Computers

Written on in English with a size of 2.53 KB

Web Requests: GET vs. POST

GET: The request displays the password in the browser URL.

POST: Does not remain in history and does not display the password or on the web server log, not displayed in URL.

Controlling Access to Resources

Lock: Use the database.

  • Implement file lock.

Optimistic Concurrency Control

When using locks, there is a possibility of deadlocks.

Solution:

Use timeout: When starting the processing of a request, set a maximum execution timeout. When the timeout expires, the system suspects that a possible problem (such as a deadlock) has occurred.

When the timeout expires, which request should be aborted?

We may end up canceling a request that is almost complete.

Deadlock Prevention

To prevent deadlock, the system can set all the locks the... Continue reading "Web Requests, Concurrency Control & Distributed Systems" »

Understanding Software Engineering: Characteristics, Myths, and Paradigms

Classified in Computers

Written on in English with a size of 4.28 KB

Software Characteristics:
1.Software is a logical rather than a physical system element. 2.Software is developed or engineered rather than manufactured. 3.Software does not wear out. How do we measure software reliability? 4.Most software is customer-built rather than assembled from existing components.
  Software is often termed as a high-cost, low-quality product.

Software Crisis:

1.Software projects always run overtime and over budget. 2.Software is delivered with a high number of defects. 3.Software maintenance has been extremely difficult and awfully expensive. 4.It is difficult to keep pace with the growing demand for more software.

Software Myths:Management Myths:

1.Why should we change our approach to software development? We are doing
... Continue reading "Understanding Software Engineering: Characteristics, Myths, and Paradigms" »