Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Predictive Modeling Techniques in Data Mining

Classified in Computers

Written on in English with a size of 4.25 KB

CH6

Predictive Modeling Techniques

61) Predictive modeling is perhaps the most commonly practiced branch in data mining. What are three of the most popular predictive modeling techniques?

Answer:

  • Artificial neural networks
  • Support vector machines
  • k-nearest neighbor

62) Why have neural networks shown much promise in many forecasting and business classification applications?

Answer: Because of their ability to "learn" from the data, their nonparametric nature (i.e., no rigid assumptions), and their ability to generalize.

Understanding Neural Networks

63) Each ANN is composed of a collection of neurons that are grouped into layers. One of these layers is the hidden layer. Define the hidden layer.

Answer: A hidden layer is a layer of neurons that takes input... Continue reading "Predictive Modeling Techniques in Data Mining" »

Algorithm Analysis: Time and Space Complexity

Classified in Computers

Written on in English with a size of 4.5 KB

Space Complexity

  • Analysis of the space complexity of an algorithm or program is the amount of memory it needs to run to completion.
  • The space needed by a program consists of the following components:
  • Fixed space requirements: Independent of the number and size of the program's input and output. It includes:
  • Instruction Space (Space needed to store the code)
  • Space for simple variables
  • Space for constants
  • Variable space requirements: This component consists of:
  • Space needed by structured variables whose size depends on the particular instance I of the problem being solved
  • Space required when a function uses recursion

Total Space Complexity

S(P) of a program is:

S(P) = C + Sp(I)

Here Sp(I) is the variable space requirements of program P working on an instance... Continue reading "Algorithm Analysis: Time and Space Complexity" »

Digital Technology: Applications and Considerations

Classified in Computers

Written on in English with a size of 2.22 KB

E-Voting

Considerations

  • Voter ID
  • Candidate ID and Voter ID
  • Representing information in text format
  • Secure section for additional fields
  • Providing a set number of options to reduce data input errors

Data Collection Methods

Questionnaires

Advantages: Less labor-intensive than interviews.

Disadvantages: Poorly designed questions (e.g., overuse or lack of closed questions) can lead to misunderstandings.

Interviews

Advantages: Provide more detailed information than questionnaires; allow for face-to-face interaction.

Disadvantages: Time-consuming; require skilled interviewers.

BYOD at Xingu Academy

Technical Aspects

  • MAC address and IP address management
  • Voice recognition software: Converts analog speech to digital sound, then to text using a sound database. Matches
... Continue reading "Digital Technology: Applications and Considerations" »

C++ Cheat Sheet: Structs, Classes, Pointers, Arrays, and More

Classified in Computers

Written on in English with a size of 6.65 KB


```c++
    //input 
    int main(int argc, char * argv[]){ // or char ** argv
        const char* strs[] = {"Hello", "World!"};
        const char str[] = {"Hello"};
        const int arr[] = {1,2,3};
        std::cout << *strs<< std::endl;
        std::cout << str << std::endl;
        std::cout << arr << std::endl;
        std::cout << *arr << std::endl;
        std::cout << *str << std::endl;
        std::cout << *(strs + 1)<
    } 
    //output
    Hello
    Hello
    0x77d02fb38050
    1
    H
    World!
    void insert(int array[], int size, int item, int num_copies){
    for(int * i = array; i < array + size - num_copies;
... Continue reading "C++ Cheat Sheet: Structs, Classes, Pointers, Arrays, and More" »

Comprehensive Guide to Digital Certificates, Security Protocols, and Computer Architecture

Posted by Lijia and classified in Computers

Written on in English with a size of 6.87 KB

Data Items in a Digital Certificate

  • Serial Number
  • Certificate Authority (CA) that issued the certificate
  • CA Digital Signature
  • Name of company/organization/individual owning the certificate
  • Subject Public Key
  • Validity Period of the certificate
  • Hashing Algorithm

Conditions for Message Authenticity

  • Digital Certificate
  • Inclusion of Public Key
  • Use of Public Key to hash the received message and produce a message digest
  • Comparison of the generated hash to the digital signature

Usage of Encrypted Message Digest

  • Financial Transactions
  • Legal Documents
  • Software Distribution

Process of Digital Signature

  1. Software is put through a hashing algorithm.
  2. The hash total is encrypted with a private key.
  3. The software and encrypted digest hash/digital signature are sent.
  4. The receiver
... Continue reading "Comprehensive Guide to Digital Certificates, Security Protocols, and Computer Architecture" »

Knowledge Value Chain Business: Definition and Phases

Classified in Computers

Written on in English with a size of 1.63 KB

  1. Knowledge Value Chain Business: Definition and Phases
  2. Knowledge management refers to the set of business processes developed in organizations to create, store, transfer, and apply knowledge.

Knowledge management increases the ability of the organization to learn from its environment and to incorporate knowledge into its business processes.

Phases:

  • Knowledge Acquisition: The organization acquires knowledge in a number of ways, depending on the type of knowledge they seek. The first knowledge management systems sought to build corporate repositories of documents, reports, presentations, and best practices.
  • Knowledge Storage: The knowledge storage generally involves the creation of a database document management system that digitizes, indexes, and
... Continue reading "Knowledge Value Chain Business: Definition and Phases" »

Módulo 1: Conceptos básicos de informática

Classified in Computers

Written on in English with a size of 1.73 KB

Módulo 1

1- 1c 2a 3d 4e 5f 6b

2.-

  1. keep records
  2. make video calls
  3. access the Internet
  4. dispense money
  5. store information
  6. store ringtones

3.-

1f 2e 3d 4a 5c 6b

4.-

  1. The CPU is a chip which acts as the brain of a computer
  2. A hacker is a person who invades a network's privacy
  3. A modem is an electric device that enables a computer to communicate with another over telephone lines
  4. A software engineer is someone who writes computer programs
  5. The mobile phone is a device that people use for communicating with each other

5.-

1e 2b 3g 4d 5f 5a 7c

6.-

  1. Do you need any help?
  2. We're looking for a portable computer
  3. They are both very fast
  4. What's the storage capacity of the hard disk?
  5. It has a 15.4" LCD screen
  6. How much do they cost?
  7. You're obviously getting a faster computer, with more memory

7.

... Continue reading "Módulo 1: Conceptos básicos de informática" »

Understanding SEO: A Comprehensive Guide to Search Engine Optimization

Classified in Computers

Written on in English with a size of 4.24 KB

Understanding Search Engine Optimization (SEO)

Crawling and Indexing

Web crawlers, also known as bots, robots, or spiders, are software programs designed to follow links, gather information, and send it back to search engines for indexing. This process allows search engines to understand the content and structure of websites.

Evolution of Google Search Algorithms

Over the years, Google has implemented various algorithm updates to improve search results and combat spam. Some notable updates include:

  • Google Dance (2002): Click-through rates started influencing search rankings.
  • Austin (2004): Targeted websites with keyword stuffing.
  • Google Suggest (2008) & Google Instant (2010): Introduced predictive search based on search history.
  • Hummingbird (2013)
... Continue reading "Understanding SEO: A Comprehensive Guide to Search Engine Optimization" »

DIN 2345: A Comprehensive Guide to Translation Contracts

Classified in Computers

Written on in English with a size of 3.2 KB

What is the DIN 2345 Standard?

The DIN 2345 standard, published by the German Institute for Standardization in 1998, regulates translation contracts. It defines terms and activities to standardize and unify translation procedures, ensuring a smooth process. Key aspects include the organization of the translation process, handling of the source text (ST) and target text (TT), and revision of the TT.

Organization of a Translation Project

According to DIN 2345, organizing a translation project involves:

  • Translator selection
  • Client-translator agreements
  • Client support for the translator
  • Sub-contracting procedures
  • Documentation

Requirements Concerning the Source Text (ST)

DIN 2345 outlines specific requirements for the ST:

  • The client is responsible for the
... Continue reading "DIN 2345: A Comprehensive Guide to Translation Contracts" »

Using Voicemail, Intranet, and More

Classified in Computers

Written on in English with a size of 2.63 KB

Using Voicemail

  • Contact someone off the hook: Press this button
  • Delete: Press receiver
  • Dial a phone number: Record an outgoing message
  • Enter your access code: Replay
  • Fast forward: Retrieve
  • Listen to incoming messages: Review
  • Location: Rewind
  • Loud/Loudspeaker: Volume
  • Modify: Save

Using the Intranet

  • Attachment: doc. adjunto
  • Background: fondo
  • Bold: negrita
  • Bullet: viñeta
  • Column: Lower case letters: minúscula
  • Copy: Paragraph
  • Cut: Password
  • Desktop: Paste
  • Double click: Reply: contestar
  • Flow chart: organigrama
  • Font: Row: fila
  • Forward: reenviar
  • Heading: título
  • Icon: Italics: cursiva
  • Log in: iniciar sesión
  • Log out: cerrar sesión
  • Underline: subrayar
  • Upper case letters: mayúscula
  • Username:

Extra

  • Alignment: alineación
  • Flash: destello
  • Headset: auriculares
  • Hold: espera
  • Increased security:
... Continue reading "Using Voicemail, Intranet, and More" »