Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Data Models, Schemas, and Database Normalization

Classified in Computers

Written on in English with a size of 3.46 KB

Categories of Data Models

  • Entity: Represents a real-world object or concept.
  • Attribute:
    • Represents some property of interest.
    • Further describes an entity.
  • Relationship: Represents an association among two or more entities.
  • Entity-Relationship model
  • Relational data model: Used most frequently in traditional commercial DBMSs.
  • Object data model:
    • New family of higher-level implementation data models.
    • Closer to conceptual data models.
  • Physical data models: Describe how data is stored as files in the computer.
  • Access path: Structure that makes the search for particular database records efficient.
  • Index:
    • Example of an access path.
    • Allows direct access to data using an index term or a keyword.

Schemas, Instances, and Database State

  • Database schema: Description of a
... Continue reading "Data Models, Schemas, and Database Normalization" »

Introduction to Computing and Computer Systems

Classified in Computers

Written on in English with a size of 2.3 KB

Computing

Computing is the automatic processing of information with computers.

Input and Output

Input: Data entered into the computer.
CPU: Processes the information.
Output: The processed information is displayed.

Binary System

Computers use the binary system (0 and 1).
Bit (b): Smallest unit of information (0 or 1).
Byte (B): Group of 8 bits. Example: 1010 0001
Characters are usually expressed with 1 B (8 bits).

Character Encoding

ASCII (American Standard Code for Information Interchange): Represents characters using binary code.
ISO-8859-1: An extension of ASCII, uses 1 byte for characters. Example: A = 0100 0001 (65), = 0111 1110 (126)

Hardware

The physical components of a computer.

Internal Components

  • Motherboard
  • CPU

External Devices (Peripherals)

  • Input:
... Continue reading "Introduction to Computing and Computer Systems" »

Software Testing and Debugging

Classified in Computers

Written on in English with a size of 4.52 KB

SOFTWARE TESTING

Testing can only show the presence of errors, not their absence. The goal of testing is confidence.

  • Validation: Are we building the right product? What does the customer need?
  • Verification: Are we building the product right? Functional/Non-Functional requirements.

SOFTWARE INSPECTION VS. SOFTWARE TESTING

While inspection will go through the code without running the program, testing will run the program and look at the results. Incomplete programs can only be inspected, not tested. Inspections can control aspects of good software (maintainability…), not just the results.

TEST CASE:

  • Requirements
  • Data/Input
  • Actions
  • Expected Results

TEST CASE PRINCIPLES:

  • A test tries to find flaws in a program.
  • A good test case will show a possible defect
... Continue reading "Software Testing and Debugging" »

Fundamentals of Optimization and Statistical Modeling

Classified in Computers

Written on in English with a size of 3.51 KB

Optimization Problem and LP Relaxation

The objective function for an optimization problem is: Min 3x – 2y, with constraints x ≥ 0, y ≥ 0. x and y must be integers. Suppose that the integer restriction on the variables is removed. If so, this would be a familiar two-variable linear program; however, it would also be an example of an LP relaxation of the integer linear program.

Integers in Linear Programs

Integers cannot be used in linear programs.

  • False

Simple Linear Regression Model

In a simple linear regression model, y = b0 + b1x + eb1, b1 represents the intercept.

Time Series Recurring Pattern

A time series that shows a recurring pattern over one year or less is said to follow a cyclical pattern.

Binary Integer Program Variables

In binary integer... Continue reading "Fundamentals of Optimization and Statistical Modeling" »

Gender Disparities in Mortality Rates and Immune System Function

Classified in Computers

Written on in English with a size of 2.03 KB

EXT2018.OA´WOMEN REALLY´

1.a-P1: A recent study found that women tend to live longer than men. b-P3: The academics also discovered that women have a stronger immune system.

  • a-harsh
  • b-hardship
  • c-underpinnings
  • d-outlive

4.p1: Danish researchers analyzed 19th-century data. p2: Research showed that women outlive men. p3: Males have a higher mortality rate even if...

ORD2018.OB·`Shop hires...`

1.a-P2: But it is important for businesses to understand their customers. b-P4: We thought it was an emotional and exciting experience.

  • a-actually
  • b-aware
  • c-stressful
  • d-understanding

4.p1: At the shop, Fabio performed. p2: When Fabio, the staff. p3: The staff had become...

ORD2017.OB`The victorian...`

1.a-P2: People would gather to observe. b-P3: The tableaus were a frozen... Continue reading "Gender Disparities in Mortality Rates and Immune System Function" »

Linux Memory Management and Scheduling Objectives

Classified in Computers

Written on in English with a size of 4.55 KB

Linux Memory Management

There are two components to memory management under Linux. First, the physical memory-management system deals with allocating and freeing pages, groups of pages, and small blocks of memory. The second component handles virtual memory, which is memory mapped into the address space of running processes.

Management of Physical Memory

The primary physical memory manager in the Linux kernel is the page allocator. This allocator is responsible for allocating and freeing all physical pages, and is capable of allocating ranges of physically contiguous pages on request. The allocator uses the buddy heap algorithm to keep track of available physical pages. A buddy-heap allocator pairs adjacent units of allocatable together; hence... Continue reading "Linux Memory Management and Scheduling Objectives" »

Signal, Modulation, Attenuation, and Multiplexing in Communication Systems

Classified in Computers

Written on in English with a size of 4.22 KB

SIGNAL

SIGNAL: electromagnetic field which, thanks to its variations, is able to convey information from one place to another. It can be ANALOGUE (continuous) or DIGITAL (sequence).

MODULATION: the process of varying a periodic signal (car: constant amplitude and frequency) to use it for conveying some information. It can be done through AMPLITUDE (amplitude of carrier modified according to changes on modulating signal), FREQUENCY (frequency of carrier modified according to changes on modulating signal), or PHASE (phase of carrier is...). The transmitted modulated signal uses a frequency band around the carrier frequency. Reasons to use modulation: No signal mixing, long communication range, reduced antenna size.

ATTENUATION: As a signal propagates... Continue reading "Signal, Modulation, Attenuation, and Multiplexing in Communication Systems" »

Database Management System and E-commerce Concepts

Classified in Computers

Written on in English with a size of 2.47 KB

A database management system contains

Data definition subsystem

Every primary key

Foreign

If part of your academic work was to read

Push

If you created links on your personal

Affiliate programs

If you need to store facts about inf.

Data dictionary

If you were on the Dell site purchasing...

Affiliate

If you were surfing the Web and actively

Pull

If you were to purchase a song from iTunes

M-commerce

If your company sold widgets to the automobile

B2B

If your phone number was used in a clothing

Primary key

If your student inf. had two...

Clean

The e-commerce model is an ex.

G2C

The auto industry is currently creating

Mass customization

What application enables your org. to analyze

Business intelligence

What does 'click-and-mortar' refer to?

An organization that has a presence

... Continue reading "Database Management System and E-commerce Concepts" »

Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway

Classified in Computers

Written on in English with a size of 15.07 KB

1allows 4 an mtu as high as 9198 bytes.​jumbo frame
2.R highly scalable & have a very high fault tolerance,massive storage capabilities,& fast data access.sans
3.R not used 2 find noes on ne2rks other than the local ne2rk.mac addresses
4.as a ne2rk support technician,U only need 2 know how 2 support ipv6.false
5.@ what layer of the osi model would a tcp or udp header be added 2 a payload?layer 4
6.border routersconnect an autonomous system with an outside ne2rk
7.by default,the pathping command sends how many pings per hop?​100
8.cable that is coated with flame-resistant polyvinyl chloride (pvc) is acceptable 4 use in plenum areas.false
9.a ________ consists of a host's ip address & the port number of an application
... Continue reading "Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway" »

Understanding TCP/IP and Web 2.0 for Online Safety

Classified in Computers

Written on in English with a size of 2.53 KB

To make this possible, it is necessary to "speak the same language," which is TCP/IP. TCP/IP is used to transfer files or data from one computer to another. Typically, the client is your browser (Firefox, Opera, Internet Explorer), and the server is a program running on a remote computer.


Protection From Hackers and Viruses

Hacking and System Security

Hacking means accessing a computer system and its files without permission. It is illegal, and once inside the system, the hacker might be able to view, copy, or delete important files or plant a virus. Organizations protect themselves using passwords, encrypting files, and using hacking-detection software.

Understanding Computer Viruses

A virus is a program deliberately written to affect operating

... Continue reading "Understanding TCP/IP and Web 2.0 for Online Safety" »