Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Digital Logic Design: Examples in VHDL

Classified in Computers

Written on in English with a size of 5.88 KB

Behavioral Architecture of a State Machine

This VHDL code describes the behavioral architecture of a state machine.

TYPE tipo_estado IS (DET0, DET0a1, DET1a0, DET1);
signal Estado_actual : tipo_estado;
signal Estado_siguiente : tipo_estado;
begin
Registro_estado: process (clk, reset)
begin
if reset='1' then Estado_actual <= DET0;
elsif (clk'event and clk='1') then
Estado_actual <= Estado_siguiente;
end if;
end process Registro_estado;
Cambio_Estado: process (Dato, Estado_actual)
begin
Estado_siguiente <= Estado_actual;
case Estado_actual is
when DET0 => if (Dato='1') then Estado_siguiente <= DET0a1;
else Estado_siguiente <= DET0;
end if;
when DET0a1 => if (Dato='1') then Estado_siguiente <= DET1;
else Estado_siguiente <= DET1a0;
end if;
... Continue reading "Digital Logic Design: Examples in VHDL" »

Microcontrollers: Architecture, Instruction Sets, and Interfacing

Classified in Computers

Written on in English with a size of 3.86 KB

Microcontrollers, Microcomputers, and Microprocessors

Microcontroller: Processor, memory, and I/O ports integrated on a single chip.

Microcomputer: A small computer.

Microprocessor: Example: Intel x86.

Von Neumann Architecture

Components:

  • Processor (Control Unit, ALU, Registers)
  • Memory (RAM - Volatile, ROM - Non-Volatile)
  • I/O

A single bus interconnects the processor, memory, and I/O.

RISC vs. CISC

FeatureCISCRISC
Instruction SetComplex Instruction Set ComputerReduced Instruction Set Computer
InstructionsMulti-cycle, complex instructionsMostly single-cycle, reduced instructions
Instruction TypesMany, varying lengthFew, fixed length
ComplexityHardwareSoftware
Code SizeSmallLarge
ExamplesIntel (x86), Freescale 9S12MIPS, ARM, SPARC, PowerPC

RAM vs. ROM vs. CPU Register

FeatureRAMROM
ElaborationRandom
... Continue reading "Microcontrollers: Architecture, Instruction Sets, and Interfacing" »

Colegio Leonardo Da Vinci: Noticias, Exámenes y Niveles

Classified in Computers

Written on in English with a size of 1.01 KB

Creative Commons License Icon

Logo Colegio Leonardo Da Vinci COLEGIO LEONARDO DA VINCI Sello Bilingüe

¡Hola, Muy Buenas!

Noticias Destacadas

COMIENZAN LOS EXÁMENES DE LA PRIMERA EVALUACIÓN.


EL BAILE DE DISFRACES DE HALLOWEEN FUE TODO UN ÉXITO.


LOS ALUMNOS PIDEN VER LOS PARTIDOS DE ESPAÑA EN CLASE.

La presente web no tiene derechos de autor, sino que está sujeta a la licencia Creative Commons mostrada.

Pascal Movie Database Management Procedures

Classified in Computers

Written on in English with a size of 8.83 KB

Pascal Movie Database Management

This document details several procedures written in Pascal for managing a movie database. The database is stored in a file of records, where each record represents a movie.

Data Structure

The code defines a pelicula (movie) record with the following fields:

  • codigo: integer (Movie ID)
  • genero: string (Genre)
  • nombre: string (Title)
  • duracion: integer (Duration)
  • director: string (Director)
  • copias: integer (Number of Copies)
  • precio: real (Price)

A constant valoralto is defined as 9999, used as a sentinel value.

And the file is defined as:

maestro= file of pelicula ;

Procedures

leerp(var p: pelicula)

Reads movie data from the input (keyboard) and stores it in the pelicula record p. It reads the codigo first. If it's not equal to... Continue reading "Pascal Movie Database Management Procedures" »

VHDL Implementations for Digital Logic Components

Classified in Computers

Written on in English with a size of 7.52 KB

VHDL Flip-Flop Implementations

This section demonstrates various VHDL implementations of flip-flops and latches, showcasing different clocking, clear, preset, and load mechanisms.


entity reginf is
    port (
        d, clk, clr, pre, load, data : in  std_logic;
        q1, q2, q3, q4, q5, q6, q7   : out std_logic
    );
end reginf;

architecture rtl of reginf is
begin

Active High Clock D-Latch

A simple D-latch sensitive to the rising edge of the clock.


    -- D-latch with active high clock
    process
    begin
        wait until clk='1';
        q1 <= d;
    end process;

Active Low Clock D-Latch

A D-latch sensitive to the falling edge of the clock.


    -- D-latch with active low clock
    process
    begin
        wait until clk='0';
... Continue reading "VHDL Implementations for Digital Logic Components" »

3-D Cube Transformations in OpenGL

Posted by aditya dani and classified in Computers

Written on in English with a size of 2.54 KB

Write C++/Java program to draw 3-D cube and perform following transformations on it using OpenGL.

Scaling

#include // Include the GLUT header file

void display (void) {

glClearColor(0.0f, 0.0f, 1.0f, 1.0f); // Clear the background of our window to blue

glClear(GL_COLOR_BUFFER_BIT); // Clear the colour buffer (more buffers later on)

glLoadIdentity(); // Load the Identity Matrix to reset our drawing locations

glTranslatef(0.3f, 0.3f,-6.0f); // Push everything 5 units back into the scene, otherwise we won't see the primitive

//glScalef(0.5f, 1.0f, 2.0f); // Make the shape half as wide, the same height and twice as deep

glutWireCube(2.0f); // Render the primitive

glLoadIdentity(); // Load the Identity Matrix to reset our drawing locations

glTranslatef(0.0f,... Continue reading "3-D Cube Transformations in OpenGL" »

Understanding Mobile Development: The Viewport Meta Tag

Classified in Computers

Written on in English with a size of 735 bytes

Mobile Development: The Viewport Meta Tag

The viewport meta tag is crucial for responsive web design on mobile devices. It controls how the browser displays a webpage on different screen sizes. Here's a breakdown of its key attributes:

Key Attributes

  • width: Defines the viewport width. Typically set to device-width, which matches the device's screen width.
  • initial-scale: Sets the initial zoom level. A value of 1 ensures the webpage is displayed at 100% zoom initially.
  • user-scalable: A boolean attribute. Setting it to no prevents users from zooming in or out.

Cybersecurity Fundamentals: Principles and Practices

Classified in Computers

Written on in English with a size of 7.68 KB

**CIA Triad: Core Security Principles**

The CIA Triad consists of Confidentiality, Integrity, and Availability. These are the fundamental goals of information security.

**Threat Modeling: Proactive Security**

Threat modeling involves system decomposition and emphasizes security by design.

**Kerckhoffs's Principle: System Security**

Kerckhoffs's Principle states that:

  1. Security should not depend on the secrecy of the system's design, but only on the secrecy of the key.
  2. The system should be usable.
  3. Keys must be easy to change.

**One-Time Pad: Unbreakable Encryption**

A One-Time Pad is an algorithm that XORs the message with a randomly generated key of equal length. It is secure if:

  1. The key is truly random.
  2. The key is as long as the message.
  3. Each key is used
... Continue reading "Cybersecurity Fundamentals: Principles and Practices" »

C Program for Bit Stuffing and Destuffing

Classified in Computers

Written on in English with a size of 4.61 KB

Bit stuffing and destuffing are crucial techniques used in data link layer protocols to ensure reliable data transmission. They prevent sequences of data bits from being misinterpreted as control characters or flags, especially when the data itself contains patterns identical to these control sequences.

What is Bit Stuffing?

Bit stuffing is the process of adding one or more extra bits into a data stream to break up a sequence of identical bits that might otherwise be misinterpreted as a control signal. For example, in protocols like HDLC, a flag sequence (01111110) is used to mark the beginning and end of a frame. To prevent the actual data from containing this sequence, a '0' bit is stuffed after every five consecutive '1's in the data stream.... Continue reading "C Program for Bit Stuffing and Destuffing" »

Computer Network Essentials: Types, Components, and Protocols

Classified in Computers

Written on in English with a size of 2.85 KB

Understanding Computer Networks

  • A computer network is the interconnection of multiple devices, generally termed as hosts, connected using multiple paths for the purpose of receiving data or media.
  • Connected devices share information and resources.
  • The channel or line is where this information is transmitted.

Computer Network Classifications

Networks can be classified in several ways:

  1. By Size: The most common classification.
  2. By Property
  3. By Connection Method
  4. By Topology

1. Network Classification by Size

  • LAN (Local Area Network): Maximum of a building. The most frequent type, common in most offices.
  • MAN (Metropolitan Area Network): Maximum of a city, connecting different buildings.
  • WAN (Wide Area Network): Connects devices from different cities or even countries.
... Continue reading "Computer Network Essentials: Types, Components, and Protocols" »