Notes, abstracts, papers, exams and problems of Computers

Sort by
Subject
Level

Software Development Models: Waterfall, Prototype, and More

Classified in Computers

Written at on English with a size of 3.14 KB.

Software Development Models

Attributes of Effective Requirements (AtrERS): Correct, unambiguous, complete, verifiable, consistent, modifiable, concise, organized, searchable, understandable by the client, regardless of design.

Scaling Factors: Correctness, reliability, efficiency, integrity, ease of use and maintenance, flexibility, ease of testing, portability, reusability, ease of interoperation.

Life History: Succession of stages through which a software product passes during its existence. Attempts to determine the order of the steps involved and the criteria associated with the transition between these stages.

Software Engineering: Application of scientific knowledge to the design and construction of computer programs and associated documentation... Continue reading "Software Development Models: Waterfall, Prototype, and More" »

SQL DDL: Database Modification and Advanced Features

Classified in Computers

Written at on English with a size of 2.48 KB.

Advanced Features

Advanced features facilitate consultation similar to a spreadsheet because they work based on rows and columns.

  • COUNT(): Count the number of rows in the column set
  • MIN(): Find the minimum value of the column set
  • MAX(): Find the maximum value of the column set
  • AVG(): Gets the average values in the column set
  • SUM(): Gets the total value implied by the values obtained in the column provided

Modifying the Database

SQL DDL has modules for the definition of data that allows us to create or modify table structure.

The instructions for these operations are:

  • CREATE TABLE: Allows you to create an empty data table.
  • INSERT: Allows you to store records in a table created.
  • UPDATE: You can modify data records stored in the table.
  • DELETE: Deletes a record
... Continue reading "SQL DDL: Database Modification and Advanced Features" »

Network Topologies, Protocols, and Architectures

Classified in Computers

Written at on English with a size of 2.42 KB.

Network Topologies

Ring Topology

Connects hosts in a physical ring. The last host connects to the first.

Star Topology

Connects all cables to a central point.

Extended Star Topology

Connects individual stars using hubs or switches, extending network coverage.

Hierarchical Topology

Similar to extended star, but uses a computer to control traffic instead of hubs/switches.

Mesh Topology

Provides maximum protection by connecting each host to others, ensuring service continuity.

Network Communication Methods

Broadcast

Each host sends data to all others on the network. Access is first-come, first-served (e.g., Ethernet).

Transmission Tokens

Controls access via sequential token transmission. Hosts send data when they have the token (e.g., Token Ring, FDDI).

Network

... Continue reading "Network Topologies, Protocols, and Architectures" »

Leveraging AI for Index Recommendations and Regular Path Queries

Classified in Computers

Written at on English with a size of 4.45 KB.

AI Meets AI: Leveraging Query Executions to Improve Index Recommendations

How artificial intelligence (AI) can benefit automated indexing (AI)?: Comparing the execution cost of two plans (different index configurations of same query) is key for index tuning. Instead of using optimizer’s estimates for such comparison, formulating it as a classification task in machine learning results in significantly higher accuracy.

MOTIVATION:

  • Being able to fully automate index recommendation and implementation is a significant value-add for improving query execution cost.
  • Requirement: creating or dropping indexes should not cause significant query performance regressions - users enforce a no query regression constraint.
  • Using the optimizer’s estimates to
... Continue reading "Leveraging AI for Index Recommendations and Regular Path Queries" »

Microprocessors and Memory Types: A Deep Dive

Classified in Computers

Written at on English with a size of 2.71 KB.

Microprocessors

The microprocessor is the device responsible for processing the data received. It is able to perform arithmetic operations and transfer blocks of information. The increase in processing power allows for faster and faster PCs. This is mainly due to improvements in architecture, microcode, and operating speeds.

Overclocking

Overclocking is a method used to obtain faster processing speed by increasing the domestic multiplier value of the microprocessor. It is not advisable because it causes overheating of the processor. Besides the increased frequency, it may result in errors of "timing" and then produce erroneous results or hang the system. You can also overclock the system clock speed, which will affect the overall team bus. This... Continue reading "Microprocessors and Memory Types: A Deep Dive" »

Object Identity, Complex Objects, and Persistent Programming

Classified in Computers

Written at on English with a size of 2.77 KB.

Object Identity Types

There are three main types of object identity:

  • Asset (Data Value as Identity): This form of identity, commonly used in relational systems, utilizes a data value as the identifier. For instance, the primary key value in a tuple uniquely identifies that tuple.
  • Name (User-Defined Identity): This type of identity relies on a name assigned by the user. File systems often employ this approach, where each file has a unique name regardless of its content.
  • Incorporated (System-Generated Identity): This concept integrates identity directly into the data model or programming language, eliminating the need for user-provided identifiers. Object-oriented systems commonly use this method, automatically assigning a unique identifier to each
... Continue reading "Object Identity, Complex Objects, and Persistent Programming" »

Web Design and Accessibility Services

Classified in Computers

Written at on English with a size of 1.25 KB.

Web Design and Accessibility Services

Header

Nav

Content

Aside

This is the aside container or wrapper with a width of 30%. Inside, we place a div.

Inside aside, we place a <div>.

This div has margins of 20px and padding of 10px.

Main

This is the MAIN container or wrapper with a width of 70%:

Article Title 1

All articles are within main with a margin and padding. Place the content for class "article 1" here.

Article Title 2

Place the content for class "article 2" here.

Article Title 3

Place the content for class "article 3" here.

Click on the image

Tailored to Your Needs

You will find:

  • Custom Graphic Design
  • Web Design
  • Accessibility
  • Usability
  • Text Processing

Footer

Get in touch at the address:

[email protected]

Project Planning and Control with Gantt Charts

Classified in Computers

Written at on English with a size of 2.67 KB.

Gantt Chart: A Project Planning and Control Method

A Gantt chart is a graphical method of planning and control in which a project is divided into different activities, and estimates are made about how long each activity takes. This chart shows the timing relationships between events of a program and was developed by Henry L. Gantt. Gantt charts are useful for monitoring relatively small projects.

Understanding Key Concepts

  • Task: Project activities are carried out in a particular sequence.
    • Predecessor Task: A task that must start or finish before another can begin.
    • Successor Task: A task that depends on the start or finish of a preceding task.
    • Summary Tasks: These are made up of subtasks and summarize those subtasks.
  • Milestones: A task without duration
... Continue reading "Project Planning and Control with Gantt Charts" »

Creating Engaging Multimedia Presentations

Classified in Computers

Written at on English with a size of 3.08 KB.

Creating Engaging Multimedia Presentations

A presentation is a multimedia file that can contain text, graphics, photos, music, and video. Its organization is done by slides, which succeed one another under your control. Templates are presentations that have predefined design objects in the slides, such as the background, fonts, placement of text, and other objects that give the presentation a common appearance across all slides.

Interactivity: Establishing Hyperlinks

Interactivity is established by creating hyperlinks. Clicking on a button or text performs an action, such as opening a file or linking to a website. You can insert a hyperlink from the Insert menu, then selecting Hyperlink.

Interactivity in objects allows navigation to different slides... Continue reading "Creating Engaging Multimedia Presentations" »

Computer Science Fundamentals and Programming Basics

Classified in Computers

Written at on English with a size of 3.06 KB.

Computer Science Fundamentals

Informatics is the science or technical study of technology that enables the automatic processing of information using electronic devices and computer systems.

Hardware and Software

  • Hardware: All the physical parts that compose a computer.
  • Software: A set of programs that execute tasks using the electrical circuits of the computer.

Software Types:

  • System Software
  • Software Development
  • Application Software

Numbering Systems

  • Decimal System: Each figure has a weight where its value depends on its location.
  • Binary System: The most elementary coding system, using only "0" and "1". This coding avoids confusion in electronic systems because they identify only two possible states.

Bits and Bytes

A bit is an electronic signal that can... Continue reading "Computer Science Fundamentals and Programming Basics" »