Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Software Testing and Debugging

Classified in Computers

Written on in English with a size of 4.52 KB

SOFTWARE TESTING

Testing can only show the presence of errors, not their absence. The goal of testing is confidence.

  • Validation: Are we building the right product? What does the customer need?
  • Verification: Are we building the product right? Functional/Non-Functional requirements.

SOFTWARE INSPECTION VS. SOFTWARE TESTING

While inspection will go through the code without running the program, testing will run the program and look at the results. Incomplete programs can only be inspected, not tested. Inspections can control aspects of good software (maintainability…), not just the results.

TEST CASE:

  • Requirements
  • Data/Input
  • Actions
  • Expected Results

TEST CASE PRINCIPLES:

  • A test tries to find flaws in a program.
  • A good test case will show a possible defect
... Continue reading "Software Testing and Debugging" »

Reverse Engineering Fundamentals: Process, Steps, and CAD Model Generation

Classified in Computers

Written on in English with a size of 2.76 KB

Forward Engineering Defined

Forward engineering is the traditional process of moving from high-level abstractions and logical designs to the physical implementation of a system.

Understanding Reverse Engineering

Reverse engineering (RE) is the process of duplicating an existing part, sub-assembly, or product without original drawings, documentation, or a computer model.

It is also defined as the process of obtaining a geometric Computer-Aided Design (CAD) model from 3-D points acquired by scanning or digitizing existing parts.

Alternative Name for Reverse Engineering

The process is often referred to as the Physical-to-Digital process.

Key Purposes of Reverse Engineering (RE)

Reverse engineering serves several critical functions, including:

  • The user
... Continue reading "Reverse Engineering Fundamentals: Process, Steps, and CAD Model Generation" »

Fundamentals of Optimization and Statistical Modeling

Classified in Computers

Written on in English with a size of 3.51 KB

Optimization Problem and LP Relaxation

The objective function for an optimization problem is: Min 3x – 2y, with constraints x ≥ 0, y ≥ 0. x and y must be integers. Suppose that the integer restriction on the variables is removed. If so, this would be a familiar two-variable linear program; however, it would also be an example of an LP relaxation of the integer linear program.

Integers in Linear Programs

Integers cannot be used in linear programs.

  • False

Simple Linear Regression Model

In a simple linear regression model, y = b0 + b1x + eb1, b1 represents the intercept.

Time Series Recurring Pattern

A time series that shows a recurring pattern over one year or less is said to follow a cyclical pattern.

Binary Integer Program Variables

In binary integer... Continue reading "Fundamentals of Optimization and Statistical Modeling" »

Gender Disparities in Mortality Rates and Immune System Function

Classified in Computers

Written on in English with a size of 2.03 KB

EXT2018.OA´WOMEN REALLY´

1.a-P1: A recent study found that women tend to live longer than men. b-P3: The academics also discovered that women have a stronger immune system.

  • a-harsh
  • b-hardship
  • c-underpinnings
  • d-outlive

4.p1: Danish researchers analyzed 19th-century data. p2: Research showed that women outlive men. p3: Males have a higher mortality rate even if...

ORD2018.OB·`Shop hires...`

1.a-P2: But it is important for businesses to understand their customers. b-P4: We thought it was an emotional and exciting experience.

  • a-actually
  • b-aware
  • c-stressful
  • d-understanding

4.p1: At the shop, Fabio performed. p2: When Fabio, the staff. p3: The staff had become...

ORD2017.OB`The victorian...`

1.a-P2: People would gather to observe. b-P3: The tableaus were a frozen... Continue reading "Gender Disparities in Mortality Rates and Immune System Function" »

Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway

Classified in Computers

Written on in English with a size of 15.07 KB

1allows 4 an mtu as high as 9198 bytes.​jumbo frame
2.R highly scalable & have a very high fault tolerance,massive storage capabilities,& fast data access.sans
3.R not used 2 find noes on ne2rks other than the local ne2rk.mac addresses
4.as a ne2rk support technician,U only need 2 know how 2 support ipv6.false
5.@ what layer of the osi model would a tcp or udp header be added 2 a payload?layer 4
6.border routersconnect an autonomous system with an outside ne2rk
7.by default,the pathping command sends how many pings per hop?​100
8.cable that is coated with flame-resistant polyvinyl chloride (pvc) is acceptable 4 use in plenum areas.false
9.a ________ consists of a host's ip address & the port number of an application
... Continue reading "Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway" »

Understanding TCP/IP and Web 2.0 for Online Safety

Classified in Computers

Written on in English with a size of 2.53 KB

To make this possible, it is necessary to "speak the same language," which is TCP/IP. TCP/IP is used to transfer files or data from one computer to another. Typically, the client is your browser (Firefox, Opera, Internet Explorer), and the server is a program running on a remote computer.


Protection From Hackers and Viruses

Hacking and System Security

Hacking means accessing a computer system and its files without permission. It is illegal, and once inside the system, the hacker might be able to view, copy, or delete important files or plant a virus. Organizations protect themselves using passwords, encrypting files, and using hacking-detection software.

Understanding Computer Viruses

A virus is a program deliberately written to affect operating

... Continue reading "Understanding TCP/IP and Web 2.0 for Online Safety" »

Understanding Computer Networks and the Internet

Classified in Computers

Written on in English with a size of 2.95 KB

Computer Networks

What is a Network?

A network is a number of computers linked together to allow the sharing of resources. A server usually provides services like file storage and email.

Types of Networks

There are two main types of networks:

  • Local Area Network (LAN): A LAN covers a small area, such as a home or office.
  • Wide Area Network (WAN): A WAN covers a large geographical area. Most WANs are made from several LANs connected together. WANs can be connected together using the internet.

Email

There are two main types of email:

  • Client-based email: Often used by business users, client-based email involves downloading email from a server to an application on the user's computer.
  • Webmail: Accessed through a web browser, webmail can be accessed from any
... Continue reading "Understanding Computer Networks and the Internet" »

Introduction to Computer Networks

Classified in Computers

Written on in English with a size of 2.57 KB

Servers

A server stores data to be used by other computers on a network. A server could be a specialized machine, or it can be a normal PC running server software. The server stores data and responds to requests for data or files, such as web pages.

Types of Server

There are many different types of servers. Some popular examples follow.

Web Servers

Web servers host websites and generally handle requests for static information such as HTML pages or images. They are used to manage the website on the server and often include FTP software, which can easily host and share large files. The Apache web server is a popular type of open-source web server software.

Application Servers

Many websites are classed as web applications, which contain programming and... Continue reading "Introduction to Computer Networks" »

Python Syntax, Indentation, Comments, Variables, Data Types, Numbers, Casting, and Strings

Classified in Computers

Written on in English with a size of 5.67 KB

Python Syntax

As we learned in the previous page, Python syntax can be executed by writing directly in the Command Line:

>>> print("Hello, World!")
Hello, World!

Python Indentation

Indentation refers to the spaces at the beginning of a code line.

Where in other programming languages the indentation in code is for readability only, the indentation in Python is very important.

Python uses indentation to indicate a block of code.

if5 > 2:
    print("Five is greater than two!")

Python will give you an error if you skip the indentation:

if5 > 2:
print("Five is greater than two!")

Python Comments

Comments can be used to explain Python code.

Comments can be used to make the code more readable.

Comments can be used to prevent execution when testing... Continue reading "Python Syntax, Indentation, Comments, Variables, Data Types, Numbers, Casting, and Strings" »

Java Student Management System Implementation

Classified in Computers

Written on in English with a size of 5.78 KB

Java Student Management System: Core Concepts

This document presents a foundational Java program designed to manage student data. It demonstrates key Object-Oriented Programming (OOP) principles through a simple console-based application.

Prerequisites

  • Basic understanding of Java programming.
  • Familiarity with classes, objects, methods, and variables.

Core Components of the Student System

The Aluno Class: Student Data Model

The Aluno class serves as the blueprint for creating student objects. Each object encapsulates a student's name, course, and a unique registration number.

Class Attributes

  • nome (String): Stores the student's name.
  • curso (String): Stores the student's enrolled course.
  • num_matricula (int): Represents the unique registration number (RA)
... Continue reading "Java Student Management System Implementation" »