Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Top-Down Design and Control Structures in Python

Classified in Computers

Written on in English with a size of 3.35 KB

3/10/16 Notes

Chapter 7/8

Top-Down Design

Takes the most basic aspect of a program and breaks it down into subprograms.

Control Structure

An expression that determines the order in which a program executes.

In Python, this is an if statement.

It can also be a looping statement.

Boolean Expression

A "True or False" program statement.

Composite Data Types

Example:

  • numbers[0] = 1066
  • numbers[1] = 1492
  • numbers[2] = 999
  • numbers[3] = 553
  • numbers[4] = 1892

Example Code:

for i in range(3):
    print(numbers[i])

Arrays

When data is being read into an array, a counter is updated for each operation (e.g., for i in range(5)).

Sequential Search of an Unsorted Array

A sequential search examines each item in turn and compares it to the target item. If it matches, the item is found.... Continue reading "Top-Down Design and Control Structures in Python" »

Data Models, Schemas, and Database Normalization

Classified in Computers

Written on in English with a size of 3.46 KB

Categories of Data Models

  • Entity: Represents a real-world object or concept.
  • Attribute:
    • Represents some property of interest.
    • Further describes an entity.
  • Relationship: Represents an association among two or more entities.
  • Entity-Relationship model
  • Relational data model: Used most frequently in traditional commercial DBMSs.
  • Object data model:
    • New family of higher-level implementation data models.
    • Closer to conceptual data models.
  • Physical data models: Describe how data is stored as files in the computer.
  • Access path: Structure that makes the search for particular database records efficient.
  • Index:
    • Example of an access path.
    • Allows direct access to data using an index term or a keyword.

Schemas, Instances, and Database State

  • Database schema: Description of a
... Continue reading "Data Models, Schemas, and Database Normalization" »

Introduction to Computing and Computer Systems

Classified in Computers

Written on in English with a size of 2.3 KB

Computing

Computing is the automatic processing of information with computers.

Input and Output

Input: Data entered into the computer.
CPU: Processes the information.
Output: The processed information is displayed.

Binary System

Computers use the binary system (0 and 1).
Bit (b): Smallest unit of information (0 or 1).
Byte (B): Group of 8 bits. Example: 1010 0001
Characters are usually expressed with 1 B (8 bits).

Character Encoding

ASCII (American Standard Code for Information Interchange): Represents characters using binary code.
ISO-8859-1: An extension of ASCII, uses 1 byte for characters. Example: A = 0100 0001 (65), = 0111 1110 (126)

Hardware

The physical components of a computer.

Internal Components

  • Motherboard
  • CPU

External Devices (Peripherals)

  • Input:
... Continue reading "Introduction to Computing and Computer Systems" »

Software Testing and Debugging

Classified in Computers

Written on in English with a size of 4.52 KB

SOFTWARE TESTING

Testing can only show the presence of errors, not their absence. The goal of testing is confidence.

  • Validation: Are we building the right product? What does the customer need?
  • Verification: Are we building the product right? Functional/Non-Functional requirements.

SOFTWARE INSPECTION VS. SOFTWARE TESTING

While inspection will go through the code without running the program, testing will run the program and look at the results. Incomplete programs can only be inspected, not tested. Inspections can control aspects of good software (maintainability…), not just the results.

TEST CASE:

  • Requirements
  • Data/Input
  • Actions
  • Expected Results

TEST CASE PRINCIPLES:

  • A test tries to find flaws in a program.
  • A good test case will show a possible defect
... Continue reading "Software Testing and Debugging" »

Reverse Engineering Fundamentals: Process, Steps, and CAD Model Generation

Classified in Computers

Written on in English with a size of 2.76 KB

Forward Engineering Defined

Forward engineering is the traditional process of moving from high-level abstractions and logical designs to the physical implementation of a system.

Understanding Reverse Engineering

Reverse engineering (RE) is the process of duplicating an existing part, sub-assembly, or product without original drawings, documentation, or a computer model.

It is also defined as the process of obtaining a geometric Computer-Aided Design (CAD) model from 3-D points acquired by scanning or digitizing existing parts.

Alternative Name for Reverse Engineering

The process is often referred to as the Physical-to-Digital process.

Key Purposes of Reverse Engineering (RE)

Reverse engineering serves several critical functions, including:

  • The user
... Continue reading "Reverse Engineering Fundamentals: Process, Steps, and CAD Model Generation" »

Fundamentals of Optimization and Statistical Modeling

Classified in Computers

Written on in English with a size of 3.51 KB

Optimization Problem and LP Relaxation

The objective function for an optimization problem is: Min 3x – 2y, with constraints x ≥ 0, y ≥ 0. x and y must be integers. Suppose that the integer restriction on the variables is removed. If so, this would be a familiar two-variable linear program; however, it would also be an example of an LP relaxation of the integer linear program.

Integers in Linear Programs

Integers cannot be used in linear programs.

  • False

Simple Linear Regression Model

In a simple linear regression model, y = b0 + b1x + eb1, b1 represents the intercept.

Time Series Recurring Pattern

A time series that shows a recurring pattern over one year or less is said to follow a cyclical pattern.

Binary Integer Program Variables

In binary integer... Continue reading "Fundamentals of Optimization and Statistical Modeling" »

Gender Disparities in Mortality Rates and Immune System Function

Classified in Computers

Written on in English with a size of 2.03 KB

EXT2018.OA´WOMEN REALLY´

1.a-P1: A recent study found that women tend to live longer than men. b-P3: The academics also discovered that women have a stronger immune system.

  • a-harsh
  • b-hardship
  • c-underpinnings
  • d-outlive

4.p1: Danish researchers analyzed 19th-century data. p2: Research showed that women outlive men. p3: Males have a higher mortality rate even if...

ORD2018.OB·`Shop hires...`

1.a-P2: But it is important for businesses to understand their customers. b-P4: We thought it was an emotional and exciting experience.

  • a-actually
  • b-aware
  • c-stressful
  • d-understanding

4.p1: At the shop, Fabio performed. p2: When Fabio, the staff. p3: The staff had become...

ORD2017.OB`The victorian...`

1.a-P2: People would gather to observe. b-P3: The tableaus were a frozen... Continue reading "Gender Disparities in Mortality Rates and Immune System Function" »

Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway

Classified in Computers

Written on in English with a size of 15.07 KB

1allows 4 an mtu as high as 9198 bytes.​jumbo frame
2.R highly scalable & have a very high fault tolerance,massive storage capabilities,& fast data access.sans
3.R not used 2 find noes on ne2rks other than the local ne2rk.mac addresses
4.as a ne2rk support technician,U only need 2 know how 2 support ipv6.false
5.@ what layer of the osi model would a tcp or udp header be added 2 a payload?layer 4
6.border routersconnect an autonomous system with an outside ne2rk
7.by default,the pathping command sends how many pings per hop?​100
8.cable that is coated with flame-resistant polyvinyl chloride (pvc) is acceptable 4 use in plenum areas.false
9.a ________ consists of a host's ip address & the port number of an application
... Continue reading "Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway" »

Understanding TCP/IP and Web 2.0 for Online Safety

Classified in Computers

Written on in English with a size of 2.53 KB

To make this possible, it is necessary to "speak the same language," which is TCP/IP. TCP/IP is used to transfer files or data from one computer to another. Typically, the client is your browser (Firefox, Opera, Internet Explorer), and the server is a program running on a remote computer.


Protection From Hackers and Viruses

Hacking and System Security

Hacking means accessing a computer system and its files without permission. It is illegal, and once inside the system, the hacker might be able to view, copy, or delete important files or plant a virus. Organizations protect themselves using passwords, encrypting files, and using hacking-detection software.

Understanding Computer Viruses

A virus is a program deliberately written to affect operating

... Continue reading "Understanding TCP/IP and Web 2.0 for Online Safety" »

Understanding Computer Networks and the Internet

Classified in Computers

Written on in English with a size of 2.95 KB

Computer Networks

What is a Network?

A network is a number of computers linked together to allow the sharing of resources. A server usually provides services like file storage and email.

Types of Networks

There are two main types of networks:

  • Local Area Network (LAN): A LAN covers a small area, such as a home or office.
  • Wide Area Network (WAN): A WAN covers a large geographical area. Most WANs are made from several LANs connected together. WANs can be connected together using the internet.

Email

There are two main types of email:

  • Client-based email: Often used by business users, client-based email involves downloading email from a server to an application on the user's computer.
  • Webmail: Accessed through a web browser, webmail can be accessed from any
... Continue reading "Understanding Computer Networks and the Internet" »