Fruteria: Añadir, Comprar y Pagar Frutas
Classified in Computers
Written on in
English with a size of 3.49 KB
Classified in Computers
Written on in
English with a size of 3.49 KB
Classified in Computers
Written on in
English with a size of 28.51 KB
The internet architecture can be broadly classified into three layers:
Classified in Computers
Written on in
English with a size of 7.29 KB
Classified in Computers
Written on in
English with a size of 3.39 KB
Data Transfer Instruction:
Gets source effective address and stores it in the target. Source segment address is stored in DS. Example: LEA DX, OPERANDO1
Control Transfer Instructions
Operation (IP decrement) + Conditional jump on operation result.
MOV CX, 4
Bucle:
INC BX
ADD BX, CX
LOOP BucleCompare Instruction:
Compares source and target operands and properly modifies the flag register. It internally works by subtracting the target from the source operand. Operands are equal if the result is zero. Source is greater than target if the result is negative. Target is greater than source otherwise. Example: CMP AX, DX; Compares AX and DX.
Interrupt Instructions:
INT jumps to a specified interrupt address. i8086 interrupt addresses... Continue reading "Assembly Language Instructions and MS-DOS Functions" »
Classified in Computers
Written on in
English with a size of 3.59 KB
Client Facilities: Performance, ensure integrity, updates, risk confidential. Static pages, forms, active content, plugins, stand-alone applications.
XML (Extensible Markup Language): Preferred form for B2B and internal documents with legal effect. Key benefits: non-proprietary, platform independent, HTTP compatibility, international support, extensible, self-defining, common tools, and transformation. Complementary techniques: UDDI (Universal Description, Discovery, and Integration), WSDL (Web Services Description Language) – web service design. Signatures have legal effect.
Components: Good because turn-key systems tend to be too large and inflexible. Advantages: higher quality and design, maintenance shared,... Continue reading "Key Concepts in IT: Client Facilities, XML, and Security" »
Classified in Computers
Written on in
English with a size of 5.03 KB
FREQUENCY
import java.util.Scanner;
class Test2 {
public static void main(String args[]) {
Scanner s = new Scanner(System.in);
System.out.print("ENTER THE STRING:");
String abc = s.nextLine();
System.out.println("Enter The Character for checking:");
char ch = s.nextLine().charAt(0);
int count = 0;
for(int i = 0; i < abc.length(); i++) {
if(ch == abc.charAt(i)) {
count++;
}
}
System.out.println("The given character repeats " + count + " times");
} }
OUTPUT
ENTER THE STRING: MALAYALAM
Enter The Character for checking:
M
The given character repeats 2 times
import java.util.Scanner;
class Employee {
String name = "Name";
String address = "Address";
int age = 23, phn_no = 123456789, salary = 500000;
void printsalary() {
System.out.println(
Classified in Computers
Written on in
English with a size of 4.6 KB
Theoretical models for analyzing computability and algorithm complexity. Includes Automata and State Machines.
For each state, there... Continue reading "Computer Science: Algorithms, Complexity, and Pioneers" »
Classified in Computers
Written on in
English with a size of 4.09 KB
def time_difference(time1, time2):
time1=time_to_seconds(time1)
time2=time_to_seconds(time2)
diffinsecond=time2-time1
hours=diffinsecond//3600
minutes=(diffinsecond-(hours*3600))//60
seconds=diffinsecond-(hours*3600)-(minutes*60)
return(make_time_string(hours,minutes,seconds))
# Predefined helper functions. Do not edit them.
def time_to_seconds(time):
x = list(map(int, time.split(":"))
return x[0] * 3600 + x[1]*60 + x[2]
def make_time_string(hours, mins, seconds):
return "{:02d}:{:02d}:{:02d}".format(hours, mins, seconds)
def triangle(side1, side2, side3):
if side1+side2<>
return "Not a triangle"
elif side1==side2 and side2==side3:
return "Equilateral"
elif... Continue reading "Python Functions and Errors: Time, Triangle, Bonus, and Digits" »
Classified in Computers
Written on in
English with a size of 3.49 KB
Radio buttons allow you to choose only one option among multiple. If an option wasn't previously selected, it can be automatically changed. Radio buttons with the same name are grouped together, ensuring that only one option within that group can be selected at a time.
Gender: Male Female
Checkboxes allow you to choose one or more options from a list. Unlike radio buttons, a name attribute is not required for grouping.
Activities: Yoga Boxing
To check if a checkbox is selected in JavaScript, you can use the following code within a button's function:
if (document.getElementById("checkbox_id").checked == true)
To reset a checkbox, use:
document.getElementById("checkbox_id").checked = false;
Senses allow us to collect information... Continue reading "HTML Input Types, Sensors, Random Numbers, and Loops in JavaScript" »
Classified in Computers
Written on in
English with a size of 3.48 KB
Confidentiality: only authorized users should have access to the data
Authentication: each user must be confirmed to be who they say they are through their digital identity
Authorization: access to the different services must be conditioned by the identity and permissions attributed to each user
Integrity: the data sent must be the same as those received, avoiding manipulation or corruption
Availability: quality or condition of the information to be available to those who must access it.
Security Threats: the security of a network is exposed
This is the software that can attack the computer: malware, spam, viruses, programming errors…
These are users who can damage the system: inexperienced users, hackers,... Continue reading "Web Security: Confidentiality, Authentication, and Protection Measures" »