Notes, abstracts, papers, exams and problems of Computers

Sort by
Subject
Level

I is correct ii is correct

Classified in Computers

Written at on English with a size of 2.68 KB.

 1.How do you program an input validation on a selection screen that allows users to correct their input? // Implement a check at the event AT SELECTION-SCREEN. In case of an input error, a type E MESSAGE must be displayed.
2.Which of the following program types can contain screens? // Executable programs, Function groups, Module pools
3.Which of the following statements dynamically changes the data type of field z1?// Assign z1 to casting
4.Which statement is used to generically define the data reference variable z1? // data z1 type ref to data
5.You want to loop over an internal table without copying each table row to a work area. How can you achieve this using a field symbol? // LOOP AT ASSIGNING . ENDLOOP.
6.Which screen in the ABAP Dictionary
... Continue reading "I is correct ii is correct" »

pene

Classified in Computers

Written at on English with a size of 4.98 KB.

Adware is a type of free software supported by advertisements that showup in Pop-up windows or on a toolbar on your computer or browser. Mostadware is Annoying, but safe. But some is used to gather your personal information, track The websites you visit or even record your keystrokes. How to Recognize adware Your device is probably infected with adware if you Start seeing ads popping up in applications where you hadn't seen them before. Pop-ups can also show up on your computer's desktop even when you're not Browsing the Internet. Also, your browser's homepage may have been Changed. How to remove adware Before removing adware from your Device, be sure to back up any important files that you want to keep safe. Then Use antivirus or adware removal... Continue reading "pene" »

Understanding MapReduce Design Patterns

Classified in Computers

Written at on English with a size of 18.71 KB.

MapReduce is a computing paradigm for processing data that resides on hundreds of computers, which has been popularized recently by Google, Hadoop, and many others. The paradigm is extraordinarily powerful, but it does not provide a general solution to what many are calling “big data,” so while it works particularly well on some problems, some are more challenging. This book will teach you what problems are amenable to the MapReduce paradigm, as well as how to use it effectively. At first glance, many people do not realize that MapReduce is more of a framework than a tool. You have to fit your solution into the framework of map and reduce, which in some situations might be challenging. MapReduce is not a feature, but rather a constraint.... Continue reading "Understanding MapReduce Design Patterns" »

Lost or Maybe Not

Classified in Computers

Written at on English with a size of 740 bytes.

BD 2C 3B D

John Cravern

B 3D C D A B

The End of the World Train

BD 2C 2B 2D

Slvalbart

C 2D 2B A B C

Save the Animals

BD C B A C B D

Michael Pallin

D A B C A D C A

Ruth Manorama

B A C 2D A C D

A Better World

BC B A C D B D

A Champion on Two

2B A C 2B B C

Butter and Bread

BD 2C 2B D C

A Journalism

DB A B 2C B A

Vegetarianism

CD 2B A B D A

Smiling Indians

CD BAC ACB

Norwich

BD CD CB DC

The Best Advice

AC AC BC DA

Interview with a Scriptwriter

3B 2C A B C

An Interview with a Champion

3B 2C D A C


Latitude of the position

Classified in Computers

Written at on English with a size of 1,021 bytes.

Ctrl-' -- Copy the cell above the one selected

Ctrl-; -- Insert today's date into selected cell

Ctrl-D -- Copy down (any number of cells)

Ctrl-R -- Copy right (any number of cells)

F2 -- Edit mode in current cell

F4 -- Repeat last action made to a cell

F5 -- Special select (tool for selecting cells based on criteria)

Alt + Enter -- Hard Line Break

Ctrl + Shift + (Any Arrow Key) -- Highlight all cells from position (if you start from the top, for example, and use the down arrow, it selects all cells in that column)

Understanding Key Information Systems and Technologies

Classified in Computers

Written at on English with a size of 3.77 KB.

Internet Technologies

The internet relies on several key technologies:

  • Transmission Control Protocol (TCP): Enables connections and data exchange between hosts.
  • Internet Protocol (IP): A unique 32-bit numeric address for each computer, represented by four numbers (0-255) separated by periods.
  • Domain Name System (DNS): Converts domain names (e.g., google.com) to IP addresses.
  • Hypertext Transfer Protocol (HTTP): The standard for transferring web pages.
  • Hypertext Markup Language (HTML): Formats documents and links to other resources.
  • Uniform Resource Locator (URL): References a web resource's location and retrieval method.

Cloud Computing

Cloud computing provides access to shared computing resources over a network. Different service models exist:

  • Software
... Continue reading "Understanding Key Information Systems and Technologies" »

Understanding SDLC Models and System Analysis Techniques

Classified in Computers

Written at on English with a size of 94.48 KB.

Define SDLC models? What are the most known SDLC model?

An SDLC model defines implementation of an approach to the project. It defines the various processes, and phases that would be carried out throughout the project to produce the desired output. There are a variety of SDLC models that exist catering to different needs and characteristics of a project. Some are of iterative nature (Prototyping), whereas some are sequential (waterfall).

Some of the well-known SDLC models are:
Waterfall model, Software prototyping, Rapid application development,

Extreme programming, and End user development. 

List Advantages of using system analysis and design techniques in approaching computerized info system?

  • Identifies and solves the right problems
  • Implement
... Continue reading "Understanding SDLC Models and System Analysis Techniques" »

Constants pi type p decimals 2 value '3.1'

Classified in Computers

Written at on English with a size of 4.81 KB.

Module 3 Quiz

1.Structured Query Language (SQL) is considered a procedural language. False
2.PL/SQL fully supports SQL data types. True
3. The term anonymous blocks refers to blocks of code that are not stored for reuse and do not exist after being executed. True
4.The BEGIN section of a PL/SQL block contains code that creates variables, cursors, and types. True
5. Assignment statements are used to put or change the values of variables. True
6. A disadvantage of using the %TYPE attribute is that there is a slight performance hit in that the database server must look up the data type from the data dictionary. True
7. A collection is a data type that can store multiple values of different data types as one unit. False
8. A scalar variable can hold multiple... Continue reading "Constants pi type p decimals 2 value '3.1'" »

Photography Processes and Techniques

Classified in Computers

Written at on English with a size of 2.48 KB.

  • Developers - Produces a visible image from the latent image (1.5 - 2 min)
  • Stop - Terminates the development and removes excess of chemical (15 - 30 sec)
  • Fix - Removes the underdeveloped silver halide crystals from the emulsion (30 sec - 1 min)
  • Washed - Water, the final process (10 min)

Pinhole Photography - A pinhole camera is a simple camera without a lens but with a tiny aperture, a pinhole – effectively a light-proof box with a small hole in one side. Light from a scene passes through the aperture and projects an inverted image on the opposite side of the box, which is known as the camera obscura effect.

  • Sunny: 15-20 sec
  • Overcast: 60 sec
  • Cloudy: 2 min
  • Indoors: 30 min – 1 hour
  • Night Time: A few hours approx.

Photoshop Process:

  • Image Rotation: Image

... Continue reading "Photography Processes and Techniques" »

Understanding Binary Search Trees, Red-Black Trees, AVL Trees, Hash Tables, and HashMaps

Classified in Computers

Written at on English with a size of 40.07 KB.

Binary Search Tree (BST)

Binary search tree (BST) is a tree in which all nodes follow the below mentioned properties:

  1. The left sub-tree of a node has a key less than or equal to its parent node's key.
  2. The right sub-tree of a node has a key greater than or equal to its parent node's key.
  3. Binary search tree (BST) divides all its sub-trees into two segments: left sub-tree and right sub-tree and can be defined as left_subtree (keys) ≤ node (key) ≤ right_subtree (keys).

Red-Black Tree

A red-black tree is a binary search tree in which each node is colored red or black. The root is black. The children of a red node are black. Every path from the root to leaf has the same number of black nodes and all leaves are black.

AVL Tree

Adelson, Velski & Landis

... Continue reading "Understanding Binary Search Trees, Red-Black Trees, AVL Trees, Hash Tables, and HashMaps" »