Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

TCP/IP Model and Comparison with OSI Model

Classified in Computers

Written on in English with a size of 2.68 KB

Components

DNS Client, DNS Servers, Zones of Authority

Transport Layer Model: TCP/IP

TCP

The Transmission Control Protocol (TCP) ensures reliable communication between the sender and receiver of a message.

UDP

The User Datagram Protocol (UDP) offers a lower guarantee of packet delivery compared to TCP because it doesn't use acknowledgments.

Implementation Level of the TCP/IP Model

The application layer is the level where common programs communicate over a network.

ICMP

The Internet Control Message Protocol (ICMP) is a sub-protocol for diagnostics and error reporting within the Internet Protocol (IP).

FTP

The File Transfer Protocol (FTP) is part of the TCP/IP suite and provides file transfer services.

HTTP

The HyperText Transfer Protocol (HTTP) is the foundation... Continue reading "TCP/IP Model and Comparison with OSI Model" »

Media Player, Video Editing, and Movie Production Essentials

Classified in Computers

Written on in English with a size of 3.74 KB

Media Player Functionality

A media player can play both audio and video, including TV programs. Common widget types include:

  • DVD (xine)
  • Audio (Winamp)
  • Video (Windows Media)
  • Multimedia (Movie Player)

FLV Format

FLV is a streaming video format popular on the internet, especially due to platforms like YouTube and Google Video. It requires Adobe Flash Player.

Video Editing Process

Video editing encompasses all operations performed during movie production.

Movie Components

Key components of a movie include:

  • Menu
  • Movie
  • Frame
  • Transition
  • Clip

Windows Movie Player

Windows Movie Player is a built-in Windows application for simple and comprehensive video editing.

Film Editing

Film editing involves inserting various clips in chronological order for viewing.

Mounting Process

The... Continue reading "Media Player, Video Editing, and Movie Production Essentials" »

Essential Linux Commands and Quota Management

Classified in Computers

Written on in English with a size of 4.68 KB

Here's a list of essential Linux commands:

  • lime - Displays the current calendar.
  • lime 1980 - Shows the calendar for the year 1980.
  • cal 12 1980 - Displays the calendar for December 1980.
  • date - Displays the current date.
  • date -s "2009-11-05 18:55" - Changes the system time.
  • who - Shows who is currently logged into the system.
  • who -u - Displays the process ID (PID) of logged-in users.
  • kill -9 3525 - Terminates the process with PID 3525.
  • uname - Outputs the machine's name.
  • uname -a - Shows detailed information about the machine.
  • uptime - Displays how long the machine has been running.
  • du - Displays disk space usage by folders.
  • du -k - Displays disk space usage in 1024-byte blocks.
  • df - Displays disk usage statistics.
  • ps - Displays a general list of running processes.
... Continue reading "Essential Linux Commands and Quota Management" »

Data Link Layer Fundamentals: MAC, LLC, and Ethernet

Classified in Computers

Written on in English with a size of 8.44 KB

Data Link Layer Fundamentals

1. MAC vs. LLC Sublayers: Motivation

The Data Link Layer (Layer 2) is crucial for connecting to upper layers and managing device communication within a local network. It employs specific addressing schemes to identify devices and uses frames to group bits for transmission. This layer is divided into two sublayers:

  • Logical Link Control (LLC):
    • Establishes the connection with upper layers, integrating with network layer protocols.
    • Identifies the network layer protocol (e.g., IPv4, IPv6) for the encapsulated packet.
    • Remains independent of the physical equipment, providing a consistent interface to the network layer.
  • Media Access Control (MAC):
    • Responsible for bringing data onto and off the physical media.
    • Handles data encapsulation,
... Continue reading "Data Link Layer Fundamentals: MAC, LLC, and Ethernet" »

Fundamentals of Computer Architecture and the 8086 Microprocessor

Classified in Computers

Written on in English with a size of 3.59 KB

Core Computer System Components

Hardware, Software, and Firmware Defined

Hardware is the physical part of a system. Software is a set of programs and applications consisting of instructions and routines that are used to coordinate programs and microprogrammable devices. Firmware is system software recorded in the electronic structure of a system, containing a set of programs that serve as intermediaries between software and hardware.

The Arithmetic Logic Unit (ALU)

The ALU (Arithmetic Logic Unit) is the operational part of a microprocessor. This complex combinational circuit is responsible for performing arithmetic and logic operations. ALU types include 0-address, 1-address, 2-address, and 3-address ALUs. Inside the ALU are two registers: the... Continue reading "Fundamentals of Computer Architecture and the 8086 Microprocessor" »

MySQL Database Management: Users, Permissions, Tables

Classified in Computers

Written on in English with a size of 3.76 KB

Users

  • Creation

From the Partner's Computer

  • Create user `Professor` @ '192.168.5.25' identified by 'Professor';

Local Access

  • Administrative user `Create` @ 'localhost' identified by 'Administrative';

Access from Any Computer

  • Create user `` @ '%' student identified by 'student';
  • Deletion

  • DROP
  • Permissions

To Grant Permissions

  • GRANT SELECT ON clase.cuidadores TO 'student'@'localhost';
SELECT * FROM carers;
  • GRANT SELECT (name, currency) ON clase.cuidadores TO 'student'@'localhost';
SELECT name FROM currency carers;
  • GRANT INSERT, SELECT, UPDATE ON IES.Curso TO 'Administrative'@'localhost';
  • GRANT INSERT (IdCurso, DNI), SELECT (IdCurso, DNI), UPDATE (IdCurso, ID) ON IES.Matrícula TO 'Administrative'@'localhost';

With Update

  • GRANT SELECT (name, currency), UPDATE (currency)
... Continue reading "MySQL Database Management: Users, Permissions, Tables" »

Dining Philosophers Problem: C Implementation with Pthreads

Classified in Computers

Written on in English with a size of 2.22 KB

C Implementation of the Dining Philosophers Problem

This program simulates the Dining Philosophers problem using C and Pthreads to demonstrate concurrency and synchronization concepts.

Global Variables

  • num_filosofos (int): Number of philosophers.
  • seed (int): Seed for random number generation.
  • holders (pthread_mutex_t*): Array of mutexes representing forks.
  • timeIni (long): Initial time in milliseconds.

Functions

long dameTiempo()

Returns the current time in milliseconds.

int eat(int n)

Simulates a philosopher eating.

  • TimeWait (long): Random wait time (0-500 ms).
  • Prints a message indicating the philosopher is eating.
  • Waits for TimeWait milliseconds.
  • Releases the left and right forks (mutexes).

int sleep(int n)

Simulates a philosopher sleeping.

  • TimeWait (long):
... Continue reading "Dining Philosophers Problem: C Implementation with Pthreads" »

ADSL and DSL Technologies: A Comprehensive Overview

Classified in Computers

Written on in English with a size of 2.4 KB

ADSL and DSL Technologies

ADSL (Asymmetric Digital Subscriber Line)

Advantages

  • User: High-speed access, permanent connection, fast service provisioning.
  • Telephone Company: Dual function of existing cable, no central office occupation, no risk of switched network collapse, service installed only on requested lines.

Disadvantages

  • Service unavailability on certain lines (poor condition, distance from the central office).
  • Potential for poor quality home cabling.
  • Router cost.
  • Requires a phone line.
  • Cost in Spain.
  • Theoretical limit for acceptable service at 5.5 km line length.

ADSL2+

Extends ADSL downstream capability with bit folding, achieving speeds of up to 24 Mbps downstream and 3.5 Mbps upstream. Doubles bandwidth from 1.1 MHz to 2.2 MHz.

ATM over ADSL

Allows... Continue reading "ADSL and DSL Technologies: A Comprehensive Overview" »

Understanding Relational Database Models: Concepts and Operations

Classified in Computers

Written on in English with a size of 3.26 KB

Relational Model: An In-Depth Look

The relational model allows users to obtain information from the database without needing assistance from information management professionals. The data is stored in a way that:

  • Users understand it more easily.
  • The data is stored as tables.
  • Relationships between rows and tables are visible within the data.

Features of Relational Models

  • It is important to know that the entries in the table are atomic.
  • All entries in any column are of a single type. The table columns are called attributes.
  • No two rows in the table are identical.

Structure of Relational Databases

At the conceptual level, the relational database model is represented by a collection of stored relations.

Submodel Data

External schemas of relational sub-models... Continue reading "Understanding Relational Database Models: Concepts and Operations" »

Core Network Communication Protocols and Distributed Systems Explained

Classified in Computers

Written on in English with a size of 3.78 KB

Understanding Network Communication Models

Client-Server Communication Model

In the Client-Server model, one process (the server) executes orders or commands requested by another process (the client).

Distributed Applications

Distributed applications consist of different programs that may be located on various machines, such as client and server machines, working together to achieve a common goal.

Network Communication Layers

Network communication can be conceptualized at different levels:

  • Application Layer: Deals with the communication processes of application components.
  • Physical/Architectural Layer: Focuses on the physical transmission of information.

Protocols and Services

  • Protocol: A set of rules governing communication between two entities at a
... Continue reading "Core Network Communication Protocols and Distributed Systems Explained" »