Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Secure Internet Connections: SSL, PGP, PPTP, and IPsec

Classified in Computers

Written on in English with a size of 2.93 KB

Secure Sockets Layer (SSL)

Secure Sockets Layer (SSL) is most often used to encrypt information on the Internet. It is a protocol that encrypts database (DB) connections by selecting an encryption method and generating the necessary keys for the entire session.

How SSL Works

  1. The browser requests a page from a secure server. The request is identified by the HTTPS protocol.
  2. They agree on algorithms that ensure confidentiality, integrity, and authenticity.
  3. The server sends the browser its standard X509 certificate containing its public key. If the application requires it, it in turn requests the client's certificate.
  4. The browser sends the server a master key from which it generates the session key to encrypt data to be exchanged.
  5. Finally, it checks the
... Continue reading "Secure Internet Connections: SSL, PGP, PPTP, and IPsec" »

Network Integration Models and Access Methods

Classified in Computers

Written on in English with a size of 2.8 KB

Models of Network Integration

Typically, a network encompasses a wide range of technologies. Not all technologies meet all the needs of the network administrator. A network of a certain size is usually a mixed-technology network due to the various factors involved.

Key Aspects of Network Integration:

  • Wiring System Response: The wired network forms the backbone of any Local Area Network (LAN). Typically, all servers have at least one connection to the wiring harness, and if they handle substantial traffic, the connection is high-speed. Clients can connect to services through a structured cabling network or wireless connections. Note that the bandwidth of a wireless access point is generally less than that of wired Ethernet access and is shared

... Continue reading "Network Integration Models and Access Methods" »

PowerPoint Essentials: Interface, Features, and Presentation Modes

Classified in Computers

Written on in English with a size of 3.19 KB

Benefits of Microsoft PowerPoint Presentations

Create professional slideshows that can include charts, drawing objects, text, multimedia, animations, and transitions, among other elements.

PowerPoint Fundamentals and Interface

How to Start PowerPoint

To start PowerPoint, navigate to the taskbar, select Programs, then Microsoft Office, and finally PowerPoint.

Understanding the PowerPoint Interface

Once PowerPoint has launched, the screen displays a window containing the menu bar and various tools.

The Menu Bar

The menu bar provides common menus such as File, Edit, View, Insert, Format, Window, and Help.

Key Presentation Menu Commands

The Presentation menu contains several important commands and actions:

  • Presentation: Starts the full-screen slideshow from
... Continue reading "PowerPoint Essentials: Interface, Features, and Presentation Modes" »

Workshop Workload and Production Capacity Management

Classified in Computers

Written on in English with a size of 3.82 KB

Workshop Planning and Control

Planning

Planning aims to coordinate workload with available resources and equipment to perform the required services in production, or the quantity and quality required, at the lowest cost and meeting the deadline.

Organization

Methods, order, time > budget OR > acceptance > delivery term.

Workload

The workload is the amount of work available for the workshop, consisting of the OR already issued and accepted by clients.

Production Capacity

Production capacity is the amount of work that the workshop can perform based on available operators, equipment, and facilities.

The workload can be defined in a working or time to implement and scale, or are uncertain about working with an open OR work involving a diagnostic... Continue reading "Workshop Workload and Production Capacity Management" »

Prolog Predicates & Game AI Algorithms

Classified in Computers

Written on in English with a size of 3.47 KB

funcition min-max(pos,out-eval,out-best_move,in-whomoves,in-max_level){max=-?;min=?;best_move=0;if(level==0){evaluation=eval_(pos);best_move=0; return;}else{foi(i=0;i<num_succ(i);++i){succi=succesor(i);if(whomoves=='max'){min-max(succi,evaluation,best_move,'min', max_level-1);if(evaluation>max){max=evaluation; best_move=i;}}else{min-max(succi,evaluation,best_move,'max', max_level-1);}if(evaluation<min){min=evaluation;best_move=i;}}}}

funcition ??(pos,level,quien_juega,*eval,mejor_move,?,?){if(terminal(pos)||(level==0){*eval=eval(pos);return;}n_succ= num_succ(pos);for(i=0;i<n_succ;++i{if(quien_juega=='max'){succi=succesor(pos,i);??(succi,level-1,'min',evali, mejor_movi,?,?);if(evali>?){?=evali;*eval=?; *mejor_move=i;}if(?>?)... Continue reading "Prolog Predicates & Game AI Algorithms" »

Memory Management Concepts and Techniques

Classified in Computers

Written on in English with a size of 2.78 KB

Memory Management Definition

Memory management is the process of:

  • Bringing programs into the main memory to be executed by the processor.
  • Dynamically dividing the part of main memory to accommodate multiple processes.
  • Allocating memory efficiently for packaging processes, preventing the processor from being idle.
  • Enabling the execution of a larger program than is available in real memory.

Memory Management Requirements

1. Relocation

  • Ability to move a program from one region to another of the main memory without invalidating the memory references.
  • The processor hardware and operating system translate the memory references' addresses to the final physical memory addresses.

2. Protection

Each process must be protected from unwanted interference from other... Continue reading "Memory Management Concepts and Techniques" »

Understanding Fuzzy Logic and Backpropagation in Neural Networks

Classified in Computers

Written on in English with a size of 2.43 KB

Fuzzy Logic

Fuzzy logic extends Boolean logic, allowing intermediate values between TRUE (1) and FALSE (0), such as MAYBE (0.5). A fuzzy logic value can be any value within the range of 0 to 1. This logic incorporates statistical concepts, especially in inference. Fuzzy logic implementations enable control devices to handle indeterminate states, allowing for the evaluation of non-quantifiable concepts. Practical examples include evaluating temperature (hot, warm, medium), happiness (bright, happy, apathetic, sad), and the veracity of an argument (absolutely right, right, counter-argumentative, inconsistent, false, totally wrong).

Fuzzy logic is a research area focused on uncertainty treatment and a family of mathematical models dedicated to... Continue reading "Understanding Fuzzy Logic and Backpropagation in Neural Networks" »

CPU Register Types and Functions

Classified in Computers

Written on in English with a size of 3.48 KB

CPU Internal Registers

Internal registers are a set of temporary storage units available to the Central Processing Unit (CPU) for its operation. They serve as high-speed storage locations within the CPU itself.

The size of these registers depends on the function to be performed and the type of CPU. They generally match the size of the Data Bus or the Address Bus.

Classification of CPU Registers

CPU registers are broadly classified into two main types:

  • Inaccessible Registers: Not directly controllable by the user.
  • Accessible Registers: Controllable by the user.

Inaccessible Registers

Inaccessible registers are those whose operation or content the user cannot directly control. They are for the exclusive and restricted use of the CPU. From the user's... Continue reading "CPU Register Types and Functions" »

Key Concepts in Operating Systems

Classified in Computers

Written on in English with a size of 3.92 KB

Operating System Process Management

Process States

Different states a process can be in:

  • Execution: The process is executing instructions and has been granted CPU time.
  • Ready: A process is ready to be executed, waiting for its turn to use its time slice and access system resources.
  • Blocked: The process is held or blocked for some reason, waiting for an event (e.g., I/O completion).

Process State Transitions

Transitions between process states:

  • Transition A: Occurs when a running process needs a resource, signal, etc., to continue execution and moves to the blocked state.
  • Transition B: Occurs when a process has used its allocated CPU time slice and moves from execution back to the ready state.
  • Transition C: Occurs when a process in the ready state moves
... Continue reading "Key Concepts in Operating Systems" »

Vijeo Designer HMI XBT-G Configuration

Classified in Computers

Written on in English with a size of 5.33 KB

1) Entering Configuration Screen

To enter the configuration screen from runtime mode:

  • It depends on the configuration of the last application downloaded.

2) Dip Switch Settings

According to the dip switch settings shown in the figure:

  • Starting from the CF card is disabled, you can download, and forced closure is disabled.

3) Screen Ventilation

To facilitate the ventilation of the screen, the manufacturer recommends a minimum distance of 100mm from any adjoining structure or equipment.

4) XBT-G LED Indicator

If the LED on the right side of the XBT-G screen lights orange, this means:

  • Backlight is off.

5) COM1 Connector (SUB D25)

The female SUB D25 connector, COM1, of the XBT-G screen is used for:

  • Serial communication with the PLC.

6) XBT-G Back Protection

The

... Continue reading "Vijeo Designer HMI XBT-G Configuration" »