Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Artificial Intelligence: Agents, Environments, and Search Methods

Classified in Computers

Written on in English with a size of 4.24 KB

Core Concepts of Artificial Intelligence

Defining Key AI Components

  • Artificial Intelligence (AI): A study to perceive, reason, and act. Systems that think like humans, trying to understand how the human mind works. Systems based on rules.
  • Intelligent Agent: An entity capable of perceiving its environment, processing these perceptions, and responding or acting in that environment rationally and appropriately.
  • Prolog: A functional programming language based on logic.
  • Rational Agent: Agent = Architecture + Program. The program depends on the environment in which it operates.

Types of Intelligent Agents and Programs

The agent program dictates how the agent chooses its actions:

  1. Simple Reflex Agent

    Actions depend solely on the current perception and predefined

... Continue reading "Artificial Intelligence: Agents, Environments, and Search Methods" »

Web Engineering Models and Requirements Capture Methods

Classified in Computers

Written on in English with a size of 3.03 KB

Web Engineering Models

Data Model

Compatible with the entity-relationship model and UML class diagrams.

Hypertext Model

  • Composition: Site pages, content units of pages.
  • Unit: Atomic content element, used to publish the information specified in data models.
  • Navigation: Specified by links.
  • Links: Between units of a page, between units of different pages, or between pages.
  • Defines both the content and navigation.

Presentation Model

  • The appearance of web pages.
  • Does not include specific elements for conceptual modeling; notations are used.
  • XML.
  • The presentation is specified using XSL stylesheets.

Web Engineering UML-Based Methodology (UWE)

  • Proposal based on UML and the Unified Process, adapted to the web.
  • Specific object-oriented techniques are used.
  • Proposes an
... Continue reading "Web Engineering Models and Requirements Capture Methods" »

Information Security Essentials: Concepts and Practices

Classified in Computers

Written on in English with a size of 8.2 KB

Fundamentals of Information Security

Core Security Principles

  • Confidentiality (Privacy): Ensures information is not accessible to unauthorized individuals.
  • Integrity: Guarantees information can only be modified by authorized personnel.
  • Availability (Operability): Ensures information is accessible and usable when needed.

Common Information Security Threats

Software and System Vulnerabilities

  • Bug: An error or flaw in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.
  • Trojan: A type of malware that disguises itself as legitimate software, allowing external users unauthorized access to a computer system.

Network and Data Attacks

  • IP Spoofing: The act of creating Internet Protocol (IP)
... Continue reading "Information Security Essentials: Concepts and Practices" »

Network Topologies, Protocols, and Architectures

Classified in Computers

Written on in English with a size of 2.42 KB

Network Topologies

Ring Topology

Connects hosts in a physical ring. The last host connects to the first.

Star Topology

Connects all cables to a central point.

Extended Star Topology

Connects individual stars using hubs or switches, extending network coverage.

Hierarchical Topology

Similar to extended star, but uses a computer to control traffic instead of hubs/switches.

Mesh Topology

Provides maximum protection by connecting each host to others, ensuring service continuity.

Network Communication Methods

Broadcast

Each host sends data to all others on the network. Access is first-come, first-served (e.g., Ethernet).

Transmission Tokens

Controls access via sequential token transmission. Hosts send data when they have the token (e.g., Token Ring, FDDI).

Network

... Continue reading "Network Topologies, Protocols, and Architectures" »

ArcView GIS Data Management and Mapping Techniques

Classified in Computers

Written on in English with a size of 4.17 KB

This document provides practical instructions and solutions for common tasks and challenges encountered when working with ArcView GIS, covering topics from database integration and map creation to geocoding and spatial analysis.

Core ArcView GIS Operations

Joining External Data in ArcView GIS

To join an external database with attributes of the current theme:

  • Open the properties of the item table (theme).
  • Open the external table to be joined.
  • Identify the common field in both tables.
  • Select the common field in the external table.
  • Select the corresponding common field in the item table's properties.
  • Click the Join icon.
Adding and Arranging Themes in ArcView

To add a new theme to a view and display it in the background:

  • Add the theme using the Add Theme
... Continue reading "ArcView GIS Data Management and Mapping Techniques" »

System Design, Development, and Project Management

Classified in Computers

Written on in English with a size of 2.58 KB

Technical Design of Systems

At the end of this activity, the following items are obtained:

  • Modular design of the system.
  • Description of interfaces between system modules.
  • Description of interfaces to other system modules.
  • Definition of the user interface.
  • Description of system components.

Structured Programming Techniques

Data Entry:
This part of the program consists of instructions that take information from an input/output device and transfer it to main memory for further processing.
Process or Algorithm:
The set of instructions that process the input data to obtain new information.
Output Results:
This consists of instructions that send the results of a process to an input/output device.

System Technology Environment: Objectives

The objectives include:... Continue reading "System Design, Development, and Project Management" »

Leveraging AI for Index Recommendations and Regular Path Queries

Classified in Computers

Written on in English with a size of 4.45 KB

AI Meets AI: Leveraging Query Executions to Improve Index Recommendations

How artificial intelligence (AI) can benefit automated indexing (AI)?: Comparing the execution cost of two plans (different index configurations of same query) is key for index tuning. Instead of using optimizer’s estimates for such comparison, formulating it as a classification task in machine learning results in significantly higher accuracy.

MOTIVATION:

  • Being able to fully automate index recommendation and implementation is a significant value-add for improving query execution cost.
  • Requirement: creating or dropping indexes should not cause significant query performance regressions - users enforce a no query regression constraint.
  • Using the optimizer’s estimates to
... Continue reading "Leveraging AI for Index Recommendations and Regular Path Queries" »

Sequential Logic: Understanding Digital Counters and Shift Registers

Classified in Computers

Written on in English with a size of 3.43 KB

Digital Counters (Sequential Circuits)

Counters are sequential circuits whose output represents the number of clock pulses applied to the input. They consist of interconnected bistables (flip-flops).

Counters can operate in ascending mode (content increases with each pulse) or descending mode (content decreases).

Applications of Digital Counters

  • Watches and Timers
  • Frequency Dividers
  • Frequency Meters (Frecuencímetro)

The maximum number of states a counter passes through is called the Modulus.

Asynchronous (Ripple) Counters

In asynchronous counters, the external clock signal is connected only to the first flip-flop. The clock input of subsequent flip-flops is connected to the output of the previous flip-flop.

This configuration causes all flip-flops... Continue reading "Sequential Logic: Understanding Digital Counters and Shift Registers" »

Website Structure and HTML Document Basics

Classified in Computers

Written on in English with a size of 3.6 KB

CARLOS HAYA IES Building Computer Room Web pages pag. 3

Website Structure Types

The basic structures we observe at any site are one of the following types:

Tree Structure

In this structure, there is a main page (the home page in English terminology) from which you can reach other sites on the Web. In this way, the pages come to be grouped into levels, so that to get from the first to the last, you must pass through the middle. It is a very hierarchical structure and can be difficult to navigate if levels are excessive.

This structure may be ideal for a site organized in groups of separate pages.

In any case, the number of levels should not be excessive, never more than 3.

List Structure

There is no home page; what we have is a sort of list of pages... Continue reading "Website Structure and HTML Document Basics" »

Microprocessors and Memory Types: A Deep Dive

Classified in Computers

Written on in English with a size of 2.71 KB

Microprocessors

The microprocessor is the device responsible for processing the data received. It is able to perform arithmetic operations and transfer blocks of information. The increase in processing power allows for faster and faster PCs. This is mainly due to improvements in architecture, microcode, and operating speeds.

Overclocking

Overclocking is a method used to obtain faster processing speed by increasing the domestic multiplier value of the microprocessor. It is not advisable because it causes overheating of the processor. Besides the increased frequency, it may result in errors of "timing" and then produce erroneous results or hang the system. You can also overclock the system clock speed, which will affect the overall team bus. This... Continue reading "Microprocessors and Memory Types: A Deep Dive" »