Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Software Installation & Uninstallation: Parallel Work, Backup & Troubleshooting

Classified in Computers

Written on in English with a size of 2.47 KB

8 Steps for Parallel Work & Uninstallation

The operation of the application, i.e., its use at full capacity.

Parallel Work

When an application is replaced by another, performing a parallel operation of the new application with the old. This means a double data entry, and duplicating all tasks for a certain period of time. This results in greater safety for two reasons:

  • You can compare the results of both applications. If the previous application had no failures, the results of the new application should be the same as the old, for identical processes.
  • If you detect a serious problem in the new application, you can continue working with the former, which has all the information up to date, while the situation is resolved.

Warranty and After-Sales

... Continue reading "Software Installation & Uninstallation: Parallel Work, Backup & Troubleshooting" »

Connecting to SQL Server 2000 with JDBC: A Practical Example

Classified in Computers

Written on in English with a size of 5.03 KB

Connecting Through JDBC Driver for Microsoft SQL Server 2000

Exercise 2

import java.sql.*;

Class Home

public class Jdbc_sqls3 {

private Connection con = null;

Constants for PLS USE chain link

private final String url = "jdbc:microsoft:sqlserver://";

private final String server = "localhost";

private final String port = "1433";

private final String db = "pubsSQL";

private final String user = "sa";

private final String pass = "spark";

The password is easily found; it is recommended to request the user for the final application.

Make the driver use cursor on the server side, allowing more than one active SQL statement per connection.

private final String method = "cursor";

Main Method of Entry Program

public static void main(String[] args) throws Exception {

Jdbc_

... Continue reading "Connecting to SQL Server 2000 with JDBC: A Practical Example" »

Operating Systems: Types, Processes, and Architectures

Classified in Computers

Written on in English with a size of 2.77 KB

Batch Processing Systems

5) For + d l sistma oprativo exploit. Two types are distinguished:

  • Processes by Lots: The following processes are followed:
  1. Load the data in a device (e.g., punched cards).
  2. Receive the magnetic tape CPU and processes, leaving the results on another magnetic tape.
  3. Other devices manage the processed data, leaving it for printing or visualization.

In this way, the CPU processes data only in intervals. This system is very slow because it takes time to load and remove the data. This is the oldest system used and the first structure supposed to be of the IT department, according to these functions. The operators entered and exited the CPU managers.

  • Real-Time:

The process is very different from the processes by lots, more prone to... Continue reading "Operating Systems: Types, Processes, and Architectures" »

Mastering Page Layout: Essential Elements and Formats

Classified in Computers

Written on in English with a size of 4.81 KB

Elements of Page Layout

Clean layout: Visual elements in good order.

Layout elements are three essential elements:

Format: The size or area of the paper on which our design will be printed.

Many formats are according to user needs, such as books, magazines, etc.

Margins: The surrounding areas that respect each box and the edge of the paper.

May be varied according to design. (Head, Spine, Foot, and Fore-edge).

The Box: This is the real space and limiting area where we diagram and fit the elements of the page.

In Microsoft Publisher, the document box appears delineated by a blue box on the page.

Chaotic layout: Items at random, without aesthetic consideration.

What is Page Layout?

It is the attempt to balance the elements across pages, organizing the masses... Continue reading "Mastering Page Layout: Essential Elements and Formats" »

MFS File System Operations in C

Classified in Computers

Written on in English with a size of 3.59 KB

Code fragment likely from mfs_readdir:


int inodo_root_previo = get_inodo_previo(fs, dir->path); // obtain prior entry inode
inode_read(fs, &ino_previo, inodo_root_previo);
// Checking to see if what we are reading is a directory or not, and storing in variables
if (inodo_root_previo != -1) {
    if (inodo_root_previo > 0)
        root_is_dir = is_dir(fs, &ino_previo, name(fs, dir->num_inodo));
    else
        root_is_dir = is_dir(fs, &ino_previo, dir->path);
    if (root_is_dir == 0) {
        if (inodo_root_previo > 0) {
            strcpy(entry->d_name, name(fs, dir->num_inodo)); // assign the name of the entry
        } else {
            strcpy(entry->d_name, dir->path); // Assign the name of the
... Continue reading "MFS File System Operations in C" »

10 Good Deeds of Web Design and Object-Oriented Design Principles

Classified in Computers

Written on in English with a size of 3.23 KB

10 Good Deeds in Website Design

  1. Place the organization name and logo on every page and make the logo a link to the home page.
  2. Provide a search function if the site has more than 100 pages.
  3. Write straightforward and simple headings and page titles that explain the content.
  4. Structure the page to facilitate reader scanning.
  5. Instead of cramming everything about a product, use hypertext to structure the content.

3 Broad Aspects of Web Design

  1. Designing for the computer medium
  2. Designing for the whole site
  3. Designing for the user

3 Design Patterns

  1. SINGLETON: Ensures that only one object of a given class is created.
  2. ADAPTER: An example of the indirection design principle (like an electrical adapter).
  3. OBSERVER: Allows two objects to be linked dynamically.

Statechart

Used... Continue reading "10 Good Deeds of Web Design and Object-Oriented Design Principles" »

Computer Interface Elements: Windows, Desktop & Controls

Classified in Computers

Written on in English with a size of 58.82 KB

Snap5

Understanding Window Elements

Standard Window Components

  1. Control Menu: Displays a menu with options to restore, move, size, minimize, maximize, and close the window.
  2. Toolbar: Provides direct access to frequently used display options for greater efficiency.
  3. Title Bar: Displays the name of the window or application.
  4. Menu Bar: Displays and provides access to the menus available within the application.
  5. Work Area: The primary area provided by the application for the user to perform their work.
  6. Window Border: Allows you to resize the window when it is not maximized. Place the mouse pointer on the border, then press and drag it to the new position.
  7. Status Bar: Displays help or information about the current task or ongoing processes.

Window Control Buttons

  • A.
... Continue reading "Computer Interface Elements: Windows, Desktop & Controls" »

Telecommunications Switching Methods, Fiber Optics, and Network Infrastructure

Classified in Computers

Written on in English with a size of 3.83 KB

Network Communication Methods: Switching Techniques

Circuit Switching

Allows two terminals to communicate through a single, dedicated circuit, leaving it free for use during the connection.

Benefits of Circuit Switching

  • Real-time transmission.
  • No interference from other users on the loop.
  • No contention or congestion issues.
  • No time is lost in recalculating routes.
  • Simplicity in management.

Disadvantages of Circuit Switching

  • Initial connection delay.
  • Time is wasted when the circuit is idle.
  • Route recalculation does not inherently lower costs.
  • Low fault tolerance.

Message Switching

The full message is sent to a node, which stores and forwards it to the next node until it reaches its destination.

Benefits of Message Switching

  • The channel is released before the
... Continue reading "Telecommunications Switching Methods, Fiber Optics, and Network Infrastructure" »

Data Link Layer Protocols: MAC, LLC, Token Ring, VLAN, STP Essentials

Classified in Computers

Written on in English with a size of 2.76 KB

Understanding the Data Link Layer

The MAC sublayer operates at the bottom of the Data Link Layer (OSI Layer 2).

MAC Sublayer: Core Functions

The Ethernet MAC sublayer has two primary responsibilities:

  • Data Encapsulation
  • Medium Access Control

Some key functions of the MAC sublayer include:

  • Controlling access to the physical medium.
  • Adding the MAC address to frames.
  • Frame delimitation (determining the beginning and end of a data frame within a string of bits received by the physical layer).
  • Performing transmission error detection.
  • Discarding duplicate or erroneous frames.

LLC Sublayer: Data Transfer and Control

The LLC (Logical Link Control) sublayer defines how data is transferred on the physical environment, providing services to higher layers. The LLC... Continue reading "Data Link Layer Protocols: MAC, LLC, Token Ring, VLAN, STP Essentials" »

8051 Microcontroller: Memory Organization and ALU

Classified in Computers

Written on in English with a size of 3 KB

1.2. Organization of Memory

On Intel's 8051 family, program storage and data are physically separate. Both data and programs can be stored in internal or external memory devices. To identify external memory locations accessed during instruction execution, the microprocessor generates pulses on the ALE (Address Latch Enable) line and controls the PSEN (Program Store Enable) output state.

1.2.1. Program Memory

In 8051-based systems, the selection of program memory (internal and external) is determined by the hardware designer. The microprocessor accesses external memory only if the EA (External Access Enable) pin is connected to ground. If EA is high (connected to Vcc), the microprocessor uses its internal memory for low addresses and external memory... Continue reading "8051 Microcontroller: Memory Organization and ALU" »