Notes, abstracts, papers, exams and problems of Computers

Sort by
Subject
Level

Java Arithmetic Operations Web App

Classified in Computers

Written at on English with a size of 1.24 KB.

Arithmetic Operations in Java

Input Form

Enter number 1:
Enter number 2:
  • Addition
  • Subtraction
  • Multiplication
  • Division

<% String num1Str = request.getParameter("num1"); String num2Str = request.getParameter("num2"); String operation = request.getParameter("operation"); if (num1Str != null && num2Str != null && !num1Str.isEmpty() && !num2Str.isEmpty() && operation != null) { double num1 = Double.parseDouble(num1Str); double num2 = Double.parseDouble(num2Str); double result = 0; switch (operation) { case "add": result = num1 + num2; out.println("

Result: " + result + "

"); break; case "subtract": result = num1 - num2; out.println("

Result: " + result + "

"); break; case "multiply": result = num1 * num2; out.println("... Continue reading "Java Arithmetic Operations Web App" »

Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway

Classified in Computers

Written at on English with a size of 4.69 KB.

HOSTàROUTER: 1

ENABLE

CONFIGURE TERMINAL

INTERFACE GIGABITETHERNET 0/0

IP ADDRESS 192.168.1.126 255.255.255.224

NO SHUTDOWN

EXIT

INTERFACE GIGABITEETHERNET 0/1

IP ADDRESS 192.168.1.158 255.255.255.240

NO SHUTDOWN

HOSTàSWITCH 2

ENABLE

CONFIFURE TERMINAL

INTERFACE VLAN 1

IP ADDRESS 192.168.1.157 255.255.255.240

NO SHUTDOWN

HOST/ROUTER 3

EXIT (LLEGAR AL CONFIGURE TERMINAL)

HOSTNAME MIDDLE

ENABLE SECRET CISCO

LINE CONSOLE 0

PASSWORD CLASS

LOGIN

EXIT

SECURITY PASSWORD MIN-LENGTH 10

SERVICE PASSWORD ENCRYPTION

IP DOMAIN-NAME CISCO

CRYPTON KEY GENERATE RSA

1024

EXIT

USERNAME CICLOS

LINE VTY 0 4

LOGIN LOCAL

TRANSPORT INPUT SSH

EXIT

INTERFACE GIBABITEETHERNET 0/0

IPV6 ADDRESS 2001:DB8:ACAD:A::1/64

IPV6 ADDRESS FE80::1 LIN

EXIT

GIBABITETHERNET 0/1

IPV6 ADDRESS 2001:DB8:ACAD:B::1/64

IPV6

... Continue reading "Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway" »

Understanding Computer Viruses and Network Topologies

Classified in Computers

Written at on English with a size of 5.9 KB.

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.[1] When this replication succeeds, the affected areas are then said to be 'infected' with a computer virus.[2][3]

Virus writers use social engineering deceptions and exploit detailed knowledge of security vulnerabilities to initially infect systems and to spread the virus. The vast majority of viruses target systems running Microsoft Windows,[4][5][6] employing a variety of mechanisms to infect new hosts,[7] and often using complex anti-detection/stealth strategies to evade antivirus software.[8][9][10][11] Motives for creating viruses can include seeking profit (e.g., with ransomware), desire... Continue reading "Understanding Computer Viruses and Network Topologies" »

Content

Classified in Computers

Written at on English with a size of 9.51 KB.

Javascript Continued

  1. The document.GetElementById() method returns the DOM node whose id attribute is the same as the method's parameter.
    Ex: document.GetElementById("early_languages") returns the p node in the HTML below.

  2. The document.GetElementsByTagName() method returns an array containing all the DOM nodes whose type is the same as the method's parameter.
    Ex: document.GetElementsByTagName("li") returns a list of the four li nodes from in the HTML below.

  3. The document.GetElementsByClassName() method returns an array containing all the DOM nodes whose class attribute matches the method's parameter.
    Ex: document.GetElementsByClassName("traditional") returns an array containing the ol node with the class attribute matching the word traditional.

... Continue reading "Content" »

Using Proximity, White Space, Alignment, Contrast, and Repetition in Design

Classified in Computers

Written at on English with a size of 1.05 KB.

Proximity

Proximity is all about using visual spaces to show relationships in your content. We can group the items in blocks of text or elements in the graphic to take visual emphasis.

White Space

White space, also known as negative space, refers to the spaces between your content, between lines, and even the margins. White space defines and separates different sections.

Alignment

We can separate text boxes, images, etc. by imagining their content as a range inside of a grid. Centering the images to the text and using equal size margins can create a visually pleasing alignment.

Contrast

Contrast means that one item is different from another. We can create contrast using color, size, shape, or contrasting styles of text. Hierarchy, a visual technique... Continue reading "Using Proximity, White Space, Alignment, Contrast, and Repetition in Design" »

Statistics and Trigonometry: Student Weights and Cosine Function

Classified in Computers

Written at on English with a size of 1.9 KB.

Weight of 30 Students - Minimum, Maximum, Average and Standard Deviation - Histogram

a = [71 82 65 75 77 91 59 84 89 81 73 91 82 75 96 85 69 76 81 92 84 79 77 95 81 79 84 85 76 82]

a = Columns 1 through 12

71 82 65 75 77 91 59 84 89 81 73 91

Columns 13 through 24

82 75 96 85 69 76 81 92 84 79 77 95

Columns 25 through 30

81 79 84 85 76 82

Maximum: 96

Minimum: 59

Average: 80.5333

Standard Deviation: 8.4516

Histogram

Plot the value of the cosine within [0 2π] with a step of π/20.

Label the axes and add a title.

Add to that graph the sine function. Use hold command.

Place legends to distinguish both graphic

x = 0:pi/20:2*pi

0 0.1571 0.3142 0.4712 0.6283 0.7854 0.9425 1.0996 1.2566

1.4137 1.5708 1.7279 1.8850 2.0420 2.1991 2.3562 2.5133 2.6704

2.8274 2.9845 3.1416... Continue reading "Statistics and Trigonometry: Student Weights and Cosine Function" »

Ils half scale deflection

Classified in Computers

Written at on English with a size of 1.96 KB.

LOOKUP function uses a TRUE lookup type. with NESTED function,you include that function inside.Excel provides CONDITIONAL FORMAT tools, tools you can identify.Enter a row_num,column_num,area_num,excel display ERROR MESSAGE.30 MOVING AVERAGE trendline is used to smooth out the data. goal seek uses AN ITERATIVE approach to finding the right input. X-AXISLABELS identify the category plotted on the x-axis. Excel rounds the display, EQUAL OR GREATER THAN HALF. excel can contain CONSTANT CELL REFERENCE. in this case you enter range as FIRST argument. Dun and Bradstreet 1 to 4. COUNTIF(F3:F13,>_=1). 15DIGITS. Select the cell containing the text you want to change.Click the down arrow next to the size box on the format bar. Typically, the
... Continue reading "Ils half scale deflection" »

Webpage Design and Security Threats

Classified in Computers

Written at on English with a size of 3.5 KB.

Design of Webpages

There are 2 distinct phases:

  • Layout: it organizes written and multimedia spaces and contents.
  • Interface: is the set of commands and methods that facilitate the interaction between the user and the system

We cannot move ahead with the creation of a web page without knowing what we want to show, the topic and the quantity of information that we will put in it. We shall also decide the title of the web page, its header and its logo, since they will give a sensation of continuity and greater professionalism.

CMS

The Content Management Systems (CMS) are applications installed on the server that enable us the creation of dynamic web pages and allow us to design the site independently of the content. When we administer a CMS, we define... Continue reading "Webpage Design and Security Threats" »

"entirely belongs to" shareholding

Classified in Computers

Written at on English with a size of 359.9 KB.

Chapter 1 Introduction to Services

3.1. Service Terminology Service

a service is a software program that makes its functionality available via a technical interface, called a service contract.

Image

Figure 3.1. The symbol used to represent an abstract service.

Service Contract

The symbol used to represent a service contract is displayed in Figure 3.2.

Image

Service Capability

A service contract can be broken down into a set of service capabilities, each of which expresses a function offered by the service to other software programs.

Image

Figure 3.4. A Purchase Order service contract with four service capabilities.

Service Consumer

A service consumer is software program when it accesses and invokes a service—or, when it sends a message to a service capability


Service

... Continue reading ""entirely belongs to" shareholding" »

Action disvalue

Classified in Computers

Written at on English with a size of 1.69 KB.

Initialization: Prior to the first iteration of the loop, we have k = p, so that the subarray A[p..K-1]is empty. This empty subarray contains the k – p = 0 smallest elements of L and R, and since i = j = 1, both L[i] and R[j] are the smallest elements of their arrays that have not been copied back into A. Maintenance: To see that each iteration maintains the loop invariant, let us first suppose that L[i] <= R[j]. Then L[i] is the smallest element not yet copied back into A. Because A[p..K-1]contains the k - p smallest elements, after line 14 copies L[i]into A[k], the subarray A[p..K] will contain the k – p + 1 smallest elements. Incrementing k (in the for loop update) and i (in line 15) reestablishes the loop invariant for the next iteration.... Continue reading "Action disvalue" »