Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Database Essentials: Concepts, Architecture, and Management

Classified in Computers

Written on in English with a size of 4.01 KB

Core Database Concepts

Registration
The set of fields that describe an object.
Field
A feature of an object that stores a value.
Database
A collection of records or data that contain relevant information.

Database Applications

Databases are fundamental across various sectors, including:

  • Banks
  • Airlines
  • Universities
  • Credit Card Transactions
  • Telecommunications
  • Finance
  • Sales
  • Production
  • Human Resources

Levels of Data Abstraction

Physical Level
This is the lowest level of abstraction, describing how data is actually stored.
Conceptual Level
This is the next higher level of abstraction, describing what data is stored in the database and the relationships between data.
External Level (View Level)
This is the highest abstraction level, describing only a part of the database
... Continue reading "Database Essentials: Concepts, Architecture, and Management" »

E1 Primary Access and Multiplexing in PDH and SDH Networks

Classified in Computers

Written on in English with a size of 2.91 KB

E1 Primary Access and Multiplexing

Multiplexing and Quantization

True or False: Multiframes are sent 500 per second in E1 primary access.

Plesiochronous multiplexers cause a loss of original formatting information.

CMI code requires greater bandwidth.

Question: What is the step size of a uniform quantizer with 2048 levels and a dynamic signal range of ±1V?

Answer: 0.977 mV

Question: How many quantization levels are in the second segment of a non-uniform quantizer using the A-law approach?

Answer: 16 levels

E1 Primary Access Characteristics

False Statement: In E1 primary access, the word alignment multiframe is transmitted every 15 frames.

True Statement: In E1 primary access, the word alignment multiframe is transmitted every 2 ms.

NFAS: Offers a speed... Continue reading "E1 Primary Access and Multiplexing in PDH and SDH Networks" »

OpenSSL Encryption and Decryption Techniques

Classified in Computers

Written on in English with a size of 109.42 KB

OpenSSL Encryption and Decryption Commands

RC4 Symmetric Encryption

To encrypt the file "fichero.txt" using the RC4 symmetric encryption algorithm:

OpenSSL> rc4 -in c:\cifrado\fichero.txt -out c:\cifrado\cifrado.rc4
enter rc4 encryption password:
Verifying - enter rc4 encryption password:

To decrypt the previously encrypted file:

OpenSSL> rc4 -d -in c:\cifrado\cifrado.rc4 -out c:\cifrado\descifrado.txt
enter rc4 decryption password:

DES Encryption

Encrypting a file:

OpenSSL> des -salt -in c:\csb.log -out c:\csb.bf.txt
enter des-cbc encryption password:
Verifying - enter des-cbc encryption password:

Decrypting a file:

OpenSSL> des -d -in c:\csb.bf.txt -out c:\csb.txt
enter des-cbc decryption password:

Triple DES (DES3) Algorithm

Encrypting... Continue reading "OpenSSL Encryption and Decryption Techniques" »

Computer System Components: I/O, Buses & Peripherals Explained

Classified in Computers

Written on in English with a size of 3.15 KB

Input/Output (I/O) Units

I/O units connect the system to the outside world, enabling the introduction and extraction of information. These units typically consist of registers operated by control buses, storing address information from the data bus. Their outputs are externally accessible for connecting to various devices.

Another crucial function of I/O units is to adapt:

  • The format of signals from outside to the format of internal signals.
  • Working speeds.
  • Voltage levels.
  • Binary codes.

System Buses

All elements of a programmable microsystem are interconnected by information channels, commonly known as buses. These buses are composed of multiple lines, each designed to transmit information of a specific type. The number of lines forming a bus determines... Continue reading "Computer System Components: I/O, Buses & Peripherals Explained" »

Understanding DNS: Domain Name System Explained

Classified in Computers

Written on in English with a size of 3.26 KB

Understanding DNS (Domain Name System)

DNS (Domain Name System) is a protocol that manages and maintains a distributed database of IP addresses and domain names.

Uses of DNS

  • Resolution: Converts domain names to IP addresses using a host.
  • Inverse Resolution: Converts IP addresses to hostnames.
  • Mail Routing: Determines the mail server for a given domain.

Domain Name Space

The domain name space is a distributed database stored across multiple machines. It stores the correspondence between domain names and IP addresses in a hierarchical structure.

TLDs (Top Level Domains)

Top Level Domains are the first level of the DNS organization, forming an inverted tree structure. They store the descendants of the root DNS domain. Examples include generic TLDs (.com,... Continue reading "Understanding DNS: Domain Name System Explained" »

Understanding Databases: Relational Models and Access

Classified in Computers

Written on in English with a size of 2.84 KB

What is a Database?

A database is a structured data support system that allows us to store and process data quickly, safely, and efficiently.

A database consists of fields, records, and files. We define:

  • Field: Each of the elements that make up a record, such as name, address, town, and telephone.
  • Record: A set of interrelated fields, such as personal data belonging to a shareholder of a video store.
  • File: Consists of the union of multiple records.

What is a Relational Database?

Using relational databases is useful when multiple records of a database are related to the same record in another database. A simple and intuitive way of structuring data is using tables, i.e., arranged in rows and columns. The relational model uses the table structure for... Continue reading "Understanding Databases: Relational Models and Access" »

Software Project Management: Risks and Models

Classified in Computers

Written on in English with a size of 2.35 KB

Electronic Communication includes email, electronic newsletters, and video conferencing systems.

Interpersonal Network involves informal discussions with team members and external individuals who may offer valuable insights or visions to aid the team.

Decomposition of the Problem

Decomposition of the problem, also known as partitioning or elaboration, is an activity based on core software requirements analysis. The level of decomposition is not intended to be complete. Instead, it is applied in two main areas: the functionality to be delivered and the process to be used for delivery.

PROCESS: The generic stages characterizing the software process—definition, development, and support—are applicable to all software.

Software Process Models

  • Linear
... Continue reading "Software Project Management: Risks and Models" »

Java Programming Fundamentals: Key Concepts and Best Practices

Classified in Computers

Written on in English with a size of 3.03 KB

Java Programming Fundamentals

Variables and Data Types

  • Which of the following options is not a variable? Literal
  • A block of related data elements is called a table.
  • According to convention, the dollar sign character is never used to start a variable name.
  • An object is a software bundle related to its state.
  • Using 16-bit Unicode.
  • You can use the short data type to save memory in large tables.
  • You do not need to assign a value when a field is declared.
  • Each item in a table is called an element.
  • Parameters are always variables.
  • The length of a table is set when the table is created.

Operators and Expressions

  • The operator with the highest priority is evaluated before operators with lower priority.
  • Operators on the same line have equal priority.
  • If the name of
... Continue reading "Java Programming Fundamentals: Key Concepts and Best Practices" »

Understanding the OSI Model: 7 Layers of Network Communication

Classified in Computers

Written on in English with a size of 1.1 KB

OSI Model Essentials

The OSI model, developed by ISO, standardizes protocols dominated by TCP/IP and is crucial for network designers. It comprises seven layers for sending commands:

Application Layer

Provides user access to the OSI environment and distributed information services.

Presentation Layer

Ensures application processes are independent of data representation differences.

Session Layer

Manages communication between applications, establishing, managing, and closing connections.

Transport Layer

Ensures secure, transparent data transfer between points, including error recovery and flow control.

Network Layer

Manages switching and transmission techniques, establishing, maintaining, and closing connections at the hardware level.

Data Link Layer

Provides... Continue reading "Understanding the OSI Model: 7 Layers of Network Communication" »

Types of RAM Modules: DIMM, DDR, RIMM, FB-DIMM, GDDR, SO-DIMM

Classified in Computers

Written on in English with a size of 2.93 KB

Memory Modules

Small printed circuit boards built on different memory chips:

  • DIMM (Dual In-Line Memory Module): Similar to the SIMM, physically larger, and have 168 contacts. They are distinguished by having a notch on both sides and two more in the row of contacts. The mounting of the sockets is different than that of the SIMM. DIMMs are found in 32, 64, 128, 256, 512 MB, and 1, 2 GB capacities.
  • DIMM DDR: Has gradually replaced the standard DIMMs. It has a total of 184 pins instead of the 168-pin DIMM of SDRAM. Physically, they resemble the above but have one notch in the row of contacts.
  • DIMM DDR2: Has 240 pins and a notch in a different position than DDR DIMMs.
  • DIMM DDR3: Also has 240 pins but is neither physically nor electrically compatible
... Continue reading "Types of RAM Modules: DIMM, DDR, RIMM, FB-DIMM, GDDR, SO-DIMM" »