Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Wireless Network Technology: Key Concepts and Security

Classified in Computers

Written on in English with a size of 3.85 KB

1. Why Can IEEE 802.11 Transmit Further Than Bluetooth?

IEEE 802.11 (Wi-Fi) has a higher power output than Bluetooth.

2. Three Advantages of Wireless Over Wired Technology

  • Anytime, anywhere connectivity
  • Easy and inexpensive to install
  • Ease of adding additional devices

3. Two Benefits of Wireless Networks Over Wired Networks

  • Mobility
  • Reduced installation time

4. Factors Affecting the Number of Access Points Needed

Three factors that affect the number of access points needed for wireless connectivity are:

  • The size of the building
  • The number of solid interior walls in the building
  • The presence of microwave ovens in various offices

5. Why is Security Important in Wireless Networks?

Security is crucial because wireless networks broadcast data over a medium that

... Continue reading "Wireless Network Technology: Key Concepts and Security" »

Prolog vs CLIPS: A Detailed Comparison with Examples

Classified in Computers

Written on in English with a size of 197.63 KB

Prolog vs. CLIPS: A Detailed Comparison

This document provides a comparison between Prolog and CLIPS, two popular languages used in artificial intelligence and expert systems development. We will explore their syntax, features, and applications through examples.

Facts and Rules

Prolog:

Facts:


father(tom, john).  % tom is father of john
mother(susan, john). % susan is mother of john
father(george, tom). % george is father of tom

Rules:


parent(X, Y) :- father(X, Y), mother(X, Y).
grandparent(X, Z) :- parent(X, Y), parent(Y, Z).
grandfather(X, Z) :- father(X, Y), parent(Y, Z).
grandmother(X, Z) :- mother(X, Y), parent(Y, Z).

CLIPS:

Facts:


(deffacts families
  (father tom john) ; tom is father of john
  (mother susan john) ; susan is mother of
... Continue reading "Prolog vs CLIPS: A Detailed Comparison with Examples" »

Operating System Core Functions and Digital Signature Essentials

Classified in Computers

Written on in English with a size of 3.12 KB

Operating System Core Functions

A program in execution requires resources for its tasks. The Operating System (OS) is responsible for managing these resources through various core functions.

Process Management

The OS is responsible for:

  • Creating and destroying processes.
  • Pausing and resuming processes.
  • Providing mechanisms to communicate and synchronize processes.

Memory Management

Memory is a table of words, each referenced using a unique address. The OS is accountable for:

  • Knowing which parts of memory are used and by whom.
  • Deciding which processes are loaded into memory when space is available.
  • Assigning and reclaiming memory space when needed.

Secondary Storage Management

Secondary storage is necessary because main memory is volatile and often too small... Continue reading "Operating System Core Functions and Digital Signature Essentials" »

Session Layer Protocol: SPDU Exchange, Tokens and Dialogue

Classified in Computers

Written on in English with a size of 2.73 KB

Session Layer Protocol and SPDU Exchange

The session protocol establishes the rules for exchanging data and control information between peer entities using a session transport connection. The abstract session protocol machine communicates with the user through a SSAP (Session Service Access Point) via the exchange of session service primitives, and with the supplier via a TSAP (Transport Service Access Point).

The relationship between the exchange of primitives and the procedures of the protocol is as follows:

  • If the machine receives a Session Protocol Data Unit (SPDU) delivered by the supplier (transport layer), an indication or confirmation of the user service is generated (for example, an early indication or confirmation).
  • If the user sends
... Continue reading "Session Layer Protocol: SPDU Exchange, Tokens and Dialogue" »

Relational Database Concepts: Keys, Views, and SQL

Classified in Computers

Written on in English with a size of 14.08 KB

Relational Keys

Superkey: Set of attributes with all those needed to ID a particular row. Candidate key: Minimal superkey; removing any attribute means it is no longer a superkey; can be multiple per relation; "UNIQUE". Strict: Candidate key + at least 1 extra attribute. Primary: Default candidate key, reference for foreign keys; automatically unique; "PRIMARY KEY". Foreign: "Logical pointer" in a dependent relation that refers to the candidate key in the parent relation (not always primary). Natural: Represent conceptual uniqueness constraints external to the DB, e.g., name, address. Artificial: Introduced solely for the DB, no external meaning, e.g., auto-generated ID; single attribute, simple data type. Surrogate: If artificial is used as
... Continue reading "Relational Database Concepts: Keys, Views, and SQL" »

OSI Model and TCP/IP: Understanding Network Layers

Classified in Computers

Written on in English with a size of 3.85 KB

The Open Systems Interconnection Model

The Open Systems Interconnection (OSI) model is an abstract, layered representation created as a reference for network protocol design. The OSI model divides the process of networking into different logical layers, each of which has unique functionality and to which specific services and protocols are assigned.

Application Layer

The application layer, the seventh layer, is the top layer of both the OSI and TCP/IP models.

Presentation Layer

The presentation layer has three main functions:

  • Coding and data conversion of the application layer to ensure that data from the source device can be interpreted by the appropriate application on the target device.
  • Compression of the data in a way that can be decompressed
... Continue reading "OSI Model and TCP/IP: Understanding Network Layers" »

Network Protocol Fundamentals and Performance Analysis

Classified in Computers

Written on in English with a size of 10.64 KB

Layered Protocols: Advantages and Disadvantages

Layered protocols are a fundamental concept in network design. Understanding their benefits and drawbacks is crucial for efficient system development.

Reasons for Using Layered Protocols

Using layered protocols offers several benefits, including:

  • Breaking up the design problem into smaller, more manageable pieces.
  • Allowing protocols to be changed without affecting higher or lower layers, promoting modularity and flexibility.

Disadvantages of Layered Protocols

Potential drawbacks of using layered protocols include:

  • More overhead: This is due to added information or operations performed in each layer, which can increase processing and transmission costs.
  • Information hiding: Information useful for other layers
... Continue reading "Network Protocol Fundamentals and Performance Analysis" »

Adobe Fireworks CS4: Features and Capabilities

Classified in Computers

Written on in English with a size of 3.53 KB

Adobe Fireworks CS4: A Powerful Tool for Web Graphics

Fireworks was originally created in 1998 by Macromedia. Since the company was acquired by Adobe Systems Incorporated, it has been part of the Adobe family. The most recent and improved version is Fireworks CS4.

Fireworks is a software from the multimedia family, and it is a versatile application. Images for the web can be created, designed, edited, and optimized easily. The use of this software is not exclusive to people who work in this area. Those who enjoy design and creating their own images or editing their favorite pictures can use the program. Company logos, advertising banners, and even animations are developed with it. This way, web pages become more attractive and receive more visits.

... Continue reading "Adobe Fireworks CS4: Features and Capabilities" »

Operating System Networking and Server Management

Classified in Computers

Written on in English with a size of 3.3 KB

Operating System Networking

Network software is installed on each computer to enable communication with others.

Services Performed

  • File support
  • Communications
  • Service P / support team

Server Operating System Management

Managing a server in an easy and safe manner is essential for anyone whose professional work involves managing a computer system.

Composition of the Operating System

  • Core: This module is the lowest level of an OS. It lies directly on the computer hardware.
  • Memory Manager: This module is responsible for absorbing certain portions of main memory for the various programs or program parts that need it.
  • System Input / Output: This component presents the user with the I/O data from the device as a separate issue.
  • Admin Archives: Responsible for
... Continue reading "Operating System Networking and Server Management" »

Operating System Fundamentals: Functions, Versions, and Desktop Components

Classified in Computers

Written on in English with a size of 5.08 KB

Operating System Fundamentals and Definition

An Operating System (OS) is a program or set of programs that help manage the resources of a computer. It begins working when the computer is turned on, allowing user interaction. The OS is responsible for the installation, configuration, usage, and maintenance of both software and hardware.

Major Operating System Versions

There are several major operating system families:

  • Windows: This is a commercial operating system owned by Microsoft. Microsoft has developed a family of operating systems that have evolved significantly, from the early Windows 3.11 to Windows Vista and subsequent modern versions.
  • Linux: This operating system is typically distributed free of charge, making it a popular alternative to
... Continue reading "Operating System Fundamentals: Functions, Versions, and Desktop Components" »