Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Secure Internet Connections: SSL, PGP, PPTP, and IPsec

Classified in Computers

Written on in English with a size of 2.93 KB

Secure Sockets Layer (SSL)

Secure Sockets Layer (SSL) is most often used to encrypt information on the Internet. It is a protocol that encrypts database (DB) connections by selecting an encryption method and generating the necessary keys for the entire session.

How SSL Works

  1. The browser requests a page from a secure server. The request is identified by the HTTPS protocol.
  2. They agree on algorithms that ensure confidentiality, integrity, and authenticity.
  3. The server sends the browser its standard X509 certificate containing its public key. If the application requires it, it in turn requests the client's certificate.
  4. The browser sends the server a master key from which it generates the session key to encrypt data to be exchanged.
  5. Finally, it checks the
... Continue reading "Secure Internet Connections: SSL, PGP, PPTP, and IPsec" »

Network Integration Models and Access Methods

Classified in Computers

Written on in English with a size of 2.8 KB

Models of Network Integration

Typically, a network encompasses a wide range of technologies. Not all technologies meet all the needs of the network administrator. A network of a certain size is usually a mixed-technology network due to the various factors involved.

Key Aspects of Network Integration:

  • Wiring System Response: The wired network forms the backbone of any Local Area Network (LAN). Typically, all servers have at least one connection to the wiring harness, and if they handle substantial traffic, the connection is high-speed. Clients can connect to services through a structured cabling network or wireless connections. Note that the bandwidth of a wireless access point is generally less than that of wired Ethernet access and is shared

... Continue reading "Network Integration Models and Access Methods" »

PowerPoint Essentials: Interface, Features, and Presentation Modes

Classified in Computers

Written on in English with a size of 3.19 KB

Benefits of Microsoft PowerPoint Presentations

Create professional slideshows that can include charts, drawing objects, text, multimedia, animations, and transitions, among other elements.

PowerPoint Fundamentals and Interface

How to Start PowerPoint

To start PowerPoint, navigate to the taskbar, select Programs, then Microsoft Office, and finally PowerPoint.

Understanding the PowerPoint Interface

Once PowerPoint has launched, the screen displays a window containing the menu bar and various tools.

The Menu Bar

The menu bar provides common menus such as File, Edit, View, Insert, Format, Window, and Help.

Key Presentation Menu Commands

The Presentation menu contains several important commands and actions:

  • Presentation: Starts the full-screen slideshow from
... Continue reading "PowerPoint Essentials: Interface, Features, and Presentation Modes" »

Workshop Workload and Production Capacity Management

Classified in Computers

Written on in English with a size of 3.82 KB

Workshop Planning and Control

Planning

Planning aims to coordinate workload with available resources and equipment to perform the required services in production, or the quantity and quality required, at the lowest cost and meeting the deadline.

Organization

Methods, order, time > budget OR > acceptance > delivery term.

Workload

The workload is the amount of work available for the workshop, consisting of the OR already issued and accepted by clients.

Production Capacity

Production capacity is the amount of work that the workshop can perform based on available operators, equipment, and facilities.

The workload can be defined in a working or time to implement and scale, or are uncertain about working with an open OR work involving a diagnostic... Continue reading "Workshop Workload and Production Capacity Management" »

Prolog Predicates & Game AI Algorithms

Classified in Computers

Written on in English with a size of 3.47 KB

funcition min-max(pos,out-eval,out-best_move,in-whomoves,in-max_level){max=-?;min=?;best_move=0;if(level==0){evaluation=eval_(pos);best_move=0; return;}else{foi(i=0;i<num_succ(i);++i){succi=succesor(i);if(whomoves=='max'){min-max(succi,evaluation,best_move,'min', max_level-1);if(evaluation>max){max=evaluation; best_move=i;}}else{min-max(succi,evaluation,best_move,'max', max_level-1);}if(evaluation<min){min=evaluation;best_move=i;}}}}

funcition ??(pos,level,quien_juega,*eval,mejor_move,?,?){if(terminal(pos)||(level==0){*eval=eval(pos);return;}n_succ= num_succ(pos);for(i=0;i<n_succ;++i{if(quien_juega=='max'){succi=succesor(pos,i);??(succi,level-1,'min',evali, mejor_movi,?,?);if(evali>?){?=evali;*eval=?; *mejor_move=i;}if(?>?)... Continue reading "Prolog Predicates & Game AI Algorithms" »

Key Concepts in File Organization and Data Access Methods

Classified in Computers

Written on in English with a size of 3.37 KB

Internal vs. External Files in Data Processing

External File: A data structure used to store information in secondary memory (e.g., on a hard drive or SSD).

Internal File: A variable representing a data structure in main memory used to process information within an application.

Understanding File Organization Types

File organization refers to the way data records are stored on a storage medium. The type of organization is determined when the file is created. The primary types are:

  • Sequential Organization

    In a sequential file, records are written or recorded consecutively, often in adjacent physical positions, following the same order in which they were introduced. To access the n-th record, you must first read the preceding n-1 records. This results

... Continue reading "Key Concepts in File Organization and Data Access Methods" »

Memory Management Concepts and Techniques

Classified in Computers

Written on in English with a size of 2.78 KB

Memory Management Definition

Memory management is the process of:

  • Bringing programs into the main memory to be executed by the processor.
  • Dynamically dividing the part of main memory to accommodate multiple processes.
  • Allocating memory efficiently for packaging processes, preventing the processor from being idle.
  • Enabling the execution of a larger program than is available in real memory.

Memory Management Requirements

1. Relocation

  • Ability to move a program from one region to another of the main memory without invalidating the memory references.
  • The processor hardware and operating system translate the memory references' addresses to the final physical memory addresses.

2. Protection

Each process must be protected from unwanted interference from other... Continue reading "Memory Management Concepts and Techniques" »

Understanding Fuzzy Logic and Backpropagation in Neural Networks

Classified in Computers

Written on in English with a size of 2.43 KB

Fuzzy Logic

Fuzzy logic extends Boolean logic, allowing intermediate values between TRUE (1) and FALSE (0), such as MAYBE (0.5). A fuzzy logic value can be any value within the range of 0 to 1. This logic incorporates statistical concepts, especially in inference. Fuzzy logic implementations enable control devices to handle indeterminate states, allowing for the evaluation of non-quantifiable concepts. Practical examples include evaluating temperature (hot, warm, medium), happiness (bright, happy, apathetic, sad), and the veracity of an argument (absolutely right, right, counter-argumentative, inconsistent, false, totally wrong).

Fuzzy logic is a research area focused on uncertainty treatment and a family of mathematical models dedicated to... Continue reading "Understanding Fuzzy Logic and Backpropagation in Neural Networks" »

C++ Algorithms: Frequency Counting, ISBN Validation, and Horner's Method

Classified in Computers

Written on in English with a size of 5.51 KB

Counting Frequencies Algorithm in C++

This C++ implementation demonstrates a method for counting the frequencies of input integers while maintaining a sorted list of unique values. It utilizes custom functions for insertion and shifting elements.

Data Structure Definition

#include <iostream>
#include <vector>
using namespace std;

struct lon{
    int dig, vez; // digit, count (vezes)
};

Helper Functions: Shifting and Positioning

The mover function shifts elements to make space for a new insertion, and donde_poner finds the correct sorted position for a new digit.

void mover(vector<lon>& a, const int& pos, const int& ini){
    for(int i = pos; i > ini; --i){
        a[i].dig = a[i-1].dig;
        a[i].vez = a[i-1]
... Continue reading "C++ Algorithms: Frequency Counting, ISBN Validation, and Horner's Method" »

TCP/IP Transport Layer Fundamentals Explained

Classified in Computers

Written on in English with a size of 4.01 KB

TCP/IP Transport Layer Fundamentals

1. Transport Layer Header & Session Description

On the basis of the transport layer header shown in the diagram (not provided), what statements describe the established session?

This TCP header contains a Telnet request.

2. TCP/IP Data Encapsulation & Known Port Numbers

With TCP/IP data encapsulation, which range of port numbers identifies all known applications?

0-1023

3. Purpose of Port Numbers in TCP Headers

Why are port numbers included in the TCP header of a segment?

To allow a receiver to transmit data to the appropriate application.

4. OSI Model Layer for Reliable Flow Control

What OSI model layer is responsible for regulating the flow of information from the source to destination, reliably and accurately?... Continue reading "TCP/IP Transport Layer Fundamentals Explained" »