Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Vijeo Designer HMI XBT-G Configuration

Classified in Computers

Written on in English with a size of 5.33 KB

1) Entering Configuration Screen

To enter the configuration screen from runtime mode:

  • It depends on the configuration of the last application downloaded.

2) Dip Switch Settings

According to the dip switch settings shown in the figure:

  • Starting from the CF card is disabled, you can download, and forced closure is disabled.

3) Screen Ventilation

To facilitate the ventilation of the screen, the manufacturer recommends a minimum distance of 100mm from any adjoining structure or equipment.

4) XBT-G LED Indicator

If the LED on the right side of the XBT-G screen lights orange, this means:

  • Backlight is off.

5) COM1 Connector (SUB D25)

The female SUB D25 connector, COM1, of the XBT-G screen is used for:

  • Serial communication with the PLC.

6) XBT-G Back Protection

The

... Continue reading "Vijeo Designer HMI XBT-G Configuration" »

Comparative Analysis of Operating System Memory Management (Linux, Solaris, W2K)

Classified in Computers

Written on in English with a size of 3.34 KB

Memory Management in Linux

Page Allocation Mechanism

Linux defines a mechanism for dealing with contiguous blocks of pages corresponding to blocks of contiguous page frames in main memory. For this, it uses the buddy system, where the kernel maintains a list of groups of contiguous page frames of fixed size.

Page Replacement Algorithm

The Linux page replacement algorithm is based on the Clock algorithm (also known as NUR or NRU), which associates a use bit and a modification bit with each page in main memory.

Memory Management in Solaris

Paging System

Machine-Independent Data Structures

For paged virtual memory, Solaris uses a series of data structures that are independent of the machine:

  • Page Table: Each process has a table with an entry for every
... Continue reading "Comparative Analysis of Operating System Memory Management (Linux, Solaris, W2K)" »

Core Operating System Principles and File System Types

Classified in Computers

Written on in English with a size of 5.35 KB

Operating System Fundamentals

CPU Scheduling Algorithms

CPU scheduling algorithms determine the order in which processes are executed by the CPU. Each algorithm has distinct characteristics and trade-offs.

First-In, First-Out (FIFO)

This scheduling algorithm processes tasks in the order they arrive. While simple, its main disadvantage lies in potential performance bottlenecks, as a long process can block shorter ones, leading to inefficient CPU utilization.

Shortest Remaining Time (SRT)

A preemptive version of Shortest Job First (SJF). If a new process arrives with a shorter remaining execution time than the currently running process, the CPU switches to the new, shorter process. This aims to minimize average waiting time.

Shortest Job First (SJF)

... Continue reading "Core Operating System Principles and File System Types" »

Pathfinding & AI Search Algorithms: Best-First, Breadth-First, Depth-First, A*

Classified in Computers

Written on in English with a size of 3.58 KB

Understanding Core AI Search Algorithms

Best-First Search

If the node that receives the best evaluation is expanded first, then we are performing a Best-First Search. This algorithm expands what appears to be the best option according to its evaluation function. This function takes into account all nodes seen so far to make its decision.

Breadth-First Search

Breadth-First Search evaluates each node at a certain level before moving on to the next level. It is an optimal algorithm, seeking the shortest solution path.

How Breadth-First Search Works

It searches the entire graph or sequence without considering the goal until it is found. This algorithm does not use a heuristic. From an algorithmic point of view, all child nodes obtained by expanding a... Continue reading "Pathfinding & AI Search Algorithms: Best-First, Breadth-First, Depth-First, A*" »

Fundamentals of Computer Programming Concepts

Classified in Computers

Written on in English with a size of 4.62 KB

Programming Fundamentals

Programming in computing involves automatic data processing and communication. Computers perform arithmetic and logical operations based on instructions, which collectively form a program.

Programming Languages

A programming language is a character set with a specific syntax used to create instructions that a computer can interpret.

Low-Level Languages

These languages are closest to the computer's understanding (binary code). Their characteristics include using characters closely related to the computer's internal operations (bits).

Machine Language

Machine language is one of the lowest levels. It uses the language of 1s and 0s, and each processor has its own specific machine language.

Assembly Language

Assembly language uses... Continue reading "Fundamentals of Computer Programming Concepts" »

Understanding Graphics Cards: Components and Functionality

Classified in Computers

Written on in English with a size of 2.35 KB

The Graphics Card

1. What are Graphics Cards?

A graphics card is the hardware component of a computer that generates the image displayed on the monitor. The graphics card has evolved from a mere interface between the microprocessor and the display, which simply translated information consisting of an 80x24 character screen into an analog signal compatible with the monitor, to managing images with resolutions of 1024x768 pixels or more, with millions of possible colors and refresh rates over 70 Hz.

Current graphics cards have their own dedicated CPU for graphics operations and their own RAM, whose capacity is approaching and may even exceed that of the system.

2. Components of a Graphics Card

A graphics card has three main components:

  • The graphics
... Continue reading "Understanding Graphics Cards: Components and Functionality" »

Drawing Polygons with Bresenham's Algorithm in C

Classified in Computers

Written on in English with a size of 5.19 KB

This program demonstrates how to draw polygons using Bresenham's line algorithm in C. It utilizes the graphics.h library for graphics operations.

Code Overview

The program consists of several functions:

  • main: The main function initializes the graphics mode, reads polygon coordinates, draws the polygon, and waits for a mouse click before closing the graphics window.
  • mostrarEjes: Draws the X and Y axes on the screen.
  • leerCoordenadasPoligono: Prompts the user to enter the number of vertices and their coordinates for the polygon.
  • dibujarPoligono: Iterates through the vertices and draws the polygon by connecting consecutive points using Bresenham's line algorithm.
  • lineaBresenham: Implements Bresenham's line algorithm to draw a line between two points.
  • dibujarPunto:
... Continue reading "Drawing Polygons with Bresenham's Algorithm in C" »

Understanding Network Protocols and the OSI Model

Classified in Computers

Written on in English with a size of 3.48 KB

Understanding Network Protocol Families

While the OSI model defines a comprehensive reference for network study, not every commercial network fully adopts OSI designs. Instead, many networks are built upon specific technologies and proprietary protocols.

NetWare Family

Manufactured by Novell, NetWare was once among the most widely used network systems worldwide. It was renowned for its high performance and capacity for growth.

NetBEUI Family

Microsoft has developed several operating systems that utilize NetBEUI (NetBIOS Extended User Interface) for communications within local area networks. Originally an IBM protocol introduced in 1985, NetBEUI provides a foundational basis for building peer-to-peer networks.

AppleTalk Family

AppleTalk is the network... Continue reading "Understanding Network Protocols and the OSI Model" »

TCP/IP Networking Concepts and Protocols Explained

Classified in Computers

Written on in English with a size of 3.85 KB

1. Server Type for Initial Network Client Connection

Which server type would a network client most likely use first when connecting to a network, such as a school network?

DHCP

2. Data Encapsulation Process

What does encapsulate the data? Explain briefly.

The information is converted into data by a specific application. Then, using TCP, the data is divided into segments, and each is assigned a header that includes the source and destination port numbers. Next, the IP protocol header assigns IP addresses (physical and logical). Finally, the Ethernet protocol sends the segments, which are framed with an Ethernet header and trailer containing the source and destination MAC addresses.

3. Identifying Application for Incoming Segments

If an Internet server

... Continue reading "TCP/IP Networking Concepts and Protocols Explained" »

Understanding POP3: Email Retrieval Protocol Fundamentals

Classified in Computers

Written on in English with a size of 3.14 KB

POP3 Protocol Essentials

POP3 Functionality: Email Retrieval

The Post Office Protocol version 3 (POP3) server is designed primarily for retrieving emails. It facilitates communication where the client sends commands and receives responses from the server.

Key Features of POP3

  • To access and review emails, a dedicated email client program such as Outlook or Thunderbird is required.
  • The server downloads all email information directly to the client's local hard disk. Consequently, the server typically does not retain any copy of the mail after download, making it a 'download and delete' protocol.
  • It is a simple, client-server protocol primarily focused on mail retrieval.

POP3 Synchronization and Response Codes

POP3's design for command verification is... Continue reading "Understanding POP3: Email Retrieval Protocol Fundamentals" »