Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Microsoft Access 2000: Query and Report Management

Classified in Computers

Written on in English with a size of 3.49 KB

Access 2000 Queries: Fundamentals

Access 2000 is not case-sensitive when searching for records.

Saving a Query

  1. To save the query, click the Save button in the dialog box. A prompt will appear to name the query.
  2. Enter the name of the query.
  3. Click the OK button.
  4. To close the query, click the Close button.

Running a Query

Queries can be run from the Query Design window or directly from the database window.

From the Database Window:

  1. Select the query to execute.
  2. Click the Open button.

From the Query Design Window:

  1. Click the Run button http://www.aulaclic.es/access2000/Boton_ejecutar_Access.gif on the toolbar.

When viewing query results, you are seeing a subset of the table that meets the specified criteria. Therefore, any data modification made here will also be applied to the related table.

Modifying Query Design

  1. Navigate
... Continue reading "Microsoft Access 2000: Query and Report Management" »

Windows Server 2003 & Active Directory Questions and Notes

Classified in Computers

Written on in English with a size of 7.38 KB

Windows Server 2003 and Active Directory Questions

Corrected text, answers and notes

  1. 1) OS: A - Q-OS no.
  2. 2) Windows 2003: A - Preemptive.
  3. 3) Are as follows: A - Web Server.
  4. 4) Multithreaded is: C - use number.
  5. 5) The version of Windows:
  6. 6) Files: B - NTLDR, Boot.ini.
  7. 7) To load the OS:
  8. 8) An ARC name:
  9. 9) The BOOT.INI:
  10. 10) Windows Server 2003:
  11. 11) You can start:
  12. 12) Console:
  13. 13) To execute the console:
  14. 14) File System: NTFS.
  15. 15) All components: B - can be installed.
  16. 16) The best way to: B - be on the screen.
  17. 17) The best way to have: C - used domain because.
  18. 18) A Windows server: B - installed the service.
  19. 19) Controllers: A - stored data.
  20. 20) A forest: a collection of B - trees.
  21. 21) To promote: A - run DCPROMO.
  22. 22) A controller: B - DCPROMO.
  23. 23) Active: A - one directory.
... Continue reading "Windows Server 2003 & Active Directory Questions and Notes" »

Operating System Fundamentals: System Calls, Processes, Files

Classified in Computers

Written on in English with a size of 3.37 KB

System Calls: Core OS Interaction

A system call is the mechanism used by an application program to request a service from the operating system.

How a System Call is Made

When a call is made, it involves placing a set of parameters in a specific memory location and then executing a machine language instruction for the processor.

Common POSIX System Calls

In operating systems, common POSIX system calls include: open, read, write, close, wait, exec, fork, exit, and kill.

Understanding Processes

A process is an abstraction of a running program, also referred to as a task.

Process Model Properties

  1. All software executables are organized into several sequential processes.
  2. A process includes the running program, the current values of the program counter, registers,
... Continue reading "Operating System Fundamentals: System Calls, Processes, Files" »

Object-Oriented Analysis and Design Principles

Classified in Computers

Written on in English with a size of 3.24 KB

What is APOO?

APOO (Analysis and Object-Oriented Programming) considers a problem and a solution from the perspective of objects, things, or concepts. APOO is the investigation of domain objects and their relationships.

What is OOP?

OOP (Object-Oriented Programming) is a logical solution in terms of software components and their collaborations and responsibilities.

UML Language

The UML (Unified Modeling Language) is the standard language for typesetting to view the results of the analysis and design.

Subactivities:

  1. Define essential use cases.
  2. Draw use case diagrams.
  3. Refine the conceptual model.
  4. Refine the glossary.
  5. Set system sequence diagrams.
  6. Set operation contracts.
  7. Set state diagrams.

What is a Use Case Diagram?

A use case diagram is used to identify... Continue reading "Object-Oriented Analysis and Design Principles" »

Artificial Intelligence: Agents, Environments, and Search Methods

Classified in Computers

Written on in English with a size of 4.24 KB

Core Concepts of Artificial Intelligence

Defining Key AI Components

  • Artificial Intelligence (AI): A study to perceive, reason, and act. Systems that think like humans, trying to understand how the human mind works. Systems based on rules.
  • Intelligent Agent: An entity capable of perceiving its environment, processing these perceptions, and responding or acting in that environment rationally and appropriately.
  • Prolog: A functional programming language based on logic.
  • Rational Agent: Agent = Architecture + Program. The program depends on the environment in which it operates.

Types of Intelligent Agents and Programs

The agent program dictates how the agent chooses its actions:

  1. Simple Reflex Agent

    Actions depend solely on the current perception and predefined

... Continue reading "Artificial Intelligence: Agents, Environments, and Search Methods" »

Core Network Resources, Protocols, and Server Technologies

Classified in Computers

Written on in English with a size of 3.03 KB

Network Resource Sharing Fundamentals

A network resource is a logical entity capable of action at the request of another. The use of shared resources can be performed through a network.

High-Speed Data Connectivity

Disk Management and Fiber Channel

For servers, Fiber Channel interfaces are important for fast disk connections with extreme speed specifications.

Fiber Channel technology is traditionally used for building Storage Area Networks (SANs). The Fiber Channel Standard is an interconnection technology designed for broadband communication. This standard consists of a set of standards developed by ANSI.

  • Maximum distance allowed: 10 km.
  • Protocols transported include: SCSI, IP, IPI, HIPPI, IEEE 802, and even ATM.

Managing Printing Resources

Local Area... Continue reading "Core Network Resources, Protocols, and Server Technologies" »

Database Fundamentals: Comparing Relational, Hierarchical, and Network Models

Classified in Computers

Written on in English with a size of 3.35 KB

1. Data Models and Conceptual Schemes

The conceptual scheme within the ANSI/X3/SPARC framework aims to define the data and the relationships between them that will be computerized in a particular organization, subsequently translating this into a canonical schema. The primary challenge is defining the set of entities to be stored in the database (DB), a task dependent solely on the Database Administrator (DBA).

Recall the three conceptual models, often called semantic models:

  • MER (Entity-Relationship Model)
  • Binary Model
  • RMT (Semantic Model)

Once the conceptual design is complete, the process moves to the logical design or definition of the canonical schema. This translation process is performed using logic models, also known as data models. The most... Continue reading "Database Fundamentals: Comparing Relational, Hierarchical, and Network Models" »

Web Engineering Models and Requirements Capture Methods

Classified in Computers

Written on in English with a size of 3.03 KB

Web Engineering Models

Data Model

Compatible with the entity-relationship model and UML class diagrams.

Hypertext Model

  • Composition: Site pages, content units of pages.
  • Unit: Atomic content element, used to publish the information specified in data models.
  • Navigation: Specified by links.
  • Links: Between units of a page, between units of different pages, or between pages.
  • Defines both the content and navigation.

Presentation Model

  • The appearance of web pages.
  • Does not include specific elements for conceptual modeling; notations are used.
  • XML.
  • The presentation is specified using XSL stylesheets.

Web Engineering UML-Based Methodology (UWE)

  • Proposal based on UML and the Unified Process, adapted to the web.
  • Specific object-oriented techniques are used.
  • Proposes an
... Continue reading "Web Engineering Models and Requirements Capture Methods" »

Understanding Computer Storage Devices and Media

Classified in Computers

Written on in English with a size of 4.27 KB

Storage Devices

Storage Devices: devices that store information. They comprise:

Magnetic Disks

Magnetic disks: Hard drives, floppy disks have large capacity, non-volatile random access, but live slower. It is a closed box, partly comprising:

  • Platters: Stored information resides here.
  • Head: Reads and writes on the platters.
  • Motors: Spin the platters and move the heads.

Components of Magnetic Disks

Platters: Glass, ceramic, or aluminum; joined by a shaft and a motor to rotate at 3600 and 7200 rpm, with a diameter of 5.5 inches.

Heads: Magnetic sensor that reads the charge and a magnet to change the charges for writing.

Spindle (Topic): Support for the disks.

Actuator: The motor that moves the heads.

Structure and Organization

Tracks (Structure-Runs): Concentric... Continue reading "Understanding Computer Storage Devices and Media" »

Information Security Essentials: Concepts and Practices

Classified in Computers

Written on in English with a size of 8.2 KB

Fundamentals of Information Security

Core Security Principles

  • Confidentiality (Privacy): Ensures information is not accessible to unauthorized individuals.
  • Integrity: Guarantees information can only be modified by authorized personnel.
  • Availability (Operability): Ensures information is accessible and usable when needed.

Common Information Security Threats

Software and System Vulnerabilities

  • Bug: An error or flaw in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.
  • Trojan: A type of malware that disguises itself as legitimate software, allowing external users unauthorized access to a computer system.

Network and Data Attacks

  • IP Spoofing: The act of creating Internet Protocol (IP)
... Continue reading "Information Security Essentials: Concepts and Practices" »