Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Core Networking Concepts: TCP/IP, Routers, and DNS

Classified in Computers

Written on in English with a size of 4.44 KB

TCP/IP Protocol Suite Characteristics

  • Based on open and free protocols and standards.
  • Provides software and hardware independence.
  • Uses a common addressing scheme allowing any TCP/IP device to locate another anywhere on the network.
  • Includes high-level, standardized protocols supporting widely available and consistent user services.
  • Acts as a de facto standard for networking.
  • Allows the interconnection of networks with diverse features and technologies.

Internet Protocol Family Fundamentals

The Internet protocol family, commonly known as TCP/IP, is a set of network protocols fundamental to the Internet, enabling data transmission between computer networks. Examples include HTTP, ARP, Telnet, and POP.

Understanding Routers and Their Function

Routers are... Continue reading "Core Networking Concepts: TCP/IP, Routers, and DNS" »

WAN, Switching, and DSL Technologies: Understanding Network Connections

Classified in Computers

Written on in English with a size of 3.51 KB

Understanding Wide Area Networks (WANs)

A WAN (Wide Area Network) spans a large geographic area, sometimes a country or continent. It contains a collection of machines dedicated to running user programs. These machines are called Hosts. The hosts are connected by a communication subnet. The subnet's job is to conduct messages from one host to another. The separation of the unique aspects of the communication network (subnet) and areas of application (hosts) greatly simplifies the overall design of the network.

Key Components of a WAN

  • Switching Computers (ECD): Each ECD uses a protocol responsible for routing the data correctly and providing support to computers and end-user terminals connected to it.
  • Computer User (DTE): The DTE support function
... Continue reading "WAN, Switching, and DSL Technologies: Understanding Network Connections" »

Disney Transport Layer: Understanding Network Communication

Classified in Computers

Written on in English with a size of 4.2 KB

Disney Transport Layer Considerations

The transport layer is the heart of the whole hierarchy of protocols.

Function: To provide efficient, reliable, and economic data transport processes for the application layer, regardless of the physical network or networks.

There are two types of service: connection-oriented and connectionless.

If there is an error in the lower layers, where n can be controlled at higher x, the error is corrected at the transport layer.

  • Disorders
  • Duplication
  • Loss

Causes of errors:

  • Cable errors
  • Interference
  • Inadequate blockade operation

Functions in the Transport Layer

  • End-to-end reliable communication
  • Error control
  • Flow control
  • Multiplexing of several connections

Origin and destination communicate through a network. The transport layer... Continue reading "Disney Transport Layer: Understanding Network Communication" »

Biometric Authentication: Enhancing Security in Physical Spaces

Classified in Computers

Written on in English with a size of 4.46 KB

Biometric Systems: Enhancing Security

Biometric systems, applied to information systems, allow for the authentication of individuals using electronic technologies. These technologies employ complex mathematical formulas to ensure that the person applying for entry to a resource, or a physical space, is who they claim to be.

Increased Security with Biometric Access Systems

Personal identification methods to control access are based on:

  • Something you know: passwords or access keywords.
  • Something you own: for example, an encoded magnetic card.
  • A personal characteristic: such as fingerprints or iris.

Combining two or more methods provides an even higher level of security.

Biometrics: Key Characteristics

  • Universality: All individuals possess this characteristic.
... Continue reading "Biometric Authentication: Enhancing Security in Physical Spaces" »

Linux Fundamentals: Kernel, Free Software, and Ecosystem

Classified in Computers

Written on in English with a size of 3.33 KB

Understanding Linux: Kernel, Free Software, and Distributions

Like any operating system, Linux is a combination of a main program, or kernel, and a series of added tools and libraries that enable its use. It possesses two distinguishing features:

  • It is free software.
  • It is distributed with its source code.

Most programs and libraries added to the Linux kernel to create a more user-friendly system have been developed by the GNU Project. For this reason, some people refer to Linux as GNU/Linux, clarifying that the operating system comprises not only the kernel but also all those programs and libraries.

Key Concepts Defined

Free Software
Software that can be used, copied, studied, modified, and redistributed freely.
Source Code
A set of text lines that
... Continue reading "Linux Fundamentals: Kernel, Free Software, and Ecosystem" »

Understanding Fractions and Decimal Expressions

Classified in Computers

Written on in English with a size of 2.77 KB

Fractions and Their Classifications

A fraction is a ratio of two integers.

Classification

  • Proper: The numerator is smaller than the denominator, representing a number less than 1.
  • Improper: The numerator is larger than the denominator, representing a number greater than 1.
  • Apparent: The multiple of the denominator and numerator represents an integer.
  • Mixed Numbers: These have a whole number part and a fractional part. They arise from improper fractions. To convert an improper fraction to a mixed number, divide the numerator by the denominator. The quotient is the whole number, the remainder is the new numerator, and the denominator stays the same.

Decimal Expression

A decimal expression is the result of dividing the numerator by the denominator of... Continue reading "Understanding Fractions and Decimal Expressions" »

Design Pattern Classification and Implementation Strategy

Classified in Computers

Written on in English with a size of 4.06 KB

Ideal Steps for Design Pattern Utilization

The following steps outline the ideal process for effectively using design patterns:

  1. (P1) Define Criteria: Define criteria for the organization of patterns.
  2. (P2) Assemble Catalog: Assemble a catalog of patterns that will facilitate the search for suitable standards.
  3. (P3) Generalize Patterns: Generalize the selected patterns for independence from specific methods or private models.
  4. (P4) Develop Pattern Language: Develop a pattern language that reflects the natural relationships among elements, leading the designer from general patterns to more specific ones.

Benefits of Indexed Patterns

Patterns indexed by criteria allow for the simple search of a solution to a specific problem.

Criteria for Pattern Classification

Patterns... Continue reading "Design Pattern Classification and Implementation Strategy" »

Program Translators: Compilers, Interpreters, and Execution

Classified in Computers

Written on in English with a size of 3.39 KB

Program Translators: Compilers and Interpreters

Programs written in a programming language need to be translated into machine code to be executed by the CPU. This task is carried out by translators.

Translators can be categorized into two main types based on the translation process:

  • Interpreters: Take the original program (source code), translate each instruction, and execute it immediately.
  • Compilers: Take the source code, translate it completely into object code, and then the translated program is executed.

The Compilation Process: Object Code and Linking

After compiling a program, the result is known as object code. Object code is a new program written in a language very similar to machine code, but it is still not executable by the CPU.

Following... Continue reading "Program Translators: Compilers, Interpreters, and Execution" »

Component Architecture: Layers, Objects, and Associations

Classified in Computers

Written on in English with a size of 2.54 KB

Component Architecture

A component diagram illustrates the three layers:

  • User layer (interface)
  • Login layer (business rules)
  • Data layer (database)

The use of interfaces and menus indicates who created the interface design.

Object Fundamentals

Class -> identity + state + behavior

Denormalization: The process of reverting from normalization, accepting redundancy and data dependencies to improve data performance. Data - Entity (instance, records)

Object Properties

Object properties:

  • Encapsulation: Objects hide their attributes, state, and behavior from other objects.
  • Inheritance: An object can inherit attributes and behavior from other objects.
  • Overriding: The ability to change or modify inherited attributes or behavior.
  • Composition: An object can be composed
... Continue reading "Component Architecture: Layers, Objects, and Associations" »

Digital and Analog Signals: Input and Output Channels

Classified in Computers

Written on in English with a size of 2.58 KB

Digital Awareness

When you want to receive digital information from the outside: The business card input channels are available, usually in groups of 8 bits, to which binary information is assigned by a program. These can be assigned to an internal variable state of a byte by a reading instruction that may have a port. There can be one or more bytes of input, assigning each an address.

Analog Outputs

To send analog control signals to the outside, the tallies have one or more channels of output through their respective A/D converters. A 1V analog converter generates a constant proportional to the numerical value of the digital data that it has on its input lines. Internally, they have a 5V memory. Different voltage ranges can be obtained using... Continue reading "Digital and Analog Signals: Input and Output Channels" »