Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Network Management, Domains, and Resource Sharing Configuration

Classified in Computers

Written on in English with a size of 3.47 KB

Network Management Fundamentals

Network management consists of deciding how to configure the network, joining teams, determining what permissions users will have, and handling all tasks related to the operation of the network.

Client/Server Network Architecture

A client/server network consists of the following components:

  • Server: Network equipment more powerful than the others, acting as the central controller. The server sets up the network and its policies.
  • Client Computers: Devices connected to the server that depend on it for resources and services.
  • Shares (Resources): Devices like printers, faxes, and other peripherals used by all network users.
  • Connection Devices: Equipment that connects all the computers composing the network (e.g., switches,
... Continue reading "Network Management, Domains, and Resource Sharing Configuration" »

Database Management System Concepts and Functions

Classified in Computers

Written on in English with a size of 2.49 KB

Database Terminology and Structure

Tip: A set of characters with some meaning can be numeric, alphanumeric, or alphabetical.

Information: Ordered set of data that are managed according to user needs.

Field: It is the smallest unit to which we refer to in a program.

Record: Collection of equal fields or different types.

File: Collection of records stored homogeneously following a structure.

Database: Collection of interrelated files that typically contain information about a particular company.

DBMS: A computer-based system (software) that manages a database or a collection of databases or files.

Uses and Functions of a DBMS

  • Allow users to access and manipulate the database.
  • Provide administrators with the tools to perform maintenance and data management.
... Continue reading "Database Management System Concepts and Functions" »

Understanding Fuzzy Logic and Backpropagation in Neural Networks

Classified in Computers

Written on in English with a size of 2.43 KB

Fuzzy Logic

Fuzzy logic extends Boolean logic, allowing intermediate values between TRUE (1) and FALSE (0), such as MAYBE (0.5). A fuzzy logic value can be any value within the range of 0 to 1. This logic incorporates statistical concepts, especially in inference. Fuzzy logic implementations enable control devices to handle indeterminate states, allowing for the evaluation of non-quantifiable concepts. Practical examples include evaluating temperature (hot, warm, medium), happiness (bright, happy, apathetic, sad), and the veracity of an argument (absolutely right, right, counter-argumentative, inconsistent, false, totally wrong).

Fuzzy logic is a research area focused on uncertainty treatment and a family of mathematical models dedicated to... Continue reading "Understanding Fuzzy Logic and Backpropagation in Neural Networks" »

C++ Algorithms: Frequency Counting, ISBN Validation, and Horner's Method

Classified in Computers

Written on in English with a size of 5.51 KB

Counting Frequencies Algorithm in C++

This C++ implementation demonstrates a method for counting the frequencies of input integers while maintaining a sorted list of unique values. It utilizes custom functions for insertion and shifting elements.

Data Structure Definition

#include <iostream>
#include <vector>
using namespace std;

struct lon{
    int dig, vez; // digit, count (vezes)
};

Helper Functions: Shifting and Positioning

The mover function shifts elements to make space for a new insertion, and donde_poner finds the correct sorted position for a new digit.

void mover(vector<lon>& a, const int& pos, const int& ini){
    for(int i = pos; i > ini; --i){
        a[i].dig = a[i-1].dig;
        a[i].vez = a[i-1]
... Continue reading "C++ Algorithms: Frequency Counting, ISBN Validation, and Horner's Method" »

TCP/IP Transport Layer Fundamentals Explained

Classified in Computers

Written on in English with a size of 4.01 KB

TCP/IP Transport Layer Fundamentals

1. Transport Layer Header & Session Description

On the basis of the transport layer header shown in the diagram (not provided), what statements describe the established session?

This TCP header contains a Telnet request.

2. TCP/IP Data Encapsulation & Known Port Numbers

With TCP/IP data encapsulation, which range of port numbers identifies all known applications?

0-1023

3. Purpose of Port Numbers in TCP Headers

Why are port numbers included in the TCP header of a segment?

To allow a receiver to transmit data to the appropriate application.

4. OSI Model Layer for Reliable Flow Control

What OSI model layer is responsible for regulating the flow of information from the source to destination, reliably and accurately?... Continue reading "TCP/IP Transport Layer Fundamentals Explained" »

CPU Register Types and Functions

Classified in Computers

Written on in English with a size of 3.48 KB

CPU Internal Registers

Internal registers are a set of temporary storage units available to the Central Processing Unit (CPU) for its operation. They serve as high-speed storage locations within the CPU itself.

The size of these registers depends on the function to be performed and the type of CPU. They generally match the size of the Data Bus or the Address Bus.

Classification of CPU Registers

CPU registers are broadly classified into two main types:

  • Inaccessible Registers: Not directly controllable by the user.
  • Accessible Registers: Controllable by the user.

Inaccessible Registers

Inaccessible registers are those whose operation or content the user cannot directly control. They are for the exclusive and restricted use of the CPU. From the user's... Continue reading "CPU Register Types and Functions" »

Understanding Network Devices and Protocols in IT

Classified in Computers

Written on in English with a size of 3.46 KB

1. Device Type in the Central Area

Which term correctly identifies the device type that is included in the central area?

2. Factory Default Settings

All devices shown in the image have factory default settings. How many broadcast domains are represented in the topology shown?

3. Appropriate Device Type for Interference

The most appropriate type for use in an environment where there are multiple sources of interference (EMI or RFI) corresponds to:

4. PDU in the Transport Layer

The PDU in the transport layer of the OSI model is:

5. Development of IPv6

What is the main reason for the development of IPv6?

6. Application Layer Protocol for File Transfer

What protocol in the application layer is commonly used to facilitate the transfer of files between a client... Continue reading "Understanding Network Devices and Protocols in IT" »

Machine Learning Algorithms: Concepts and Criteria

Classified in Computers

Written on in English with a size of 4.32 KB

Decision Trees

Key Characteristics

  • Advantages:
    • Easy to implement
    • Can extract rules
    • Non-incremental (more efficient and practical, without backtracking)
  • Disadvantages:
    • Objective function must be discrete
    • Primarily for classification problems

Stop Criteria

  • All examples belong to the same class
  • All samples have the same value for attributes
  • The gain on each split is insignificant
  • The number of samples has reached a certain limit

Overfitting Problem

If the number of nodes is too large, decisions are made based on very small partitions of the samples, which reduces generalization ability.

Formulas

Entropy (Ent):

Ent(S) = -(p+ * log2(p+)) - (p- * log2(p-))

Where:

  • S is the set of examples for that node.
  • p+ is the probability of positive outcomes.
  • p- is the probability
... Continue reading "Machine Learning Algorithms: Concepts and Criteria" »

Key Concepts in Operating Systems

Classified in Computers

Written on in English with a size of 3.92 KB

Operating System Process Management

Process States

Different states a process can be in:

  • Execution: The process is executing instructions and has been granted CPU time.
  • Ready: A process is ready to be executed, waiting for its turn to use its time slice and access system resources.
  • Blocked: The process is held or blocked for some reason, waiting for an event (e.g., I/O completion).

Process State Transitions

Transitions between process states:

  • Transition A: Occurs when a running process needs a resource, signal, etc., to continue execution and moves to the blocked state.
  • Transition B: Occurs when a process has used its allocated CPU time slice and moves from execution back to the ready state.
  • Transition C: Occurs when a process in the ready state moves
... Continue reading "Key Concepts in Operating Systems" »

Memory Paging and Virtual Address Space Management

Classified in Computers

Written on in English with a size of 3.18 KB

Memory Paging Fundamentals

Paging consists of dividing physical memory into fixed-size sections called frames and logical memory into sections of the same size called pages.

The paging system solved the problem of allocating blocks of equal size using physical memory called page frames.

Page Faults and Replacement

A page fault occurs when referring to a page that is not loaded in any page frame. A page replacement (or page out) is required because the total virtual address space of all processes exceeds the size of physical storage.

Functional Requirements

  • Administration of address space.
  • Address translation.
  • Management of physical memory.
  • Memory protection.
  • Shared memory.
  • Load monitoring system.
  • Mapping files into memory, program execution on remote nodes,
... Continue reading "Memory Paging and Virtual Address Space Management" »