Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Web Design & Development Glossary: Terms and Definitions

Classified in Computers

Written on in English with a size of 3 KB

Web Design & Development

Common Terms

Web Design

Is the act or practice of determining how a website looks.

Web Development

Is the act or practice of determining how a website works.

Navigation

Is the act of using and finding things on a website.

CSS

(Cascading Style Sheets) is a simple language that decides how a web page looks.

Coding

Is the programming language that makes up a website.

Visibility

Is how easily people find a website using search engines, based on how many other websites link to it.

Usability

Is how easy it is for a person to use a website.

Content

Is the material on a web page, including text and graphics.

Appearance

Is how a web page looks.

Functionality

Is the ability of different elements of a website to work together.

Programming Languages

C

Is... Continue reading "Web Design & Development Glossary: Terms and Definitions" »

REST Architectural Style: Statelessness, Caching, and Layered Systems

Classified in Computers

Written on in English with a size of 192.43 KB

Chapter 3: Statelessness

This means that each request from a service consumer should contain all the necessary information for the service to understand the meaning of the request. All session state data should then be returned to the service consumer at the end of each request.

Figure 5.2. Statelessness ensures that each service consumer request can be treated independently by the service.

Image

eyes

Classified in Computers

Written on in English with a size of 2.87 KB

Security:

This principle requires the person or agency in control of the personal data to implement organizational and technical measures to ensure the data is secure. It requires the controller to offer protection against:

  • Unlawful destruction or accidental loss
  • Alteration
  • Unauthorized disclosure or access
  • All other form of unlawful processing

In particular when the data is transmitted over a network. If the controller is not doing the processing themselves they must provide guarantees that the specified security measures are being carried out.

Pre Processing a Biometrics Image for Feature Extraction:

Case Study: Finger Prints:

Fingerprint ID is often based on minutiae and or the location or the direction of fingerprint of the ridge endings and bifurcations... Continue reading "eyes" »

Security Essentials: Certificates, Identity, and Access Control

Classified in Computers

Written on in English with a size of 3.09 KB

1. Cookies: Temporary data stored on the client-side, encrypted if SSL is used.

2. Types of Certificates:

  • Site
  • Personal
  • Software Vendor
  • Anonymous

3. Identity: Used for:

  • Authentication
  • Accountability
  • Identifying principle

4. Principal: A unique identity. Identity is used to identify the principal, which is a computer representation of an entity.

5. Goals of a Certificate Regarding Identity: To bind the correct identity to a distinguished name.

6. Malicious Logic: A set of instructions that cause a site's security policy to be violated.

7. Predictable Computer Usage Patterns: Yes, my usage is statistically predictable. I often work from home, so the patterns between work and home are similar. I check email, run the browser, run Visual Studio, NetBeans, a... Continue reading "Security Essentials: Certificates, Identity, and Access Control" »

Setting Up a Backend Project with Node.js

Classified in Computers

Written on in English with a size of 5.14 KB

To start a backend project.

- npm init

Then make a file with whatever entry point you named it as, for example, server.js

Once package.json is created:

  • npm i <package>
  • connect-mongo (store sessions in DB)
  • dotenv (for config files, environment variables)
  • express
  • mongoose
  • express-sessions (sessions and cookies)
  • method-override (to use PUT, UPDATE, DELETE requests)
  • moments (date formatting)
  • morgan (logging)
  • passport (authentication)

npm i -D <package>

  • nodemon (Update every file change instantly without having to restart the server)
  • cross-env (To update environment variables in script definition itself)

After installing the dependencies, edit the scripts in package.json

"start": "cross-env NODE_ENV=production node server.js",
"dev": "cross-env NODE_ENV=
... Continue reading "Setting Up a Backend Project with Node.js" »

JavaScript Calculator

Classified in Computers

Written on in English with a size of 292 bytes

Instructions:

  1. Refer to the files using a relative path.
  2. Save all files, including the HTML file, before using this feature.

Value 1


Value 2


Add Minus Divide Multiply


Submit


Doubly Linked List Implementation in C

Classified in Computers

Written on in English with a size of 4.75 KB

Types definition


#include <stdbool.h>


#include <stdlib.h>


Struct Definition


typedef int tItemL;
typedef struct tNode* tPosL; //Ptr to tNode
struct tNode {
tItemL data;
tPosL next;
tPosL prev;
};
typedef tPosL tList;


Prototypes


void createEmptyList(tList *L);
bool createNode(tPosL* p);
bool insertItem(tItemL d, tPosL p, tList *L);
void updateItem(tItemL d, tPosL p, tList* L);
tPosL findItem(tItemL d,tList L);
bool isEmptyList(tList L);
tItemL getItem(tPosL p, tList L);
tPosL first(tList L);
tPosL last(tList L);
tPosL previous(tPosL p, tList L);
tPosL next(tPosL p,tList L);
void deleteAtPosition(tPosL p , tList *L);
void deleteList(tList *L);


Function Definitions


#include "doubly_linked_list.h"
bool isEmptyList(tList L) { return (L == NULL); }
void... Continue reading "Doubly Linked List Implementation in C" »

Personal-Business Letter Format and Definitions

Classified in Computers

Written on in English with a size of 2.11 KB

A letter from an individual to a business is called a:

Personal-Business Letter: a letter from an individual to a business.

A personal letter contains the following parts (in order):

  • Date line
  • Inside Address
  • Salutation
  • Body
  • Complimentary closing
  • Signature
  • Writer's identification

Definitions:

  • Date line: the month, day, and year the letter is typed (keyed)
  • Inside Address: the name and address of the person to whom the letter is being sent
  • Salutation: an opening greeting such as Dear Ms. Jones
  • Body: the text of the letter
  • Complimentary closing: a closing to the letter such as sincerely or Yours truly
  • Signature: the writer's signature
  • Writer's identification: the writer's keyed name and address

To format a personal-business letter in block style:

  1. Use the default
... Continue reading "Personal-Business Letter Format and Definitions" »

Understanding HDLC Protocol and ARQ Error Control Mechanisms

Classified in Computers

Written on in English with a size of 4.07 KB

Data Link Control and Error Control Mechanisms

Error Control Techniques

Efficient data transmission involves acknowledging successful data receipt and handling errors. When a station has both data and an acknowledgment to send, they are combined into one frame to optimize communication. If only an acknowledgment is available, a separate frame (RR or RNR) is sent. In cases where data is ready but no new acknowledgment is needed, the last sent acknowledgment sequence number is repeated within the data frame.

Error control relies on several key mechanisms:

  • Error Detection: Techniques like checksums or CRCs identify erroneous frames, which are then discarded.
  • Positive Acknowledgment: The receiver sends a positive acknowledgment (ACK) to confirm successful
... Continue reading "Understanding HDLC Protocol and ARQ Error Control Mechanisms" »

Factors Affecting Second Language Acquisition: Readiness to Notice and Task Demands

Classified in Computers

Written on in English with a size of 5.8 KB

5. Readiness to Notice (means be ready prepared)

The current state of the interlanguage system (when you're studying your first SLA). What the L is ready to notice (or attend to) due to his/her internal structures or mechanisms (some Ls are going to be more able than others to noticing structures). Pieneman’s Multidimensional Model (word order acquisition in L2 German or emergence of questions in L2 English). Acquisition of word in German. EX: Capacity to place adverbs at the beginning of sentences before. Capacity to place the verb at the end of the sentence in some structures. EX. Prediction about what the L can notice: what is to be noticed refers to the next thing to be acquired: adverbs at the beginning of sentences -> verbs at the... Continue reading "Factors Affecting Second Language Acquisition: Readiness to Notice and Task Demands" »