Notes, summaries, assignments, exams, and problems for Computers

Sort by
Subject
Level

Core Operating System Principles and File System Types

Classified in Computers

Written on in English with a size of 5.35 KB

Operating System Fundamentals

CPU Scheduling Algorithms

CPU scheduling algorithms determine the order in which processes are executed by the CPU. Each algorithm has distinct characteristics and trade-offs.

First-In, First-Out (FIFO)

This scheduling algorithm processes tasks in the order they arrive. While simple, its main disadvantage lies in potential performance bottlenecks, as a long process can block shorter ones, leading to inefficient CPU utilization.

Shortest Remaining Time (SRT)

A preemptive version of Shortest Job First (SJF). If a new process arrives with a shorter remaining execution time than the currently running process, the CPU switches to the new, shorter process. This aims to minimize average waiting time.

Shortest Job First (SJF)

... Continue reading "Core Operating System Principles and File System Types" »

Pathfinding & AI Search Algorithms: Best-First, Breadth-First, Depth-First, A*

Classified in Computers

Written on in English with a size of 3.58 KB

Understanding Core AI Search Algorithms

Best-First Search

If the node that receives the best evaluation is expanded first, then we are performing a Best-First Search. This algorithm expands what appears to be the best option according to its evaluation function. This function takes into account all nodes seen so far to make its decision.

Breadth-First Search

Breadth-First Search evaluates each node at a certain level before moving on to the next level. It is an optimal algorithm, seeking the shortest solution path.

How Breadth-First Search Works

It searches the entire graph or sequence without considering the goal until it is found. This algorithm does not use a heuristic. From an algorithmic point of view, all child nodes obtained by expanding a... Continue reading "Pathfinding & AI Search Algorithms: Best-First, Breadth-First, Depth-First, A*" »

Fundamentals of Computer Programming Concepts

Classified in Computers

Written on in English with a size of 4.62 KB

Programming Fundamentals

Programming in computing involves automatic data processing and communication. Computers perform arithmetic and logical operations based on instructions, which collectively form a program.

Programming Languages

A programming language is a character set with a specific syntax used to create instructions that a computer can interpret.

Low-Level Languages

These languages are closest to the computer's understanding (binary code). Their characteristics include using characters closely related to the computer's internal operations (bits).

Machine Language

Machine language is one of the lowest levels. It uses the language of 1s and 0s, and each processor has its own specific machine language.

Assembly Language

Assembly language uses... Continue reading "Fundamentals of Computer Programming Concepts" »

Understanding Graphics Cards: Components and Functionality

Classified in Computers

Written on in English with a size of 2.35 KB

The Graphics Card

1. What are Graphics Cards?

A graphics card is the hardware component of a computer that generates the image displayed on the monitor. The graphics card has evolved from a mere interface between the microprocessor and the display, which simply translated information consisting of an 80x24 character screen into an analog signal compatible with the monitor, to managing images with resolutions of 1024x768 pixels or more, with millions of possible colors and refresh rates over 70 Hz.

Current graphics cards have their own dedicated CPU for graphics operations and their own RAM, whose capacity is approaching and may even exceed that of the system.

2. Components of a Graphics Card

A graphics card has three main components:

  • The graphics
... Continue reading "Understanding Graphics Cards: Components and Functionality" »

Drawing Polygons with Bresenham's Algorithm in C

Classified in Computers

Written on in English with a size of 5.19 KB

This program demonstrates how to draw polygons using Bresenham's line algorithm in C. It utilizes the graphics.h library for graphics operations.

Code Overview

The program consists of several functions:

  • main: The main function initializes the graphics mode, reads polygon coordinates, draws the polygon, and waits for a mouse click before closing the graphics window.
  • mostrarEjes: Draws the X and Y axes on the screen.
  • leerCoordenadasPoligono: Prompts the user to enter the number of vertices and their coordinates for the polygon.
  • dibujarPoligono: Iterates through the vertices and draws the polygon by connecting consecutive points using Bresenham's line algorithm.
  • lineaBresenham: Implements Bresenham's line algorithm to draw a line between two points.
  • dibujarPunto:
... Continue reading "Drawing Polygons with Bresenham's Algorithm in C" »

Understanding Network Protocols and the OSI Model

Classified in Computers

Written on in English with a size of 3.48 KB

Understanding Network Protocol Families

While the OSI model defines a comprehensive reference for network study, not every commercial network fully adopts OSI designs. Instead, many networks are built upon specific technologies and proprietary protocols.

NetWare Family

Manufactured by Novell, NetWare was once among the most widely used network systems worldwide. It was renowned for its high performance and capacity for growth.

NetBEUI Family

Microsoft has developed several operating systems that utilize NetBEUI (NetBIOS Extended User Interface) for communications within local area networks. Originally an IBM protocol introduced in 1985, NetBEUI provides a foundational basis for building peer-to-peer networks.

AppleTalk Family

AppleTalk is the network... Continue reading "Understanding Network Protocols and the OSI Model" »

Relational Database Model Principles and Evolution

Classified in Computers

Written on in English with a size of 3.48 KB

2

The Relational Model

Relational Model: Defines a database in terms of objects, properties, and operations. Objects with the same structure and behavior belong to the same class, and classes are organized into hierarchies. Relational models have extended their models to incorporate object-oriented concepts. In 1970, Edward F. Codd published an article in which he argued that data should be inter-linked by natural and logical relationships inherent to the data, rather than through physical pointers.

Codd proposed a simple data model in which all data are represented in tables consisting of rows and columns. Codd also proposed two languages to manipulate data in tables:

  • Relational algebra
  • Relational calculus

The logical manipulation of data also makes... Continue reading "Relational Database Model Principles and Evolution" »

TCP/IP Networking Concepts and Protocols Explained

Classified in Computers

Written on in English with a size of 3.85 KB

1. Server Type for Initial Network Client Connection

Which server type would a network client most likely use first when connecting to a network, such as a school network?

DHCP

2. Data Encapsulation Process

What does encapsulate the data? Explain briefly.

The information is converted into data by a specific application. Then, using TCP, the data is divided into segments, and each is assigned a header that includes the source and destination port numbers. Next, the IP protocol header assigns IP addresses (physical and logical). Finally, the Ethernet protocol sends the segments, which are framed with an Ethernet header and trailer containing the source and destination MAC addresses.

3. Identifying Application for Incoming Segments

If an Internet server

... Continue reading "TCP/IP Networking Concepts and Protocols Explained" »

Understanding POP3: Email Retrieval Protocol Fundamentals

Classified in Computers

Written on in English with a size of 3.14 KB

POP3 Protocol Essentials

POP3 Functionality: Email Retrieval

The Post Office Protocol version 3 (POP3) server is designed primarily for retrieving emails. It facilitates communication where the client sends commands and receives responses from the server.

Key Features of POP3

  • To access and review emails, a dedicated email client program such as Outlook or Thunderbird is required.
  • The server downloads all email information directly to the client's local hard disk. Consequently, the server typically does not retain any copy of the mail after download, making it a 'download and delete' protocol.
  • It is a simple, client-server protocol primarily focused on mail retrieval.

POP3 Synchronization and Response Codes

POP3's design for command verification is... Continue reading "Understanding POP3: Email Retrieval Protocol Fundamentals" »

Mastering GIS Operations: Essential Techniques and Troubleshooting

Classified in Computers

Written on in English with a size of 4.81 KB

Activating the Buffer Function in GIS

If you want to implement the buffer function and it is not active, what must you do to activate it? You must designate the units as follows:

  • View -> Properties

Cartographic considerations must be made before an operation. The influence or buffer area must be activated as units are working.

Modifying Erroneous Values in a GIS Database

How can you modify an erroneous value in a database?

  1. Table / Start Editing
  2. With the pen tool, change the invalid data.
  3. Table / Stop Editing

Deleting a Field in a GIS Database

How do you delete a field in a database?

  • Edit / Delete Field

Deleting a Record in a GIS Database

How can you delete a record in a database?

  • Edit / Delete Records

Invoking the Clip Command

What is required to invoke... Continue reading "Mastering GIS Operations: Essential Techniques and Troubleshooting" »