Notes, abstracts, papers, exams and problems of Other courses

Sort by
Subject
Level

File Systems: Structure, Management, and Optimization

Posted by miko_rodri and classified in Technology

Written at on English with a size of 5.7 KB.

1. Non-Volatile Memory

Non-volatile memory retains stored information even when not powered. It is used for secondary storage or long-term persistent storage. Examples include:

  • CD
  • Hard Disk (similar reading and writing time)
  • Solid-State Drive (SSD): No moving mechanical components, no difference for sequential vs. random reading, but a significant difference between reading and writing.
  • ROM
  • Flash Memory
  • Magnetic Tape: Natural sequential reading and writing, suitable for backups.

2. File System

A file is a contiguous logical address space that can be written to, read from, opened, closed, and deleted. It has the following attributes:

  • Name
  • Unique ID
  • Type
  • Location
  • Size
  • Protection
  • Date

Information about files is stored in file system structures.

3. Directory

A directory... Continue reading "File Systems: Structure, Management, and Optimization" »

Developing Skills with Computers and the Internet in Youth

Classified in English

Written at on English with a size of 2.93 KB.

It is said that using computers and the internet develops important skills in young people, and that makes them more concentrated in doing different things at the same time. It seems to me that the majority of young people have more skills than the previous generation, and they are so used to hearing and investigating different kinds of electronic machines. To start with, the use of computers and the internet can improve skills like logic, reasoning, motor skills, coordination, etc. It depends on what kind of use the young people give to the computer. For instance, the young people who usually play games develop many of these skills, especially those related to coordination. Another case would be young people who use social networks; they enhance... Continue reading "Developing Skills with Computers and the Internet in Youth" »

Non-Profit Accounting and Auditing Overview

Classified in Economy

Written at on English with a size of 3.25 KB.

Basis of Accounting and Reporting

Non-profit organizations use the accrual basis of accounting for external reporting. The Financial Accounting Standards Board (FASB) requires six totals on balance sheets and an external report on donor-imposed restrictions. Expenses incurred should be reported as a decrease in unrestricted net assets, while revenues should be reported as an increase in one of three categories. Expenses are reported by function. An exchange transaction is a reciprocal transfer. Pledge revenue contingent upon raising a matching amount should be recognized when the matching funds have been raised.

FASB 116

Items are held for public exhibition, protected, subject to organizational policy, and require specialized skills. Services

... Continue reading "Non-Profit Accounting and Auditing Overview" »

Government Financial Reporting: Blending, Components, and Statements

Classified in Economy

Written at on English with a size of 3.25 KB.

Government Financial Reporting

Governments combine blended components into both fund and government-wide (GW) statements.

Related Organization

Primary government appoints a voting majority of its governing board.

Affiliated Organization

Raises funds for a university.

Blending

Blending occurs when the component unit's debt must be repaid by the primary government, the unit provides services exclusively to the primary government, or the governing body is substantially the same as the primary government.

Introduction Section

Consists of:

  • Cover page
  • Table of contents
  • Letter of transmittal

Financial Section

Consists of:

  • Auditor's report
  • Management's Discussion and Analysis (MD&A)
  • Basic financial statements
  • Required Supplementary Information (RSI)
  • Combining statements
  • Individual
... Continue reading "Government Financial Reporting: Blending, Components, and Statements" »

Migration Myths and Global Unicity: A Critical Analysis

Classified in Social sciences

Written at on English with a size of 3.15 KB.

De Haas's Argument on Migration Myths

De Haas's argument about migration is an aggregate of seven myths. It starts with the claim of unprecedented migration, where migrants all over the world flee war zones, persecution, or economic instability with devastating consequences. To support this, De Haas provides a second point: poverty and misery are the root causes of labor migration, often exacerbated by corrupt governments that neglect their people.

This leads to the third element: the belief that changes in development policies, development assistance, and trade liberalization can stop migration. However, he argues that unstable polities will eventually provoke a brain drain, where the best and brightest of a particular country will find a suitable

... Continue reading "Migration Myths and Global Unicity: A Critical Analysis" »

English Vocabulary and Grammar Practice

Classified in English

Written at on English with a size of 3.53 KB.

Emotions Vocabulary

  • Excited - Emocionado
  • Funny - Divertido
  • Lonely - Solitario
  • Nervous - Nervioso
  • Relaxed - Relajado
  • Surprised - Sorprendido
  • Tired - Cansado

Food Vocabulary

  • Beans - Alubias
  • Carrots - Zanahoria
  • Cheese - Queso
  • Chicken - Pollo
  • Chilli sauce - Salsa picante
  • Crunchy - Crujiente
  • Healthy - Sano
  • Pepper - Pimiento
  • Salt - Sal
  • Spicy - Comida picante
  • Sugar - Azúcar
  • Sweet - Dulce
  • Tasty - Sabroso
  • Yoghurt - Yogurt

Adjectives

  • Acceptable - Aceptable
  • Badly-behaved - Mal comportamiento
  • Common - Común
  • Compulsory - Obligatorio
  • Direct - Directo
  • Dishonest - Deshonesto
  • Easy-going - Extrovertido
  • Fair - Justicia
  • Familiar - Familiar
  • Honest - Honesto
  • Indirect - Indirecto
  • Rare - Raro
  • Strict - Estricto
  • Unacceptable - Inaceptable
  • Unfair - Injusticia
  • Unfamiliar - Infamiliar
  • Voluntary - Voluntario
  • Well-
... Continue reading "English Vocabulary and Grammar Practice" »

Security Essentials: Certificates, Identity, and Access Control

Classified in Computers

Written at on English with a size of 3.09 KB.

1. Cookies: Temporary data stored on the client-side, encrypted if SSL is used.

2. Types of Certificates:

  • Site
  • Personal
  • Software Vendor
  • Anonymous

3. Identity: Used for:

  • Authentication
  • Accountability
  • Identifying principle

4. Principal: A unique identity. Identity is used to identify the principal, which is a computer representation of an entity.

5. Goals of a Certificate Regarding Identity: To bind the correct identity to a distinguished name.

6. Malicious Logic: A set of instructions that cause a site's security policy to be violated.

7. Predictable Computer Usage Patterns: Yes, my usage is statistically predictable. I often work from home, so the patterns between work and home are similar. I check email, run the browser, run Visual Studio, NetBeans, a... Continue reading "Security Essentials: Certificates, Identity, and Access Control" »

DMZ Server Configuration and Security Best Practices

Classified in Computers

Written at on English with a size of 2.6 KB.

Four Servers Reside in the DMZ

  • Mail
  • WWW
  • DNS
  • Log Servers

DMZ Mail Server (a Separate Machine)

When an Email Message is Received from the Internet:

  1. Reassembles the message.
  2. Checks for malicious content.
  3. Changes the addresses of the outer firewall (which is how the mail server is known to the outside world) to that of the internal mail server and forwards the mail to the internal mail server.

To Send a Message from the Internal Network to the Internet:

  1. Reassembles the message.
  2. Checks for malicious content (and maybe for proprietary information).
  3. All internal addresses are replaced with "drib.org" (the name of the outside firewall).

DMZ WWW Server (a Separate Machine)

  • Does not contact any servers or information sources on the internal network and it contains
... Continue reading "DMZ Server Configuration and Security Best Practices" »

Understanding the United Nations: Key Bodies and Functions

Classified in History

Written at on English with a size of 4.45 KB.

SBQ: United Nations

1. UNGA

  • Characteristics

> 193 members with one vote each → equality

> Tendency for voting groups/blocs/alliances, especially with superpower rivalry

> Composition of members will determine if a resolution is passed

> Struggle for power between the GA and SC in issues of peace and security

  • 45-60: pro-West (Cold War context)

> Growth of GA

> Accelerating decolonization

> Increased influence, bypassing SC with Uniting for Peace Resolution in 1950

> Can recommend the use of force

> Easier for the US to push its own agendas

  • 65-91: anti-West (↑ Third World, decolonization, pro-Soviet)

> 3rd world own agenda, members were unstable, poor & socially divided

  • Post 1991: open universal membership

> Marginalization... Continue reading "Understanding the United Nations: Key Bodies and Functions" »

Evolution of Industrial Systems: Global Models and the Spanish Case

Classified in Economy

Written at on English with a size of 2.51 KB.

The Productive System

Technology

R&D, equipment acquisition, human capital management, capital design, relational capital (material + immaterial). Codified Knowledge (applicable and accessible), American model, complex product. Tacit knowledge, long time to learn, can separate, Japanese model, traditional manufacturing.

Industrial Policy

  • Vertical: Identifies important sectors and encourages growth.
  • Horizontal: Identifies market failures and intervenes with minimal distortions (e.g., renewable energies).
  • Competition Policy: Protects customers, controls monopolies and oligopolies (state).

Post-War Industrialization

Bretton Woods Period (1970)

  • ISI (Import Substitution Industrialization): Industrial policy, protectionism, public enterprises (consumption,
... Continue reading "Evolution of Industrial Systems: Global Models and the Spanish Case" »