Notes, summaries, assignments, exams, and problems

Sort by
Subject
Level

Inheritance and Method Overriding in Java: A Comprehensive Guide

Classified in Computers

Written on in English with a size of 2.3 KB

Inheritance in Java

Inheritance in Java is a mechanism where one object acquires all the properties and behaviors of another object. Inheritance represents the IS-A relationship, also known as a parent-child relationship.

Using inheritance, you can create a general class that defines common traits for a set of related items. This class can then be inherited by other classes, each adding its unique elements.

The keyword extends defines a new class from an existing class. The existing class is called the parent/base/superclass, and the new class is called the child/derived/subclass.

Here's a breakdown:

  • Child classes inherit all members of their parent class.
  • Child classes cannot access the private members of the parent class directly.
  • To access private
... Continue reading "Inheritance and Method Overriding in Java: A Comprehensive Guide" »

Structure and Properties of Atoms and Molecules

Classified in Chemistry

Written on in English with a size of 21.38 KB

  1. Structure of an atom -  An atom is composed of protons, electrons, and neutrons. The entire mass of an atom is concentrated in the nucleus which is at the centre.

    1. Protons - Protons are the positively charged particles which are present in the nucleus of an atom.

    2. Neutrons - Neutrons are the particles in an atom that have a neutral charge. 

    3. Electrons - An electron is a negatively charged subatomic particle that can be either bound to an atom or free

    4. Atomic Mass (what it represents) - The atomic number refers to the number of protons in the atom's nucleus, 

    5. Atomic Number (what it represents) - The atomic mass of an element represent the average total mass of its neutrons, protons, and electrons

  2. Standard Atomic Notation

    1. How to determine how many neutrons,

... Continue reading "Structure and Properties of Atoms and Molecules" »

Java Arithmetic Operations Web App

Classified in Computers

Written on in English with a size of 1.24 KB

Arithmetic Operations in Java

Input Form

Enter number 1:
Enter number 2:
  • Addition
  • Subtraction
  • Multiplication
  • Division

<% String num1Str = request.getParameter("num1"); String num2Str = request.getParameter("num2"); String operation = request.getParameter("operation"); if (num1Str != null && num2Str != null && !num1Str.isEmpty() && !num2Str.isEmpty() && operation != null) { double num1 = Double.parseDouble(num1Str); double num2 = Double.parseDouble(num2Str); double result = 0; switch (operation) { case "add": result = num1 + num2; out.println("

Result: " + result + "

"); break; case "subtract": result = num1 - num2; out.println("

Result: " + result + "

"); break; case "multiply": result = num1 * num2; out.println("... Continue reading "Java Arithmetic Operations Web App" »

Understanding Data Storage and Binary Number Representation

Classified in Computers

Written on in English with a size of 221.76 KB

Data Storage Conversion:

  • 1 gigabyte (GB) equals 1,024 megabytes (MB).
  • 1 megabyte (MB) equals 1,024 kilobytes (KB).
  • To convert gigabytes to kilobytes, multiply by 1,024 twice. For example: 1 GB = 1,024 MB * 1,024 KB = 1,048,576 KB.
  • To convert gigabytes to megabytes, multiply by 1,024. For example: 1 GB = 1,024 MB
  • To convert 20 megabytes to bytes: 20 MB = 20 * 1,024 KB * 1,024 bytes = 20,971,520 bytes
  • To convert 2 gigabytes to kilobytes: 2 GB = 2 * 1,024 MB * 1,024 KB = 2,097,152 KB

Example: SHKRONJA A has a value of 1010, B - 1011, C - 1100, D - 1101, E - 1110, F - 1111.

Binary Number Representations

There are three main ways to represent signed numbers in binary:

1. Signed Magnitude

  • Positive Numbers: Standard binary representation.
  • Negative Numbers: The
... Continue reading "Understanding Data Storage and Binary Number Representation" »

Cybersecurity Essentials: Threats, Controls, and Encryption

Classified in Computers

Written on in English with a size of 4.71 KB

CIA Triad

The CIA Triad consists of Confidentiality, Integrity, and Availability. Related concepts include Authentication, Accountability, and Auditability.

Types of Harm

  • Interception
  • Interruption
  • Modification
  • Fabrication

Web Technologies

HTML

  • GET: Embeds parameters into the URL.
  • POST: Sends data directly to the server; more secure.

PHP

  • PUT: Used to create or replace a file at the specified URL. Sends data like POST, more suitable for uploading files.

Penetration Testing

5 Steps to Penetration Testing:

  1. Reconnaissance
  2. Scanning
  3. Gaining Access
  4. Maintaining Access
  5. Clearing Tracks

Security Controls

  • Prevention: Outright stopping an attack.
  • Deterrence: Making an attack harder.
  • Deflection: Making a target less attractive.
  • Mitigation: Lessening the harm.
  • Detection: Identifying
... Continue reading "Cybersecurity Essentials: Threats, Controls, and Encryption" »

Understanding Organizational Structures and Human Resource Management

Classified in Economy

Written on in English with a size of 2.98 KB

Shake Well Before Using

Support: On paper

Application: Press the body

Storage: Mint; store after use

Organizational Structures

Hierarchy Levels

  • Tall Vertical: Many levels
  • Flat Horizontal: Few levels

Span of Control

  • Narrow: Limited span
  • Wider: Increased span

Decision Making

  • Centralized: Decisions made at the top
  • Decentralized: Decisions made at lower levels

Chains of Command

  • Long: Multiple layers of authority
  • Shorter: Fewer layers of authority

Leadership

  • Autocratic: Authoritarian leadership style
  • Democratic: Participative leadership style

Delegation

  • Limited: Less delegation of authority
  • Increased: More delegation of authority

Types of Organizational Structures

  • Structure by Hierarchy: Senior, middle, junior management/supervisor-worker
  • Structure by Function: Board of
... Continue reading "Understanding Organizational Structures and Human Resource Management" »

Red Flag Laws & Gun Safety Education: Reducing Gun Violence

Classified in Social sciences

Written on in English with a size of 2.85 KB

Red Flag Laws

  • According to Joseph Blocher and Jacob D. Charles, legal professors at Duke University and Pepperdine Caruso Law School, respectively, “extreme risk laws provide a way for guns to be quickly and temporarily taken away from a person who does not necessarily fit into a prohibited class but is at risk of harming themselves or others.” Thus, this solution does not profile specific groups but collects information to ascertain individuals' ability to bear arms.

Implications

  • Combining a national ERPO and a gun safety course can help reduce teen mortality rates and improve gun reform.

  • The implementation of our solution will subsequently elicit a more knowledgeable understanding of gun violence, causing a decrease in school shootings.

  • According

... Continue reading "Red Flag Laws & Gun Safety Education: Reducing Gun Violence" »

Understanding Insurance Policies: Principles and Parts

Classified in Philosophy and ethics

Written on in English with a size of 1.89 KB

What is an Insurance Policy

It's a contract of agreement between the insurer and the policy holder. It contains the terms and conditions.

The insurer agrees to cover the losses, if they occur, in return for premium payments.

Principles

  • Principle of Insurable Interest: You can't insure anything that is not in your name. You can only insure something that, if something bad happens to it, you incur losses.
  • Principle of Indemnity: The insurer will only return you the current value of the loss, they will pay you the current value of the object right before the incident, not the original price.
  • Principle of Subrogation: Your insurance company pays the money and then they ask for the money from the company that has to pay.
  • Principle of Contribution: When
... Continue reading "Understanding Insurance Policies: Principles and Parts" »

Understanding Gap Junctions: Structure, Function, and Significance

Classified in Biology

Written on in English with a size of 2.64 KB

Gap Junctions

Gap junctions are specialized intercellular connections that allow direct communication and exchange of ions, small molecules, and signaling molecules between adjacent cells. These junctions play a crucial role in coordinating cellular activities in various tissues and are found in both animal and plant cells.

Key Points About Gap Junctions

1. Structure

  • Gap junctions are formed by connexins in animals and pannexins in plants.
  • Connexins and pannexins oligomerize to create connexons or pannexons, respectively.
  • Each connexon/pannexon is a hexamer, and two hemichannels (half of a connexon or pannexon) from adjacent cells align to form a gap junction channel.

2. Function

  • Gap junctions facilitate direct cell-to-cell communication, allowing
... Continue reading "Understanding Gap Junctions: Structure, Function, and Significance" »

Eukaryotic Cell Structure: A Comprehensive Overview

Classified in Biology

Written on in English with a size of 4.12 KB

The structural organization of eukaryotic cells is remarkably complex and compartmentalized, reflecting the diverse functions these cells perform. Eukaryotes encompass a wide array of organisms, including plants, animals, fungi, and protists. Below is a detailed exploration of the structural components of eukaryotic cells:

1. Cell Membrane (Plasma Membrane)

  • Composition: The cell's outer boundary is formed by a phospholipid bilayer with embedded proteins and other molecules.
  • Function: It regulates the passage of substances into and out of the cell, acting as a selective barrier.

2. Cell Wall (in some cells)

  • Present in: Plant cells, fungal cells, and some protists.
  • Composition: A rigid structure made of cellulose in plants and chitin in fungi.
  • Function:
... Continue reading "Eukaryotic Cell Structure: A Comprehensive Overview" »