Notes, summaries, assignments, exams, and problems for Technology

Sort by
Subject
Level

Cisco Switch and Router Configuration Commands

Classified in Technology

Written on in English with a size of 11.45 KB

User mode

Switch>

Enter Privilege mode

Switch>enable

Privileged mode

Switch#

Enter configuration mode

Switch#configure terminal

Global Config mode

Switch(config)#

Enter Interface mode

Switch(config)#interface fa0/1

Interface mode

Switch(config-if)

Return to global configuration

Switch(config-if)exit

Exit Global Config mode

Switch(config)#exit

Return to use mode

Switch#disable

Logout

Switch>exit

Keyboard Shortcuts

  • Recall Previous command: Up arrow or p
  • Recall Next command: Down arrow or n
  • Beginning of command: a
  • End of command: e
  • Delete input: d
  • Exit Configuration Mode: z
  • Complete command: TAB

Device Configuration

Configure device system name: Switch(config)#hostname sw1

Sets the encrypted enable password: Switch(config)#enable secret cisco

Sets the unencrypted... Continue reading "Cisco Switch and Router Configuration Commands" »

Robots: Types, Components, and Functions

Classified in Technology

Written on in English with a size of 1.58 KB

Robots: Types and Characteristics

Androids

Androids are robots designed with human-like features, including realistic skin and sensors that enable them to respond to touch.

Cyborgs

Cyborgs are beings that combine both biological and artificial components.

Robot Components

Motors

Motors convert energy into mechanical motion, enabling robots to move.

Sensors

Sensors receive analog signals and convert them into digital data for processing.

  • Temperature sensor
  • Pressure sensor
  • Touch sensor

Microphones

Microphones allow robots to collect, process, and record sounds, acting as their"ears"

Robot Output

Claws

Robots with claws are programmed to carry objects, often used in factories or junkyards.

Wheels

Robots with wheels can travel various distances under different conditions.... Continue reading "Robots: Types, Components, and Functions" »

Understanding Cyber Threats: Malware, Trojans, and Security

Classified in Technology

Written on in English with a size of 2.92 KB

Understanding Cyber Threats and Security Measures

1. Malware: Any malicious program or code that is harmful to systems.

2. Trojan Horse: A Trojan horse is a program that appears harmless but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer. It is not able to replicate itself.

3. Worm: A computer worm is a standalone malware computer program that replicates itself to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Worms almost always cause at least some harm to the network.

4. Spam: Spam refers to unsolicited, unwanted,... Continue reading "Understanding Cyber Threats: Malware, Trojans, and Security" »

Harnessing Renewable Energy: Eolian and Tidal Power Explained

Classified in Technology

Written on in English with a size of 3.29 KB

EOLIC ENERGY

1. How It Is Obtained and Its Characteristics

  • It is obtained from the wind's kinetic energy.
  • The sun heats the Earth's air unevenly. The temperature differences in different locations cause air masses to move.

Characteristics of Wind:

  • Speed: Higher wind speed results in greater power generation.
  • Permanent Wind Zones: Areas with consistent wind patterns are ideal for wind energy production.
  • Elevation: Wind speeds are typically higher at higher elevations.
  • Power Density: Measured in watts per square meter (W/m²).

2. Parts of a Wind Power Plant

  • Propeller (Blades):
    • Number of blades varies depending on the motor (typically one to six).
    • Made from lightweight materials like carbon fiber.
    • Spin the shaft, which drives the generator.
    • Types: Horizontal-
... Continue reading "Harnessing Renewable Energy: Eolian and Tidal Power Explained" »

SQL Cheat Sheet: Commands, Syntax, and Examples

Classified in Technology

Written on in English with a size of 3.5 KB

SQL Cheat Sheet

Insert Data

INSERT INTO tabla(col1,col2) VALUES(val2,val2)
INSERT INTO tabla SET col1='va1',col2='val2'
INSERT INTO ON DUPLICATE KEY UPDATE ...
REPLACE INTO tabla VALUES ...

Update Data

UPDATE tabla SET col1='val1' WHERE ...
UPDATE tabla SET col1=(SELECT ...)

Delete Data

DELETE FROM tabla WHERE cond

Transactions

TRANSACTIONS:
START TRANSACTION;
INSERT INTO ...;
SAVEPOINT prueba;
INSERT INTO ...;
ROLLBACK TO SAVEPOINT prueba;
SET autocommit=0;
COMMIT;

Locking

LOCK TABLES tabla1 WRITE, tabla2 WRITE;
UNLOCK TABLES;

Stored Procedures

CREATE PROCEDURE nombre()
BEGIN
DECLARE a INT;
SELECT x INTO a ...;
END;
CALL procedure();

Functions

CREATE FUNCTION nombre(m VARCHAR(255))
RETURNS INT
BEGIN
DECLARE existe INT DEFAULT 1;
DECLARE tot, k INT;
DECLARE cur_1 CURSOR... Continue reading "SQL Cheat Sheet: Commands, Syntax, and Examples" »

Essential Road Safety and Driving Practices

Classified in Technology

Written on in English with a size of 1.72 KB

Night Driving and Visibility

When driving at night, which lights should you be using?

You should be able to stop within the distance you can see ahead.

When driving in fog, what lights are best?

  • Low beams, or
  • Fog lights

Positioning and Signaling

Where should you position your car to make a left turn from a two-way street?

Use the lane nearest the center of the road.

When should you use your horn?

  • When coming out of a dark alley.

Intersection Rules

What should be done if two cars enter an uncontrolled intersection simultaneously?

The driver to the left must yield to the driver on the right.

What is good practice when nearing an intersection?

  • Slow down and be prepared to stop.

Road Markings

Where would yellow center lines usually be found?

On a two-way road (no... Continue reading "Essential Road Safety and Driving Practices" »

Exchange Server Management: Essential Tasks

Classified in Technology

Written on in English with a size of 3.18 KB

18) Mail-Enabling an Existing Contact:

  1. Recipient Configuration
  2. Mail Contact
  3. Existing Contact
  4. Locate the contact using the browser
  5. OWA

20) Moving a Mailbox with Exchange Management Console:

  1. Recipient Configuration
  2. Mailbox
  3. Select the desired mailbox
  4. Move Mailbox
  5. Browse and select the target database
  6. Skip mailbox check
  7. Select "Immediately" for the move timing.

21) Creating an ActiveSync Policy:

  1. Organization Configuration
  2. Client Access
  3. New Exchange ActiveSync Mailbox Policy
  4. Enter a name for the policy
  5. Enable the "Allow attachments" checkbox (and other desired settings).

22) Assigning an ActiveSync Policy:

  1. Recipient Configuration
  2. Mailbox
  3. Select the desired mailbox and open its properties
  4. Mailbox Features
  5. Exchange ActiveSync
  6. Properties
  7. Select the new policy.

23) Creating a

... Continue reading "Exchange Server Management: Essential Tasks" »

Understanding and Preventing Computer Abuse and Cybercrime

Classified in Technology

Written on in English with a size of 2.5 KB

Understanding Computer Abuse

Computer abuse involves improper or illegal actions using computers, demonstrating irresponsibility with technology. There are several common forms of computer abuse:

Spam

Spam is the use of electronic messaging systems to send unsolicited or unwanted messages. While most commonly associated with email, the term applies to any electronically sent message that is not requested.

Cyberbullying

Cyberbullying is the use of electronic communication to bully others. This includes sending, posting, or sharing negative, harmful, false, or mean content about someone.

Computer Sabotage

Computer sabotage is the intentional use of technology to damage computer systems, including both hardware and software.

Viruses

A computer virus is... Continue reading "Understanding and Preventing Computer Abuse and Cybercrime" »

Google Cloud Platform Solutions: Data, AI, and Infrastructure Best Practices

Classified in Technology

Written on in English with a size of 3.05 KB

BigQuery for Predictive Modeling & Geospatial Data

  • Petabyte-scale data warehousing
  • GeoJSON and geospatial processing
  • Predictive modeling capabilities

IoT Data Processing with Kafka & Dataflow Alerts

  • Kafka I/O as input stream
  • Dataflow for stream ingestion and windowed processing
  • Alerting if moving average falls below 4,000 messages

Cloud SQL for MySQL: High Availability & Zone Failure

  • Utilizing failover replicas
  • Deployment in a different zone within the same region
  • Read replicas for high-scaling scenarios

Kafka for Centralized Data Ingestion & Delivery

  • Ability to manage offsets within topics
  • Publish/subscribe across multiple topics
  • Retaining key ordering and messages for extended periods

Apache Hadoop Migration to Google Cloud Platform

  • Cost-effective
... Continue reading "Google Cloud Platform Solutions: Data, AI, and Infrastructure Best Practices" »

Plastic Materials and 3D Printing Technologies

Classified in Technology

Written on in English with a size of 3.58 KB

1. Plastic Materials: Polymers and monomers.

2. Thermoplastics: Softened by heating and can be melted multiple times.

  • Polyethylene (PE): Bags, bottles, containers.
  • Polystyrene: Packaging, heat insulation.
  • Polyvinyl Chloride: High-resistant pipes, cables.
  • Polypropylene: Model and dye resistant, toys.
  • Polyethylene Terephthalate (PET): Recyclable, transparent dye, bottles.
  • Teflon: Resistant to chemicals and high temperatures, used in frying pans.
  • Polycarbonate: Resistant to impact and heat.

Thermosets: Form permanent networks.

  • Melamine: Withstands high temperatures and chemicals, used in wooden boards.
  • Bakelite: Hard and brittle dark plastic, used for handles of kitchen utensils.
  • Polyester Resins: Rigid and brittle, strengthened with fiberglass for swimming
... Continue reading "Plastic Materials and 3D Printing Technologies" »