Notes, summaries, assignments, exams, and problems for Technology

Sort by
Subject
Level

Electronic Components Guide: Types, Functions & Applications

Classified in Technology

Written on in English with a size of 2.82 KB

Electronic Components Guide

Basic Components

Battery

A device consisting of one or more electrochemical cells with external connections for powering electrical devices. Power supply.

Light Bulb

An electric light with a wire filament heated until it glows. The filament is enclosed in a bulb to protect it from oxidation. Load device.

Motor

An electrical machine that converts electrical energy into mechanical energy. Load device.

Buzzer

A device that makes a buzzing noise and is used for signaling. May be mechanical, electromechanical, or piezoelectric. Load device.

Semiconductor Components

Diode

Formed by the union of two semiconductors: P-type (anode) and N-type (cathode). Load device.

Light-Emitting Diode (LED)

An electronic device that emits light when... Continue reading "Electronic Components Guide: Types, Functions & Applications" »

Essential Engineering & Construction Terminology

Classified in Technology

Written on in English with a size of 3.86 KB

Engineering and Construction Glossary

This glossary provides definitions for key terms used in engineering, construction, and design projects, including their Spanish translations where applicable.

Cross-section (Sección transversal)

A cross-section gives a cutaway view of the joint between two panels.

Note (Notas)

A note gives a brief description or a reference to another related drawing.

Plan (Plano)

A plan gives a view of the whole deck, from above.

Schematic (Esquemático)

A schematic gives a simplified representation of a network of air ducts.

Specification (Especificación)

A specification gives detailed written technical descriptions of a panel.

Amplified

Amplified: made greater.

Elevation (Elevación)

Elevation gives a view of all the panels, from... Continue reading "Essential Engineering & Construction Terminology" »

Technology and Digital Literacy Vocabulary

Classified in Technology

Written on in English with a size of 3.4 KB

  • Limited: kept within a particular size
  • Potential: possible when the necessary conditions exist
  • Excessive: more than is necessary
  • Peer pressure: the influence of people who are similar age
  • Disadvantaged: in a situation in which you are less likely to succeed than others
  • Irritable: becoming annoyed very easily
  • Expose: to remove what is covering something that is very large
  • Awash: having an amount of something that is very large
  • Artificial: not natural
  • Upgrade: to improve something so that it is of a higher quality
  • Zip a file: to reduce the size of a computer file
  • Save: to make sure that a computer keeps information
  • Browse the internet: to look at information on the internet
  • Plug sth in: to connect a piece of electrical equipment to an electricity supply
  • Sync
... Continue reading "Technology and Digital Literacy Vocabulary" »

Cyber Attack Definitions: Vishing, Ransomware, and Botnets

Classified in Technology

Written on in English with a size of 3.35 KB

Common Cyber Attack Definitions and Techniques

Vishing: Voice Phishing Attacks

Using telephone calls to commit a phishing attack.

Smishing: SMS Phishing

Using SMS (text messages) to commit a phishing attack.

Pharming and DNS Poisoning

Directs users to a fake website when they enter the URL of a genuine site.

Whaling: Targeting High-Value Individuals

A specialized type of phishing attack specifically targeting high-ranking executives, such as CEOs, via email.

Salami Slicing Technique

A financial crime where small, often undetectable amounts of money are stolen from a large number of accounts. The cumulative gain is significant, but individual victims rarely notice the loss.

Data Diddling

Altering data, typically by changing information before or during... Continue reading "Cyber Attack Definitions: Vishing, Ransomware, and Botnets" »

Computer Basics and Network Fundamentals Explained

Classified in Technology

Written on in English with a size of 5.59 KB

Understanding Computer Systems and Networking Essentials

Command-Line Interface Basics

Command-line interfaces (CLIs) are often replaced by graphical user interfaces (GUIs) and menu-driven interfaces.

Accessing the Command Prompt in Windows

To access the command prompt in Windows: Start > Programs > Accessories > Command Prompt. Alternatively, you can type cmd in the Run dialog or search bar.

Essential Computer Tools and Settings

The Windows Control Panel and System Settings offer various useful tools and configurations, typically categorized as:

  • Programs
  • Hardware and Sound
  • User Accounts and Family Safety
  • Network and Internet
  • Appearance and Personalization
  • System and Security

Key Windows System Utilities

  • Computer Properties

    Provides basic information

... Continue reading "Computer Basics and Network Fundamentals Explained" »

Benefits of Recycling Different Materials and Water Intoxication Symptoms

Classified in Technology

Written on in English with a size of 2.18 KB

STEEL

Scrap can be sorted easily using magnetism. If the metal is galvanized (coated with zinc), the zinc is fully recyclable. If it is stainless steel, other metals mixed with the iron, such as chromium and nickel, can also be recovered and recycled.

GLASS

Sorting is critical, as there are key differences between the clear and colored material used in bottles and jars, and the high-grade material used in engineering applications, which contains traces of metals.

COPPER

Scarcity makes recycling especially desirable and justifies the cost of removing insulation from electric wires, which are a major source of scrap. Pure metal can also be recovered from alloys derived from it, notably brass (which also contains quantities of zinc and often lead)... Continue reading "Benefits of Recycling Different Materials and Water Intoxication Symptoms" »

Cisco Switch and Router Configuration Commands

Classified in Technology

Written on in English with a size of 11.45 KB

User mode

Switch>

Enter Privilege mode

Switch>enable

Privileged mode

Switch#

Enter configuration mode

Switch#configure terminal

Global Config mode

Switch(config)#

Enter Interface mode

Switch(config)#interface fa0/1

Interface mode

Switch(config-if)

Return to global configuration

Switch(config-if)exit

Exit Global Config mode

Switch(config)#exit

Return to use mode

Switch#disable

Logout

Switch>exit

Keyboard Shortcuts

  • Recall Previous command: Up arrow or p
  • Recall Next command: Down arrow or n
  • Beginning of command: a
  • End of command: e
  • Delete input: d
  • Exit Configuration Mode: z
  • Complete command: TAB

Device Configuration

Configure device system name: Switch(config)#hostname sw1

Sets the encrypted enable password: Switch(config)#enable secret cisco

Sets the unencrypted... Continue reading "Cisco Switch and Router Configuration Commands" »

Robots: Types, Components, and Functions

Classified in Technology

Written on in English with a size of 1.58 KB

Robots: Types and Characteristics

Androids

Androids are robots designed with human-like features, including realistic skin and sensors that enable them to respond to touch.

Cyborgs

Cyborgs are beings that combine both biological and artificial components.

Robot Components

Motors

Motors convert energy into mechanical motion, enabling robots to move.

Sensors

Sensors receive analog signals and convert them into digital data for processing.

  • Temperature sensor
  • Pressure sensor
  • Touch sensor

Microphones

Microphones allow robots to collect, process, and record sounds, acting as their"ears"

Robot Output

Claws

Robots with claws are programmed to carry objects, often used in factories or junkyards.

Wheels

Robots with wheels can travel various distances under different conditions.... Continue reading "Robots: Types, Components, and Functions" »

Understanding Cyber Threats: Malware, Trojans, and Security

Classified in Technology

Written on in English with a size of 2.92 KB

Understanding Cyber Threats and Security Measures

1. Malware: Any malicious program or code that is harmful to systems.

2. Trojan Horse: A Trojan horse is a program that appears harmless but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer. It is not able to replicate itself.

3. Worm: A computer worm is a standalone malware computer program that replicates itself to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Worms almost always cause at least some harm to the network.

4. Spam: Spam refers to unsolicited, unwanted,... Continue reading "Understanding Cyber Threats: Malware, Trojans, and Security" »

Harnessing Renewable Energy: Eolian and Tidal Power Explained

Classified in Technology

Written on in English with a size of 3.29 KB

EOLIC ENERGY

1. How It Is Obtained and Its Characteristics

  • It is obtained from the wind's kinetic energy.
  • The sun heats the Earth's air unevenly. The temperature differences in different locations cause air masses to move.

Characteristics of Wind:

  • Speed: Higher wind speed results in greater power generation.
  • Permanent Wind Zones: Areas with consistent wind patterns are ideal for wind energy production.
  • Elevation: Wind speeds are typically higher at higher elevations.
  • Power Density: Measured in watts per square meter (W/m²).

2. Parts of a Wind Power Plant

  • Propeller (Blades):
    • Number of blades varies depending on the motor (typically one to six).
    • Made from lightweight materials like carbon fiber.
    • Spin the shaft, which drives the generator.
    • Types: Horizontal-
... Continue reading "Harnessing Renewable Energy: Eolian and Tidal Power Explained" »