Notes, summaries, assignments, exams, and problems for Technology

Sort by
Subject
Level

Object Instantiation and Code Examples

Classified in Technology

Written on in English with a size of 4.2 KB

Poodle Instantiation Example

B. The Poodle variable myDog is instantiated as a Poodle. The instance variable size is initialized to "toy". An implicit call to the no-argument Dog constructor is made, initializing the instance variable name to "NoName".

Book Instantiation Example

C. Object myBook is created using the one-argument Book constructor, which uses super to set myBook's title attribute to "Adventure Story". Object yourBook is created using super to call the Publication no-argument constructor to set yourBook's title attribute to "Generic".

Tree Instantiation Example

B. Object tree1 is created using the DeciduousTree constructor, which uses super to set tree1's treeVariety attribute to "Oak". Object tree2 is created using the EvergreenTree... Continue reading "Object Instantiation and Code Examples" »

Aircraft Identification Features and Aerospace Composites

Classified in Technology

Written on in English with a size of 2.12 MB

0x2tV7+WJthvnHKBJxetd6bDt4HGFRMUjKVYAkcpjUtUWL9j3gNmYqJno4oRbrQGEYppr6f6HxU4t1t6PHAAAAAElFTkSuQmCC dJX3ra+dx9QAAAAASUVORK5CYII= gAAAAASUVORK5CYII= h83gsXK+4otxAAAAABJRU5ErkJggg==

Aircraft Identification Features

Learn to distinguish different aircraft models by their key visual characteristics:

  • A330 vs B777: The B777 doesn’t have winglets, has three wheels per main landing gear strut, and the end of the fuselage is distinct.
  • A320 vs B737: Standard Airbus/Boeing differences; B737s have a distinct engine shape (flattened bottom).
  • B737 Series: Differences between -200, -300, -400, -500, -600, -700, -800, -900ER are primarily by size.
  • B747: All have 4 engines. -200 and -300 do not have winglets, but the -300 has a larger upper deck hump. The -400 has winglets. The SP variant has no winglets and is shorter than others.
  • B757: The -300 is significantly larger than the -200.
  • B767: The -200 has no winglets. The -400 and -300 have
... Continue reading "Aircraft Identification Features and Aerospace Composites" »

Simple Machines: Principles, Types, and Applications

Classified in Technology

Written on in English with a size of 3.42 KB

Common Characteristics of Machines

  • Involve a kind of motion.
  • Involve a kind of force.
  • Make a job easier to do.
  • Need some kind of input to make them work.
  • Produce some kind of output.

Basic Types of Motion

  • Rotary: Going round and round.
  • Oscillating: Swinging backwards and forwards.
  • Linear: In a straight line.
  • Reciprocating: Backwards and forwards in a straight line.

A machine is a device that helps make work easier to perform.

Mechanical Advantage Defined

Mechanical Advantage: When a machine takes a small input force and increases the magnitude of the output force, a mechanical advantage has been produced.

Conservation of Energy Principle

Conservation of Energy: No machine can produce more work than the amount of work that is put into the machine.

The Six Simple

... Continue reading "Simple Machines: Principles, Types, and Applications" »

Cybersecurity Labs for Industrial Control Systems (ICS/SCADA)

Posted by Anonymous and classified in Technology

Written on in English with a size of 12.59 KB

Experiment 01: Network Traffic Analysis in ICS/SCADA

Tools

  • Wireshark

Objectives

  • Use Wireshark to capture and analyze network traffic to detect anomalies such as unauthorized commands or network scanning.

Deliverable

  • A detailed report of traffic patterns and recommendations for mitigations.

Wireshark

Wireshark is a network protocol analyzer used to capture and inspect data packets in real time.

Installing Wireshark on Linux

  1. Step 01: Update package lists: sudo apt update
  2. Step 02: Install Wireshark: sudo apt install wireshark -y
  3. Step 03: Allow non-root packet capture. When prompted, select to allow non-root users to capture packets. If not prompted, run:
    • sudo dpkg-reconfigure wireshark-common
    • sudo usermod -aG wireshark $USER
  4. Step 04: Restart your session (log
... Continue reading "Cybersecurity Labs for Industrial Control Systems (ICS/SCADA)" »

Cisco Router and Switch Configuration: PPP, DHCP, VLAN, RIP, OSPF, EIGRP

Classified in Technology

Written on in English with a size of 4.33 KB

Cisco Router and Switch Configuration

PPP Authentication

1. User Configuration (Matching Passwords on Both Routers)

router(config)# username <hostname_remote_router> password <password>

2. Interface Encapsulation Change

router(config-if)# encapsulation ppp

3.1 Enabling PAP Authentication

router(config-if)# encapsulation ppp
router(config-if)# ppp authentication pap
router(config-if)# ppp pap sent-username <local_username> password <password>

3.2 Enabling CHAP Authentication

router(config-if)# encapsulation ppp
router(config-if)# ppp authentication chap

DHCP Scope Configuration

router(config)# ip dhcp pool <POOL_NAME>
router(config-dhcp)# network <NETWORK_ADDRESS> <NETMASK>
router(config-dhcp)# default-router <GATEWAY_

... Continue reading "Cisco Router and Switch Configuration: PPP, DHCP, VLAN, RIP, OSPF, EIGRP" »

The Internet: A Comprehensive Overview

Classified in Technology

Written on in English with a size of 16.63 KB

The Internet: A Global Network

The Internet is a global network of interconnected computer networks, linking billions of devices worldwide using TCP/IP. It comprises millions of networks, including private, public, academic, business, and government, and provides extensive information resources.

The History of the Internet

The Internet, originating from ARPANet, an experimental network created in the 1960s by the US military, was launched online in 1969 under a contract by ARPA, connecting four US universities. The history of the Internet reflects the continuous growth of this network, connecting millions of people, businesses, governments, schools, and universities.

The ARPANet

The ARPAnet, created in 1969, began with four computers connecting.... Continue reading "The Internet: A Comprehensive Overview" »

Domestic Electrical Installations

Classified in Technology

Written on in English with a size of 14.02 KB

ELECTRICAL INSTALLATIONS:
The electricity used to meet our energy needs (housing, buildings and industries) But there are serious dangers such as fires and electrocucions if facilities do not meet the appropriate security.
Low Voltage Electrotechnical Regulations (REBT) technical conditions and guarantees must be met by electrical installations connected to a low voltage supply in order to:
-Preserve the safety of persons and property.
-Ensure the normal operation of these facilities and prevent disruptions that could cause other facilities and prevent disruptions that could cause other facilities and services.
-Contribute to the technical reliability and efficiency of economic facilities.
Complementary technical instructions (ITC - BT)... Continue reading "Domestic Electrical Installations" »

Cloud Computing Essentials: DFS, HDFS, Security, and Virtualization

Classified in Technology

Written on in English with a size of 319.79 KB

Cloud Computing Essentials

What is a Distributed File System (DFS)?

A distributed file system (DFS) in cloud computing manages data across multiple servers for scalability, fault tolerance, and efficient access. It replicates data for high availability, balances loads, ensures data consistency, and can be cost-effective.

Examples include Hadoop Distributed File System (HDFS), Google File System (GFS), Amazon Elastic File System (EFS), and Azure Blob Storage. DFS is essential for handling large-scale data storage and processing in cloud environments.

HDFS Architecture

HDFS: Hadoop Distributed File System. Google published its paper GFS and on the basis of that HDFS was developed.

It states that the files will be broken into blocks and stored in nodes... Continue reading "Cloud Computing Essentials: DFS, HDFS, Security, and Virtualization" »

Windows Server 2016 Fundamentals: Storage, Networking, and Security

Posted by Anonymous and classified in Technology

Written on in English with a size of 3.56 KB

Windows Server 2016 Disk Storage Types: Basic vs. Dynamic

Windows Server 2016 supports two essential disk storage types: basic disks and dynamic disks. They differ significantly in how they manage partitions and volumes:

  • Basic Disks: Use traditional disk management techniques and contain primary partitions, extended partitions, and logical drives.
  • Dynamic Disks: Do not use traditional partitioning. Dynamic disks offer greater flexibility than basic disks, providing virtually no restriction on the number of volumes that can be created on a single disk.

Purpose and Function of a Subnet Mask

A subnet mask is a crucial component in networking used to divide an IP address into two distinct parts: the network portion and the host portion. Its primary... Continue reading "Windows Server 2016 Fundamentals: Storage, Networking, and Security" »

Mastering Microsoft Access Field Creation and Data Types

Classified in Technology

Written on in English with a size of 3.35 KB

Mastering Microsoft Access Field Creation

Methods for Creating Fields in Access

There are two primary ways to create a field in Microsoft Access:

  1. Adding fields using a predefined template.
  2. Using an existing field copied from another table.

Access Field Templates Collection

Access includes a collection of field templates designed to significantly reduce the time required when setting up new fields.

Understanding Multi-Valued Fields in Access 2007

Multi-valued fields are suitable for specific scenarios, particularly when using Office Access 2007 to interact with information stored in Microsoft Windows SharePoint Services.

Defining Field Properties in Datasheet View

Field properties can be defined in the Datasheet View. Follow these steps:

  1. Open the table
... Continue reading "Mastering Microsoft Access Field Creation and Data Types" »