Notes, summaries, assignments, exams, and problems for Technology

Sort by
Subject
Level

Essential Engineering & Construction Terminology

Classified in Technology

Written on in English with a size of 3.86 KB

Engineering and Construction Glossary

This glossary provides definitions for key terms used in engineering, construction, and design projects, including their Spanish translations where applicable.

Cross-section (Sección transversal)

A cross-section gives a cutaway view of the joint between two panels.

Note (Notas)

A note gives a brief description or a reference to another related drawing.

Plan (Plano)

A plan gives a view of the whole deck, from above.

Schematic (Esquemático)

A schematic gives a simplified representation of a network of air ducts.

Specification (Especificación)

A specification gives detailed written technical descriptions of a panel.

Amplified

Amplified: made greater.

Elevation (Elevación)

Elevation gives a view of all the panels, from... Continue reading "Essential Engineering & Construction Terminology" »

Technology and Digital Literacy Vocabulary

Classified in Technology

Written on in English with a size of 3.4 KB

  • Limited: kept within a particular size
  • Potential: possible when the necessary conditions exist
  • Excessive: more than is necessary
  • Peer pressure: the influence of people who are similar age
  • Disadvantaged: in a situation in which you are less likely to succeed than others
  • Irritable: becoming annoyed very easily
  • Expose: to remove what is covering something that is very large
  • Awash: having an amount of something that is very large
  • Artificial: not natural
  • Upgrade: to improve something so that it is of a higher quality
  • Zip a file: to reduce the size of a computer file
  • Save: to make sure that a computer keeps information
  • Browse the internet: to look at information on the internet
  • Plug sth in: to connect a piece of electrical equipment to an electricity supply
  • Sync
... Continue reading "Technology and Digital Literacy Vocabulary" »

Technical Drawing Fundamentals: Scales, Dimensioning, and Views

Classified in Technology

Written on in English with a size of 2.78 KB

Graphic Design Fundamentals

Graphic design involves creating drawings to represent objects, products, or to transmit ideas, events, and messages, while considering function, cost, size, shape, quality, and environmental impact.

Understanding Drawing Scales

Scale is the relationship between the size of a drawing and the actual size of the object:

  • 1:2 (Scaling down): The drawing is smaller than the real object; used for large items like houses, cars, or planes.
  • 1:1 (Full scale): The drawing matches the real-life measurements; used for objects like pencil cases.
  • 2:1 (Scaling up): The drawing is larger than the real object; used for small items like bacteria or viruses.

Isometric Perspective

Isometric means equal measure. It utilizes 120° and 30° angles... Continue reading "Technical Drawing Fundamentals: Scales, Dimensioning, and Views" »

Cyber Attack Definitions: Vishing, Ransomware, and Botnets

Classified in Technology

Written on in English with a size of 3.35 KB

Common Cyber Attack Definitions and Techniques

Vishing: Voice Phishing Attacks

Using telephone calls to commit a phishing attack.

Smishing: SMS Phishing

Using SMS (text messages) to commit a phishing attack.

Pharming and DNS Poisoning

Directs users to a fake website when they enter the URL of a genuine site.

Whaling: Targeting High-Value Individuals

A specialized type of phishing attack specifically targeting high-ranking executives, such as CEOs, via email.

Salami Slicing Technique

A financial crime where small, often undetectable amounts of money are stolen from a large number of accounts. The cumulative gain is significant, but individual victims rarely notice the loss.

Data Diddling

Altering data, typically by changing information before or during... Continue reading "Cyber Attack Definitions: Vishing, Ransomware, and Botnets" »

Computer Basics and Network Fundamentals Explained

Classified in Technology

Written on in English with a size of 5.59 KB

Understanding Computer Systems and Networking Essentials

Command-Line Interface Basics

Command-line interfaces (CLIs) are often replaced by graphical user interfaces (GUIs) and menu-driven interfaces.

Accessing the Command Prompt in Windows

To access the command prompt in Windows: Start > Programs > Accessories > Command Prompt. Alternatively, you can type cmd in the Run dialog or search bar.

Essential Computer Tools and Settings

The Windows Control Panel and System Settings offer various useful tools and configurations, typically categorized as:

  • Programs
  • Hardware and Sound
  • User Accounts and Family Safety
  • Network and Internet
  • Appearance and Personalization
  • System and Security

Key Windows System Utilities

  • Computer Properties

    Provides basic information

... Continue reading "Computer Basics and Network Fundamentals Explained" »

Benefits of Recycling Different Materials and Water Intoxication Symptoms

Classified in Technology

Written on in English with a size of 2.18 KB

STEEL

Scrap can be sorted easily using magnetism. If the metal is galvanized (coated with zinc), the zinc is fully recyclable. If it is stainless steel, other metals mixed with the iron, such as chromium and nickel, can also be recovered and recycled.

GLASS

Sorting is critical, as there are key differences between the clear and colored material used in bottles and jars, and the high-grade material used in engineering applications, which contains traces of metals.

COPPER

Scarcity makes recycling especially desirable and justifies the cost of removing insulation from electric wires, which are a major source of scrap. Pure metal can also be recovered from alloys derived from it, notably brass (which also contains quantities of zinc and often lead)... Continue reading "Benefits of Recycling Different Materials and Water Intoxication Symptoms" »

Understanding Cyber Threats: Malware, Trojans, and Security

Classified in Technology

Written on in English with a size of 2.92 KB

Understanding Cyber Threats and Security Measures

1. Malware: Any malicious program or code that is harmful to systems.

2. Trojan Horse: A Trojan horse is a program that appears harmless but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer. It is not able to replicate itself.

3. Worm: A computer worm is a standalone malware computer program that replicates itself to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Worms almost always cause at least some harm to the network.

4. Spam: Spam refers to unsolicited, unwanted,... Continue reading "Understanding Cyber Threats: Malware, Trojans, and Security" »

Harnessing Renewable Energy: Eolian and Tidal Power Explained

Classified in Technology

Written on in English with a size of 3.29 KB

EOLIC ENERGY

1. How It Is Obtained and Its Characteristics

  • It is obtained from the wind's kinetic energy.
  • The sun heats the Earth's air unevenly. The temperature differences in different locations cause air masses to move.

Characteristics of Wind:

  • Speed: Higher wind speed results in greater power generation.
  • Permanent Wind Zones: Areas with consistent wind patterns are ideal for wind energy production.
  • Elevation: Wind speeds are typically higher at higher elevations.
  • Power Density: Measured in watts per square meter (W/m²).

2. Parts of a Wind Power Plant

  • Propeller (Blades):
    • Number of blades varies depending on the motor (typically one to six).
    • Made from lightweight materials like carbon fiber.
    • Spin the shaft, which drives the generator.
    • Types: Horizontal-
... Continue reading "Harnessing Renewable Energy: Eolian and Tidal Power Explained" »

SQL Cheat Sheet: Commands, Syntax, and Examples

Classified in Technology

Written on in English with a size of 3.5 KB

SQL Cheat Sheet

Insert Data

INSERT INTO tabla(col1,col2) VALUES(val2,val2)
INSERT INTO tabla SET col1='va1',col2='val2'
INSERT INTO ON DUPLICATE KEY UPDATE ...
REPLACE INTO tabla VALUES ...

Update Data

UPDATE tabla SET col1='val1' WHERE ...
UPDATE tabla SET col1=(SELECT ...)

Delete Data

DELETE FROM tabla WHERE cond

Transactions

TRANSACTIONS:
START TRANSACTION;
INSERT INTO ...;
SAVEPOINT prueba;
INSERT INTO ...;
ROLLBACK TO SAVEPOINT prueba;
SET autocommit=0;
COMMIT;

Locking

LOCK TABLES tabla1 WRITE, tabla2 WRITE;
UNLOCK TABLES;

Stored Procedures

CREATE PROCEDURE nombre()
BEGIN
DECLARE a INT;
SELECT x INTO a ...;
END;
CALL procedure();

Functions

CREATE FUNCTION nombre(m VARCHAR(255))
RETURNS INT
BEGIN
DECLARE existe INT DEFAULT 1;
DECLARE tot, k INT;
DECLARE cur_1 CURSOR... Continue reading "SQL Cheat Sheet: Commands, Syntax, and Examples" »

Essential Road Safety and Driving Practices

Classified in Technology

Written on in English with a size of 1.72 KB

Night Driving and Visibility

When driving at night, which lights should you be using?

You should be able to stop within the distance you can see ahead.

When driving in fog, what lights are best?

  • Low beams, or
  • Fog lights

Positioning and Signaling

Where should you position your car to make a left turn from a two-way street?

Use the lane nearest the center of the road.

When should you use your horn?

  • When coming out of a dark alley.

Intersection Rules

What should be done if two cars enter an uncontrolled intersection simultaneously?

The driver to the left must yield to the driver on the right.

What is good practice when nearing an intersection?

  • Slow down and be prepared to stop.

Road Markings

Where would yellow center lines usually be found?

On a two-way road (no... Continue reading "Essential Road Safety and Driving Practices" »