Notes, summaries, assignments, exams, and problems for Technology

Sort by
Subject
Level

Java List Implementation with Search, Insert, and Remove

Classified in Technology

Written on in English with a size of 2.3 KB

Java List Implementation

Class Definition

public class Lista { 
    private Object[] item;
    private int primeiro, ultimo, pos;

    public Lista(int maxTam) {
        this.item = new Object[maxTam];
        this.pos = -1;
        this.primeiro = 0;
        this.ultimo = this.primeiro;
    }
}

Search Method

public Object pesquisa(Object chave) {
    if (this.vazia() || chave == null) {
        return null;
    }
    for (int p = 0; p < this.ultimo; p++) {
        if (this.item[p].equals(chave)) {
            return this.item[p];
        }
    }
    return null;
}

Insert Method

public void insere(Object x) {
    if (this.ultimo >= this.item.length) {
        throw new Exception("Error: List is full");
    } else {
        this.item[this.ultimo]
... Continue reading "Java List Implementation with Search, Insert, and Remove" »

Types of motor

Classified in Technology

Written on in English with a size of 3.6 KB

Video compression is composed of several  basic Processes. The first four are essentially preprocessing steps. Though they are Not considered compression, they can have a dramatic effect on data reduction.

¡Filtering

Images which lack sharp edges are easier to compress than Images which have sharp edges. Thus a preprocessing step in MPEG is to filter The image to reduce the sharp edges (i.E. High frequencies) by filtering.

The number of pixels used in the average is called the number Of taps. MPEG recommends using a seven tap filter.

¡Color space conversion

¡The second preprocessing step is a Conversion from the RGB color scheme of a computer to the YUV color scheme that Television uses. The Y value is termed the luminance and the U & V... Continue reading "Types of motor" »

Primary and Secondary Memory: RAM, ROM, and More

Classified in Technology

Written on in English with a size of 3.12 KB

Primary Memory (Main Memory)

Primary memory holds only the data and instructions on which the computer is currently working. It is generally made up of semiconductor devices. These memories are not as fast as registers. The data and instructions required to be processed reside in the main memory. It is divided into two subcategories: RAM and ROM.

Characteristics of Main Memory:

  • These are semiconductor memories.
  • It is known as the main memory.
  • It is the working memory of the computer.
  • It is faster than secondary memories.
  • A computer cannot run without primary memory.

RAM (Random Access Memory)

RAM (Random Access Memory) is the internal memory of the CPU for storing data, programs, and program results. It is a read/write memory that stores data until... Continue reading "Primary and Secondary Memory: RAM, ROM, and More" »

Detailed Fastening and Window Systems for Stone Wall Cladding

Classified in Technology

Written on in English with a size of 5.57 KB

Fibreboard. 1:50

Dimensiones paneles (general 120x150x0.8). Tornillos a 8cm (menos en la unión dos paneles que es a 4cm) del margen y entre ellos 28 en horizontal y 16 en vertical. Railes de unión de paneles ancho 10 raíl interior de panel ancho 5. General Fastening detail side view. Continuous T 80/100 mm alumninium profile with a thickness of 2mm. Fastened to the L 50/100 spacer (penetra 10cm en muro). Plaster thermal insulation wall plug (penetra 10cm) Ventilated gap 0.8cm thickness board + 19.5cm hasta mortero de limpieza (1cm). 0.8+4+10+5+0.5 General Fastening detail top view. En T tornilllos distribuidos 4+0.8+4. Alu profile (V-profile 0.6mm) para sostener superiormente el panel. Window detail side view. 2layers of mineral wool termal... Continue reading "Detailed Fastening and Window Systems for Stone Wall Cladding" »

Computer Crime and Software Sabotage: Risks and Prevention

Classified in Technology

Written on in English with a size of 4.87 KB

Computer Crime

Any illegal or unauthorized behavior in connection with computers and computer networks. Examples of computer crime include:

  • Computer sabotage
  • Unauthorized access
  • Computer forgery
  • Damage to computer data or programs
  • Computer fraud
  • Computer espionage
  • Unauthorized use of a computer
  • Unauthorized use of a protected computer program
  • Hacking

Software Sabotage

Viruses and other invaders. Also sabotage of hardware or software. Modern computers saboteurs commonly use software. The name given to the saboteurs destructive programs are: Viruses, Worms and Trojan horses. They mimic the behavior of living organisms.

Trojan Horse

Is a program that performs a useful task while at the same time carrying out some secret destructive act. Software hides an enemy... Continue reading "Computer Crime and Software Sabotage: Risks and Prevention" »

Electrical Safety and Installation Certification Guidelines

Classified in Technology

Written on in English with a size of 8.57 KB

Job Hunting

Job hunting is a synonym expression for job search. Seila lives in a beautiful seaside village, but she was born very far from the sea. She spent her childhood in a small town in the Pyrenees, where she had lots of friends. When Seila grew up, her parents sent her abroad, to Dublin, to learn about the Irish culture. There, while Seila was studying, she decided to stay a long period of time in Ireland, and in an Irish village is where Seila is now. How do we read the symbol @ when we write an email address? At. Give a synonym for junk mail. Spam. How do we call the list of telephone subscribers and their telephone numbers? Directory. How do we call the place where we get new emails? Inbox. What's the synonym for the bold expression?... Continue reading "Electrical Safety and Installation Certification Guidelines" »

Aircraft systems

Classified in Technology

Written on in English with a size of 104.39 KB

E-Commerce 2014, 10e (Laudon/Traver)

Chapter 1   The Revolution Continues

1) Retail e-commerce is expected to continue growing at double-digit growth rates in 2013-2014.

Answer  TRUE

2) Over 50% of the world's population is now online.

Answer  FALSE

 3) E-business involves commercial transactions involving an exchange of value across organizational boundaries.

Answer  FALSE

 4) Ubiquity decreases cognitive energy outlays.

Answer  TRUE

  5) The fact that e-commerce is conducted on the basis of universal standards decreases market entry costs for merchants.

Answer  TRUE

6) Price transparency refers to the ability of merchants to segment the market into groups willing to pay different prices.

Answer  FALSE

7) Cost transparency refers to the ability... Continue reading "Aircraft systems" »

Hydroelectric Power Generation: Components and Types

Classified in Technology

Written on in English with a size of 4.2 KB

Hydroelectric Energy: How It Works

Hydroelectric energy is produced by the force of falling water. The capacity to produce this energy is dependent on both the available flow and the height from which the water falls. As water accumulates, it builds up potential energy, which is then converted into mechanical energy. This mechanical energy drives the turbine, and the generator subsequently produces electricity.

Dams: Structure and Function

A dam is constructed to create a reservoir, storing water during periods of high flow in the river. There are two main types of dams:

  • Gravity Dams: These are made from concrete or masonry. They rely on the weight of their material to resist the force of the water. Gravity dams are suited to sites with either
... Continue reading "Hydroelectric Power Generation: Components and Types" »

Understanding Silicon Controlled Rectifiers (SCRs)

Classified in Technology

Written on in English with a size of 2.7 KB

Silicon Controlled Rectifiers (SCRs)

Introduction

SCRs are unidirectional devices, meaning they conduct current in only one direction, unlike TRIACs, which are bidirectional. SCRs are typically triggered by current flowing into the gate, whereas TRIACs can be triggered by either positive or negative current applied to their gate.

Construction

SCRs comprise four semiconductor layers, forming NPNP or PNPN structures with three P-N junctions (J1, J2, J3) and three terminals: anode, cathode, and gate. The anode connects to the p-type material, the cathode to the n-type layer, and the gate to the p-type material nearest the cathode.

These layers alternate between p- and n-type silicon with added dopants. Junctions are formed through diffusion or alloying.... Continue reading "Understanding Silicon Controlled Rectifiers (SCRs)" »

Ferrous and Non-Ferrous Metals: Properties & Uses

Classified in Technology

Written on in English with a size of 2.93 KB

Ferrous Metals

Iron minerals from the Earth's surface undergo different processes to obtain pure iron and its alloys: steel and cast iron.

Percentage of Carbon:

  • Pure Iron: The concentration of carbon is between 0.008% and 0.03%.
  • Steel: Between 0.03% and 1.76%.
  • Cast Iron: Between 1.76% and 6.67%.

Pure Iron

Advantages: Good magnetic properties. Disadvantages: Melts only at high temperatures; difficult to machine. Uses: Electronics and electrical components.

Cast Iron

Properties: Very hard and resistant. Uses: Machine parts, lamps, pistons, drain covers.

Steel

Properties: Very hard and resistant; easy to weld. Uses: Construction, boats, tools, screws, domestic appliances, etc.

Metallurgy

Iron metal is washed to eliminate any impurities. It is crushed and sieved... Continue reading "Ferrous and Non-Ferrous Metals: Properties & Uses" »