Notes, summaries, assignments, exams, and problems for University

Sort by
Subject
Level

Part

Posted by Anonymous and classified in Computers

Written on in English with a size of 7.52 KB

Why protection is needed
In multitasking or multi‑user systems, two programs might try to use the same memory at the same time, which can corrupt data or crash the system.
Protection mechanisms isolate user programs from each other and from the OS, and also help detect bugs by checking whether each memory access and instruction obeys certain safety rules.
Overview of 80386 protection
80386 has four protection levels (0–3), where 0 is most trusted (OS kernel) and 3 is least trusted (user apps).
It uses two main mechanisms: segmentlevel protection and page‑level protection, and every memory access is checked against these rules before the actual memory cycle startsSegment‑level protection (idea)
Segment‑level protection has five parts:

... Continue reading "Part" »

Fundamentals of Genetics, Evolution, and Human Anthropology

Posted by Anonymous and classified in Psychology and Sociology

Written on in English with a size of 12.59 KB

Cellular and Genetic Foundations

  • Cells: The fundamental unit of life.
  • Prokaryotes: Lack a nucleus; typically single-celled organisms.
  • Eukaryotes: Possess a nucleus and organelles; can be multi- or single-celled.

Genetics is the study of heredity. DNA structure was revealed in 1953, based on the work of Rosalind Franklin.

  • DNA: A double helix structure composed of four bases (Adenine–Thymine, Cytosine–Guanine).
  • DNA organizes sequentially into histones, forming chromatin, which condenses into chromosomes (humans have 23 pairs).

DNA Replication and Mutational Forces

  • Replication Process: Involves initiation (using helicase), elongation (using polymerase), and termination.
  • Mutations: Errors during replication are the only source of new genetic variation.
... Continue reading "Fundamentals of Genetics, Evolution, and Human Anthropology" »

Fundamental Data Structures and C Programming Concepts

Posted by Anonymous and classified in Computers

Written on in English with a size of 302.19 KB

1. Understanding Arrays and Their Types

An array is a collection of elements of the same data type stored in contiguous memory locations. It is used to store multiple values in a single variable and can be accessed using index numbers. The indexing in an array starts from 0. Arrays help manage and process data efficiently, especially when dealing with large volumes of similar data.

Types of Arrays Based on Dimensions

  1. One-Dimensional Array: It stores data in a linear list format.
  2. Multi-Dimensional Array: It stores data in matrix form (like 2D, 3D arrays), which is useful in applications like image processing and tables.

Types of Arrays Based on Memory Allocation

  1. Static Array: The size of the array is fixed at compile-time. Memory is allocated when
... Continue reading "Fundamental Data Structures and C Programming Concepts" »

Kerberos Protocol Authentication and Network Transmission Media Types

Posted by Anonymous and classified in Computers

Written on in English with a size of 2.55 KB

Kerberos: Secure Network Authentication Protocol

Kerberos is a network authentication protocol that allows systems and users to prove their identity to each other before accessing resources, ensuring secure communication within a network. It is a trusted third-party system that verifies user identities without sending passwords directly across the network.

Key Components and Characteristics of Kerberos

Authentication Protocol Definition

Kerberos is a protocol, meaning it is a set of rules and procedures that govern how devices and users authenticate with each other.

Trusted Third Party (KDC)

Kerberos relies on a trusted third party, known as the Key Distribution Center (KDC), to manage authentication.

Single Sign-On (SSO) Implementation

Kerberos is... Continue reading "Kerberos Protocol Authentication and Network Transmission Media Types" »

Linux File System Architecture and Key Components

Posted by Anonymous and classified in Computers

Written on in English with a size of 3.55 KB

Understanding Linux File Management Subsystem

The Linux File Management Subsystem, an integral part of the Linux kernel and user space, meticulously handles all aspects related to files. This includes their creation, storage, retrieval, permissions, and overall structure. Its primary role is to ensure that data is stored efficiently and securely on disk, remaining readily accessible whenever needed.

Core Components of Linux File Management

File System Interface

  • Provides system calls such as open(), read(), write(), and close(), which user programs utilize to interact with files.
  • Abstracts the underlying complexity of physical storage devices.

Virtual File System (VFS)

  • Acts as a crucial abstraction layer, offering a common interface to various file
... Continue reading "Linux File System Architecture and Key Components" »

The Complete HTTP Request Lifecycle Explained Step-by-Step

Posted by Anonymous and classified in Computers

Written on in English with a size of 4.45 KB

1. Client Initiation and DNS Lookup

  • The user enters a URL or clicks a link in the browser. The browser parses the URL and extracts the domain (e.g., www.example.com).

  • A **DNS lookup** translates this domain into an IP address—acting like a digital phonebook entry.


2. Establishing the TCP Connection

The browser’s operating system (OS) creates a socket and initiates the **TCP three-way handshake** with the server:

  1. SYN: Client sends a synchronization request to the server.
  2. SYN-ACK: Server acknowledges the request and sends its own synchronization.
  3. ACK: Client acknowledges the server's response.

Once this handshake is complete, a full-duplex TCP connection is open and ready for reliable data exchange.


3. Sending the HTTP Request Message

The client constructs... Continue reading "The Complete HTTP Request Lifecycle Explained Step-by-Step" »

Mastering JavaScript Regular Expressions

Posted by Anonymous and classified in Computers

Written on in English with a size of 5.38 KB

JavaScript Regular Expressions: An Introduction

This concise and clear introduction to Regular Expressions (RegExp) in JavaScript covers their usage, modifiers, patterns, methods, and string integration.

Regular Expressions are powerful patterns used to match, search, and manipulate strings. In JavaScript, regular expressions are objects used with string methods to perform pattern matching.


RegExp Syntax Fundamentals

You can define a regular expression using literal notation:

const pattern = /expression/modifiers;

Or by using the RegExp constructor:

const pattern = new RegExp("expression", "modifiers");

RegExp Modifiers (Flags) Explained

Modifiers change how a Regular Expression behaves:

ModifierDescription
gGlobal match (find all matches, not just the
... Continue reading "Mastering JavaScript Regular Expressions" »

Political Economy: Government Decisions & Public Policy

Classified in Economy

Written on in English with a size of 3 KB

Understanding Political Economy

Political economy applies economic principles to the analysis of political decision-making.

Public Goods & Direct Democracy

Economists have studied several methods for choosing levels of public goods in a direct democracy.

Lindahl Pricing & Preference Revelation

Lindahl pricing results in a unanimous decision to provide an efficient quantity of public goods, but relies on honest revelation of preferences.

Majority Voting Challenges

Majority voting may lead to inconsistent decisions regarding public goods if some people's preferences are not single-peaked.

Logrolling: Trading Votes

Logrolling allows voters to express the intensity of their preferences by trading votes. However, minority gains may come at the expense... Continue reading "Political Economy: Government Decisions & Public Policy" »

Human Immunity, Inflammation, and Cancer Biology Essentials

Posted by Anonymous and classified in Biology

Written on in English with a size of 65.27 KB

Body's Defense Systems: An Introduction

  1. Know that innate (inborn) defenses are the first line of defense:
    • Present at birth.
    • Include the surface barriers, skin, and mucous membranes.
  2. Inflammation is the second line of defense:
    • Activated with injury or infectious disease.
  3. Adaptive (acquired) immunity is the third line of defense:
    • Is specific to particular antigens.
    • Has memory.

Innate Immunity Mechanisms

  1. Neonates often have transiently depressed inflammatory function, particularly neutrophil chemotaxis and alternative complement pathway activity.
  2. Elderly persons are at risk for impaired wound healing, usually because of chronic illnesses.
  3. There are three layers of human defense:
    • Physiologic barriers.
    • The inflammatory response.
    • Adaptive (acquired) immunity.
... Continue reading "Human Immunity, Inflammation, and Cancer Biology Essentials" »

Macronutrient Breakdown: Carbohydrates, Sugars, and Fats

Posted by Anonymous and classified in Medicine & Health

Written on in English with a size of 659.13 KB

Understanding Macronutrients and DRIs

Macronutrients

Macronutrients, which include protein, carbohydrates, and fat, are required by the body in relatively large amounts (hence "macro"). All three provide energy. Fiber is a type of carbohydrate.

Dietary Reference Intakes (DRIs)

The Acceptable Macronutrient Distribution Ranges (AMDRs) are part of the DRIs. They recommend a balance of macronutrients, expressed as a percentage of total dietary energy, that is associated with:

  • Maintenance of a healthy weight
  • The lowest risk for chronic disease
  • The lowest risk for nutrient deficiencies

Consuming macronutrients below or above these ranges increases the risk of chronic disease. Notably, the age group with the highest AMDR for fat is children aged 1-3 years.... Continue reading "Macronutrient Breakdown: Carbohydrates, Sugars, and Fats" »