Notes, abstracts, papers, exams and problems of Computers

Sort by
Subject
Level

Shell script

Classified in Computers

Written at on English with a size of 2.47 KB.

Ejercicio de descuentos:

#!/bin/bash

read -p "¿Desea el billete también de vuelta? (s/n): " idavuelta

until [ $idavuelta=="s" ] || [ $idavuelta=="n" ]; do

read -p "¿Desea el billete también de vuelta? (s/n): " idavuelta

done

read -p "¿Tiene carnet joven? (s/n): " carnetjoven

until [ $carnetjoven="s" ] || [ $carnetjoven="n" ]; do

read -p "¿Tiene carnet joven? (s/n): " carnetjoven

done

descuento=0 billete=20

if [ $idavuelta="s" ]; then

descuento=20

billete=" expr $billete \* 2'

fi

if [ $carnetjoven="s" ]j then

descuento=30

fi

costefinal=`expr $billete \* \( 100 - $descuento \) / 100`

echo "El precio final del billete es $costefinal"



Ejercicio de medias:

#!/bin/bash

acu=0

cont=0

read -p "Introduce un numero: " num

while [ $num -ne 0 ]; do

acu=`expr $acu + $num`

cont=... Continue reading "Shell script" »

bfjsl

Classified in Computers

Written at on English with a size of 1.33 KB.

The internet is currently the most important search tool in the world because it shows millions of results to a question in seconds and not only that but we can visit sites rich in information from which you can learn a lot. The internet has many functions besides search results has the ability to reproduce videos, music, download power point presentations, search images, social networks, current news and endless things. The Internet's greatest weakness is the lack of either phone, light and signal without these elements the internet modem is simply a useless object. The internet is a free place which makes it a place not completely safe as viruses, insecure citios, hackers inhabit this place and not only that but they can ruin your pc or your
... Continue reading "bfjsl" »

IIII

Classified in Computers

Written at on English with a size of 2.88 KB.

Spatial                       
clear all;
clc;
a=imread('coin.Jpg');
[row col dim]=size(a);
i=1;j=1;
for x=1:10:row;
    for y=1:10:col
    c(i,j)=a(x,y);
    j=j+1;
end
j=1;
i=i+1;
end
figure(1);
subplot(2,2,1);
imshow(a);
figure(2);
subplot(2,2,2);
imshow(c);
figure(3);
imagesc(c);
colormap('gray');
Digital Negative
clc;
a=imread('Cameraman.Jpg');
f=double(a);
[row col dim]=size(f);
b=255;
g=b-a;
subplot(2,2,1);
imshow(a);
title('Original Image');
subplot(2,2,3);
colormap(gray);
imshow(g);
title('Negative Image');
Threshold
clc;
a=imread('coin.Jpg');
c=rgb2gray(a);
f=double(c);
[row col dim]=size(f);
t=input('Enter the threshold value=');
for x=1:1:row
    for y=1:1:col
    if f(x,y)=0;
else
    g(x,y)=255;
end
end
end
subplot(2,2,1);
imshow(a);
title('Original Image'
... Continue reading "IIII" »

How do you figure out step 3 for production cost report

Classified in Computers

Written at on English with a size of 1.16 KB.

Clark-Groves Mechanism: A process that will get individuals to truthfully reveal their preferences for the public good. Suppos the public good provider is making decision on whether to build a bridge, ie, the public good in question is discrete - 0 or 1. And the goal is to achieve efficiency.

Step 1 : Invidivual report their value for the bridge vi, no need to report the truth vi#vi*

Step 2 : Add up reported value

Step 3 : If, (Sum of reports - cost of bridge)> 0 => buildt the bridge, If ( Sum of reports - Cost of bridges)< 0=""> don't build the bridge.

Step 4 : If the individual's value was decisive, (Sum of other's report) < (cost="" of="" bridge)="">< (sum="" of="" all="" reports)="">

Charge the individual = (cost of bridge)... Continue reading "How do you figure out step 3 for production cost report" »

the new phone

Classified in Computers

Written at on English with a size of 1.2 KB.

The new Megaphone10+.
They are available in 5 colours: in black, in White, in grey, inblue and in red and all of them look really cool!
The covers of these mobiles are made of metal, we don't use plastic so it's better for the environment. 
They come with headphones and a charger.
You can use this ultimate generation mobile pone to make profesional photos or listen music with they speakers of good quality too. It also have 200GB of memory that you can use to sabe a lot of documents, games, archives or photos.
They include a lot of useful applications for example a compass, a clock, maps, a calculator, mail or an app that you can use to write reminders. There is a very good relationship quality Price because this pone only costs 300 euros and it
... Continue reading "the new phone" »

fdfg

Classified in Computers

Written at on English with a size of 1.19 KB.

Compara dos impresoras
A printer is a device for obtaining paper documents from a computer.
Here are the guidelines for finding which printer is the best for
you.
The best printer depends on the intended use you will give it. In
spite of the cheap laser printing technology generally, it is more
common to find an inkjet printer with a lot of functions cheaper
than a laser one.
If we are going to use the printer just twice in our life, the best
decision would be an inkjet printer. If our domestic use is going to
be continuous or intensive, or for example, we will use it at the
office, the best option is a laser printer.But, if we are going to
work with pictures, inkjet printer is more professional.

Decadactilar fingerprints

Classified in Computers

Written at on English with a size of 2.79 KB.

Security:

This principle requires the person or agency in control of the personal data to implement organizational and technical measures to ensure the data is secure. It requires the controller to offer protection against:

  • Unlawful destruction or accidental loss
  • Alteration
  • Unauthorized disclosure or access
  • All other form of unlawful processing

In particular when the data is transmitted over a network. If the controller is not doing the processing themselves they must provide guarantees that the specified security measures are being carried out.

Pre Processing a Biometrics Image for Feature Extraction:

Case Study: Finger Prints:

Fingerprint ID is often based on minutiae and or the location or the direction of fingerprint of the ridge endings and bifurcations... Continue reading "Decadactilar fingerprints" »

Flash drive

Classified in Computers

Written at on English with a size of 3.02 KB.

Expected to help put out tables and chairs this afternoon. We hope the evening will be as successful as last year’s, when a lot of money was raised by the parents for the new computer room 11-This morning laptops on the train. –My computer hard drive –Put the memory USB port –I’m sorry, the webcam isn’t working.–My computer screen me headaches. 12- downloaded –surf –online –broadband –screen engine -13 -I’ve tried sending this email several times, but it keeps bouncing back.-Unfortunately, I deleted your last email by mistake-Can you forward this email to all your friends?-I don’t usually check my email more than once a day.-I typed in the wrong email address and it went to the wrong person. I was very embarrassed!
... Continue reading "Flash drive" »

Cascade model software engineering

Classified in Computers

Written at on English with a size of 6.8 KB.

Q1. State and explain various workflows.
The term workflow is used to mean a thread of cohesive and mostly sequential activities. Workflows are mapped to product artifacts and to project. There are seven top-level workflows:
??Management workflow: controlling the process and ensuring win conditions for all stakeholders
??Environment workflow: automating the process and evolving the maintenance environment
??Requirements workflow: analyzing the problem space and evolving the requirements artifacts
??Design workflow: modeling the solution and evolving the architecture and design artifacts
??Implementation workflow: programming the components and evolving the implementation and deployment artifacts
??Assessment workflow: assessing the trends in
... Continue reading "Cascade model software engineering" »

Algorithms

Classified in Computers

Written at on English with a size of 1.86 KB.

1.A) f(n) = 10 n^2 log (n^10) + n log (n^5) => o(n^2) || 1.B) f(n) = 2^100 n^4 + n^3 => o (n^4)

2.A) 2 nested for inside for =>  n [n+n] = 2n^2

2.B) no. Of primitive operations (1 comparison & 1 return tot=2), 1 for println, (1 for division & 1 for recursive call) => running time is o(n)

2.C) Assignment 1, comparison 1, division 1 & assignment 1 tot=2, addition 1 & assignment 1 tot= 2 (while n), return 1 => running time o(n)

3.A) c2g(n) above f(n) and c1g(n) under f(n)

for constant c1 and no f(n) is omega (g(n)) for every n>=no || for constant c2 and no f(n) is O(g(n)) for every n>=no then f(n) = theta (g(n))

3.B) cg(n) above f(n)

for constant c and no   f(n)= O(g(n))

3.C) cg(n) under f(n)

for constant c... Continue reading "Algorithms" »