Notes, abstracts, papers, exams and problems of Computers

Sort by
Subject
Level

Shell script

Classified in Computers

Written at on English with a size of 2.47 KB.

Ejercicio de descuentos:

#!/bin/bash

read -p "¿Desea el billete también de vuelta? (s/n): " idavuelta

until [ $idavuelta=="s" ] || [ $idavuelta=="n" ]; do

read -p "¿Desea el billete también de vuelta? (s/n): " idavuelta

done

read -p "¿Tiene carnet joven? (s/n): " carnetjoven

until [ $carnetjoven="s" ] || [ $carnetjoven="n" ]; do

read -p "¿Tiene carnet joven? (s/n): " carnetjoven

done

descuento=0 billete=20

if [ $idavuelta="s" ]; then

descuento=20

billete=" expr $billete \* 2'

fi

if [ $carnetjoven="s" ]j then

descuento=30

fi

costefinal=`expr $billete \* \( 100 - $descuento \) / 100`

echo "El precio final del billete es $costefinal"



Ejercicio de medias:

#!/bin/bash

acu=0

cont=0

read -p "Introduce un numero: " num

while [ $num -ne 0 ]; do

acu=`expr $acu + $num`

cont=... Continue reading "Shell script" »

In order for changes to a Host's Firewall to be committed, what command must be used?

Classified in Computers

Written at on English with a size of 4.18 KB.

Create a domain: Server Manager, Add Roles and Features, Active Directory Domain Services. Add a computer to the domain: Control Panel, System, Change Settings, Computer Name, Change, Member of, Input domain. Create local and domain accounts and place the user accounts into built-in groups: Domain Accounts: Control Panel, System, Administrative Tools, AD Users and Computers, Right click new user and create the user, Right click on the user you created, Add to group, Find now, Click on group to add. Local Accounts: Login to local host, System, Administrative Tools, Computer Management, Local Users and Groups, Right click on users, New user, Right click on the user you just made, Click on properties, Member of, Add to a group. Add Server 2008
... Continue reading "In order for changes to a Host's Firewall to be committed, what command must be used?" »

Universidad

Classified in Computers

Written at on English with a size of 1.24 KB.

5/1. GitHub is a version control system that allows you to develop applications and generate code. The advantage of using it is that groups can be made, that means, X number of people (collaborators) can carry out an application at the same time, so if they are well synchronized, that time is saved, since the code does not have to be carried out exclusively by one person. In addition, after generating the code and verifying that it works, it can be updated. This means it allows the code of that app to be up to date in a "cloud" and can be downloaded from any computer and continue working.


Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway

Classified in Computers

Written at on English with a size of 4.69 KB.

HOSTàROUTER: 1

ENABLE

CONFIGURE TERMINAL

INTERFACE GIGABITETHERNET 0/0

IP ADDRESS 192.168.1.126 255.255.255.224

NO SHUTDOWN

EXIT

INTERFACE GIGABITEETHERNET 0/1

IP ADDRESS 192.168.1.158 255.255.255.240

NO SHUTDOWN

HOSTàSWITCH 2

ENABLE

CONFIFURE TERMINAL

INTERFACE VLAN 1

IP ADDRESS 192.168.1.157 255.255.255.240

NO SHUTDOWN

HOST/ROUTER 3

EXIT (LLEGAR AL CONFIGURE TERMINAL)

HOSTNAME MIDDLE

ENABLE SECRET CISCO

LINE CONSOLE 0

PASSWORD CLASS

LOGIN

EXIT

SECURITY PASSWORD MIN-LENGTH 10

SERVICE PASSWORD ENCRYPTION

IP DOMAIN-NAME CISCO

CRYPTON KEY GENERATE RSA

1024

EXIT

USERNAME CICLOS

LINE VTY 0 4

LOGIN LOCAL

TRANSPORT INPUT SSH

EXIT

INTERFACE GIBABITEETHERNET 0/0

IPV6 ADDRESS 2001:DB8:ACAD:A::1/64

IPV6 ADDRESS FE80::1 LIN

EXIT

GIBABITETHERNET 0/1

IPV6 ADDRESS 2001:DB8:ACAD:B::1/64

IPV6

... Continue reading "Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway" »

How do you figure out step 3 for production cost report

Classified in Computers

Written at on English with a size of 1.16 KB.

Clark-Groves Mechanism: A process that will get individuals to truthfully reveal their preferences for the public good. Suppos the public good provider is making decision on whether to build a bridge, ie, the public good in question is discrete - 0 or 1. And the goal is to achieve efficiency.

Step 1 : Invidivual report their value for the bridge vi, no need to report the truth vi#vi*

Step 2 : Add up reported value

Step 3 : If, (Sum of reports - cost of bridge)> 0 => buildt the bridge, If ( Sum of reports - Cost of bridges)< 0=""> don't build the bridge.

Step 4 : If the individual's value was decisive, (Sum of other's report) < (cost="" of="" bridge)="">< (sum="" of="" all="" reports)="">

Charge the individual = (cost of bridge)... Continue reading "How do you figure out step 3 for production cost report" »

Law 19983 on

Classified in Computers

Written at on English with a size of 3.57 KB.

Process for research Paper: first we interpret result of research and then proveo rr disprove Hypothesis

Créate research Question: What are you interés in?...What do you have to know about It?

Narrow down research: to Summarize, to put only What serves us

Importance of citing Sources: because it gives you credibility, avoides problems of law And plagiarism

Reseacrh process: 1) research Question 2) background information 3) hypothesis 4) design experiment

 5) collect data 6) Analyze results 7) publis findings

Explain the process Neede o prepare for a research: define, explore, indentify, related

Explain the Requierements to become a process information: analyze/evaluate, sort, Syntnetize, test

Explain the process in Order to think critically

Question... Continue reading "Law 19983 on" »

the new phone

Classified in Computers

Written at on English with a size of 1.2 KB.

The new Megaphone10+.
They are available in 5 colours: in black, in White, in grey, inblue and in red and all of them look really cool!
The covers of these mobiles are made of metal, we don't use plastic so it's better for the environment. 
They come with headphones and a charger.
You can use this ultimate generation mobile pone to make profesional photos or listen music with they speakers of good quality too. It also have 200GB of memory that you can use to sabe a lot of documents, games, archives or photos.
They include a lot of useful applications for example a compass, a clock, maps, a calculator, mail or an app that you can use to write reminders. There is a very good relationship quality Price because this pone only costs 300 euros and it
... Continue reading "the new phone" »

Flash drive

Classified in Computers

Written at on English with a size of 3.02 KB.

Expected to help put out tables and chairs this afternoon. We hope the evening will be as successful as last year’s, when a lot of money was raised by the parents for the new computer room 11-This morning laptops on the train. –My computer hard drive –Put the memory USB port –I’m sorry, the webcam isn’t working.–My computer screen me headaches. 12- downloaded –surf –online –broadband –screen engine -13 -I’ve tried sending this email several times, but it keeps bouncing back.-Unfortunately, I deleted your last email by mistake-Can you forward this email to all your friends?-I don’t usually check my email more than once a day.-I typed in the wrong email address and it went to the wrong person. I was very embarrassed!
... Continue reading "Flash drive" »

Cascade model software engineering

Classified in Computers

Written at on English with a size of 6.8 KB.

Q1. State and explain various workflows.
The term workflow is used to mean a thread of cohesive and mostly sequential activities. Workflows are mapped to product artifacts and to project. There are seven top-level workflows:
??Management workflow: controlling the process and ensuring win conditions for all stakeholders
??Environment workflow: automating the process and evolving the maintenance environment
??Requirements workflow: analyzing the problem space and evolving the requirements artifacts
??Design workflow: modeling the solution and evolving the architecture and design artifacts
??Implementation workflow: programming the components and evolving the implementation and deployment artifacts
??Assessment workflow: assessing the trends in
... Continue reading "Cascade model software engineering" »

What is the time of the pet

Classified in Computers

Written at on English with a size of 1.85 KB.

1.A) f(n) = 10 n^2 log (n^10) + n log (n^5) => o(n^2) || 1.B) f(n) = 2^100 n^4 + n^3 => o (n^4)

2.A) 2 nested for inside for =>  n [n+n] = 2n^2

2.B) no. Of primitive operations (1 comparison & 1 return tot=2), 1 for println, (1 for division & 1 for recursive call) => running time is o(n)

2.C) Assignment 1, comparison 1, division 1 & assignment 1 tot=2, addition 1 & assignment 1 tot= 2 (while n), return 1 => running time o(n)

3.A) c2g(n) above f(n) and c1g(n) under f(n)

for constant c1 and no f(n) is omega (g(n)) for every n>=no || for constant c2 and no f(n) is O(g(n)) for every n>=no then f(n) = theta (g(n))

3.B) cg(n) above f(n)

for constant c and no   f(n)= O(g(n))

3.C) cg(n) under f(n)

for constant c... Continue reading "What is the time of the pet" »