Notes, abstracts, papers, exams and problems of Computers

Sort by
Subject
Level

Shell script

Classified in Computers

Written at on English with a size of 2.47 KB.

Ejercicio de descuentos:

#!/bin/bash

read -p "¿Desea el billete también de vuelta? (s/n): " idavuelta

until [ $idavuelta=="s" ] || [ $idavuelta=="n" ]; do

read -p "¿Desea el billete también de vuelta? (s/n): " idavuelta

done

read -p "¿Tiene carnet joven? (s/n): " carnetjoven

until [ $carnetjoven="s" ] || [ $carnetjoven="n" ]; do

read -p "¿Tiene carnet joven? (s/n): " carnetjoven

done

descuento=0 billete=20

if [ $idavuelta="s" ]; then

descuento=20

billete=" expr $billete \* 2'

fi

if [ $carnetjoven="s" ]j then

descuento=30

fi

costefinal=`expr $billete \* \( 100 - $descuento \) / 100`

echo "El precio final del billete es $costefinal"



Ejercicio de medias:

#!/bin/bash

acu=0

cont=0

read -p "Introduce un numero: " num

while [ $num -ne 0 ]; do

acu=`expr $acu + $num`

cont=... Continue reading "Shell script" »

In order for changes to a Host's Firewall to be committed, what command must be used?

Classified in Computers

Written at on English with a size of 4.18 KB.

Create a domain: Server Manager, Add Roles and Features, Active Directory Domain Services. Add a computer to the domain: Control Panel, System, Change Settings, Computer Name, Change, Member of, Input domain. Create local and domain accounts and place the user accounts into built-in groups: Domain Accounts: Control Panel, System, Administrative Tools, AD Users and Computers, Right click new user and create the user, Right click on the user you created, Add to group, Find now, Click on group to add. Local Accounts: Login to local host, System, Administrative Tools, Computer Management, Local Users and Groups, Right click on users, New user, Right click on the user you just made, Click on properties, Member of, Add to a group. Add Server 2008
... Continue reading "In order for changes to a Host's Firewall to be committed, what command must be used?" »

Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway

Classified in Computers

Written at on English with a size of 4.69 KB.

HOSTàROUTER: 1

ENABLE

CONFIGURE TERMINAL

INTERFACE GIGABITETHERNET 0/0

IP ADDRESS 192.168.1.126 255.255.255.224

NO SHUTDOWN

EXIT

INTERFACE GIGABITEETHERNET 0/1

IP ADDRESS 192.168.1.158 255.255.255.240

NO SHUTDOWN

HOSTàSWITCH 2

ENABLE

CONFIFURE TERMINAL

INTERFACE VLAN 1

IP ADDRESS 192.168.1.157 255.255.255.240

NO SHUTDOWN

HOST/ROUTER 3

EXIT (LLEGAR AL CONFIGURE TERMINAL)

HOSTNAME MIDDLE

ENABLE SECRET CISCO

LINE CONSOLE 0

PASSWORD CLASS

LOGIN

EXIT

SECURITY PASSWORD MIN-LENGTH 10

SERVICE PASSWORD ENCRYPTION

IP DOMAIN-NAME CISCO

CRYPTON KEY GENERATE RSA

1024

EXIT

USERNAME CICLOS

LINE VTY 0 4

LOGIN LOCAL

TRANSPORT INPUT SSH

EXIT

INTERFACE GIBABITEETHERNET 0/0

IPV6 ADDRESS 2001:DB8:ACAD:A::1/64

IPV6 ADDRESS FE80::1 LIN

EXIT

GIBABITETHERNET 0/1

IPV6 ADDRESS 2001:DB8:ACAD:B::1/64

IPV6

... Continue reading "Refer to the exhibit. When a static IP address is being configured on the host, what address should be used for the default gateway" »

the new phone

Classified in Computers

Written at on English with a size of 1.2 KB.

The new Megaphone10+.
They are available in 5 colours: in black, in White, in grey, inblue and in red and all of them look really cool!
The covers of these mobiles are made of metal, we don't use plastic so it's better for the environment. 
They come with headphones and a charger.
You can use this ultimate generation mobile pone to make profesional photos or listen music with they speakers of good quality too. It also have 200GB of memory that you can use to sabe a lot of documents, games, archives or photos.
They include a lot of useful applications for example a compass, a clock, maps, a calculator, mail or an app that you can use to write reminders. There is a very good relationship quality Price because this pone only costs 300 euros and it
... Continue reading "the new phone" »

Ils half scale deflection

Classified in Computers

Written at on English with a size of 1.96 KB.

LOOKUP function uses a TRUE lookup type. with NESTED function,you include that function inside.Excel provides CONDITIONAL FORMAT tools, tools you can identify.Enter a row_num,column_num,area_num,excel display ERROR MESSAGE.30 MOVING AVERAGE trendline is used to smooth out the data. goal seek uses AN ITERATIVE approach to finding the right input. X-AXISLABELS identify the category plotted on the x-axis. Excel rounds the display, EQUAL OR GREATER THAN HALF. excel can contain CONSTANT CELL REFERENCE. in this case you enter range as FIRST argument. Dun and Bradstreet 1 to 4. COUNTIF(F3:F13,>_=1). 15DIGITS. Select the cell containing the text you want to change.Click the down arrow next to the size box on the format bar. Typically, the
... Continue reading "Ils half scale deflection" »

Who did George try to find out

Classified in Computers

Written at on English with a size of 1.09 KB.

Compara dos impresoras
A printer is a device for obtaining paper documents from a computer.
Here are the guidelines for finding which printer is the best for
you.
The best printer depends on the intended use you will give it. In
spite of the cheap laser printing technology generally, it is more
common to find an inkjet printer with a lot of functions cheaper
than a laser one.
If we are going to use the printer just twice in our life, the best
decision would be an inkjet printer. If our domestic use is going to
be continuous or intensive, or for example, we will use it at the
office, the best option is a laser printer.But, if we are going to
work with pictures, inkjet printer is more professional.

What is the time of the pet

Classified in Computers

Written at on English with a size of 2.81 KB.

What is a shapefile?

A shapefile is an Esri vector data storage format for storing the location, shape, and attributes of geographic features. It is stored as a set of related files and contains one feature class. Google Earth, an Online Satellite Imagery (OSI) Technique, is a tool for generating shapefiles.

Question 2: In your project, what geometric analysis tool have you used? How was the experience? Give one example / some examples.

One example:

We used ArcGIS to create a few population maps of To Kwa Wan.

We first selected the population and working population data from the C&SD department. Second, we opened TPUs with the population data in ArcGIS. The area of the TPUs was then calculated based on Hong Kong 1980 Grid, and hence the population... Continue reading "What is the time of the pet" »

jruefu4

Classified in Computers

Written at on English with a size of 1.43 KB.

Dear Sir or Madam,I am writting to complain about some tracksuit pants, I received today, because they were not the same I ordened the 29th of October.I ordered the pants from the BershkaxBillie Eilish collection specifically the white ones with butterflies, their reference number is as follows: 6845/700/812.i on the other hand I have received some electric blue jeans push-up the reference number is:6845/700/800. I made the order online, in another electronic mail I will pass the code QR to be able to make the return or solve the problem.I would appreciate it if you could contact me to explain how we could solve this problem or if possible send me the corresponding order.Thank you so much for reading my e-mail.Yours sincerely.Maria Sanchez

Cascade model software engineering

Classified in Computers

Written at on English with a size of 6.8 KB.

Q1. State and explain various workflows.
The term workflow is used to mean a thread of cohesive and mostly sequential activities. Workflows are mapped to product artifacts and to project. There are seven top-level workflows:
??Management workflow: controlling the process and ensuring win conditions for all stakeholders
??Environment workflow: automating the process and evolving the maintenance environment
??Requirements workflow: analyzing the problem space and evolving the requirements artifacts
??Design workflow: modeling the solution and evolving the architecture and design artifacts
??Implementation workflow: programming the components and evolving the implementation and deployment artifacts
??Assessment workflow: assessing the trends in
... Continue reading "Cascade model software engineering" »

What is the time of the pet

Classified in Computers

Written at on English with a size of 1.85 KB.

1.A) f(n) = 10 n^2 log (n^10) + n log (n^5) => o(n^2) || 1.B) f(n) = 2^100 n^4 + n^3 => o (n^4)

2.A) 2 nested for inside for =>  n [n+n] = 2n^2

2.B) no. Of primitive operations (1 comparison & 1 return tot=2), 1 for println, (1 for division & 1 for recursive call) => running time is o(n)

2.C) Assignment 1, comparison 1, division 1 & assignment 1 tot=2, addition 1 & assignment 1 tot= 2 (while n), return 1 => running time o(n)

3.A) c2g(n) above f(n) and c1g(n) under f(n)

for constant c1 and no f(n) is omega (g(n)) for every n>=no || for constant c2 and no f(n) is O(g(n)) for every n>=no then f(n) = theta (g(n))

3.B) cg(n) above f(n)

for constant c and no   f(n)= O(g(n))

3.C) cg(n) under f(n)

for constant c... Continue reading "What is the time of the pet" »