Notes, abstracts, papers, exams and problems of Computers

Sort by

Algoritmos qbasic 1

Classified in Computers

Written at on English with a size of 1.14 KB.

números primos

input n



while i <= n



While j<=i-1


if s=0 then


end if



If P$ = "S" then


Print i

end if



Suma de Matrices

Dim A(1.1) as double

Dim C(1.1)as double

input "filas";n

Input "columnas";m

Redim A(n,m) b(n,m)

For i=1 to n

For j=1 to m

Print "termino (";i;",";j")"

input "A"; A(i,j)

Input"B"; B(i,j)

next j

next i

For i =1 to n

For j=1 to n


next j

next i

Comandos wordfast

Classified in Computers

Written at on English with a size of 1.31 KB.

Comandos wordfast

1.-next segment:ALT+DOWN
2.-copy source:ALT+INSERT o ALT+S
3.-expand segment:ALT+PAGE DOWN
4.-shrik segment:ALT+PAGE UP
6.-end translation:ALT+END
7.-previous placeable:CONTROL+ALT+LEFT
8.-copy placeable:CONTROL+ALT+DOWN
9.-next palceable:CONTROL+ALT+RIGHT
11.-context search:CONTROL+ALT+C
12.-reference search:CONTROL+ALor:CONTROL+ALTT+N
13.-glosary lock up:CONTROL+ALT+G
14.-display translation memory:CONTROL+ALT+M
15.-quality check:SHIFT+CONTROL+Q
16.-quick clean up:CONTROL+ALT+Q
17.-wordfast editor :CONTROL+ALT+M x 2
18.-wordfast set up:CONTROL+ALT+W

Static Linking

Classified in Computers

Written at on English with a size of 928 bytes.

Static Linking

Static linkers such as the Unix ld program take as input a collection of relocatable object files and command
line arguments and generate as output a fully linked executable object file that can be loaded and run. The
input relocatable object files consist of various code and data sections. Instructions are in one section,
initialized global variables are in another section, and uninitialized variables are in yet another section.
To build the executable, the linker must perform two main tasks:

Shell script

Classified in Computers

Written at on English with a size of 2.47 KB.

Ejercicio de descuentos:


read -p "¿Desea el billete también de vuelta? (s/n): " idavuelta

until [ $idavuelta=="s" ] || [ $idavuelta=="n" ]; do

read -p "¿Desea el billete también de vuelta? (s/n): " idavuelta


read -p "¿Tiene carnet joven? (s/n): " carnetjoven

until [ $carnetjoven="s" ] || [ $carnetjoven="n" ]; do

read -p "¿Tiene carnet joven? (s/n): " carnetjoven


descuento=0 billete=20

if [ $idavuelta="s" ]; then


billete=" expr $billete \* 2'


if [ $carnetjoven="s" ]j then



costefinal=`expr $billete \* \( 100 - $descuento \) / 100`

echo "El precio final del billete es $costefinal"

Ejercicio de medias:




read -p "Introduce un numero: " num

while [ $num -ne 0 ]; do

acu=`expr $acu + $num`

cont=... Continue reading "Shell script" »

Font alimentacio

Classified in Computers

Written at on English with a size of 1.93 KB.

 WRITING : The computers now they are very important for the people. For example. When you buy groceries in supermarket, a computer is used with laser that scans the price with a barcode readers. Also the computers are used in the banks to look ofter their money. These are examples of the uses that a computer has. Because of it nowadays, all the families have a computer in your house already be to work or to play.

ARTiCLES : The walsh family have the computer at home. Their son uses the computer to help with the homework and to play computer games. Their student daughter uses the computer for the projects and for the email. All the family use it to get a information from the internet. ( a/an ,  the ).

VOCABULARY :  In offices, people uses... Continue reading "Font alimentacio" »


Classified in Computers

Written at on English with a size of 8.12 KB.

What are two advantages of buying a personal computer? (Choose two.)

the user can specify higher performance components
supports higher-level graphics and gaming applications
What measure is commonly used to describe the communication speed when transferring data?


Wireless DHCP client can not connect to the Internet through a Linksys integrated router. When you type ipconfig on the host, do not see an IP address, subnet mask and default gateway. What are two of the first items to be verified? (Choose two.)


if the wireless client is configured to DHCP

What network layer design provides a connection point for end user devices to the network?


What is the name of the contract between a client and an ISP... Continue reading "Cisco" »

FTP Protocol Theory

Classified in Computers

Written at on English with a size of 1.57 KB.

Theory FTP:

Is responsible for managing remote filesystems as if they were local filesystems allows us to access 2 modes:

- Private: The customer has username and password you indicated to access it.

-Public: The client uses a generic account called anonymous access, the password is usually the address.

The hierarchy of files and subdirectories that are available to users located in a specific directory on the FTP server (FTP site). There is a secure authentication as the transfer takes place without encryption can be intercepted by malicious users

FTP Operation:

The protocol provides a double connection between client and FTP server.

1. Connection is established between client and server (port 21)

2. Username and password is requested (port... Continue reading "FTP Protocol Theory" »


Classified in Computers

Written at on English with a size of 3.34 KB.

Cheat sheet 

A cheat sheet or crib sheet is a concise set of notes used for quick reference. "Cheat sheet" may also be rendered "cheatsheet".

Cheat sheets are so named because they may be used by students without the instructor's knowledge to cheat on a test. However, at middle levels of education where rote memorization is not as important as either basic education or intense graduate studies, high school or undergraduate students may be permitted to consult their own notes during the exam (which is not considered cheating). The act of preparing a so-called cheat sheet is also an educational exercise, thus students are typically only allowed to use cheat sheets they have written themselves. In such usage a cheat sheet is a physical piece of

... Continue reading "Cheat-Sheet" »

School is awesome

Classified in Computers

Written at on English with a size of 10.59 KB.

=COUNTIFS(C2:C21,"Account Rep",B2:B21,"Atlanta") = IF rows C2-21 say Account Rep and if cells B2-21 say Atlanata COUNT

If "Salary" in E5 is < 45,500="" e3="">

IF True "Hire Date" D5 is less than Threshold D3 combined with Salary E3 and Cell E5

If FALSE AKA below 45,500 display 45,500

Shows Salarys below 45,500 before a certain hire frame

Image IF SALARY in E5 is less than E3 AND IF cells in D5 were hired BEFORE D3 then IF true Display Salary in E3 IF FALSE keep the same



COUNTIF has no sum range

 LOOKUP Refernce - LOOKUP VALUE - CELL you want to look up, LOOKUP ARRAY are the Cells they are looking up F2-F21 (Absoulete it), MATCH TYPE = 0. This will look up a... Continue reading "School is awesome" »


Classified in Computers

Written at on English with a size of 5.04 KB.

Adware is a type of free software supported by advertisements that showup in Pop-up windows or on a toolbar on your computer or browser. Mostadware is Annoying, but safe. But some is used to gather your personal information, track The websites you visit or even record your keystrokes. How to Recognize adware Your device is probably infected with adware if you Start seeing ads popping up in applications where you hadn't seen them before. Pop-ups can also show up on your computer's desktop even when you're not Browsing the Internet. Also, your browser's homepage may have been Changed. How to remove adware Before removing adware from your Device, be sure to back up any important files that you want to keep safe. Then Use antivirus or adware removal... Continue reading "pene" »