Skip to main content

Home/ Computer Science Knowledge Sharing/ Group items tagged Operating

Rss Feed Group items tagged

computersciencej

Process Control Block - 0 views

  •  
    What is Process Control Block ? Today in this Computer Science Study Material for Gate we will discuss about process control block and its various field which provides the information about process. .So let see what is process control block. A Process Control Block is a data structure maintained by the Operating System for every process. Each process has it own data structure. When a process is created then a unique id is assigned to the process Operating system identify a process among all processes on the basis of this process id. A PCB keeps all the information needed to keep track of a process. Generally a process control block contains the following information about a process. To read full tutorial click on the given link http://www.computersciencejunction.in/2018/02/introduction-to-process-control-block-in-operating-system.html
Abdelrahman Ogail

Mutation testing - Wikipedia, the free encyclopedia - 1 views

  • Mutation testing (or Mutation analysis) is a method of software testing, which involves modifying program's source code in small ways.[1] These, so-called mutations, are based on well-defined mutation operators that either mimic typical programming errors (such as using the wrong operator or variable name) or force the creation of valuable tests (such as driving each expression to zero). The purpose is to help the tester develop effective tests or locate weaknesses in the test data used for the program or in sections of the code that are seldom or never accessed during execution.
  • For example, consider the following C++ code fragment: if (a && b) c = 1; else c = 0; The condition mutation operator would replace '&&' with '||' and produce the following mutant: if (a || b) c = 1; else c = 0;
  • Many mutation operators can produce equivalent mutants. For example, consider the following code fragment: int index=0; while (...) { . . .; index++; if (index==10) break; } Boolean relation mutation operator will replace "==" with ">=" and produce the following mutant: int index=0; while (...) { . . .; index++; if (index>=10) break; }
Janos Haits

The CLIP OS Project | CLIP OS - 0 views

  •  
    "The CLIP OS project is an open source project maintained by the ANSSI (National Cybersecurity Agency of France) that aims to build a hardened, multi-level operating system, based on the Linux kernel and a lot of free and open source software."
Janos Haits

Blockstack - The New Decentralized Internet - 0 views

  •  
    'Blockstack is an open-source project and a decentralized network. For the past years, one company, Blockstack Inc, has taken the lead on protocol development. We plan to have many independent individuals and companies operating on the network and taking on greater roles in the protocol's development. We will release more details on governance structures and potential independent entities that can provide a degree of neutrality and balance to the protocol development in the long run.'
Janos Haits

TensorFlow -- an Open Source Software Library for Machine Intelligence - 0 views

  •  
    "TensorFlow™ is an open source software library for numerical computation using data flow graphs. Nodes in the graph represent mathematical operations, while the graph edges represent the multidimensional data arrays (tensors) communicated between them. The flexible architecture allows you to deploy computation to one or more CPUs or GPUs in a desktop, server, or mobile device with a single API. TensorFlow was originally devel"
computersciencej

Best Payment Gateway used in India - 0 views

  •  
    Razorpay payment gateway is widely used in India.Ecommerce is also known as electronic commerce and it is a popular medium to operate the business online. Ecommerce is a way of purchasing and selling the product online. The use of Online Payment Tools is increasing day by day in India. A Payment Gateway is an online payment service that is integrated with e-commerce platforms such as e-commerce websites or App to make and receive the payment.
computersciencej

Virtualization in Cloud Computing - 0 views

  •  
    Virtualization means creating the virtual version of a useful resource such as server, storage device, a desktop, operating system and network resources.Virtualization basically provide the services of pooling and sharing of the resources Behind the virtualization there is concept of virtual machine which is also known as guest machine and the machine on which this virtual machine is created is known as host machine.
Janos Haits

Whonix ™ - Software That Can Anonymize Everything You Do Online - 0 views

  •  
    "Whonix ™ runs like an app inside your operating system - keeping you safe and anonymous. Whonix is available for"
veera90

Best Contingent Staffing in USA| Professional Services | ACL Digital - 0 views

  •  
    Our tailor-made, custom contingent staffing services provide best-in-class, highly qualified resources, promising the best operational efficiencies at a minimal cost. We have experience transforming recruitment from an administrative function to a strategic competitive differentiator. With over 25 years of IT and professional staffing experience serving Fortune 500 customers globally, ACL Digital consistently pushes the boundaries for contingent staffing services, accommodating the ever-changing workforce needs of the global gig economy. https://www.acldigital.com/offerings/talent-solutions/contingent-staffing
Janos Haits

Qubes OS Project - 0 views

  •  
    "Qubes is a security-oriented, open-source operating system for personal computers. It uses virtualization to implement security by compartmentalization and supports both Linux and Windows virtual environments. Qubes 3.0 introduces the Hypervisor Abstraction Layer (HAL), which renders Qubes independent of its underlying virtualization system."
Janos Haits

What is a Blockchain | Defi Dictionary | Web3 Daily - 0 views

  •  
    "Think of a blockchain as a transaction list that is uploaded to thousands of computers around the world.  If someone sends money to you, that transaction gets added to a queue. Queued transactions are sorted into groups (aka 'blocks') and then processed by one of the thousands of computers operating in the cryptocurrency's network. Once the transaction is complete, it appears on the public transaction list, or 'chain'."
Restaurant System

Brilliant and Easy Restaurant Solution - 1 views

Being a very busy restaurant the need for point of sale system that could help us manage our business transactions have to be realised immediately. We need the most brilliant and easy restaurant so...

Restaurant POS

started by Restaurant System on 09 Feb 12 no follow-up yet
magdy medhat

What is Domain Name Resolution - 0 views

  • What is Domain Name Resolution Introduction When using the Internet most people connect to web sites, ftp servers or other Internet servers by connecting to a domain name, as in www.bleepingcomputer.com. Internet applications, though, do not communicate via domain names, but rather using IP addresses, such as 192.168.1.1. Therefore when you type a domain name in your program that you wish to connect to, your application must first convert it to an IP address that it will use to connect to. The way these hostnames are resolved to their mapped IP address is called Domain Name Resolution. On almost all operating systems whether they be Apple, Linux, Unix, Netware, or Windows the majority of resolutions from domain names to IP addresses are done through a procedure called DNS.
    • Ahmed Mansour
       
      i think it's great artical !!
    • Islam TeCNo
       
      Yes .....we know that Web sites are on servers that has IP adresses like this 217.143.56.12 for example .....this article tell us how the site name [www.google.com] is converted to the IP thanks Mans
    • magdy medhat
       
      ya tecno ya gamedddddd mesh de elly kona bntklm feha fel microbus :D
  • Hosts File - There is a file called the HOSTS file that you can use to convert domain names to IP addresses. Entries in the HOSTS file override any mappings that would be resolved via a DNS server
    • Islam TeCNo
       
      I think this is what some spam and adware programs use .... you type a normal site Name but you go yo another site ... i think so !!
  • Netbios - This only applies to Windows machines and will only be used to map names to IP addresses if all previous methods failed. This method will attempt to map the netbios name you are trying to connect to with an IP address.
    • Islam TeCNo
       
      any body can explain this point for me ?
  • ...2 more annotations...
  • This can be changed though by changing certain registry keys
    • Islam TeCNo
       
      start -> run -> regedit this will allow you to edit the registry
  • DnsPriority = 30 LocalPriority = 200 HostsPriority = 75 NetbtPriority = 100
    • Islam TeCNo
       
      Or Simpler DnsPriority = 1 HostsPriority = 2 NetbtPriority = 3 LocalPriority = 4
Abdelrahman Ogail

ELIZA - Wikipedia, the free encyclopedia - 0 views

  • ELIZA was a computer program and an early example (by modern standards) of primitive natural language processing. ELIZA operated by processing users' responses to scripts, the most famous of which was DOCTOR, a simulation of a Rogerian psychotherapist. In this mode, ELIZA mostly rephrased the user's statements as questions and posed those to the 'patient.' ELIZA was written by Joseph Weizenbaum between 1964 to 1966
Abdelrahman Ogail

Common Mistakes in Online and Real-time Contests - 0 views

  • Dynamic programming problems are to be solved with tabular methods
    • Ahmed Mansour
       
      Dynamic programming, like the divide-and-conquer method, solves problems by combining the solutions to subproblems. ("Programming" in this context refers to a tabular method, not to writing computer code) y3ney 3bara 3n 2nene bn2sem el problem el kbirr le shwit probelsm so3'ira .. we ne solve el problems deh we ngma el yab2a dh 7l lel problem el kbira :D;d see introduction to algorithms book . chapter 15
  • breadth-first search
    • Ahmed Mansour
       
      In graph theory, breadth-first search (BFS) is a graph search algorithm that begins at the root node and explores all the neighboring nodes. Then for each of those nearest nodes, it explores their unexplored neighbor nodes, and so on, until it finds the goal. ya3ney be el 3arby keda lw ana 3ndy tree maslan we el tree dh bettkwen mn shwit levels 3ady gedan.. lama hagey 23mel search 3la node mo3ina fi el tree deh hamsk el tree mn el root bet3ha ely hwa level 0 we habda2 2mshy level by level y3ney hanzl 3la el level 1 we hakaz le 3'it mal2y el node bet3ty ,,,, see this ,, it's a tutorial show how BFS algorithm is work!! http://www.personal.kent.edu/~rmuhamma/Algorithms/MyAlgorithms/GraphAlgor/breadthSearch.htm
  • Memorize the value of pi You should always try to remember the value of pi as far as possible, 3.1415926535897932384626433832795, certainly the part in italics. The judges may not give the value in the question, and if you use values like 22/7 or 3.1416 or 3.142857, then it is very likely that some of the critical judge inputs will cause you to get the wrong answer. You can also get the value of pi as a compiler-defined constant or from the following code: Pi=2*acos(0)
    • Islam TeCNo
       
      hhhhhhhhhhh ...... awl mara a3rf el mawdo3 dah we awl mara a3raf en el Pi = 2*acos(0)
    • Abdelrahman Ogail
       
      Thanks Islam for the info, really useful
  • ...4 more annotations...
  • You cannot always check the equality of floating point numbers with the = = operator in C/C++. Logically their values may be same, but due to precision limit and rounding errors they may differ by some small amount and may be incorrectly deemed unequal by your program
  • #define swap(xxx, yyy) (xxx) ^= (yyy) ^= (xxx) ^= (yyy)
    • Islam TeCNo
       
      I remember someone told me that it's impossible to do swaping using macros :D ...but i think it's possible
  • But recursion should not be discounted completely, as some problems are very easy to solve recursively (DFS, backtracking)
    • Islam TeCNo
       
      Some problems are much easier when using recursion
  • Having a good understanding of probability is vital to being a good programmer
  •  
    for bignner acmers hoping to be useful !
  •  
    in this article the author discuss the common problems that faced teams in ACM contests .. and how to avoid it !
Islam TeCNo

XML-RPC Home Page - 0 views

  • It's a spec and a set of implementations that allow software running on disparate operating systems, running in different environments to make procedure calls over the Internet. It's remote procedure calling using HTTP as the transport and XML as the encoding. XML-RPC is designed to be as simple as possible, while allowing complex data structures to be transmitted, processed and returned.
    • Islam TeCNo
       
      ya3ni a2dar men program C# maslan andah 3ala function PHP mawgoda 3ala server tani !! :D
  •  
    This is a protocol that is used to call functions over internet using HTTP protocol as the transport and XML as the encoding
Islam TeCNo

Uniform Resource Identifier - Wikipedia, the free encyclopedia - 0 views

shared by Islam TeCNo on 16 Jun 09 - Cached
  • In computing, a Uniform Resource Identifier (URI) consists of a string of characters used to identify or name a resource on the Internet. Such identification enables interaction with representations of the resource over a network (typically the World Wide Web) using specific protocols. Schemes specifying a specific syntax and associated protocols define each URI. Contents [hide]
    • Abdelrahman Ogail
       
      I've confused between URL & URI till reading this article !
    • Islam TeCNo
       
      URL no3 men el URI :D ....ana faker eno kont shoft el 7eta deh fe ketab 3an el HTTP bas nesetha .......Zanks Zikas Again
  • A Uniform Resource Name (URN) functions like a person's name, while a Uniform Resource Locator (URL) resembles that person's street address. The URN defines an item's identity, while the URL provides a method for finding it. The ISBN system for uniquely identifying books provides a typical example of the use of typical URNs. ISBN 0486275574 (urn:isbn:0-486-27557-4) cites unambiguously a specific edition of Shakespeare's play Romeo and Juliet. In order to gain access to this object and read the book, one would need its location: a URL address. A typical URL for this book on a unix-like operating system might look like the file path file:///home/username/RomeoAndJuliet.pdf, identifying the electronic book saved in a local hard disk. So URNs and URLs have complementary purposes.
computersciencej

Thrashing in OS - 0 views

shared by computersciencej on 18 Jun 18 - No Cached
1 - 20 of 21 Next ›
Showing 20 items per page