Skip to main content

Home/ Computer Science Knowledge Sharing/ Group items tagged list

Rss Feed Group items tagged

Janos Haits

A Collective List Of APIs, Go Build Something. - 0 views

  •  
    "A Collective List Of APIs. Build Something."
Janos Haits

What is a Blockchain | Defi Dictionary | Web3 Daily - 0 views

  •  
    "Think of a blockchain as a transaction list that is uploaded to thousands of computers around the world.  If someone sends money to you, that transaction gets added to a queue. Queued transactions are sorted into groups (aka 'blocks') and then processed by one of the thousands of computers operating in the cryptocurrency's network. Once the transaction is complete, it appears on the public transaction list, or 'chain'."
Islam TeCNo

Database - Wikipedia, the free encyclopedia - 0 views

shared by Islam TeCNo on 08 Jun 09 - Cached
  • A database is a structured collection of records or data that is stored in a computer system. The structure is achieved by organizing the data according to a database model. The model in most common use today is the relational model. Other models such as the hierarchical model and the network model use a more explicit representation of relationships
    • Abdelrahman Ogail
       
      Database official definition
    • Islam TeCNo
       
      yes .... bas a3taked en el wa7ed yfham ahm b keter men eno ye3ref el Definition (dah mogarad test post hehe )
    • Islam TeCNo
       
      But in File Stucter we took that database is set of related files
  • increase their speed
  • common kind of index is a sorted list of the contents of some particular table column, with pointers to the row associated with the value
  • ...1 more annotation...
  • Typically, indexes are also stored in the various forms of data-structure mentioned above (such as B-trees, hashes, and linked lists)
Janos Haits

Logseq: A privacy-first, open-source knowledge base - 1 views

  •  
    "Logseq is a privacy-first, open-source knowledge base that works on top of local plain-text Markdown and Org-mode files. Use it to write, organize and share your thoughts, keep your to-do list, and build your own digital garden."
Abdelrahman Ogail

Hill climbing - Wikipedia, the free encyclopedia - 0 views

  • In computer science, hill climbing is a mathematical optimization technique which belongs to the family of local search. It is relatively simple to implement, making it a popular first choice. Although more advanced algorithms may give better results, in some situations hill climbing works just as well. Hill climbing can be used to solve problems that have many solutions, some of which are better than others. It starts with a random (potentially poor) solution, and iteratively makes small changes to the solution, each time improving it a little. When the algorithm cannot see any improvement anymore, it terminates. Ideally, at that point the current solution is close to optimal, but it is not guaranteed that hill climbing will ever come close to the optimal solution. For example, hill climbing can be applied to the traveling salesman problem. It is easy to find a solution that visits all the cities but will be very poor compared to the optimal solution. The algorithm starts with such a solution and makes small improvements to it, such as switching the order in which two cities are visited. Eventually, a much better route is obtained. Hill climbing is used widely in artificial intelligence, for reaching a goal state from a starting node. Choice of next node and starting node can be varied to give a list of related algorithms.
Islam TeCNo

List of network protocols - Wikipedia, the free encyclopedia - 0 views

  • IPv4 Internet Protocol version 4
    • Islam TeCNo
       
      el mafroud dah eli howa asasn e7na bensta5dmo now ...maslan el IP beta3i 217.154.89.2 ....el mafroud dah IPv4 we el mafroud ba2a ba3den netawr we neb2a IPv6 :D
  • IPv6 Internet Protocol version 6
    • Islam TeCNo
       
      المفروض ده بقي البروتوكول الجديد الي إن شاء الله هيطبق بعيدن
    • Ahmed Mansour
       
      Currently there are two types of Internet Protocol (IP) addresses in active use: IP version 4 (IPv4) and IP version 6 (IPv6). IPv4 was initially deployed on 1 January 1983 and is still the most commonly used version. IPv4 addresses are 32-bit numbers often expressed as 4 octets in "dotted decimal" notation (for example, 192.0.2.53). Deployment of the IPv6 protocol began in 1999. IPv6 addresses are 128-bit numbers and are conventionally expressed using hexadecimal strings (for example, 2001:0db8:582:ae33::29). source : http://www.iana.org/numbers/ thanks tecno for your useful comments :) keep it up(Y)
  • TCP Transmission Control Protocol UDP User Datagram Protocol
    • Islam TeCNo
       
      The Diffrance between TCP and UDP is that TCP check the packet that packets are sent correctly ... but UDP just send and don't check ....so UDP is faster than TCP but TCP check that data is sent correctly .... so UDP is used in applications like Video Streaming (You Tube) and Voice Streaming too
    • Islam TeCNo
  • ...6 more annotations...
  • Jabber, an instant-messaging protocol
    • Islam TeCNo
       
      Great protcol .....also Called XMPP and this is the protocol used by Google Talk
    • Islam TeCNo
       
      port 5222 i think is it's default :D
  • Internet Relay Chat (IRC)
    • Islam TeCNo
       
      I think this is a very old chat protocol
  • ED2K, A peer-to-peer file sharing protocol
    • Islam TeCNo
       
      I think this is used by emule P2P program !! A Great P2P File Sharing program
  • FTP, File Transfer Protocol
    • Islam TeCNo
       
      use port 21 :D
    • Islam TeCNo
       
      loooooooot of protocols ....any one know simple explainations ?
  • HTTP, HyperText Transfer Protocol
Abdelrahman Ogail

Common Gateway Interface - Wikipedia, the free encyclopedia - 0 views

  • The Common Gateway Interface (CGI) is a standard protocol for interfacing external application software with an information server, commonly a web server. The task of such an information server is to respond to requests (in the case of web servers, requests from client web browsers) by returning output. Each time a request is received, the server analyzes what the request asks for, and returns the appropriate output. The two basic methods for the server to do this are the following: If the request identifies a file stored on disk, then return the contents of that file. If the request identifies an executable command and possibly arguments, then run the command and return its output. CGI defines a standard way of doing the second. It defines how information about the server and the request is passed to the command in the form of arguments and environment variables, and how the command can pass back extra information about the output (such as the type) in the form of headers.
Janos Haits

Digital Attack Map - 0 views

  •  
    top daily DDoS attacks worldwide
1 - 10 of 10
Showing 20 items per page