intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

The Computer Program

Xem 1-20 trên 80 kết quả The Computer Program
  • In the era of technological development, researchers and educators, who live in advanced countries, have researched computational thinking, so that new generations can gain it as an essential skill. Realizing the importance of computational thinking, Vietnamese Educational Policy Makers also set it as one of the goals of our new education program.

    pdf8p vipanly 28-10-2024 2 1   Download

  • The paper builds a computational model of a multisubcarrier free space optic, a variant of the Subcarrier Intensity Modulation Free Space Optic (SIM-FSO), establishes algorithmic flowcharts, writes a computational program to investigate the system performance under various modulation methods, air turbulence levels and different numbers of subcarriers and data rates.

    pdf6p viaburame 14-03-2025 6 1   Download

  • Partitioning DFDs: a. The process of analyzing a DFD and deriving a series of manual procedures b. Adding controls to ensure the processes are done property c. The process of analyzing a DFD and deriving a series manual procedures and computer programs d. None of these answers Câu 162: Physical data flow diagram: a. describing processes in greater detail b. show sequencing processes in the order they must be executed c. show how the system operates or how the new system will be implemented d. all of these answers Câu 163: Physical DFDs a. show how the system is or...

    pdf29p itvovantien 23-06-2012 127 20   Download

  • Mechanism to create new classes using existing classes The existing class is called the parent class, or superclass, or base class The derived class is called the child class or subclass As the name implies, the child inherits characteristics of the parent That is, the child class inherits the methods and data defined by the parent class. Once a behavior (method) is defined in a super class, that behavior is automatically inherited by all subclasses

    ppt77p nguyenvanhabk1 04-09-2012 83 10   Download

  • Real world concepts can be modeled in a computer program The program is made of objects with certain properties and operations that the objects can perform It is not important how an object is implemented, but what it does Every object is responsible for carrying out a set of related tasks. A class can contain data declarations and method declarations

    ppt50p nguyenvanhabk1 04-09-2012 75 5   Download

  • provide request information for HTTP servlets. The servlet container creates an HttpServletRequest object and passes it as an argument to the servlet's service methods (doGet, doPost, etc).Client request information including : parameter name and values, and an input stream Attributes : custom information about a request. Extends the ServletRequest interface Returns the value of attribute : public Object getAttribute(String name)

    ppt36p nguyenvanhabk1 04-09-2012 108 7   Download

  • Language Lap trinh JAVA Java is the language programming direction objects (as C + +) do Sun Microsystem output to the first hex niên 90 the ky 20. Program Việt using Java can be running on any hệ system that have installed your virtual Java (JVM - Java Virtual Machine). Máy virtual Java (JVM - Java Virtual Machine): One programs write by Java will be compile ra mã of the virtual Java (mã java bytecode)

    ppt53p nguyenvanhabk1 04-09-2012 86 7   Download

  • Các máy chủ Web (Webserver) luôn là những vùng đất màu mỡ cho các hacker tìm kiếm các thông tin giá trị hay gây rối vì một mục đích nào đó. Hiểm hoạ có thể là bất cứ cái gì từ kiểu tấn công từ chối dịch vụ, quảng cáo các website có nội dung không lành mạnh, xoá, thay đổi nội dung các file hay phần mềm chứa mã nguy hiểm. Bài viết dưới đây được trình bày như những lời khuyên cho việc đảm bảo an toàn cho các máy chủ Web....

    ppt42p muathu_102 28-01-2013 148 50   Download

  • Malware: software designed to infiltrate or damage a computer system without the owner's informed consent Spyware: software designed to intercept or take partial control over the user's interaction with the computer, without the user's informed consent secretly monitors the user's behavior collect various types of personal information

    pdf33p trinhvietnambk 29-05-2013 65 4   Download

  • Lecture "Charter 2: Introduction to C Programming" provides students with the knowledge: To write simple computer programs in C, to use simple input and output statements, the fundamental data types, computer memory concepts, to use arithmetic operators,... Inviting you refer.

    pdf72p doinhugiobay_13 24-01-2016 64 4   Download

  • Lectures "Computer architecture - Chapter 1: Computer abstractions and technology" provides learners with the knowledge: Introduction, below your program, under the covers, performance. Invite you to refer to the disclosures.

    pdf45p doinhugiobay_17 01-03-2016 63 5   Download

  • In this chapter, the following content will be discussed: Operating system services, user operating system interface, system calls, types of system calls, system programs, operating system design and implementation, operating system structure, operating system debugging, operating system generation, system boot.

    ppt55p dien_vi02 07-10-2018 59 2   Download

  • In this chapter, the following content will be discussed: Overview, multicore programming, multithreading models, thread libraries, implicit threading, threading issues, operating system examples.

    ppt46p dien_vi02 07-10-2018 41 1   Download

  • Lecture Java Programming Language: Introduction has main content such as desktop computing, operating systems, enviroment, programming languages, networks, number systems, storing data in memory, why program in java, a java application, formatting output.

    pdf22p lavender2022 22-04-2022 42 2   Download

  • In this thesis, we investigate the problem of IoT services deployment in Cloud-Fog system to provide IoT services with minimal resource usage cost. We for-mulate the problem using a Mixed-Integer Linear Programming model taking into account the characteristics of computing and transmission resources in Cloud-Fog system as well as the IoT services specific requirements.

    pdf55p tamynhan0 04-07-2020 19 3   Download

  • Software-defined networking aims to change the inflexible state networking, by breaking vertical integration, separating the network’s control logic from the underlying routers and switches, promoting (logical) centralization of network control, and introducing the ability to program the network. Consequently, SDN is an important key for resolving aforementioned difficulties.

    doc130p cotithanh000 07-10-2019 30 5   Download

  • Research object are the organization and state management activities on ITI in Vietnam. The scope limited in the contents of state management on ITI systems, focusing on policies, strategies, planning, plans and programs; legal documents; inspection and examination to eliminate violations; organizing the state management apparatus on ITI in the field of manufacturing computer hardware and computer software.

    pdf30p dungmaithuy 18-09-2019 53 4   Download

  • Microfabricated accelerometer sensors have been developed to measure acceleration in a variety of applications, including automobile airbag crash sensors and seismic activity monitors. For this thesis a three-dimensional accelerometer sensor has been created for measuring involuntary human hand motion. The sensor uses three single-axis accelerometers fabricated at the MIT Microsystems Technology Laboratory.

    pdf110p nguyenthai_thinh 13-01-2016 43 4   Download

  • Parallel Implementation of MAFFT on CUDA-Enabled Graphics Hardware present a new approach to accelerat- ing MAFFT on Graphics Processing Units (GPUs) using the Compute Unified Device Architecture (CUDA) programming model. Compared with the implementations of other MSA algorithms on GPUs, parallelization of MAFFT is more challenging since the space complexity.

     

    pdf14p ducla78 30-07-2015 52 6   Download

  • Geo-electrical tomographical software plays a crucial role in geophysical research. However, imported software is expensive and does not provide much customizability, which is essential for more advanced geophysical study. Besides, these programs are unable to exploit the full potential of modern hardware, so the running time is inadequate for large-scale geophysical surveys. It is therefore an essential task to develop domestic software for overcoming all these problems.

    doc60p 01202750693 09-06-2015 66 13   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
908=>2