Search
- Filter Results
- Location
- Classification
- Include attachments
- https://eng.libretexts.org/Courses/Delta_College/Master_CS11_POCR/05%3A_Information_Systems_-_Data_and_Databases/5.01%3A_Data_and_DatabasesImagine if you turned on a computer, started the word processor, but could not save a document. Imagine if you opened a music player but there was no music to play. Imagine opening a web browser but t...Imagine if you turned on a computer, started the word processor, but could not save a document. Imagine if you opened a music player but there was no music to play. Imagine opening a web browser but there were no web pages. Without data, hardware and software are not very useful! Data is the third component of an information system.
- https://eng.libretexts.org/Courses/Delta_College/Master_CS11_POCR/04%3A_Information_Systems_-_Software/4.06%3A_Cloud_ComputingThe process of programming is sometimes called “coding” because the developer takes the design and encodes it into a programming language which then runs on the computer. When a software program takes...The process of programming is sometimes called “coding” because the developer takes the design and encodes it into a programming language which then runs on the computer. When a software program takes hundreds of man-hours to develop, it is understandable that the programmers do not want to just give it away. For example, in the terms of the Microsoft Office software license, you will find the following statement: “This software is licensed, not sold.
- https://eng.libretexts.org/Courses/Delta_College/Master_CS11_POCR/08%3A_Information_Systems_-_Security/8.07%3A_Security_PoliciesWhen you log in to your account from an unfamiliar computer for the first time, it sends you a text message with a code that you must enter to confirm that you are really you. Users should change thei...When you log in to your account from an unfamiliar computer for the first time, it sends you a text message with a code that you must enter to confirm that you are really you. Users should change their passwords every sixty to ninety days, ensuring that any passwords that might have been stolen or guessed will not be able to be used against the company.
- https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/10%3A_Network_Management/2.02%3A_Server_Roles_in_LinuxIn the absence of a DHCP server, a computer or other device on the network needs to be manually assigned an IP address, or to assign itself an APIPA address, the latter of which will not enable it to ...In the absence of a DHCP server, a computer or other device on the network needs to be manually assigned an IP address, or to assign itself an APIPA address, the latter of which will not enable it to communicate outside its local subnet.
- https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/05%3A_File_and_Directory_Management/1.02%3A_Creating_and_Editing_Text_files_-_Vim_Editor/1.02.03%3A_Vim_-_Command-Line_ModeVim uses one mode to insert text into the file; one mode to navigate around the file - although vim allows use of the arrow keys to move while in insert mode; one mode that allows us to select chunks ...Vim uses one mode to insert text into the file; one mode to navigate around the file - although vim allows use of the arrow keys to move while in insert mode; one mode that allows us to select chunks of code to modify; and now we have the Command-Line mode where we can do a majority of the editing.
- https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/12%3A_Linux_Systems_Security/1.04%3A_Security_Best_PracticesThere are numerous steps to take that increase the overall security of a Linux system. Cybersecurity is increasing in importance with the growing number of tools and technology at the hands of those a...There are numerous steps to take that increase the overall security of a Linux system. Cybersecurity is increasing in importance with the growing number of tools and technology at the hands of those attempting to infiltrate systems, steal data, and hold systems for ransom. Strong passwords - Good options to consider would be: a minimum length of at least 10 characters, require the use of special characters or upper and lowercase letters.
- https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/07%3A_Linux_Boot_Process/1.03%3A_Configuring_initrdThe bootloader will load the kernel and initial root file system image into memory and then start the kernel, passing in the memory address of the image. At the end of its boot sequence, the kernel tr...The bootloader will load the kernel and initial root file system image into memory and then start the kernel, passing in the memory address of the image. At the end of its boot sequence, the kernel tries to determine the format of the image from its first few blocks of data, which can lead either to the initrd or initramfs scheme.
- https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/10%3A_Network_Management/1.01%3A_TCP_IP_Fundamentals/1.01.02%3A_TCP_IP_Fundamentals_-_AddressingIn the original design of IPv4, an IP address was divided into two parts: the network identifier was the most significant octet of the address, and the host identifier was the rest of the address. The...In the original design of IPv4, an IP address was divided into two parts: the network identifier was the most significant octet of the address, and the host identifier was the rest of the address. The following diagram modifies the above example by moving two bits from the host part to the network prefix to form four smaller subnets, each one quarter of the previous size.
- https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/01%3A_Introduction_to_Linux/3.05%3A_Sources_of_Online_Linux_DocumentationWith respect to the C library, the primary focus is the GNU, C library (glibc), although, where known, documentation of variations on other C libraries available for Linux is also included. Another op...With respect to the C library, the primary focus is the GNU, C library (glibc), although, where known, documentation of variations on other C libraries available for Linux is also included. Another option would be: 1) go to the Distro Watch website 2) select the desired distro 3) scroll down - on the left side is a listing for the distros documentation page.
- https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/09%3A_Managing_Linux_Devices/2.02%3A_Configuring_Linux_Devices/2.02.01%3A_Configuring_Linux_Devices_-_PrintingCUPS consists of a print spooler and scheduler, a filter system that converts the print data to a format that the printer will understand, and a backend system that sends this data to the print device...CUPS consists of a print spooler and scheduler, a filter system that converts the print data to a format that the printer will understand, and a backend system that sends this data to the print device. In order to perform administrative tasks via the web interface, a user must either have the root account enabled on the server, or authenticate as a user in the lpadmin group.
- https://eng.libretexts.org/Courses/Delta_College/C_-_Data_Structures/03%3A_Arrays