Water cycle
the most of Earth's water is in the oceans. The sun drives the water cycle by heating water, causing it to evaporate into the air. Ice and snow can also sublimate directly into water vapor. As air rises, it cools and condenses into clouds. Air currents move these clouds globally. Within clouds, tiny water particles collide, grow, and eventually fall as precipitation (rain, snow, etc.). Snow can accumulate as ice caps and glaciers, storing water for thousands of years. In warmer climates,...
A scatter diagram (or scatter plot) is a graphical representation of two variables where each point represents an observation consisting of paired values from two datasets. The horizontal axis (X-axis) represents one variable, and the vertical axis (Y-axis) represents the other.
Each point (xi,yi)(x_i, y_i)(xi,yi) is plotted on the graph for the corresponding values of the two variables.
Mesoamérica:
Zona geográfica y cultural que incluye parte de México y Centroamérica.
Características: agricultura (maíz), politeísmo, escritura jeroglífica, calendario.
Cosmovisión:
Relación entre dioses, naturaleza y humanos.
Ciclicidad del tiempo y sacrificios como ofrenda a los dioses.
Aportaciones de 3 culturas:
Olmeca: calendario, escritura, cabezas colosales.
Maya: sistema numérico con el cero, astronomía, arquitectura avanzada.
A PDA accepts an input string by final state if, after reading the entire input, it reaches a final state, regardless of the contents of the stack.
A problem is undecidable if there is no algorithm that can determine the answer (yes or no) for all possible inputs in a finite amount of time.
A Turing Machine consists of a tape, a tape head, a finite set of states, an input alphabet, a tape alphabet, a transition function, and a start, accept, and reject state.
The lexical analyzer (scanner) reads
ART
Topic: Famous Paintings of the World
Example 1: Mona Lisa by Leonardo da Vinci
Value: This painting is a symbol of the Renaissance [rəˈneɪsəns] and
reflects the genius of da Vinci and the mystery of the female portrait.
Example 2: The Starry Night by Vincent van Gogh
Value: It shows emotional perception of nature and is important
for understanding Post-Impressionism.
Example 3: Guernica [ˈgɜːnɪkə] by Pablo Picasso
Value: This painting symbolizes anti-war protest and reflects
Bite my lips - to press the soft
parts of the front of my mouth between the teeth
Bite my nails - to press the
hard parts on the end of my fingers between the teeth;
Have a broad - to stretch
my mouth wide and/or show the teeth in pleasure;
Lower the corners - to drop the outer edges of
my mouth lower than the rest;
Point my finger to sb - to extend my index finger in sb's direction to draw attention to them;
Counsellor - sb who gives advice on a specified subject;
Disheartened - disappointed;
Distress
1. MEDIA/TECNOLOGIA COMO AMBIENTE - Ubíquos, invasivos, invisíveis (Deuze, Jansson). - "Life in media" (Deuze, 2023): vivemos dentro do ambiente mediático.
2. VAGAS DE MEDIATIZAÇÃO (Couldry & Hepp) - Mecanização (1450-1800): Imprensa de Gutenberg, difusão do conhecimento. - Eletrificação (1800-1950): Rádio, cinema, TV, simultaneidade. - Digitalização (1950-): Internet, computadores, convergência mediática. - Datificação (2000-): Big Data, vigilância, capitalismo de dados.
3.
PORTERS 5 FORCE MODEL
1.Threat from new entrant:- New entrants may increase the intensity of competition in matured market situations. Rapid market expansion is possible and feasible during the introduction and growth stages. New entrants to an industry typically bring to it new capacity, a desire to gain market share, and substantial resources.They are, therefore, threats to an established firm. The threat of entry depends on the presence of entry barriers and the reaction that can be expected
1. RECONNAISSANCE (Passive/Active)
★★★ [PASSIF] whois example.com
1. Affiche les informations d’enregistrement du domaine (propriétaire, registrar, DNS, dates).
2. Repérer les serveurs DNS, emails ou noms d’organisation à approfondir.
★★★ [PASSIF] theHarvester -d example.com -b all
1. Récupère les emails, sous-domaines, noms d’hôtes à partir de moteurs publics (Google, Bing…).
2. Vérifier les emails (HaveIBeenPwned, Google Dork), scanner les hôtes trouvés.
★★★ [PASSIF]