tybms sm

Purchase Process for Services:
1 Need Recognition and Definition;The process begins when an internal department or individual identifies a specific business need that a service could fulfill (e.g., IT support, consulting, or maintenance). They mustclearly define the scope, objectives, and specifications of the required service to move forward. This stage sets the foundation for a successful procurement

.2. Supplier Identification and SourcingThe organization searches for suitable service providers

...

See on Student Notes »

public policy

  • Legislative Branch: Made up of the House and Senate; creates and passes laws.

  • Executive Branch: Enforces laws; includes the President, executive orders, and agencies.

  • Judicial Branch: Interprets laws; includes courts and judicial review.

  • Executive Orders: Directives from the President that manage operations of the federal government.

  • Ballot Measure: Legislation proposed and voted on by the public, such as propositions or referenda.

  • Preemption: When a higher level of government limits

...

See on Student Notes »

ragggg

1. Vector Databases -Store and search high-dimensional vector embeddings,Used in semantic search, similarity search, and RAG pipelines., 

Indexing Techniques

  • Flat Index (Brute Force) → accurate but slow.                                                                                         

  • Approximate Nearest Neighbor (ANN) → fast and scalable.

    • Algorithms: HNSW, FAISS, Annoy.
    • f3Q1622KC84AAAAASUVORK5CYII=                      8pk5+AsHqPHAAAAAElFTkSuQmCC.     

      3. Retrieval-Augmented

...

See on Wikiteka »

SOLW-

  • Dr. Kaufman’s sailboat model & the needs associated with it (Pg2)

    • The Hull (the butt of the boat): Represents our security & stability needs- things like safety, connection, & self-esteem. If the hull hs “holes” (like trauma, fear, or instability), we can’t really move forward because all our energy goes into surviving or patching it up. These R the foundations that keep the boat steady

  • The Sail: Stands 4 our growth & exploration needs-curiosity, purpose, love,

...

See on Student Notes »

Lllll

import socket

def download webpage (host, path="/"):

# Create a TCP socket

client socket socket.socket (socket. AF INET, socket.SOCK STREAM)

# Connect to the host (HTTP port 80)

client_socket.connect((host, 80))

# Send an HTTP GET request

request = f"GET (path) HTTP/1.1\r\nHost: {host}\r\nConnection: close\r\n\r\n"

client socket.send(request.encode())

# Receive the response from the server

response = b""

while True:

part client_socket.recv (4096)

if not part:

break

response += part

...

See on Student Notes »

civ asia

Shang Dynasty (c. 1600–1046 BCE) – First historically confirmed Chinese dynasty centered along the Yellow River. Known for bronze metallurgy, oracle bones, urbanization, and ancestor worship, ruled by kings claiming divine authority.

Oracle Bones (c. 1200 BCE) – Animal bones or turtle shells used for divination during the Shang dynasty. Questions were inscribed, heated, and the cracks interpreted; they contain the earliest known Chinese writing.

Mandate of Heaven (Tianming) – Zhou-era political

...

See on Student Notes »

domain 4 new

🧩 4.1 Security Administration on Computing Resources

🔹 Secure Baselines

  • Define secure configurations (disable unused ports, enforce strong passwords, patch systems).

  • Deploy via configuration tools (Group Policy, Ansible, SCCM).

  • Maintain through regular audits and updates.

🔹 System Hardening

Target Key Techniques
Workstations/Servers Disable Telnet/FTP; patch OS/apps; use AV + firewall; limit admin privileges.
Mobile Devices Use MDM, enforce encryption, PIN/biometrics,
...

See on Student Notes »

java cheat sheet

Chapter 1-accessModifier staticOrInstance returnType methodName(parameterType parameterName, ...) {

API (Application Programming Interface): collection of predefined classes, interfaces, methods (libraries). Java is a simple (easy to learn), object-oriented (uses objects and classes), distributed (supports network-based applications), and interpreted (runs via JVM from bytecode) language. It is robust (strong in error handling and memory management), secure (protects against threats with built-in

...

See on Student Notes »

Python Inheritance

Inheritance in Python

Inheritance allows a class to use and extend the properties and methods of another class.
It promotes code reusability and reduces duplication.
Think of it as “child learns from parent.” 👨‍👦‍💻

Program with no Inheritance:

import datetime
class TennisPlayer:
def __init__(self, fname, lname, birth_year):
self.first_name = fname
self.last_name = lname
self.birth_year = birth_year
self.aces = []

def get_age(self):
now = datetime.datetime.now()
return now.year - self.birth_
...

See on Wikiteka »