test3

• Virtual memory: separation of user logical memory and physical memory
 ◦ Only part of the program needs to be in memory for execution → logical address space > physical address space
 ◦ Allows address spaces to be shared by multiple processes → less swapping
 ◦ Allows pages to be shared during fork()faster process creation


⚙️ Page Fault

Occurs the first time there is a reference to a specific page → traps to the OS
 ◦ OS must decide whether to:
  ▪ Abort...

See on Student Notes »

gyvhvjuvgvh

Strategic Planning Process (In Points)

  1. Define Mission and Objectives
    Identify the purpose of the organization and set clear long-term goals.

  2. Environmental Analysis
    Study internal and external environment using tools like SWOT, PEST, competitor analysis.

  3. Identify Opportunities and Threats
    Understand external factors that may help or harm the organization.

  4. Identify Strengths and Weaknesses
    Analyze internal resources, skills, capabilities, and limitations.

  5. Formulate Strategies
    Develop long-term

...

See on Student Notes »

oihnljh

Jaundice: (Icterus) Yellow discoloration of skin and sclerae from elevated bilirubin levels (2-3mg/dL)
1. Pre-hepatic: prior to liver; blood
- Cause: ↑ RBC destruction
- Pathologic conditions: Sickle cell disease, hemolytic blood transfusion reaction
- Labs: ↑ unconjugated bilirubin
2. Intra-hepatic: within liver
- Cause: Hepatocyte injury → ↓ uptake of unconjugated bilirubin/secretion of conjugated bilirubin into bile
- Pathologic conditions: Viral hepatitis, alcohol or drug induced liver damage,

...

See on Student Notes »

essay

Presidential Clemency, Due Process, and the Ideal of “Justice for All” /n/nPresidential clemency is one of the main constitutional powers in which mercy, accountability, and the rule of law must all be considered. The recent use of clemency showed by Joe Biden and Donald Trump highlight two different approaches to using this power and its meaning for American justice. Both presidents exercised clemency for individuals personally connected to them, raising questions about impartiality. Although

...

See on Student Notes »

jjjjj

1. C. Thi Nguyen – Echo Chambers, Epistemic Bubbles & Misinformation

Epistemic Bubbles

  • Missing opposing views by omission.

  • Caused by algorithms, selective exposure, homogeneous friend networks.

  • Effects: bad informational coverage + inflated confidence.

  • Solution: Add missing information; exposure works.

Echo Chambers

  • Opposing views actively discredited.

  • Members hear outside info but reject it due to distrust.

  • Uses cult-like strategies: “outsiders = corrupt/evil”; insiders

...

See on Wikiteka »

agfas

Starting from an {{c1::aniline}} ({{c1::Ar–NH₂}} with possible substituents like {{c1::tert-butyl}}), you can form an {{c1::aryl diazonium ion}} via {{c1::N-nitrosylation/diazotization}} using {{c1::NaNO₂, HCl, H₂O}} at about {{c1::0 °C}}. This gives an {{c1::N-nitrosamine intermediate}} that decomposes to {{c1::Ar–N₂⁺}}. For an {{c1::aromatic amine}}, the {{c1::diazonium ion}} is {{c1::stable at 0 °C}} and does {{c1::not react}} without heating. In contrast, {{c1::alkyl diazonium...

See on Student Notes »

GEA1000

Topic 1.1 Sampling Method

+ Simple Random Sampling, equal prob of being selected --> gd representation but may have non-response bias

+ Systematic Sampling, applying a selection interval k from a random starting point, equal prob of being selected --> simple but not good representation if there is a pattern in the way subjects are lined up

+ Stratified Sampling, sampling frame divided into strata, size of each stratum doesn't need to be the same, apply simple random sampling to each stratum,

...

See on Student Notes »

MCA-IS

The various types of active attacks are described as follows:

  • Masquerade Attack: This occurs when an unauthorized entity pretends to be a legitimate user or system to gain access to resources. For example, an attacker sends a message to a user pretending to be someone else, and the recipient is unaware of the impersonation. The guide uses the scenario of "Darth" sending a message to Alice pretending to be Bob.
  • Replay Attack: This involves the unauthorized capture of data and its subsequent retransmission
...

See on Student Notes »

Bankcuruptu

RELATIONSHIP BETWEEN THE INSOLVENCY AND BANKRUPTCY CODE, 2016 (IBC) AND THE REAL ESTATE (REGULATION AND DEVELOPMENT) ACT, 2016 (RERA)
(20 Marks)
INTRODUCTION
The real estate sector in India historically suffered from delayed projects, insolvency of developers, diversion of funds, and lack of accountability. To address these issues, two major legislations were introduced in 2016:
The Insolvency and Bankruptcy Code, 2016 (IBC) – a comprehensive mechanism for resolving insolvency of corporate persons...

See on Student Notes »