Lectures 1–3
IoT (Internet of Things) – interconnected physical devices exchanging data
MMU (Malfunction Management Unit) – hardware failsafe
Invariant – rule defining safe system states
NTCIP – ne2rk protocol 4 traffic signal controllers
DoS / DDoS – denial of service (resource flooding)
Replay Attack – reuse of old valid data packets
Eavesdropping – intercepting communication
Injection Attack – unauthorized commands/data inserted
Tampering – altering transmitted or stored...
Method overloading
•In Java it is possible to define two or more methods within the same class that share the same name, as long as their parameter declarations are different.
•Overloaded methods must differ in the type and/or number of their parameters
•When an overloaded method is invoked, Java uses the type and/or number of arguments as its guide to determine which version of the overloaded method to actually call.
• return type do not play any role in overload resolution
class...
A clock that oscillates 1 million times per second (1 MHz) produces a clock cycle of 1 microsecond (1 μs), which equals 10−610−6 seconds per cycle.
The steps of executing a machine instruction are: fetch the instruction, decode it, fetch the operand if any, execute the instruction, and store the result or output.
Cache memory is a small, fast memory used to temporarily store frequently accessed data or instructions to speed up CPU operations. A cache hit occurs when the CPU finds the
Definition: Achieving marketing objectives through digital media, data, and technology.
Key Elements: Audiences, digital devices, platforms, media, data, technology.
Customer Lifecycle: Awareness → Consideration → Purchase → Post-Purchase/Advocacy
Benefits: Cost-efficient, measurable, real-time, targeted, global reach.
Goal: Conversion-focused, user-friendly, mobile-optimized design....
[1 mark] A clock that oscillates 1 million times per second (1 MHz), produces a clock cycle with 10-6second. 2. [1 mark] The general-purpose registers that can be accessed in 8 bits, 16 bits and 32 bits are EAX, EBX, ECX and EDX. 3. [2 marks] Write down the purpose of the EAX and ECX registers? EAX – accumulator: Automatically used by multiplication and division instructions, often called as extended accumulator register. ECX – loop counter: CPU automatically uses ECX as a loop counter.
...CAD Software:
3D: SolidWorks, Fusion 360 (Parametric, Feature-Based)
2D: AutoCAD (Precise Drafting)
Design Process & Goals:
Steps: Conceptual → Design (2D/3D, Projection, Dimensioning/Tolerancing) → Fabrication.
Goals: Cost-effectiveness, Reliability/Durability, Safety, Ergonomics, Sustainability, Maintainability, Visual Appeal.
Technical Drawing Tools:
Traditional: Freehand, Instruments (Triangles, Compasses)
Hydrophilic: Nucleic Acids, Carbohydrates, Starch, Chitin
Hydrophobic: lipids
Organic Moleculle: CH4, Glucose
RNA: Uracil -- DNA: Thymine
Maltose Glucose Molecules
Create polymers from monomers- Dehdration Reaction
Unsaturated Fats & Oils- Contain Carbon Cabon double bonds in their fatty acids
Monosaccarides: glucose, fructose, and galactose
Protein Structure: Primary- Peptide Bonds: Secondary- Hydrogen bonds: Tertiary- Hydrogen Bonds Quaternary: Polypeptide chains.
Why is glucose hydrophilic?...
0
ANT100 Midterm Notes Sheet Name: [Your Name] (top-right)
L1: Fieldwork Definitions & Key Ideas
There is little doubt that the quality and frequency of our real-life conversations are declining, and social media must be held largely responsible for this shift. While these digital platforms promise connection, their underlying mechanics often undermine the very fabric of genuine communication. The endless pursuit of a perfect online persona weakens the enduring bonds formed through authentic, face-to-face interaction, suggesting that our digital habits are actively harming our social health.