lint all files

This commit is contained in:
2024-01-16 13:48:46 +00:00
parent b515ba4458
commit a321b0ce99
45 changed files with 66985 additions and 23206 deletions

View File

@@ -1,4 +1,3 @@
1)
**a) Choose a number between 51 and 70. This will be number A. Choose another number between 80 and 120. This will be number B. Using 2s complement 8-bit binary arithmetic, calculate number A number B giving your answer in binary and decimal. (5 marks)**
Number A - 64 - 0100 0000
@@ -9,7 +8,7 @@ Number B - 96 - 0110 0000
| Num A | 0100 0000 |
| Num B | 0110 0000 |
| Flip B | 1001 1111 |
| Add 1 | 1010 0000 |
| Add 1 | 1010 0000 |
|||
| Num A | 0100 0000 |
| Num B | 1010 0000 |
@@ -99,4 +98,4 @@ NumberF - 223
| OR (Hexadecimal) | 0xFF |
| OR (Octal) | 0377 |
Here, I have picked two numbers, the first of which is converted to hexadecimal, and the second converted to octal using a division conversion method on the decimal value. Then I have done a bitwise operation for OR on the two binary values to get a binary value, and then converted to decimal, hexadecimal and octal - in this case it is the maximum value for each using 8 bit binary.
Here, I have picked two numbers, the first of which is converted to hexadecimal, and the second converted to octal using a division conversion method on the decimal value. Then I have done a bitwise operation for OR on the two binary values to get a binary value, and then converted to decimal, hexadecimal and octal - in this case it is the maximum value for each using 8 bit binary.

View File

@@ -1,4 +1,4 @@
1) **Choose a short phrase of between 50-60 characters. You could choose a website headline, song title, etc. Convert this phrase using Caesar shift encryption and a key of 5 to create your ciphertext. Carry out a cryptanalytic attack to try to work out the decryption key and plaintext. (10 marks)**
1. **Choose a short phrase of between 50-60 characters. You could choose a website headline, song title, etc. Convert this phrase using Caesar shift encryption and a key of 5 to create your ciphertext. Carry out a cryptanalytic attack to try to work out the decryption key and plaintext. (10 marks)**
F1 veteran to retire and take up new role in 2024.
@@ -26,7 +26,7 @@ This results in a key of 5, so translating the 2nd word: ajyjwfs -> veteran. Thi
`K1 ajyjwfs yt wjynwj fsi yfpj zu sjb wtqj ns 2024.` -> `F1 veteran to retire and take up new role in 2024.`
2) Computer A sends 5 packets of data to computer B using Sliding Windows Flow Control.
1. Computer A sends 5 packets of data to computer B using Sliding Windows Flow Control.
- The transmission time (time to put on the network) for a packet of data is 1 'time units'
- Transmission time for an acknowledgement is 0 time units (they are very small)
- The propagation time (time to travel through network) for any transmission is random (between 3 and 5 time units, you choose a random time for each packet and acknowledgement sent).
@@ -40,7 +40,6 @@ Propagation Time = 3-5tu
Processing Time (B) = 2tu
Window Size = 2
For propagation time, I am going to use the following values:
For propagation time, I am going to use the following values:
( 0 = 3, 1 = 3, 2 = 4, 3 = 4, 4 = 5), and for simplicity's sake, I will mirror the propagation time there with the propagation time back for the acknowledgement.
-
![](Pasted%20image%2020231127121331.png)
![](Pasted%20image%2020231127121331.png)

View File

@@ -4,4 +4,4 @@
![](Pasted%20image%2020231121091508.png)
- Task 1.3 (3 marks): Using absolute filenames (ones that start with a /), move the grep.txt file into the “Workshop 1” directory. cd into the “PDP” directory. Using relative filenames (.. notation ones that don't start with a /), copy the cv.txt file into the “CV” directory. cd into the “CSIL” directory. Using relative filenames ones that don't start with a /), rename the “Workshop 1” directory so it is called “Tutorial 1” Run the tree command and include images of the commands and the tree/find output. Your final output should also include your command history.
![](Pasted%20image%2020231121092319.png)
![](Pasted%20image%2020231121092342.png)
![](Pasted%20image%2020231121092342.png)

View File

@@ -5,4 +5,4 @@
3.3: Change all consoles years from the 20th century (19xx) to “antique”.
![](Pasted%20image%2020231127122617.png)
3.4: With lines that contain "Hybrid" append the line "Runs better when plugged into a TV."
![](Pasted%20image%2020231127122817.png)
![](Pasted%20image%2020231127122817.png)

View File

@@ -1,13 +1,17 @@
## Lecture 1 (12:00)
IEEE-754
- 32 and 64 bit numbers
- Float and double in java
- Promotes interoperability among programming languages
- 32 bit
- Leftmost bit is a sign bit (0=+ve 1=-ve)
- 8 bit exponent (127 bit unsigned binary number)
- 23 bit mantissa _without_ the 1 infront of the binary point
- 23 bit mantissa *without* the 1 infront of the binary point
### Scientific Notation
13.5 = 1101.1 = 1.1011x2 ^3
2.75 = 10110.11 = 1.011011x2 ^4
0.125 = 0.001 = 1x2 ^-3

View File

@@ -90,4 +90,4 @@ Flow Control is the mechanism that ensures the sender stops transmitting before
- Red number = sent but no acknowledge
- Green number = sent and acknowledged
![](Pasted%20image%2020231030152517.png)
![](Pasted%20image%2020231030152517.png)

View File

@@ -1,2 +1,3 @@
## Lecture 1 (12:00)
### sed
### Sed