Core C++ Programming Concepts and Data Principles

Data Collection Fundamentals

Data collection is the process of measuring and gathering information on desired variables to answer specific research questions. It is a common feature of study in various disciplines, such as marketing, statistics, economics, sciences, and more. While the methods of collecting data may vary according to the subject, the ultimate aim of the study and honesty in data collection are equally important in all matters of study.

Primary vs. Secondary Data

Primary data is collected

Read More

Computer Architecture Fundamentals: MIPS & Memory Concepts

Memory Data Interpretation and Endianness

An array of 10 unsigned integers is stored in memory. Each integer occupies 3 bytes. The data, stored in little-endian format from low address to high, is:

7D21F05BE3FA665531540A6BCA73AB714750AF050A2F395F71CC0CC367AB

Problem: What is the unsigned integer in decimal read from memory if element 9 is read in big-endian format? (The first element is element 0.)

Segmentation of 3-Byte Integers

The 10 unsigned integers, each 3 bytes (6 hexadecimal digits), are segmented

Read More

Core Concepts in Network Security

Trusted Systems Explained

A trusted system is a computer system or network designed, implemented, and tested to meet specific security requirements. Trusted systems are crucial for protecting sensitive information, preventing unauthorized access, and ensuring the integrity and availability of data and systems.

Typically, a trusted system is designed with a comprehensive set of integrated security features, such as:

  • Access controls
  • Authentication mechanisms
  • Encryption algorithms

These security features

Read More

Understanding Network Security Architecture and Protocols

Vocabulary

Network Architecture

Security Perimeter: First line of protection, includes firewalls, proxies, and Intrusion Detection Systems (IDS).

Network Partitioning: Segmenting networks into isolated domains of trust.

Dual-Homed Hosts: Having two network interface cards (NICs), each on a separate network.

Bastion Host: Gateway between trusted and untrusted networks that gives limited authorized access to untrusted hosts.

Demilitarized Zone (DMZ): Isolated subnet that allows an organization to give external

Read More

Compiler Design: Implementation of Key Algorithms

Shift-Reduce Parser Implementation (EXP-6)

This section demonstrates a shift-reduce parser implementation in C++.


#include <iostream>
#include <cstring>
using namespace std;

int z = 0, i = 0, j = 0, c = 0;
char a[16], ac[20], stk[15], act[10];

void check() {
    strcpy(ac, "REDUCE TO E -> ");
    for (z = 0; z < c; z++) {
        if (stk[z] == '4') {
            cout << ac << "4" << endl;
            stk[z] = 'E';
            stk[z + 1] = '\0';
            cout 
Read More

Computer Network & Hardware Fundamentals

Computer & Network Fundamentals

Understanding Computer Networks

A network is a group of interconnected devices which exchange information and share resources.

Network Components

  • Server: A main computer that provides a service on a network.
  • Client: A network computer used for accessing a service on a server.

Exercise Prompts (Original Fragments)

  • Server: Most networks…
  • Client: This is the desktop…
  • Peripherals: Once you have…
  • Hub: Desktops typically…

Types of Networks

The exchange of information among

Read More