18 Mark马克



AL, IGCSE, IFD Computer Science teacher

TA的排名 8k+

Bus and Star Topology

Bus and Star TopologyStar TopologyThe advantages of star topology:The disadvantages of star topology:Star TopologyThe advantages of star topology:If one link of the connections fails, the others will not be affected.Adding a new device to or removing

2020-07-01 14:22:56

Packet Switching vs. Circuit Switching

Packet Switching vs. Circuit SwitchingWhat is the Difference Between Packet Switching and Circuit Switching?新的改变功能快捷键合理的创建标题,有助于目录的生成如何改变文本的样式插入链接与图片如何插入一段漂亮的代码片生成一个适合你的列表创建一个表格设定内容居中、居左、居右SmartyPants创建一个自定义列表如何创建一个注脚注释也是必不可少的KaTeX数学公式新的甘特图功能,丰富你的文章UML 图表F

2020-06-20 10:54:22


BitTorrentBitTorrent protocolKey termsBitTorrent protocolBitTorrent protocol is a peer-to-peer file sharing protocol. It works very differently from the traditional p2p files sharing protocol.Traditional file sharing protocol uses client-server model, w

2020-06-18 21:29:04


ProtocolsWhat is a protocol?TCP/IP protocol suiteWhat is a protocol?A protocol is a set of rules about the format of the messages exchanged between computers. The rules are agreed by both the sender and the receiver/recipient.TCP/IP protocol suiteTCP:

2020-06-13 08:43:12

underflow, overflow, approximation and rounding error

Underflow, overflow, approximation & rounding errorWhat is underflow and what is overflow?Why may a floating-point representation be an approximation?What is rounding error?What is underflow and what is overflow?In computer science, real numbers are

2020-06-11 10:26:19

File organization & File access

File organization & File accessFile OrganizationSerial file organizationSequentail file organizationSequential file organization with fixed-size recordsDirect-access (random access) file organizationMethods of file accessDirect-access file organization

2020-06-09 08:34:23

User defined data types

Why are user-defined data types necessary?The build-in data types are not good/adequate enoughUser-defined data types make the program code more understandable and less error-proneWhat is a composite data type and what is a non-composite data type?A

2020-06-04 14:27:35


The following table shows the comparison betwee HDD and SSD.| |HDD| SSD||:–|Cost Not expensive/Cheaper (than SSD) More Expensive (than HDD)Capacity Larger capacity Usually smaller storage capacity, even though that there are large size SSD, over 1TB, b

2020-05-28 21:07:58

Real-time streaming & on-demand streaming

Bit streamingNumbers, text, audio, video are all represented in binary form on computer. They are all represented by a bunch of 0s and 1s. Each 0 or 1 is called a bit. When there is a need to transmi...

2020-03-20 09:21:32

Recursion in computer science

What is recursion?In math, recursion is a common concept. It means that a function is defined in terms of itself. For example, the factorial function is defined:f(n) = n * f(n-1)f(0) = 1f(n) is de...

2020-02-19 11:56:58

Possible ways in which malware can be introduced

The introduction of malware is associated directly with the activities of legitimate users of a system. Examples are:Attaching portable storage deviceFew decades ago, when internet was not a norm, ...

2020-02-10 16:51:54

Computer Malware

A malware is a software that is designed to get on a computer and cause harms to the information there or problems with the way it works. Malware is the colloquial name for malicious software. Compute...

2020-02-09 22:46:16

Computer mouse

The use of mouse became a norm with the creation of the Graphic User Interface. GUI introduced windows, menus, dialogs and other features to the User Interface (UI), which totally transformed the func...

2020-02-06 23:46:02

Stepwise Refinement

What is stepwise refinement?The verb refine means to improve a method, plan, system etc., gradually making slight changes to it. The word stepwise means to do something in a series of distinct stage...

2020-02-04 18:50:38


Key pointsA video is simply a succession of still images/sequence of still images.Frame rate: the number of frames displayed per second, usually expressed in FPS.The resolution of a video is the n...

2020-02-03 17:34:08

Input and output of sound

Key pointIn physics, sound is a vibration that propagates as an acoustic wave through a transmission medium, such as a gas, solid or liquid.In computer science, all type of information has to be in...

2020-02-01 14:19:31

The internal operation of a laser printer

The core principleThe core principle is the physical law: opposite charges attract, like charges repel.Main componentsA drum, photoreceptor drum, photosensitive drumThe drum is coated with photos...

2020-01-31 22:25:55

Digital Certificate

Previously, in digital signature, we mentioned that it is possible that an attacker may pretend to be someone else, generate the pair of keys, make a fake message, generate a digest using hash functio...

2020-01-31 13:58:31

Digital signature

In asymmetric encryption, the sender and the recipient, each has a pair of keys, a public key and a private key. The public key and private key are mathematically linked together. If a message is encr...

2020-01-30 23:19:22

Symmetric encryption VS Asymmetric encryption

Encryption is a process of encoding the plaintext with a key to generate ciphertext so that the plaintext is unreadable. In such a way, the confidentiality of the original message is guaranteed.Decr...

2020-01-30 12:33:23


勋章 我的勋章
  • 签到新秀
  • 阅读者勋章Lv1
    授予在CSDN APP累计阅读博文达到3天的你,是你的坚持与努力,使你超越了昨天的自己。
  • 持之以恒
  • 勤写标兵Lv3