Jump to content

Computer Science

  1. Can you create a crypto base on only SQL?

    • 0

      Reputation Points

    • 1 reply
    • 850 views
  2. Started by PeterBushMan,

    I think 1) If there is one transaction, the first one. There are one database and one record, if there are x transactions, There are x databases and x records. in each database, they have the same records. 2) The password is 32 characters long.

    • 0

      Reputation Points

    • 0 replies
    • 681 views
  3. Started by Peterkin,

    Oh, groan, oh moan, Microsoft is telling me that Windows 11 is ready to download. Another buggy, prematurely released, insufficiently tested program that gloms up my bandwidth (There are six computers at this address!) so I can't watch Silent Witness for a month, that offers five new features that I don't need, don't want, don't know how to turn off and it causes at least one of my essential applications to crash. I'll resist as long as I can, but sometime, I know, in the middle of the night, it'll just break in, disable Bitdefender and download itself anyway. D'you ever feel like you're living in Masada?

    • 0

      Reputation Points

    • 10 replies
    • 1.8k views
  4. Started by dNY,

    Hey guys, I'm building a financial app and I need some help with making a "distribution coefficient/index" (best math name I could give it). The idea behind it is: - There's a total balance. Let's call it "X". - There are users with different shares at stake on "X": A, B, C and D (users). - Each user has a % allocation depending on how much they have at stake on "X". Let's say: - A --> 10 units --> 10% - B --> 20 units --> 20% - C --> 30 units --> 30% - D --> 40 units --> 40% X = 100 ---> 100% I need a coefficient (let's call it "Y") capable of determining the new allocation % of each user once any of them has added mor…

    • 0

      Reputation Points

    • 3 replies
    • 1.3k views
  5. Started by adisharma,

    Hello Everyone, Im working with Quantrix. A java based software. The scripting language is Groovy and i want to build a customized function, a simple linear regression. Im not a java developer so I truly just know the fundamentals. My code takes a gander right now like this. I think the issue is some place in the syntax, which im not that familiar working with. double simple_regression(double dependend_values, double independend_values, double x_test) { slope = double slope(dependend_values, independend_values) intercept = double intercept(dependend_values, independend_values) return intercept + slope * x_test } Here is another try…

    • 1

      Reputation Points

    • 2 replies
    • 1.8k views
    • 1 follower
  6. Let's say the exchange holds you keys.

    • 0

      Reputation Points

    • 1 reply
    • 859 views
  7. 1) I think if the governments disallowed bitcoin, the price of bitcoin will go down to 0. 2) If someone find a way to make perfect fake bitcoins, the price of bitcoin will go down to 0. Finally, bitcoin is not 100% secure, CIA did take some bitcoins back from those Russian hackers.

    • 0

      Reputation Points

    • 1 reply
    • 869 views
  8. Which countries have their own cryptocurrency?

    • 0

      Reputation Points

    • 9 replies
    • 2.2k views
    • 1 follower
  9. exclude password, what kind of login security tokens we can have?

  10. Started by PeterBushMan,

    1) For scan a QR code, which app do I need? 1) How to scan a QR code?

    • 0

      Reputation Points

    • 9 replies
    • 1.8k views
    • 1 follower
  11. Started by GBFYHU,

    Hello sir] What is this software finacle bank

    • 1

      Reputation Points

    • 3 replies
    • 1.2k views
    • 1 follower
  12. How to Open Command Prompt as administrator?

    • 1

      Reputation Points

    • 7 replies
    • 2k views
    • 1 follower
  13. Started by zak100,

    Hi, I have got following regular expression: (bba U aab)* Is this similar to: (bba)* U (aab)* I think they are same, please guide me. Zulfi.

    • 1

      Reputation Points

    • 21 replies
    • 3.3k views
    • 1 follower
  14. Before the size of text is normal, now it displays text in very small size. I checked the setting, Font size = Large.

    • 0

      Reputation Points

    • 6 replies
    • 1.5k views
  15. I am trying to connect to my MQTT broker that is located on a Raspberry Pi. I am trying to publish to the RPi remotely using Wifi on my laptop. I have already verified that I can connect to the Raspberry Pi by connecting to it through SSH - port 22. However, when I try to run my code I get this error and apparently I fail to connect to the broker. Is there a way to fix this? Traceback (most recent call last): File "F:/multi_mqtt.py", line 55, in <module> client.connect('10.xxx.xxx.xxx', 1883, 60) File "C:\Python27\lib\site-packages\paho\mqtt\client.py", line 612, in connect return self.reconnect() File "C:\Python27\lib\site-packages\paho\mqtt\clie…

    • 0

      Reputation Points

    • 1 reply
    • 2.4k views
  16. I have a collection of triangles on the screen and the color at each point on each triangle is determined by an algorithm and therefore cannot be approximated by barycentric interpolation. I want to render this triangle quickly and accurately. Here is my attempt at a solution: I have the program calculate the screen area of the tringle using a cross-product. Then it calculates the color difference between each point using the Pythagorean theorem treating rgb as coordinates i.e. square root of (red2 -red1)2 +(green2-green1)2+ (blue2-blue1)2 What I need to figure out next is what function I should use as a function of color difference and area. I want the user…

    • 0

      Reputation Points

    • 5 replies
    • 1.3k views
  17. Started by Enthalpy,

    Hello everybody! Cryptography uses one-way functions to compute a trace (or message digest) of some "message" (bunch of data). One use is to sign the shorter trace to authenticate a complete message. An acceptable one-way function makes it practically impossible to choose a message to produce a given trace. Nor does it allow to choose two messages to produce any identical trace. One-way functions combine many operations to make the trace a complicated function of the message. If an attacker finds some relation(s) of computer-manageable complexity between the message and the trace, he can produce a reduced set of messages that have better chances to obtain a…

    • 0

      Reputation Points

    • 0 replies
    • 726 views
  18. It is a very big file.

    • 0

      Reputation Points

    • 3 replies
    • 1.2k views
  19. Greetings. An "internet4" without advertising, with no intrusions from Google and other profit-first oriented entities, with zero social networks, not for entertainment, and no idiots pushing malware. Erasing the blackboard, like getting back to ~1995 when navigating the web was a wonder. Yes, too big of a dream. But could it be possible ? The existing players can stay with its chaos where they are. Just a new page/chapter, not meant to promote lazyness.

    • 0

      Reputation Points

    • 2 replies
    • 1k views
  20. Carl Hewitt, in one of his papers, proved that the Turing Machine is incapable of full-fledged non-deterministic computation. I am too lazy now to look for this paper, I will retell this proof. Suppose we need to get a random number. The algorithm for a Turing machine will be as follows: add 1 go to step 1 or 3 non-deterministically stop It may never stop. For actors, the algorithm is as follows: Send to yourself 2 messages "stop" and "+1" The computation is guaranteed to stop.

    • 2

      Reputation Points

    • 44 replies
    • 5.9k views
    • 2 followers
  21. I guess you have to know/get another's ID/Password, then you can login their computers. It is remote login. Am I pure wrong?

    • 0

      Reputation Points

    • 2 replies
    • 987 views
    • 1 follower
  22. Windows 10 is really a piece of shxt.

    • 1

      Reputation Points

    • 3 replies
    • 1.1k views
    • 1 follower
  23. Being on no computer forum, I try here to expose my problem. Indeed I want to create and manage a specific log file (we already have /var/log which runs it) but I want to intercept the bits/words of these instructions. What are the files and the directory that starts the execution of the first instruction when we calling ssh or sftp? Knowing that there are the sftp or ssh deamons that listen and the /bin/ssh or /bin/sftp scripts that start the service. I thought it was just the files in the /bin directory that started when calling the service. This would therefore amount to recompliling the /bin files. There may also be the solution of PID Process. Th…

    • 1

      Reputation Points

    • 18 replies
    • 2.9k views
    • 2 followers
  24. I know three, are there any others. C-users-username-appdata- local -temp C:\Users\username\AppData\LocalLow\Temp C\temp

    • 0

      Reputation Points

    • 1 reply
    • 811 views
  25. Imagine a CPU sitting idle. It doesn't have any program loaded, nor is it a part of some large system. It is just connected to power. What parts of the CPU are used during this time?

    • 1

      Reputation Points

    • 10 replies
    • 2.2k views
    • 2 followers

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.