Home / Computer

Computer Graphics - 12

9. Suppose edge AB is an edge of the pruning window, P 0 P 1 . P N-1 is the list of vertices of the polygon to be pruned (convex convex polygon). According to Hogmans algorithm, P i-1 and P i are both on the right side of edge AB, then the vertex included in the list of polygons after pruning ...

Computer Architecture - 11

Chapter V: IMPORT - EXPORT Purpose: Introduce some external storage devices such as: magnetic disks, optical disks, memory cards, magnetic tapes. Introduce the basic connection system of internal computer components. How to communicate between peripherals and the processor. Methods of data security ...

Computer Network Security and Firewalls - 2

DRAWINGS USED IN THE PROJECT Figure 1.1.1a: General structure of a computer. 14 Figure 1.1.1b: Computer central processing unit (CPU) 15 Figure 1.1. 1c: Control unit of CPU 16 Figure 1. 1.2: Basic functions of a computer 17 Figure 1.2. 1: Computer network with preprocessor. 18 Figure 1.2.4.3.1: ...

Requirements to Ensure Correct Application of Criminal Law on the Crime of Using Computer Networks, Telecommunications Networks, and Electronic Means to Commit Acts of Appropriation

- Regarding identifying sources of evidence and collecting evidence: Circular 10/2012/TTLT-BCA-BQP-BTP-BTT&TT-VKSNDTC-TANDTC dated September 10, 2012 of the Ministry of Public Security, Ministry of National Defense, Ministry of Justice, Ministry of Information and Communications, Supreme ...

Computer simulation, assembly and quotation software - 2

LIST OF FIGURES, TABLES AND CHARTS LIST OF IMAGES Figure 2-1: Computer structure 8 Figure 2-2: 9-key keyboard Figure 2-3: Mouse 9 Figure 2-4: CPU 9 Figure 2-5: MAINBOARD 9 Figure 2-6: HDD 10 Figure 2-7: SSD 10 Figure 2-8: RAM 10 Figure 2-9: Projector 10 Figure 2-10: Screen 10 Figure 2-11: Models in ...

Home Reference Doccument