0% found this document useful (0 votes)
23 views7 pages

Assignment

Uploaded by

jobaseki62
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views7 pages

Assignment

Uploaded by

jobaseki62
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Obaseki osakpamwan Joshua

Mechanical engineering
23/0935
Computing and software engineering (GET211)

1. IEEE Standards in Networking

IEEE standards in networking ensure compatibility and interoperability between devices. They provide
guidelines for technologies such as Ethernet, Wi-Fi, and Bluetooth, enabling seamless communication in
networks.

2. Short Notes on IEEE Standards

Ÿ I. IEEE 802: Focuses on LAN and MAN standards, including Ethernet (802.3) and wireless networking
(802.11).
II. IEEE 802.11: Defines Wi-Fi standards for wireless LANs, covering protocols like 802.11n/ac/ax for
high-speed data transfer.

Ÿ III. IEEE 802.15: Standard for Wireless Personal Area Networks (WPANs), including Bluetooth and
Zigbee.

Ÿ IV. IEEE 802.16: Known as WiMAX, it provides wireless broadband access over long distances.

Ÿ V. IEEE 802.1Q: Specifies VLAN tagging for traffic segregation in networks.

Ÿ VI. Wireless Fidelity (Wi-Fi): Wireless technology that connects devices to a network via radio signals.

3. Four Basic Concepts in Networking

Ÿ Topology: The arrangement of nodes and connections (e.g., star, bus, ring).

Ÿ Protocols: Rules governing data exchange (e.g., TCP/IP, HTTP).

Ÿ IP Addressing: Unique identification of devices in a network.

Ÿ Routing: Determining the best path for data transmission.

4. Five Networking Components

Ÿ Router: Directs data packets between networks.

Switch: Connects devices within a network and manages data traffic.

Ÿ Firewall: Protects against unauthorized access.

Ÿ NIC (Network Interface Card): Connects a device to a network.

Ÿ Cables: Transmit data physically between devices.

5. Four Types of Networks

Ÿ LAN (Local Area Network): Covers small areas like offices or homes.
Ÿ WAN (Wide Area Network): Spans large geographical areas (e.g., the internet).

Ÿ MAN (Metropolitan Area Network): Connects networks in a city or campus.

Ÿ PAN (Personal Area Network): Used for personal devices like smartphones and wearables.

6. Four Networking Protocols

Ÿ TCP (Transmission Control Protocol): Ensures reliable data transmission.

Ÿ IP (Internet Protocol): Handles addressing and routing of data.

Ÿ HTTP (Hypertext Transfer Protocol): Facilitates web communication.

Ÿ SMTP (Simple Mail Transfer Protocol): Manages email delivery.

7. Two Architecture Models in Networking

Ÿ OSI Model: A seven-layer model for understanding communication (e.g., application, transport, network
layers).

Ÿ TCP/IP Model: A simpler, four-layer model focusing on internet technologies.

8. Security in Networking

Data integrity ensures that data remains accurate and unaltered during transmission. Security types
include encryption, firewalls, intrusion detection systems, and multi-factor authentication.

9. Five Applications of Computer


Networking

Ÿ Email communication.

Ÿ File sharing.

Ÿ Video conferencing.

Ÿ E-commerce.

Ÿ Cloud computing.

10. Short Notes on Network Types

Ÿ I. WAN: Connects multiple LANs across cities or countries.

Ÿ II. LAN: A localized network within a small area.


III. PAN: Personal connectivity, often wireless.

11. Object-Oriented Programming (OOP) Concepts

Ÿ I. Class: Blueprint for creating objects.

Ÿ II. Object: Instance of a class with specific properties.

Ÿ III. Encapsulation: Hiding internal details and exposing only essential features.

Ÿ IV. Inheritance: Allows one class to inherit properties from another.


Ÿ V. Polymorphism: Enables methods to behave differently based on the object.

12. Five Innovations OOP Brings to Engineering

Ÿ Reusability of code.

Ÿ Modular design.

Ÿ Improved collaboration through abstraction.

Ÿ Easier debugging and maintenance.

Ÿ Scalability for complex projects.

13. Benefits of HTML/CSS

Ÿ Simple and accessible web design.

Ÿ Cross-platform compatibility.
Customizable layouts.

Ÿ SEO-friendly structure.

Ÿ Interactive and dynamic content support.

14. Advantages of HTML/CSS for Engineers

Mechanical Engineers can use HTML/CSS to create user-friendly dashboards, interactive simulations,
and responsive web interfaces for their tools.

15. Short Notes on Engineering Concepts

Ÿ Schematics: Diagrams showing electronic circuits.

Ÿ PCB Layout: Physical design of a printed circuit board.

Ÿ Firmware: Embedded software controlling hardware.

Ÿ Drivers: Software enabling hardware-device interaction.

16. Software-Hardware Integration

This involves writing firmware, creating drivers, and ensuring APIs allow smooth communication,
enhancing reliability and user experience.

17. Importance of System and Application Software

System software (e.g., OS) manages


hardware, while application software (e.g., browsers) provides user functionality.

18. Operating Systems

Ÿ Realtime: Immediate processing (e.g., medical devices).y

Ÿ Multi-user: Supports multiple users (e.g., UNIX).


Ÿ Multi-tasking: Runs multiple tasks simultaneously.

Ÿ Embedded: Tailored for specific hardware.

Ÿ Server: Handles network resources.

Ÿ Mobile: Designed for smartphones and tablets.

19. Emerging Technologies

Ÿ AI: Simulates human intelligence.

Ÿ Edge Computing: Processes data near the source.

Ÿ IoT: Connects devices to the internet.

Ÿ Neuromorphic Computing: Mimics human brain architecture.

Ÿ Quantum Computing: Solves complex problems using quantum mechanics.

Ÿ Synthetic Media: AI-generated content.

Ÿ Digital Twins: Virtual replicas of physical systems.

Blockchain: Decentralized ledger technology.

Ÿ VR: Immersive digital experiences.

Ÿ XR: Combines AR, VR, and MR technologies.

20. Importance of DBMS

A DBMS organizes, manages, and ensures secure access to databases.

21. Reasons for Relational Databases

Ÿ Data integrity.

Ÿ Flexibility.

Security.

Ÿ Scalability.

Ÿ Support for complex queries.

22. Customer and Orders Tables

Ÿ Primary Key( for the customer table): Customer ID uniquely identifies each customer.

Ÿ Foreign Key( for the order table): Customer ID in the orders table links to the customers table.

23. Normalization

Normalization organizes data to reduce redundancy. Types include:


Ÿ 1NF: Ensures atomicity.

2NF: Removes partial dependencies.

Ÿ 3NF: Eliminates transitive dependencies.

24. Entities

Ÿ Strong Entity: Independent entity.

Ÿ Weak Entity: Relies on a strong entity for identification.

25. ER Model Symbols

Ÿ Rectangle: Entity.
Ÿ

Ÿ Ellipse: Attribute.
Ÿ

Ÿ Diamond: Relationship.

26. Attributes

Ÿ Key Attribute: Uniquely identifies records.

Ÿ Composite Attribute: Combines multiple attributes.

Ÿ Multivalued Attribute: Stores multiple values.

Ÿ Derived Attribute: Computed from other attributes.

27. Concurrency Control

Ÿ Locking. This method uses locks to prevent multiple transactions from accessing in the same data
simultaneously
Ÿ Timestamp ordering: this ensure that transactions are executed in a consistent order, preventing conflicts
and maintaining the correctness of the database state

Multiversion concurrency control. This allows multiple version of data item to exist at the same time

28. Software Development Lifecycle

1. Planning Stage
Definition the project scope and objectives.
- identify the problem that the software will solve.
- determination of project feasibility which involves operational, technical and financial).
- creation of a project plan that involves resources and budget and specific time of completion
2. Analysis Stage
Collection of detailed requirements for the software.
- conducting interviews, surveys, workshops (it depends on the task) with stakeholders to understand their
needs.
- document requirements in a Software Requirements Specification (SRS) document.
- Analyzing existing systems to identify gaps and opportunities.
2. Design Stage
Creation of a blueprint for the software.
- develop architectural designs that shows how different components interacts.
- creation of user interface (UI) designs and wireframes to visualize the application layout.
- specify technical details such as databases, APIs, and security measures.
4. Development Stage
Writing the actual code for the software.
- developers begin coding based on the design specifications.
- utilising programming languages and tools defined in earlier stages.
- regularly commit code to version control systems to track changes.
5. Testing Stage
Ensuring that the software is free of defects and keep to the requirements.
- conducting various types of testing (unit testing, integration testing, system testing).
- identification and fixing of bugs and other issues discovered during testing.
- validating all requirements from the Software Requirements Specification.

6. Implementation Stage
Deployment of the software to users.
- Preparing for deployment by setting up production environments.
- Training users on how to use the new system.
- Releasing the software to end-users. It can be via direct installation or cloud deployment.
7. Maintenance Stage
Ascertaining an ongoing functionality and address any issues due to post-deployment.
- Fixing bugs and resolving other issues.

29. Applications of Software Development

Ÿ Web development.

Ÿ Mobile apps.

Ÿ AI systems.

Ÿ Embedded systems.

Cloud computing.

30. ACID in Database

Ÿ Atomicity, Consistency, Isolation, Durability ensure reliable transactions.

You might also like