Bilgi Teknolojileri Bolumu (35) ( ITEC / CSIT)

Review of Frequently used UNIX Commands

REVIEW OF FREQUENTLY USED UNIX COMMANDSGENERAL COMMAND SYNTAX:$ command –[options] <arguments>DISPLAYING CONTENTS OF A DIRECTORY:$ ls      (simple form)$ ls –l  …

10 ay ago

Exercisec About FILES (ifstream)

FILE EXERCISES student.txt file contains student number, mt1, mt2 and final exam results 980000 50 40 60 980001 38 90…

11 ay ago

1.1. The New Insecurity

Since the terrorist attacks on September 11, 2001, computer security has taken on some new meanings. The first is positive.…

3 yıl ago

1.1.1.1. Information Sharing and Analysis Centers

Akin to CERTs, Information Sharing and Analysis Centers (ISACs) help develop and promulgate "best practices" for protecting critical infrastructures and…

3 yıl ago

1.1.2.1. Computer Crime

Computer crime has also become a major threat to business. According to the Federal Bureau of Investigation, computer crime is…

3 yıl ago

1.1.1.3. No computer Is An Island

While once it was easy to ignore most warnings and scares as mere nuisances because most sites were isolated and…

3 yıl ago

1.1.1.2. Vulnerable broadband

Just as corporate and government users are bonding together to provide mutual protection, however, a huge emerging class of users…

3 yıl ago

Lecture 1

CSIT341 LECTURE 1 INPUT/OUTPUT : OUTPUT : Uses ostream class cout is the object of the class ostream Output Operator…

14 yıl ago