đïž Explore my blog
Data Protection and Identity
* Encryption
* Role-based Access Control
* Network Security
* Key Vaults
* Azure Information Protection
* Sentinel
Status: #idea
Tags: Cloud
References
Directed Acyclic Graph
steps
1. Look for Three Address Code (TAC)
1. Create DAG based on TAC
From left to right
Don't repeat any nodes
Example Alvina Aulia Directed Acyclic Graph
Pasted image 20241231162515.png
T1 = b - c
T2 = a \* T1
T3 = T1 \* d
T4 = a + T2
T5 = T4 + T3
x = T5
Screenshot 2024-12-09 at 1.06.21 PM.png
Status: #idea
Tags: compilation-techniques > Final Exam
References
Disk Scheduling (Simulation)
* The arrangement of how we access desired cylinders
* Start from the head pointer
FIFO / FCFS
* Using the queue order
Pasted image 20250102125825.png
(98-53)+(183-98)+(183-37)+(122-37)+(122-14)+(124-14)+(124-65)+(67-65) = total head movement of 640 cylinders
SSTF (Shorter Seek Time First)
* Find the closest
Pasted image 20250102131516.png
(65-53)+(67-65)+(67-37)+(37-14)+(98-14)+(122-98)+(124-122)+(183-124) = total head movement of 236 cylinders
SCAN
* like an elevator scans to one end
ETL Process
1. Extract
1. Transform
1. Load
Status: #idea
Tags: data processing
References
Encryption
* ï»żï»żSecures data at rest
* ï»żï»żProtects data in transit
Status: #idea
Tags: Cloud, Data Protection and Identity
References
First
first character in the terminal values
!! if there are multiple terminal values (x | y), there can be many First values
Status: #idea
Tags: compilation-techniques
References