CIT 130
Information Technology Fundamentals
Flash Animations
Chapter 2:
Demonstration of the fetch execute cycle
Memory read operation
Memory write operation
Chapter 3:
Binary conversion - 01010101 = 85 (see figure 3.1)
Binary conversion - 11111011 = 251 (see figure 3.2)
Binary conversion - 10111001 = 185
Decimal conversion 89 to binary using division approach (see figure 3.4)
Decimal conversion 220 to binary using division approach
Decimal conversion 103 to binary using division approach
Binary conversion 89 to binary using subtraction approach (see figure 3.5)
Decimal conversion 220 to binary using subtraction approach
Decimal conversion 103 to binary using subtraction approach
Twos' complement example
Binary addition (see figure 3.6)
Binary addition (8 bit example)
Binary AND example
Binary AND example
Binary OR example
Binary OR example
Binary NOT example
Binary NOT example
Binary XOR example
Binary XOR example
Netmask example
Netmask example
Chapter 4:
Context switch (see figure 4.4)
Context switch with timer (multitasking) (see figure 4.5)
Chapter 5:
Example Linux File System commands
Understanding Linux paths
Linux recursive delete
Chapter 6:
Example of Linux Permissions and chmod
Chapter 9:
Using echo in Bash
Defining and using aliases in Bash
Using the history list in Bash
Using wildcards in Bash
Command Line Editing in Bash
Chapter 10:
Regular expressions with +
Regular expressions with * and +
Regular expressions with [ ], * and +
Regular expressions with .
Regular expressions with .?
Regular expressions with .
Regular expressions with \.
Regular expressions: what does [0-255] match?
Regular expressions with ^ and $
Linux wildcard characters *, ? and [ ]
Chapter 12:
Circuit-switched vs packet-switched network
Chapter 14:
Spaghetti code in FORTRAN - example 1
Spaghetti code in FORTRAN - example 2
Bash shell script 1
Bash shell script 2
Bash shell script 3
Bash shell script 4
Bash shell script 5
Chapter 15:
Data Mining example (rule induction)
Private key encryption (1 key)
Public key encryption (2 keys: public for encryption, private for decryption)
Back to CIT 130 Page
Back to Richard Fox's Home Page