!"#$%#$%!"#$&% %&'(&')*!+,,-.-*'())%*+,,* /012*3*

Size: px
Start display at page:

Download "!"#$%#$%!"#$&% %&'(&')*!+,,-.-*'())%*+,,* /012*3*"

Transcription

1 !"#$#$!"#$& &'(&')!+,,-.-'())+,, / : N)7OP"(16 W0$75"Y16 _7()Q3 N)7OC3601 N1947DQ(16 N$"#1K"(" R(113$S(1974T)002 R0C(1 R0:T#117; P"716C3(16 P4(6#1U09)7; /(1R4(9)7; /036V)0;9 W711;X7 W#FF;K31 W0"1V77 W049(1W0>D#(B W0$"3(V77 W3)#(Z#27)F(1 W3)#7["(16 T(471\#(0 T711;X3 T78#1["(16 V(44;]"4"(492 V78#^02" V7O#$^0$$ Z(22"7DP"(42#74 Z7)#$$(_#3 _(0F#R0)02#1 `(3)R0D971 `(3)C(1904<< `7274C316 ^&W&N=3#10 ^0:R0D971 K05"#7P"(16 S(17$$(!(1 Q7))#7P"(0 [(BR34B7 +-,.

2 !"#$#$!"#$& &'(&')!+,,-.-'())+,, 5+':4&550:-+9,<! "#$&!'()+!),-!)"!./!,-,.

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

4 !"#$#$!"#$& &'(&')!+,,-.-'())+,, /01#23$&4;1HD(2(0B1QB(FFCBF#2#F#VC3"C0B1G(G#)#3O1E(GJEECBW1KCBE)1H(33(DXY Z& /01#23$&4;1HD(2(J$CBF#2#F#VC3"C0B1G(G#)#3O1E($C$$#12W"#[(DX#2Q(33(DXY B&991+')9C!"#6 \& /,01#23&4>"O$"1J)LL(3(G($C$213$31BCJ$CB$]0($$H1BL$#2D)C(B3CR3Y ^& /01#23$&4>"(3]$(12CWH(O"($"Y,+& :+'9;&::39-+0,< = / 01#23$&4 AJ001$C 3"(3 12CWH(O "($"C$ 1E J$CB$] 0($$H1BL$ (BC $31BCL #2 $1FC HCG$#3C]$ L(3(G($CB(3"CB3"(23"C0($$H1BL$3"CF$C)KC$&9R0)(#23"C0B1DC$$GOH"#D"3"CHCG$#3CD(2 212C3"C)C$$(J3"C23#D(3C(J$CBJ012$JGF#$$#121E"#$1B"CB0($$H1BL& P-,.

5 !"#$#$!"#$& AJ001$C 3"(3 ( $3(DX E1B /212W2CQ(3#KC4 #23CQCB$ "($ GCC2 LCD)(BCL Q)1G())O 0CB 3"C GC)1HI H"CBC CAPACITY #$ 3"C F(R#FJF 2JFGCB 1E #23CQCB$ 3"(3 D(2 GC #2 3"C $3(DXI (2L size #$ 3"C 2JFGCB 1E #23CQCB$DJBBC23)O#23"C$3(DX& struct { int numbers[capacity]; int size; } stack; :$$JFC3"(3stack"($GCC2#2#3#()#VCL/!"#"I#2main40CB3"CGC)1H& stack.size = 0;,,& /S 01#23$&4 51F0)C3C 3"C #F0)CFC23(3#12 1E popi GC)1HI #2 $JD" ( H(O 3"(3 3"C EJ2D3#12 010$ /$"!"IBCF1KC$(2LBC3JB2$43"Cint(3103"C$3(DX&/!1BCF1KC3"CintI#3$JEE#DC$31_E1BQC3_#3` O1J2CCL2]31KCBHB#3C#3$G#3$&46Estack#$CF03OIpop$"1J)L#2$3C(LBC3JB2-1& int pop(void) {,& /S01#23$&451F0)C3C3"C#F0)CFC23(3#121EpushIGC)1HI#2$JD"(H(O3"(33"CEJ2D3#120J$"C$ /$"!"I(LL$4n12313"C3101Estack(2L3"C2BC3JB2$true&6Estack#$EJ))1Bn#$2CQ(3#KCIpush $"1J)L#2$3C(LBC3JB2false& bool push(int n) { :+'9;&::39-+0,< = S-,.

6 !"#$#$!"#$& &'(&')!+,,-.-'())+,, U-,.,P& /01#23$&47CD())3"(3(aJCJCD(2GCLCD)(BCLaJ#3C)#XC($3(DXIH#3"3"C(LL#3#121E12CE#C)LI headi3"(3$31bc$3"c#2lcr1e3"cint(33"c"c(l/$"!"ieb12341e3"cajcjci($#23"cgc)1h& struct { int head; int numbers[capacity]; int size; } queue; >"O#$head(LK(23(QC1J$E1BqueueGJ3213E1BstackY 7'D-;E-9-6,S& /01#23$&4>"(3]$12C(LK(23(QC1EJ$#2Q(3B#C31$31BC(L#D3#12(BO1E92Q)#$"H1BL$Y,U& /01#23$&4>"(3]$12CL#$(LK(23(QC1EJ$#2Q(3B#C31$31BC(L#D3#12(BO1E92Q)#$"H1BL$Y :+'9;&::39-+0,< =

7 !"#$#$!"#$& &'(&')!+,,-.-'())+,, F-9D.0F-?D9D+096 '1BC(D"0(#BGC)1HIKCB$J$&I(BQJCH"C2O1J$"1J)LJ$C1KCB&/1BI#EO1J0BCECBI&1KCB4&,.& /01#23$&4'KCB$J$()(,Z& /01#23$&4+,-,./0$12KCB$J$()(,\& $0+CD;G9H5-.&&.&D06,^& /01#23$&434/,3-,0$,53!KCB$J$#345,3-,0$,53! /,+ 01#23$&4 51F0)C3C 3"C 3(G)C GC)1H GO $0CD#EO#2Q )1HCB /b4 (2L J00CB /64 G1J2L$ E1B C(D" ()Q1B#3"F&:$$JFC3"(3C(D"L(3($3BJD3JBC()BC(LOD123(#2$7$3B#2Q$(2L3"(3C(D"$3B#2Q#$1E )C2Q3"21QBC(3CB3"(2$1FCD12$3(23&,+1-'IJK 3LL-'I$K #2$CB3#12#231(E&9E;&M,-1D;E9-L&'&;-?E&D0D0. #2$CB3#12#231(;'D- :+'9;&::39-+0,< =.-,.

8 !"#$#$!"#$& &'(&')!+,,-.-'())+,, 7++53?E;+E&0),-6 512$#LCB 3"C )#2C 1E c(k(adb#03 D1LC GC)1HI H"CBC xhr #$ (2 1G[CD3 1E 3O0C XMLHttpRequest (2L handler#$3"c2(fc1e(ej2d3#12lce#2clc)$ch"cbc& xhr.onreadystatechange = handler; +&,& & /01#23$&4623"CD123CR31E:[(RICR(D3)OH"(3L1C$3"#$)#2C1ED1LCL1Y /01#23$&4>"(3H1J)LGC3"CCEECD3#EHC#2$3C(LHB13C3"(3)#2CH#3"(0(#B1E0(BC23"C$C$B#Q"3 (E3CBhandlerI($#23"CGC)1HY xhr.onreadystatechange = handler(); /P 01#23$&4 >"(3 (BC c(k(adb#03i :[(RI (2L [djcboy T(XC D)C(B "1H 3"C 3"BCC (BC BC)(3CL OC3 L#EECBC23& :+'9;&::39-+0,< = Z-,.

9 !"#$#$!"#$& &'(&')!+,,-.-'())+,, FNOPQ36 P& /.01#23$&4AJ001$C3"(33"CBC(BC8L(O$#2(F123"(2L3"(3O1J(BCQ#KC210C22#C$123"CE#B$3 L(O1E3"(3F123"I1(LL#3#12()0C22#C$123"C$CD12LL(O1E3"(3F123"IS1(LL#3#12()0C22#C$ 123"C3"#BLL(O1E3"(3F123"I(2L$1E1B3"IH#3"3"CL(#)O2JFGCB1E0C22#C$L1JG)#2QC(D"L(O <form action="pennies.php" method="get"> Days in month: <input name="d" type="text"> <br> Pennies on first day: <input name="p" type="text"> <br> <input type="submit" value="calculate Total"> </form> 51F0)C3C3"C#F0)CFC23(3#121Epennies.phpGC)1H#2$JD"(H(O3"(33"C0(QCD()DJ)(3C$(2L L#$0)(O$ 3"C 313() (F1J23 3"(3 O1J H#)) BCDC#KC 1KCB 3"C D1JB$C 1E ( F123"I CR0BC$$CL 213 ($ 0C22#C$ GJ3 ($ L1))(B$ (2L DC23$ /!"#"I $ &e21H 3"(3 M;M D1FC$ H#3" EJ2D3#12$ D())CL printf (2L pow 3"(3 GC"(KC [J$3 )#XC 3"C#B 5 D1J$#2$I GJ3 O1J]BC HC)D1FC 31 $1)KC 3"#$ 0B1G)CFH#3"1J3J$#2QC#3"CB&f1JF(O($$JFC3"(33"CJ$CBH#))$JGF#3(2#23CQCBGC3HCC228 (2L31I#2D)J$#KCIE1Bd(2L(01$#3#KC#23CQCBE1Bp&f1J2CCL2]3H1BBO(G1J31KCBE)1H&!(XCD(BC 31D)1$C(2O3(Q$& <!DOCTYPE html> <html> <head> <title>pennies</title> </head> <body> <? :+'9;&::39-+0,< = \-,.

10 !"#$#$!"#$& &'(&')!+,,-.-'())+,, R&LD)8D'-6ISL+D0;9-&?E6K S& >"(3]$1D3()213(3#12Y U& >"(3]$(2($$1D#(3#KC(BB(OY.& Z& (LLBC$$I"1HL1C$3"(3$CBKCBL#$3#2QJ#$"BCaJC$3$E1B3"CE1BFCBEB1FBCaJC$3$E1B3"C)(33CBY >"(3]$(2(212OF1J$EJ2D3#12Y!+5L&'-&0)!+0;'&9;6 512$#LCB3"C3H1)#2C$1ED1LCGC)1H& // first line $s = htmlspecialchars($_post["s"]); // second line $s = mysql_real_escape_string($_post["s"]); \& /01#23$&451F0(BC3"C3H1)#2C$1ED1LCg"1H(BC3"CO$#F#)(BY ^& /01#23$&45123B($33"C3H1)#2C$1ED1LCg"1H(BC3"COL#EECBC23Y :+'9;&::39-+0,< = ^-,.

11 !"#$#$!"#$& &'(&')!+,,-.-'())+,,!"#$T $#LCB3"CTOAd83(G)CD())CLquestionsGC)1HIJ$CL31XCC03B(DX1EaJC$3#12$(3=EE#DC;1JB$& AJ001$C3"(3C(D"3#FC(aJC$3#12#$($XCLGO($3JLC23(31EE#DC"1JB$I#3]$#2$CB3CL($(B1H#23"#$ 3(G)CI()12QH#3"(2(J31#2DBCFC23CL6?I3"CaJC$3#12]$D(3CQ1BOI3"C$3JLC23]$J$CB2(FCI(2L3"CL(O (2L3#FC(3H"#D"3"CaJC$3#12H($($XCL&=2DC3"C$3JLC23#$0(#BCLH#3"($3(EEFCFGCBI3"(3$(FC B1H#$J0L(3CLH#3"3"C$3(EEFCFGCB]$J$CB2(FC& P+& /P01#23$&4>"#D"1E3"#$3(G)C]$E#C)L$$"1J)LGCLCD)(BCLI#E(2OI($(0B#F(BOXCOY>"(3H1J)L GC3"C(LK(23(QCI#E(2OI1ELCD)(B#2Q#3($$JD"Y P,& / 01#23$&4 >#3" H"(3 Ad8 ajcbo D1J)L O1J BC3B#CKC ()) B1H$ E1B ajc$3#12$ ($XCL 12 ;())1HCC23"#$OC(B/ Y P& /01#23$&4AJ001$C3"(3!1FFOH#$"C$313(XCDBCL#3E1B())aJC$3#12$CKCB(2$HCBCLGOT(33& >#3"H"(3Ad8aJCBOD1J)L!1FFOBC0)(DC())#2$3(2DC$1ET(33]$J$CB2(FC/chartier4#23"#$ 3(G)CH#3""#$/tmacwill4Y :+'9;&::39-+0,< =,+-,.

12 !"#$#$!"#$& &'(&')!+,,-.-'())+,, PP& /,01#23&4512$#LCB3"C;!!MBCaJC$3GC)1H& GET /home.php HTTP/1.1 Host: facebook.com User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-us) Connection: keep-alive >"(3h78L13"C$C"C(LCB$$JQQC$3(J$CBK#$#3CLY PS& /01#23$&4512$#LCB3"C;!!MBC$012$CGC)1H& HTTP/ Moved Permanently Location: Content-Type: text/html; charset=utf-8 Date: Wed, 16 Nov :10:00 EST Content-Length: 0 >"(3CEECD3L13"C$C"C(LCB$"(KC12(J$CB]$GB1H$CBY PU& /01#23$&4512$#LCB3"C;!!M$3(3J$D1LCGC)1H& 403 Forbidden >"OF#Q"3($CBKCBBC$012L31(2;!!MBCaJC$3H#3"3"#$$3(3J$D1LCY :+'9;&::39-+0,< =,,-,.

13 !"#$#$!"#$& &'(&')!+,,-.-'())+,, &'(&')!+3'9-96 AJ001$C3"(3courses.cs50.netBC$012L$31(2;!!MBCaJC$3H#3"3"C"C(LCB$GC)1H& HTTP/ OK Date: Wed, 16 Nov :10:00 EST Server: Apache Set-Cookie: PHPSESSID=kh2mpljcarebrrpc1amdths063; path=/ Content-Type: text/html; charset=utf-8 P.& PZ& /01#23$&4>"(3L1C$#3FC(2E1B($CBKCB31$C3(D11X#CI($K#(3"C"C(LCB$(G1KCY /P 01#23$&4 9R0)(#2 #2 21 F1BC 3"(2 12C 0(B(QB(0" 3"C BC)(3#12$"#0 GC3HCC2 PHPSESSID (2L M;M]$$_SESSION& U&9+0V0?+)-6 P\& /01#23$&4512$#LCB3"CM;MD1LCGC)1H& <? $tf = array(); $tf["name"] = "Jason"; $tf["house"] = "Kirkland"; print(json_encode($tf));?> 9R(D3)OH"(3H#))3"#$D1LC1J30J3Yf1J2CCL2]30BC33OW0B#23O1JB(2$HCB& :+'9;&::39-+0,< =,-,.

14 !"#$#$!"#$& &'(&')!+,,-.-'())+,, 512$#LCB3"C;!T8GC)1H& <!DOCTYPE html> <html> <head> <title>google</title> </head> <body> <form action="/search" method="get"> <input name="q" type="text"> <input type="submit" value="google Search"> </form> </body> </html> P^& S+& /01#23$&46E3"#$;!T8)#KC$(3http:// E1BFI(3H"(3h78H#))?(K#L3"CJ$CBE#2L"#F$C)EJ012$JGF#33#2Q3"CE1BFY /01#23$&451F0)C3C3"C$XC3D"1E3"#$;!T8]$?=TGC)1H&f1JF(O1F#3C)CFC23$](33B#GJ3C$ ()31QC3"CB& :+'9;&::39-+0,< =,P-,.

15 !"#$#$!"#$& &'(&')!+,,-.-'())+,, >,5+9;;E-V0)6 S,& /. 01#23$&4 512$#LCB 3"C ;!T8 E1BF GC)1H K#( H"#D" J$CB$ D(2 $JG$DB#GC 31 $1FC HCG$#3C]$ F(#)#2Q)#$3& <!DOCTYPE html> <html> <head> <script> function f() { } </script> <title>subscribe</title> </head> <body> <form action="subscribe.php" method="post" name="s" onsubmit="return f();"> Address: <input id=" " name=" " type="text"> <br> Address (again): <input id=" 2" name=" 2" type="text"> <br> <input type="submit" value="subscribe"> </form> </body> </html> 51F0)C3C3"C#F0)CFC23(3#121Ef(G1KC#2$JD"(H(O3"(33"#$E1BFH#))12)OGC$JGF#33CL31 subscribe.php#e3"cj$cb"($#20j33cl#lc23#d()k()jc$1e212wvcb1)c2q3"e1bg13" (2l 2& f1j 2CCL2]3 D"CDX H"C3"CB 3"1$C K()JC$ (BC $O23(D3#D())O K()#L CF(#) (LLBC$$C$&f1J 2CCL2]3#2E1BF3"CJ$CB1E(2OCBB1B$I($H#3" alert& :$$JFC3"(3c(K(ADB#03#$C2(G)CL#2()) J$CB$]GB1H$CB$&f1JF(O213()3CB3"C;!T8Q#KC21BJ$C[dJCBO& S& /+01#23$&4>"(3]$3"CFC(2#2Q1E)#ECY :+'9;&::39-+0,< =,S-,.

16 !"#$#$!"#$& &'(&')!+,,-.-'())+,, 7ED9D9!"#$"?'&LB&L-'6,U-,.

This is CS50. Harvard College Fall Quiz 1 Answer Key

This is CS50. Harvard College Fall Quiz 1 Answer Key Quiz 1 Answer Key Answers other than the below may be possible. Know Your Meme. 0. True or False. 1. T 2. F 3. F 4. F 5. T Attack. 6. By never making assumptions as to the length of users input and always

More information

World Wide Web, etc.

World Wide Web, etc. World Wide Web, etc. Alex S. Raw data-packets wouldn t be much use to humans if there weren t many application level protocols, such as SMTP (for e-mail), HTTP & HTML (for www), etc. 1 The Web The following

More information

SPARE CONNECTORS KTM 2014

SPARE CONNECTORS KTM 2014 SPAREPARTSCATALOG: // ENGINE ART.-NR.: 3208201EN CONTENT CONNECTORS FOR WIRING HARNESS AA-AN CONNECTORS FOR WIRING HARNESS AO-BC CONNECTORS FOR WIRING HARNESS BD-BQ CONNECTORS FOR WIRING HARNESS BR-CD

More information

10S-1R 10S-1R

10S-1R 10S-1R S-R S-R............................... 0.............0 0..0..........0 0 S-R S-R ZR. ZR C 0V Cm C ZR CV Cm C.W. G ZR CV B ZR C: 0 V or less C: m or less. ZR C: V or less C: m or less. H ZS. 0 m or less

More information

SPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN

SPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN SPAREPARTSCATALOG: CONNECTORS ART.-NR.: 3CM3208201EN CONTENT SPARE CONNECTORS AA-AN SPARE CONNECTORS AO-BC SPARE CONNECTORS BD-BQ SPARE CONNECTORS BR-CD 3 4 5 6 SPARE CONNECTORS CE-CR SPARE CONNECTORS

More information

ajax1.html 1/2 lectures/9/src/ajax/ ajax1.html 2/2 lectures/9/src/ajax/

ajax1.html 1/2 lectures/9/src/ajax/ ajax1.html 2/2 lectures/9/src/ajax/ ajax1.html 1/2 3: ajax1.html 5: Gets stock quote from quote1.php via Ajax, displaying result with alert(). 6: 7: Computer Science 50 8: David J. Malan 9: 10: --> 1 1 15: 16:

More information

The HTTP Protocol HTTP

The HTTP Protocol HTTP The HTTP Protocol HTTP Copyright (c) 2013 Young W. Lim. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later

More information

Introduction to HTTP. Jonathan Sillito

Introduction to HTTP. Jonathan Sillito Introduction to HTTP Jonathan Sillito If you interested in working with a professor next Summer 2011 apply for an NSERC Undergraduate Student Award. Students must have a GPA of 3.0 or higher to be eligible.

More information

HTTP Protocol and Server-Side Basics

HTTP Protocol and Server-Side Basics HTTP Protocol and Server-Side Basics Web Programming Uta Priss ZELL, Ostfalia University 2013 Web Programming HTTP Protocol and Server-Side Basics Slide 1/26 Outline The HTTP protocol Environment Variables

More information

This%is%CS50.% Harvard*University*Fall%2012* Quiz*1* out*of*121*points* Name* * * * * * * * * * * % % Harvard*ID*number* * * * * * * * * %

This%is%CS50.% Harvard*University*Fall%2012* Quiz*1* out*of*121*points* Name* * * * * * * * * * * % % Harvard*ID*number* * * * * * * * * % ThisisCS50. HarvardUniversityFall2012 Quiz1 outof121points Donotturnthispageoveruntiltoldbythestafftodoso. Thisquizis"closed@book."However,youmayutilizeduringthequizonetwo@sided page(8.5" 11")ofnotes,typedorwritten,andapenorpencil,nothingelse.

More information

4. Specifications and Additional Information

4. Specifications and Additional Information 4. Specifications and Additional Information AGX52004-1.0 8B/10B Code This section provides information about the data and control codes for Arria GX devices. Code Notation The 8B/10B data and control

More information

ID: Cookbook: browseurl.jbs Time: 19:37:50 Date: 11/05/2018 Version:

ID: Cookbook: browseurl.jbs Time: 19:37:50 Date: 11/05/2018 Version: ID: 59176 Cookbook: browseurl.jbs Time: 19:37:50 Date: 11/05/2018 Version: 22.0.0 Table of Contents Table of Contents Analysis Report Overview General Information Detection Confidence Classification Analysis

More information

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router

More information

blink.html 1/1 lectures/6/src/ form.html 1/1 lectures/6/src/

blink.html 1/1 lectures/6/src/ form.html 1/1 lectures/6/src/ blink.html 1/1 3: blink.html 5: David J. Malan Computer Science E-75 7: Harvard Extension School 8: 9: --> 11:

More information

EDA095 HTTP. Pierre Nugues. March 30, Lund University

EDA095 HTTP. Pierre Nugues. March 30, Lund University EDA095 HTTP Pierre Nugues Lund University http://cs.lth.se/pierre_nugues/ March 30, 2017 Covers: Chapter 6, Java Network Programming, 4 rd ed., Elliotte Rusty Harold Pierre Nugues EDA095 HTTP March 30,

More information

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1 Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is

More information

ajax1.html 1/2 lectures/7/src/ ajax1.html 2/2 lectures/7/src/

ajax1.html 1/2 lectures/7/src/ ajax1.html 2/2 lectures/7/src/ ajax1.html 1/2 3: ajax1.html 5: Gets stock quote from quote1.php via Ajax, displaying result with alert(). 6: 7: David J. Malan 8: Dan Armendariz 9: Computer Science E-75 10: Harvard Extension School 11:

More information

quiz 1 details wed nov 17, 1pm see handout for locations covers weeks 0 through 10, emphasis on 7 onward closed book bring a , 2-sided cheat she

quiz 1 details wed nov 17, 1pm see handout for locations covers weeks 0 through 10, emphasis on 7 onward closed book bring a , 2-sided cheat she quiz 1 details wed nov 17, 1pm see handout for locations covers weeks 0 through 10, emphasis on 7 onward closed book bring a 8.5 11, 2-sided cheat sheet 75 minutes 15% of final grade resources old quizzes

More information

(23) $% 2008

(23) $% 2008 1995 20 (23) $% 2008 32: 159.9 (082) '' 88.5 ( 43 12 *+,*- - -.+. /*0-0 121.1. 345 1 6312/5 627385 +52 (61+3 9 6/08-5 /*( 2008.) *-+< +3*8(:.., -

More information

TOM S RIVER. N. J. APRIL 1, 1857.

TOM S RIVER. N. J. APRIL 1, 1857. P b J [ J ) --------- J P 857 7 c < ( v v k k ( Ì k \ bv F í xbk ( v c c< k v J 4? 9 b (b bx c c í c c k c c b k Ö ) c ( b c ck b é P c // k ( cà ( k kc ( b b v #> b Ü) v # k # v [ vb b c< c b c v b b

More information

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. Router A Router B Router C Router D Network Next Hop Next Hop Next Hop Next

More information

Security implications of the Cross-Origin Resource Sharing. Gergely Revay

Security implications of the Cross-Origin Resource Sharing. Gergely Revay Security implications of the Cross-Origin Resource Sharing Gergely Revay http://gerionsecurity.com @geri_revay Disclaimer This presentation is purely my opinion and not related to SIEMENS. https://c1.staticflickr.com/1/21/27423135_082e7b5983.jpg

More information

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1 Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5

More information

Web Programming. Based on Notes by D. Hollinger Also Java Network Programming and Distributed Computing, Chs.. 9,10 Also Online Java Tutorial, Sun.

Web Programming. Based on Notes by D. Hollinger Also Java Network Programming and Distributed Computing, Chs.. 9,10 Also Online Java Tutorial, Sun. Web Programming Based on Notes by D. Hollinger Also Java Network Programming and Distributed Computing, Chs.. 9,10 Also Online Java Tutorial, Sun. 1 World-Wide Wide Web (Tim Berners-Lee & Cailliau 92)

More information

!! " # $%! "! &' $ (!!

!!  # $%! ! &' $ (!! " # $% " &' $ ( & ' ) * # +, -.% /.-01234 + +315 23 +6 ++17 $ 2+68% )99*. + )99* 1 )99*, /+.% )99*-58 1 ( #$ :5 ; &' @" +#1 7 +..%30 8,,1 8%4 #.>)99(@> & ' @ ) $,. # %ABB * 77 (9C:#+

More information

; Once Initialized, monitor character in calls to CN05 ; set carry for input, to be tested CN35 C SEC

; Once Initialized, monitor character in calls to CN05 ; set carry for input, to be tested CN35 C SEC // // Serialcode.s // 256 Byte Prom P8 and 512 Byte PROM P9A (second version) for Apple II Serial Card // P9A differs from P9 by adding RTS/ACK software flow control to output and // by removing batch

More information

DEV BHOOMI INSTITUTE OF TECHNOLOGY Department of Computer Science and Engineering. Algorithm lab- PCS-553 LAB MANUAL

DEV BHOOMI INSTITUTE OF TECHNOLOGY Department of Computer Science and Engineering. Algorithm lab- PCS-553 LAB MANUAL Department of Computer Science and Engineering Year: 3rd Semester: 5th Algorithm lab- PCS-553 Prepared By: HOD(CSE) 1 Department of Computer Science and Engineering INDEX S.No Practical s Name Tools Remark

More information

Downloaded from mrj.tums.ac.ir at 0:22 IRDT on Sunday April 14th

Downloaded from mrj.tums.ac.ir at 0:22 IRDT on Sunday April 14th "# 4 3 2 1 33 34," ( &"0 1# (.")*+,"- ( $ %& Email: talebian@sina.tums.ac.ir (1389/12/25:-./& 78-1 %&' #$ -2 %&' #$ )*-3 %&' #$ )*-4 C $% -C BP # % a.c & Z JC ;B`

More information

CS144 Notes: Web Standards

CS144 Notes: Web Standards CS144 Notes: Web Standards Basic interaction Example: http://www.youtube.com - Q: what is going on behind the scene? * Q: What entities are involved in this interaction? * Q: What is the role of each entity?

More information

Penetration Test Report

Penetration Test Report Penetration Test Report Feb 12, 2018 Ethnio, Inc. 6121 W SUNSET BLVD LOS angeles, CA 90028 Tel (888) 879-7439 ETHN.io Summary This document contains the most recent pen test results from our third party

More information

ECE697AA Lecture 2. Today s lecture

ECE697AA Lecture 2. Today s lecture ECE697AA Lecture 2 Application Layer: HTTP Tilman Wolf Department of Electrical and Computer Engineering 09/04/08 Protocol stack Application layer Client-server architecture Example protocol: HTTP Demo

More information

!"#$%&'()&'"(*&+$*,--$.&*/-*0'1$*/"*&+$*23)%1/34%'%*/-*2/&)&/$%

!#$%&'()&'(*&+$*,--$.&*/-*0'1$*/*&+$*23)%1/34%'%*/-*2/&)&/$% !"#$%&'()&'"(*&+$*,--$.&*/-*0'1$*/"*&+$*23)%1/34%'%*/-*2/&)&/$% 5$%$)6.+ 78$%&'/"!"#$ %#&'(' )*$#$*(' $* +* '*,$ #,$(-.(/0+ '$*-(12,*- # 3*0+ $/4(5 Question: How could the research question have been more

More information

Applications & Application-Layer Protocols: The Web & HTTP

Applications & Application-Layer Protocols: The Web & HTTP CPSC 360 Network Programming Applications & Application-Layer Protocols: The Web & HTTP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc360

More information

!"#$%!&'#()#*+,-. %/ %70/89

!#$%!&'#()#*+,-. %/ %70/89 !"$%!&'()*+,-. %/012345657%70/89 F90$(/'4(0).!!%+!&'()*+,-%% '!"$%M%!(4!3/ % 85H90>4>%C6L>4:%4%M+'$%'$(',*0$'4($*!, % 01L4%058N%0()3.(0'$(')*+$!,(-(.' *./0'$%'2.(-(+$'$(/'&.%/',!&$!+"'%&&'*))!4(+$*,,9'M(+'

More information

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity.

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity. FEAL-NX SPECIFICATIONS 1 Introduction 1.1 Outline of the FEAL-NX cipher FEAL, the Fast Data Encipherment Algorithm, is a 64-bit block cipher algorithm that enciphers 64-bit plaintexts into 64-bit ciphertexts

More information

A programmer can create Internet application software without understanding the underlying network technology or communication protocols.

A programmer can create Internet application software without understanding the underlying network technology or communication protocols. CS442 Comer Networking API Chapter 3 Chapter three of the textbook presents an API to perform network programming in the C language. While this chapter does not cover everything about network programming,

More information

UYM-UOM-UOY-UOD- UOS-UOB-UOR

UYM-UOM-UOY-UOD- UOS-UOB-UOR UY-UO-UOY-UOD- UOS-UOB-UOR Indexable date stamps at.: Acier inoxydable 5-55 HRC :15 Remove inner insert from the outer insert using a screwdriver REF* REF REF REF REF REF REF D F 1 UY 4/2* UO 4 UOY 4/2*

More information

CORS Attacks. Author: Milad Khoshdel Blog: P a g e. CORS Attacks

CORS Attacks. Author: Milad Khoshdel Blog: P a g e. CORS Attacks Author: Milad Khoshdel Blog: https://blog.regux.com Email: miladkhoshdel@gmail.com 1 P a g e Contents What is CORS?...3 How to Test?...4 CORS Checker Script...6 References...9 2 P a g e What is CORS? CORS

More information

HTML MIS Konstantin Bauman. Department of MIS Fox School of Business Temple University

HTML MIS Konstantin Bauman. Department of MIS Fox School of Business Temple University HTML MIS 2402 Konstantin Bauman Department of MIS Fox School of Business Temple University 2 HTML Quiz Date: 9/13/18 in two weeks from now HTML, CSS 14 steps, 25 points 1 hour 20 minutes Use class workstations

More information

The cache is 4-way set associative, with 4-byte blocks, and 16 total lines

The cache is 4-way set associative, with 4-byte blocks, and 16 total lines Sample Problem 1 Assume the following memory setup: Virtual addresses are 20 bits wide Physical addresses are 15 bits wide The page size if 1KB (2 10 bytes) The TLB is 2-way set associative, with 8 total

More information

Network Analysis. Links, nodes, trees, graphs, paths and cycles what does it all mean? Minimal spanning tree shortest route maximum flow

Network Analysis. Links, nodes, trees, graphs, paths and cycles what does it all mean? Minimal spanning tree shortest route maximum flow Network Analysis Minimal spanning tree shortest route maximum flow Links, nodes, trees, graphs, paths and cycles what does it all mean? Real OR in action! 1 Network Terminology Graph - set of points (nodes)

More information

REVIEW: Find the value of the variable and the measures of all of the angles

REVIEW: Find the value of the variable and the measures of all of the angles Name: Period: Geometry Honors Unit 3: Congruency Homework Section 3.1: Congruent Figures Can you conclude that the triangles are congruent? Justify your answer. 1. ΔGHJ and ΔIHJ 2. ΔQRS and ΔTVS 3. ΔFGH

More information

2-Type Fire Retardant Closures

2-Type Fire Retardant Closures 2-Type Fire Retardant Closures 2-Type Closures that can really take the heat. The 2-Type Fire Retardant Closure is completely self-contained and capable of withstanding a 15 minute horizontal or vertical

More information

UA-Tester.... or why Web-Application Penetration Testers are only getting half the story

UA-Tester.... or why Web-Application Penetration Testers are only getting half the story UA-Tester... or why Web-Application Penetration Testers are only getting half the story UA-Tester... or why Web-Application Penetration Testers are only getting half the story... or time to PIMP your tool!

More information

HP Fortify WebInspect. Vulnerability. Web Application Assessment Report

HP Fortify WebInspect. Vulnerability. Web Application Assessment Report HP Fortify WebInspect Vulnerability Web Application Assessment Report Medium Issues Scan Name: Policy: Scan Date: Scan Version: Sample Scan Standard 3/20/2014 6:32:32 PM 10.20.652.10 Crawl Sessions: Vulnerabilities:

More information

Circles - Probability

Circles - Probability Section 10-1: Circles and Circumference SOL: G.10 The student will investigate and solve practical problems involving circles, using properties of angles, arcs, chords, tangents, and secants. Problems

More information

LAMP, WEB ARCHITECTURE, AND HTTP

LAMP, WEB ARCHITECTURE, AND HTTP CS 418 Web Programming Spring 2013 LAMP, WEB ARCHITECTURE, AND HTTP SCOTT G. AINSWORTH http://www.cs.odu.edu/~sainswor/cs418-s13/ 2 OUTLINE Assigned Reading Chapter 1 Configuring Your Installation pgs.

More information

GET /index.php HTTP/1.1 Host: User- agent: Mozilla/4.0

GET /index.php HTTP/1.1 Host:   User- agent: Mozilla/4.0 State management GET /index.php HTTP/1.1 Host: www.mtech.edu User- agent: Mozilla/4.0 HTTP/1.1 200 OK Date: Thu, 17 Nov 2011 15:54:10 GMT Server: Apache/2.2.16 (Debian) Content- Length: 285 Set- Cookie:

More information

Programming The Nintendo Game Boy Advance: The Unofficial Guide Copyright (c)2003 by Jonathan S. Harbour --

Programming The Nintendo Game Boy Advance: The Unofficial Guide Copyright (c)2003 by Jonathan S. Harbour -- !"#$ & ' & ' (' ) * + $, Game Boy Handheld Systems -./. 1 2 2 3 ' 4- Table 2.1 Game Boy Specifications Model CPU Memory Display Colors Game Boy 8-bit Z8 4.17 MHz 64 Kbits 16 x 144 4 Game Boy Pocket 8-bit

More information

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1 Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.

More information

How to work with HTTP requests and responses

How to work with HTTP requests and responses How a web server processes static web pages Chapter 18 How to work with HTTP requests and responses How a web server processes dynamic web pages Slide 1 Slide 2 The components of a servlet/jsp application

More information

Aluminum Capacitors + 85 C, Miniature, Axial Lead

Aluminum Capacitors + 85 C, Miniature, Axial Lead TVA ATOM Aluminum Capacitors FEATURES Low leakage current Long shelf life Ideal for application in TV sets, auto radios, radio-phone combinations, electronic testing equipment Fig.1 Component outlines

More information

CORS. Константин Якушев MoscowJS 14,

CORS.   Константин Якушев MoscowJS 14, CORS http://cors.kojo.ru Константин Якушев MoscowJS 14, 28.08.2014 http://api.ya.ru http://api.ya.ru http://api.ya.ru http://m.ya.ru? function Fetch() { var Url = "http://api.ya.ru/"; var xhr = new XMLHttpRequest();

More information

Web Programming 4) PHP and the Web

Web Programming 4) PHP and the Web Web Programming 4) PHP and the Web Emmanuel Benoist Fall Term 2013-14 Berner Fachhochschule Haute cole spcialise bernoise Berne University of Applied Sciences 1 PHP a language for Web applications Presentation

More information

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

PIC 40A. Lecture 19: PHP Form handling, session variables and regular expressions. Copyright 2011 Jukka Virtanen UCLA 1 05/25/12

PIC 40A. Lecture 19: PHP Form handling, session variables and regular expressions. Copyright 2011 Jukka Virtanen UCLA 1 05/25/12 PIC 40A Lecture 19: PHP Form handling, session variables and regular expressions 05/25/12 Copyright 2011 Jukka Virtanen UCLA 1 How does a browser communicate with a program on a server? By submitting an

More information

Segments Proofs Reference

Segments Proofs Reference Segments Proofs Reference Properties of Equality Addition Property Subtraction Property Multiplication Property Division Property Distributive Property Reflexive Property The properties above may only

More information

https://support.industry.siemens.com/cs/ww/en/view/

https://support.industry.siemens.com/cs/ww/en/view/ Support Packages for TIA Portal V14 February 2018 https://support.industry.siemens.com/cs/ww/en/view/72341852 Siemens Industry Online Support This entry is from the Siemens Industry Online Support. The

More information

IEC Contactors. Auxiliary Contact Blocks GENERAL

IEC Contactors. Auxiliary Contact Blocks GENERAL IEC Contactors Auxiliary Contact Blocks GENERAL Description 3RH19 Auxiliary contact blocks The 3RH19 auxiliary contact blocks are available in 1, 2, 3 and 4-pole front mount versions and 2-pole side mount

More information

Topics (Non-exhaustive) Hash Tables Tries Trees Stacks Queues. HTTP CSS PHP MVC SQL Javascript TCP/IP

Topics (Non-exhaustive) Hash Tables Tries Trees Stacks Queues. HTTP CSS PHP MVC SQL Javascript TCP/IP Topics (Non-exhaustive) Hash Tables Tries Trees Stacks Queues HTTP CSS PHP MVC SQL Javascript TCP/IP Linked Lists head 2 3 9 Nodes n next typedef struct node { int n; struct node* next; } node; Search

More information

HTTP: Advanced Assessment Techniques

HTTP: Advanced Assessment Techniques HTTP: Advanced Assessment Techniques Saumil Shah Director of R&D, NT Objectives Inc. Director, Net-Square Author: ÒWeb Hacking - Attacks and DefenseÓ BlackHat Windows Security 2003, Seattle The Web HackerÕs

More information

LING 408/508: Computational Techniques for Linguists. Lecture 21

LING 408/508: Computational Techniques for Linguists. Lecture 21 LING 408/508: Computational Techniques for Linguists Lecture 21 Administrivia Both Homework 7 and 8 have been graded Homework 9 today Example: example.cgi SiteSites$./example.cgi Content-Type: text/html;

More information

!!!"#$%&%#'"()*+!,&()*,

!!!#$%&%#'()*+!,&()*, -,.%'/,012)301#0)43(/15641.,/1'3##)0/15/!!!"#$%&%#'"()*+!,&()*, 78991',0%,'1:*50/1;? @ABC;789D @DBC;789D !"#$% 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10 2 2.1."@)+..$ *%+/#$..& 6 2.2 2.3 2.4 2.5 2.6

More information

CS 5142 Scripting Languages

CS 5142 Scripting Languages CS 5142 Scripting Languages 10/16/2015 Web Applications Databases 1 Outline Stateful Web Applications AJAX 2 Concepts Scope in Server-Side Scripts Request $_GET, $_POST global $g; Session $_SESSION Application

More information

Computer Science 571 Exam #1 Prof. Papa Thursday, February 23, 2017, 6:00pm 7:20pm

Computer Science 571 Exam #1 Prof. Papa Thursday, February 23, 2017, 6:00pm 7:20pm Computer Science 571 Exam #1 Prof. Papa Thursday, February 23, 2017, 6:00pm 7:20pm Name: Student Id Number: 1. This is a closed book exam. 2. Please answer all questions. 3. Place all answers on the exam

More information

PCL ISO 8859/5 Latin/Cyrillic

PCL ISO 8859/5 Latin/Cyrillic Page 1 of 5 PCL Symbol Se t: 10N Unicode gly ph correspondence tables. Contact:help@redtitan.com http://pcl.to $20 U0020 Space -- -- -- -- $21 U0021 Ê Exclamation mark -- -- -- -- $22 U0022 Ë Quotation

More information

. . $ 1, 67 / $<"'D $ Downloaded from at 7:31 CEST on Monday July 7th 2014 )& "* (+, -

. . $ 1, 67 / $<'D $ Downloaded from   at 7:31 CEST on Monday July 7th 2014 )& * (+, - !" *)) : &',!"#$ : ; 5-67 89 5 3 4/. ?@ 210./ +, -, "#$#%& $' (, : A A )& "* (+, -.(+, -. "#$#%& $' (, :B.@.C aabmoa@tums.ac.i :0 ' /)& -. "#$#%& $' (, :5.FC... D/.C )&.(+,.2+, - "#$#%& $' 2.&$3 4 567$$,

More information

CS631 - Advanced Programming in the UNIX Environment

CS631 - Advanced Programming in the UNIX Environment CS631 - Advanced Programming in the UNIX Environment Slide 1 CS631 - Advanced Programming in the UNIX Environment HTTP; Code Reading Department of Computer Science Stevens Institute of Technology Jan Schaumann

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 1Y0-351 Title : Citrix NetScaler 10.5 Essentials and Networking Vendor :

More information

2-Type Series Pressurized Closures

2-Type Series Pressurized Closures 2-Type Series Pressurized Closures A complete pressure tight reenterable closure system for enclosing spliced connections of communications cables in a wide variety of applications. The 2-type Closure

More information

ID: Cookbook: browseurl.jbs Time: 00:29:59 Date: 16/12/2017 Version:

ID: Cookbook: browseurl.jbs Time: 00:29:59 Date: 16/12/2017 Version: ID: 40237 Cookbook: browseurl.jbs Time: 00:29:59 Date: 16/12/2017 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview General Information Detection Confidence Classification Analysis

More information

src1-malan/ajax/ajax1.html ajax1.html Gets stock quote from quote1.php via Ajax, displaying result with alert().

src1-malan/ajax/ajax1.html ajax1.html Gets stock quote from quote1.php via Ajax, displaying result with alert(). src1-malan/ajax/ajaxhtml 1 1 1 1 1 2 2 2 2 2 2 2 2 30. 3 3 3 3 3 3 3 3 3 40. 4 4 4 4 4 4 4 4 ajaxhtml Gets stock quote from quotephp via Ajax, displaying result with alert(). Building Mobile Applications

More information

Networking and Internet

Networking and Internet Today s Topic Lecture 13 Web Fundamentals Networking and Internet LAN Web pages Web resources Web client Web Server HTTP Protocol HTML & HTML Forms 1 2 LAN (Local Area Network) Networking and Internet

More information

How browsers talk to servers. What does this do?

How browsers talk to servers. What does this do? HTTP HEADERS How browsers talk to servers This is more of an outline than a tutorial. I wanted to give our web team a quick overview of what headers are and what they mean for client-server communication.

More information

JavaScript CSCI 201 Principles of Software Development

JavaScript CSCI 201 Principles of Software Development JavaScript CSCI 201 Principles of Software Development Jeffrey Miller, Ph.D. jeffrey.miller@usc.edu Outline JavaScript Program USC CSCI 201L JavaScript JavaScript is a front-end interpreted language that

More information

ID: Cookbook: urldownload.jbs Time: 23:23:00 Date: 11/01/2018 Version:

ID: Cookbook: urldownload.jbs Time: 23:23:00 Date: 11/01/2018 Version: ID: 42417 Cookbook: urldownload.jbs Time: 23:23:00 Date: 11/01/201 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview General Information Detection Confidence Classification Signature

More information

OPAL-RT FIU User Guide.

OPAL-RT FIU User Guide. OPAL-RT FIU User Guide www.opal-rt.com Published by Opal-RT Technologies, Inc. 1751 Richardson, suite 2525 Montreal, Quebec, Canada H3K 1G6 www.opal-rt.com 2013 Opal-RT Technologies, Inc. All rights reserved

More information

WIZ125SR User Manual

WIZ125SR User Manual WIZ125SR User Manual ( Version 1.0 ) 2010 WIZnet Co., Ltd. All Rights Reserved. For more information, visit our website at http://www.wiznet.co.kr WIZ125SR User Manual (WIZnet Co., Ltd.) - 1 - Document

More information

ID: Cookbook: browseurl.jbs Time: 09:46:57 Date: 19/10/2018 Version: Fire Opal

ID: Cookbook: browseurl.jbs Time: 09:46:57 Date: 19/10/2018 Version: Fire Opal ID: 85066 Cookbook: browseurl.jbs Time: 09:46:57 Date: 19/10/2018 Version: 24.0.0 Fire Opal Table of Contents Table of Contents Analysis Report http://lux-motors.com/nnngg/nngbbgh/fffee Overview General

More information

July Registration of a Cyrillic Character Set. Status of this Memo

July Registration of a Cyrillic Character Set. Status of this Memo Network Working Group Request for Comments: 1489 A. Chernov RELCOM Development Team July 1993 Status of this Memo Registration of a Cyrillic Character Set This memo provides information for the Internet

More information

About the Tutorial. Audience. Prerequisites. Copyright & Disclaimer

About the Tutorial. Audience. Prerequisites. Copyright & Disclaimer About the Tutorial The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. This is the foundation for data communication

More information

Digital Projector X30 Operator's Guide TECHNICAL

Digital Projector X30 Operator's Guide TECHNICAL Digital Projector X30 Operator's Guide TECHNICAL Example of PC signal Resolution (H x V) H. frequency (khz) V. frequency (Hz) Rating Signal mode 720 x 400 37.9 85.0 VESA TEXT 640 x 480 31.5 59.9 VESA VGA

More information

Multimedia im Netz Online Multimedia Winter semester 2015/16. Tutorial 03 Minor Subject

Multimedia im Netz Online Multimedia Winter semester 2015/16. Tutorial 03 Minor Subject Multimedia im Netz Online Multimedia Winter semester 2015/16 Tutorial 03 Minor Subject Ludwig- Maximilians- Universität München Online Multimedia WS 2015/16 - Tutorial 03-1 Today s Agenda Quick test Server

More information

6.1 Font Types. Font Types

6.1 Font Types. Font Types 6 Font This chapter explains basic features of GP-Pro EX's "Font" and basic ways of placing text with each font. Please start by reading "6.1 Font Types" (page 6-2) and then turn to the corresponding page.

More information

PRODUCT DOCUMENTATION. Installing and Implementing Enterprise Contact Center Chat RELEASE 5.1

PRODUCT DOCUMENTATION. Installing and Implementing Enterprise Contact Center Chat RELEASE 5.1 PRODUCT DOCUMENTATION Installing and Implementing Enterprise Contact Center Chat RELEASE 5.1 Document and Software Copyrights Copyright 1998 2009 ShoreTel, Inc. All rights reserved. Printed in the United

More information

Web Architecture and Technologies

Web Architecture and Technologies Web Architecture and Technologies Ambient intelligence Fulvio Corno Politecnico di Torino, 2015/2016 Goal Understanding Web technologies Adopted for User Interfaces Adopted for Distributed Application

More information

HashCookies A Simple Recipe

HashCookies A Simple Recipe OWASP London Chapter - 21st May 2009 HashCookies A Simple Recipe Take a cookie Add some salt Add a sequence number John Fitzpatrick Full paper at http://labs.mwrinfosecurity.com Structure What are hashcookies

More information

Server-Side Web Programming: Python (Part 1) Copyright 2017 by Robert M. Dondero, Ph.D. Princeton University

Server-Side Web Programming: Python (Part 1) Copyright 2017 by Robert M. Dondero, Ph.D. Princeton University Server-Side Web Programming: Python (Part 1) Copyright 2017 by Robert M. Dondero, Ph.D. Princeton University 1 Objectives You will learn about Server-side web programming in Python Common Gateway Interface

More information

The HTTP protocol. Fulvio Corno, Dario Bonino. 08/10/09 http 1

The HTTP protocol. Fulvio Corno, Dario Bonino. 08/10/09 http 1 The HTTP protocol Fulvio Corno, Dario Bonino 08/10/09 http 1 What is HTTP? HTTP stands for Hypertext Transfer Protocol It is the network protocol used to delivery virtually all data over the WWW: Images

More information

CS 43: Computer Networks. Layering & HTTP September 7, 2018

CS 43: Computer Networks. Layering & HTTP September 7, 2018 CS 43: Computer Networks Layering & HTTP September 7, 2018 Last Class: Five-layer Internet Model Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network:

More information

Azblink API for Sending XMPP Messages via HTTP POST

Azblink API for Sending XMPP Messages via HTTP POST Azblink API for Sending XMPP Messages via HTTP POST Abstract: This document is to describe the API of Azblink SBC for sending XMPP messages via HTTP POST. This is intended for the systems or the devices

More information

ZN-DN312XE-M Quick User Guide

ZN-DN312XE-M Quick User Guide ZN-DN312XE-M Quick User Guide This manual provides instructions for quick installation and basic configuration of your IP device. Step1. Connect cables to IP device Connect required cables to the device

More information

HTTP, circa HTTP protocol. GET /foo/bar.html HTTP/1.1. Sviluppo App Web 2015/ Intro 3/3/2016. Marco Tarini, Uninsubria 1

HTTP, circa HTTP protocol. GET /foo/bar.html HTTP/1.1. Sviluppo App Web 2015/ Intro 3/3/2016. Marco Tarini, Uninsubria 1 HTTP protocol HTTP, circa 1989 a resource «give me the HTML representation of thatresource» «ok, here» Client request GET /hello.txt Server response Hello, world! Client Server Http 1.1 Request line Client

More information

!!!"#$%&%#'"()*+!,&()*,

!!!#$%&%#'()*+!,&()*, -,.%'/,012)301#0)43(/15641.,/1'3##)0/15/!!!"#$%&%#'"()*+!,&()*, 78881',0%,'19*50/1:;?8@A:7B8B?B@A:7B8B?B@A:7B7B !"#$%&'()$ 1 1.1 1.2 1.3 1.4 1.5 *'+'," %'-"./ 3!"#$%&#' (')'*#+,-% 3.$(%&,*/% 7 0&,"/#

More information

ID: Cookbook: browseurl.jbs Time: 03:15:55 Date: 26/01/2019 Version: Tiger's Eye

ID: Cookbook: browseurl.jbs Time: 03:15:55 Date: 26/01/2019 Version: Tiger's Eye ID: 106158 Cookbook: browseurl.jbs Time: 03:15:55 Date: 26/01/2019 Version: 25.0.0 Tiger's Eye Table of Contents Table of Contents Analysis Report http://viads.blogsyte.com/target/ Overview General Information

More information

ID: Cookbook: browseurl.jbs Time: 15:35:36 Date: 03/11/2017 Version:

ID: Cookbook: browseurl.jbs Time: 15:35:36 Date: 03/11/2017 Version: ID: 35980 Cookbook: browseurl.jbs Time: 15:35:36 Date: 03/11/2017 Version: 20.0.0 Table of Contents Analysis Report Overview General Information Detection Confidence Classification Analysis Advice Signature

More information

MWR InfoSecurity Advisory. 26 th April Elastic Path Administrative. Quit. Session Hijacking through Embedded XSS

MWR InfoSecurity Advisory. 26 th April Elastic Path Administrative. Quit. Session Hijacking through Embedded XSS Quit MWR InfoSecurity Advisory Elastic Path Administrative Session Hijacking through Embedded XSS 26 th April 2007 2007-04-26 1 of 7 INDEX 1 Detailed Vulnerability description...4 1.1 Introduction...4

More information

Working with Zend_Form. Rob Allen

Working with Zend_Form. Rob Allen Working with Zend_Form Rob Allen Rob Allen? What is Zend_Form? Architecture Forms: the centre piece Forms are made up of: Elements, Display groups, Sub-forms Each element is made up of: Filters, Validators,

More information

Consider the following file A_Q1.html.

Consider the following file A_Q1.html. Consider the following file A_Q1.html. 1 2 3 Q1A 4 5 6 7 function check () { 8 } 9 10 11

More information

Customer Maintenance Parts List

Customer Maintenance Parts List C US R MODEL SUFFIX Customer Maintenance Parts List Model 0 R0000 dot recorder Made in China RECORDER STYLE FREQUENCY NO. SUPPLY N00 0 TAG NO. Note: Parts marked with a symbol are Customer Maintenance

More information