본문 바로가기

전체 글376

코테 준비 3 2024.05.091. Arrays DSpublic static List reverseArray(List a) { List ret = new ArrayList(a.size()); for (int i = 0; i  2. 2D Arrays - DSpublic static int hourglassSum(List> arr) { int max = Integer.MIN_VALUE; for (int i = 0; i   2024.05.11이 날은 Stack 위주로 풀었다. 1. Hackerrank Maximum Elementclass Result { /* * Complete the 'getMax' function below. * * The f.. 2024. 5. 14.
Lecture 12-13: Objects 목차 Learning Objectives - Explain what an object is - Explain how objects are typed in Scala - Explain what the "self" is in object-oriented programming - Explain what delegation and late binding is in object-oriented programming - Desugar a language with simple objects into functions and mutation - Explain what the Expression Problem is, and how objected-oriented programming and functional progr.. 2024. 4. 10.
CPL 5: Parallel and Concurrent 목차 Single Core Concurrency Multiprogramming allows a single-core processor to run multiple programs in a rotation principle. Therefore, multiple programs can be loaded in memory and each will take turn executing instructions on the CPU. 2 multiprogramming concepts: Multi-user system: Multiple users that share a single-core machine. The single core processor is going to allocate time to every ter.. 2024. 4. 9.
Lecture 14: DNS and Coordinated Vulnerability Disclosure 목차 DNS Domain Name System is a decentralized naming system for computers, services, or any resource connected to the internet or a private network. → DNS translates human-readable domain names (like example.com) into IP addresses that computers use to identify each other on the network. DNS operates as a hierarchical and distributed database. When you type a domain name into your web browser, yo.. 2024. 4. 8.
Lecture 13: Malware and Malware Detection 목차 Malware (악성 소프트웨어) Malware: Software that is inserted into a system, with the intent of compromising the confidentiality, integrity, or availability of the victim's data, applications or operating system or otherwise annoying or disrupting the victim. Types: Viruses, Rootkits, Ransomware, Backdoors, etc Classifying Malware Infection Vector Infection vector: the method by which a computer viru.. 2024. 4. 8.
코테 준비 2 코테 준비 시작한지 2주차에 풀었던 문제들과 알면 도움될만한 내용들을 정리해봤다. 여기 있는 문제들을 모두 Leetcode에서 풀었다. 2024.04.01 1. Group Anagrams 2. Add Binary 2024.04.06 3. Valid Parentheses 4. Climbing Stairs 5. Search Insert Position 6. Best Time to Buy and Sell Stock 7. Longest Common Prefix 2024.04.07 8. Summary Ranges 9. Linked List Cycle 10. Merge Two Sorted Lists 11. Maximum Depth of Binary Tree 12. Same Tree 13. Invert Binary .. 2024. 4. 8.
Lecture 11: Ethics of CAI: Values and Norms 목차 What is Ethics? The field of ethics involves systematizing, defending, and recommending concepts of right and wrong behavior. Ethical dilemmas are scenarios where there is no obviously good choice. Values Values: What is important to us in life Features of values: - Priorities guide Actions - Beliefs linked to Affect (e.g. emotions) - Refer to Goals - Transcend Contexts (values span more than.. 2024. 4. 8.
Lecture 12: Software Security and Testing 목차 Memory Errors Memory errors are software bugs in the way we handle memory in memory unsafe languages like C/C++. When a memory error occurs a program accesses memory that it should not; this is termed violating memory safety. When a memory error occurs, it leads to either program to crash or to strange program behavior. All types of memory errors can be potentially exploited by attackers. Com.. 2024. 4. 8.
반응형