housekeeping
This commit is contained in:
parent
4f4139aa38
commit
1fde207c5a
8 changed files with 16 additions and 23 deletions
|
|
@ -5,7 +5,7 @@ tags:
|
|||
|
||||
# Capturing user input in Bash
|
||||
|
||||
We use [read](Read_command%20_in_Bash.md) to gather user input.
|
||||
We use [read](/zk/Read_command__in_Bash.md) to gather user input.
|
||||
|
||||
## Capturing raw inputs
|
||||
|
||||
|
|
@ -89,8 +89,8 @@ echo "$fave was selected"
|
|||
### Check right number of arguments supplied
|
||||
|
||||
Here we test that the right number of
|
||||
[arguments](Passing_arguments_and_options_to_Bash_scripts.md)
|
||||
have been passed to the script:
|
||||
[arguments](Passing_arguments_and_options_to_Bash_scripts.md) have been passed
|
||||
to the script:
|
||||
|
||||
```sh
|
||||
if (( $#<3 )); then
|
||||
|
|
|
|||
|
|
@ -16,7 +16,7 @@ impersonate legitimate websites.
|
|||
Certificates exist to authenticate domains, prior to the exchange of encrypted
|
||||
data. To do this, a server generates a certificate with a reputable Certificate
|
||||
Authority, thereby verifying its identity with the CA. It sends this certificate
|
||||
(which includes its [public key](./bbdcb54f_public_key_cryptography.md)) when
|
||||
(which includes its [public key](/zk/Public_key_cryptography.md)) when
|
||||
initiating a connection with a client.
|
||||
|
||||
In addition to the public key, the certificate provides:
|
||||
|
|
|
|||
|
|
@ -70,7 +70,6 @@ As Python is not strictly typed the property accessors are not actually real and
|
|||
won't throw errors if violated. However there is a syntax convention.
|
||||
|
||||
- Private
|
||||
|
||||
- `__self.property`
|
||||
- `def __private method(self)...`
|
||||
|
||||
|
|
@ -109,8 +108,7 @@ class Person:
|
|||
|
||||
## Object references
|
||||
|
||||
When you log a class you get a reference to its hexadecimal [memory](Memory.md)
|
||||
reference.
|
||||
When you log a class you get a reference to its hexadecimal memory reference.
|
||||
|
||||
```py
|
||||
p1 = Person('John', 36)
|
||||
|
|
|
|||
|
|
@ -4,11 +4,8 @@ tags: [logic-gates, binary, memory]
|
|||
|
||||
# Creating memory with NAND gates
|
||||
|
||||
The
|
||||
[logic circuit](Digital_circuits.md)
|
||||
below demonstrates how memory can be created using
|
||||
[NAND](Logic_gates.md#nand-gate)
|
||||
gates. A single bit is stored in memory.
|
||||
The logic circuit below demonstrates how memory can be created using NAND gates.
|
||||
A single bit is stored in memory.
|
||||
|
||||
 Interactive version of circuit:
|
||||
|
||||
|
|
|
|||
|
|
@ -14,11 +14,10 @@ Throughout the 1980s, the US National Science Foundation began promoting private
|
|||
networks that used the ARPANET as their _backbone_. (Private in the sense of not
|
||||
publicly-funded.)
|
||||
|
||||
Later, these became commercial and
|
||||
[subscription-based](cfbef1c4_web_precursors.md). A plethora of ..._NETS_ grew
|
||||
up (NSFNET, USENET, CSNET, TELENET etc.), all based on #packet-switching, the
|
||||
ARPANET nodes as the backbone and [TCP/IP](Link_Layer_of_Internet_Protocol.md)
|
||||
host communication.
|
||||
Later, these became commercial and [subscription-based](/zk/Web_precursors.md).
|
||||
A plethora of ..._NETS_ grew up (NSFNET, USENET, CSNET, TELENET etc.), all based
|
||||
on #packet-switching, the ARPANET nodes as the backbone and
|
||||
[TCP/IP](Link_Layer_of_Internet_Protocol.md) host communication.
|
||||
|
||||
These networks, although accessible to the public through subscriptions,
|
||||
remained unwieldy and inconsistent to access until the Web.
|
||||
|
|
|
|||
|
|
@ -17,8 +17,7 @@ they did not see it as a viable alternative to proprietary software, due to the
|
|||
lack of licensing, customer support and the misapprehension that the product
|
||||
would be inferior.
|
||||
|
||||
The turning point came when
|
||||
[Netscape](./c301a0b3-1d8_Mosaic_Netscape_and_Browser_Wars.md), in a last ditch
|
||||
The turning point came when [Netscape](./Mosaic_Netscape_and_Browser_Wars.md)
|
||||
effort to resist Microsoft's obliteration of their market, made their
|
||||
source-code open. This caught the attention of the corporate class and the
|
||||
additional media attention led to a greater interest amongst capitalists
|
||||
|
|
|
|||
|
|
@ -30,8 +30,8 @@ echo $expandedRange
|
|||
|
||||
We can access all the arguments passed to a function using the `$@` syntax we
|
||||
encountered before when
|
||||
[passing arguments to scripts](Passing_arguments_to_Bash_scripts.md). (Here a
|
||||
function is a kind of script in miniature so the process is the same.)
|
||||
[passing arguments to scripts](/zk/Passing_arguments_and_options_to_Bash_scripts.md).
|
||||
(Here a function is a kind of script in miniature so the process is the same.)
|
||||
|
||||
```sh
|
||||
function numberThings() {
|
||||
|
|
|
|||
|
|
@ -6,8 +6,8 @@ created: Wednesday, October 23, 2024
|
|||
# 653c0b1d_host_protocols_of_ARPANET
|
||||
|
||||
The responsibility for enabling communication between nodes fell to the hosts,
|
||||
not the [IMPs](e470bf3d_IMPs_in_the_ARPANET.md). At the lowest level (equivalent
|
||||
to the [link layer](Link_Layer_of_Internet_Protocol.md) in the subsequent
|
||||
not the [IMPs](/zk/IMPs_in_the_ARPANET.md). At the lowest level (equivalent to
|
||||
the [link layer](Link_Layer_of_Internet_Protocol.md) in the subsequent
|
||||
internet?), this consisted in moving raw bits between hosts regardless of what
|
||||
specific type of data they encoded.
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Reference in a new issue