| various information representation methods| Fifth week |250/850|1/5|25/80| compilation and disassembly# # References-[Learning Guide for in-depth understanding of computer system V2] ([http://www.cnblogs.com/rocedu/p/5826467.html])-[Introduction to Linux Basics (new version)] ([https://www.shiyanlou.com/courses/1#])-[Teaching of information security system design basics] ([http://www.cnblogs.com/rocedu/p/5826175.html])-[2016-2017-1 Teaching process
more specific, but it's not quite understandable how the cache works, because there's some abstraction.This week's code hostingCode Link: https://git.oschina.net/929210354/LinuxLearning progress Bar
lines of code (new /Cumulative)
Blog volume ( new/cumulative)
Learning time (new/cumulative)
Important growth
Goal
5000 rows
30 Articles
400 hours
First week
0/0
1/2
10/10
Installing a Lin
time, metadata, by invoking the stat and FSTAT functions. #include The stat function takes a file name as input, and the ftast as input with a filename descriptor.
Learning progress Bar
Code lines (new/cumulative)
Blog volume (new/cumulative)
Learning Time (new/cumulative)
important growth
Goal
5000 rows
30 Articles
400 hours
Seventh Week
1300/1750
11/11
140/140
blocked, waiting for a condition that will never be true.
Programmers use P and V incorrectly so that two of the semaphore's forbidden areas overlap.
Overlapping forbidden areas cause a set of states called deadlock zones.
Deadlocks are unpredictable.
This week's code hostingResources
"In-depth understanding of computer system V2" Learning Guide
2016-2017-1 the teaching process of the basic design of information s
summary of the wrong quiz
Wrong question 1 and reason, understand the situation
Wrong question 2 and reason, understand the situation
...
Other (sentiment, thinking, etc., optional)XxxXxxLearning progress Bar
lines of code (new/cumulative)
Blog Volume (Add/accumulate)
Learning Time (new/cumulative)
Important Growth
Goal
5000 rows
30 Articles
400 hours
First week
200/200
2/
like there's no codeOther (sentiment, thinking, etc., optional)
This week's study is mainly about how the processor executes the program, the assembly language into the machine code after the implementation of the machine code, the books on the table is good-looking, combined with a few examples to understand the basic understanding, learning the Y86 instruction set architecture, At the same time to learn some of the previous semester HDL (H
important abstraction of the computer, which abstracts the physical storage space in the computer.Of course, this can also lead to some errors, such as the above mentioned in the C language of some errors, after understanding this knowledge can be better to help us to avoid some of the errors caused by storageLearning progress Bar
lines of code (new/cumulative)
Blog Volume ( new/cumulative)
Learning time (new /cumulative)
Goal
5000 rows
30 A
20145317 Peng Yao "Information Security system design basics" NO. 0 Week study SummaryFeelings:The relationship between the student and the teacher: fitness instructor and fitness trainee. Students want to build a good body but do not know the path and method, so to find the coach, the coach needs to do is to guide the students to correct exercise posture and exercise methods, then the whole thing is to see
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.