Es el sistema de numeracion decimal de base16, empleando por lo tanto 16 simbolos. Su uso actual esta vinculado a la informatica y ciencias de la comunicacion pues las computadoras suelen utilizar el byte u octeto como unidad basica de memoria y 2 digitos hexadecimales corresponden exactamente a un pie.
El conjunto de simbolos seria por tanto del 0 al 9 a=10 b=11 c=12 d=13 e=14 f=15
Calrock
View SlideShare presentation or Upload your own.
triptico heroes del silencio
Heroesgustavo
View SlideShare presentation or Upload your own.
viernes, 28 de agosto de 2009
Requerimientos de sistema para final cut
-MAC G4, G5 0 INTEL
-350Mhz
-Firewire
-MacOSx 10.5
-Quicktime 6.4
-384mb RAM
-40 mb en disco duro
Mac:
-MacOSx 10.5.4
-Quicktime 7.5
-1gb RAM
-disco duro 232gb
Quicktime
Es una plataforma de captura edicion, reproducción y transmisión de diferentes tipos de formatos. Final cut esta basado en quicktime.
Firewire
Es una tecnologia de apple que sirve para conectar dispositivos a una computadora. Es de alta velocidad
Final cut
ordenar archivos que no han sido ordenados
viewer sirve para observar el contenido de los archivos que no han sido editados
Time line sirve para editar y ordenar los archivos de tal forma que puedan contar una historia
Canvas sirve para editar y observar el contenido de los archivos ubicados en la linea del tiempo
jueves, 27 de agosto de 2009
Estandares de video
estandares de video:
Estan formados por un conjunto de reglas o protocolos que definen la manera en que el video sera grabado transmitido y reproducido dentro de una region especifica.
Entre otros aspectos los estandares definen:
1.- FPS (Frames per Second)
2.- Resolución
3.- Tamaño
NTSC: America, Japon, Taiwan
PAL: Europa, Brasil, China
SECAM: Francia, Belgica
DV ( Video Digital) :
-alta calidad
-Bajo costo
-Nivel de compresion bajo
-relacion proporcional entre la compresion y la calidad. Mientras mas espacio ocupen en el disco deberia ser mayor calidad.
- ocupa 1 gb
- Formato nativo de final cut
AVI
- Calidad media
- Bajo costo
- Nivel de compresion importante
MPEG-2
-Buena calidad
-bajo costo
-nivel de compresion alto
Mpeg-4-------->internet
SD (Standard Definition) 720*480
29.97 fps---->NTSC<---------480 lineas
720 pixeles
25fps----->PAL<--------576 lineas
720pixeles
HD ( High Dfinition) small----> 1280*720, large----> 1920*1080
Cociente de aspecto
Se refiere a la relacion que existe entre el ancho y alto de una imagen
miércoles, 26 de agosto de 2009
Sistema octal
Es un sistema numrico de base 8 que usa los digitos del 0 al 7 los numeros octales se pueden construir a partir de numeros binarios agrupando cada tres numeros consecutivos de derecha a izquierda y obteniendo su valor decimal.
En informatica a veces se usa la numeracion octal en vez de la hexadecimal ya que tiene la ventaja de que no requiere otros simbolos diferentes de los digitos
viernes, 21 de agosto de 2009
VPS
Runaway

El arquitecto se encuentra en su casa listo para salir a una entrevista de trabajo y en el elevador de su apartamento se encuentra un niño que dice que lo lleve a su escuela, y ademas se dice ser su hijo. El arquitecto lo lleva a su escuela pero se tarda mucho tiempo y pierde su entrevista de trabajo.
Problem:
Al arquitecto no le gustaban los niños y tenia que cuidar al niño en su apartamento pero empezaba a hacer desastres y se enfadaba el arquitecto. Este le preguntaba al niño que donde estaba su mama, pero el niño no sabía y decia que llamara a su casa.
El niño ya estaba a punto de ir a dormir pero necesitaba su juguete para poder hacerlo, entonces le pidio al arquitecto que si podia ir a su casa a traerlo.
Danish poet
Beginning. El corto comienza con un poeta en Copenhague que ya no tiene ni ideas ni inspiración para nuevas obras, y decide ir con un psicólogo, quien le recomienda irse de vacaciones y leer, entonces va a la biblioteca para ver si logra hallar algo que lo inspire. Encuentra una novela escrita por una mujer danesa que vivía ahora en Noruega, y se la lleva. La novela le causa tanta admiración que decide escribir una carta a la autora, quien se la contesta diciendo que ella misma necesita algo de inspiración, entonces decide que quiere ir a Noruega a conocer a la autora de la novela que había leído.
Problem. *Cuando llega a Noruega, conoce a una joven de quien se enamora, pero la joven ya estaba comprometida con un granjero de la región, entonces la joven le hace una promesa al poeta: no se cortaría el cabello hasta que volvieran a verse, y el poeta regresa a Dinamarca.
**Tiempo después, el prometido de la joven muere, y ella le manda una carta al poeta, pero la carta se le cae al cartero y se la traga una cabra
***La autora de la novela muere; la joven no quería ir al funeral (aunque era familiar suya) , y el poeta no quería ir porque era hasta Noruega, sin embargo, el psicólogo lo convence de ir
****Se van juntos (la joven y el poeta) después del funeral de la autora, y la joven manda llamar a una niña que había sido su estilista para que finalmente se lo cortara, después de que el poeta se tropezara con su cabello y se rompiera un dedo del pie
Solution. *El poeta regresa a Dinamarca triste por no estar con la joven, aunque con un mechón de su cabello para recordarla
El poeta nunca recibe la carta, y por lo tanto, no regresa con la joven a Noruega, quien esperaba su regreso cada día
El poeta asiste al funeral de la autora y ahí se reúne con la joven
El circulo
Beginning: Un hombre tiene problemas, abandono a su esposa, regresa despues de un largo tiempo y promete que va regresar al dia siguiente
problema: Cuando regreso a casa al dia siguiente y se encontro con que elvira habia muerto
Solution: Le pregunta a varias personas y todas le contestaron lo mismo, que elvira habia muerto
End. Abren la casa y encuentran un reloj que habia sido regalado el dia anterior
miércoles, 19 de agosto de 2009
cisco resumen
Capitulo 1
There are many diferent types of computers available:
-Servers: Provide services to many end users. server hardware is optimized for quick response time to multiple network requests
- workstations high-powered devices, designed to run specialty applications
-desktop stationary devices for home or business
- laptops are smaller than desktops computers, but are comparable in usage an power
*Bits are grouped into bytes. each byte contains 8 bits, represent quantities of disk storage capacity and RAM.
*Bits per second is used as a measurement of speed: kbps, mbps or gbps
*Megabytes per second (MBps) measurement hard disk transfer speeds
*Pixels= measure for graphics and image resolution
*Hertz= measure speed of the computer processor and wireless transmission and radio frequencies.
Motherboard system components are:
*CPU processes all data, operating software and applications within the machine
*RAM is used to store programs and data while being processed by the CPU
*Adapter card functions include video and sound cards, network interface cards, modems, interface controler cards
*Hard drives main storage medium found in servers, desktops and laptops
Capitulo 2
An operating system, is the most important software in a PC. It is responsible for making all the components and software applications work together.
The kernel interacts with the hardware
the shell interacts with the applicatons and the user
the user interacts with the shell trough the command line interface or a graphical user interface
NOS= allows a device to share resources among many users
Redirector= Software that enables the Nos to send and recieve data from the network
Perform a pre-installation checklist before installing any new OS
OS is installed in a disk partition, is a defined section of the hard disk
NIC= Network Interface Card is configured with an IP address, subnet mask and default gateway
A network should be well planned, logically organized and well documented
Patch= Is a piece of program code that correects a problem or enhances the functionality of an OS.
Capitulo 3
- Information networks can carry voice, video, and data
- Information networks consist of peripherials, hosts, network devices and media
- Topology diagrams used to depict both logical and phisical network design
-Hosts can play the role of client or server or both
- All communication has a source, a destination and a channel
- Computer communications operate under special rules, called protocols
- Protocols define the characteristics of a message including: encoding, formatting, encapsulation, size, timing and patterns
- To communicate on a local network requires the computers share a comon protocol
- The most common protocol used on a local wired networks is industry-standard Ethernet
-Each local host in an Ethernet network is identified by a phisical MAC address, which is preconfigured into a host´s NIC.
It is common to divide larger networks into smaller, more maneageable, ones using a layered hierarchical design which can include the following layers:
* Access
*Distribution
*Core
Each of these layer has a primary function and associated devices.
Capitulo 4
-An ISP is a company that provides the connctions and support to access the internet.
-ISPs support small to large geographic areas, provide services such as e-mail, web pages, IP Telephony and DNS
- Individual computers and local networks connect to the ISP at a Point of Presence (POP)
-Connection to the ISP can be done vial dial-up, DSL, cable, wireless or satelite.
IP= (Internet Protocol) Most important internet´s protocol
- The internet protocol formats packets into packets that range from 46 to 1500 bytes in lenght for Ethernet networks and must contain a valid source and destination IP address. Ip addresses must be unique on the internet
Every ISP has a control facility for their network known as:
NOC= (Network Operations Center) controls traffic flow and houses services such as email and web hosting
Ping and tracert. Utilities that test connectivity to a destination device.
On network diagrams, a cloud is often used to represent the internet without showing the details of the connections. in the internet cloud, routers are used to provide alternate paths from source to destination.
ISP must consider the physical requirements, such as a power and air conditioning, of the networking equipment, and the servers it houses.
For communication to occur a channel must be present to carry the signals, the medium is usually a physical cable:
Network cables are grouped in two: cooper cables that carry electrical signals and fiber cables wich carry light waves.
Cooper wire is extremely vulnerable to both electromagnetic (EMI) and radio frequency interference( RFI). Fiber optic cable is made of glass or plastic and is immune to emi and rfi
Unshielded Twisted Pair (UTP) cable is used on most Ethernet networks
Coaxial cable, used for cable tv and internet, has an extremely large band width capacity wich allows many signals to be combines or multiplexed together
Fiber cable provides a tremendus amount of bandwith and is suitable for use as backbone cables
Utp cable types: Straight- through, crossover, rollover
TIA/EIA twisted pair terination schemes are T568A and T568B
Capitulo 5
Each logical IP address is made up two parts: network ID and the unique host ID on that network.
IP address is a series of 32 binary bits, grouped in octets
The ip address and subnet mask work togheter to determine wich portion of the IP address represents the network address and wich represents the host address
IP addresses are grouped into 5 classes: Classes A, B. C= are commercial. D= multicasting. E= experimental. Each class has its own default subnet mask
IP addresses are classified in private or public. PUBLIC= are unique and are used on the internet. PRIVATE= Can be used internally by hosts in any organization
Hosts can use IP addresses to communicate one.to.one (unicast) one-to-many (multicast) or one-to-all(broadcast).
There are many diferent types of computers available:
-Servers: Provide services to many end users. server hardware is optimized for quick response time to multiple network requests
- workstations high-powered devices, designed to run specialty applications
-desktop stationary devices for home or business
- laptops are smaller than desktops computers, but are comparable in usage an power
*Bits are grouped into bytes. each byte contains 8 bits, represent quantities of disk storage capacity and RAM.
*Bits per second is used as a measurement of speed: kbps, mbps or gbps
*Megabytes per second (MBps) measurement hard disk transfer speeds
*Pixels= measure for graphics and image resolution
*Hertz= measure speed of the computer processor and wireless transmission and radio frequencies.
Motherboard system components are:
*CPU processes all data, operating software and applications within the machine
*RAM is used to store programs and data while being processed by the CPU
*Adapter card functions include video and sound cards, network interface cards, modems, interface controler cards
*Hard drives main storage medium found in servers, desktops and laptops
Capitulo 2
An operating system, is the most important software in a PC. It is responsible for making all the components and software applications work together.
The kernel interacts with the hardware
the shell interacts with the applicatons and the user
the user interacts with the shell trough the command line interface or a graphical user interface
NOS= allows a device to share resources among many users
Redirector= Software that enables the Nos to send and recieve data from the network
Perform a pre-installation checklist before installing any new OS
OS is installed in a disk partition, is a defined section of the hard disk
NIC= Network Interface Card is configured with an IP address, subnet mask and default gateway
A network should be well planned, logically organized and well documented
Patch= Is a piece of program code that correects a problem or enhances the functionality of an OS.
Capitulo 3
- Information networks can carry voice, video, and data
- Information networks consist of peripherials, hosts, network devices and media
- Topology diagrams used to depict both logical and phisical network design
-Hosts can play the role of client or server or both
- All communication has a source, a destination and a channel
- Computer communications operate under special rules, called protocols
- Protocols define the characteristics of a message including: encoding, formatting, encapsulation, size, timing and patterns
- To communicate on a local network requires the computers share a comon protocol
- The most common protocol used on a local wired networks is industry-standard Ethernet
-Each local host in an Ethernet network is identified by a phisical MAC address, which is preconfigured into a host´s NIC.
It is common to divide larger networks into smaller, more maneageable, ones using a layered hierarchical design which can include the following layers:
* Access
*Distribution
*Core
Each of these layer has a primary function and associated devices.
Capitulo 4
-An ISP is a company that provides the connctions and support to access the internet.
-ISPs support small to large geographic areas, provide services such as e-mail, web pages, IP Telephony and DNS
- Individual computers and local networks connect to the ISP at a Point of Presence (POP)
-Connection to the ISP can be done vial dial-up, DSL, cable, wireless or satelite.
IP= (Internet Protocol) Most important internet´s protocol
- The internet protocol formats packets into packets that range from 46 to 1500 bytes in lenght for Ethernet networks and must contain a valid source and destination IP address. Ip addresses must be unique on the internet
Every ISP has a control facility for their network known as:
NOC= (Network Operations Center) controls traffic flow and houses services such as email and web hosting
Ping and tracert. Utilities that test connectivity to a destination device.
On network diagrams, a cloud is often used to represent the internet without showing the details of the connections. in the internet cloud, routers are used to provide alternate paths from source to destination.
ISP must consider the physical requirements, such as a power and air conditioning, of the networking equipment, and the servers it houses.
For communication to occur a channel must be present to carry the signals, the medium is usually a physical cable:
Network cables are grouped in two: cooper cables that carry electrical signals and fiber cables wich carry light waves.
Cooper wire is extremely vulnerable to both electromagnetic (EMI) and radio frequency interference( RFI). Fiber optic cable is made of glass or plastic and is immune to emi and rfi
Unshielded Twisted Pair (UTP) cable is used on most Ethernet networks
Coaxial cable, used for cable tv and internet, has an extremely large band width capacity wich allows many signals to be combines or multiplexed together
Fiber cable provides a tremendus amount of bandwith and is suitable for use as backbone cables
Utp cable types: Straight- through, crossover, rollover
TIA/EIA twisted pair terination schemes are T568A and T568B
Capitulo 5
Each logical IP address is made up two parts: network ID and the unique host ID on that network.
IP address is a series of 32 binary bits, grouped in octets
The ip address and subnet mask work togheter to determine wich portion of the IP address represents the network address and wich represents the host address
IP addresses are grouped into 5 classes: Classes A, B. C= are commercial. D= multicasting. E= experimental. Each class has its own default subnet mask
IP addresses are classified in private or public. PUBLIC= are unique and are used on the internet. PRIVATE= Can be used internally by hosts in any organization
Hosts can use IP addresses to communicate one.to.one (unicast) one-to-many (multicast) or one-to-all(broadcast).
lunes, 17 de agosto de 2009
Sistema de numeración binario
Sistema que en el cual se utiliza solamente las cifras 0 y 1 para representar todos los numeros para las computadoras que trabajan con 2 niveles de voltaje, este es su sistema natural ya que 0=apagado y 1=encendido
Suscribirse a:
Entradas (Atom)