Table of Contents

Technical Communication (GEIAK100-B2A)

Description The main purpose of the subject is to present and substantiate the main theories and methods and techniques of information systems. Students will learn about basics of logic, numerical systems, basics systems theory, description of information, coding, encryption and semantics, model modelling and fundamentals of computer aided modelling.
Semester Autumn, 2024
Neptun code GEIAK100-B2A
Instructors Dr. Károly Nehéz, assoc. prof.
Áron Kiss, teaching assist.
Credit Hours 2+2
Attendance Requirement Students are required to attend at least 60% of the scheduled classes to be eligible for the course signature.
Signature The prerequisite for obtaining the signature is the completion of the two practical assignments at an adequate level and the successful completion of a midterm exam.
Examination The examination is written, and students will receive some theoretical questions and practical tasks from the course material.

Lecture Notes

Practices

  1. OnShape Sketching:
  2. OnShape Part Designing:
  3. OnShape Assemblies:
      1. Task: Construct the piston, connection, and handle parts, then assemble the machine!

Assignments

  1. HTML Assignment (submission deadline: 2024. 11. 06.)
  2. CAD Assignment (task selection deadline: 2024. 11. 27.; submission deadline: 2024. 12. 11.)

Additional Notes


Examination Questions

1. The three types of sciences: inductive, deductive, and reductive. An overview of the scientific method.

2. The hierarchical levels of information, the concepts of sets and systems, the multi-level model of informational properties, and the concept of a signal and its basic types.

3. The quantitative properties of information, the concept of relative frequency, probabilities in finite event systems, Shannon's information-measuring function, the statistical properties of message sets, and the entropy and redundancy of a message set.

4. The syntactic properties of information. The concept of a code. Properties of different code types. Encoding messages, the Shannon-Fano procedure.

5. The concept of parity bit, Hamming distance, correcting a 1-bit error in 16-bit data.

6. Other error detection and correction methods: the concept of a checksum. Elias block protection.

7. Checksum. The protection algorithm of bank card numbers.

8. Simple compression methods: RLE coding, LZW coding.

9. Character codes: ASCII codes, Unicode, UTF-8 encoding and decoding.

10. Demonstration of Base64 encoding and decoding.

11. Demonstration of JPEG and MPEG compression, including their key properties.

12. The syntax of languages: demonstration of Backus-Naur (BN) form, syntax graphs, JSON schema. The essence of XML and DTD.

13. Implementation of key exchange over an eavesdropped channel.

14. The essence of RSA encryption.

15. Hash codes and their properties, password storage.

16. Digital signatures with and without hash codes.