Regular Expression Searching
|
|
|
- Shanon Allison
- 9 years ago
- Views:
Transcription
1 Regular Expression Searching Regular expressions allow forensics analysts to search through large quantities of text information for patterns of data such as the following: Telephone Numbers Social Security Numbers Computer IP Addresses Credit Card Numbers This data can be extracted because it occurs in known patterns. For example, credit card numbers are typically sixteen digits in length and are often stored in the following pattern or format: xxxx xxxx xxxx xxxx. This appendix explains the following: Understanding Regular Expressions Predefined Regular Expressions Going Further with Regular Expressions 1
2 Understanding Regular Expressions Forensics analysts specify a desired pattern by composing a regular expression. These patterns are similar to arithmetic expressions that have operands, operators, sub-expressions, and a value. For example, the following table identifies the mathematical components in the arithmetic expression, 5/((1+2)*3): Component Example Operands 5, 1, 2, 3 Operators /, ( ), +, * Sub-Expressions (1+2), ((1+2)*3) Value Approximately Simple Regular Expressions Like the arithmetic expression in this example, regular expressions have operands, operators, sub-expressions, and a value. How these expressions are created and used is explained using simple expressions followed by more complex regular expressions. Note: Unlike arithmetic expressions which can only have numeric operands, operands in regular expressions can be any characters that can be typed on a keyboard, such as alphabetic, numeric, and symbolic characters. A simple regular expression can be made up entirely of operands. For example, the regular expression dress causes the search engine to return a list of all files that contain the sequence of characters d r e s s. The regular expression dress corresponds to a very specific and restricted pattern of text, that is, sequences of text that contain the sub-string dress. Files containing the words dress, address, dressing, and dresser, are returned in a search for the regular expression dress. 2 FTK Regular Expressions Guide
3 The search engine searches left to right. So in searching the regular expression dress, the search engine opens each file and scans its contents line by line, looking for a d, followed by an r, followed by an e, and so on. Complex Regular Expressions Visa and MasterCard Numbers Operators allow regular expressions to search patterns of data rather than specific values. For example, the operators in the following expression enables the FTK's search engine to find all Visa and MasterCard credit card numbers in case evidence files: \<((\d\d\d\d)[\ ]){3}\d\d\d\d\> Without the use of operators, the search engine could look for only one credit card number at a time. Note: The credit card expression discussion in this section is included in FTK and is used here primarily for the explanation of advanced regular expressions. The following table identifies the components in the Visa and MasterCard regular expression: Component Operands Example d, \, spacebar space Operators \d, \, <, ( ), [ ], {3}, \> Sub-Expressions (\d\d\d\d), ((\d\d\d\d)[\ ]) Value Any sequence of sixteen decimal digits that is delimited by three hyphens and bound on both sides by non-word characters (xxxx xxxx xxxx xxxx). As the regular expression search engine evaluates an expression in left-to-right order, the first operand it encounters is the backslash less-than combination (\<). This combination is also known as the begin-a-word operator. This operator tells the search engine that the first character in any Regular Expression Searching 3
4 search hit immediately follows a non-word character such as white space or other word delimiter. Tip: A precise definition of non-word characters and constituent-word characters in regular expressions is difficult to find. Consequently, experimentation by FTK users may be the best way to determine if the forward slash less-than (\<) and forward slash greater-than (\>) operators help find the data patterns relevant to a specific searching task. The hyphen and the period are examples of valid delimiters or non-word characters. The begin-a-word operator illustrates one of two uses of the backslash character (\), often called the escape character: the modification of operands and the modification of operators. On its own, the left angle bracket (<) would be evaluated as an operand, requiring the search engine to look next for a left angle bracket character. However, when the escape character immediately precedes the (<), the two characters are interpreted together as the begin-a-word operator by the search engine. When an escape character precedes a hyphen ( ) character, which is normally considered to be an operator, the two characters (\ ) require the search engine to look next for a hyphen character and not apply the hyphen operator (the meaning of the hyphen operator is discussed below). The next operator is the parentheses ( ). The parentheses group together a sub-expression, that is, a sequence of characters that must be treated as a group and not as individual operands. The next operator is the \d. This operator, which is another instance of an operand being modified by the escape character, is interpreted by the search engine to mean that the next character in search hits found may be any decimal digit character from 0-9. The square brackets ([ ]) indicate that the next character in the sequence must be one of the characters listed between the brackets or escaped characters. In the case of the credit card expression, the backslash-hyphen-spacebar space ([\-spacebar space]) means that the four decimal digits must be followed by a hyphen or a spacebar space. 4 FTK Regular Expressions Guide
5 Other Variations on the Same Expression Next, the {3} means that the preceding sub-expression must repeat three times, back to back. The number in the curly brackets ({ }) can be any positive number. Finally, the forward slash greater-than combination (\>), also know as the end-a-word operator, means that the preceding expression must be followed by a non-word character. Sometimes there are ways to search for the same data using different expressions. It should be noted that there is no oneto-one correspondence between the expression and the pattern it is supposed to find. Thus the preceding credit card regular expression is not the only way to search for Visa or MasterCard credit card numbers. Because some regular expression operators have related meanings, there is more than one way to compose a regular expression to find a specific pattern of text. For instance, the following regular expression has the same meaning as the preceding credit card expression: \<((\d\d\d\d)(\ )){3}\d\d\d\d\> The difference here is the use of the pipe ( ) or union operator. The union operator means that the next character to match is either the left operand (the hyphen) or the right operand (the spacebar space). The similar meaning of the pipe ( ) and square bracket ([ ]) operators give both expressions equivalent functions. In addition to the previous two examples, the credit card regular expression could be composed as follows: \<\d\d\d\d(\ )\d\d\d\d(\ )\d\d\d\d(\ )\d\d\d\d\> This expression explicitly states each element of the data pattern, whereas the {3} operator in the first two examples provides a type of mathematical shorthand for more succinct regular expressions. Regular Expression Searching 5
6 Predefined Regular Expressions Social Security Number U.S. Phone Number FTK provides the following predefined regular expressions: U.S. Social Security Numbers U.S. Phone Numbers U.K. Phone Numbers IP Addresses Visa and MasterCard Numbers The Social Security Number, U.S. Phone Number, and IP Address expressions are discussed in the following sections. Note: The U.K. Phone Number expression is similar enough to the U.S. Phone Number that it does not warrant a separate discussion. The regular expression for Social Security numbers follows a relatively simple pattern: \<\d\d\d[\ ]\d\d[\ ]\d\d\d\d\> This expression reads as follows: find a sequence of text that begins with three decimal digits, followed by a hyphen or spacebar space. This sequence is followed by two more decimal digits and a hyphen or spacebar space, followed by four more decimal digits. This entire sequence must be bounded on both ends by non-word characters. The regular expression for U.S. phone numbers is more complex: ((\<1[\ \. ])?(\( \<)\d\d\d[\)\.\ / ]?)?\<\d\d\d[\.\ ]\d\d\d\d\> This expression demonstrates that regular expressions can be used to find more complex data patterns than simple credit card and Social Security number patterns. The first part of the above expression, ((\<1[\ \. ])?(\( \<)\d\d\d[\)\.\ / ]?)?, means, in effect, that an area code may or may not precede the 6 FTK Regular Expressions Guide
7 seven digit phone number. This meaning is achieved through the use of the question mark (?) operator. This operator requires that the sub-expression immediately to its left appear exactly zero or one times in any search hits. Therefore, the U.S. Phone Number expression finds telephone numbers with or without area codes. This expression also indicates that if an area code is present, a number one (1) may or may not precede the area code. This meaning is achieved through the sub-expression (\<1[\ \. ])?, which says that if there is a 1 before the area code, it will follow a non-word character and be separated from the area code by a delimiter (period, hyphen, or spacebar space). The next sub-expression, (\( \<)\d\d\d[\)\.\ / ]?, specifies how the area code must appear in any search hits. The \( \<) requires that the area code begin with a left parenthesis or other delimiter. (Note that the left parenthesis is, of necessity, escaped.) The initial delimiter is followed by three decimal digits, then another delimiter namely, a right parenthesis, a period, a hyphen, a forward slash, or a spacebar space. Lastly, the question mark (? ) means that there may or may not be one spacebar space after the final delimiter. The latter portion of this expression, \<\d\d\d[\.\ ]\d\d\d\d\>, requests a seven-digit phone number with a delimiter (period, hyphen, or spacebar space) between the third and fourth decimal digit characters. Note that typically, the period is an operator. It means that the next character in the pattern can be any valid character. To specify an actual period (.), the character must be escaped (\.). The backslash period combination is included in the expression to catch phone numbers delimited by a period character. Regular Expression Searching 7
8 IP Address An IP address is a 32-bit value that uniquely identifies a computer on a TCP/IP network, including the Internet. Currently, all IP addresses are represented by a numeric sequence of four fields separated by the period character. Each field can contain any number from 0 to 255. The following regular expression locates IP addresses: \<[1-2]?[0-9]?[0-9]\.[1-2]?[0-9]?[0-9]\.[1-2]?[0-9]?[0-9]\.[1-2]?[0-9]?[0-9]\> The IP Address expression requires the search engine to find a sequence of data with four fields separated by periods (.). The data sequence must also be bound on both sides by nonword characters. Note that the square brackets ([ ]) still behave as a set operator, meaning that the next character in the sequence can be any one of the values specified in the square brackets ([ ]). Also note that the hyphen ( ) is not escaped; it is an operator that expresses ranges of characters. Each field in an IP address can contain up to three characters. Reading the expression left to right, the first character, if present, must be a 1 or a 2. The second character, if present, can be any value 0 9. The square brackets ([ ]) indicate the possible range of characters and the question mark (?) indicates that the value is optional; that is, it may or may not be present. The third character is required; therefore, there is no question mark. However, the value can still be any number 0 9. Going Further with Regular Expressions You can begin building your own regular expressions by experimenting with the default expressions in FTK. You can modify the default expressions to fine-tune your data searches or to create your own expressions. 8 FTK Regular Expressions Guide
9 Locating More Information on Regular Expressions Common Operators The World Wide Web contains many other reference materials and tutorials for regular expression searching. For example, the Website provides a regular expression for finding addresses. Keep in mind, however, that there is some variation among the search engines. Some of them differ in expression syntax, i.e., in the way that they form and use operands and operators. Tip: Regular expression operators are often referred to as metacharacters in the regular expression literature. See for a definitive reference on the syntax employed by Regex++, the regular expression search engine bundled with FTK. Note: The regular expression search engine used by FTK is called Regex++. It was created by Dr. John Maddock, a contributor to The following is a list of common operators: Operators Description + Matches the preceding sub-expression one or more times. For example, ba+ will find all instances of ba, baa, baaa, and so forth; but it will not find b. $ Matches the end of a line. * Matches the preceding sub-expression zero or more times. For example, ba* will find all instances of b, ba, baa, baaa, and so forth.? Matches the preceding sub-expression zero or one times. [] Matches any single value within the square brackets. For example, ab[xyz] will find abx, aby, and abz. A hyphen (-) specifies ranges of characters with the brackets. For example, ab[0-3] will find ab0, ab1, ab2, and ab3. You can also specify case specific ranges such as [a-r], or [B-M]. [^ftk] Matches any character except those bound by the [^ and the ]. Regular Expression Searching 9
10 \< Matches the beginning of a word. In other words, the next character in any search hit must immediately follow a non-word character. \> Matches the end of a word. Matches either the sub-expression on the left or the right. For example, A u will requires that the next character in a search hit be A or u. \d Matches any decimal digit. \l Matches any lowercase letter. \s Matches any white space character such as a space or a tab. \u Matches any uppercase letter. \w Matches any whole word. ^ {n,m} {n} Matches the start of a line. Matches the preceding sub-expression at least n times, but no more than m times. Matches the preceding sub-expression n times. 10 FTK Regular Expressions Guide
Lecture 18 Regular Expressions
Lecture 18 Regular Expressions Many of today s web applications require matching patterns in a text document to look for specific information. A good example is parsing a html file to extract tags
dtsearch Regular Expressions
dtsearch Regular Expressions In the AccessData Forensic Toolkit, regular expression searching capabilities has been incorporated in the dtsearch index search tab. This functionality does not use RegEx++
Name: Class: Date: 9. The compiler ignores all comments they are there strictly for the convenience of anyone reading the program.
Name: Class: Date: Exam #1 - Prep True/False Indicate whether the statement is true or false. 1. Programming is the process of writing a computer program in a language that the computer can respond to
Regular Expression Syntax
1 of 5 12/22/2014 9:55 AM EmEditor Home - EmEditor Help - How to - Search Regular Expression Syntax EmEditor regular expression syntax is based on Perl regular expression syntax. Literals All characters
5.1 Radical Notation and Rational Exponents
Section 5.1 Radical Notation and Rational Exponents 1 5.1 Radical Notation and Rational Exponents We now review how exponents can be used to describe not only powers (such as 5 2 and 2 3 ), but also roots
Using Regular Expressions in Oracle
Using Regular Expressions in Oracle Everyday most of us deal with multiple string functions in Sql. May it be for truncating a string, searching for a substring or locating the presence of special characters.
Creating Basic Excel Formulas
Creating Basic Excel Formulas Formulas are equations that perform calculations on values in your worksheet. Depending on how you build a formula in Excel will determine if the answer to your formula automatically
Regular Expressions. In This Appendix
A Expressions In This Appendix Characters................... 888 Delimiters................... 888 Simple Strings................ 888 Special Characters............ 888 Rules....................... 891
University Convocation. IT 3203 Introduction to Web Development. Pattern Matching. Why Match Patterns? The Search Method. The Replace Method
IT 3203 Introduction to Web Development Regular Expressions October 12 Notice: This session is being recorded. Copyright 2007 by Bob Brown University Convocation Tuesday, October 13, 11:00 AM 12:15 PM
Frequently Asked Questions on character sets and languages in MT and MX free format fields
Frequently Asked Questions on character sets and languages in MT and MX free format fields Version Final 17 January 2008 Preface The Frequently Asked Questions (FAQs) on character sets and languages that
JavaScript: Introduction to Scripting. 2008 Pearson Education, Inc. All rights reserved.
1 6 JavaScript: Introduction to Scripting 2 Comment is free, but facts are sacred. C. P. Scott The creditor hath a better memory than the debtor. James Howell When faced with a decision, I always ask,
PL / SQL Basics. Chapter 3
PL / SQL Basics Chapter 3 PL / SQL Basics PL / SQL block Lexical units Variable declarations PL / SQL types Expressions and operators PL / SQL control structures PL / SQL style guide 2 PL / SQL Block Basic
Introduction to Java Applications. 2005 Pearson Education, Inc. All rights reserved.
1 2 Introduction to Java Applications 2.2 First Program in Java: Printing a Line of Text 2 Application Executes when you use the java command to launch the Java Virtual Machine (JVM) Sample program Displays
Moving from CS 61A Scheme to CS 61B Java
Moving from CS 61A Scheme to CS 61B Java Introduction Java is an object-oriented language. This document describes some of the differences between object-oriented programming in Scheme (which we hope you
C H A P T E R Regular Expressions regular expression
7 CHAPTER Regular Expressions Most programmers and other power-users of computer systems have used tools that match text patterns. You may have used a Web search engine with a pattern like travel cancun
Variables, Constants, and Data Types
Variables, Constants, and Data Types Primitive Data Types Variables, Initialization, and Assignment Constants Characters Strings Reading for this class: L&L, 2.1-2.3, App C 1 Primitive Data There are eight
Regular Expressions. General Concepts About Regular Expressions
Regular Expressions This appendix explains regular expressions and how to use them in Cisco IOS software commands. It also provides details for composing regular expressions. This appendix has the following
Chapter 4: Computer Codes
Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence 36 Slide 2/30 Data
6 3 4 9 = 6 10 + 3 10 + 4 10 + 9 10
Lesson The Binary Number System. Why Binary? The number system that you are familiar with, that you use every day, is the decimal number system, also commonly referred to as the base- system. When you
Regular Expressions Overview Suppose you needed to find a specific IPv4 address in a bunch of files? This is easy to do; you just specify the IP
Regular Expressions Overview Suppose you needed to find a specific IPv4 address in a bunch of files? This is easy to do; you just specify the IP address as a string and do a search. But, what if you didn
Lies My Calculator and Computer Told Me
Lies My Calculator and Computer Told Me 2 LIES MY CALCULATOR AND COMPUTER TOLD ME Lies My Calculator and Computer Told Me See Section.4 for a discussion of graphing calculators and computers with graphing
Unix Shell Scripts. Contents. 1 Introduction. Norman Matloff. July 30, 2008. 1 Introduction 1. 2 Invoking Shell Scripts 2
Unix Shell Scripts Norman Matloff July 30, 2008 Contents 1 Introduction 1 2 Invoking Shell Scripts 2 2.1 Direct Interpretation....................................... 2 2.2 Indirect Interpretation......................................
Formulas & Functions in Microsoft Excel
Formulas & Functions in Microsoft Excel Theresa A Scott, MS Biostatistician II Department of Biostatistics Vanderbilt University [email protected] Table of Contents 1 Introduction 1 1.1 Using
Eventia Log Parsing Editor 1.0 Administration Guide
Eventia Log Parsing Editor 1.0 Administration Guide Revised: November 28, 2007 In This Document Overview page 2 Installation and Supported Platforms page 4 Menus and Main Window page 5 Creating Parsing
C++ Language Tutorial
cplusplus.com C++ Language Tutorial Written by: Juan Soulié Last revision: June, 2007 Available online at: http://www.cplusplus.com/doc/tutorial/ The online version is constantly revised and may contain
820 Payroll Deducted and Other Group Premium Payment for Insurance Products
Companion Document 820 820 Payroll Deducted and Other Group Premium Payment for Insurance Products This companion document is for informational purposes only to describe certain aspects and expectations
Computer Science 281 Binary and Hexadecimal Review
Computer Science 281 Binary and Hexadecimal Review 1 The Binary Number System Computers store everything, both instructions and data, by using many, many transistors, each of which can be in one of two
Handout 1. Introduction to Java programming language. Java primitive types and operations. Reading keyboard Input using class Scanner.
Handout 1 CS603 Object-Oriented Programming Fall 15 Page 1 of 11 Handout 1 Introduction to Java programming language. Java primitive types and operations. Reading keyboard Input using class Scanner. Java
Introduction to Searching with Regular Expressions
Introduction to Searching with Regular Expressions Christopher M. Frenz Department of Computer Engineering Technology New York City College of Technology (CUNY) 300 Jay St Brooklyn, NY 11201 Email: [email protected]
Bachelors of Computer Application Programming Principle & Algorithm (BCA-S102T)
Unit- I Introduction to c Language: C is a general-purpose computer programming language developed between 1969 and 1973 by Dennis Ritchie at the Bell Telephone Laboratories for use with the Unix operating
Microsoft Excel 2010 Part 3: Advanced Excel
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Excel 2010 Part 3: Advanced Excel Winter 2015, Version 1.0 Table of Contents Introduction...2 Sorting Data...2 Sorting
Formal Languages and Automata Theory - Regular Expressions and Finite Automata -
Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March
Regular Expressions. Abstract
Regular Expressions Sanjiv K. Bhatia Department of Mathematics & Computer Science University of Missouri St. Louis St. Louis, MO 63121 email: [email protected] Abstract Regular expressions provide a powerful
Digital System Design Prof. D Roychoudhry Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Digital System Design Prof. D Roychoudhry Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 04 Digital Logic II May, I before starting the today s lecture
Programming Languages CIS 443
Course Objectives Programming Languages CIS 443 0.1 Lexical analysis Syntax Semantics Functional programming Variable lifetime and scoping Parameter passing Object-oriented programming Continuations Exception
IP Subnetting and Related Topics A Tutorial by Chris Uriarte <[email protected]> Updated April 2001
IP Subnetting and Related Topics A Tutorial by Chris Uriarte Updated April 2001 IP Addresses and their Binary Equivalents First and foremost, it s important to understand that every
Excel: Introduction to Formulas
Excel: Introduction to Formulas Table of Contents Formulas Arithmetic & Comparison Operators... 2 Text Concatenation... 2 Operator Precedence... 2 UPPER, LOWER, PROPER and TRIM... 3 & (Ampersand)... 4
So let us begin our quest to find the holy grail of real analysis.
1 Section 5.2 The Complete Ordered Field: Purpose of Section We present an axiomatic description of the real numbers as a complete ordered field. The axioms which describe the arithmetic of the real numbers
Search Requests (Overview)
Search Requests (Overview) OnDemand supports three types of search requests: An "any words" search is any sequence of text, like a sentence or a question. In an "any words" search, use quotation marks
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
Setting Up the TCP/IP Scanner
Setting Up the TCP/IP Scanner The TCP/IP Scanner tab in the New Connection window helps you find and connect to remote computers, even when you don t know their IP addresses, by browsing your local network
Basics FLEETMATE. Getting Started The Main Window Filtering Data Using Your Mouse Windows and Buttons
Basics Getting Started The Main Window Filtering Data Using Your Mouse Windows and Buttons Copyright SCB Consulting, LLC. All rights reserved. www.fleetmate.com Getting Started Welcome to FLEETMATE, Windows
We will learn the Python programming language. Why? Because it is easy to learn and many people write programs in Python so we can share.
LING115 Lecture Note Session #4 Python (1) 1. Introduction As we have seen in previous sessions, we can use Linux shell commands to do simple text processing. We now know, for example, how to count words.
Time Value of Money. 2014 Level I Quantitative Methods. IFT Notes for the CFA exam
Time Value of Money 2014 Level I Quantitative Methods IFT Notes for the CFA exam Contents 1. Introduction...2 2. Interest Rates: Interpretation...2 3. The Future Value of a Single Cash Flow...4 4. The
CS106A, Stanford Handout #38. Strings and Chars
CS106A, Stanford Handout #38 Fall, 2004-05 Nick Parlante Strings and Chars The char type (pronounced "car") represents a single character. A char literal value can be written in the code using single quotes
Playing with Numbers
PLAYING WITH NUMBERS 249 Playing with Numbers CHAPTER 16 16.1 Introduction You have studied various types of numbers such as natural numbers, whole numbers, integers and rational numbers. You have also
The Hexadecimal Number System and Memory Addressing
APPENDIX C The Hexadecimal Number System and Memory Addressing U nderstanding the number system and the coding system that computers use to store data and communicate with each other is fundamental to
DTD Tutorial. About the tutorial. Tutorial
About the tutorial Tutorial Simply Easy Learning 2 About the tutorial DTD Tutorial XML Document Type Declaration commonly known as DTD is a way to describe precisely the XML language. DTDs check the validity
Regular Expressions and Automata using Haskell
Regular Expressions and Automata using Haskell Simon Thompson Computing Laboratory University of Kent at Canterbury January 2000 Contents 1 Introduction 2 2 Regular Expressions 2 3 Matching regular expressions
Number Representation
Number Representation CS10001: Programming & Data Structures Pallab Dasgupta Professor, Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Topics to be Discussed How are numeric data
MULTIPLICATION AND DIVISION OF REAL NUMBERS In this section we will complete the study of the four basic operations with real numbers.
1.4 Multiplication and (1-25) 25 In this section Multiplication of Real Numbers Division by Zero helpful hint The product of two numbers with like signs is positive, but the product of three numbers with
Factorizations: Searching for Factor Strings
" 1 Factorizations: Searching for Factor Strings Some numbers can be written as the product of several different pairs of factors. For example, can be written as 1, 0,, 0, and. It is also possible to write
Microsoft Excel Tips & Tricks
Microsoft Excel Tips & Tricks Collaborative Programs Research & Evaluation TABLE OF CONTENTS Introduction page 2 Useful Functions page 2 Getting Started with Formulas page 2 Nested Formulas page 3 Copying
The Center for Teaching, Learning, & Technology
The Center for Teaching, Learning, & Technology Instructional Technology Workshops Microsoft Excel 2010 Formulas and Charts Albert Robinson / Delwar Sayeed Faculty and Staff Development Programs Colston
10.2 Series and Convergence
10.2 Series and Convergence Write sums using sigma notation Find the partial sums of series and determine convergence or divergence of infinite series Find the N th partial sums of geometric series and
A.2. Exponents and Radicals. Integer Exponents. What you should learn. Exponential Notation. Why you should learn it. Properties of Exponents
Appendix A. Exponents and Radicals A11 A. Exponents and Radicals What you should learn Use properties of exponents. Use scientific notation to represent real numbers. Use properties of radicals. Simplify
Q&As: Microsoft Excel 2013: Chapter 2
Q&As: Microsoft Excel 2013: Chapter 2 In Step 5, why did the date that was entered change from 4/5/10 to 4/5/2010? When Excel recognizes that you entered a date in mm/dd/yy format, it automatically formats
TABLE OF CONTENTS. www.xwireless.net Page 2
TABLE OF CONTENTS 1. INRODUCTION 2 1.1 Features.2 2. STANDARD VIEW.3 3. HOW TO LOGIN..4 4. PASSWORD RECOVERY 4 5. PROFILE 7 6. PASSWORD UPDATE 8 7. COMPOSE SMS..9 7.1 SEND EASY SMS 10 7.2 SEND GROUP SMS..10
Microsoft Dynamics GP. Extender User s Guide
Microsoft Dynamics GP Extender User s Guide Copyright Copyright 2010 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views expressed in this document,
MATLAB Programming. Problem 1: Sequential
Division of Engineering Fundamentals, Copyright 1999 by J.C. Malzahn Kampe 1 / 21 MATLAB Programming When we use the phrase computer solution, it should be understood that a computer will only follow directions;
So far we have considered only numeric processing, i.e. processing of numeric data represented
Chapter 4 Processing Character Data So far we have considered only numeric processing, i.e. processing of numeric data represented as integer and oating point types. Humans also use computers to manipulate
Tasks in the Lesson. Mathematical Goals Common Core State Standards. Emphasized Standards for Mathematical Practice. Prior Knowledge Needed
Mathematical Goals Common Core State Standards Emphasized Standards for Mathematical Practice Prior Knowledge Needed Vocabulary Lesson 2.4 Five Numbers Bingo Overview and Background Information By the
Method To Solve Linear, Polynomial, or Absolute Value Inequalities:
Solving Inequalities An inequality is the result of replacing the = sign in an equation with ,, or. For example, 3x 2 < 7 is a linear inequality. We call it linear because if the < were replaced with
Chapter 2: Elements of Java
Chapter 2: Elements of Java Basic components of a Java program Primitive data types Arithmetic expressions Type casting. The String type (introduction) Basic I/O statements Importing packages. 1 Introduction
3.2. Solving quadratic equations. Introduction. Prerequisites. Learning Outcomes. Learning Style
Solving quadratic equations 3.2 Introduction A quadratic equation is one which can be written in the form ax 2 + bx + c = 0 where a, b and c are numbers and x is the unknown whose value(s) we wish to find.
MS Access: Advanced Tables and Queries. Lesson Notes Author: Pamela Schmidt
Lesson Notes Author: Pamela Schmidt Tables Text Fields (Default) Text or combinations of text and numbers, as well as numbers that don't require calculations, such as phone numbers. or the length set by
Application Notes for Configuring Alternate Methods of Domain Based Routing for Outbound SIP Calls with the Avaya SIP Trunk Architecture Issue 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Alternate Methods of Domain Based Routing for Outbound SIP Calls with the Avaya SIP Trunk Architecture Issue 1.0 Abstract These
ExamView Dynamic Questions Training Guide for PC and Mac Users
ExamView Dynamic Questions Training Guide for PC and Mac Users Introduction to Building Dynamic Content1 2 Introduction to Building Dynamic Content ExamView Level 1 Training Guide Contact Information In
arrays C Programming Language - Arrays
arrays So far, we have been using only scalar variables scalar meaning a variable with a single value But many things require a set of related values coordinates or vectors require 3 (or 2, or 4, or more)
SOME EXCEL FORMULAS AND FUNCTIONS
SOME EXCEL FORMULAS AND FUNCTIONS About calculation operators Operators specify the type of calculation that you want to perform on the elements of a formula. Microsoft Excel includes four different types
Limitation of Liability
Limitation of Liability Information in this document is subject to change without notice. THE TRADING SIGNALS, INDICATORS, SHOWME STUDIES, PAINTBAR STUDIES, PROBABILITYMAP STUDIES, ACTIVITYBAR STUDIES,
A Little Set Theory (Never Hurt Anybody)
A Little Set Theory (Never Hurt Anybody) Matthew Saltzman Department of Mathematical Sciences Clemson University Draft: August 21, 2013 1 Introduction The fundamental ideas of set theory and the algebra
26 Integers: Multiplication, Division, and Order
26 Integers: Multiplication, Division, and Order Integer multiplication and division are extensions of whole number multiplication and division. In multiplying and dividing integers, the one new issue
Chapter One Introduction to Programming
Chapter One Introduction to Programming 1-1 Algorithm and Flowchart Algorithm is a step-by-step procedure for calculation. More precisely, algorithm is an effective method expressed as a finite list of
Multiplying and Dividing Signed Numbers. Finding the Product of Two Signed Numbers. (a) (3)( 4) ( 4) ( 4) ( 4) 12 (b) (4)( 5) ( 5) ( 5) ( 5) ( 5) 20
SECTION.4 Multiplying and Dividing Signed Numbers.4 OBJECTIVES 1. Multiply signed numbers 2. Use the commutative property of multiplication 3. Use the associative property of multiplication 4. Divide signed
Probability Distributions
CHAPTER 5 Probability Distributions CHAPTER OUTLINE 5.1 Probability Distribution of a Discrete Random Variable 5.2 Mean and Standard Deviation of a Probability Distribution 5.3 The Binomial Distribution
7. Solving Linear Inequalities and Compound Inequalities
7. Solving Linear Inequalities and Compound Inequalities Steps for solving linear inequalities are very similar to the steps for solving linear equations. The big differences are multiplying and dividing
Arithmetic Progression
Worksheet 3.6 Arithmetic and Geometric Progressions Section 1 Arithmetic Progression An arithmetic progression is a list of numbers where the difference between successive numbers is constant. The terms
CMPSCI 250: Introduction to Computation. Lecture #19: Regular Expressions and Their Languages David Mix Barrington 11 April 2013
CMPSCI 250: Introduction to Computation Lecture #19: Regular Expressions and Their Languages David Mix Barrington 11 April 2013 Regular Expressions and Their Languages Alphabets, Strings and Languages
Toothpick Squares: An Introduction to Formulas
Unit IX Activity 1 Toothpick Squares: An Introduction to Formulas O V E R V I E W Rows of squares are formed with toothpicks. The relationship between the number of squares in a row and the number of toothpicks
PaymentNet Federal Card Solutions Cardholder FAQs
PaymentNet Federal Card Solutions It s easy to find the answers to your questions about PaymentNet! June 2014 Frequently Asked Questions First Time Login How do I obtain my login information?... 2 How
Useful Mathematical Symbols
32 Useful Mathematical Symbols Symbol What it is How it is read How it is used Sample expression + * ddition sign OR Multiplication sign ND plus or times and x Multiplication sign times Sum of a few disjunction
Chapter 5. Selection 5-1
Chapter 5 Selection 5-1 Selection (Decision) The second control logic structure is selection: Selection Choosing between two or more alternative actions. Selection statements alter the sequential flow
Selecting Features by Attributes in ArcGIS Using the Query Builder
Helping Organizations Succeed with GIS www.junipergis.com Bend, OR 97702 Ph: 541-389-6225 Fax: 541-389-6263 Selecting Features by Attributes in ArcGIS Using the Query Builder ESRI provides an easy to use
Keywords are identifiers having predefined meanings in C programming language. The list of keywords used in standard C are : unsigned void
1. Explain C tokens Tokens are basic building blocks of a C program. A token is the smallest element of a C program that is meaningful to the compiler. The C compiler recognizes the following kinds of
Setting Up Database Security with Access 97
Setting Up Database Security with Access 97 The most flexible and extensive method of securing a database is called user-level security. This form of security is similar to methods used in most network
Grade 7/8 Math Circles Sequences and Series
Faculty of Mathematics Waterloo, Ontario N2L 3G1 Centre for Education in Mathematics and Computing Grade 7/8 Math Circles Sequences and Series November 30, 2012 What are sequences? A sequence is an ordered
Information and Computer Science Department ICS 324 Database Systems Lab#11 SQL-Basic Query
Information and Computer Science Department ICS 324 Database Systems Lab#11 SQL-Basic Query Objectives The objective of this lab is to learn the query language of SQL. Outcomes After completing this Lab,
Solve addition and subtraction word problems, and add and subtract within 10, e.g., by using objects or drawings to represent the problem.
Solve addition and subtraction word problems, and add and subtract within 10, e.g., by using objects or drawings to represent the problem. Solve word problems that call for addition of three whole numbers
3 Data Properties and Validation Rules
3 Data Properties and Validation Rules 3.1 INTRODUCTION Once a database table has been created and the fields named and the type of data which is to be stored in the field chosen, you can make further
Unix the Bare Minimum
Unix the Bare Minimum Norman Matloff September 27, 2005 c 2001-2005, N.S. Matloff Contents 1 Purpose 2 2 Shells 2 3 Files and Directories 4 3.1 Creating Directories.......................................
Microsoft Access Lesson 5: Structured Query Language (SQL)
Microsoft Access Lesson 5: Structured Query Language (SQL) Structured Query Language (pronounced S.Q.L. or sequel ) is a standard computing language for retrieving information from and manipulating databases.
Click on the links below to jump directly to the relevant section
Click on the links below to jump directly to the relevant section What is algebra? Operations with algebraic terms Mathematical properties of real numbers Order of operations What is Algebra? Algebra is
Formulas & Functions in Microsoft Excel
Formulas & Functions in Microsoft Excel Theresa A Scott, MS Biostatistician III Department of Biostatistics Vanderbilt University [email protected] Table of Contents 1 Introduction 1 1.1 Using
The Answer to the 14 Most Frequently Asked Modbus Questions
Modbus Frequently Asked Questions WP-34-REV0-0609-1/7 The Answer to the 14 Most Frequently Asked Modbus Questions Exactly what is Modbus? Modbus is an open serial communications protocol widely used in
2: Formulas and Functions
2: Formulas and Functions Simple Formulas 1 Arithmetic Operators 1 Copying formulas 2 Cell References: Relative and Absolute Worksheet Functions 4 The AutoSum Tool The Paste Function and Formula Palette
AMATH 352 Lecture 3 MATLAB Tutorial Starting MATLAB Entering Variables
AMATH 352 Lecture 3 MATLAB Tutorial MATLAB (short for MATrix LABoratory) is a very useful piece of software for numerical analysis. It provides an environment for computation and the visualization. Learning
