Search results

Jump to: navigation, search
  • Almost all these commands must be run as root, due to unnecessarily # You can permanently destroy your system as root, requiring a re-install from CD - you have been warned.
    8 KB (1,350 words) - 22:10, 29 April 2013
  • ...en checks whether that public key has been signed by one of the '''trusted root''' certificates it knows about. ...server certificates, PGP doesn't have a centrally based set of '''trusted root''' certificate authorities. In fact, anyone can sign for anyone else in th
    24 KB (3,484 words) - 15:55, 4 June 2014
  • #* Newton’s root finding algo.
    5 KB (588 words) - 12:58, 22 October 2015
  • # Implement the Babylonian/Hero''s method to approximate the square root of 2 using 10 iterations. Plot the error in the approximation against iter
    4 KB (622 words) - 14:17, 24 September 2014
  • #* Newton’s root finding algo.
    9 KB (1,320 words) - 11:56, 27 April 2016
  • #* Newton’s root finding algo.
    9 KB (1,305 words) - 10:26, 8 January 2018
  • #* Newton’s root finding algo.
    19 KB (2,739 words) - 14:31, 22 April 2018