Suppose you are interested in detecting the number of hosts behind a NAT. You observe that the IP layer stamps an identification number sequentially on each IP packet. The identification number of...
Consider the block cipher in Figure 8.5. For a given "key" Alice and Bob would need to keep eight tables, each 8 bits by 8 bits. For Alice (or Bob) to store all eight tables, how many bits of storage...
You are investigating the possible benefits of a way-predicting level 1 cache. Assume that the 32 KB two-way set-associative single-banked level 1 data cache is currently the cycle time limiter. As...
If you were about to create an index on a relation, what considerations would guide your choice? Discuss: 1. The choice of primary index. 2. Clustered versus unclustered indexes. 3. Hash versus tree...
Write a program that receives an ASCII code (an integer between 0 and 127) and displays its character. For example, if the user enters 97, the program displays the character a. Here is a sample run:...
Write a program that displays all the prime numbers less than 120 in decreasing order. Use the StackOfIntegers class to store the prime numbers (e.g., 2, 3, 5,... ) and retrieve and display them in...
Consider the following BCNF relations, which describe departments in a company and employees: Dept(did, dname, location, managerid) Emp(eid, sal) You are told that the following queries are extremely...
Suppose you want to interchange the values stored in memory cells 2 and3. What is wrong with the following sequence of steps: Step 1. Move the contents of cell number 2 to cell number 3. Step 2. Move...
1. Which the following statements about the base keyword is false? a.A constructor can use at most one base statement. b.A constructor cannot use both a base statement and a this statement. c.The...
1.To parse a string that might contain a currency value such as $1,234.56, you should pass the Parse or TryParse method which of the following values? a.NumberStyles.AllowCurrencySymbol...
Using 32-bit Internet addresses was originally thought to provide ample room for expansion, but that conjecture is not proving to be accurate. IPv6 uses 128-bit addressing. Will that prove to be...
1.You are a developer at company xyx. You have been asked to improve the responsiveness of your WPF application. Which solution best fits the requirements? a.Use the BackgroundWorker class. b.Use the...
1.Which of the following methods is the best way to store an integer value typed by the user in a variable? a.ToString b.Convert c.ParseInt d.TryParse 2.The statement object obj = 72 is an example of...
1.Which ADO.NET object is a forward only cursor and is connected to the database while the cursor is open? a.DBDataReader b.DataSet c.DataTable d.DataAdapter 2.Which ADO.NET Command object's property...
Select a subject with which you are familiar and design a pseudocode for giving directions in that subject. In particular, describe the primitives you would use and the syntax you would use to...
Create a base class called Vehicle that has the manufacturer's name (type String), number of cylinders in the engine (type int), and owner (type Person given in Listing 8.1Truck that is derived from...
Design a class named StopWatch. The class contains: The private data fields startTime and endTime with get methods. A constructor that initializes startTime with the current time. A method named...
Phillip Morgan, the owner of Morgan Importing, makes periodic buying trips to various countries. During the trips, he keeps notes about the items he purchases and basic data about their shipments. He...
Consider the EER diagram in Figure for a car dealer Map the EER schema into a set of relations. For the VEHICLE to CARITRUCK/SUV generalization consider the four options presented in Section and show...
Write an application that displays a box, an oval, an arrow and a diamond using asterisks (*), as follows: Discuss.
1. Which of the following identifies a specific element within an array? a. Element specifier b. Determinator c. Locator d. Subscript 2. Which of the following is the lower subscript of an array? a....
Compare the circular-wait scheme with the various deadlock-avoidance schemes (like the banker's algorithm) with respect to the following issues: a. Runtime overheads b. System throughput
Decode the following bit patterns using the floating-point format described in Figure 1.26: a. 01011001 b. 11001000 c. 10101100 d. 00111001
The three bit patterns 10000010, 01101000, and 00000010 are representations of the same value in two's complement, excess, and the 8-bit floating-point format presented in Figure 1.26, but not...
Design an algorithm that, given two strings of characters, tests whether the first string appears as a substring somewhere in the second.
Assume the following declarations are made and indicate which items below are valid subscripted variables. int a[] = new int[10]; char b[] = new char[6]; int x = 7, y = 2; double z = 0.0; a. a[0] b....
When is unified storage a suitable option for a data center? Justify your answer by comparing the unified storage offering with traditional storage solutions.
Develop a complete test strategy for the SafeHome system discussed earlier in this book. Document it in a Test Specification.
How are the concepts of coupling and software portability related? Provide examples to support your discussion.
You are designing a caching subsystem that temporarily stores data retrieved over the network (e.g., web pages) into a faster access storage (e.g., the hard disk). Due to a change in requirements,...
Explain the difference between functional dependencies that arise from equations and those that do not.
The MTBF concept for software is open to criticism. Explain why?
Rewrite Fig. 7.2 so that the size of the array is specified by the first command-line argument. If no command-line argument is supplied, use 10 as the default size of the array.
Consider a class PersonAddress that represents an entry in an address book. Its attributes are The first name of the person The last name of the person The e-mail address of the person The...
Consider a program that will keep track of the items in a school's library. Draw a class hierarchy, including a base class, for the different kinds of items. Be sure to also consider items that...
Consider the following decompositions for the relation schema R of Exercise 15.24. Determine whether each decomposition has (1) the dependency preservation property, and (2) the lossless join...
An application specifies a requirement of 200 GB to host a database and other files. It also specifies that the storage environment should support 5,000 IOPS during its peak workloads. The disks...
Design an EER schema for a database application that you are interested in. Specify all constraints that should hold on the database. Make sure that the schema has at least five entity types, four...
Suppose a digital camera has a storage capacity of 256MB. How many photographs could be stored in the camera if each consisted of 1024 pixels per row and 1024 pixels per column if each pixel required...
A bag of cookies holds 40 cookies. The calorie information on the bag claims that there are 10 servings in the bag and that a serving equals 300 calories. Create a VB application that lets the user...
What is "good enough" software? Name a specific company and specific products that you believe were developed using the good enough philosophy.
Draw an inheritance hierarchy for students at a university similar to the hierarchy shown in Fig. 9.2. Use Student as the superclass of the hierarchy then extend Student with classes Undergraduate...
Consider the following relational database that Best Airlines uses to keep track of its mechanics, their skills, and their airport locations. Mechanic number, airport name, and skill number are all...
Which type of application benefits the most by bypassing write cache? Justify your answer. Discuss.
Describe the six clauses in the syntax of an SQL retrieval query. Show what type of constructs can be specified in each of the six clauses. Which of the six clauses are required and which are...
Write a program that allows students to schedule appointments at either 1, 2,3,4,5, or 6, o'clock pm. Use an array of six strings to store the names for the time slots. Write a loop that iterates as...
Design a class named QuadraticEquation for a quadratic equation ax2 + bx + x = 0. The class contains: The private data fields a, b, and c that represent three coefficients. A constructor for the...
The following pseudocode algorithm has an error. The program is supposed to ask the user for the length and width of a rectangular room, and then display the room's area. The program must multiply...
What are the sources of big data for text analytics?
Each computer may have more than one operating system, and each operating system may be installed on more than one computer. Add an associative entity called COMPUTER OPERATING SYSTEM between...
Your nursery sells various types and sizes of trees, bedding plants, vegetable plants, and shrubs. It also sells fertilizer and potting soil. Design a coding scheme for your nursery.
Figure 12-18 depicts the activities performed in the revenue cycle by the Newton Hardware Company. a. Identify at least 7 weaknesses in Newton Hardware's revenue cycle. Explain the resulting threat...
What people, organization, and technology factors should be addressed when deciding whether to allow employees to use their personal smartphones for work?
What are the core problem-solving steps for developing new information systems? 1. List and describe the problem-solving steps for building a new system. 2. Define information requirements and...
Alan Turing is considered one of computer science's founding fathers. Describe two of his contributions to the discipline, and explain the importance of those contributions?
Create a text file named string.js and enter the Capitalize function into that file. Then, modify your strdemo.html page so that it loads this library file. When the button in the page is clicked, in...
. A bus is a link between devices connected to the computer. It can be parallel or serial, internal (local) or external. True or False? 2. Second generation of computers are identified by vacuum...
Define database management system (DBMS). Give an example of a DBMS for PCs and one for mainframe computers.
1. What are some business applications of Google Maps' Street View? 2. How has Google Maps' Street View created privacy and other legal issues? 3. What is Google Books, and how has it created...
1. By 2020 how many smartphones will be available globally? 2. Who are the two companies that generate the biggest revenue from mobile ads? 3. What does PlaceIQ do for businesses? 4. For what purpose...
1. What processes did the Lotus platform automate and streamline? 2. What are some benefits of the new Web interface? 3. Which of the development methods discussed in this chapter would be most...
What is one major difference between virtual and augmented reality?
An algorithm takes 0.5 ms for input size 100. How large a problem can be solved in 1 min if the running time is the following (assume low-order terms are negligible): a. linear b. O(N logN) c....
The Josephus problem is the following game: N people, numbered 1 to N, are sitting in a circle. Starting at person 1, a hot potato is passed. After M passes, the person holding the hot potato is...
In the quadratic probing hash table, suppose that instead of inserting a new item into the location suggested by findPos, we insert it into the first inactive cell on the search path (thus, it is...
Repeat Exercise 7.20 when the pivot is chosen as a. The first element b. The larger of the first two distinct elements c. A random element d. The average of all elements in the set In exercise Using...
The clique problem can be stated as follows: Given an undirected graph G = (V, E) and an integer K, does G contain a complete subgraph of at least K vertices? The vertex cover problem can be stated...
The longest common subsequence problem is as follows: Given two sequences A = a1, a2, . . . , aM, and B = b1, b2, . . . , bN, find the length, k, of the longest sequence C = c1, c2, . . . , ck such...
Identify the functions of a transaction processing system.
Identify the steps in the systems development process and state the goal of each.
What are the components of any information system?
What is the difference between e-commerce and m-commerce?
What role does an information system play in today's organizations?
What is quality? What is total quality management (TQM)?
What advantages do fuel cells offer over batteries for use in portable electronic devices? Do they have any disadvantages?
How can application software improve the effectiveness of a large enterprise? What are some of the benefits associated with implementation of an enterprise resource planning system? What are some of...
If you were the database administrator for the iTunes store, how might you use predictive analysis to determine which artists and movies will sell most next year?
What functions do decision support systems support in business organizations? How does a DSS differ from a TPS and an MIS?
As the head buyer for a major supermarket chain, you are constantly being asked by manufacturers and distributors to stock their new products. Over 50 new items are introduced each week. Many times,...
Procter & Gamble (P&G) owns a large portfolio of familiar brands such as Pampers, Tide, Bounty, Folgers, Pringles, Charmin, and Crest. P&G operates in more than 80 countries worldwide, with net sales...
Imagine that you have trained your St. Bernard, Bernie, to carry a box of three 8mm tapes instead of a flask of brandy. (When your disk fills up, you consider that an emergency.) These tapes each...
An alternative to a LAN is simply a big timesharing system with terminals for all users. Give two advantages of a client-server system using a LAN.
A collection of five routers is to be connected in a point-to-point subnet. Between each pair of routers, the designers may put a high-speed line, a medium-speed line, a low-speed line, or no line....
List two advantages and two disadvantages of having international standards for network protocol?
If a binary signal is sent over a 3-kHz channel whose signal-to-noise ratio is 20 dB, what is the maximum achievable data rate?
A laser beam 1 mm wide is aimed at a detector 1 mm wide 100 m away on the roof of a building. How much of an angular diversion (in degrees) does the laser have to have before it misses the detector?
Ten signals, each requiring 4000 Hz, are multiplexed on to a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel? Assume that the guard bands are 400 Hz wide.
Three packet-switching networks each contain n nodes. The first network has a star topology with a central switch, the second is a (bidirectional) ring, and the third is fully interconnected, with a...
Suppose that x bits of user data are to be transmitted over a k-hop path in a packet-switched network as a series of packets, each containing p data bits and h header bits, with x >> p + h. The bit...
In a typical mobile phone system with hexagonal cells, it is forbidden to reuse a frequency band in an adjacent cell. If 840 frequencies are available, how many can be used in a given cell?
Sometimes when a mobile user crosses the boundary from one cell to another, the current call is abruptly terminated, even though all transmitters and receivers are functioning perfectly. Why?
Suppose that A, B, and C are simultaneously transmitting 0 bits, using a CDMA system with the chip sequences of Fig. 2-45(b). What is the resulting chip sequence?
The following character encoding is used in a data link protocol: A: 01000111; B: 11100011; FLAG: 01111110; ESC: 11100000 Show the bit sequence transmitted (in binary) for the four-character frame: A...
The following data fragment occurs in the middle of a data stream for which the byte-stuffing algorithm described in the text is used: A B ESC C ESC FLAG D. What is the output after stuffing?
A bit string, 0111101111101111110, needs to be transmitted at the data link layer. What is the string actually transmitted after bit stuffing?
Sixteen-bit messages are transmitted using a Hamming code. How many check bits are needed to ensure that the receiver can detect and correct single bit errors? Show the bit pattern transmitted for...
A 12-bit Hamming code whose hexadecimal value is 0xE4F arrives at a receiver. What was the original value in hexadecimal? Assume that not more than 1 bit is in error.
What is the remainder obtained by dividing x7 + x5 + 1 by the generator polynomial x3 + 1?
A group of N stations share a 56-kbps pure ALOHA channels. Each station outputs a 1000-bit frame on an average of once every 100 sec, even if the previous one has not yet been sent (e.g., the...
How long does a station, s, have to wait in the worst case before it can start transmitting its frame over a LAN that uses (a) The basic bit-map protocol? (b) Mok and Ward's protocol with permuting...