What is the most commonly used type of database?
a. You created an interactive RentalDemo class that obtains all the data for four rentals from Sammys Seashore Rentals, including details about the contract number, length of the rental, and...
Cranston Berries sells three types of berries: strawberries, blueberries, and raspberries. Sales have been booming this year and are expected to increase next year. The sales manager wants you to...
Design and implement a recursive program to determine whether a string is a valid Blurb as defined in the previous project description.
Repeat P11.2 when the topology is to be used is in the form of a hexagonal topology similar to cell phones and has about 10% more overlap in the sensing area between two adjacent sensors.
a. Search the Java Web site for information on how to use a JTextArea. Write an application for the WebBuy Company that allows a user to compose the three parts of a complete e-mail message: the To:,...
Assume that tables T1 and T2 have a 1:1 relationship. Assume that T2 has the foreign key. Show the SQL statements necessary to move the foreign key to T1. Make up your own names for primary and...
Write an HDL module for the FSM from Exercise 3.30. Data from problem 3.30 Design an FSM with one input, A, and two outputs, X and Y. X should be 1 if A has been 1 for at least three cycles...
In this exercise, you create a Triangle class and a program that uses the Triangle class to instantiate a Triangle object. a. If necessary, create a new project named Intermediate17 Project and save...
Figure 15.23 shows the frame format of the baseband layer in Bluetooth (802.15). Based on this format, answer the following questions: Figure 15.23 a. What is the range of the address domain in a...
There are 16 different truth tables for Boolean functions of two variables. List each truth table. Give each one a short descriptive name (such as OR, NAND, and so on).
The parentheses at the start of a(n) ______ statement can include code that initializes a counter and changes its value with each iteration. a. While b. Do c. Do/while d. For
You created an interactive RentalDemo class that obtains all the data for four rentals from Sammys Seashore Rentals, including details about the contract number, length of the rental, and equipment...
Consider the calculation of roots of an equation z N = where N 1 is an integer and = ||e j a nonzero complex numb (a) First verify that there are exactly N roots for this equation and that they...
In this exercise, you code an application that displays a grade based on the number of points entered by the user. Open the VB2015\Chap09\Kranton Solution\Kranton Solution (Kranton Solution.sln)...
Rewrite Exercise 17.10 with a GUI, as shown in Figure 17.21a. Suppose you want to back up a huge file (e.g., a 10-GB AVI file) to a CD-R. You can achieve it by splitting the file into smaller pieces...
Write a program that animates the bubble sort algorithm. Create an array that consists of 20 distinct numbers from 1 to 20 in a random order. The array elements are displayed in a histogram, as shown...
Write a function that decreases red by 50% on the left side of the picture, and increases it by 200% on the right side.
The standard DECISION-TREE-LEARNING algorithm described in the chapter does not handle cases in which some examples have missing attribute values. a. First, we need to find a way to classify such...
Why is a database considered to be self-describing?
(a) Consider the periodic signals x 1 (t) = 4cos(t) and x 2 (t) = sin(3t +/2). Find the periods T 1 of x 1 (t) and T 2 of x 2 (t) and determine if x(t) = x 1 (t) + x 2 (t) is periodic. If so, what is...
The following code gives the error message shown below. Fix the code. >>> a = 3 >>> b = 4 >>> c = d * a The error was:d Name not found globally. A local or global name could not be found. You need to...
Explain how the query in your answer to Review Question 8.5 differs from the query in your answer to Review Question 8.7.
Travis is standing in front of two containers: one marked Trash and the other marked Recycle. In his right hand, he is holding a bag that contains either trash or recyclables. Travis needs to lift...
In computer games and also in simulations of card-playing scenarios, we sometimes need to use a computer to simulate the way that person would shuffle a deck of cards. Given two decks of n cards...
Write a program that animates quadratic probing, as shown in Figure 27.5. You can change the initial size of the hash-table in program. Assume the load-factor threshold is 0.75. Firefox...
Which of the following represents a row in a table? a. An attribute b. A characteristic c. A field d. A record
What are the six security levels? Provide examples of threat categories, attacker profiles, and types of attacks.
True or False: Strategic planning sets the long-term direction to be taken by the organization and each of its component parts. It should also guide organizational efforts and focus resources toward...
Which of the following applications are classified as VBR-NRT in ATM? a. HTTP b. SNMP c. SMTP d. VoIP
Why is strategic planning important for IT professionals?
Describe a method for finding the middle node of a doubly linked list with header and trailer sentinels by link hopping, and without relying on explicit knowledge of the size of the list. In the case...
Consider the system described by (a) Find the transfer function Y(z)/U(z). (b) Using any similarity transformation, find a different state model for this system. (c) Find the transfer function of the...
Assume six devices are arranged in a mesh topology. How many cables are needed? How many ports are needed for each device?
A large elevated tank (Tank 1) is being used to supply water at 60F to two tanks at a lower elevation (Tanks 2 and 3) as shown in Figure P4.28. All pipes are 5-nom sch 40 commercial steel. The...
What types of business rules might determine the relationship between a table of Volunteers and a table of Activities at a nonprofit?
What is the CIA triangle?
How do you decide if a car should be repaired or replaced? Develop an assessment framework to aid this decision process. Is the framework also applicable to software systems?
The following is part of a TCP header dump (contents) in hexadecimal format. E293 0017 00000001 00000000 5002 07FF a. What is the source port number? b. What is the destination port number? c. What...
Name at least three attributes that might be appropriate for each of the following classes: a. RealEstateListing b. Vacation c. CreditCardBill
Write a query to display the patron ID, book number, and days kept for each checkout. Days Kept is the difference from the date on which the book is returned to the date it was checked out. Sort the...
a. Sammys Seashore Supplies rents beach equipment such as kayaks, canoes, beach chairs, and umbrellas to tourists. You created a Rental class for the company. Now, make the following change to the...
Your downloadable files for Chapter 1 include DEBUG01-01.txt, DEBUG01-02.txt, and DEBUG01-03.txt. Each file starts with some comments (lines that begin with two slashes) that describe the program....
Balloon Emporium sells both latex and Mylar balloons. The store owner wants a program that allows him to enter the price of a latex balloon, the price of a Mylar balloon, the number of latex balloons...
Answer the following questions about the digital hierarchy in Figure 6.23: a. What is the overhead (number of extra bits) in the DS-1 service? b. What is the overhead (number of extra bits) in the...
This question is based on successful execution of the following statement: CREATE VIEW changeaddress AS SELECT customer#, lastname, firstname, order#, shipstreet, shipcity, shipstate, shipzip FROM...
This question is based on successful execution of the following command: CREATE VIEW changename AS SELECT customer#, lastname, firstname FROM customers WITH CHECK OPTION; Assume that the only...
The formal description of a DFA M is [{q 1 , q 2 , q 3 , q 4 , q 5 }, {u, d}, , q 3 , {q 3 }], where is given by the following table. Give the state diagram of this machine. u d 91 92 q2 93 92 q4 93...
Using the same arrays from the previous problem, trace the complete execution of the merge sort algorithm when called on each array. Show the subarrays that are created by the algorithm and show the...
Create the ERD. Use the database shown in Figure P3.24 to answer this Problem. ROBCOR is an aircraft charter company that supplies on-demand charter flight services using a fleet of four aircraft....
Assume that for a given program 70% of the executed instructions are arithmetic, 10% are load/store, and 20% are branch. 1. Given this instruction mix and the assumption that an arithmetic...
What are the differences between program, system, operations, and user documentation?
For each of the following pairs of related entities, indicate whether (under typical circumstances) there is a one-to many or a many-to-many relationship. Then, using the shorthand notation...
An action such as Go(Sibiu) really consists of a long sequence of finer-grained actions: turn on the car, release the brake, accelerate forward, etc. Having composite actions of this kind reduces the...
Suppose we are given two n-element sorted sequences A and B that should not be viewed as sets (that is, A and B may contain duplicate entries). Describe an O(n)-time method for computing a sequence...
Define a new class named BSTWithNumberOfLeaves that extends BST with the following methods: /** Return the number of leaf nodes */ public int getNumberOfLeaves() Use...
Delete the user account created in Assignment 1.
The management of Colonial Adventure Tours wants you to complete the following exercises. You do not use the Colonial Adventure Tours database for any of these exercises. 1. The DBA asks for your...
Suppose that instead of superimposing a tree of degree u, we were to superimpose a tree of degree u 1/k , where k > 1 is a constant. What would be the height of such a tree, and how long would each...
Extend your solution to Exercise 2.21 to build an explicit parse tree. Data From Exercise 2.21: Build a complete recursive descent parser for the calculator language. As output, have it print a trace...
a. ToLower("N") b. Length_Of(ToLower(Name)), where Name is a String variable and Name = "Nancy Newley" Give the value returned by the built-in function.
Explain precisely how to modify the AND-OR-GRAPH-SEARCH algorithm to generate a cyclic plan if no acyclic plan exists. You will need to deal with three issues: labeling the plan steps so that a...
Come up with a sequence of addresses for which a direct mapped cache with a size (capacity) of 16 words and block size of 4 words outperforms a fully associative cache with least recently used (LRU)...
Which of the following data units is decapsulated from a user datagram? a. A datagram b. A segment c. A message
An 802.11G AP employs OFDMA. What is its role in enhancing the performance?
a. What leased line do you need if you have a capacity requirement for 2 Gbps? b. For 500 Mbps? c. For the situation in Figure 3-9, what leased line would the link require? d. Repeat for Figure 3-12....
What is Oracle Database Express Edition 11g Release 2?
a. Write a JavaFX application that contains a Button. Disable the Button after the user clicks it. Save the project as FXFrameDisableButton2a. b. Modify the FXFrameDisableButton program so that the...
Draw an example of a graph with 10 vertices and 15 edges that has a vertex cover of size 2.
Your downloadable files for Chapter 3 include a file named DEBUG03-04.jpg that contains a flowchart with syntax and/or logical errors. Examine the flowchart and then find and correct all the bugs.
For these problems, the table holds some C code. You will be asked to evaluate these C code statements in MIPS assembly code. How many MIPS instructions does it take to implement the C code? If the...
Write a single C statement that corresponds to the two MIPS assembly instructions below. add f, g, h add f, i, f
We have defined the parameter a as the number of frames that can fit the medium between two stations, or a = (T p )/(T fr ). Another way to define this parameter is a = L b /F b , in which L b is the...
Assume the HTTP client in the previous problem closes the connection and, at the same time, acknowledges the bytes received in the response from the server. After receiving the FIN segment from the...
In SCTP, the following is a dump of a DATA chunk in hexadecimal format. 00000015 00000005 0003000A 00000000 48656C6C 6F000000 a. Is this an ordered or unordered chunk? b. Is this the first, the last,...
In ADSL service, there is a single UTP pair running from the end office switch to the individual household. In cable in the neighborhood is shared by many subscribers. Yet, typically, cable modem...
Suppose, for a data approximation application, you are given a set of n points in the plane and you would like to partition these points into two sets, A and B, such that each point in A is as close...
Design and implement an application that reads a sentence from the user and prints the sentence with the characters of each word backward. Use a stack to reverse the characters of each word.
Assume that the network in Figure 20.34 (previous problem) uses distancevector routing with the forwarding table as shown for each node. If each node periodically announces their vectors to the...
An HTTP client opens a TCP connection using an initial sequence number (ISN) of 14,534 and the ephemeral port number of 59,100. The server opens the connection with an ISN of 21,732. Show the three...
Which of the following SQL statements is not valid? a. SELECT b.isbn, p.name FROM books b NATURAL JOIN publisher p; b. SELECT isbn, name FROM books b, publisher p WHERE b.pubid = p.pubid; c. SELECT...
Which of the following SQL statements is not valid? a. SELECT isbn FROM books MINUS SELECT isbn FROM orderitems; b. SELECT isbn, name FROM books, publisher WHERE books.pubid (+) = publisher.pubid(+);...
Use the following SELECT statement to answer. 1 SELECT customer#, COUNT(*) 2 FROM customers JOIN orders USING (customer#) 3 WHERE orderdate > '02-APR-09' 4 GROUP BY customer# 5 HAVING COUNT(*) > 2;...
The transmission power is 40 W, under a free-space propagation model, (a) What is the transmission power in unit of dBm? (b) The receiver is in a distance of 1000 m; what is the received power,...
Why is the study of database technology important?
Create an application containing an array that stores eight integers. The application should call five methods that in turn (1) Display all the integers, (2) Display all the integers in reverse...
Consider memory storage of a 32-bit word stored at memory word 42 in a byte-addressable memory.(a) What is the byte address of memory word 42?(b) What are the byte addresses that memory word 42...
For the following code: lbu $t0, 0($t1) sw $t0, 0($t2) Assume that the register $t1 contains the address 0x10000000 and the data at address is 0x11223344. 1. What value is stored in 0x10000004 on a...
Implement the following C code in MIPS assembly. What is the total number of MIPS instructions needed to execute the function int fib(int n){ if (n==0) return 0; else if (n 1) == return 1; else...
Using your code from Exercise 2.43 as an example, explain what happens when two processors begin to execute this critical section at the same time, assuming that each processor executes exactly one...
In Figure 9.5, show the process of frame change in routers R1 and R2. Figure 9.5 Figure 7.5 UTP connector 12345678 2343678 RJ-45 Female RJ-45 Male