All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer sciences
operating system
Questions and Answers of
Operating System
Draw an inheritance hierarchy for students at a university similar to the hierarchy shown in Fig. 9.2. Use Student as the superclass of the hierarchy, then extend Student with classes Undergraduate
1.Which ADO.NET object is a forward only cursor and is connected to the database while the cursor is open? a.DBDataReader b.DataSet c.DataTable d.DataAdapter 2.Which ADO.NET Command object's
Suppose you want to interchange the values stored in memory cells 2 and3. What is wrong with the following sequence of steps: Step 1. Move the contents of cell number 2 to cell number 3. Step 2. Move
Write an application that displays a box, an oval, an arrow and a diamond using asterisks (*), as follows:
Create a base class called Vehicle that has the manufacturer's name (type String), number of cylinders in the engine (type int), and owner (type Person given in Listing 8.1Truck that is derived from
A yield sign encloses the word YIELD within a triangle. Write a program that displays a yield sign. (Use stars to represent the sides of the triangle.)
Identify the syntactically incorrect statements in the following: 1. Loop intX = intX + 1 Do While intX < 100 2. Do lstOutput.Items.Add("Hello") intX = intX + 1 While intCount < 10 3. Loop Until intX
If the message xxy yyx xxy xxyy were compressed using LZW with a starting dictionary whose first, second, and third entries were x, y, and space, respectively, what would be the entries in the final
Declare variables to represent a person's name, age, and hourly wage.
Using 32-bit Internet addresses was originally thought to provide ample room for expansion, but that conjecture is not proving to be accurate. IPv6 uses 128-bit addressing. Will that prove to be
Using the class Pet from Listing 6.1, write a program to read data for five pets and display the following data: name of smallest pet, name of largest pet, name of oldest pet, name of youngest pet,
Modify Listing 2.10, ComputeChange.java, to display the nonzero denominations only, using singular words for single units such as 1 dollar and 1 penny, and plural words for more than one unit such as
A network router has a failure rate of 0.02 percent per 1,000 hours. What is the MTBF of that component?
Newton's method for computing the square root of a number consists of approximating the actual square root by means of a set of transformations. Each transformation starts with a guess at the square
When Christopher Alexander says "good design cannot be achieved simply by adding together performing parts," what do you think he means?
1. What is an advantage of a linked list over an array? A. Linked lists take up less space per element B. Linked lists can grow dynamically to hold individual new elements without copying existing
Create a subclass of BinaryTree whose nodes have fields for storing preorder, post-order, and in-order numbers. Write recursive methods preOrderNumber(), inOrderNumber(), and postOrderNumbers() that
Write a Python function named zeroCheck that is given three integers, and returns true if any of the integers is 0, otherwise it returns false.
What are some variations of the two-phase locking protocol? Why is strict or rigorous two-phase locking often preferred?
Describe how the insert, delete, and update commands should be implemented on a bitemporal relation.
Write an instruction sequence to copy 4 bytes starting from $1000 to $1100, $1103.
Develop and test a Python program that determines how many images can be stored on a given size USB (flash) drive. The size of the USB drive is to be entered by the user in gigabytes (GB). The number
A simplified view of thread states is Ready, Running, and Blocked, where a thread is either ready and waiting to be scheduled, is running on the processor, or is blocked (i.e. is waiting for I/O.)
Solve each of the following problems by translating the values into two's complement notation (using patterns of 5 bits), converting any subtraction problem to an equivalent addition problem, and
Encode the following values using the 8-bit floating-point format described in Figure 1.26.Indicate each case in which a truncation error occurs. a. - 7 ½ b. ½ c. - 3 ¾ d. 7⁄32 e. 31⁄32
The table below represents a stack stored in a contiguous block of memory cells, as discussed in the text. If the base of the stack is at address 10 and the stack pointer contains the value 12, what
Which components constitute the disk service time? Which component contributes the largest percentage of the disk service time in a random I/O operation?
An application has 1,000 heavy users at a peak of 2 IOPS each and 2,000 typical users at a peak of 1 IOPS each. It is estimated that the application also experiences an overhead of 20 percent for
What four main types of actions involve databases? Briefly discuss each.
Which type of application benefits the most by bypassing write cache? Justify your answer.
Phillip Morgan, the owner of Morgan Importing, makes periodic buying trips to various countries. During the trips, he keeps notes about the items he purchases and basic data about their shipments. He
Consider the EER diagram in Figure for a car dealerMap the EER schema into a set of relations. For the VEHICLE to CARITRUCK/SUV generalization consider the four options presented in Section and show
A database is stored on ten 9-GB RAID 1 LUNs. A cascade three-site remote replication solution involving a synchronous and disk-buffered solution has been chosen for disaster recovery. All the LUNs
Is software engineering applicable when WebApps are built? If so, how might it be modified to accommodate the unique characteristics of WebApps?
a. If we were to purchase a flip-flop circuit from an electronic component store, we may find that it has an additional input called flip. When this input changes from a 0 to 1, the output flips
Write a Java code segment that creates a blank image and converts its pixels to green. Your code should use an enhanced for loop.
Consider an ONLINE_AUCTION database system in which members (buyers and sellers) participate in the sale of items. The data requirements for this system are summarized as follows:■ The online site
Write a class named Octagon that extends GeometricObject and implements the Comparable and Cloneable interfaces. Assume that all eight sides of the octagon are of equal size. The area can be computed
Write a multithreaded program that implements the banker's algorithm discussed in Section 7.5.3. Create n threads that request and release resources from the bank. The banker will grant the request
Choose a database application with which you are familiar. Design a schemaand show a sample database for that application, using the notation of Figures 1.2 and 2.1. What types of additional
What is the stripe size of a five-disk RAID 5 set with a strip size of 32 KB? Compare it with the stripe size of a five-disk RAID 0 array with the same strip size.
Select a subject with which you are familiar and design a pseudocode for giving directions in that subject. In particular, describe the primitives you would use and the syntax you would use to
What is the value of the program counter in the machine described in Appendix C immediately after executing the instruction B0CD?
Write a Java program that simulates car racing, as shown in Figure 16.22(a). The car moves from left to right. When it hits the right end, it restarts from the left and continues the same process.
Define load balancing and scaling in the context of multiprocessor architectures.
Design a class named StopWatch. The class contains: ■ The private data fields startTime and endTime with get methods. ■ A constructor that initializes startTime with the current time. ■ A
Is unit testing possible or even desirable in all circumstances? Provide examples to justify your answer.
1. Which of the following identifies a specific element within an array?a. Element specifierb. Determinatorc. Locatord. Subscript2. Which of the following is the lower subscript of an array?a. 1b. {
One of the bit patterns 01011 and 11011 represents a value stored in excess 16 notation and the other represents the same value stored in two's complement notation. a. What can be determined about
Write an application that displays a box, an oval, an arrow and a diamond using asterisks (*), as follows: Discuss.
A yield sign encloses the word YIELD within a triangle. Write a program that displays a yield sign. (Use stars to represent the sides of the triangle.) Discuss.
Are a PSPEC and a use case the same thing? If not, explain the differences.
Software for System X has 24 individual functional requirements and 14 nonfunctional requirements. What is the specificity of the requirements? The completeness?
You are designing the access control policies for a Web-based retail store. Customers access the store via the Web, browse product information, input their address and payment information, and
Consider a workflow system supporting software developers. The system enables managers to model the process the developers should follow in terms of activities and work products. The manager can
Read [Nog00] and write a two- or three-page paper that discusses the impact of "chaos" on software engineering.
Is it possible to begin coding immediately after an analysis model has been created? Explain your answer and then argue the counterpoint.
Why should some software metrics be kept "private"? Provide examples of three metrics that should be private. Provide examples of three metrics that should be public.
It could be argued that a WebApp functional model should be delayed until design. Present pros and cons for this argument.
Explain what the following terms mean in object-oriented database terminology: method, signature, message, collection, extent.
Consider the CD cover in Figure 5-61. A. Specify identifiers and attributes for the entities CD, ARTIST, ROLE, and SONG. B. Construct a crow's foot model showing relationships among these four
Consider schedules S3, S4, and S5 below. Determine whether each schedule is strict, cascadeless, recoverable, or nonrecoverable. (Determine the strictest recoverability condition that each schedule
Research RAID 6 and its second parity computation.
Create an interface MessageEncoder that has a single abstract method encode(plainText), where plainText is the message to be encoded. The method will return the encoded message. Create a class
Compare the circular-wait scheme with the various deadlock-avoidance schemes (like the banker's algorithm) with respect to the following issues: a. Runtime overheads b. System throughput
Consider the page table for a system with 12-bit virtual and physical addresses with 256-byte pages. The list of free page frames is D, E, F (that is, D is at the head of the list E is second, and F
Elementary physics states that when an object is subjected to a constant acceleration a, the relationship between distance d and time t is given by d = (1/2)*a*t^2. Suppose that, during a seek, the
Decode the following bit patterns using the floating-point format described in Figure 1.26: a. 01011001 b. 11001000 c. 10101100 d. 00111001
The three bit patterns 10000010, 01101000, and 00000010 are representations of the same value in two's complement, excess, and the 8-bit floating-point format presented in Figure 1.26, but not
Identify a situation in a multiprogramming system in which a process does not consume the entire time slice allocated to it.
A software company sells three packages, Package A, Package B, and Package C, which retail for $99, $199, and $299, respectively. Quantity discounts are given according to the following
Assuming there are no accidents or delays, the distance that a car travels down the interstate can be calculated with the following formula: Distance = Speed × Time Create a VB application that
Many financial experts advice that property owners should insure their homes or buildings for at least 80% of the amount it would cost to replace the structure. Create a VB application that lets the
A storage array dials a support center automatically whenever an error is detected. The vendor's representative at the support center can log on to the service processor of the storage array through
Why were the tables populated in the order shown in Review Questions 7.14-7.17? In Review Questions 7.14, write INSERT statements to add the data shown in Figure 1-30 to the DEPARTMENT table. Run
Suppose a right triangle is placed in a plane as shown below. The right-angle point is at (0, 0), and the other two points are at (200, 0), and (0, 100). Write a program that prompts the user to
Hardware vendor XYZ Corp. claims that their latest computer will run 100 times faster than that of their competitor, Prunes, Inc. If the Prunes, Inc. computer can execute a program on input of size n
Some CPUs provide for more than two modes of operation. What are two possible uses of these multiple modes? Discuss.
If each sector on a magnetic disk contains 1024 bytes, how many sectors are required to store a single page of text (perhaps 50 lines of 100 characters) if each character is represented in Unicode?
Encode the following sentences in ASCII using even parity by adding a parity bit at the high-order end of each character code: a. Does 100/5 = 20? b. The total cost is $7.25.
Encode each of the following bit patterns using dotted decimal notation.a. 000001010001001000100011b. 1000000000100000
Give an example of a set of steps that conforms to the informal definition of an algorithm given in the opening paragraph of Section 5.1 but does not conform to the formal definition given in Figure
Design an algorithm that, given two strings of characters, tests whether the first string appears as a substring somewhere in the second.
Consider the following MAILORDER relational schema describing the data for a mail order company. PARTS(Pno, Pname, Qoh, Price, Olevel) CUSTOMERS(Cno, Cname, Street, Zip, Phone) EMPLOYEES(Eno, Ename,
What problems could arise during maintenance if a large software system were designed in such a way that all of its data elements were global?
Define two classes, Patient and Billing, whose objects are records for a Clinic. Derive Patient from the class Person given in Listing 8.1. A Patient record has the patient's name (defined in the
A retail store has a preferred customer plan where customers may earn discounts on all their purchases. The amount of a customer's discount is determined by the amount of the customer's cumulative
Assume the following declarations are made and indicate which items below are valid subscripted variables. int a[] = new int[10]; char b[] = new char[6]; int x = 7, y = 2; double z = 0.0; a. a[0] b.
Why does the lossy nature of standard Ethernet make it unsuitable for a layered FCoE implementation? How does Converged Enhanced Ethernet (CEE) address this problem?
When is unified storage a suitable option for a data center? Justify your answer by comparing the unified storage offering with traditional storage solutions.
Answer each of the following in terms of an operating system that you use: a. How does the operating system restrict access to only those who are approved users? b. How do you ask the operating
Consider the following GRADEBOOK relational schema describing the data for a grade book of a particular instructor. CATALOG(Cno, Ctitle) STUDENTS(Sid, Fname, Lname, Minit) COURSES(Term, Sec_no, Cno,
Develop a complete test strategy for the SafeHome system discussed earlier in this book. Document it in a Test Specification.
Develop a complete use case for one of the following activities: a. Making a withdrawal at an ATM b. Using your charge card for a meal at a restaurant c. Buying a stock using an on-line brokerage
Suggest a design pattern that you encounter in a category of everyday things (e.g., consumer electronics, automobiles, appliances). Briefly describe the pattern.
What is the focus when referring to a running application?
How are the concepts of coupling and software portability related? Provide examples to support your discussion.
What primary characteristics should an OID possess?
Consider the following relation:a. Given the previous extension (state), which of the following dependencies may hold in the above relation? If the dependency cannot hold, explain why by specifying
You are designing a caching subsystem that temporarily stores data retrieved over the network (e.g., web pages) into a faster access storage (e.g., the hard disk). Due to a change in requirements,
Showing 700 - 800
of 1171
1
2
3
4
5
6
7
8
9
10
11
12