Consider the network setup in Figure 4.22. Suppose that the ISP instead assigns the router the address 24.34.112.235 and that the network address of the home network is 192.168. 1124. a) Assign...
Consider the network shown in Problem P24. Using Dijkstra's algorithm, and showing your work using a table similar to Table 4.3, do the following: a. Compute the shortest path from t to all network...
Consider the operation of the reverse path forwarding (RPF) algotithm in Figure 4.44. Using the same topology, find a set of paths from all nodes to the source node A (and indicate these paths in a...
Consider three LANs interconnected by two routers, as shown in Figure 5JX. a. Assign IP addresses to all of the interfaces. For Subnet I use addresses of the form 192.168. I .xxx; for Subnet 2 uses...
Consider a 100 Mbps 100BASE-T Ethernet with all nodes directly connected to a hub. To have an efficiency of 0.50, what should be the maximum distance between a node and the hub? Assume a frame length...
Suppose the information portion of a packet (D in Figure SA) contains 10 bytes consisting of the 8-bit unsigned binary ASCII representation of string "Link Layer." Compute the Internet checksum for...
In this problem, we explore some of the properties of the CRC. For the generator G (=1001) given in Section 5.2.3, answer the following questions. a. Why can it detect any single bit error in data D?...
What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity? Can you have integrity without confidentiality? Justify your answer.
Assume that you will use simple parity protection in Exercises 6.24 through 6.27. Specifically, assume that you will be computing one parity block for each file in the file system. Further, assume...
Write a Python program in which the user enters either 'A', 'B', or 'C'. If 'A' is entered, the program should display the word 'Apple'; if 'B' is entered, it displays 'Banana'; and if 'C' is...
Identify all the errors in the following repetition statements. Some errors are syntactical while others are logical (e.g., infinite loops). a. for (int i = 10; i > 0; i++) { x = y; a = b; } b. int...
What are the advantages of a virtualized data center over a classic data center?
Suppose m and r are integers. Write a Java expression for mr2 to obtain a floating point result.
The following algorithm is designed to print the beginning of what is known as the Fibonacci sequence. Identify the body of the loop. Where is the initialization step for the loop control? The...
Describe agility (for software projects) in your own words.
Write a program that reads in an investment amount, the annual interest rate, and the number of years, and displays the future investment value using the following formula: futureInvestmentValue =...
Write a program that creates a Random object with seed 1000 and displays the first 50 random integers between 0 and 100 using the nextInt(100) method.
Listing 2.6, ShowCurrentTime.java, gives a program that displays the current time in GMT. Revise the program so that it prompts the user to enter the time zone offset to GMT and displays the time in...
Briefly answer the following questions: 1. Explain the intuition behind the two rules in the Bell-LaPadula model for mandatory access control. 2. Give an example of how covert channels can be used to...
1. In what way are general-purpose registers and main memory cells similar? 2. In what way do general-purpose registers and main memory cells differ?
If the message xxy yyx xxy xxyy were compressed using LZW with a starting dictionary whose first, second, and third entries were x, y, and space, respectively, what would be the entries in the final...
Declare variables to represent a person's name, age, and hourly wage.
1.Which of the following is a valid delegate definition? a.private delegate float MyDelegate(float); b.private delegate MyDelegate(x); c.private delegate MyDelegate(float x); d.private delegate void...
1.What is the parameter in this method known as? public void displayAbsoluteValue(int value = 1) a.Modified b.Optional c.Named d.Default 2.When you create an abstract method, how do you use that...
Encode the following values using the 8-bit floating-point format described in Figure 1.26.Indicate each case in which a truncation error occurs. a. - 7 b. c. - 3 d. 732 e. 3132
Which components constitute the disk service time? Which component contributes the largest percentage of the disk service time in a random I/O operation?
An application has 1,000 heavy users at a peak of 2 IOPS each and 2,000 typical users at a peak of 1 IOPS each. It is estimated that the application also experiences an overhead of 20 percent for...
Define load balancing and scaling in the context of multiprocessor architectures.
Is unit testing possible or even desirable in all circumstances? Provide examples to justify your answer.
A yield sign encloses the word YIELD within a triangle. Write a program that displays a yield sign. (Use stars to represent the sides of the triangle.) Discuss.
Is it possible to begin coding immediately after an analysis model has been created? Explain your answer and then argue the counterpoint.
Consider schedules S3, S4, and S5 below. Determine whether each schedule is strict, cascadeless, recoverable, or nonrecoverable. (Determine the strictest recoverability condition that each schedule...
Identify a situation in a multiprogramming system in which a process does not consume the entire time slice allocated to it.
Assuming there are no accidents or delays, the distance that a car travels down the interstate can be calculated with the following formula: Distance = Speed Time Create a VB application that allows...
Many financial experts advice that property owners should insure their homes or buildings for at least 80% of the amount it would cost to replace the structure. Create a VB application that lets the...
Why were the tables populated in the order shown in Review Questions 7.14-7.17? In Review Questions 7.14, write INSERT statements to add the data shown in Figure 1-30 to the DEPARTMENT table. Run...
Suppose a right triangle is placed in a plane as shown below. The right-angle point is at (0, 0), and the other two points are at (200, 0), and (0, 100). Write a program that prompts the user to...
Create an interface MessageEncoder that has a single abstract method encode(plainText), where plainText is the message to be encoded. The method will return the encoded message. Create a class...
Consider the page table for a system with 12-bit virtual and physical addresses with 256-byte pages. The list of free page frames is D, E, F (that is, D is at the head of the list E is second, and F...
Elementary physics states that when an object is subjected to a constant acceleration a, the relationship between distance d and time t is given by d = (1/2)*a*t^2. Suppose that, during a seek, the...
Hardware vendor XYZ Corp. claims that their latest computer will run 100 times faster than that of their competitor, Prunes, Inc. If the Prunes, Inc. computer can execute a program on input of size n...
Some CPUs provide for more than two modes of operation. What are two possible uses of these multiple modes? Discuss.
If each sector on a magnetic disk contains 1024 bytes, how many sectors are required to store a single page of text (perhaps 50 lines of 100 characters) if each character is represented in Unicode?
Encode the following sentences in ASCII using even parity by adding a parity bit at the high-order end of each character code: a. Does 100/5 = 20? b. The total cost is $7.25.
Encode each of the following bit patterns using dotted decimal notation. a. 000001010001001000100011 b. 1000000000100000
Give an example of a set of steps that conforms to the informal definition of an algorithm given in the opening paragraph of Section 5.1 but does not conform to the formal definition given in Figure...
What problems could arise during maintenance if a large software system were designed in such a way that all of its data elements were global?
Why does the lossy nature of standard Ethernet make it unsuitable for a layered FCoE implementation? How does Converged Enhanced Ethernet (CEE) address this problem?
Answer each of the following in terms of an operating system that you use: a. How does the operating system restrict access to only those who are approved users? b. How do you ask the operating...
What is the focus when referring to a running application?
What primary characteristics should an OID possess?
Consider the following relation: a. Given the previous extension (state), which of the following dependencies may hold in the above relation? If the dependency cannot hold, explain why by specifying...
How does iSCSI handle the process of authentication? Research the available options.
What directory structure is described by the path X/Y/Z?
Repeat Programming Project 10 of Chapter 2, but include input checking Display the change only if a valid price is entered (no less than 25 cents, no more than 100 cents, and an integer multiple of 5...
Why are normal forms alone insufficient as a condition for a good schema design?
How does the navigation model differ from the interaction model?
Consider a class that keeps track of the sales of an item. An object of this class will have the attributes Number sold Total sales Total discounts Cost per item Bulk quantity Bulk discount...
The following table represents the addresses and contents (using hexadecimal notation) of some cells in a machine's main memory. Starting with this memory arrangement, follow the sequence of...
Write an alternate SQL statement that modifies your answer to Review Question 7.7 to make the relationship between EMPLOYEE and ASSIGNMENT a 1:1 relationship. Review Question 7.7; Write a CREATE...
Apply Algorithm 16.2(a) to the relation in Exercise 15.24 to determine a key for R. Create a minimal set of dependencies G that is equivalent to F, and apply the synthesis algorithm (Algorithm 16.6)...
From the following list, extract a collection of numbers whose sum is 3165. How efficient is your approach to the problem? 26, 39, 104, 195, 403, 504, 793, 995, 1156, 1677
The table below represents a stack stored in a contiguous block of memory cells, as discussed in the text. If the base of the stack is at address 10 and the stack pointer contains the value 12, what...
Discuss some types of database utilities and tools and their functions.
Assume that in a particular augmentation of a remote-file-access protocol, each client maintains a name cache that caches translations from file names to corresponding file handles. What issues...
Decode the following bit patterns using the floating-point format discussed in the text: a. 01001010 b. 01101101 c. 00111001 d. 11011100 e. 10101011
Identify the components of the following URL and describe the meaning of each. http://lifeforms.com/animals/moviestars/kermit.html
An Oracle database uses a block size of 4 KB for its I/O operation. The application that uses this database primarily performs a sequential read operation. Suggest and explain the appropriate values...
DAS provides an economically viable alternative to other storage networking solutions. Justify this statement.
You are hired by Expressimo Delivery Service to develop an application that computes the delivery charge. The company allows two types of packaging-letter and box-and three types of service-Next Day...
What are the benefits of using multiple HBAs on a host?
Consider the following relational database for the Super Baseball League. It keeps track of teams in the league, coaches and players on the teams, work experience of the coaches, bats belonging to...
Consider a class motorboat that represents motorboats. A motorboat has attributes for The capacity of the fuel tank The amount of fuel in the tank The maximum speed of the boat The current speed...
Write a program that uses a scanner to report some statistics about words in an input sentence (see Section 7.8). The outputs should be the number of words in the sentence, the average word length,...
The following are instructions written in the machine language described in Appendix C. Translate them into English. a. 7123 b. 40E1 c. A304 d. B100 e. 2BCD
Why is SCSI performance superior to that of IDE/ATA? Explain the reasons from an architectural perspective.
Suppose a computer contained 512MB (MiB) of main memory, and an operating system needed to create a virtual memory of twice that size using pages of 2KB (KiB). How many pages would be required?
Classify each of the following instructions (in the machine language of Appendix C) in terms of whether its execution changes the contents of the memory cell at location 3B, retrieves the contents of...
If a flaw in an operating system's security allows a malicious programmer to gain unauthorized access to sensitive data, to what extent should the developer of the operating system be held...
Write a Java method getLetterGrade that is based on the grading scale of Project 7-3. This method expects the numeric grade as a parameter and returns a string representing the letter grade. The...
You have been appointed a project manager for a small software products company. Your job is to build a breakthrough product that combines virtual reality hardware with state-of-the-art software....
Draw a class diagram representing a book defined by the following statement: "A book is composed of a number of parts, which in turn are composed of a number of chapters. Chapters are composed of...
Specify the minimum type(s) of operation(s) the database must support (remote request, remote transaction, distributed transaction, or distributed request) to perform the following operations: At...
How does file-level virtualization ensure non-disruptive file mobility?
Rewrite the following program segment using a repeat structure rather than a while structure. Be sure the new version prints the same values as the original. Count 2; while (Count < 7) do (print the...
"Unreasonable" deadlines are a fact of life in the software business. How should you proceed if you're faced with one?
Rewrite Exercise 1.11 to prompt the user to enter the number of years and displays the population after that many years. Here is a sample run of the program: Enter the number of years: 5 The...
What problem arises as the lengths of the time slices in a multiprogramming system are made shorter and shorter? What about as they become longer and longer?
Write a recursive method printArray that displays all the elements in an array of integers, separated by spaces. Here is the template public class Print { // call helper function to do work public...
Suppose a small company has five employees and is planning to increase the number to six. Moreover, suppose one of the company's programs contained the following assignment statements. DailySalary =...
Write user requirements for the CPU case.
Design a test plan for the requirements created in Exercise E-7.
Modify and print the following elements with edit criteria placed in the Notes area: a. Element: SOFTWARE INVENTORY NUMBER A modulus-11 check digit must be verified when entering the number. The ADD...
Match the following terms with their definitions: Term 1. Vulnerability 2. Exploit 3. Authentication 4. Authorization 5. Demilitarized zone (DMZ) 6. Deep packet inspection 7. Router 8. Social...
a. Why should USAA collect data on which auto parts are fixed most frequently? What could it do with this data? b. Even though USAA offered to waive the deductible, the repair shops still managed to...
a. What kind of information do you think Tesco gathers? b. How do you think Tesco has motivated over 12 million customers to sign up for its Clubcard program? c. What can Tesco accomplish with the...
Creating and testing check digits. a. Create a spreadsheet that will take as input a five-digit account number and calculate a check digit using this formula: (5 x left-most digit + 4 x next digit +...
Examine issues of the Journal of Accountancy, Strategic Finance, and other business magazines for the past three years to find stories about current developments in factory automation. Write a brief...
Describe your personal bill paying process. What control plans do you have in place to meet the control goals in this chapter? Consider effectiveness, efficiency, security and information goals.
Prepare a program flowchart to help Melanie program this process. Melanie is doing a study on various weight-loss plans and needs to determine an individual's weight status by calculating his body...