In a network that has a maximum TPDU size of 128 bytes, a maximum TPDU lifetime of 30 sec, and an 8-bit sequence number, what is the maximum data rate per connection?
A CPU executes instructions at the rate of 1000 MIPS. Data can be copied 64 bits at a time, with each word copied costing 10 instructions. If a coming packet has to be copied four times, can this...
According to the information given in Fig. 7-3, is little-sister.cs.vu.nl on a class A, B, or C network?
DNS uses UDP instead of TCP. If a DNS packet is lost, there is no automatic recovery. Does this cause a problem, and if so, how is it solved?
Can a machine with a single DNS name have multiple IP addresses? How could this occur?
Can a computer have two DNS names that fall in different top-level domains? If so, give a plausible example. If not, explain why not.
The number of companies with a Web site has grown explosively in recent years. As a result, thousands of companies are registered in the com domain, causing a heavy load on the top-level server for...
Some e-mail systems support a header field Content Return:. It specifies whether the body of a message is to be returned in the event of non-delivery. Does this field belong to the envelope or to the...
Electronic mail systems need directories so people's e-mail addresses can be looked up. To build such directories, names should be broken up into standard components (e.g., first name, last name) to...
A binary file is 3072 bytes long. How long will it be if encoded using base64 encoding, with a CR+LF pair inserted after every 80 bytes sent and at the end?
Using the RSA public key cryptosystem, with a = 1, b = 2, etc., a. If p = 7 and q = 11, list five legal values for d. b. If p = 13, q = 31, and d = 7, find e. c. Using p = 5, q = 11, and d = 27, find...
The SSL data transport protocol involves two nonces as well as a pre-master key. What value, if any, does using the nonces have?
Get the total number of projects supplied by supplier S1.
Show that a graph has a unique minimum spanning tree if, for every cut of the graph, there is a unique light edge crossing the cut. Show that the converse is not true by giving a counterexample.
What is a recoverable schedule? Why is recoverability of schedules desirable? Are there any circumstances under which it would be desirable to allow nonrecoverable schedules? Explain your answer.
Explain the notions of transparency and autonomy. Why are these notions desirable from a human-factors stand point?
Consider a relation that is fragmented horizontally by plant-number: Employee (name, address, salary plant-number) assumes that each fragment has two replicas: one stored at the New York site and one...
Repeat Exercise 18.1 for the case of learning to play tennis (or some other sport with which you are familiar) is this supervised learning or reinforcement learning?
Some experts believe that the growth in e-commerce will cause states and local governments to lose tax revenue, unless Internet transactions are subject to sales tax. What is one argument that...
Should the IT director report to the company president, or somewhere else? Does it matter?
Research newspaper, business magazine articles, or the Web to find IT companies whose stock is traded publicly. Choose a company and pretend to buy $5,000 of its stock. Why did you choose that...
Visit at least three Web sites to learn more about agile system development and spiral models. Prepare a list of the sites you visited and a summary of the results.
What is information technology and why is it important? Suggest three fictitious headlines that might be added to Figure 1-1 on page2. Can Google Avoid Global Censorship? Web Sales Surge as Gas...
You are the IT manager at Hi-Voltage Components, a medium-sized firm that makes specialized circuit boards. Hi-Voltages largest customer, Green Industries, recently installed a computerized...
Identify and briefly describe five common fact-finding methods.
Would you continue to work for a company if you disagreed with the firms mission statement? Why or why not?
What is a task? What is an event? What is a milestone?
What specific information do you need to create a work breakdown structure?
Explain the differences between a Gantt chart and a PERT/CPM chart.
What formula can a project manager use to estimate task duration? Provide an example.
Why is it important to deliver effective project reports and communications?
What is the Hawthorne Effect? Have you ever experienced it? When and where?
1. In business process modeling notation, a gateway is like a fork in the road, allowing the flow to go one way or another. You can learn more about gateways in the Visible Analyst Glossary feature....
Define an object, and provide three examples.
Define a method, and provide three examples.
Define encapsulation, and explain how it is used in object-oriented analysis.
Define polymorphism, and provide three examples.
Provide suggestions for reducing input volume.
What is the most important Information Technology (IT) security issues facing companies today? Have these changed in the last five years, and will they continue to change? How should companies...
Why is practice so important when preparing a presentation? Provide a specific example from your own experience.
How do you know if a project is economically feasible? Why is TCO important?
Find the customer balance summary for all customers who have not made purchases during the current invoicing period. The results are shown inFigure. Total Balances Minimum Balanace Maximum Balance...
In general, what are the strategies for exploiting spatial locality and temporal locality?
What is the kernel of an OS?
List and briefly explain five storage management responsibilities of a typical OS.
What is swapping and what is its purpose?
For the seven-state process model of Figure, draw a queuing diagram similar to that of Figure 3.8b. New 6 Suspend K Activate Dispatch ReleaseExit Ready/ suspen Ready unning Suspend Time-out Activate...
What is the distinction between competing processes and cooperating processes?
What operations can be performed on a semaphore?
Show that message passing and semaphores have equivalent functionality by a. Implementing message passing using semaphores. b. Implementing a semaphore using message passing.
Suggest an additional resource constraint that will prevent the deadlock in Problem 6.7 but still permit the boundary between input and output buffers to vary in accordance with the present needs of...
In a fixed-partitioning scheme, what are the advantages of using unequal-size partitions?
A 1-Mbyte block of memory is allocated using the buddy system. a. Show the results of the following sequence in a figure similar to Figure 7.6: Request 70; Request 35; Request 80; Return A; Request...
What is the difference between simple paging and virtual memory paging?
Why is the principle of locality crucial to the use of virtual memory?
In discussing a page replacement algorithm, one author makes an analogy with a snowplow moving around a circular track. Snow is falling uniformly on the track and a lone snowplow continually circles...
Consider a system with a total of 150 units of memory, allocated to three processes as shown: Apply the banker's algorithm to determine whether it would be safe to grant each of the following...
Consider a simple segmentation system that has the following segment table: Starting Address .. Length (bytes) 660 . . 248 1,752 . .. 422 222 . . 198 996 . .. 604 For each of the following logical...
Consider a memory in which contiguous segments S1, S2, , Sn are placed in their order of creation from one end of the store to the other, as suggested by the following figure: When segment Sn+1 is...
Briefly describe the three types of processor scheduling.
Briefly define feedback scheduling.
Define residence time Tr as the average total time a process spends waiting and being served. Show that for FIFO, with mean service time Ts, we have Tr = Ts/(1 p), where p is utilization. 3 1, 1 onu...
In a queuing system, new jobs must wait for a while before being served. While a job waits, its priority increases linearly with time from zero at a rate . A job waits until its priority reaches the...
What is the difference between hard and soft real-time tasks?
What is the difference between periodic and aperiodic real-time tasks?
List and briefly define five general areas of requirements for a real-time operating system.
What is the difference between logical I/O and device I/O?
What is the difference between block-oriented devices and stream-oriented devices? Give a few examples of each.
Briefly define the disk scheduling policies illustrated in Figure. 5 125 Time (a) FIFO 9 125 199 Time (b) SSTF 9 Time (c) SCAN 9 Time (d) C-SCAN
Briefly define the seven RAID levels.
It should be clear that disk striping can improve the data transfer rate when the strip size is small compared to the I/O request size. It should also be clear that RAID 0 provides improved...
Define: B = block size R = record size P = size of block pointer F = blocking factor; expected number of records within a block Give a formula for F for the three blocking methods depicted in Figure....
Consider a hierarchical file system in which free disk space is kept in a free space list. a. Suppose the pointer to free space is lost. Can the system reconstruct the free space list? b. Suggest a...
Consider user accounts on a system with a Web server configured to provide access to user Web areas. In general, this scheme uses a standard directory name, such as public_html, in a users home...
There are six different sequences for the three approval tasks in Figure 2-8.Name each and select what your team considers to be the most promising three.
Search the Web for the term computer crime and any related terms. Identify what you and your teammates think are the five most serious recent examples. Consider no crime that occurred more than 6...
Create the TopLevelCust view described in Review Question 2. Display the data in the view. Review Question 2 Using data from the Premiere Products database, define a view named TopLevelCust. It...
Create the following indexes. If it is necessary to name the index in your DBMS, use the indicated name. a. Create an index named PartIndex1 on the PartNum field in the OrderLine table. b. Create an...
1. Design a database to produce the following reports. Do not use any surrogate keys in your design. a. For each marina, list the marina number, name, address, city, state, and zip code. b. For each...
When users update and retrieve data, what tasks does a DBMS perform that are hidden from the users?
How does a catalog differ from a data dictionary?
Discuss the effect of the following changes on the design for the Marvel College requirements: a. More than one instructor might teach a given section of a course, and each instructor must be listed...
Create an example of an entity with a composite unique attribute.
Create an example of an entity with candidate keys (multiple unique attributes).
Create an example of an entity with a multivalued attribute.
Explain the following parts of the data warehouse definition: Structured repository Integrated Subject-oriented Enterprise-wide Historical Time-variant Developed for the retrieval of...
Explain the iterative nature of the warehouse requirements collection, definition, and visualization process.
Explain, in your own words, the relationship between business processes and information systems. Assume you are going to give your explanation to a business professional who knows little about...
Suppose you work for Amazon or a company that takes innovation as seriously as Amazon does. What do you suppose is the likely reaction to an employee who says to his or her boss, But I dont know how...
Create a screen capture of an SAP screen. Underneath the image, provide an answer to each of the following questions: a. In which of the activities does this screen occur? b. What is the name of this...
Write a program that stores names and dates of birth in a database. Extend the program so that it stores the format of the data in the database; in other words, create a system catalog. Provide an...
What is the difference between Data as a service (DaaS) and Database as a service (DBaaS)?
Describe what relationship types represent in an ER model and provide examples of unary, binary, ternary, and quaternary relationships.
Discuss the difference between pessimistic and optimistic concurrency control?
(a) Explain what is meant by the constrained write rule, and explain how to test whether a schedule is serializable under the constrained write rule. Using the above method, determine whether the...
(a) Discuss how you would test for view serializability using a labeled precedence graph. (b) Using the above method, determine whether the following schedules are view serializable:
Write an algorithm for shared and exclusive locking. How does granularity affect this algorithm?
Write an algorithm that checks whether the concurrently executing transactions are in deadlock.
Explain the concepts of serial, non serial and serializable schedules. State the rules for equivalence of schedules.
Draw an Entity-Relationship (ER) diagram to represent this system.