Create a file that contains a line of your favorite song lyric. Use a text editor such as Notepad, and save the file. Copy the file contents, and paste them into a word-processing program such as...
Perform the following operations. Include your answers in hexadecimal. A6 16 OR 31 16 ; F7A 16 AND D80 16 ; 36 16 2A 16
In this exercise, you will complete the Sales application that you created in Exercise 8 in Chapter 2. a. Use Windows to copy the Sales Solution folder from the VB2017\Chap02 folder to the...
Perform the following arithmetic operations in binary using 6 bits. Assume all numbers are signed decimal. Use twos complement arithmetic. Indicate if there is any overflow. a. 14 +8 b. 07 +(-7)...
In this exercise, you learn how to use the Items collections Insert, Remove, and RemoveAt methods. Open the Items Collection Solution.sln file contained in the VB2017\Chap05\Items Collection Solution...
Design a combinational circuit for a BCD to seven-segment code converter that will input a BCD number and output it on a seven segment commonanode display. The code converter will only display the...
Implement a digital circuit to increment (for Cin = 1) or decrement (for Cin = 0) a 4-bit signed number by 1 generating outputs in twos complement form. Note that Cin is the input carry to the full...
Design a 4-bit arithmetic unit as follows: Assume that A and B are 4-bit numbers. S 0 1 F A plus B A plus 1
Design an arithmetic logic unit to perform the following functions: Use multiplexers, binary adders, and gates as needed. Assume that A and B are 4-bit numbers. Draw a logic circuit. S 0 0 1 1 So 0 1...
Use SQL to define the following view: StudentID StudentName Letersky 38214 Altvater 54907 54907 Altvater Aiken 66324
Consider the following normalized relations for a sports league: TEAM(TeamID, TeamName, TeamLocation) PLAYER(PlayerID, PlayerFirstName, PlayerLastName, PlayerDateOfBirth, PlayerSpecialtyCode)...
Consider the following two relations for Millennium College: STUDENT(StudentID, StudentName, CampusAddress, GPA) REGISTRATION(StudentID, CourseID, Grade) Following is a typical query against these...
The Is Married To relationship in Figure 2-12a would seem that is, until time plays a role in modeling data. Draw a data model for the PERSON entity type and the Is Married To relationship for each...
Write an HDL module for the circuit in Exercise 3.32. Data from problem 3.32 Repeat Exercise 3.31 for the FSM shown in Figure 3.73. Recall that the s and r register inputs indicate set and reset,...
Open the VB2017\Chap12\FixIt Solution\FixIt Solution.sln file. Start the application. Click the Grade radio button, type the letter a in the Grade box, and then click the Display button. The...
Another definition for the finite difference is the backward difference: ( 1 [x(nT s )]=T s approximates the derivative of x(t)). (a) Indicate how this new definition connects with the finite...
Write a program that prompts the user to enter the minutes (e.g., 1 billion), and displays the number of years and days for the minutes. For simplicity, assume a year has 365 days. Here is a sample...
Write a program that prompts the user to enter three cities and displays them in ascending order. Here is a sample run: Enter the first city: Chicago JEnter Enter the second city: Los Angeles JEnter...
Write a method that finds the number of occurrences of a specified character in a string using the following header: public static int count(String str, char a) For example, count("Welcome", 'e')...
Write a program that reads in ten numbers and displays the number of distinct numbers and the distinct numbers separated by exactly one space (i.e., if a number appears multiple times, it is...
Suppose you save $100 each month into a savings account with the annual interest rate 5%. So, the monthly interest rate is 0.05 / 12 = 0.00417. After the first month, the value in the account becomes...
The Eight Queens problem is to find a solution to place a queen in each row on a chessboard such that no two queens can attack each other. Write a program to solve the Eight Queens problem using...
Write a recursive method that displays a string reversely on the console using the following header: public static void reverseDisplay(String value) For example, reverseDisplay("abcd") displays dcba....
Write a program that obtains the execution time of selection sort, bubble sort, merge sort, quick sort, heap sort, and radix sort for input size 50,000, 100,000, 150,000, 200,000, 250,000, and...
Let Ax b be a system of m difference constraints in n unknowns. Show that the Bellman-Ford algorithm, when run on the corresponding constraint graph, maximizes n 1=1 x i subject to Ax b and x i 0...
What is the best way to multiply a chain of matrices with dimensions that are 105, 52, 220, 2012, 124, and 460? Show your work.
Web-based system architecture is a popular approach to many organizational systems because it offers a number of advantages to the users and to the organization over other types of systems. Discuss...
When does Oracle 11g automatically create an index for a table?
In a double-entry accounting system, every business transaction has to be entered as two separate transactions, in different two accounts, once as a debit and once as a credit. For example, if a...
Suppose we are given a sequence S of n elements, on which a total order relation is defined. Describe an efficient method for determining whether there are two equal elements in S. What is the...
A limousine company must process pickup requests every day, for taking customers from their various homes to the local airport. Suppose this company receives pickup requests from n locations and...
Draw a quad-tree for the following set of points, assuming a 16 16 bounding box: {(1, 2),(4, 10),(14, 3),(6, 6),(3, 15),(2, 2),(3, 12),(9, 4),(12, 14)}.
Draw a structured flowchart or write pseudocode that describes the process of guessing a number between 1 and 100. After each guess, the player is told that the guess is too high or too low. The...
Draw a structured flowchart or write structured pseudocode describing how to buy a new shirt. Include at least two decisions and two loops.
Design the logic for a program that outputs every number from 1 through 15 along with its value times 10 and times 100.
Design the logic for a program that outputs numbers in reverse order from 10 down to 0.
Design the logic for a program that allows a user to continuously enter numbers until the user enters 0. Display the sum of the numbers entered.
Create the logic for the dice game Pig, in which a player can compete with the computer. The object of the game is to be the first to score 100 points. The user and computer take turns rolling a pair...
Which is true of text files? a. Text files contain data that can be read in a text editor. b. Text files commonly contain images and music. c. Both of the above d. None of the above
Create two parallel arrays that represent a standard deck of 52 playing cards. One array is numeric and holds the values 1 through 13 (representing Ace, 2 through 10, Jack, Queen, and King). The...
Identify three objects that might belong to each of the following classes: a. Author b. RaceHorse c. Country d. RetailPurchase
Identify three different classes that might contain each of these objects: a. myBlueDenimShirt b. presidentOfTheUnitedStates c. myPetCat d. myCousinLindsey
The general principle of exception handling in object-oriented programming is that a method that uses data should ___________. a. Be able to detect errors, but not be required to handle them b. Be...
Build a complete recursive descent parser for the calculator language. As output, have it print a trace of its matches and predictions.
Prove that the following grammar is LL(1): decl ID decl tail decl tail , decl : ID ; (The final ID is meant to be a type name.)
Write a for-each loop that calls the addInterest method on each BankAccount object in a collection called accounts. What is required for that loop to work?
Write a method called charsSorted that accepts a string as its parameter and returns true if the characters in the string appear in sorted alphabetical order. For example, the calls of...
Once upon a time in a kingdom far away, the king hoarded food and the people starved. His adviser recommended that the food stores be used to help the people, but the king refused. One day a small...
Design a skeletal program and a calling sequence that results in an activation record instance in which the static and dynamic links point to different activation-recorded instances in the run-time...
Design and implement a C++ program that defines a base class A, which has a subclass B, which itself has a subclass C. The A class must implement a method, which is overridden in both B and C. You...
Write pseudocode for the main module and Display Welcome Message module. You do not have to write pseudocode for the other three modules. Suppose that you are asked to write a program that computes...
Write a program that prompts the user to enter a string and displays the number of the uppercase letters in the string. Enter a string: Welcome to Java The number of uppercase letters is 2
Define a class named ComparableCircle that extends Circle and implements Comparable. Draw the UML diagram and implement the compareTo method to compare the circles on the basis of area. Write a test...
Write a server for a client. The client sends the weight and height for a person to the server (see Figure 33.18a). The server computes BMI (Body Mass Index) and sends back to the client a string...
Find your last grade report. Given the guidelines presented in this chapter, identify flaws in the design of this grade report. Redesign this report to correct these flaws.
Draw examples of the four basic DFD symbols.
What is the relationship between logical and physical models?
The data flow symbols shown in Figure 5-1 were designed by Ed Yourdon, who was a well-known IT author, lecturer, and consultant. Many IT professionals consider him to be among the most influential...
What are the most significant differences among structured, O-O, and agile methods? What do they have in common?
The steps that the Little Man performs are closely related to the way in which the CPU actually executes instructions. Draw a flow chart that carefully describes the steps that the Little Man follows...
Write a program that asks the user to enter todays sales for five stores. The program should display a bar chart comparing each stores sales. Create each bar in the bar chart by displaying a row of...
Suppose that two entries of an array A are equal to each other. After running the insertion-sort algorithm of Code Fragment 3.7, will they appear in the same relative order in the final sorted order...
Loris Manufacturing makes 1,000 products per month and has been increasing production at a rate of 6 percent each month. Write a program that accepts a production goal from the user. If the entered...
Assume that the current population of California is 39 million and that the population of Texas is 28 million. The population of Texas appears to be growing at a faster rate than that of California....
Suppose you have an oracle, OM(s), that correctly predicts the opponents move in any state. Using this, formulate the definition of a game as a (single-agent) search problem. Describe an algorithm...
Please indicate whether the following statements are true of false a. If the only difference between two MDPs is the value of the discount factor then they must have the same optimal policy. b. When...
You would like to train a neural network to classify digits. Your network takes as input an image and outputs probabilities for each of the 10 classes, 0-9. The networks prediction is the class that...
For the following problems, the table holds C code functions. Assume that the first function listed in the table is called first. You will be asked to translate these C code routines into MIPS...
List five Websites you can go to for information about: a. IT auditing b. IT security and privacy issues
Consider the following instruction: Instruction: and rd, rsl, rs2 Interpretation: Reg[rd] = Reg[rs1] AND Reg[rs2] 1.What are the values of control signals generated by the control in Figure 4.10 for...
What is the minimum number of cycles needed to completely execute n instructions on a CPU with a k stage pipeline? Justify your formula.
Problems in this exercise assume that the logic blocks used to implement a processors datapath have the following latencies: Register read is the time needed after the rising clock edge for the new...
Suppose you could build a CPU where the clock cycle time was different for each instruction. What would the speedup of this new CPU be over the CPU presented in Figure 4.21 given the instruction mix...
Consider the addition of a multiplier to the CPU shown in Figure 4.21. This addition will add 300 ps to the latency of the ALU, but will reduce the number of instructions by 5% (because there will no...
Suppose that the plant in Fig. P5.4-4 has the discrete state model Derive the state model for the closed-loop system, in terms of A, B, C, and D. 1 (k+ 1) = Ax(k) + Bm(k) y (k) = Cx(k) + Dm(k)
Find the inverse z-transform of each E(z) below by the four methods given in the text. Compare the values of e(z) , for k = 0, 1, 2, and 3, obtained by the four methods. (a) E(z) = 0.5z (2-1)(z-0.6)...
Find a discrete state variable model of the closed-loop system shown in Fig. P5.4-4 if the discrete state model of the plant is given by: Fig. P5.4-4 (a) x(k+1)= 0.7x(k)+0.3m (k) y (k) = 0.2x(k) +...
Let T = 0.05 s and (a) Without calculating E(z), find its poles. (b) Give the rule that you used in part (a). (c) Verify the results of part (a) by calculating E(z). (d) Compare the zero of E(z)...
The state diagram in Figure P2.51 describes a system with states A, B, and C. The system is initialized in State A. The state transition notation x/yz indicates that an input x causes a transition in...
Consider the system described in Problem 2.10-2. (a) Find the transfer function of this system. (b) Let u(k) = 1, k 0 (a unit step function) and x(0) = 0 . Use the transfer function of part (a) to...
Many computer manufacturers now include tools or simulators that allow you to measure the instruction set usage of a user program. Among the methods in use are machine simulation, hardware-supported...
When processor designers consider a possible improvement to the processor datapath, the decision usually depends on the cost/performance trade-off . In the following three problems, assume that we...
In this exercise we look at memory locality properties of matrix computation. The following code is written in C, where elements within the same row are stored contiguously. Assume each word is a...
If G is a simple undirected graph with 12 vertices and 3 connected components, what is the largest number of edges it might have?
What are the types of addresses (identifiers) used in each of the following layers? a. Application layer b. Network layer c. Data-link layer
In the TCP/IP protocol suite, what are the identical objects at the sender and the receiver sites when we think about the logical connection at the application layer?
What is the first principle we discussed in this chapter for protocol layering that needs to be followed to make the communication bidirectional?
Using Figure 7.6, tabulate the attenuation (in dB) of a 18-gauge UTP for the indicated frequencies and distances. Figure 7.6 26 gauge Gauge Diameter (inches) 0.0403 20 24 gauge 18 18 0.02320 22...
We have 14 sources, each creating 500 8-bit characters per second. Since only some of these sources are active at any moment, we use statistical TDM to combine these sources using character...
Prove that the code represented by the following codewords is not linear. You need to find only one case that violates the linearity. {(00000), (01011), (10111), (11111)}
Consider a router that interconnects three subnets: Subnet 1, Subnet 2, and Subnet 3. Suppose all of the interfaces in each of these three subnets are required to have the prefix 223.1.17/24. Also...
A large law firm, which has many employees, provides a single email address for each employee. Each employees email address is @lawfirm.com. However, the firm did not explicitly define the format of...
Using the internet in Figure 1.11 (Chapter 1) in the text, show the layers of the TCP/IP protocol suite and the flow of data when two hosts, one on the west coast and the other on the east coast,...
Repeat Problem P4-3 for the NRZ-I scheme. Problem 4-3 Draw the graph of the NRZ-L scheme using each of the following data streams, assuming that the last signal level has been positive. From the...
Repeat Problem P4-3 for the differential Manchester scheme. Problem 4-3 Draw the graph of the NRZ-L scheme using each of the following data streams, assuming that the last signal level has been...
In a Standard Ethernet LAN, the average size of a frame is 1000 bytes. If a noise of 2 ms occurs on the LAN, how many frames are destroyed?
In an 802.11, give the value of the address 2 field in each of the following situations (left bit defines To DS and right bit defines From DS). a. 00 b. 01 c. 10 d. 11
Write and test a program to simulate the flow diagram of CSMA/CD in Figure 12.13. Figure 12.13 Flow diagram for the CSMA/CD Station has a frame to send K= 0 Legend T Frame average transmission time...
In an 802.11 network, there are three stations, A, B, and C. Station C is hidden from A, but can be seen (electronically) by B. Now assume that station A needs to send data to station B. Since C is...
In Figure 17.5, do we have a loop problem if we change the hub in one of the LANs to a link-layer switch? Figure 17.5 Figure 17.5 Loop problem in a learning switch a. Station A sends a frame to...