Question Answers
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Tutor
AI Flashcards
FREE
Search
Search
Sign In
Register
study help categories
/
Computer science
Top Selling Computer science Questions
In the TCP/IP protocol suite, what are the identical objects at the sender and the receiver sites when we think about the logical connection at the application layer?
What is the first principle we discussed in this chapter for protocol layering that needs to be followed to make the communication bidirectional?
Using Figure 7.6, tabulate the attenuation (in dB) of a 18-gauge UTP for the indicated frequencies and distances. Figure 7.6 26 gauge Gauge Diameter (inches) 0.0403 20 24 gauge 18 18 0.02320 22...
We have 14 sources, each creating 500 8-bit characters per second. Since only some of these sources are active at any moment, we use statistical TDM to combine these sources using character...
Prove that the code represented by the following codewords is not linear. You need to find only one case that violates the linearity. {(00000), (01011), (10111), (11111)}
Consider a router that interconnects three subnets: Subnet 1, Subnet 2, and Subnet 3. Suppose all of the interfaces in each of these three subnets are required to have the prefix 223.1.17/24. Also...
Consider the extended LAN connected using bridges B1 and B2 in Fig. 4-41(b). Suppose the hash tables in the two bridges are empty. List all ports on which a packet will be forwarded for the following...
Figure 4-24 shows several physical layer protocols. Which of these is closest to the Bluetooth physical layer protocol? What is the biggest difference between the two? Figure 4-24 Upper layers...
A large law firm, which has many employees, provides a single email address for each employee. Each employees email address is @lawfirm.com. However, the firm did not explicitly define the format of...
In the Internet File Server example (Figure 6-6), can the connect( ) system call on the client fail for any reason other than listen queue being full on the server? Assume that the network is...
Using the internet in Figure 1.11 (Chapter 1) in the text, show the layers of the TCP/IP protocol suite and the flow of data when two hosts, one on the west coast and the other on the east coast,...
Repeat Problem P4-3 for the NRZ-I scheme. Problem 4-3 Draw the graph of the NRZ-L scheme using each of the following data streams, assuming that the last signal level has been positive. From the...
Repeat Problem P4-3 for the differential Manchester scheme. Problem 4-3 Draw the graph of the NRZ-L scheme using each of the following data streams, assuming that the last signal level has been...
In a Standard Ethernet LAN, the average size of a frame is 1000 bytes. If a noise of 2 ms occurs on the LAN, how many frames are destroyed?
In an 802.11, give the value of the address 2 field in each of the following situations (left bit defines To DS and right bit defines From DS). a. 00 b. 01 c. 10 d. 11
Write and test a program to simulate the flow diagram of CSMA/CD in Figure 12.13. Figure 12.13 Flow diagram for the CSMA/CD Station has a frame to send K= 0 Legend T Frame average transmission time...
In an 802.11 network, there are three stations, A, B, and C. Station C is hidden from A, but can be seen (electronically) by B. Now assume that station A needs to send data to station B. Since C is...
In Figure 17.5, do we have a loop problem if we change the hub in one of the LANs to a link-layer switch? Figure 17.5 Figure 17.5 Loop problem in a learning switch a. Station A sends a frame to...
Find the class of the following classful IP addresses: a. 130.34.54.12 b. 200.34.2.1 c. 245.34.2.8
In an IPv4 datagram, the value of total-length field is (00A0)16 and the value of the header-length (HLEN) is (5) 16 . How many bytes of payload are being carried by the datagram? What is the...
An IP datagram has arrived with the following partial information in the header (in hexadecimal): 45000054 00030000 2006... a. What is the header size? b. Are there any options in the packet? c. What...
Assume that the network in Figure 20.34 (Problem P20-8) uses distance vector routing with the forwarding table as shown for each node. If node E is added to the network with a link of cost 1 to node...
To understand how the distance vector algorithm in Table 20.1 works, let us apply it to a four-node internet as shown in Figure 20.32 . Table 20.1 Assume that all nodes are initialized first. Also...
In a nonpersistent HTTP connection, how can HTTP inform the TCP protocol that the end of the message has been reached?
In Oracle, what is a database profile?
Use the fact database and patron collection created in the text for use with MongoDB. Write a query to display the only the first name, last name, and age of students that are between the ages of 22...
Display a list of all data contained in the BOOKS table.
Save the changes permanently to the database.
Delete Order# 1005. You need to address both the master order record and the related detail records.
Currently, the contents of the Category column in the BOOKS table are the actual name for each category. This structure presents a problem if one user enters COMPUTER for the Computer category and...
To perform the following activity, refer to the tables in the JustLee Books database. Using the training you have received and speculating on query needs, determine appropriate uses for indexes and...
Assign the account created in Assignment 1 the CUSTOMERREP role.
Which customers live in New Jersey? List each customers last name, first name, and state.
Which orders were placed on or before April 1, 2009? List each order number and order date. Write this query in two different ways.
Produce a list of all customers who live in the state of Florida and have ordered books about computers.
Which of the following queries contains an equality join? a. SELECT title, authorid FROM books, bookauthor WHERE books.isbn = bookauthor.isbn AND retail > 20; b. SELECT title, name FROM books CROSS...
An EMPLOYEES table was added to the JustLee Books database to track employee information. Display a list of each employees name, job title, and managers name. Use column aliases to clearly identify...
Which of the following determines how long ago orders that havent shipped were received? a. SELECT order#, shipdate-orderdate delay FROM orders; b. SELECT order#, SYSDATE - orderdate FROM orders...
A snapshot of the traffic pattern in a cell with 10 users of a wireless system is given as follows: (a) Assuming the call setup/connection and call disconnection time to be zero, what is the average...
A TDMA-based system shown in the Figure, has a total bandwidth of 12.5 MHz and contains 20 control channels with equal channel spacing of 30 kHz. Here, the area of each cell is equal to 8 km2, and...
a. What four things do physical layer standards govern? 4a.) Physical layer standards govern ________. a. Signaling b. Physical connectors c. Both A and B d. Neither A nor B 4b.) Physical layer...
Modify and test an HTML document from Exercise 2.9 that adds a secondlevel column label, Tree, and a second-level row label, Characteristics. Data from exercises 2.9 Create and test an HTML document...
Suppose you are given the observer space representation with matrix and vectors To find a transformation that diagonalizes A o use MATLAB function eigswhich calculates the eigenvalues and...
In a transposition cipher the encryption and decryption keys are often represented as two one-dimension tables (arrays) and the cipher is represented as a piece of software (a program). a. Show the...
Consider the GBN protocol with a sender window size of 4 and a sequence number range of 1,024. Suppose that at time , the next in-order packet that the receiver is expecting has a sequence number of...
To what extent are the following computer systems instances of artificial intelligence: Supermarket bar code scanners. Web search engines. Voice-activated telephone menus. Internet routing...
According to some political pundits, a person who is radical (R) is electable (E) if he/she is conservative (C), but otherwise is not electable. a. Which of the following are correct representations...
It was assumed that a given action would have the same cost when executed in any physical state within a given belief state. (This leads to a belief-state search problem with well-defined step...
This exercise explores subsetsuperset relations between belief states in sensor less or partially observable environments. a. Prove that if an action sequence is a solution for a belief state b, it...
Prove that alphabeta pruning takes time O(2 m/2 ) with optimal move ordering, where m is the maximum depth of the game tree.
Suppose a knowledge base contains just one sentence, x AsHighAs(x, Everest). Which of the following are legitimate results of applying Existential Instantiation? a. AsHighAs(Everest, Everest ). b....
For each of the following assertions, say whether it is true or false and support your answer with examples or counterexamples where appropriate. a. An agent that senses only partial information...
LetHx be a random variable denoting the handedness of an individual x, with possible values l or r. A common hypothesis is that left-or right-handedness is inherited by a simple mechanism; that is,...
In 1952, A. S. Douglas wrote his University of Cambridge Ph.D. dissertation on human-computer interaction, and created the first graphical computer gamea version of Tic-Tac-Toe. The game was...
Choose the best data type for each of the following so that any reasonable value is accommodated but no memory storage is wasted. Give an example of a typical value that would be held by the...
Suppose that a class named Bicycle contains a private nonstatic integer named height, a public nonstatic String named model, and a public static integer named wheels. Which of the following are legal...
Which of the following is typically used in a flowchart to indicate a decision? a. Square b. Rectangle c. Oval d. Diamond
Which of the following statements correctly outputs the names of voters who live in district 6 and all voters who live in district 7? a. if(district == 6 || 7) System.out.println("Name is " + name);...
You can use the ____________ statement to terminate a switch statement. a. switch b. break c. case d. end
In the game Rock Paper Scissors, two players simultaneously choose one of three options: rock, paper, or scissors. If both players choose the same option, then the result is a tie. However, if they...
A String variable name is a ____________. a. Literal b. Value c. Constant d. Reference
Suppose that you declare two String objects as: String word1 = new String("happy"); String word2; When you ask a user to enter a value for word2, if the user types happy, the value of word1 == word2...
Suppose that a String is declared as: String aStr = new String("lima bean"); The value of aStr.equals("Lima Bean") is ____________. a. True b. False c. Illegal d. Unknown
Suppose that you create two String objects: String name1 = new String("Jordan"); String name2 = new String("Jore"); The expression name1.compareTo(name2) has a value of ____________. a. True b. False...
If String movie = new String("Finding Dory");, the value of movie. indexOf('i') is ____________. a. True b. False c. 1 d. 2
Joining Strings with a plus sign is called ____________. a. Chaining b. Concatenation c. Parsing d. Linking
For an alternative to the String class, and so that you can change a Strings contents, you can use ____________. a. char b. StringHolder c. StringBuilder d. StringMerger
Unlike when you create a String, when you create a StringBuilder, you must use the keyword ____________. a. buffer b. new c. null d. class
Name at least three classes to which each of these objects might belong: a. myGrandmothersBrooch b. eggsBenedict c. cookieMonster
Create an abstract Division class with fields for a companys division name and account number, and an abstract display() method. Use a constructor in the superclass that requires values for both...
In object-oriented programming terminology, an unexpected or error condition is a(n)____________. a. Anomaly b. Exception c. Deviation d. Aberration
A try block includes all of the following elements except ____________. A. The keyword try B. The keyword catch C. Curly braces D. Statements that might cause exceptions
The Double.parseDouble() method requires a String argument, but it fails if the String cannot be converted to a floating-point number. Write an application in which you try accepting a double input...
You created an application named QuartsToGallonsInteractive that accepts a number of quarts from a user and converts the value to gallons. Now, add exception-handling capabilities to this program and...
a. Write an application that allows a user to enter a filename and an integer representing a file position. Assume that the file is in the same folder as your executing program. Access the requested...
In each case, determine the problem and fix the program. After you correct the errors, save each file using the same filename preceded with Fix. For example, DebugThirteen1.java will become...
Figure 13-31 is an SSD for the use case Check out books in the university library system. Do the following: a. Develop a first-cut sequence diagram that only includes the actor and problem domain...
In addition to the sequence structure, which of the following control structures is used in flowchart A in Figure 5-46? a. Selection b. Repetition c. Both a and b. -0- 0-0-E-C-E-H
The items in a list box belong to which collection? a. Items b. List c. ListItems d. Values
Which of the following is a valid header for a procedure that receives a copy of the value stored in a String variable? a. Private Sub DisplayName(ByCopy strName As String) b. Private Sub DisplayName...
Write SQL queries to answer the following questions: a. How many students are enrolled in Section 2714 in the first semester of 2008? b. Which faculty members have qualified to teach a course since...
Express the following base 10 numbers in 12-bit fixed-point sign/ magnitude format with six integer bits and six fraction bits. Express your answer in hexadecimal. (a) 30.5 (b) 16.25 (c) 8.078125
A majority gate produces a TRUE output if and only if more than half of its inputs are TRUE. Complete a truth table for the three-input majority gate shown in Figure 1.41. 8-MAJ-Y Figure 1.41...
Simplify each of the following Boolean equations. Sketch a reasonably simple combinational circuit implementing the simplified equation (a) (b) (c) Y = BC+BC+ BT Y = A+B+AB +A+B
Write a Python class that extends the Progression class so that each value in the progression is the absolute value of the difference between the previous two values. You should include a constructor...
What is the worst-case asymptotic running time for performing n deletions from a SortedTableMap instance that initially contains 2n entries?
Write a program that prompts the user to enter two strings and tests whether the second string is a substring of the first string. Suppose the neighboring characters in the string are distinct....
Most modern computing in organizations is based on clientserver models. Explain why this tends to be the case. Give an example of clientserver computing that you are familiar with and explain the...
Modify Listing 28.10, ConnectedCircles.java, to enable the user to remove a circle when the mouse is clicked inside the circle. Listing 1 import javafx.application. Application; 2 import...
In this exercise, you modify the Cerruti Company application from this chapters Apply lesson. Use Windows to make a copy of the Cerruti Solution folder. Rename the copy Modified Cerruti Solution....
In this exercise, you modify the Check Digit application from this chapters Apply lesson. Use Windows to make a copy of the Check Digit Solution folder. Rename the copy Check Digit Solution-Hyphens....
Open the Computer Solution.sln file contained in the VB2017\Chap08\Computer Solution folder. The interface allows the user to enter the number of either new or refurbished computers sold. Open the...
Explain the problems in your example in question 4.23.
Write and run the SQL statements necessary to create the tables and their referential integrity constraints. For the database solutions for the Review Questions about the Art-Course-Database, see the...
Describe how to perform the operation findAllElements(k), as defined in the previous exercise, in an ordered set of key-value pairs implemented with a binary search tree T, and show that it runs in...
Suppose you are working for a large dog adoption organization and are asked to build a website showing all the dogs that your organization currently knows of that are waiting to be placed in loving...
Consider a method, remove(e), which removes e from whichever list it belongs to, in a list-based implementation of a union-find structure. Describe how to modify the list-based implementation so that...
Let S be an array of n elements on which a total order relation is defined. An inversion in S is a pair of indices i and j such that i S[j]. Describe an algorithm running in O(n log n) time for...
Suppose we represent a graph G having n vertices with an adjacency matrix. Why, in this case, would inserting an undirected edge in G run in O(1) time while inserting a new vertex would take O(n 2 )...
Define SUBGRAPH-ISOMORPHISM as the problem that takes a graph, G, and another graph, H, and determines if H is isomorphic to a subgraph of G. That is, the problem is to determine whether there is a...
Showing 1400 - 1500
of 5000
First
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Last