Question Answers
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Tutor
AI Flashcards
FREE
Search
Search
Sign In
Register
study help categories
/
Computer science
Top Selling Computer science Questions
Argue that for the distance-vector- algorithm in Figure 5.6, each value in the distance vector D(x) is non-increasing and will eventually stabilize in a finite number of steps. Figure 5.6 Node x...
It is mentioned in Section 4.6.6 that the efficiency of a 1-slot frame with repetition encoding is about 13% at basic data rate. What will the efficiency be if a 5-slot frame with repetition encoding...
An entry in the switching table of a virtual-circuit network is normally created during the setup phase and deleted during the teardown phase. In other words, the entries in this type of network...
Assume two 802.11 wireless networks are connected to the rest of the Internet via a router as shown in Figure 15.25. The router has received an IP datagram with the destination IP address 24.12.7.1...
Why does the network-layer protocol need to provide packetizing service to the transport layer? Why cant the transport layer send out the segments without encapsulating them in datagrams?
Distinguish between the process of routing a packet from the source to the destination and the process of forwarding a packet at each router.
Assume that A, B, C, D, and E in Figure 20.36 are autonomous systems (ASs). Find the path vector for each AS using the algorithm in Table 20.3. Assume that the best path in this case is the path...
Show the unabbreviated colon hex notation for the following IPv6 addresses: a. An address with 64 0s followed by 32 two-bit (01)s. b. An address with 64 0s followed by 32 two-bit (10)s. c. An address...
Using the CIDR notation, show the IPv6 address compatible to the IPv4 address 129.6.12.34.
We can define the bandwidth-delay product in a network as the number of packets that can be in the pipe during the round-trip time (RTT). What is the bandwidth-delay product in each of the following...
UDP is a message-oriented protocol. TCP is a byte-oriented protocol. If an application needs to protect the boundaries of its message, which protocol should be used, UDP or TCP?
In SCTP, a packet is carrying two DATA chunks, each containing 22 bytes of user data. What is the size of each DATA chunk? What is the total size of the packet?
In SCTP, the value of the cumulative TSN in a SACK is 23. The value of the previous cumulative TSN in the SACK was 29. What is the problem?
Write a method in Java to accept a string representing an IP address in the form x.y.z.t and change it to an unsigned integer.
Most of the operating systems installed on personal computers come with several client processes, but normally no server processes. Explain the reason.
Add a new row in the ORDERS table with the following data: Order# = 1021, Customer# = 1009, and Order date = July 20, 2009.
How can a sequence be used in a database?
What is the purpose of a role in Oracle 12c?
For the following exercises, you will address problems and answer questions from management at TAL Distributors. You do not use the TAL Distributors database for any of these exercises. 1. While...
What is the maximum number of characters allowed in a table alias? a. 10 b. 30 c. 255 d. 256
Which of the following functions can produce different results, depending on the value of a specified column? a. NVL b. DECODE c. UPPER d. SUBSTR
Produce a list of all customer names in which the first letter of the first and last names is in uppercase and the rest are in lowercase.
Determine the total profit generated by sales to customer 1017.
Determine how many orders have been placed by each customer. Do not include in the results any customer who hasnt recently placed an order with JustLee Books.
Whats the difference between a single-row subquery and a multiple-row subquery?
Which of the following queries identifies other customers who were referred to JustLee Books by the same person who referred Jorge Perez? a. SELECT customer# FROM customers WHERE referred = (SELECT...
Determine which customers placed orders for the least expensive book (in terms of regular retail price) carried by JustLee Books.
What does FIND-MAXIMUM-SUBARRAY return when all elements of A are negative?
Why do you need wireless services when adequate wired infrastructure exists in most parts of the United States?
Find and correct the error in each of the following code segments: a) const int ArraySize = 5; ArraySize = 10; b) Assume var b = new int[10]; for (var i = 0; i
a. If I wish to connect two switches with fiber at a speed of 30 Gbps, what options do I have? b. Which would you choose? Justify your answer. 12b.) I can connect two switches that are 200 m apart at...
Protocols and standards are an important feature of networks. Why is this so?
Show the steps of the CPU fetchexecute cycle for the remaining instructions in the Little Man instruction set.
Consider a more realistic alternative: Suppose a small program is permanently stored in the last few mailbox locations. A BRANCH instruction at location 00, also permanent, will start this program....
An analog averager is given by (a) Let x(t) = u(t) u(t 1) find the average signal y(t) using the above integral. Let T = 1. Carefully plot y(t). Verify your result by graphically computing the...
Given the message ACCBCAAB*, in which the probabilities of symbols are P(A) = 0.4, P(B) = 0.3, P(C) = 0.2, and P(*) = 0.1, a. find the compressed data using arithmetic coding with a precision of 10...
Assume that an average SNMP response message is 100 bytes long. Assume that a manager sends 4,000 SNMP Get commands each second. a. What percentage of a 1 Gbps LAN links capacity would the resulting...
A compare-exchange operation on two array elements A[i] and A[j], where i < j, has the form COMPARE-EXCHANGE (A, i, j) 1 If A[i] > A[j] 2 exchange A[i] with A[j] After the compare-exchange operation,...
Determine the impulse response h[n]of the feedback system shown in Figure 10.18. Determine if the system is BIBO stable. Figure 10.18: e[n] r[n]- Delay y[n]
Write an SQL statement to display the SKU, SKU_Description, WarehouseID, WarehouseCity, and WarehouseState of all items not stored in the Atlanta, Bangor, or Chicago warehouse. Do not use the NOT IN...
Explain the three different sets of terms used to describe tables, columns, and rows.
A periodic signal x[n] of fundamental period N can be represented by its Fourier series If you consider this a representation of x[n] (a) Is x 1 [n] = x[n N 0 ] for any value of N 0 periodic? If so...
If you have a network of leased lines, you have options for how many sites you connect. Sites can communicate directly or through intermediate sites. a. In a full mesh, every pair of sites will be...
The missionaries and cannibals problem is usually stated as follows. Three missionaries and three cannibals are on one side of a river, along with a boat that can hold one or two people. Find a way...
Give a complete problem formulation for each of the following. Choose a formulation that is precise enough to be implemented. a. Using only four colors, you have to color a planar map in such a way...
Your goal is to navigate a robot out of a maze. The robot starts in the center of the maze facing north. You can turn the robot to face north, east, south, or west. You can direct the robot to move...
Consider a version of the vacuum robot that has the policy of going straight for as long as it can; only when it encounters an obstacle does it change to a new (randomly selected) heading. To model...
Which of the following are correct? a. False True. b. True False. c. (A B) (A B). d. A B A B. e. A B A B. f. (A B) C (A C) (B C). g. (C (A B)) ((A C) (B C)). h. (A B) (C D ...
Arithmetic assertions can be written in first-order logic with the predicate symbol
Sammys Seashore Supplies rents beach equipment such as kayaks, canoes, beach chairs, and umbrellas to tourists. Write a program that displays Sammys motto, which is Sammys makes it fun in the sun....
What is the value of each of the following Boolean expressions? a. 15 < 13 b. 8 < = (2 + 6) c. 15 == 15 d. 3 >= 3 e. 4 * 2 == 2 * 4 f. 5 < 8 3 g. 7 != 7 h. 8 != (2 + 5) i. 10 20 == 10 j. 3 + 2 * 6...
When a program is adapted to run on multiple processors in a multiprocessor system, the execution time on each processor is comprised of computing time and the overhead time required for locked...
Write a program that accepts a number of minutes and converts it both to hours and days. For example, 6,000 minutes equals 100 hours and equals 4.167 days. Save the program as MinutesConversion.java.
The code between a pair of curly braces in a method is a _____________. a. Function b. Brick c. Block d. Sector
The portion of a program within which you can reference a variable is the variables_____________. a. Scope b. Space c. Domain d. Range
You can declare variables with the same name multiple times _____________. a. Within a statement b. Within a block c. Within a method d. You never can declare multiple variables with the same name.
What is the output of the following code segment? t = 10; if(t > 7) { System.out.print("AAA"); System.out.print("BBB"); } a. AAA b. BBB c. AAABBB d. Nothing
Two people play the game of Count 21 by taking turns entering a 1, 2, or 3, which is added to a running total. The player who adds the value that makes the total reach or exceed 21 loses the game....
The method that determines whether two String objects are equivalent, regardless of case, is ____________. a. equalsIgnoreCase() b. toUpperCase() c. equalsNoCase() d. equals()
The toString() method converts a(n) ____________ to a String. a. char b. int c. float d. All of the above
The first position in a String ____________. a. Must be alphabetic b. Must be uppercase c. Is position zero d. Is ignored by the compareTo() method
The method that extracts a string from within another string is ____________. a. extract() b. parseString() c. substring() d. append()
In each case, determine the problem and fix the program. After you correct the errors, save each file using the same filename preceded with Fix. For example, DebugSeven1.java will become...
An array is a list of data items that all ____________. a. Have the same type b. Have different names c. Are integers d. Are null
Name at least three real-life objects that are instances of each of the following classes: a. Song b. CollegeCourse c. Musician
When you place objects in order beginning with the object with the highest value, you are sorting in ____________ order. a. Descending b. Ascending c. Demeaning d. Arithmetic
A collection of data stored on a nonvolatile device in a computer system is____________. A. An application B. A file C. Volatile D. A type of binary file
Create a file using any word-processing program or text editor. Write an application that displays the files name, containing folder, size, and time of last modification. Save the file as...
Create an application for Paulas Portraits, a photography studio. The application allows users to compute the price of a photography session. Paulas base price is $40 for an in-studio photo session...
Simplify each of the following functions for F using a K-map. (a) F(W, X, Y, Z) = m(0, 1, 4, 5, 8, 9) (b) F(A,B,C,D) = m(0, 2, 8, 10, 12, 14) (c) F(A,B,C,D) = m(2, 4, 5, 6, 7, 10, 14) (d) F(W, X,...
Open the VB2017\Chap01\FixIt Solution\FixIt Solution.sln file. If necessary, open the designer window. The interface contains a picture box, two buttons, and a label control that displays the price...
An expression can contain arithmetic, comparison, and logical operators. Indicate the order of precedence for the three types of operators by placing a number (1, 2, or 3) on the line to the left of...
Which of the following clauses will stop the loop when the value in the intPopulation variable is less than the number 5000? a. Do While intPopulation >= 5000 b. Do Until intPopulation < 5000 c. Loop...
Which of the following is false? a. The order of the arguments listed in the calling statement should agree with the order of the parameters listed in the receiving procedures header. b. The data...
Design a combinational logic shifter with 4-bit input and 4-bit output as follows: where X means dont care. Using multiplexers and tristate buffers, draw a logic diagram. Shift Count 4- bit output OE...
Write SQL queries to answer the following questions: a. Which students are enrolled in Database and Networking? (Use SectionNo for each class so you can determine the answer from the Registration...
For every product that has been ordered, display the product ID and the total quantity ordered (label this result TotalOrdered). List the most popular product first and the least popular last.
The entity type STUDENT has the following attributes: Student Name, Address, Phone, Age, Activity, and No of Years. Activity represents some campus-based student activity, and No of Years represents...
Examine the hierarchy for the university EER diagram (Figure 3-10). As a student, you are an instance of one of the subtypes: either UNDERGRAD STUDENT or GRADUATE STUDENT. List the names of all the...
Table 4-5 shows a shipping manifest. Your assignment is as follows: a. Draw a relational schema and diagram the functional dependencies in the relation. b. In what normal form is this relation? c....
Sketch a reasonably simple combinational circuit implementing each of the functions from Exercise 2.14. Data From Problem 14 (a) (b) (c) Y = ABC+BT Y = ABC+ AB
Given the input waveforms shown in Figure 3.62, sketch the output, Q, of an SR latch. Figure 3.62 Input waveforms of SR latch for Exercise 3.2
Given the input waveforms shown in Figure 3.61, sketch the output, Q, of an SR latch. Figure 3.61 Input waveforms of SR latch for Exercise 3.1
Show the result of Exercise R-10.9, assuming collisions are handled by quadratic probing, up to the point where the method fails. Exercise R-10.9 Draw the 11-entry hash table that results from using...
Given a directed line from point p0(x0, y0) to p1(x1, y1), you can use the following condition to decide whether a point p2(x2, y2) is on the left of the line, on the right, or on the same line (see...
Create a new concrete class that implements MyMap using open addressing with quadratic probing. For simplicity, use f(key) = key % size as the hash function, where size is the hash-table size....
The quick sort algorithm presented in the book selects the first element in the list as the pivot. Revise it by selecting the median among the first, middle, and last elements in the list.
Write a test program that stores 5 million integers in a linked list and test the time to traverse the list using an iterator vs. using the get(index) method.
Write a recursive method that displays an int value reversely on the console using the following header: public static void reverseDisplay(int value) For example, reverseDisplay(12345) displays...
Write a short recursive Java method that determines if a string s is a palindrome, that is, it is equal to its reverse. Examples of palindromes include 'racecar' and 'gohangasalamiimalasagnahog'.
Show a tree achieving the worst-case running time for algorithm depth.
Give a simple explanation and example for SaaS. Do the same for PaaS. Do the same for IaaS.
Convert the number 1111001101100 2 directly from binary to hexadecimal. Without looking at the original number, convert your answer directly back to binary and compare your final answer with the...
Name the three standards in common use for alphanumeric characters. Which standard is designed to support all of the worlds written languages? Which language is used primarily with legacy programs...
For the following products, to what brand do you have access, what is its version number, and what is the latest available version? a. Browser b. Web server c. JavaScript d. PHP e. Servlets f....
In this exercise, you modify one of the Seminars applications from Chapter 4s Apply lesson. Open the Seminars Solution.sln file contained in the Seminars Solution-RadioButton folder. Create an...
In this exercise, you code the Professor Schneider application, which displays a grade based on the number of points entered by the user. The number of points should always be less than or equal to...
Write an HDL module for an SR latch.
Create a simple math game for children. Use a CSS file to make the design appealing to a young child. Allow the user to type two numbers into two text fields, and then to select the operation...
Consider a cache with the following parameters: N (associativity) = 2, b (block size) = 2 words, W (word size) = 32 bits, C (cache size) = 32 K words, A (address size) = 32 bits. You need consider...
Showing 1600 - 1700
of 5000
First
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Last