Top Selling Computer science Questions

Consider the LIBRARY database schema shown in Figure 4.6. Write PHP code to create the tables of this schema. Figure 4.6 Figure 4.6 A specialization lattice with shared subclass ENGINEERING_MANAGER.... Why is there a trend toward giving an increasing fraction of chip area to cache memory? Derive a minimal state table for an FSM that acts as a three-bit parity generator. For every three bits that are observed on the input w during three consecutive clock cycles, the FSM generates the... Imagine the design of a system used to register students at a university. Discuss the user, task, system, and environmental characteristics (Table 10-10) that should be considered when designing the... Go to the Internet and find commercial websites that demonstrate each of the common errors listed in Table 11-15. Table 11-15. Error Description Avoid opening a new browser window when a user clicks... Describe how to implement a capacity-limited queue, which uses the functions of a capacity-limited deque to perform the functions of the queue ADT in ways that do not throw exceptions when we attempt... Stephanie Welsh worked for Petries database administrator. She had been overseeing two interns who were helping her translate conceptual database designs into physical designs. As they were finishing... Write a program that prompts the user for an integer. Pass the integer to a method that determines whether the number is greater than 0; if it is, the method displays the number and passes one less... Consider the E-R diagram of Figure 9-21. a. Transform this E-R diagram into a set of 3NF relations. b. State and justify all referential integrity rules for the 3NF relations you created in Problem... Create a program with an enumeration that contains the names of the eight planets in our solar system. Prompt the user for a planet name and use the ordinal () method to display the planets position.... What other or additional information should be collected on a System Service Request (see Figure 14-2) for maintenance? Figure 14-2 Pine Valley Furniture System Service Request REQUESTED BY Juanita... Write an application that prompts a user for the users month, day, and year of birth and uses the Local Date class to compute the day on which the user will become (or became) 10,000 days old. Save... The remainder operator _____________. a. Is represented by a forward slash b. Must follow a division operation c. Provides the quotient of integer division d. Is represented by a percent sign The Lucky Dog Grooming Parlor maintains data about each of its clients in a table named tblClients. Attributes include each dogs name, breed, and owners name, all of which are text attributes. The... At an ATM machine in a supermarket, the average length of a transaction is two minutes, and on average, customers arrive to use the machine once every five minutes. How long is the average time that... Think about your ideal analyst position. Write a job posting to hire someone for that position. What requirements would the job have? What skills and experience would be required? How would... I. Describe the term separation of duties and why it is important in reducing the risk an organization takes on when limiting the chance an employee will violate information security and break the... Which of the following is true about a one-to-one relationship? a. They are almost always a mistake. b. They create Cartesian joins in queries. c. They relate two tables using the primary key field... What prevents a user from entering a reservation for a customer who has not yet been registered in the Customers table? Which of the following statements is true about a one-to-many relationship? a. Every primary key field participates on the one side. b. Every foreign key field participates on the one side. c. Every... The ERM emphasizes what part of a relational database? a. Attributes b. Relationships c. Primary key fields d. Foreign key fields Which of the following is not considered a type of E-R diagram? a. DBDL b. ERM c. Crows foot notation d. Access Relationship window How do you identify the primary key field in DBDL notation? a. With a circle b. With an underline as well as the abbreviation PK c. With a double underline d. With a key symbol Which field in the TaskMasterList table is a good candidate for Lookup properties that constrain it with a one-to-many relationship to a one-field table? a. Description b. Per c. Estimate d. TaskID Which of the following relational database tools does not help you document the relationships between tables? a. SQL b. DBDL c. E-R diagram d. Entity relationship model If management wanted to start tracking the date the entire project was closed, which table should the field be added to? a. Clients b. Projects c. ProjectLineItems d. TaskMasterList Which of the following is not a technique that would be used in the process of developing a relational database? a. Normalize the data. b. Review existing data forms and reports. c. Interview those... Write an application that prompts the user to enter an integer and displays its square root. Accept the users entry as a String using the next Line() method. Then try to use the Integer. parse Int()... What is the Computer Fraud and Abuse Act (CFAA) of 1984? Explain each of the dont cares in Figure 4.18. Figure 4.18 Instruction R-format Tw SW beg RegDst 1 0 X X ALUSIC 0 1 1 0 Memto- Reg 0 1 X X Reg- Write 1 1 0 0 Mem- Mem- Read Write 0 1 0 0 0 0 1 OH 0... Consider the data in Table 3.30. and the following FDs: Decompose as necessary to achieve 3NF. Given AB CDE and B E is R( A, B , C, D, E) in 2NF? Extend the grammar of Arithlang to support a unary minus expression. Compare the production rule of the unary minus expression with the production rule for SubExp. For the Bayes net shown in Figure S13.42, consider the query P(A|h), and the variable elimination ordering B, E, C, F, D. a. In the table below fill in the factor generated at each stepwe did the... Suppose we want returning RTCP reports from receivers to amount to no more than 5% of the outgoing primary RTP stream. If each report is 84 bytes, the RTP traffic is 20 kBps, and there are 1000... What is the justification for the exponential increase in timeout value proposed by Karn and Partridge? Why, specifically, might a linear (or slower) increase be less desirable? How wide is a bit on a 1-Gbps link? How long is a bit in copper wire, where the speed of propagation is 2.3 10 8 m/s? Write a class based on class UnsortedType as a bounded linked implementation. Provide a parameterized constructor that takes the maximum number of items as a parameter. If function PutItem is called... The outer pipe in a double pipe heat exchanger is 4-nom sch 40 commercial steel. The inner tube is 2-std type K copper. The fluid inside the inner tube is flowing at a volumetric rate of 20 gpm and... Liquid propane is flowing through a 4 std type L copper tube. The tube is 200 m long and the outlet is 10 m higher than the inlet. The pressure drop through the tube is 90 kPa. The cyclohexane is at... Verify the schedulability under rate - monotonic algorithm and construct the schedule of the following task set: 1 {3, 7}, 2 {5, 16}, and 3 {3, 15}. Here, the notation i {e i , p i } gives... Complete the following tasks: a. Develop a use case diagram for a convenience food store. Include an actor representing the store manager and use cases for orderItem(), stockItem(), and sellItem().... Why might you not be able to enforce referential integrity on a one-to-many relationship? a. The table on the one side doesnt have a matching record(s) in the table on the many side. b. The table on... A group of students were debating the efficiency of the five-stage pipeline when one student pointed out that not all instructions are active in every stage of the pipeline. After deciding to ignore... By convention, a cache is named according to the amount of data it contains (i.e., a 4 KiB cache can hold 4 KiB of data); however, caches also require SRAM to store metadata such as tags and valid... Experiment with built-in functions for lists. 1. Use (list) to create an empty list, 2. Use (list 342) to create a list with a single element 342. 3. Use (car (list 342)) to get the first element of... The system described by the equations (a) Use (2-89) to solve for x(k), k 0. (b) Find the output y(z) . (c) Show that (k) in (a) satisfies the property (0) = I. (d) Show that the solution in part (a)... Section 2.9 gives some standard forms for state equations (simulation diagrams for the control canonical and observer canonical forms). The MATLAB statement generates a standard set of state... Consider a system described by the coupled difference equation Equation 2-84 y (k+ 2) - v (k)= 0 v(k + 1) + y (k + 1) = u(k) where u(k) is the system input. Consider the satellite control system of Fig. P5.3-14. The units of the attitude angle (t) is degrees, and the range is 0 to 360 . The sensor gain is H k = 0.02 . (a) Suppose that the input ranges... (a) Find the system response at the sampling instants to a unit step input for the system of Fig. P4.3-2. Plot c(nT) versus time. (b) Verify your results of (a) by determining the input to the... Repeat Problem 2.10-2 for the system described by (a) Find the transfer function Y(z)/U(z). (b) Using any similarity transformation, find a different state model for this system. (c) Find the... In this exercise, we look at how software techniques can extract instruction-level parallelism (ILP) in a common vector loop. The following loop is the so-called DAXPY loop (double-precision aX plus... Calculate the bandwidth delay product for the following links. Use one-way delay, measured from first bit sent to first bit received. (a) 10-Mbps Ethernet with a delay of 10 s. (b) 10-Mbps Ethernet... Provide the type and assembly language instruction for the following binary value: 0000 0010 0001 0000 1000 0000 0010 0000 two . Provide the type and hexadecimal representation of following instruction: sw $t1, 32($t2) Provide the type, assembly language instruction, and binary representation of instruction described by the following MIPS fields: op = 0, rs = 3, rt = 2, rd = 3, shamt = 0, funct = 34 Provide the type, assembly language instruction, and binary representation of instruction described by the following MIPS fields: op = 0 x 23, rs = 1, rt = 2, const = 0 x 4 Assume that registers $s0 and $s1 hold the values 0x80000000 and 0xD0000000, respectively. 1. What is the value of $t0 for the following assembly code? add $t0, $s0, $s1 2. Is the result in $t0 the... Assume $t0 holds the value 0x00101000. What is the value of $t2 aft er the following instructions? $t2, $0, slt $t0 bne $t2, $0, ELSE DONE ELSE: addi $t2, $t2, 2 DONE: Based on your answers to 3.32 and 3.33, does (3.984375 10 -1 + 3.4375 10 -1 ) + 1.771 10 3 = 3.984375 10 -1 + (3.4375 10 -1 + 1.771 10 3 )? What decimal number does the bit pattern 00C000000 represent if it is a twos complement integer? An unsigned integer? Calculate 3.984375 10 -1 + (3.4375 10 -1 + 1.771 10 3 ) by hand, assuming each of the values are stored in the 16-bit half precision format described in Exercise 3.27 (and also described in the... This exercise is intended to help you understand the relationship between delay slots, control hazards, and branch execution in a pipelined processor. In this exercise, we assume that the following... Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bit memory address references, given as word addresses. 3, 180, 43, 2, 191, 88, 190, 14,... In this exercise, we will look at the different ways capacity affects overall performance. In general, cache access time is proportional to capacity. Assume that main memory accesses take 70 ns and... The min method for the UnsortedPriorityQueue class executes in O(n) time, as analyzed in Table 9.2. Give a simple modification to the class so that min runs in O(1) time. Explain any necessary... Consider a diagram of a telephone network, which is a graph G whose vertices represent switching centers, and whose edges represent communication lines joining pairs of centers. Edges are marked by... Assume that the number of hosts connected to the Internet at year 2010 is five hundred million. If the number of hosts increases only 20 percent per year, what is the number of hosts in year 2020? Answer the following questions about Figure 2.2 when the communication is from Maria to Ann: a. What is the service provided by layer 2 to layer 3 at Marias site? b. What is the service provided by... It is obvious that a router or a switch needs to search to find information in the corresponding table. The searching in a routing table for a datagram network is based on the destination address;... We need to transmit 100 digitized voice channels using a passband channel of 20 KHz. What should be the ratio of bits/Hz if we use no guard band? Define constellation diagram and explain its role in analog transmission. Define digital-to-analog conversion. Define analog transmission. A light signal is travelling through a fiber. What is the delay in the signal if the length of the fiber-optic cable is 10 m, 100 m, and 1 Km (assume a propagation speed of 2 10 8 m)? The input stream to a 4B/5B block encoder is 0100 0000 0000 0000 0000 0001 Answer the following questions: a. What is the output stream? b. What is the length of the longest consecutive sequence of... Define the characteristics of a self-synchronizing signal. Repeat Problem P4-3 for the MLT-3 scheme, but use the following data streams. a. 00000000 b. 11111111 c. 01010101 d. 00011000 Problem 4-3 Draw the graph of the NRZ-L scheme using each of the... If the peak voltage value of a signal is 20 times the peak voltage value of the noise, what is the SNR? What is the SNR dB ? If there is a single path between the source host and the destination host, do we need a router between the two hosts? Assume Alice is travelling from 2020 Main Street in Los Angeles to 1432 American Boulevard in Chicago. If she is travelling by air from Los Angeles Airport to Chicago Airport, a. find the end-to-end... Explain why flags are needed when we use variable-size frames. Compare and contrast byte-stuffing and bit-stuffing. Stations in a pure Aloha network send frames of size 1000 bits at the rate of 1 Mbps. What is the vulnerable time for this network? Another useful parameter in a LAN is the bit length of the medium (L b ), which defines the number of bits that the medium can hold at any time. Find the bit length of a LAN if the data rate is 100... There is no acknowledgment mechanism in CSMA/CD, but we need this mechanism in CSMA/CA. Explain the reason. Answer the following questions: a. What is the polynomial representation of 101110? b. What is the result of shifting 101110 three bits to the left? c. Repeat part b using polynomials. d. What is the... Apply the following operations on the corresponding polynomials: a. (x 3 + x 2 + x + 1) + (x 4 + x 2 + x + 1) b. (x 3 + x 2 + x + 1) (x 4 + x 2 + x + 1) c. (x 3 + x 2 ) (x 4 + x 2 + x + 1) d. (x 3... Referring to the CRC-32 polynomial in Table 10.4, answer the following questions: Table 10.4 a. Does it detect a single error? Defend your answer. b. Does it detect a burst error of size 16? Defend... Assume that the probability that a bit in a data unit is corrupted during transmission is p. Find the probability that x number of bits are corrupted in an n-bit data unit for each of the following... What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? List six access technologies. Classify each one as home access, enterprise access, or wide-area wireless access. a. Suppose you have the following 2 bytes: 01011100 and 01100101 What is the is complement of the sum of these 2 bytes? b. Suppose you have the following 2 bytes: 11011010 and 01100101. What is the... The Diffie-Hellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alices secret number, x, is 12, and Bobs secret... Alice wants to send a message to Bob using SHA-1 hashes. She consults with you regarding the appropriate signature algorithm to be used. What would you suggest? Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26. (a) If p = 5 and q = 13, list five legal values for d. (b) If p = 5, q = 31, and d = 37, find e. (c) Using p = 3, q =... Which of the following data units has an application-layer message plus the header from layer 4? a. A frame b. A user datagram c. A bit Is the frequency domain plot of a voice signal discrete or continuous? Repeat Problem P4-3 for the Manchester scheme. Problem 4-3 Draw the graph of the NRZ-L scheme using each of the following data streams, assuming that the last signal level has been positive. From the...
Showing 2300 - 2400 of 5000