Top Selling Computer science Questions

Create an XSLT style sheet for one car element of the XML document of Exercise 7.2, and use it to create a display of that element. a. Distinguish between omnidirectional and dish antennas in terms of operation. b. Under what circumstances would you use an omnidirectional antenna? 6b.) The other wireless device is near but in an... a. If you quadruple propagation distance, how much will signal intensity change at the receiver? 7a.) At 10 meters, a signal has a strength of 100 mW. About how strong will it be at 40 meters? a.... a. Contrast inverse square law attenuation and absorptive attenuation. 8a.) What propagation problem is especially bad in moist air? a. Absorptive attenuation b. Electromagnetic interference c. Multi... a. Does a signal travel at a single frequency, or does it spread over a range of frequencies? 10a.) Signals in a transmission usually _________. a. Travel at a single frequency b. Spread over a range... a. Do WLANs today use licensed or unlicensed service bands? 11a1.) WLANs normally use __________. a. Licensed bands b. Unlicensed bands c. Both A and B d. neither A or B 11a2.) Many 802.11 standards... a. In Figure 6-12, there are question marks between several pairs of access points. For each of these pairs, list their channels of operation and whether they will interfere. 12a.) Two access points... a. Why must an access point remove an arriving packet from the frame and place the packet in a different frame when it sends the packet back out? 16a.) Access points take __________ from wireless... a. What does CS mean? (Do not just spell out the abbreviation.) 19a.) In CS MA/CA, CS means __________. a. Cancel sending b. Counter-source c. Carriage suspension d. Carrier sense b. How is carrier... a. A straight road with government-provided Internet will receive 16 access points that are 10 meters apart. About how many access points would be needed if the city decided to increase the distance... Determine the power of each digit for four-digit numbers in base 16. Which place digits in base 2 have the same power? Suppose that you have been hired to develop a website-based sales system for a large international retail sales firm. Discuss some environmental issues that are specific to the Web design of your... a. Distinguish between Step 1 and Step 2 in the routing process. 10a1.) The first step in the routing process involves _________. a. Selecting the best match row b. Comparing the packet's destination... Using the division method, convert the following decimal numbers to binary: a. 4098 b. 71269 c. 37 In each case, check your work by using the power of each digit to convert back to decimal. Select a number base that would be suitable for direct conversion from base 3, and convert the number 22011210 3 to that base. Convert the following numbers from their given base to decimal: a. 0.1001001 2 b. 0.3A2 16 c. 0.2A1 1 2 a. What is the ASCII representation for the numeral 3.1415 in binary? in octal? in hexadecimal? in decimal? b. What is the EBCDIC representation for the numeral +1,250.1? (Include the comma.) Packages and high-priority mail are handled by The Typical Large Corporation (TyplCorp) in a way that is typical of large corporations. Each company building has a centralized mailroom where packages... Carefully explain the purpose of a bus interface. A 1024 768 image is displayed, non-interlaced, at a rate of thirty frames per second. a. If the image is stored with 64K-color resolution, which uses 2 bytes per pixel, how much memory is required... The UNIX operating system differentiates between block-oriented and character oriented devices. Give an example of each, explain the differences between them, and explain how the I/O process differs... What is polling used for? What are the disadvantages of polling? What is a better way to perform the same job? DMA is rarely used with dumb computer terminals. Why? What is the advantage of using a disk controller to control the hard disk? How else could you do the job that the disk controller does? As you know, a single CPU processes one instruction at a time. Adding a second CPU (or core, in current terminology) allows the system to process two instructions at a time, simultaneously,... Locate information about the Cell Processor. Describe the tasks performed by the various slave processors. What is the primary role of the master processor? Explain the advantages of masterslave... The goal of scalar processing is to produce, on average, the execution of one instruction per clock tick. If the clock ticks at a rate of 2 GHz, how many instructions per second can this computer... Consider a cache memory that provides three hundred 16-byte blocks. Now consider that you are processing all the data in a two-dimensional array of, say, four hundred rows by four hundred columns,... Suppose that the instruction format for a modified Little Man Computer requires two consecutive locations for each instruction. The high-order digits of the instruction are located in the first mail... a. What is the effect of shifting an unsigned number in a register 2 bits to the left? 1 bit to the right? Assume that 0s are inserted to replace bit locations at the end of the register that have... Suppose that the following instructions are found at the given locations in memory: a. Show the contents of the IR, the PC, the MAR, the MDR, and A at the conclusion of instruction 20. b. Show the... Write a Little Man program that accepts three values as input and produces the largest of the three as output. For each of the most popular commands in Windows (or Linux if you prefer), identify the type of operating system service that is being provided, and identify the basic module or modules that are... Describe the two methods that are used to provide concurrent operation of multiple processes on a single CPU. What are the advantages of each method? What is the advantage of providing concurrent... (a) A system is represented by the ordinary differential equation dz(t)/dt = w(t) w(t 1) where w(t) is the input and z(t) the output. i. How is this system related to an averager having an... The response of a first-order system is for t ¥ 0 and zero otherwise. (a) Consider y(0) = 0 is the system linear? If y(0) 0, is the system linear? Explain. (b) If x(t) = 0, what is the response... The input/output equation for an analog averager is given by the convolution integral where x(t)is the input and y(t)the output. (a) Change the above equation to determine the impulse response h(t).... The input-output equation for an analog averager is let x(t) = e j Ω0t . Since the system is LTI then the output should be y(t) = e j Ω0t H(jΩ 0 ). (a) Find the... Find the complex exponential Fourier series for the following signals. In each case plot the magnitude and phase line spectra for k 0. (i)x1 (i) x 1 (t) = cos(5t + 45), (ii) x 2 (t) = sin 2 (t),... Let a periodic signal x(t)with a fundamental frequency 0 = 2 have a period x 1 (t) = t[u (t) u(t 1)] (a) Plot x(t), and indicate its fundamental period T 0 . (b) Compute the Fourier series... Alice needs to send a message to a group of fifty people. If Alice needs to use message authentication, which of the following schemes do you recommend? a. MAC b. Digital signature Suppose you have the Fourier series of two periodic signals x(t)and y(t)of fundamental periods T 1 and T 2 , respectively. Let X k and Y k be the Fourier series coefficients corresponding to x(t) and... A period of a periodic signal x(t)with fundamental period T 0 = 2 is x 1 (t) = cos(t) [u(t) u(t 2)]. (a) Plot the signal x(t) and find the Fourier series coefficients {X k } for x(t) using the... Given the Fourier series representation for a periodic signal x(t), we can compute derivatives of it just like with any other signal. (a) Consider the periodic train of pulses shown in Figure 4.22,... Assume Bob, using the RSA cryptosystem, selects p = 11, q = 13, and d = 7, which of the following can be the value of public key e? a. 11 b. 103 c. 19 Consider a full-wave rectifier that has as output a periodic signal x(t) of fundamental period T 0 = 1 and a period of it is given as (a) Obtain the Fourier coefficients X k . (b) Suppose we pass... A causal signal x(t) having a Laplace transform with poles in the open-left s-plane (i.e., not including the j-axis) has a Fourier transform that can be found from its Laplace transform. Consider the... Which of the following applications are classified as VBR-RT in ATM? a. HTTP b. SNMP c. SMTP d. VoIP A periodic signal x(t) has a period x 1 (t) = r(t) 2r(t 1) + r(t 2), T 0 = 2 (a) Find the Fourier series of z(t) = d 2 x(t)/dt 2 using the Laplace transform. Then use the derivative property to find... Explain the concept of redirection. Illustrate your answer with an example of a situation where redirection would be useful. The connection between the Fourier series and the Fourier transform can be seen by considering what happens when the fundamental period of a periodic signal increases to a point at which the... The supports in time and in frequency of a signal x(t) and its Fourier transform X(Ω)are inversely proportional. Consider a pulse (a) Let T 0 = 1, and T 0 = 10 and find and compare the... a. What are the three ranges of private IP addresses? b. If a firm chooses 10.x.x.x for its internal IP addresses, how many hosts can it have internally? c. Repeat for 192.168.x.x. d. Repeat for... Let (u, ) be a minimum-weight edge in a connected graph G. Show that (u, ) belongs to some minimum spanning tree of G. The following problems relate to FIR and IIR systems. (a) The input and the output of a causal LTI discrete-time system are Determine the impulse response h[n]. (b) The transfer function H(z)of an... Consider the following problems related to properties of filters. (a) Filters that operate under real-time conditions need to be causal, i.e., they can only process present and past inputs. When no... Signals of finite time support have infinite support in the frequency domain, and a band-limited signal has infinite time support. A signal cannot have finite support in both domains. (a) Consider... In SCTP, the state of a sender is as follows: a. The sending queue has chunks 18 to 23. b. The value of curTSN is 20. c. The value of the window size is 2000 bytes. d. The value of inTransit is 200.... Consider the RLC circuit in Figure 7.15 where R = 1­Î©. (a) Determine the values of the inductor and the capacitor so that the transfer function of the circuit when the output is the... Explain the meaning of the word inappropriately in the phrase one user's work does not inappropriately influence another users work. Write and run an SQL CREATE TABLE statement to create the SALE_02 table. Note that the foreign key is CustomerID, which references CUSTOMER_04.CustomerID. In this database, CUSTOMER_04 and SALE_02... Give examples of 1:1, 1:N, and N:M recursive relationships (other than those presented in this chapter). Explain why the relationship between BUILDING and APARTMENT discussed on page 206 is an identifying relationship. Explain the difference between an entity class and an entity instance. Figure 30.12 shows a router using FIFO queuing at the input port. The arrival and required service times for seven packets are shown below; t i means that the packet has arrived or departed i ms... Figure 30.13 shows a router using priority queuing at the input port. The arrival and required service times (transmission time is negligible) for 10 packets are shown below; t i means that the... The transfer function of an IIR filter is Find the magnitude response of this filter at Ï = 0, Ï = Ï/2, and Ï = Ï. From the poles and the zeros of H(z) find geometrically the... What similarities exist in mechanical, electrical, and optical methods of computation? List at least five types of resources that computers on a local area network or wide area network can share? Figure 9-26 illustrates a partial class diagram for a property management company. Using the data in the class diagram, create a database schema. Who are the stakeholders for the issues related to real estate in your community, and what are their main interests? What types of information does the board collect and make available to its members... What is the system development life cycle (SDLC)? 1. Based on this description, develop the following for the use case Request a package pickup and for the Web customer scenario: i. A fully developed use case description ii. An activity diagram iii.... The SBRU information system includes four subsystems: Resort relations, Student booking, Accounting and finance, and Social networking. The first three are purely Web applications, so access to those... In Chapter 4, you developed a domain model class diagram. Using your previous solution or one provided to you by your instructor, update your domain model class diagram with any additional problem... Is a randomly generated 4-CNF sentence with n symbols and m clauses more or less likely to be solvable than a randomly generated 3-CNF sentence with n symbols and m clauses? Explain. Consider the following sentence: [(Food Party) (Drinks Party)] [(Food Drinks) Party] . a. Determine, using enumeration, whether this sentence is valid, satisfiable (but not valid), or... Prove that GRAPH-SEARCH satisfies the graph separation property illustrated in Figure 3.9. Begin by showing that the property holds at the start, then show that if it holds before an iteration of the... Let us examine the rationality of various vacuum-cleaner agent functions. a. Show that the simple vacuum-cleaner agent function described in Figure 2.3 is indeed rational under the assumptions listed... Create a database named MEDIA in MySQL 5.6. Use the default settings for file sizes, names, and locations (the actual database name in MySQL will appear in lowercase letters only). Assuming predicates Parent(p, q) and Female(p) and constants Joan and Kevin, with the obvious meanings, express each of the following sentences in first-order logic. (You may use the abbreviation 1... What is 5ED4 - 07A4 when these values represent signed 16-bit hexadecimal numbers stored in sign-magnitude format? The result should be written in hexadecimal. Show your work. Translate the following C code to MIPS assembly code. Use a minimum number of instructions. Assume that the values of a, b, i, and j are in registers $s0, $s1, $t0, and $t1, respectively. Also,... The operation of arc reversal ARC REVERSAL in a Bayesian network allows us to change the direction of an arc X Y while preserving the joint probability distribution that the network represents... All Java programming statements must end with a ____________. a. Period b. Comma c. Closing parenthesis d. Semicolon When data cannot be changed after a class is compiled, the data is _____________. a. Variable b. Constant c. Volatile d. Mutable Assuming you have declared shoeSize to be a variable of type int, which of the following is a valid assignment statement in Java? a. shoeSize = 9; b. shoeSize = 9.5; c. shoeSize = nine; d. Two of the... Select a specific member of the set of policies that are optimal for R(s) > 0 as shown in Figure 17.2(b), and calculate the fraction of time the agent spends in each state, in the limit, if the... Recall the definition of value of information in Section 16.6. a. Prove that the value of information is nonnegative and order independent. b. Explain why it is that some people would prefer not to... The Surprise Candy Company makes candy in two flavors: 70% are strawberry flavor and 30% are anchovy flavor. Each new piece of candy starts out with a round shape; as it moves along the production... Use the Microsoft SQL Server Management Studio to create the table SLIDE_SHOW_PICTURE_INT using the column characteristics shown in Figure 10A-84.SLIDE_SHOW_PICTURE_INT is an intersection table... In Section 4.2. We noted that the maximum queuing delay is (n - I) D if the switching fabric is n times faster than the input line rates. Suppose that all packets are of the same length, n packets... The method with the declaration public static int aMethod(double d) is a method type of _____________. a. static b. int c. double d. You cannot determine the method type. An objects data items are also known as _____________. a. Fields b. Functions c. Themes d. Instances You send messages or information to an object through its _____________. a. Fields b. Methods c. Classes d. Type A program or class that instantiates objects of another prewritten class is a(n) _____________. a. Class client b. Superclass c. Object d. Patron Suppose you declare an object as Book myJournal;. Before you store data in myJournal, you _____________. a. Also must explicitly allocate memory for it b. Need not explicitly allocate memory for it... If you use the automatically supplied default constructor when you create an object, _____________. a. Numeric fields are set to 0 (zero) b. Character fields are set to blank c. Boolean fields are... Computer games often contain different characters or creatures. For example, you might design a game in which alien beings possess specific characteristics such as color, number of eyes, or number of... When you code an if statement within another if statement, the statements are ____________. a. Notched b. Nested c. Nestled d. Sheltered
Showing 3000 - 3100 of 5000