Top Selling Computer science Questions

In this project, you will perform calculations with triangles. A triangle is defined by the x- and y-coordinates of its three corner points. Your job is to compute the following properties of a given... A stopwatch uses six digits to display hours, minutes and seconds: 0 1:5 4: 2 3 It uses a nibble of binary data for each digit displayed on the stopwatch. What time is the stopwatch stopped at when... In this exercise, you modify the application from Exercise 13. The modified application allows the user to update a specific price. Use Windows to make a copy of the Retail Solution folder. Rename... Given the following declarations, what result is stored in each of the listed assignment statements? a. iResult = num1 / num4; b. fResult = num1 / num4; c. iResult = num3 / num4; d. fResult = num3 /... Create an application, using the following names for the solution and project, respectively: Glasgow Solution and Glasgow Project. Save the application in the VB2015\Chap11 folder. Create the... List various project team communication methods and describe an example of the type of information that might be shared among team members using each method. Contact an organization that has implemented or is implementing an integrated ERP application. Why did it choose this design strategy? How has it managed this development project differently from... List and explain the different phases in the SDLC. Write a program that converts a Java file into an HTML file. In the HTML file, the keywords, comments, and literals are displayed in bold navy, green, and blue, respectively. Use the command line to... Use the data files from Programming Exercise 12.31 to write a program that enables the user to select a year, gender, and enter a name to display the ranking of the name for the selected year and... Write a program that animates the bubble-sort algorithm. Create an array that consists of 20 distinct numbers from 1 to 20 in a random order. The array elements are displayed in a histogram, as shown... Consider the DFD in Figure 7-24. List three errors (rule violations) on this DFD. Figure 7-24 1.0 DF2 E1 P2 DF5 DS1 DF1 DF6 DF3 2.0 DF4 P1 DF2 E2 Choose a transaction that you are likely to encounter, perhaps ordering a cap and gown for graduation, and develop a use case diagram for it. You can find the kth smallest element in a BST in O(n) time from an inorder iterator. For an AVL tree, you can find it in O(log n) time. To achieve this, add a new data field named size in... Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent... Rewrite Listing 32.1 to display the output in a text area, as shown in Figure 32.30. Data from Listing 32.1 Concurrent Output a ibab3b 4b 5 bebbbebbbbtbbbbbbbbbbbbbbbbbbbbbbbbbebbbbbbbbb 7... List the various data abstraction concepts and the corresponding modeling concepts in the EER model. Discuss the mechanism of attribute/relationship inheritance. Why is it useful? Under what conditions can an attribute of a binary relationship type be migrated to become an attribute of one of the participating entity types? Define the following terms: entity, attribute, attribute value, relationship instance, composite attribute, multivalued attribute, derived attribute, complex attribute, key attribute, and value set... The following pseudocode describes how to turn a string containing a ten-digit phone number (such as "4155551212") into a more readable string with parentheses and dashes, like this: "(415)... List the basic operations of the following built-in interfaces of the ODMG object model: Object, Collection, Iterator, Set, List, Bag, Array, and Dictionary. What is a functional dependency? What are the possible sources of the information that defines the functional dependencies that hold among the attributes of a relation schema? Draw a flowchart for the algorithm in Exercise R3.12. Data from Exercise R3.12. In a scheduling program, we want to check whether two appointments overlap. For simplicity, appointments start at a... Describe conceptually how an SQL retrieval query will be executed by specifying the conceptual order of executing each of the six clauses. Suppose that we have an ordered file of fixed-length records and an unordered overflow file to handle insertion. Both files use unspanned records. Outline algorithms for insertion, deletion, and... What is the purpose of normalization? List five properties of relations. Give a general definition of information retrieval (IR). What does information retrieval involve when we consider information on the Web? How does clustering differ from classification? When team members are geographically dispersed, communication becomes more challenging. Explain how groupware can increase user productivity in this context. What is scrum? What is a system requirement and what are the three challenges it presents to the systems analyst? Use BPMN to depict Hoosier Burgers food-ordering system from Figure 7-5 as a business process model. Figure 7-5 CUSTOMER KITCHEN 1.0 Customer Order Receive and Transform Food Order Receipt Customer... Draw a class diagram, showing the relevant classes, attributes, operations, and relationships for each of the following situations (if you believe that you need to make additional assumptions,... Refer to Figure 7-23, which contains drafts of a context and level-0 DFD for a university class registration system. Identify and explain potential violations of rules and guidelines on these... For each of the following UML terms (see Sections 3.8 and 4.6), discuss the corresponding term in the EER model, if any: object, class, association, aggregation, generalization, multiplicity,... Talk with a database administrator or designer from the organization. What type of metadata does this organization maintain about its databases? Why did the organization choose to keep track of these... Consider a GRADE_BOOK database in which instructors within an academic department record points earned by individual students in their classes. The data requirements are summarized as follows: Each... Spatial indices that can index spatial intervals can conceptually be used to index temporal data by treating valid time as a time interval. What is the problem with doing so, and how is the problem... What trade offs do buffer trees pose as compared to LSM trees? Consider the EER design for the ONLINE_AUCTION database that was modeled using a tool like ERwin or Rational Rose in Laboratory Exercise 4.29. Using the SQL schema generation feature of the modeling... Using the attributes you provided for the EER diagram in Exercise 4.27, map the complete schema into a set of relations. Choose an appropriate option out of 8A thru 8D from Section 9.2.1 in doing the... A student walks into a classroom and sees on the blackboard a diagram of a TG with two states that accepts only the word . The student reverses the direction of exactly one edge, leaving all other... Specify the following queries on the database in Figure 5.5 in SQL. Show the query results if each query is applied to the database state in Figure 5.6. a. For each department whose average employee... On a 2TM track 1 contains a string of the form (a + b) + which is to be interpreted as a unary representation of numbers as strings of a's, separated by single b's. (i) Using a 2TM, find the largest... Specify the following queries in relational algebra on the database schema given in Exercise 5.14: a. List the Order# and Ship_date for all orders shipped from Warehouse# W2. b. List the WAREHOUSE... Implement the logic circuit in Figure 8.6b using NAND gates only. -f D Tx 8 Ix X4 Ex Assume that you need to use a single-pole single-throw switch as shown in Figure 7.51a. Show how a counter can be used as a means of de bouncing the Data signal produced by the switch. VDD R www Li X... Give an algorithm for finding the penultimate (second to last) node in a singly linked list where the last element is indicated by a null next link. Suppose you were designing applications for a standard file server environment. One issue discussed in this chapter for this distributed processing environment is that the application software on... Describe the output of the following series of stack operations: push(5), push(3), pop(), push(2), push(8), pop(), pop(), push(9), push(1), pop(), push(7), push(6), pop(), pop(), push(4), pop(),... Suppose an initially empty stack S has performed a total of 25 push operations, 12 top operations, and 10 pop operations, 3 of which generated a StackEmpty exception that was caught and ignored. What... Let T be an n-node improper binary tree (that is, each internal node has one or two children). Describe how to represent T by means of a proper binary tree T with O(n) nodes. Show that there are more than 2 n different potentially improper binary trees with n internal nodes, where two trees are considered different if they can be drawn as different looking trees. Develop a C++ implementation of a priority queue that is based on a heap and supports the locator-based functions. Write a program that creates a String Array List. Continually prompt the user for Strings to add to the list until a sentinel value is entered. Use an iterator to display all the Strings, then... Transform the E-R diagram of Figure 8-23 into a set of 3NF relations. Make up a primary key where needed and one or more nonkey attributes for each entity. Figure 8-23 TOOL ++ Used_on PROJECT Project... Consider the employee database of Figure 2.17. Give an expression in the relational algebra to express each of the following queries: a. Find the ID and name of each employee who works for BigBank.... Write an application that displays every perfect number from 1 through a user-supplied limit. A perfect number is one that equals the sum of all the numbers that divide evenly into it. For example, 6... In the method header public static boolean(int age), age is a(n) _____. a. Argument b. Parameter c. Return value d. Final value Hackers may be able to fool you into believing that their web site is actually a web site (such as a bank or credit card web site) that you trust. This may be done by misleading email, or even by... Which of the following data types can store the value 0 using the least amount of memory? a. Short b. Long c. Int d. Byte Let L be any language. Let us define the transpose of L to be the language of exactly those words that are the words in L spelled backward. If w El, then reverse(w) El. For example, if L = {a abb... Which of the following is not a valid name for an object? a. picMy.Dog b. btnCalcSalesTax c. lbl2019 d. lblProjected2024 We gave two simple heuristics for the 8-puzzle: Manhattan distance and misplaced tiles. Several heuristics in the literature purport to improve on thissee, for example, Nilsson (1971), Mostow and... For each of the following agents, specify the sensors, actuators, and environment: microwave oven, chess program, autonomous supply delivery plane. 1. Charlie is a project manager for a new system under development for a national mortgage processing company. A common experience for IS managers today is to lose experienced IS staff members, who... Complete the following tasks: a. Develop the UML diagram of your choice that best illustrates some aspect of a place you have worked. b. Develop a different UML diagram type that illustrates the same... Write a program that asks the user to enter a distance in kilometers, then converts that distance to miles. The conversion formula is as follows: Miles = Kilometers X 0.6214 Which method of representing quantities involves discrete steps? What is the difference between computer organization and computer architecture? Modify the program you wrote for Programming Challenge 13 so it also calculates and displays the amount of money Package A customers would save if they purchased Package B or C, and the amount of... Write a program that creates two ArrayListsone to hold Strings and one to hold Integers. Prompt the user for a word, and while the user does not enter a sentinel value, continue to add each entered... Write a program that creates an array of at least 20 integers and do the following: Prompt the user for a starting position, and continually reprompts the user for a new value if the starting... a. Throughout the Case Problems in this course, you have been using a Rental class that obtains all the data for rentals from Sunshine Seashore Supplies, including details about the contract number,... What is an audit universe and what does it include? This question considers Horn KBs, such as the following: P(F(x)) P(x) Q(x) P(F(x)) P(A) Q(B) Let FC be a breadth-first forward-chaining algorithm that repeatedly adds all consequences of currently... Futoshiki is a Sudoku-like Japanese logic puzzle that is very simple, but can be quite challenging. You are given an n x n grid, and must place the numbers 1, . . . n in the grid such that every row... In California, whether it rains or not from each day to the next forms a Markov chain (note: this is a terrible model for real weather). However, sometimes California is in a drought and sometimes it... Write the value relation for the modulus expression. Arithlang grammar supports positive integers. Extend this grammar to support negative integers. Convert the following arithmetic expressions written in infix notation to the prefix notation of Arithlang. Write a prototype of the Square program, using just one class named SquarePrototype, and using only one method, main. Your program should generate the prescribed border output for the case of when... Scientific inquiry investigates the causal relation of variables; scientists study the effects of interventions. Causal networks provide a framework for such analysis by exactly specifying variables... The sequence number field in the TCP header is 32 bits long, which is big enough to cover over 4 billion bytes of data. Even if this many bytes were never transferred over a single connection, why... By the year 2021, the European Union will have a database of fingerprints, photographs for facial recognition, passport numbers and birth dates of all its 350 million citizens. Data that are... At sea level, a person has a mass of 175 lbm. Determine the weight of this person in newtons (N). Western Digital, a developer of storage devices and solutions, has grown dramatically since it was established in 1970. Based in San Jose, California, they employ more than 61,000 with locations... Megan Simpson, manager of western regional sales at the Whitefield Company, requested that the IS department develop a sales force communication and tracking system that would enable her to better... Evergreen Nurseries offers a wide range of lawn and garden products to its customers. Evergreen Nurseries conducts both wholesale and retail operations. Although the company serves as a wholesaler to... Show the step-by-step multiplication process using Booth algorithm (as in Table 10-3) when the following binary numbers are multiplied. Assume 5-bit registers that hold signed numbers. The... In the student sample program files for this chapter, you will find a text file named GasPrices.txt. The file contains the weekly average prices for a gallon of gas in the United States, beginning on... Write a query to display the author ID, first name, last name, and year of birth for all authors born in the decade of the 1980s sorted by author ID (Figure P7.70). Figure P7.70 Authors Born in the... What are the potential problems (perhaps more than one) with the following assembly language code fragment (implementing a subroutine) written to run on MARIE? The subroutine assumes that the... Describe a representation that could be used in a program to solve analogy problems like that in Figure 7.29. This class of problems was addressed by T. G. Evans (1968). The representation must be... Assume that $s0 is initialized to 11 and $s1 is initialized to 22. Suppose you executed the code below on a version of the pipeline from Section 4.6 that does not handle data hazards (i.e., the... A sequential circuit is given in Figure 4-13. Figure 4-13 (a) Add the necessary logic and/or connections to the circuit to provide an asynchronous reset to state A = 1, B = 0 for signal Reset = 0.... For the number sequence {e(k)}, Z E B () = (= + 1) (a) Apply the final-value theorem to E(z). (b) Check your result in part (a) by finding the inverse z-transform of E(z). (c) Repeat parts (a) and... Calculate the latency (from first bit sent to last bit received) for the following: (a) 10-Mbps Ethernet with a single store-and-forward switch in the path and a packet size of 5000 bits. Assume that...
Showing 3400 - 3500 of 5000