How does Java distinguish between IPv4 and IPv6 addresses?
How is an IP address represented in Java?
In Figure 25.12 in the text, how is the socket created for data transfer at the server site? Figure 25.12 Figure 25.12 Socket data structure Length Family Port number IP address Family Type Protocol...
Explain which entity provides service and which one receives service in the client-server paradigm.
Write a program to make the UDP client program in Table 25.2 more generic to be able to send any request created by the client program. Table 25.2 Echo client program using UDP I/ UDP echo client...
Assume we want to make the TCP client program in Table 25.2 more generic to be able to send a string and to handle the response received from the server. Show how this can be done. Table 25.2 Echo...
Write a program to make the TCP client program in Table 25.4 more generic to be able to send any request created by the program. Table 25.4 Echo client program using TCP 1 / TCP echo client program 2...
A source socket address is a combination of an IP address and a port number. Explain what each section identifies.
Can a host use a TELNET client to get services provided by other clientserver applications such as FTP or HTTP?
In FTP, a user (Maria) wants to move a file named file1 from /usr/users/report directory to the directory /usr/top/letters. Note that this is a case of renaming a file. We first need to give the name...
The TELNET application has no commands such as those found in FTP or HTTP to allow the user to do something such as transfer a file or access a web page. In what way can this application be useful?
In FTP, a user (Jan) wants to make a new directory called Jan under the directory/usr/usrs/letters. Show all of the commands and responses.
Assume a TELNET client uses ASCII to represent characters, but the TELNET server uses EBCDIC to represent characters. How can the client log into the server when character representations are...
In FTP, a user (Jane) wants to retrieve an EBCDIC file named huge from /usr/users/report directory using the ephemeral port 61017. The file is so large that the user wants to compress it before it is...
Alice has been on a long trip without checking her e-mail. She then finds out that she has lost some e-mails or attachments her friends claim they have sent to her. What can be the problem?
In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no session layer. But an application-layer protocol can include some of the features defined in this layer if needed. Does...
Are the HELO and MAIL FROM commands both necessary in SMTP? Why or why not?
Both HTTP and FTP can retrieve a file from a server. Which protocol should we use to download a file?
Using RFC 1939, assume a POP3 client is in the download-and-keep mode. Show the transaction between the client and the server if the client has only two messages of 192 and 300 bytes to download from...
Can we have a control connection without a data-transfer connection in FTP? Explain.
Does FTP have a message format for exchanging files or a list of directories/files during the file-transfer connection?
Does FTP have a message format for exchanging commands and responses during control connection?
Encode the following message in quoted-printable: 01001111 10101111 01110001
FTP can transfer files between two hosts using different operating systems with different file formats. What is the reason?
In FTP, can a server get the list of the files or directories from the client?
In FTP, can a server retrieve a file from the client site?
In SMTP, a sender sends unformatted text. Show the MIME header.
In FTP, which entity (client or server) starts (actively opens) the control connection? Which entity starts (actively opens) the data transfer connection?
FTP uses the services of TCP for exchanging control information and data transfer. Could FTP have used the services of UDP for either of these two connections? Explain.
In SMTP, a. a non-ASCII message of 1000 bytes is encoded using base64. How many bytes are in the encoded message? How many bytes are redundant? What is the ratio of redundant bytes to the total...
FTP uses two separate well-known port numbers for control and data connection. Does this mean that two separate TCP connections are created for exchanging control information and data?
When an HTTP server receives a request message from an HTTP client, how does the server know when all headers have arrived and the body of the message is to follow?
Alice has a video clip that Bob is interested in getting; Bob has another video clip that Alice is interested in getting. Bob creates a web page and runs an HTTP server. How can Alice get Bobs clip?...
In HTTP, draw a figure to show the application of cookies in a scenario in which the server allows only the registered customer to access the server.
We have input stream classes in Java. Can you explain why the TCP client program does not directly use these classes to create the input stream?
What is the difference between the Data gram Socket class and the Socket class in Java?
Write a statement in Java to extract the port number of an InetSocketAddress named sockAd.
Write a statement in Java to extract the InetAddress of an InetSocketAddress named sockAd.
In Figure 25.15, assume that the request is a URL to retrieve a picture. How is the URL stored in the recvBuff? Figure 25.15 Figure 25.15 Design of the UDP server Server application program Process...
In Figure 25.16, what changes are needed if a client needs to send a message other than a string (a picture, for example). Figure 25.16 Figure 25.16 Design of the UDP Client Client application...
Write a statement in Java to create a socket address bound to the host with domain name some.com and a client process with port number 51000.
Write a statement in Java to create a socket address bound to the local host and the ephemeral port number 56000.
A socket address is the combination of an IP address and a port number that defines an application program running on a host. Can we create an instance of the InetSocketAddress class with an IP...
Write a statement in Java that stores the port number 62230 in a variable in Java and guarantees that the number is stored as an unsigned number.
You want to write a program in which you need to refer to the InetAddress of the computer you are working with. Write a statement in Java to create the corresponding object.
You think that a computer with the IP address 14.26.89.101 has more IP addresses. Write a statement in Java to create an array of InetAddress classes associated with this host.
Assume that we make an enhancement to a computer that improves some mode of execution by a factor of 10. Enhanced mode is used 50% of the time, measured as a percentage of the execution time when the...
Create the relational diagram. Use the database shown in Figure P3.24 to answer this Problem. ROBCOR is an aircraft charter company that supplies on-demand charter flight services using a fleet of...
Using your schools student information system, print your class schedule. The schedule probably would contain the student identification number, student name, class code, class name, class credit...
What are the three types of results a subquery can return?
What does it mean to say that SQL operators are set-oriented?
Suppose that you have two tables, EMPLOYEE and EMPLOYEE_1. The EMPLOYEE table contains the records for three employees: Alice Cordoza, John Cretchakov, and Anne McDonald. The EMPLOYEE_1 table...
Use the database composed of the two tables shown in Figure Q3.18. Suppose you wanted quick lookup capability to get a listing of all plays directed by a given director. Which table would be the...
Use the database composed of the two tables shown in Figure Q3.18. What would be the conceptual view of the INDEX table that is described in question 26? Depict the contents of the conceptual INDEX...
What MS Access/SQL Server function should you use to calculate the number of days between the current date and January 25, 1999?
Use the following brief description of operations as the source for the next database design: All aircraft owned by ROBCOR require periodic maintenance. When maintenance is required, a maintenance...
You have just been employed by the ROBCOR Trucking Company to develop a database. To gain a sense of the databases intended functions, you have spent some time talking to ROBCORs employees and youve...
Convert the following relational database tables to the equivalent OO conceptual representation. Explain each of your conversions with the help of a diagram. The R&C Stores database includes the...
Convert the following relational database tables to the equivalent OO conceptual representation. Explain each of your conversions with the help of a diagram. ) The Avion Sales database includes the...
One proposed solution for the problem of false sharing is to add a valid bit per word. This would allow the protocol to invalidate a word without removing the entire block, letting a processor keep a...
Which of the following is not an E-R model relationship? a. Some-to-many b. One-to-one c. One-to-many d. Many-to-many
Which of the following represents a field in a table? a. A record b. A row c. A column d. An entity
A college needs to track placement test scores for incoming students. Each student can take a variety of tests, including English and math. Some students are required to take placement tests because...
What are the two required clauses for a SELECT statement?
Create a list of authors that displays the last name followed by the first name for each author. The last names and first names should be separated by a comma and a blank space.
Modify the Job_class column of the EMPLOYEES table so that it allows storing a maximum width of two characters.
Rename the EMPLOYEES table as JL_EMPS.
Delete the BOOK_PRICING table permanently so that it isnt moved to the recycle bin. Delete the JL_EMPS table so that it can be restored. Restore the JL_EMPS table and verify that its available again.
What is the difference between a PRIMARY KEY constraint and a UNIQUE constraint?
Which of the following data dictionary objects should be used to view information about the constraints in a database? a. USER_TABLES b. USER_RULES c. USER_COLUMNS d. USER_CONSTRAINTS e. None of the...
Create a table named BOOK_STORES to include the columns listed in the following chart.
When do changes generated by DML operations become stored in database tables permanently?
Explain the difference between explicit and implicit locks.
Create a table named REP_CONTRACTS containing the columns listed in the following chart. A composite PRIMARY KEY constraint including the Rep_ID, Store_ID, and Quarter columns should be assigned. In...
If you add a record to the wrong table, whats the simplest way to remove the record from the table?
How does Oracle 12c identify a substitution variable in an SQL command?
How are NULL values included in a new record being added to a table?
When should the VALUES clause be omitted from the INSERT INTO command?
What happens if a user attempts to add data to a table, and the addition would cause the record to violate an enabled constraint?
Create a script using substitution variables that allows a user to set a new cost amount for a book based on the ISBN.
What command is used to modify an index?
What is the purpose of a synonym?
Which of the following generates an integer in a sequence? a. NEXTVAL b. CURVAL c. NEXT_VALUE d. CURR_VALUE e. NEXT_VAL f. CUR_VAL
Answer each of the following questions using the Colonial Adventure Tours data shown in Figures 1-15 through 1-19. No computer work is required. 1. List the last name of each guide that does not live...
Suppose the user Juan creates a table called MYTABLE with four columns. The first column has a PRIMARY KEY constraint, the second column has a NOT NULL constraint, the third column has a CHECK...
Given the table created in Question 6, which of the following commands can Juan use to create a synonym that allows anyone to access the table without having to identify his schema in the table...
What is a primary key? What is the primary key for each table in the Colonial Adventure Tours database shown in Figures 1-15 through 1-19 in Chapter 1? Figure 1-15 GuideNum LastName FirstName Address...
When is creating an index manually inappropriate? a. When queries return a large percentage of rows in the results b. When the table is small c. When the majority of table operations are updates d....
In the TAL Distributors database shown in Figure 2-1, the Rep table contains four rows and the Customer table contains 12 rows. How many rows would be contained in the Cartesian product of these two...
What does a database account with the CREATE SESSION privilege allow the user to do?
List the changes you would need to make in your answer to Question 7 if they could have more than one advisor.
Create a private synonym that enables you to reference the MY_FIRST_SEQ object as NUMGEN.
Use a SELECT statement to view the CURRVAL of NUMGEN. Delete the NUMGEN synonym and MY_FIRST_SEQ.
What is a privilege?
How can you assign a password to a role?
Which of the following commands can be used to change a password for a user account? a. ALTER PASSWORD b. CHANGE PASSWORD c. MODIFY USER PASSWORD d. ALTER USERPASSWORD e. None of the above
What is meant by concurrent update?
Which of the following statements creates a user account named DeptHead? a. CREATE ROLE depthead IDENTIFIED BY apassword; b. CREATE USER depthead IDENTIFIED BY apassword; c. CREATE ACCOUNT depthead;...
How do views relate to security?