Show how you would implement a DO-WHILE statement using Little Man instructions.
Show carefully how you would implement an IF-ELSE statement using Little Man instructions.
Write a Little Man program that prints out the odd numbers from 1 to 99. No input is required.
Show the packed decimal format for the decimal number 129975.
In the Pink-Lemon-8 computer, real numbers are stored in the format SEEM M M M 8 where all the digits, including the exponent, are in octal. The exponent is stored excess-40 8 . The mantissa is...
Write a program in your favorite language that will convert all ASCII uppercase and lowercase letters to EBCDIC code. For an additional challenge, also convert the punctuation symbols, indicating...
(a) A system is represented by the ordinary differential equation dz(t)/dt = w(t) w(t 1) where w(t) is the input and z(t) the output. i. How is this system related to an averager having an...
A program for encoding and decoding arithmetic compression.
Write a method in Java to find the first address (network address) in the block when one of the addresses in the block is given as a string representing a CIDR notation.
Find the Laplace transform of the following signals and their region of convergence: (a) the reflection of the unit-step signal, i.e., u(t). And then use the result together with the Laplace...
Both TCP and RTP use sequence numbers. Do sequence numbers in these two protocols play the same role? Explain.
Are encoding and decoding of the multimedia data done by RTP? Explain.
Assume an image is sent from the source to the destination using 10 RTP packets. Can the first five packets define the encoding as JPEG and the last five packets define it as GIF?
UDP does not create a connection. How are different chunks of data, carried in different RTP packets, glued together?
The impulse response of an LTI is h(t) = r(t) 2r(t 1) + r(t 2) and the input is a sequence of impulses (a) Find the system output y(t)as the convolution integral of x(t) and h(t), and plot it for T =...
Assume an application program uses separate audio and video streams during an RTP session. How many SSRCs and CSRCs are used in each RTP packet?
In which situation, a unicast session or a multicast session, can feedback received from an RTCP packet about the session be handled more easily by the sender?
Consider the following functions Y i (s) = L[y i (t)], i = 1, 2 and 3, where {y i (t), i = 1, 2, 3} are the complete responses of differential equations with zero initial conditions. (a) For each of...
A periodic signal x(t), of fundamental frequency Ω 0 = Ï, has a period The signal x(t) is the input of an ideal low-pass filter with the frequency response H(jΩ) shown in...
Consider the Fourier series of two periodic signals (a) Let Ω 1 = Ω 0 , is z(t) = x(t) y(t) periodic? If so, what is its fundamental period and its Fourier series...
We want to use the Fourier series of a train of square pulses (done in the chapter) to compute the Fourier series of the triangular signal x(t)with a period x 1 (t) = r(t) 2r(t 1) + r(t 2) (a)...
Let x(t) = sin 2 (2t), a periodic signal of fundamental period T 0 = 0.5, and y(t) = |sin(2 t)|also periodic of the same fundamental period. (a) A trigonometric identity gives that x(t) = 0.5[1 ...
There are signals whose Fourier transforms cannot be found directly by either the integral definition or the Laplace transform. For instance, the sinc signal is one of them. (a) Let X(Ω)...
The Fourier transform of a signal x(t) is Use properties of the Fourier transform to (a) find the integral (b) Find the value x(0). (c) Let s=jΩ or Ω = (s/j), find X(s)...
Which of the following applications are classified as UBR in ATM? a. HTTP b. SNMP c. SMTP d. VoIP
Assume we devise a protocol with the packet size so large that it can carry all chunks of a live or real-time multimedia stream in one packet. Do we still need sequence numbers or timestamps for the...
The frequency response of an ideal low-pass filter is (a) Calculate the impulse response h(t) of the ideal low-pass filter. (b) If the input of the filter is a periodic signal x(t) having a Fourier...
The Fourier transform of a signal x(t) is (a) Carefully plot X(Ω)as function of . (b) Determine the value of x(0). [u(2 +T) u(S2 1)] X(2)
If the Fourier transform of the pulse x(t) given in Figure 5.14 is X(Ω) (do not need to compute it) (a) Using the properties of the Fourier transform (no integration needed) obtain the...
Both DNS servers and DHCP servers send your client PC an IP address. What is different about these two addresses?
After you get a second-level domain name, what more must you do to have a working website for your company?
Distinguish between dial-up telephone service you use as a consumer and leased line services used in business.
Consider finding the inverse Z-transform of (a) MATLAB does the partial fraction expansion as: while we do it in the following form: Show that the two partial fraction expansions give the same...
Give a counterexample to the conjecture that if a directed graph G contains a path from u to , then any depth-first search must result in .d u.f.
What are the four types of events that are considered possible indicators of actual incidents?
Suppose you receive the following two tables: DEPARTMENT (DepartmentName, BudgetCode) EMPLOYEE (EmployeeNumber, EmployeeLastName, EmployeeFirstName, Email, DepartmentName) and you conclude that...
Periodic signals can be generated by obtaining a period and adding shifted versions of this period. Suppose we wish to generate a train of triangular pulses. A period of the signal is x[n] = 0.5(r[n]...
Consider the following problems related to properties of filters. (a) Filters that operate under real-time conditions need to be causal, i.e., they can only process present and past inputs. When no...
Consider the relation: PERSON_2 (Name, Sibling, ShoeSize, Hobby) Assume that the following functional dependencies exist: Name Sibling Name ShoeSize Name Hobby Describe deletion, modification,...
You are testing a 1 volt. d.c. source and have the following measurements obtained from the source every minute starting at time 0 To find the average voltages for the first 5 min, i.e., to get rid...
Consider a discrete-time system with output y[n] given by y[n] = x[n] f[n] and x[n] is the input and f[n] is a function. (a) Let the input be x[n] = 4cos (n/2) and f[n] = cos (6n/7), < n < . Is x[n]...
In SCTP, a SACK chunk reports the receipt of three out-of-order data chunks and five duplicate data chunks. What is the total size of the chunk in bytes?
An output interface in a switch is designed using the leaky bucket algorithm to send 8000 bytes/s (tick). If the following frames are received in sequence, show the frames that are sent during each...
Explain how views can simplify the process of changing a table name.
Explain why the DBMS cannot be used to enforce required children.
What design decisions must be made to enforce required parents?
Explain what must be done for the DBMS to enforce required parents.
State which of the actions in Figure 6-29 must be applied for M-O relationships, O-M relationships, and M-M relationships.
Explain in general terms what needs to be done to enforce minimum cardinality.
Describe a MUST COVER constraint. Give an example other than one in this chapter.
A series RC circuit is connected to a voltage source v i (t), and the output is the voltage across the capacitor, v o (t). (a) Find the transfer function H(s) = V o (s)/V i (s) of this filter when...
In general, how are ternary relationships represented? Explain how a binary constraint may impact such a relationship.
Describe how to represent a 1:N recursive relationship. Give an example other than one in this chapter.
Describe how to represent an N:M recursive relationship. Give an example other than one in this chapter.
A definite advantage of the FFT is that it reduces considerably the computation in the convolution sum. Thus if x[n], 0 ¤ n ¤ N 1, is the input of an FIR filter with impulse response...
When designing discrete filters the specifications can be given in the time domain. One can think of converting the frequency domain specifications into the time domain. Assume you wish to obtain a...
An IIR filter is characterized by the following difference equation y[n] = 0.5y[n 1] + x[n] 2x[n 1], n 0, where x[n] is the input and y[n] the output of the filter. Let H(z) be the transfer...
The signal x[n] = 0.5 n (u[n] u[n 3]) is the input of a LTI system with an impulse response h[n] = (1/3) ([n] + [n 1] + [n 2]). (a) Determine the length of the output y[n]of the system. (b)...
Explain the difference between exclusive subtypes and inclusive subtypes. Give an example of each.
Describe the two phases in designing databases that arise from the development of new information systems.
Name the five DBMS products described in this chapter, and compare them in terms of power, features, and ease of use.
Write an SQL statement to display SKU_Description and SKU.
Write an SQL statement to display WarehouseID.
Write an SQL statement to display the SKU, SKU_Description, WarehouseID, WarehouseCity, and WarehouseState of all items not stored in the Atlanta, Bangor, or Chicago warehouse. Use the NOT IN keyword.
How is the knowledge needed to operate complex devices different from the knowledge needed to acquire and configure them?
What additional technical issues must be addressed when managing a computer center or campus-wide network compared with developing a single information system?
A continuous-time periodic signal x(t) with fundamental period T 0 = 2 has a period x 1 (t) = u(t) u(t 1). (a) Is x(t)a band-limited signal? Find the Fourier coefficients X k of x(t). (b) Would ...
We would like to find the Fourier series of a saw-tooth periodic signal x(t) of period T 0 =1. The period of x(t) is x 1 (t) = r(t) r(t 1) u(t 1) (a) Sketch x(t) and compute the Fourier...
The transfer function of a causal LTI system is (a) Find the ordinary differential equation that relates the system input x(t)to the system output y(t). (b) Find the input x(t)so that for initial...
List three types of technical information sources that an IS professional might use when researching a new storage technology and selecting specific products that incorporate that technology. Which...
What is a CPU? What are its primary components?
What are the registers? What are their functions?
What are the differences between primary and secondary storage?
How does a workstation differ from a desktop computer?
Consider the impulse response of a LTI system h(t) = e at [u(t) u(t 1)] a >0. (a) Obtain the transfer function H(s). (b) Find the poles and zeros of H(s). (c) Is lim a0 H(s) equal to (d) Indicate how...
How does a supercomputer differ from a mainframe computer?
What the normally used for servers?
What is Groschs Law? Does it hold today? Why or why not?
How can a computer system be tuned to a particular application?
What characteristics differentiate application software from system software?
Why has the development of system software paralleled the development of computer hardware?
Your computer sends a DNS request message to your local DNS server. After an unusually long time, your computer receives a DNS response message that the host name in your request message does not...
What shortcomings of electrical computation will optical computing devices address?
Why is binary data representation and signaling the preferred method of computer hardware implementation?
What is the numeric range of a 16-bit twos complement value? A 16-bit excess notation value? A 16-bit unsigned binary value?
What is overflow? What is underflow? How can the probability of their occurrence be minimized?
Why are real numbers more difficult to represent and process than integers?
a. What happens in each stage of the PlanProtectRespond cycle? 2a.) Firewall operation takes place during the _______ phase. a. Plan b. Protect c. Response d. None of the above b. Which stage...
Why might a programmer choose to represent a data item in IEEE binary128 floating-point format instead of IEEE binary64 floating-point format? What additional costs might be incurred at runtime (when...
Why doesnt a CPU evaluate the expression 'A' = 'a' as true?
What is a data structure? List several types of common data structures.
What is an address? What is a pointer? What purpose are they used for?
How does a class differ from other data structures?
Describe the operation of a MOVE instruction. Why is the name move a misnomer?
Why does program execution speed generally increase as the number of general-purpose registers increases?
How does a RISC processor differ from a CISC processor? Is one processor type better than the other? Why or why not?
What factors account for the dramatic improvements in microprocessor clock rates over the past three decades?
What potential advantages do optical processors offer compared with electrical processors?
Which is the better measure of computer system performance a benchmark, such as SPEC CINT, or a processor speed measure, such as GHz, MIPS, or MFLOPS? Why?
In what way(s) is/are SSDs an improvement over magnetic disk drives? In what way(s) isn't/aren't they an improvement over magnetic disk drives?