Question Answers
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Tutor
AI Flashcards
FREE
Search
Search
Sign In
Register
study help categories
/
Computer science
Top Selling Computer science Questions
What is the purpose of an IP address mask?Suppose an IP address is identified as 222.44.66.88/24. What is the network address in this case? What is the host address? How many hosts can this network...
Clusters and networks are both categorized as loosely coupled systems, but they serve different purposes. Explain the differences in purpose between clusters and networks.
Clearly and carefully discuss each of the advantages of clustering.
Obtain information and compare the features, capabilities, performance, and operational methods between Windows Server, Linux, and IBM zSeries clustering techniques.
Explain how the three primary conditions required for DMA described in Chapter 9 of the text are met by the I/O channel architecture.
Explain why it is easy to perform read and write in place on a disk but not on a tape.
Consider the interface between a computer and a printer. For a typical printout, it is clearly impractical to send output data to the printer one byte or one word at a time (especially over a...
Show how you would implement a DO-WHILE statement using Little Man instructions.
Show carefully how you would implement an IF-ELSE statement using Little Man instructions.
Write a Little Man program that prints out the odd numbers from 1 to 99. No input is required.
Show the packed decimal format for the decimal number 129975.
In the Pink-Lemon-8 computer, real numbers are stored in the format SEEM M M M 8 where all the digits, including the exponent, are in octal. The exponent is stored excess-40 8 . The mantissa is...
Write a program in your favorite language that will convert all ASCII uppercase and lowercase letters to EBCDIC code. For an additional challenge, also convert the punctuation symbols, indicating...
In wireless communications, the effects of multi-path significantly affect the quality of the received signal. Due to the presence of buildings, cars, etc. between the transmitter and the receiver...
Consider now the Doppler effect in wireless communications. The difference in velocity between the transmitter and the receiver causes a shift in frequency in the signal, which is called the Doppler...
A program for encoding and decoding arithmetic compression.
Write a method in Java to find the first address (network address) in the block when one of the addresses in the block is given as a string representing a CIDR notation.
Both TCP and RTP use sequence numbers. Do sequence numbers in these two protocols play the same role? Explain.
Find the Laplace transform of the following signals and their region of convergence: (a) the reflection of the unit-step signal, i.e., u(t). And then use the result together with the Laplace...
Are encoding and decoding of the multimedia data done by RTP? Explain.
Assume an image is sent from the source to the destination using 10 RTP packets. Can the first five packets define the encoding as JPEG and the last five packets define it as GIF?
UDP does not create a connection. How are different chunks of data, carried in different RTP packets, glued together?
Assume an application program uses separate audio and video streams during an RTP session. How many SSRCs and CSRCs are used in each RTP packet?
In which situation, a unicast session or a multicast session, can feedback received from an RTCP packet about the session be handled more easily by the sender?
The impulse response of an LTI is h(t) = r(t) 2r(t 1) + r(t 2) and the input is a sequence of impulses (a) Find the system output y(t)as the convolution integral of x(t) and h(t), and plot it for T =...
The following problems consider approaches to stabilize an unstable system. (a) An unstable system can be stabilized by using negative feedback with a gain Kin the feedback loop. For instance...
Consider the following functions Y i (s) = L[y i (t)], i = 1, 2 and 3, where {y i (t), i = 1, 2, 3} are the complete responses of differential equations with zero initial conditions. (a) For each of...
A periodic signal x(t), of fundamental frequency Ω 0 = Ï, has a period The signal x(t) is the input of an ideal low-pass filter with the frequency response H(jΩ) shown in...
Consider the Fourier series of two periodic signals (a) Let Ω 1 = Ω 0 , is z(t) = x(t) y(t) periodic? If so, what is its fundamental period and its Fourier series...
We want to use the Fourier series of a train of square pulses (done in the chapter) to compute the Fourier series of the triangular signal x(t)with a period x 1 (t) = r(t) 2r(t 1) + r(t 2) (a)...
Let x(t) = sin 2 (2t), a periodic signal of fundamental period T 0 = 0.5, and y(t) = |sin(2 t)|also periodic of the same fundamental period. (a) A trigonometric identity gives that x(t) = 0.5[1 ...
There are signals whose Fourier transforms cannot be found directly by either the integral definition or the Laplace transform. For instance, the sinc signal is one of them. (a) Let X(Ω)...
The Fourier transform of a signal x(t) is Use properties of the Fourier transform to (a) find the integral (b) Find the value x(0). (c) Let s=jΩ or Ω = (s/j), find X(s)...
Which of the following applications are classified as UBR in ATM? a. HTTP b. SNMP c. SMTP d. VoIP
Assume we devise a protocol with the packet size so large that it can carry all chunks of a live or real-time multimedia stream in one packet. Do we still need sequence numbers or timestamps for the...
The frequency response of an ideal low-pass filter is (a) Calculate the impulse response h(t) of the ideal low-pass filter. (b) If the input of the filter is a periodic signal x(t) having a Fourier...
The Fourier transform of a signal x(t) is (a) Carefully plot X(Ω)as function of . (b) Determine the value of x(0). [u(2 +T) u(S2 1)] X(2)
If the Fourier transform of the pulse x(t) given in Figure 5.14 is X(Ω) (do not need to compute it) (a) Using the properties of the Fourier transform (no integration needed) obtain the...
Both DNS servers and DHCP servers send your client PC an IP address. What is different about these two addresses?
After you get a second-level domain name, what more must you do to have a working website for your company?
Distinguish between dial-up telephone service you use as a consumer and leased line services used in business.
Consider finding the inverse Z-transform of (a) MATLAB does the partial fraction expansion as: while we do it in the following form: Show that the two partial fraction expansions give the same...
The Pade approximant provides an exact matching of M + N 1 values of h[n], where M and N are the orders of the numerator and denominator of the rational approximation. But there is no method for...
Give a counterexample to the conjecture that if a directed graph G contains a path from u to , then any depth-first search must result in .d u.f.
What are the four types of events that are considered possible indicators of actual incidents?
We are given a noisy signal x(t) = s(t) + η(t) where s(t) is the desired signal and η(t) is additive noise. From experience, we know that the average power of the desired...
Periodic signals can be generated by obtaining a period and adding shifted versions of this period. Suppose we wish to generate a train of triangular pulses. A period of the signal is x[n] = 0.5(r[n]...
Suppose you receive the following two tables: DEPARTMENT (DepartmentName, BudgetCode) EMPLOYEE (EmployeeNumber, EmployeeLastName, EmployeeFirstName, Email, DepartmentName) and you conclude that...
Consider the relation: PERSON_2 (Name, Sibling, ShoeSize, Hobby) Assume that the following functional dependencies exist: Name Sibling Name ShoeSize Name Hobby Describe deletion, modification,...
You are testing a 1 volt. d.c. source and have the following measurements obtained from the source every minute starting at time 0 To find the average voltages for the first 5 min, i.e., to get rid...
Consider a discrete-time system with output y[n] given by y[n] = x[n] f[n] and x[n] is the input and f[n] is a function. (a) Let the input be x[n] = 4cos (n/2) and f[n] = cos (6n/7), < n < . Is x[n]...
In SCTP, a SACK chunk reports the receipt of three out-of-order data chunks and five duplicate data chunks. What is the total size of the chunk in bytes?
An output interface in a switch is designed using the leaky bucket algorithm to send 8000 bytes/s (tick). If the following frames are received in sequence, show the frames that are sent during each...
Explain how views can simplify the process of changing a table name.
A series RC circuit is connected to a voltage source v i (t), and the output is the voltage across the capacitor, v o (t). (a) Find the transfer function H(s) = V o (s)/V i (s) of this filter when...
Explain why the DBMS cannot be used to enforce required children.
What design decisions must be made to enforce required parents?
Explain what must be done for the DBMS to enforce required parents.
A definite advantage of the FFT is that it reduces considerably the computation in the convolution sum. Thus if x[n], 0 ¤ n ¤ N 1, is the input of an FIR filter with impulse response...
When we pad an aperiodic signal with zeros, we are improving its frequency resolution, i.e., the more zeros we attach to the original signal the better the frequency resolution, as we obtain the...
State which of the actions in Figure 6-29 must be applied for M-O relationships, O-M relationships, and M-M relationships.
Explain in general terms what needs to be done to enforce minimum cardinality.
Describe a MUST COVER constraint. Give an example other than one in this chapter.
In general, how are ternary relationships represented? Explain how a binary constraint may impact such a relationship.
When designing discrete filters the specifications can be given in the time domain. One can think of converting the frequency domain specifications into the time domain. Assume you wish to obtain a...
Describe how to represent a 1:N recursive relationship. Give an example other than one in this chapter.
Describe how to represent an N:M recursive relationship. Give an example other than one in this chapter.
An IIR filter is characterized by the following difference equation y[n] = 0.5y[n 1] + x[n] 2x[n 1], n 0, where x[n] is the input and y[n] the output of the filter. Let H(z) be the transfer...
The signal x[n] = 0.5 n (u[n] u[n 3]) is the input of a LTI system with an impulse response h[n] = (1/3) ([n] + [n 1] + [n 2]). (a) Determine the length of the output y[n]of the system. (b)...
Explain the difference between exclusive subtypes and inclusive subtypes. Give an example of each.
Describe the two phases in designing databases that arise from the development of new information systems.
Name the five DBMS products described in this chapter, and compare them in terms of power, features, and ease of use.
Write an SQL statement to display SKU_Description and SKU.
Write an SQL statement to display WarehouseID.
Write an SQL statement to display the SKU, SKU_Description, WarehouseID, WarehouseCity, and WarehouseState of all items not stored in the Atlanta, Bangor, or Chicago warehouse. Use the NOT IN keyword.
If we wish to preserve low frequencies components of the input, a low-pass Butterworth filter could perform better than a Chebyshev filter. MATLAB provides a second Chebyshev filter function cheby2...
How is the knowledge needed to operate complex devices different from the knowledge needed to acquire and configure them?
What additional technical issues must be addressed when managing a computer center or campus-wide network compared with developing a single information system?
List three types of technical information sources that an IS professional might use when researching a new storage technology and selecting specific products that incorporate that technology. Which...
What is a CPU? What are its primary components?
A continuous-time periodic signal x(t) with fundamental period T 0 = 2 has a period x 1 (t) = u(t) u(t 1). (a) Is x(t)a band-limited signal? Find the Fourier coefficients X k of x(t). (b) Would ...
What are the registers? What are their functions?
What are the differences between primary and secondary storage?
How does a workstation differ from a desktop computer?
How does a supercomputer differ from a mainframe computer?
What the normally used for servers?
We would like to find the Fourier series of a saw-tooth periodic signal x(t) of period T 0 =1. The period of x(t) is x 1 (t) = r(t) r(t 1) u(t 1) (a) Sketch x(t) and compute the Fourier...
The transfer function of a causal LTI system is (a) Find the ordinary differential equation that relates the system input x(t)to the system output y(t). (b) Find the input x(t)so that for initial...
Consider the impulse response of a LTI system h(t) = e at [u(t) u(t 1)] a >0. (a) Obtain the transfer function H(s). (b) Find the poles and zeros of H(s). (c) Is lim a0 H(s) equal to (d) Indicate how...
What is Groschs Law? Does it hold today? Why or why not?
How can a computer system be tuned to a particular application?
What characteristics differentiate application software from system software?
Why has the development of system software paralleled the development of computer hardware?
What shortcomings of electrical computation will optical computing devices address?
Why is binary data representation and signaling the preferred method of computer hardware implementation?
What is the numeric range of a 16-bit twos complement value? A 16-bit excess notation value? A 16-bit unsigned binary value?
What is overflow? What is underflow? How can the probability of their occurrence be minimized?
Why are real numbers more difficult to represent and process than integers?
Why might a programmer choose to represent a data item in IEEE binary128 floating-point format instead of IEEE binary64 floating-point format? What additional costs might be incurred at runtime (when...
Why doesnt a CPU evaluate the expression 'A' = 'a' as true?
Showing 3900 - 4000
of 5000
First
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
Last