Top Selling Computer science Questions

a. What leased line do you need if you have a capacity requirement for 2 Gbps? b. For 500 Mbps? c. For the situation in Figure 3-9, what leased line would the link require? d. Repeat for Figure 3-12.... What is Oracle Database Express Edition 11g Release 2? a. Write a JavaFX application that contains a Button. Disable the Button after the user clicks it. Save the project as FXFrameDisableButton2a. b. Modify the FXFrameDisableButton program so that the... Draw an example of a graph with 10 vertices and 15 edges that has a vertex cover of size 2. Write a single C statement that corresponds to the two MIPS assembly instructions below. add f, g, h add f, i, f For these problems, the table holds some C code. You will be asked to evaluate these C code statements in MIPS assembly code. How many MIPS instructions does it take to implement the C code? If the... We have defined the parameter a as the number of frames that can fit the medium between two stations, or a = (T p )/(T fr ). Another way to define this parameter is a = L b /F b , in which L b is the... Assume the HTTP client in the previous problem closes the connection and, at the same time, acknowledges the bytes received in the response from the server. After receiving the FIN segment from the... In SCTP, the following is a dump of a DATA chunk in hexadecimal format. 00000015 00000005 0003000A 00000000 48656C6C 6F000000 a. Is this an ordered or unordered chunk? b. Is this the first, the last,... In ADSL service, there is a single UTP pair running from the end office switch to the individual household. In cable in the neighborhood is shared by many subscribers. Yet, typically, cable modem... Suppose, for a data approximation application, you are given a set of n points in the plane and you would like to partition these points into two sets, A and B, such that each point in A is as close... Design and implement an application that reads a sentence from the user and prints the sentence with the characters of each word backward. Use a stack to reverse the characters of each word. A 20% ethylene glycol solution is flowing through a 4-nom sch 80 commercial steel pipe. The pipe is 350 ft long and is horizontal. The pressure drop through the pipe is 4 psi. The ethylene glycol is... Assume that the network in Figure 20.34 (previous problem) uses distancevector routing with the forwarding table as shown for each node. If each node periodically announces their vectors to the... An HTTP client opens a TCP connection using an initial sequence number (ISN) of 14,534 and the ephemeral port number of 59,100. The server opens the connection with an ISN of 21,732. Show the three... Which of the following SQL statements is not valid? a. SELECT b.isbn, p.name FROM books b NATURAL JOIN publisher p; b. SELECT isbn, name FROM books b, publisher p WHERE b.pubid = p.pubid; c. SELECT... Which of the following SQL statements is not valid? a. SELECT isbn FROM books MINUS SELECT isbn FROM orderitems; b. SELECT isbn, name FROM books, publisher WHERE books.pubid (+) = publisher.pubid(+);... Use the following SELECT statement to answer. 1 SELECT customer#, COUNT(*) 2 FROM customers JOIN orders USING (customer#) 3 WHERE orderdate > '02-APR-09' 4 GROUP BY customer# 5 HAVING COUNT(*) > 2;... The transmission power is 40 W, under a free-space propagation model, (a) What is the transmission power in unit of dBm? (b) The receiver is in a distance of 1000 m; what is the received power,... Why is the study of database technology important? Create an application containing an array that stores eight integers. The application should call five methods that in turn (1) Display all the integers, (2) Display all the integers in reverse... Consider memory storage of a 32-bit word stored at memory word 42 in a byte-addressable memory.(a) What is the byte address of memory word 42?(b) What are the byte addresses that memory word 42... For the following code: lbu $t0, 0($t1) sw $t0, 0($t2) Assume that the register $t1 contains the address 0x10000000 and the data at address is 0x11223344. 1. What value is stored in 0x10000004 on a... Implement the following C code in MIPS assembly. What is the total number of MIPS instructions needed to execute the function int fib(int n){ if (n==0) return 0; else if (n 1) == return 1; else... Using your code from Exercise 2.43 as an example, explain what happens when two processors begin to execute this critical section at the same time, assuming that each processor executes exactly one... In Figure 9.5, show the process of frame change in routers R1 and R2. Figure 9.5 Figure 7.5 UTP connector 12345678 2343678 RJ-45 Female RJ-45 Male Use the following SELECT statement to answer. 1 SELECT customer#, COUNT(*) 2 FROM customers JOIN orders USING (customer#) 3 WHERE orderdate > '02-APR-09' 4 GROUP BY customer# 5 HAVING COUNT(*) > 2;... This question is based on successful execution of the following statement: CREATE VIEW changeaddress AS SELECT customer#, lastname, firstname, order#, shipstreet, shipcity, shipstate, shipzip FROM... This question is based on successful execution of the following statement: CREATE VIEW changeaddress AS SELECT customer#, lastname, firstname, order#, shipstreet, shipcity, shipstate, shipzip FROM... This question is based on successful execution of the following command: CREATE VIEW changename AS SELECT customer#, lastname, firstname FROM customers WITH CHECK OPTION; Assume that the only... This question is based on successful execution of the following command: CREATE VIEW changename AS SELECT customer#, lastname, firstname FROM customers WITH CHECK OPTION; Assume that the only... This question is based on successful execution of the following command: CREATE VIEW changename AS SELECT customer#, lastname, firstname FROM customers WITH CHECK OPTION; Assume that the only... A network manager decides to replace the old router that connects the organization to the Internet with a more powerful one. What area of network management is involved here? Write a program for Horizon Phones, a provider of cellular phone service. Prompt a user for maximum monthly values for talk minutes used, text messages sent, and gigabytes of data used, and then... In this exercise, you will complete the Moonbucks application that you created in Exercise 2 in Chapter 2. a. Use Windows to copy the Moonbucks Solution folder from the VB2017\Chap02 folder to the... Create a new concrete class that implements MyMap using open addressing with linear probing. For simplicity, use f(key) = key % size as the hash function, where size is the hash-table size.... a. Write a JavaFX application that displays a Label containing the opening sentence or two from your favorite book. Save the project as FXBookQuote1a. b. Add a button to the frame in the FXBookQuote... Let S = {a, b, c, d, e, f, g} be a collection of objects with benefit-weight values, a: (12, 4), b : (10, 6), c : (8, 5), d: (11, 7), e: (14, 3), f : (7, 1), g : (9, 6). What is an optimal solution... A file named MAINTENANCE03-01.txt is included with your downloadable student files. Assume that this program is a working program in your organization and that it needs modifications as described in... Design a class hierarchy to represent syntax trees for the CFG of Figure 4.5. Provide a method in each class to return the value of a node. Provide constructors that play the role of the make_leaf,... Which of the following operators has the lowest precedence? a. Multiplication b. Remainder c. Subtraction d. Division For the following C statement, what is the corresponding MIPS assembly code? Assume that the C variables f, g, and h, have already been placed in registers $s0, $s1, and $s2, respectively. Use a... Consider the op-amp described in Problem 14.1. In addition, the maximum output current of the op-amp is \(\pm 15 \mathrm{~mA}\). The resistors used in the configuration are \(R_{2}=160 \mathrm{k}... In a LAN with a link-layer switch (Figure 1.8b), Host 1 wants to send a message to Host 3. Since communication is through the link-layer switch, does the switch need to have an address? Explain.... In Figure 15.24, two wireless networks, BSS1 and BSS2, are connected through a wired distribution system (DS), an Ethernet LAN. Assume station A in BSS1 needs to send a data frame to station C in... What is the reason that Bluetooth is normally called a wireless personal area network (WPAN) instead of a wireless local area network (WLAN)? Write C# statements to accomplish each of the following tasks: a) Assign the sum of x and y to z, and increment x by 1 with ++. Use only one statement and ensure that the original value of x is used... a. Write an application that counts by five from 5 through 500 inclusive, and that starts a new line after every multiple of 50 (50, 100, 150, and so on). Save the file as CountByFives.java. b.... Write an application that stores nine integers in an array. Display the integers from first to last, and then display the integers from last to first. Save the file as NineInts.java. Write an application that displays a series of at least five student ID numbers (that you have stored in an array) and asks the user to enter a numeric test score for the student. Create a... Design a 4-bit ALU to perform the following operations: Assume that A is a 4-bit number. Draw a logic diagram using a binary adder, multiplexers, and inverters as necessary. S 0 1 F Logical Left... a. Design the logic for a program that allows a user to enter 20 numbers, then displays each number and its difference from the numeric average of the numbers entered. b. Modify the program in... If you havent done so already, do the Try this exercises from this chapter. Write an abstract data type for complex numbers, including operations for addition, subtraction, multiplication, division, extraction of each of the parts of a complex number, and construction of a... For each student group, list the number of tutors who have been matched with that group. We need to swap the following registers. Do this using block moves. Before r1 r2 r3 r4 r5 r6 r7 After r3 r4 r5 r6 r7 r1 r2 Calculate the effective bandwidth for the following cases. For (a) and (b), assume there is a steady supply of data to send; for (c), simply calculate the average over 12 hours. (a) 10-Mbps Ethernet... Consider the RL circuit shown in Figure 6.25, in which \(R=35 \Omega\) and \(L=10 \mathrm{H}\). When the switch is closed at 0 seconds, the circuit is driven by a 6 V DC voltage source. Assume that... In a BSS with no AP (ad hoc network), we have five stations: A, B, C, D, and E. Station A needs to send a message to station B. Answer the following questions for the situation where the network is... In a cellular system, with 7-cell clusters, has the following average number pf calls at a given time: Cell number Average number of calls/unit time... a. Write an application containing an array of 15 String values (that are not originally in alphabetical order), and display them in ascending order. Save the file as StringSort.java. b. Write an... A reliable way to discover which of two classes is the base class and which is the subclass is to ____________. a. Look at the class size b. Try saying the two class names together c. Use... Create a TeeShirt class for Tobys Tee Shirt Company. Fields include an order number, size, color, and price. Create set methods for the order number, size, and color and get methods for all four... Open the Martins Solution.sln file contained in the VB2017\AppC\Martins Solution folder. Use what you learned in the appendix to debug the application. Write a method, shuffle(A), that rearranges the elements of array A so that every possible ordering is equally likely. You may rely on the nextInt(n) method of the java.util.Random class, which... In this exercise, you will create a program that displays the gross pay for one or more employees. If necessary, create a new project named Introductory17 Project, and save it in the Cpp8\Chap09... Assume you have created a mechanical arm that can hold a pen. The arm can perform the following tasks: Lower the pen to a piece of paper. Raise the pen from the paper. Move the pen 1 inch along a... Develop a pseudocode algorithm for the isEmpty operation, assuming that there is not a count variable. Suppose that a program has been written that produces the output shown in the previous problem. Now the author wants the program to be scalable using a class constant called SIZE The previous output... Write a program that fills in table names in a combo box, as shown in Figure 35.7b. You can select a table from the combo box to display its contents in a table view. |Exercise35_04 X Table Name... Explore three CASE tools that provide the ability to draw the four basic DFD symbols and describe what you liked and disliked about each tool. Select one element of poor GUI design in a program you have used. Describe how you would improve the design. How long (max) will it take for the output of a 74ALS00 to go HIGH after its input goes LOW? Determine the equivalent spring constant for the system shown in Figure 5.119. elle elle elle K3 elle Ty FIGURE 5.119 Problem 1. Calculate the time necessary to perform a multiply using the approach given in Figure 3.7 if an integer is 8 bits wide and an adder takes 4 time units. Figure 3.7 Mplier31 Mcand Mplier30 Mcand... Using the code in Table 10.2, what is the dataword if each of the following codewords is received? Table 10.2 a. 01011 b. 11111 c. 00000 d. 11011 Table 10.2 Simple parity-check code C(5, 4) Dataword... An ISP is granted the block 80.70.56.0/21. The ISP needs to allocate addresses for two organizations each with 500 addresses, two organizations each with 250 addresses, and three organizations each... What are the differences between the JOINUSING and JOINON approaches for joining tables? Use the following SELECT statement to answer 1 SELECT customer#, COUNT(*) 2 FROM customers JOIN orders USING (customer#) 3 WHERE orderdate > '02-APR-09' 4 GROUP BY customer# 5 HAVING COUNT(*) > 2;... Which of the following statements is correct? a. If the subquery returns only a NULL value, the only records returned by an outer query are those containing an equivalent NULL value. b. A... This question is based on successful execution of the following statement: CREATE VIEW changeaddress AS SELECT customer#, lastname, firstname, order#, shipstreet, shipcity, shipstate, shipzip FROM... As seen in the previous problem, the Fourier series is one of a possible class of representations in terms of orthonormal functions. Consider the case of the Walsh functions which are a set of... Suppose that a state realization has the following matrices Find the corresponding transfer function and verify it using the function ss2tf. Obtain a minimal realization of this system. Draw a block... Place the PERSON relation in Review Question 3.52 into 4NF. Give an example of a multivalue, multicolumn table other than one discussed in this chapter. 1. Draw a network diagram that summarizes the systems described above; devices used by administrators, staff, instructors, and students; and the network connections among them. Assume that the... Assume that a gallon of paint covers about 350 square feet of wall space. Create an application with a main() method that prompts the user for the length, width, and height of a rectangular room.... Write a program that declares two LocalDate objects and assign values that represent January 31 and December 31 in the current year. Display output that demonstrates the dates displayed when one,... Write an application that prompts the user for three first names and concatenates them in every possible two-name combination so that new parents can easily compare them to find the most pleasing... In this exercise, you modify one of the Projected Sales applications from this chapters Apply lesson. Use Windows to make a copy of the Projected Sales Solution folder. Rename the copy Modified... Draw an ASM chart for the following state diagram of Figure P5.33: Assume that the system stays in initial state T 0 when control input c = 0 and input X = 1. The sequence of operations is started... If we exclude isomorphic trees (see Exercise C-8.33), exactly how many proper binary trees exist with exactly 4 leaves? Exercise C-8.33 Two ordered trees T and T are said to be isomorphic if one of... Answer the following questions so as to justify Theorem 2.7. a. Draw a binary tree with height 7 and maximum number of external nodes. b. What is the minimum number of external nodes for a binary... Suppose we have a social network with members A, B, C, D, E, F, and G, and the set of friendship ties, {(A, B),(B,C),(C, A),(D, E),(F, G)}. What are the connected components? If productCost and productPrice are numeric variables, and productName is a string variable, which of the following statements are valid assignments? If a statement is not valid, explain why not. Choose a sport such as baseball or football and describe the actions in one limited play period (such as an at-bat in baseball or a possession in football) using a structured flowchart or pseudocode. Assume that the following variables contain the values shown: numberBig = 100 numberMedium = 10 numberSmall = 1 wordBig = "Constitution" wordMedium = "Dance" wordSmall = "Toy For each of the... (a) Describe in English the language defined by the regular expression a* ( b a* b a* )*. Your description should be a high-level characterization one that would still make sense if we were using a... Write an S-attributed attribute grammar, based on the CFG of, that accumulates the value of the overall expression into the root of the tree. You will need to use dynamic memory allocation so that... Draw an example using the five integers (12, 23, 1, 45, 9) of how a stack could be used to reverse the order (9, 45, 1, 23, 12) of these elements.
Showing 800 - 900 of 5000