This question is based on successful execution of the following command: CREATE VIEW changename AS SELECT customer#, lastname, firstname FROM customers WITH CHECK OPTION; Assume that the only...
A network manager decides to replace the old router that connects the organization to the Internet with a more powerful one. What area of network management is involved here?
Write a program for Horizon Phones, a provider of cellular phone service. Prompt a user for maximum monthly values for talk minutes used, text messages sent, and gigabytes of data used, and then...
Create a new concrete class that implements MyMap using open addressing with linear probing. For simplicity, use f(key) = key % size as the hash function, where size is the hash-table size....
a. Write a JavaFX application that displays a Label containing the opening sentence or two from your favorite book. Save the project as FXBookQuote1a. b. Add a button to the frame in the FXBookQuote...
Let S = {a, b, c, d, e, f, g} be a collection of objects with benefit-weight values, a: (12, 4), b : (10, 6), c : (8, 5), d: (11, 7), e: (14, 3), f : (7, 1), g : (9, 6). What is an optimal solution...
Design a class hierarchy to represent syntax trees for the CFG of Figure 4.5. Provide a method in each class to return the value of a node. Provide constructors that play the role of the make_leaf,...
Which of the following operators has the lowest precedence? a. Multiplication b. Remainder c. Subtraction d. Division
For the following C statement, what is the corresponding MIPS assembly code? Assume that the C variables f, g, and h, have already been placed in registers $s0, $s1, and $s2, respectively. Use a...
The design of a pump and pipe system has been completed, except for the valves. The system is used to transport water at 120F through 2 nom sch 40 commercial steel pipe at a required flow rate of 85...
In a LAN with a link-layer switch (Figure 1.8b), Host 1 wants to send a message to Host 3. Since communication is through the link-layer switch, does the switch need to have an address? Explain....
In Figure 15.24, two wireless networks, BSS1 and BSS2, are connected through a wired distribution system (DS), an Ethernet LAN. Assume station A in BSS1 needs to send a data frame to station C in...
What is the reason that Bluetooth is normally called a wireless personal area network (WPAN) instead of a wireless local area network (WLAN)?
Write C# statements to accomplish each of the following tasks: a) Assign the sum of x and y to z, and increment x by 1 with ++. Use only one statement and ensure that the original value of x is used...
a. Write an application that counts by five from 5 through 500 inclusive, and that starts a new line after every multiple of 50 (50, 100, 150, and so on). Save the file as CountByFives.java. b....
Write an application that stores nine integers in an array. Display the integers from first to last, and then display the integers from last to first. Save the file as NineInts.java.
Write an application that displays a series of at least five student ID numbers (that you have stored in an array) and asks the user to enter a numeric test score for the student. Create a...
Design a 4-bit ALU to perform the following operations: Assume that A is a 4-bit number. Draw a logic diagram using a binary adder, multiplexers, and inverters as necessary. S 0 1 F Logical Left...
A file named MAINTENANCE03-01.txt is included with your downloadable student files. Assume that this program is a working program in your organization and that it needs modifications as described in...
If you havent done so already, do the Try this exercises from this chapter.
Write an abstract data type for complex numbers, including operations for addition, subtraction, multiplication, division, extraction of each of the parts of a complex number, and construction of a...
For each student group, list the number of tutors who have been matched with that group.
Calculate the effective bandwidth for the following cases. For (a) and (b), assume there is a steady supply of data to send; for (c), simply calculate the average over 12 hours. (a) 10-Mbps Ethernet...
In a BSS with no AP (ad hoc network), we have five stations: A, B, C, D, and E. Station A needs to send a message to station B. Answer the following questions for the situation where the network is...
In a cellular system, with 7-cell clusters, has the following average number pf calls at a given time: Cell number Average number of calls/unit time...
a. Write an application containing an array of 15 String values (that are not originally in alphabetical order), and display them in ascending order. Save the file as StringSort.java. b. Write an...
A reliable way to discover which of two classes is the base class and which is the subclass is to ____________. a. Look at the class size b. Try saying the two class names together c. Use...
Create a TeeShirt class for Tobys Tee Shirt Company. Fields include an order number, size, color, and price. Create set methods for the order number, size, and color and get methods for all four...
Open the Martins Solution.sln file contained in the VB2017\AppC\Martins Solution folder. Use what you learned in the appendix to debug the application.
Write a method, shuffle(A), that rearranges the elements of array A so that every possible ordering is equally likely. You may rely on the nextInt(n) method of the java.util.Random class, which...
In this exercise, you will create a program that displays the gross pay for one or more employees. If necessary, create a new project named Introductory17 Project, and save it in the Cpp8\Chap09...
Develop a pseudocode algorithm for the isEmpty operation, assuming that there is not a count variable.
Suppose that a program has been written that produces the output shown in the previous problem. Now the author wants the program to be scalable using a class constant called SIZE The previous output...
Write a program that fills in table names in a combo box, as shown in Figure 35.7b. You can select a table from the combo box to display its contents in a table view. |Exercise35_04 X Table Name...
Explore three CASE tools that provide the ability to draw the four basic DFD symbols and describe what you liked and disliked about each tool.
Determine the equivalent spring constant for the system shown in Figure 5.119. elle elle elle K3 elle Ty FIGURE 5.119 Problem 1.
Calculate the time necessary to perform a multiply using the approach given in Figure 3.7 if an integer is 8 bits wide and an adder takes 4 time units. Figure 3.7 Mplier31 Mcand Mplier30 Mcand...
Using the code in Table 10.2, what is the dataword if each of the following codewords is received? Table 10.2 a. 01011 b. 11111 c. 00000 d. 11011 Table 10.2 Simple parity-check code C(5, 4) Dataword...
An ISP is granted the block 80.70.56.0/21. The ISP needs to allocate addresses for two organizations each with 500 addresses, two organizations each with 250 addresses, and three organizations each...
What are the differences between the JOINUSING and JOINON approaches for joining tables?
Use the following SELECT statement to answer 1 SELECT customer#, COUNT(*) 2 FROM customers JOIN orders USING (customer#) 3 WHERE orderdate > '02-APR-09' 4 GROUP BY customer# 5 HAVING COUNT(*) > 2;...
Which of the following statements is correct? a. If the subquery returns only a NULL value, the only records returned by an outer query are those containing an equivalent NULL value. b. A...
This question is based on successful execution of the following statement: CREATE VIEW changeaddress AS SELECT customer#, lastname, firstname, order#, shipstreet, shipcity, shipstate, shipzip FROM...
Suppose that a state realization has the following matrices Find the corresponding transfer function and verify it using the function ss2tf. Obtain a minimal realization of this system. Draw a block...
Place the PERSON relation in Review Question 3.52 into 4NF.
Give an example of a multivalue, multicolumn table other than one discussed in this chapter.
1. Draw a network diagram that summarizes the systems described above; devices used by administrators, staff, instructors, and students; and the network connections among them. Assume that the...
Assume that a gallon of paint covers about 350 square feet of wall space. Create an application with a main() method that prompts the user for the length, width, and height of a rectangular room....
Write a program that declares two LocalDate objects and assign values that represent January 31 and December 31 in the current year. Display output that demonstrates the dates displayed when one,...
Write an application that prompts the user for three first names and concatenates them in every possible two-name combination so that new parents can easily compare them to find the most pleasing...
In this exercise, you modify one of the Projected Sales applications from this chapters Apply lesson. Use Windows to make a copy of the Projected Sales Solution folder. Rename the copy Modified...
Draw an ASM chart for the following state diagram of Figure P5.33: Assume that the system stays in initial state T 0 when control input c = 0 and input X = 1. The sequence of operations is started...
If we exclude isomorphic trees (see Exercise C-8.33), exactly how many proper binary trees exist with exactly 4 leaves? Exercise C-8.33 Two ordered trees T and T are said to be isomorphic if one of...
Answer the following questions so as to justify Theorem 2.7. a. Draw a binary tree with height 7 and maximum number of external nodes. b. What is the minimum number of external nodes for a binary...
Suppose we have a social network with members A, B, C, D, E, F, and G, and the set of friendship ties, {(A, B),(B,C),(C, A),(D, E),(F, G)}. What are the connected components?
(a) Describe in English the language defined by the regular expression a* ( b a* b a* )*. Your description should be a high-level characterization one that would still make sense if we were using a...
Draw an example using the five integers (12, 23, 1, 45, 9) of how a stack could be used to reverse the order (9, 45, 1, 23, 12) of these elements.
Write a method called split that rearranges the elements of a list so that all of the negative values appear before all of the nonnegatives. For example, suppose a variable list stores the values [8,...
Figure 12-27 shows two typical executions of a program that displays a large V on the screen after the user enters a height. Write a program that passes the following values to a recursive method...
In previous chapters, you have created a number of programs for Yummy Catering. Now, create an interactive GUI program that allows the user to enter the number of guests for an event into a text...
Consider a system with the transfer function Equation 2-84 Y(z) G() = 2(3) = 2 (2-1) U (a) Find three different state-variable models of this system. (b) Verify the transfer function of each state...
Consider the system of Problem 2.10-2. A similarity transformation on these equations yields d w(k+ 1) = y (k) = C(k) 22 w(k)+ Bu(k) d (a) Find d, and d. (b) Find a similarity transformation that...
Show that if d(n) is O( f (n)), then ad(n) is O( f (n)), for any constant a > 0.
Assume we need to create codewords that can automatically correct a one-bit error. What should the number of redundant bits (r) be, given the number of bits in the dataword (k)? Remember that the...
Use the fact database and patron collection created in the text for use with MongoDB. Write a query to retrieve the _id, display name and age of students that have checked out a book in the cloud...
Create a new user account. The account name should be a combination of your first initial and your last name.
As seen in the previous problem, the Fourier series is one of a possible class of representations in terms of orthonormal functions. Consider the case of the Walsh functions which are a set of...
You have a number of trucks with which to deliver a set of packages. Each package starts at some location on a grid map, and has a destination somewhere else. Each truck is directly controlled by...
There are 12 inches in a foot and 3 feet in a yard. Create a class named InchConversion. Its main() method accepts a value in inches from a user at the keyboard, and in turn passes the entered value...
Write an application that displays the factorial for every integer value from 1 to 10. A factorial of a number is the product of that number multiplied by each positive integer lower than it. For...
a. Create a class named Purchase. Each Purchase contains an invoice number, amount of sale, and amount of sales tax. Include set methods for the invoice number and sale amount. Within the set()...
Write, compile, and test a class that displays the pattern shown in Figure 1-26. Save the class as Triangle.java. TTT TTTTTTI T T TIT
Simplify each of the following Boolean equations. Sketch a reasonably simple combinational circuit implementing the simplified equation. (a) (b) (c) Y = ABC+BC +BC Y = (A+B+C)D+AD+B
Listing 20.7, DirectorySize.java, gives a recursive method for finding a directory size. Rewrite this method without using recursion. Your program should use a queue to store the subdirectories under...
A multimap is data structure that allows for multiple values to be associated with the same key. It has a put(k, v) method, which inserts an item with key k and value v even if there is already an...
Choose a sport such as baseball or football and describe the actions in one limited play period (such as an at-bat in baseball or a possession in football) using a structured flowchart or pseudocode.
A two-dimensional array declared as num myArray[6][7] has _____ columns. a. 5 b. 6 c. 7 d. 8
Write an application that lets you determine the integer value returned by the InputEvent method getModifiers() when you click your left, right, orif you have onemiddle mouse button on a JFrame. Save...
In the postfix expression evaluation example, the two most recent operands are popped when an operator is encountered so that the subexpression can be evaluated. The first operand popped is treated...
Create a graphical application that provides a button for push and pop from a stack, a text field to accept a string as input for push, and a text area to display the contents of the stack after each...
Consider the boolean expression((x > 10) || (x < 100)). Why is this expression probably not what the programmer intended?
Describe the activities performed by the project manager during project planning.
What is information systems analysis and design?
A generic method _________________. a. Must have a type parameter that represents a reference type b. Must return a generic parameter c. Must have an empty body that is created at runtime d. Can have...
Convert 5ED4 into a binary number. What makes base 16 (hexadecimal) an attractive numbering system for representing values in computers?
The presentation of data is becoming more and more important in todays Internet. Some people argue that the TCP/IP protocol suite needs to add a new layer to take care of the presentation of data. If...
A simple parity-check bit, which is normally added at the end of the word (changing a 7-bit ASCII character to a byte), cannot detect even numbers of errors. For example, two, four, six, or eight...
Suppose the length of a 10Base5 cable is 2500 m. If the speed of propagation in a thick coaxial cable is 200,000,000 m/s, how long does it take for a bit to travel from the beginning to the end of...
In an 802.11 network, station A sends one data frame (not fragmented) to station B. What would be the value of the D field (in microseconds) that needs to be set for the NAV period in each of the...
Assume that our network never corrupts, loses, or duplicates packets. We are only concerned about flow control. We do not want the sender to overwhelm the receiver with packets. Design an FSM to...
Answer the following questions related to the FSMs for the Go-back-N protocol with m = 6 bits. Assume the window size is 63. (Figure 23.27):
Assume the HTTP client in the previous problem sends a request of 100 bytes. The server responds with a segment of 1200 bytes. Show the contents of the two segments exchanged between the client and...
In TCP, assume a client has 100 bytes to send. The client creates 10 bytes at a time in each 10 ms and delivers them to the transport layer. The server acknowledges each segment immediately or if a...
Modify, compile, and test the client program in Table 25.13 and the server program in Table 25.12 to do the following: The client program needs to read the request string from a file and store the...
Based on the following query: SELECT P_CODE, P_DESCRIPT, P_QOH, P_PRICE, V_CODE FROM PRODUCT WHERE P_QOH < P_MIN AND P_MIN = P_REORDER AND P_REORDER = 50; ORDER BY P_QOH; Use the recommendations...
Use the JustLee Books database to perform the following activity: There are three major classifications for employees who dont work for the Information Systems Department of JustLee Books: account...
Which of the following functions can be used to display the character string FLORIDA in the query results whenever FL is entered in the State field? a. SUBSTR b. NVL2 c. REPLACE d. TRUNC e. None of...
Which of the following SQL statements determines how many total customers were referred by other customers? a. SELECT customer#, SUM (referred) FROM customers GROUP BY customer#; b. SELECT COUNT...
Consider an antenna transmitting a power of 5 W at 900 MHz. Calculate the received power at a distance of 2 km if propagation is taking place in free space.
Consider the example in this chapter in which we enter and add two numbers. Suppose we had stored the first input entry in mailbox location 00. Would the program have produced the same result? What...