All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer sciences
operating system
Questions and Answers of
Operating System
Explain the difference between functional dependencies that arise from equations and those that do not.
The MTBF concept for software is open to criticism. Explain why?
Rewrite Fig. 7.2 so that the size of the array is specified by the first command-line argument. If no command-line argument is supplied, use 10 as the default size of the array.
Design a class to represent a credit card. Think about the attributes of a credit card; that is, what data is on the card? What behaviors might be reasonable for a credit card? Use the answers to
Consider a class PersonAddress that represents an entry in an address book. Its attributes are • The first name of the person • The last name of the person • The e-mail address of the
Consider a program that will keep track of the items in a school's library. Draw a class hierarchy, including a base class, for the different kinds of items. Be sure to also consider items that
Consider the following relation: CAR_SALE(Car#, Date_sold, Salesperson#, Commission%, Discount_amt) Assume that a car may be sold by multiple salespeople, and hence {Car#, Salesperson#} is the
When should a modular design be implemented as monolithic software? How can this be accomplished? Is performance the only justification for implementation of monolithic software?
Suppose the function f expects two numeric values as its inputs and returns the smaller of the two values as its output value. If w, x, y, and z represent numeric values, what is the result returned
Create a VB application that lets the user enter his or her weight (in pounds) and height (in inches). If the user fails to enter numeric values, display an appropriate error message and do not
List five resources to which a multitasking operating system might have to coordinate access.
How does iSCSI handle the process of authentication? Research the available options.
Consider the following decompositions for the relation schema R of Exercise 15.24. Determine whether each decomposition has (1) the dependency preservation property, and (2) the lossless join
Discuss the advantages and disadvantages of supporting links to files that cross mount points (that is, the file link refers to a file that is stored in a different volume).
What would be the encoded version of the message? xxy yyx xxy xxy yyx If LZW compression, starting with the dictionary containing x, y, and a space (as described in Section 1.8), were used?
If you have a PC, identify some situations in which you can take advantage of its multitasking capabilities.
What directory structure is described by the path X/Y/Z?
An application specifies a requirement of 200 GB to host a database and other files. It also specifies that the storage environment should support 5,000 IOPS during its peak workloads. The disks
Design an EER schema for a database application that you are interested in. Specify all constraints that should hold on the database. Make sure that the schema has at least five entity types, four
Repeat Programming Project 10 of Chapter 2, but include input checking Display the change only if a valid price is entered (no less than 25 cents, no more than 100 cents, and an integer multiple of 5
Why are normal forms alone insufficient as a condition for a good schema design?
Suppose three items R, S, and T are placed in a queue in that order. Then one item is removed from the queue before a fourth item, X, is placed in the queue. Then one item is removed from the queue,
How does the navigation model differ from the interaction model?
Consider a class that keeps track of the sales of an item. An object of this class will have the attributes • Number sold • Total sales • Total discounts • Cost per item • Bulk quantity •
The following table represents the addresses and contents (using hexadecimal notation) of some cells in a machine's main memory. Starting with this memory arrangement, follow the sequence of
Many programs written with inheritance could be written with composition instead, and vice versa. Rewrite class Base Plus Commission Employee (Fig. 9.11) of the Commission Employee-Base Plus
Write an alternate SQL statement that modifies your answer to Review Question 7.7 to make the relationship between EMPLOYEE and ASSIGNMENT a 1:1 relationship. Review Question 7.7; Write a CREATE
Rewrite the following WHERE clause without the use of the IN special operator. WHERE V_STATE IN ('TN', 'FL', 'GA')
Apply Algorithm 16.2(a) to the relation in Exercise 15.24 to determine a key for R. Create a minimal set of dependencies G that is equivalent to F, and apply the synthesis algorithm (Algorithm 16.6)
Suppose a digital camera has a storage capacity of 256MB. How many photographs could be stored in the camera if each consisted of 1024 pixels per row and 1024 pixels per column if each pixel required
From the following list, extract a collection of numbers whose sum is 3165. How efficient is your approach to the problem? 26, 39, 104, 195, 403, 504, 793, 995, 1156, 1677
The table below represents a stack stored in a contiguous block of memory cells, as discussed in the text. If the base of the stack is at address 10 and the stack pointer contains the value 12, what
Discuss some types of database utilities and tools and their functions.
Assume that in a particular augmentation of a remote-file-access protocol, each client maintains a name cache that caches translations from file names to corresponding file handles. What issues
Decode the following bit patterns using the floating-point format discussed in the text: a. 01001010 b. 01101101 c. 00111001 d. 11011100 e. 10101011
A bag of cookies holds 40 cookies. The calorie information on the bag claims that there are 10 servings in the bag and that a serving equals 300 calories. Create a VB application that lets the user
What is "good enough" software? Name a specific company and specific products that you believe were developed using the good enough philosophy.
Write a method that parses a binary number as a string into a decimal integer. The method header is as follows: public static int binary to Decimal(String binaryString) For example, binary string
Draw an inheritance hierarchy for students at a university similar to the hierarchy shown in Fig. 9.2. Use Student as the superclass of the hierarchy then extend Student with classes Undergraduate
Identify the components of the following URL and describe the meaning of each. http://lifeforms.com/animals/moviestars/kermit.html
Create an application that stores data about your DVD collection in a file. The application should have a structure to hold the following fields: Video Name, Year Produced, Running Time, and Rating.
Using the template presented in Section 5.5.2, suggest one or more analysis pattern for the following application domains: a. E-mail software b. Internet browsers c. Word-processing software
List in chronological order the major events that take place when a process is interrupted.
What is UML and what is it used for? Elaborate on the word corresponding to the "M."
Design a database for your model. Your design should include a specification of tables and attributes as well as primary, candidate, and foreign keys. Also specify how you will enforce minimum
An Oracle database uses a block size of 4 KB for its I/O operation. The application that uses this database primarily performs a sequential read operation. Suggest and explain the appropriate values
Marcia Wilson owns and operates Marcia's Dry Cleaning, which is an upscale dry cleaner in a well-to-do suburban neighborhood. Marcia makes her business stand out from the competition by providing
Write a pseudocode algorithm that determines the batting average of a baseball player.
DAS provides an economically viable alternative to other storage networking solutions. Justify this statement.
Why should an MTU value of at least 2,500 bytes be configured in a bridged iSCSI environment?
Consider the following relational database for the Super Baseball League. It keeps track of teams in the league, coaches and players on the teams, work experience of the coaches, bats belonging to
You are hired by Expressimo Delivery Service to develop an application that computes the delivery charge. The company allows two types of packaging-letter and box-and three types of service-Next Day
What are the benefits of using multiple HBAs on a host?
Consider a class motorboat that represents motorboats. A motorboat has attributes for • The capacity of the fuel tank • The amount of fuel in the tank • The maximum speed of the boat • The
Write a program that uses a scanner to report some statistics about words in an input sentence (see Section 7.8). The outputs should be the number of words in the sentence, the average word length,
The following are instructions written in the machine language described in Appendix C. Translate them into English.a. 7123b. 40E1c. A304d. B100e. 2BCD
Consider the following relational database that Best Airlines uses to keep track of its mechanics, their skills, and their airport locations. Mechanic number, airport name, and skill number are all
Why is SCSI performance superior to that of IDE/ATA? Explain the reasons from an architectural perspective.
Suppose a computer contained 512MB (MiB) of main memory, and an operating system needed to create a virtual memory of twice that size using pages of 2KB (KiB). How many pages would be required?
Find the GPS locations for Atlanta, Georgia; Orlando, Florida; Savannah, Georgia; and Charlotte, North Carolina from www.gps-data-team.com/map/ and compute the estimated area enclosed by these four
Write a Python program that allows the user to enter a four-digit binary number and displays its value in base 10. Each binary digit should be entered one per line, starting with the leftmost digit
Encode the following sentences in ASCII using one byte per character. a. Does 100 / 5 = 20? b. The total cost is $7.25.
Classify each of the following instructions (in the machine language of Appendix C) in terms of whether its execution changes the contents of the memory cell at location 3B, retrieves the contents of
Which type of application benefits the most by bypassing write cache? Justify your answer. Discuss.
If a flaw in an operating system's security allows a malicious programmer to gain unauthorized access to sensitive data, to what extent should the developer of the operating system be held
Write a Java method getLetterGrade that is based on the grading scale of Project 7-3. This method expects the numeric grade as a parameter and returns a string representing the letter grade. The
Write an SQL statement to join EMPLOYEE, ASSIGNMENT, and PROJECT using the JOIN ON syntax. Run this statement.
Assume that Marcia has created a database with the tables described at the end of Chapter 7:CUSTOMER (Customer, First Name, Last Name, Phone, Email)INVOICE (Invoice Number, CustomerID, Date In, Date
Describe the six clauses in the syntax of an SQL retrieval query. Show what type of constructs can be specified in each of the six clauses. Which of the six clauses are required and which are
Specify the minimum type(s) of operation(s) the database must support (remote request, remote transaction, distributed transaction, or distributed request) to perform the following operations:At site
You have been appointed a project manager for a small software products company. Your job is to build a breakthrough product that combines virtual reality hardware with state-of-the-art software.
Draw a class diagram representing a book defined by the following statement: "A book is composed of a number of parts, which in turn are composed of a number of chapters. Chapters are composed of
How does file-level virtualization ensure non-disruptive file mobility?
Write a program that allows students to schedule appointments at either 1, 2,3,4,5, or 6, o'clock pm. Use an array of six strings to store the names for the time slots. Write a loop that iterates as
Rewrite the following program segment using a repeat structure rather than a while structure. Be sure the new version prints the same values as the original. Count ← 2; while (Count < 7) do (print
Describe the process of assigning an FC address to a node when logging on to the network for the first time.
Design a class named QuadraticEquation for a quadratic equation ax2 + bx + x = 0. The class contains:• The private data fields a, b, and c that represent three coefficients.• A constructor for
Assuming a 1-KB page size, what are the page numbers and offsets for the following address references (provided as decimal numbers): a. 3085 b. 42095 c. 215201 d. 650000 e. 2000001
Suppose the memory cells at addresses F0 through FD in the machine described in Appendix C contain the following (hexadecimal) bit patterns: Address Contents F0 ............................. 20 F1
Suppose the address of an end system on the Internet is quoted as 134.48.4.122. What is the 32-bit address in hexadecimal notation?
Summarize the following rat's-nest routine with a single if-then-else statement: if X > 5 then go to 80 X = X + 1 goto 90 80 X = X + 2 90 stop
Why is the First Law of System Engineering true? Provide specific examples for each of the four fundamental reasons for change.
Does "refactoring" mean that you modify the entire design iteratively? If not, what does it mean?
What are the four elements that exist when an effective SCM system is implemented? Discuss each briefly.
"Unreasonable" deadlines are a fact of life in the software business. How should you proceed if you're faced with one?
Rewrite Exercise 1.11 to prompt the user to enter the number of years and displays the population after that many years. Here is a sample run of the program: Enter the number of years: 5 The
What problem arises as the lengths of the time slices in a multiprogramming system are made shorter and shorter? What about as they become longer and longer?
Modify the HTML document below so that the word "Rover" is linked to the document whose URL is animals.org/pets/ dogs.html
Seventeen switches, with 16 ports each, are connected in a full mesh topology. How many ports are available for host and storage connectivity?
Write a recursive method printArray that displays all the elements in an array of integers, separated by spaces. Here is the template public class Print { // call helper function to do work public
Suppose a small company has five employees and is planning to increase the number to six. Moreover, suppose one of the company's programs contained the following assignment statements. DailySalary =
The following pseudocode algorithm has an error. The program is supposed to ask the user for the length and width of a rectangular room, and then display the room's area. The program must multiply
A movie theater only keeps a percentage of the revenue earned from ticket sales. The remainder goes to the distributor. Write a program that calculates a theater's gross and net box office profit for
1. TRUE or FALSE? In order to be classified as a "computer," a device must have a keyboard and display screen. 2. TRUE or FALSE? A bus is a collection of wires that carry information as electrical
Describe the difference between hardware and software and identify two examples of each type?
Describe the three essential components of a computer that make up the von Neumann architecture. How do these components work together to produce a machine that can be programmed to complete
Modern computers integrate several different types of memory, such as cache, RAM, hard disk, and floppy disk. Why are different types of memory used, as opposed to the exclusive use of a particular
Computer memory is usually grouped in bytes, which consist of 8 bits each. How many different values can be represented using a byte? How many different values can be represented using two bytes?
The Intel Core 2 Duo is an example of a processor, or CPU, as are the Celeron and PowerPC. List the two main tasks that the CPU performs in controlling the computer's workings and provide a short
In what units are CPU speeds measured, and what does this measurement unit refer to? If one computer has a 2 GHz Celeron D processor and another has a 2 GHz PowerPC processor, does that imply they
Showing 800 - 900
of 1171
1
2
3
4
5
6
7
8
9
10
11
12