Assume we need to create codewords that can automatically correct a one-bit error. What should the number of redundant bits (r) be, given the number of bits in the dataword (k)? Remember that the...
Modify, compile, and test the client program in Table 25.13 and the server program in Table 25.12 to do the following: The client program needs to read the request string from a file and store the...
Use the fact database and patron collection created in the text for use with MongoDB. Write a query to retrieve the _id, display name and age of students that have checked out a book in the cloud...
Create a new user account. The account name should be a combination of your first initial and your last name.
You have a number of trucks with which to deliver a set of packages. Each package starts at some location on a grid map, and has a destination somewhere else. Each truck is directly controlled by...
There are 12 inches in a foot and 3 feet in a yard. Create a class named InchConversion. Its main() method accepts a value in inches from a user at the keyboard, and in turn passes the entered value...
Write an application that displays the factorial for every integer value from 1 to 10. A factorial of a number is the product of that number multiplied by each positive integer lower than it. For...
a. Create a class named Purchase. Each Purchase contains an invoice number, amount of sale, and amount of sales tax. Include set methods for the invoice number and sale amount. Within the set()...
Write, compile, and test a class that displays the pattern shown in Figure 1-26. Save the class as Triangle.java. TTT TTTTTTI T T TIT
In this exercise, you will complete the Restaurant Tip application from Chapter 2s Focus on the Concepts lesson. The applications Planning Chart is shown in Figure 3-34. a. Use either a flowchart or...
Simplify each of the following Boolean equations. Sketch a reasonably simple combinational circuit implementing the simplified equation. (a) (b) (c) Y = ABC+BC +BC Y = (A+B+C)D+AD+B
Listing 20.7, DirectorySize.java, gives a recursive method for finding a directory size. Rewrite this method without using recursion. Your program should use a queue to store the subdirectories under...
A multimap is data structure that allows for multiple values to be associated with the same key. It has a put(k, v) method, which inserts an item with key k and value v even if there is already an...
Draw a structured flowchart or write pseudocode that describes the process of guessing a number between 1 and 100. After each guess, the player is told that the guess is too high or too low. The...
Design a flowchart or pseudocode for a program that accepts two numbers from a user and displays one of the following messages: First is larger , Second is larger , Numbers are equal .
Design the logic for a program that outputs every number from 1 through 15.
A two-dimensional array declared as num myArray[6][7] has _____ columns. a. 5 b. 6 c. 7 d. 8
a. Create the logic for a program that calculates and displays the amount of money you would have if you invested $5000 at 2 percent simple interest for one year. Create a separate method to do the...
Design a class named Computer that holds the make, model, and amount of memory of a computer. Include methods to set the values for each data field, and include a method that displays all the values...
Complete the following tasks: a. Design a class named BaseballGame that has fields for two team names and a final score for each team. Include methods to set and get the values for each data field....
Complete the following tasks: a. Create a class named Order that performs order processing of a single item. The class has four fields: customer name, customer number, quantity ordered, and unit...
Write an application that lets you determine the integer value returned by the InputEvent method getModifiers() when you click your left, right, orif you have onemiddle mouse button on a JFrame. Save...
Consider the following pseudocode, assuming nested subroutines and static scope: (a) What does this program print? (b) Show the frames on the stack when A has just been called. For each frame, show...
In the postfix expression evaluation example, the two most recent operands are popped when an operator is encountered so that the subexpression can be evaluated. The first operand popped is treated...
Create a graphical application that provides a button for push and pop from a stack, a text field to accept a string as input for push, and a text area to display the contents of the stack after each...
Consider the boolean expression((x > 10) || (x < 100)). Why is this expression probably not what the programmer intended?
Describe the activities performed by the project manager during project planning.
What is information systems analysis and design?
A generic method _________________. a. Must have a type parameter that represents a reference type b. Must return a generic parameter c. Must have an empty body that is created at runtime d. Can have...
Problems in this exercise refer to the following sequence of instructions, and assume that it is executed on a five-stage pipelined datapath: add $s3, $s1, $s0 lw $s2, 4($s3) lw $s1, 0($s4) or $s2,...
Consider the op-amp described in Problem 14.1. In addition, the maximum output current of the op-amp is \(\pm 15 \mathrm{~mA}\). The resistors used in the configuration are \(R_{2}=160 \mathrm{k}...
Convert 5ED4 into a binary number. What makes base 16 (hexadecimal) an attractive numbering system for representing values in computers?
The presentation of data is becoming more and more important in todays Internet. Some people argue that the TCP/IP protocol suite needs to add a new layer to take care of the presentation of data. If...
A simple parity-check bit, which is normally added at the end of the word (changing a 7-bit ASCII character to a byte), cannot detect even numbers of errors. For example, two, four, six, or eight...
Suppose the length of a 10Base5 cable is 2500 m. If the speed of propagation in a thick coaxial cable is 200,000,000 m/s, how long does it take for a bit to travel from the beginning to the end of...
In an 802.11 network, station A sends one data frame (not fragmented) to station B. What would be the value of the D field (in microseconds) that needs to be set for the NAV period in each of the...
Assume that our network never corrupts, loses, or duplicates packets. We are only concerned about flow control. We do not want the sender to overwhelm the receiver with packets. Design an FSM to...
Answer the following questions related to the FSMs for the Go-back-N protocol with m = 6 bits. Assume the window size is 63. (Figure 23.27):
Assume the HTTP client in the previous problem sends a request of 100 bytes. The server responds with a segment of 1200 bytes. Show the contents of the two segments exchanged between the client and...
In TCP, assume a client has 100 bytes to send. The client creates 10 bytes at a time in each 10 ms and delivers them to the transport layer. The server acknowledges each segment immediately or if a...
Based on the following query: SELECT P_CODE, P_DESCRIPT, P_QOH, P_PRICE, V_CODE FROM PRODUCT WHERE P_QOH < P_MIN AND P_MIN = P_REORDER AND P_REORDER = 50; ORDER BY P_QOH; Use the recommendations...
Use the JustLee Books database to perform the following activity: There are three major classifications for employees who dont work for the Information Systems Department of JustLee Books: account...
Which of the following functions can be used to display the character string FLORIDA in the query results whenever FL is entered in the State field? a. SUBSTR b. NVL2 c. REPLACE d. TRUNC e. None of...
Which of the following SQL statements determines how many total customers were referred by other customers? a. SELECT customer#, SUM (referred) FROM customers GROUP BY customer#; b. SELECT COUNT...
Consider an antenna transmitting a power of 5 W at 900 MHz. Calculate the received power at a distance of 2 km if propagation is taking place in free space.
Consider the example in this chapter in which we enter and add two numbers. Suppose we had stored the first input entry in mailbox location 00. Would the program have produced the same result? What...
Consider a periodic signal x(t) with fundamental period T 0 =1 and a period x 1 (t) = 0.5t[u(t) u(t 1)]. (a) Consider the derivative g(t) = dx(t)/dt. Indicate if g(t) is periodic and if so give its...
Suppose that in a Bayesian network containing an unobserved variable Y, all the variables in the Markov blanket MB(Y) have been observed. a. Prove that removing the node Y from the network will not...
In each case, determine the problem and fix the errors. After you correct the errors, save each file using the same filename preceded with Fix. For example, DebugOne1.java will become...
Write an application that prompts a user for two integers and displays every integer between them. Display a message if there are no integers between the entered values. Make sure the program works...
Write a program that inserts parentheses, a space, and a dash into a string of 10 user-entered numbers to format it as a phone number. For example, 5153458912 becomes (515) 345-8912. If the user does...
Write an application that accepts a word from a user and converts it to Pig Latin. If a word starts with a consonant, the Pig Latin version removes all consonants from the beginning of the word and...
a. The mean of a list of numbers is its arithmetic average. The median of a list is its middle value when the values are placed in order. For example, if an ordered list contains 1, 2, 3, 4, 5, 6,...
Create a class named Poem that contains fields for the name of the poem and the number of lines in it. Include a constructor that requires values for both fields. Also include get methods to retrieve...
a. Write an application that displays a JFrame containing the opening sentence or two from your favorite book. Save the file as JBookQuote.java. b. Add a button to the frame in the JBookQuote...
Write a server for a client. The client sends the weight and height for a person to the server (see Figure 31.18a). The server computes BMI (Body Mass Index) and sends back to the client a string...
In a side-scrolling video game, a character moves through an environment from, say, left-to-right, while encountering obstacles, attackers, and prizes. The goal is to avoid or destroy the obstacles,...
Professor Amongus has shown that a decision problem L is polynomial-time reducible to an NP-complete problem M. Moreover, after 80 pages of dense mathematics, he has also just proven that L can be...
Draw a structured flowchart or write structured pseudocode describing how to buy a new shirt. Include at least two decisions and two loops.
Design a flowchart or pseudocode for a program that accepts three numbers from a user and displays a message if the sum of any two numbers equals the third.
Your downloadable files for Chapter 5 include a file named DEBUG05-04.jpg that contains a flowchart with syntax and/or logical errors. Examine the flowchart and then find and correct all the bugs.
Search the web to discover the ten most common user-selected passwords, and store them in an array. Design a program that prompts a user for a password, and continue to prompt the user until the user...
Executive Training School offers typing classes. Each final exam evaluates a students typing speed and the number of typing errors made. Develop the logic for a program that produces a summary table...
Create the logic for a program that continuously prompts a user for a numeric value until the user enters 0. The application passes the value in turn to the following methods: A method that displays...
Identify three objects that might belong to each of the following classes: a. Author b. RaceHorse c. Country d. RetailPurchase
Complete the following tasks: a. Design a class named Circle with fields named radius, area, and diameter. Include a constructor that sets the radius to 1. Include get methods for each field, but...
Define a utility class for displaying values of type double. Call the class DoubleOut. Include all the methods from the class DollarFormat in Listing 6.14, all the methods from the class OutputFormat...
Modify the Student class in Listing 8.2 so that it implements the comparable interface. Define the compareTo method to order Student objects based on the value in studentNumber. In a main method...
Create an application using the following names for the solution and project, respectively: Chopkins Solution and Chopkins Project. Save the application in the VB2015\Chap03 folder. Change the form...
Jim Watanabe looked around his new office. He couldnt believe that he was the assistant director of information technology at Petrie Electronics, his favorite consumer electronics retail store. He...
Consider a database that consists of the following relations. SUPPLIER(Sno, Sname) PART(Pno, Pname) PROJECT(Jno, Jname) SUPPLY(Sno, Pno, Jno) The database records information about suppliers, parts,...
a. Sunshine Seashore Supplies rents beach equipment such as kayaks, canoes, beach chairs, and umbrellas to tourists. Write a program that displays Sunshines motto, which is Sunshine Seashore makes it...
Extend the implementation of the AST for Arithlang to include an AST node for the negation expression Exp.
The following program has careless errors on several lines. Find and correct the errors and show the output where requested. #include int main () { } int* ptr: int* temp; int x; ptr = new int; *ptr =...
Evaluate the function \(f(x, y)=\frac{2}{3} e^{-x / 2} \cos (y-1)\) for \(x=-0.23, y=2.7\) by: a. Using the subs command. b. Conversion into a MATLAB function.
Consider the following instruction mix: 1. What fraction of all instructions use data memory? 2. What fraction of all instructions use instruction memory? 3. What fraction of all instructions use the...
A signal e(t) is sampled by the ideal sampler as specified by . (a) List the conditions under which e(t) can be completely recovered from e*(t) , that is, the conditions under which no loss of...
Amplitude-modulated (AM) radios use an oscillator operating at \(455 \mathrm{kHz}\) to demodulate the received signal. This frequency is called the intermediate frequency or IM. Your task is to...
Assume that we would like to expand the MIPS register file to 128 registers and expand the instruction set to contain four times as many instructions. 1. How this would this affect the size of each...
The PredatoryCreditCard class provides a processMonth( ) method that models the completion of a monthly cycle. Modify the class so that once a customer has made ten calls to charge during a month,...
Give an example of a worst-case sequence with n elements for insertion-sort, and show that insertion-sort runs in (n 2 ) time on such a sequence.
Compare and contrast byte-oriented and bit-oriented protocols.
In an 802.11, give the value of the address 1 field in each of the following situations (left bit defines To DS and right bit defines From DS). a. 00 b. 01 c. 10 d. 11
In distance-vector routing, bad news (increase in a link metric) will propagate slowly. In other words, if a link distance increases, sometimes it takes a long time for all nodes to know the bad...
In HTTP, draw a figure to show the application of cookies in a web portal using two sites.
One challenge for architects is that the design created today will require several years of implementation, verification, and testing before appearing on the market. This means that the architect...
Add a column named Base_salary with a datatype of NUMBER(7,2) to the STORE_REPS table. Ensure that the amount entered is above zero.
Attempt to log in to Oracle 12c with the newly created account.
The Marketing Department of JustLee Books is preparing for its annual sales promotion. Each customer who places an order during the promotion will receive a free gift with each book purchased. Each...
Which of the following SQL statements displays a customers name in all uppercase characters? a. SELECT UPPER ('firstname', 'lastname') FROM customers; b. SELECT UPPER (firstname, lastname) FROM...
Which of the following is a valid SELECT statement? a. SELECT AVG (retail-cost) FROM books GROUP BY category; b. SELECT category, AVG (retail-cost) FROM books; c. SELECT category, AVG (retail-cost)...
Given the message AACCCBCCDDAB, in which the probabilities of symbols are P(A) = 0.50, P(B) = 0.25, P(C) = 0.125, and P(D) = 0.125, a. encode the data using Huffman coding. b. find the compression...
In a real-time multimedia communication, assume we have one sender and ten receivers. If the sender is sending multimedia data at 1 Mbps, how many RTCP packets can be sent by the sender and each...
In general, how can you transform a relation not in BCNF into ones that are in BCNF?
Are reflex actions (such as flinching from a hot stove) rational? Are they intelligent?
Consider the family of generalized tic-tac-toe games, defined as follows. Each particular game is specified by a set S of squares and a collection W of winning positions. Each winning position is a...
a. Create an application named Percentages whose main() method holds two double variables. Assign values to the variables. Pass both variables to a method named computePercent() that displays the two...
In each case, determine and fix the problem. After you correct the errors, save each file using the same filename preceded with Fix. For example, DebugThree1.java will become FixDebugThree1.java. a....
Create a class that holds data about a job applicant. Include a name, a phone number, and four Boolean fields that represent whether the applicant is skilled in each of the following areas: word...
a. Write an application that accepts three Strings from the user and, without regard to case, appropriately displays a message that indicates whether the Strings were entered in alphabetical order....