Although the terms parameter and argument are closely related, the difference is that argument refers to _____. a. A value in a method call b. A passed constant c. A formal parameter d. A variable...
Complete the following tasks: a. Design a class named Book that holds a stock number, author, title, price, and number of pages. Include methods to set and get the values for each data field. Also...
Complete the following tasks: a. Design a class named Player that holds a player number and name for a sports team participant. Include methods to set the values for each data field and output the...
In this exercise, you create a program for the sales manager at Computer Haven, a small business that offers motivational seminars to local companies. Figure 7-53 shows the charge for attending a...
Create a program that allows the user to enter an unknown number of sales amounts for each of three car dealerships: Dealership 1, Dealership 2, and Dealership 3. The program should calculate the...
Errors in a computer program can be classified according to when they are detected and, if they are detected at compile time, what part of the compiler detects them. Using your favorite imperative...
Consider the following attribute grammar for variable declarations, based on the CFG: Show a parse tree for the string A, B : C;. Then, using arrows and textual description, specify the attribute...
Determine the order of each of the following growth functions. a. 10n 2 + 100n + 1000 b. 10n 3 7 c. 2 n + 100n 3 d. n 2 log n
(a) Occasionally one encounters the suggestion that a garbage-collected language should provide a delete operation as an optimization: by explicitly delete-ing objects that will never be used again,...
Write code to insert two additional elements, " dark " and " and ", at the proper places in the list to produce the following ArrayList as the result: ["It", "was", "a", "dark", "and", "stormy",...
Repeat Exercise 5 in Chapter 7, but use an instance of ArrayList instead of an array. Exercise 5 in Chapter 7 Write a program in a class CharacterFrequency that counts the number of times a digit...
Define the following terms: data model, database schema, database state, internal schema, conceptual schema, external schema, data independence, DDL, DML, SDL, VDL, query language, host language,...
Consider the BANK ER schema in Figure 3.21, and suppose that it is necessary to keep track of different types of ACCOUNTS (SAVINGS_ACCTS, CHECKING_ACCTS, ) and LOANS (CAR_LOANS, HOME_LOANS, )....
Design a collection of database tables for the Springfield Town Council. The council is made up of representatives from each of the towns 15 precincts. The data you need to store includes the...
Where are the current career opportunities for the IT auditor? Search the Internet and identify at least one job profile/description for each career opportunity identified above. For each job profile...
True or False? There usually are more local variables in a recursive routine than in the equivalent iterative routine.
Consider the list of individual 3NF relations below. These relations were developed from several separate normalization activities. PATIENT(Patient_ID,Room_Number,Admit_Date,Address)...
Assume the following register contents: $t0 = 0xAAAAAAAA, $t1 = 0x12345678 1. [5] For the register values shown above, what is the value of $t2 for the following sequence of instructions? 2. For the...
As discussed in the text, one possible performance enhancement is to do a shift and add instead of an actual multiplication. Since 9 6, for example, can be written (2 2 2 + 1) 6, we can calculate...
Let T be a (possibly improper) binary tree with n nodes, and let D be the sum of the depths of all the external nodes of T. Describe a configuration for T such that D is Ω(n 2 ). Such a...
Suppose an initially empty stack S has performed a total of 25 push operations, 12 top operations, and 10 pop operations, 3 of which returned null to indicate an empty stack. What is the current size...
Four channels, two with a bit rate of 200 kbps and two with a bit rate of 150 kbps, are to be multiplexed using multiple-slot TDM with no synchronization bits. Answer the following questions: a. What...
Ten sources, six with a bit rate of 200 kbps and four with a bit rate of 400 kbps, are to be combined using multilevel TDM with no synchronizing bits. Answer the following questions about the final...
We have a baseband channel with a 1-MHz bandwidth. What is the data rate for this channel if we use each of the following line coding schemes? a. NRZ-L b. Manchester c. MLT-3 d. 2B1Q
What is the Hamming distance for each of the following codewords? a. d (10000, 00000) b. d (10101, 10000) c. d (00000, 11111) d. d (00000, 00000)
The light of the sun takes approximately eight minutes to reach the earth. What is the distance between the sun and the earth?
Traditional checksum calculation needs to be done in ones complement arithmetic. Computers and calculators today are designed to do calculations in twos complement arithmetic. One way to calculate...
In an 802.11 network, station A sends two data fragments to station B. What would be the value of the D field (in microseconds) that needs to be set for the NAV period in each of the following...
We have the information shown below. Show the contents of the IP datagram header sent from the remote host to the home agent. Mobile host home address: 130.45.6.7/16 Mobile host care-of address:...
Use Dijkstra's algorithm (Table 20.2) to find the shortest path tree and the forwarding table for node A in the Figure 20.35. Table 20.2 4. 4. 3. 3.
To make the initial sequence number a random number, most systems start the counter at 1 during bootstrap and increment the counter by 64,000 every half second. How long does it take for the counter...
Write a program to make the UDP server program in Table 25.1 more generic: to receive a request, to process the request, and to send back the response. Table 25.1 Table 25.1 Echo server program using...
Modify, compile, and test the client program in Table 25.17 and the server program in Table 25.16 to allow the client to provide the pathname of a short file stored on the server host. The server...
You have been assigned to design the database for a new soccer club. Indicate the most appropriate sequence of activities by labeling each of the following steps in the correct order. (For example,...
Use the fact database and patron collection created in the text for use with MongoDB. Write a query to retrieve only the first name, last name, and type of faculty patrons that have checked out at...
Use the fact database and patron collection created in the text for use with MongoDB. Create a new document in the patron collection. The document should satisfy the following requirements: First...
How would you determine which orders have not yet been shipped to the customer? Figure 1-5: ORDERS Order# Customer# Orderdate Shipdate Shipstreet Shipcity Shipstate Shipzip Shipcost CUSTOMERS...
List the title only of all books available in inventory, using the BOOKS table.
Add a new row in the ORDERS table with the following data: Order# = 1023 and Customer# = 1009. Describe the error raised and what caused the error.
Delete the CUSTOMERREP role from the Oracle 12c database.
Which of the following is correct? a. The ORDER BY clause cant be used in the subquery of a CREATE VIEW command. b. The ORDER BY clause cant be used in an inline view. c. The DISTINCT keyword cant be...
A random number generator produces numbers between 1 and 99. If the current value of the random variable is 45, then what is the probability that the next randomly generated value for the same random...
A wireless receiver with an effective diameter of 250 cm is receiving signals at 20 GHz from a transmitter that transmits at a power of 30 mW and a gain of 30 dB. (a) What is the gain of the receiver...
In a cellular system, diffraction, reflection, and direct path take different amount of time for the signal to reach an MS. How do you differentiate and use these signals? Explain clearly. Compute...
During a busy hour, the number of calls per hour for each of the 12 cells of a cellular cluster is 2220, 1900, 4000, 1100, 1000, 1200, 1800, 2100, 2000, 1580, 1800 and 900. Assume that 75% of the car...
a. Determine the power of each digit for five-digit numbers in base 6. b. Use your results from part (a) to convert the base 6 number 24531 6 to decimal.
Alice can use only the additive cipher on her computer to send a message to a friend. She thinks that the message is more secure if she encrypts the message two times, each time with a different key....
Professor Olay is consulting for an oil company, which is planning a large pipeline running east to west through an oil field of n wells. The company wants to connect Figure 9.2 Professor Olay needs...
Modify the HYBRID-WUMPUS-AGENT to use the 1-CNF logical state estimation method described on page 271. We noted on that page that such an agent will not be able to acquire, maintain, and use more...
we mentioned iterative lengthening search, an iterative analog of uniform cost search. The idea is to use increasing limits on path cost. If a node is generated whose path cost exceeds the current...
Consider a state space where the start state is number 1 and each state k has two successors: numbers 2k and 2k + 1. a. Draw the portion of the state space for states 1 to 15. b. Suppose the goal...
In Section 15.3.2, the prior distribution over locations is uniform and the transition model assumes an equal probability of moving to any neighboring square. What if those assumptions are wrong?...
What is the numeric value of each of the following expressions as evaluated by Java? a. 4 + 6 * 2 b. 10 / 5 + 8 c. 12 / 4 + 16 / 2 d. 17 / 2 e. 22 / 5 f. 39 / 10 g. 19 % (2 + 3) h. 3 + 4 * 20 / 3 i....
Write a program that declares variables to hold your three initials. Display the three initials with a period following each one, as in J.M.F. Save the program as Initials.java.
The Harrison Group Life Insurance company computes annual policy premiums based on the age the customer turns in the current calendar year. The premium is computed by taking the decade of the...
A sequence of characters enclosed within double quotation marks is a ____________. a. Literal string b. Symbolic string c. Prompt d. Command
Sammys Seashore Supplies rents beach equipment to tourists. In previous chapters, you developed a class that holds equipment rental information and an application that tests the methods using three...
The method parseInt() converts a(n) ____________. a. Integer to a String b. Integer to a Double c. Double to a String d. String to an integer
You developed classes that hold rental contract information for Sammys Seashore Supplies. Now modify the Rental and RentalDemo classes as follows: Modify the Rental class to include an integer field...
You created a CertOfDeposit class. Now, create an application to accept data for an array of five CertOfDeposit objects, and then display the data. Save the application as CertOfDepositArray.java.
Create a class named Majors that includes an enumeration for the six majors offered by a college as follows: ACC, CHEM, CIS, ENG, HIS, PHYS. Display the enumeration values for the user, and then...
a. The Talk-A-Lot Cell Phone Company provides phone services for its customers. Create an abstract class named PhoneCall that includes a String field for a phone number and a double field for the...
Write an application that determines which, if any, of the following files are stored in the folder where you have saved the exercises created in this chapter: autoexec.bat, CompareFolders.java,...
In this exercise, you modify the Savings Account application from this chapters Apply lesson. Use Windows to make a copy of the Savings Solution folder. Rename the copy Modified Savings Solution....
Design a 4-bit, 8-function arithmetic unit that will meet the following specifications: S2 0 0 0 0 1 1 1 1 S1 0 0 1 1 0 0 1 1 SO 0 1 0 1 0 1 0 1 F 2A A plus B A plus B A minus 1 2A plus 1 A plus B...
Write an HDL module that implements the priority encoder from Exercise 2.36. Data from Problem 2.36 A priority encoder has 2 N inputs. It produces an N-bit binary output indicating the most...
Open the VB2017\Chap11\FixIt Solution\FixIt Solution.sln file. Open the Code Editor window. Correct any errors in the code. Start the application. Click the Calculate button. The total on hand should...
The vice president of accounting says to you, the IT director, This request procedure takes too long. My people know what they are doing and their systems requests are necessary and important. She...
Implement the dictionary operations INSERT, DELETE, and SEARCH using singly linked, circular lists. What are the running times of your procedures?
Write a program that animates MyHashMap, as shown in Figure 27.8. You can change the initial size of the table. Assume the load-factor threshold is 0.75. Firetox...
Repeat Exercise 8.3 for the case when the fully associative cache outperforms the direct mapped cache. Data From Problem 3 Come up with a sequence of addresses for which a direct mapped cache with a...
Show that any comparison-based sorting algorithm can be made to be stable, without affecting the asymptotic running time of this algorithm.
Show that we can solve the telescope scheduling problem in O(n) time even if the list of n observation requests is not given to us in sorted order, provided that start and finish times are given as...
Looking up a word in a dictionary can be a complicated process. For example, assume that you want to look up logic . You might open the dictionary to a random page and see juice . You know this word...
A mobile phone app allows a user to press a button that starts a timer that counts seconds. When the user presses the button again, the timer stops. Draw a flowchart or write pseudocode that accepts...
Glen Ross Vacation Property Sales employs seven salespeople, as shown in the Table 6-5. ID Number Salesperson Name 103 Darwin 104 Kratz 201 Shulstad 319 Fortune 367 Wickert 388 Miller 435 Vick Table...
Geraldines Landscaping Service and Gerards Lawn Maintenance are merging their businesses and want to merge their customer files. Each file contains a customer number, last name, address, and property...
Assume that a working program contains the following statement: myDog.setName("Bowser") Which of the following do you know? a. setName() is a public method. b. setName() accepts a string parameter....
Complete the C++ instructions column in Figure 3-25. The numbers of latex and Mylar balloons purchased will be integers. All of the remaining items will be real numbers. Use the int and double data...
Travel Tickets Company sells tickets for airlines, tours, and other travel-related services. Because ticket agents frequently mistype long ticket numbers, Travel Tickets has asked you to write an...
The equivalence of for and while loops, is not precise. Give an example in which it breaks down.
Rewrite Figures 3.6 and 3.7 in C. You will need to use separate compilation for name hiding. Figures 3.6 Figures 3.7 #include namespace rand_mod { unsigned int seed = time (0); // initialize from...
Consider the following pseudocode: x : integer := 1 y : integer := 2 procedure add() x := x + y procedure second(P : procedure) x : integer := 2 P() procedure first y : integer := 3 second(add)...
Consider the following C declaration, compiled on a 64-bit x86 machine: struct { int n; char c; } A[10][10]; If the address of A[0][0] is 1000 (decimal), what is the address of A[3][7]?
Describe what this function does. Try different numbers as input. def test(num): if num > 0: return test(num-2) * test(num-1) else: return 0
Write a program that displays Pascals triangle: Use System.out.printf to format the output into fields of width 4. 1 1 1 3 4 6. 4 1 1 10 10 15 20 15 6 1 21 35 35 21 7 1 8. 28 56 70 56 28 8. 1 9. 36...
Write a program that produces images of Christmas trees as output. It should have a method with two parameters: one for the number of segments in the tree and one for the height of each segment. For...
Input a number (X) and create a program that allows the user to select finding the area (Area) of one of the following: The area of a square with side X, Area = X * X The area of a circle with...
Under what circumstances should a systems analyst recommend an agile methodology over structured development or object-oriented analysis?
Explore the emerging area of wearable computing, such as the Apple Watch, and comment on the impact of these devices on user interface design.
What is HCI?
What is the role of online documentation?
An organization is in the process of upgrading microcomputer hardware and software for all employees. Hardware will be allocated to each employee in one of three packages. The first hardware package...
List the total number of lessons taught in 2018 by tutors in each of the three Status categories (Active, Temp Stop, and Dropped).
(i) Outline a 5TM that does decimal addition for three numbers simultaneously, the numbers being on tracks 2, 3, and 4. The sum should be left on track 5, and track 1 is reserved for carries. (ii)...
In SQL, specify the following queries on the database in Figure 5.5 using the concept of nested queries and other concepts described in this chapter. a. Retrieve the names of all employees who work...
Suppose that the system crashes before the [write_item, T 2 , D, 25, 26] entry is written to the log in Figure 22.1(b). Will that make any difference in the recovery process? Figure 22.1(b) (b) A BCD...
Amazon.com was successful when it decided to extend its offerings beyond books to many other products. Amazon.com was unable to compete successfully with eBay.coms auction site, however, and...
Write the Pitt Fitness database in DBDL notation.
For which instructions (if any) is the Imm Gen block on the critical path?