Consider an RSA key set with p = 11, q = 29, n = 319, and e = 3. What value of d should be used in the secret key? What is the encryption of the message M = 100?
Write a program that obtains the execution time of selection sort, bubble sort, merge sort, quick sort, heap sort, and radix sort for input size 50,000, 100,000, 150,000, 200,000, 250,000, and...
What is the best way to multiply a chain of matrices with dimensions that are 105, 52, 220, 2012, 124, and 460? Show your work.
Web-based system architecture is a popular approach to many organizational systems because it offers a number of advantages to the users and to the organization over other types of systems. Discuss...
Suppose we allow the pattern P to contain occurrences of a gap character???that can match an arbitrary string of characters (even one of zero length). For example, the pattern ab???ba???c occurs in...
When does Oracle 11g automatically create an index for a table?
In a double-entry accounting system, every business transaction has to be entered as two separate transactions, in different two accounts, once as a debit and once as a credit. For example, if a...
Suppose we are given a sequence S of n elements, on which a total order relation is defined. Describe an efficient method for determining whether there are two equal elements in S. What is the...
A limousine company must process pickup requests every day, for taking customers from their various homes to the local airport. Suppose this company receives pickup requests from n locations and...
Draw a quad-tree for the following set of points, assuming a 16 16 bounding box: {(1, 2),(4, 10),(14, 3),(6, 6),(3, 15),(2, 2),(3, 12),(9, 4),(12, 14)}.
Explain why each of the following names does or does not seem like a good variable name to you.
Choose a simple childrens game and describe its logic, using a structured flowchart or pseudocode. For example, you might try to explain Rock, Paper, Scissors; Musical Chairs; Duck, Duck, Goose; the...
ShoppingBay is an online auction service that requires several reports. Data for each auctioned item includes an ID number, item description, length of auction in days, and minimum required bid....
Mark Daniels is a carpenter who creates personalized house signs. He wants an application to compute the price of any sign a customer orders, based on the following factors: The minimum charge for...
The statements executed within a loop are known collectively as the _______________. a. Loop body b. Loop controls c. Sequences d. Sentinels
10. Black Dot Printing is attempting to organize carpools to save energy. Each input record contains an employees name and town of residence. Ten percent of the companys employees live in Wonder...
Create the logic for the dice game Pig, in which a player can compete with the computer. The object of the game is to be the first to score 100 points. The user and computer take turns rolling a pair...
The subscripts of any array are always __________. a. Integers b. Fractions c. Characters d. Strings of characters
Which is true of text files? a. Text files contain data that can be read in a text editor. b. Text files commonly contain images and music. c. Both of the above d. None of the above
Create two parallel arrays that represent a standard deck of 52 playing cards. One array is numeric and holds the values 1 through 13 (representing Ace, 2 through 10, Jack, Queen, and King). The...
Laramie Park District has files of participants in its summer and winter programs this year. Each file is in participant ID number order and contains additional fields for first name, last name, age,...
The Apgar Medical group keeps a patient file for each doctor in the office. Each record contains the patients first and last name, home address, and birth year. The records are sorted in ascending...
Design an application that accepts 15 words and displays them in alphabetical order.
a. Create the logic for a program that performs arithmetic functions. Design the program to contain two numeric variables, and prompt the user for values for the variables. Pass both variables to...
Complete the following tasks: a. Design a class named StockTransaction that holds a stock symbol (typically one to four characters), stock name, and price per share. Include methods to set and get...
The general principle of exception handling in object-oriented programming is that a method that uses data should ___________. a. Be able to detect errors, but not be required to handle them b. Be...
Complete the following tasks: a. Design a class named ItemForSale that holds data about items placed for sale on Carloss List, a classified advertising website. Fields include an ad number, item...
Starting with the regular expressions for integer and decimal, construct an equivalent NFA, the set-of-subsets DFA, and the minimal equivalent DFA. Be sure to keep separate the final states for the...
Give an example of a grammar that captures right associativity for an exponentiation operator (e.g., ** in Fortran).
Build a complete recursive descent parser for the calculator language. As output, have it print a trace of its matches and predictions.
In your favorite language with generics, write code for simple versions of the following abstractions: (a) A stack, implemented as a linked list (b) A priority queue, implemented as a skip list or a...
Repeat the preceding two exercises, modifying your code to include runtime checking of array subscript bounds.
Write a for-each loop that calls the addInterest method on each BankAccount object in a collection called accounts. What is required for that loop to work?
Write a method called charsSorted that accepts a string as its parameter and returns true if the characters in the string appear in sorted alphabetical order. For example, the calls of...
Design a skeletal program and a calling sequence that results in an activation record instance in which the static and dynamic links point to different activation-recorded instances in the run-time...
Once upon a time in a kingdom far away, the king hoarded food and the people starved. His adviser recommended that the food stores be used to help the people, but the king refused. One day a small...
Design and implement a C++ program that defines a base class A, which has a subclass B, which itself has a subclass C. The A class must implement a method, which is overridden in both B and C. You...
Write pseudocode for the main module and Display Welcome Message module. You do not have to write pseudocode for the other three modules. Suppose that you are asked to write a program that computes...
Write a program that prompts the user to enter a string and displays the number of the uppercase letters in the string. Enter a string: Welcome to Java The number of uppercase letters is 2
Define a class named ComparableCircle that extends Circle and implements Comparable. Draw the UML diagram and implement the compareTo method to compare the circles on the basis of area. Write a test...
Write a server for a client. The client sends the weight and height for a person to the server (see Figure 33.18a). The server computes BMI (Body Mass Index) and sends back to the client a string...
Find your last grade report. Given the guidelines presented in this chapter, identify flaws in the design of this grade report. Redesign this report to correct these flaws.
Draw examples of the four basic DFD symbols.
What is the relationship between logical and physical models?
What are the most significant differences among structured, O-O, and agile methods? What do they have in common?
Consider the ER schema for the MOVIES database in Figure 3.25. Assume that MOVIES is a populated database. ACTOR is used as a generic term and includes actresses. Given the constraints shown in the...
Specify queries c, d, and f of Exercise 8.18 in both tuple and domain relational calculus. Exercise 8.18 Consider the LIBRARY relational database schema shown in Figure 8.14, which is used to keep...
The steps that the Little Man performs are closely related to the way in which the CPU actually executes instructions. Draw a flow chart that carefully describes the steps that the Little Man follows...
Loris Manufacturing makes 1,000 products per month and has been increasing production at a rate of 6 percent each month. Write a program that accepts a production goal from the user. If the entered...
The data flow symbols shown in Figure 5-1 were designed by Ed Yourdon, who was a well-known IT author, lecturer, and consultant. Many IT professionals consider him to be among the most influential...
Suppose you have an oracle, OM(s), that correctly predicts the opponents move in any state. Using this, formulate the definition of a game as a (single-agent) search problem. Describe an algorithm...
Describe four fundamental information system types based on their sphere of influence.
Locate a news article in an IT trade website (e.g., Computerworld.com, InformationWeek.com) about an organization that is implementing a new computer system. Describe the tangible and intangible...
Write a program that asks the user to enter todays sales for five stores. The program should display a bar chart comparing each stores sales. Create each bar in the bar chart by displaying a row of...
Suppose that two entries of an array A are equal to each other. After running the insertion-sort algorithm of Code Fragment 3.7, will they appear in the same relative order in the final sorted order...
Assume that the current population of California is 39 million and that the population of Texas is 28 million. The population of Texas appears to be growing at a faster rate than that of California....
List five Websites you can go to for information about: a. IT auditing b. IT security and privacy issues
Extend the Arithlang programming language to support two new expressions, greatest-of (>? a b) and least-of ( a b). The following interaction log illustrates the intended semantics of this...
Extend the Arithlang programming language to support the modulus expression (% a b), also called a remainder sometimes. The following interaction log illustrates the intended semantics of this...
Please indicate whether the following statements are true of false a. If the only difference between two MDPs is the value of the discount factor then they must have the same optimal policy. b. When...
Suppose that the plant in Fig. P5.4-4 has the discrete state model Derive the state model for the closed-loop system, in terms of A, B, C, and D. 1 (k+ 1) = Ax(k) + Bm(k) y (k) = Cx(k) + Dm(k)
You would like to train a neural network to classify digits. Your network takes as input an image and outputs probabilities for each of the 10 classes, 0-9. The networks prediction is the class that...
Assume that \($s0\) is initialized to 11 and \($s1\) is initialized to 22. Suppose you executed the code below on a version of the pipeline that does not handle data hazards (i.e., the programmer is...
For the following problems, the table holds C code functions. Assume that the first function listed in the table is called first. You will be asked to translate these C code routines into MIPS...
Consider the following instruction: Instruction: and rd, rsl, rs2 Interpretation: Reg[rd] = Reg[rs1] AND Reg[rs2] 1.What are the values of control signals generated by the control in Figure 4.10 for...
Examine the difficulty of adding a proposed ss rt, rs, imm (Store Sum) instruction to MIPS. Interpretation: Mem[Reg[rt]=Reg[rs]+immediate 1. Which new functional blocks (if any) do we need for this...
Consider the following loop. LOOP: ld $s0, 0($s3) ld $s1, 8($s3) add $s2, $s0, $s1 addi $s3, $s3, -16 bnez $s2, LOOP Assume that perfect branch prediction is used (no stalls due to control hazards),...
Find the inverse z-transform of each E(z) below by the four methods given in the text. Compare the values of e(z) , for k = 0, 1, 2, and 3, obtained by the four methods. (a) E(z) = 0.5z (2-1)(z-0.6)...
Find a discrete state variable model of the closed-loop system shown in Fig. P5.4-4 if the discrete state model of the plant is given by: Fig. P5.4-4 (a) x(k+1)= 0.7x(k)+0.3m (k) y (k) = 0.2x(k) +...
Let T = 0.05 s and (a) Without calculating E(z), find its poles. (b) Give the rule that you used in part (a). (c) Verify the results of part (a) by calculating E(z). (d) Compare the zero of E(z)...
Consider the system described in Problem 2.10-2. (a) Find the transfer function of this system. (b) Let u(k) = 1, k 0 (a unit step function) and x(0) = 0 . Use the transfer function of part (a) to...
Many computer manufacturers now include tools or simulators that allow you to measure the instruction set usage of a user program. Among the methods in use are machine simulation, hardware-supported...
Using a table similar to that shown in Figure 3.10, calculate 74 divided by 21 using the hardware described in Figure 3.8. You should show the contents of each register on each step. Assume both...
When processor designers consider a possible improvement to the processor datapath, the decision usually depends on the cost/performance trade-off . In the following three problems, assume that we...
In this exercise, we examine how pipelining affects the clock cycle time of the processor. Problems in this exercise assume that individual stages of the datapath have the following latencies: Also,...
In this exercise, we examine how resource hazards, control hazards, and Instruction Set Architecture (ISA) design can affect pipelined execution. Problems in this exercise refer to the following...
In this exercise we look at memory locality properties of matrix computation. The following code is written in C, where elements within the same row are stored contiguously. Assume each word is a...
This exercise examines the impact of different cache designs, specifically comparing associative caches to the direct-mapped caches from Section 5.4. For these exercises, refer to the address stream...
If G is a simple undirected graph with 12 vertices and 3 connected components, what is the largest number of edges it might have?
What are the types of addresses (identifiers) used in each of the following layers? a. Application layer b. Network layer c. Data-link layer
In the TCP/IP protocol suite, what are the identical objects at the sender and the receiver sites when we think about the logical connection at the application layer?
What is the first principle we discussed in this chapter for protocol layering that needs to be followed to make the communication bidirectional?
Using Figure 7.6, tabulate the attenuation (in dB) of a 18-gauge UTP for the indicated frequencies and distances. Figure 7.6 26 gauge Gauge Diameter (inches) 0.0403 20 24 gauge 18 18 0.02320 22...
We have 14 sources, each creating 500 8-bit characters per second. Since only some of these sources are active at any moment, we use statistical TDM to combine these sources using character...
Prove that the code represented by the following codewords is not linear. You need to find only one case that violates the linearity. {(00000), (01011), (10111), (11111)}
Consider a router that interconnects three subnets: Subnet 1, Subnet 2, and Subnet 3. Suppose all of the interfaces in each of these three subnets are required to have the prefix 223.1.17/24. Also...
A large law firm, which has many employees, provides a single email address for each employee. Each employees email address is @lawfirm.com. However, the firm did not explicitly define the format of...
In the Internet File Server example (Figure 6-6), can the connect( ) system call on the client fail for any reason other than listen queue being full on the server? Assume that the network is...
Using the internet in Figure 1.11 (Chapter 1) in the text, show the layers of the TCP/IP protocol suite and the flow of data when two hosts, one on the west coast and the other on the east coast,...
Repeat Problem P4-3 for the NRZ-I scheme. Problem 4-3 Draw the graph of the NRZ-L scheme using each of the following data streams, assuming that the last signal level has been positive. From the...
Repeat Problem P4-3 for the differential Manchester scheme. Problem 4-3 Draw the graph of the NRZ-L scheme using each of the following data streams, assuming that the last signal level has been...
In a Standard Ethernet LAN, the average size of a frame is 1000 bytes. If a noise of 2 ms occurs on the LAN, how many frames are destroyed?
In an 802.11, give the value of the address 2 field in each of the following situations (left bit defines To DS and right bit defines From DS). a. 00 b. 01 c. 10 d. 11
Write and test a program to simulate the flow diagram of CSMA/CD in Figure 12.13. Figure 12.13 Flow diagram for the CSMA/CD Station has a frame to send K= 0 Legend T Frame average transmission time...
In an 802.11 network, there are three stations, A, B, and C. Station C is hidden from A, but can be seen (electronically) by B. Now assume that station A needs to send data to station B. Since C is...
In Figure 17.5, do we have a loop problem if we change the hub in one of the LANs to a link-layer switch? Figure 17.5 Figure 17.5 Loop problem in a learning switch a. Station A sends a frame to...
Find the class of the following classful IP addresses: a. 130.34.54.12 b. 200.34.2.1 c. 245.34.2.8
In an IPv4 datagram, the value of total-length field is (00A0)16 and the value of the header-length (HLEN) is (5) 16 . How many bytes of payload are being carried by the datagram? What is the...
An IP datagram has arrived with the following partial information in the header (in hexadecimal): 45000054 00030000 2006... a. What is the header size? b. Are there any options in the packet? c. What...
Assume that the network in Figure 20.34 (Problem P20-8) uses distance vector routing with the forwarding table as shown for each node. If node E is added to the network with a link of cost 1 to node...