Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

4. [18] Suppose you have been hired by Hershey Park Security to help maintain software and hardware. There is currently a problem. One system requires

image text in transcribed
image text in transcribed
4. [18] Suppose you have been hired by Hershey Park Security to help maintain software and hardware. There is currently a problem. One system requires a user to swipe a card with a magnetic ID number and then enter a PIN. But the system isn't allowing users to log in. After running several cards through and dumping the contents of memory, you narrow the problem down to either the chip that reads the User ID number off of the card, the chip that reads the PIN, or the chip that accepts the ID number and PIN and matches them to entries in a database. The program code for each operation resides on different chips. The ID number reader chip (let's can Chip I) reads in the ID number (an unsigned decimal number) and stores it in memory (in Dinal course). The PIN reader chip (let's call it Chip 2), accepts a PIN (as ASCII text) and stores it in memory (again, as a string of Os and 1s). Chip 3 contains the code that compares the ID number and database entry to either allow or deny access to the system. As a computer scientist, you know how to look at the contents of memory. The debugger you a displays the contents of memory to you as hexadecimal digits (so you don't have to look at a sequence zeros and ones). Hershey Park has given you a demo user ID card, with an ID number (in unsigned decimal) and me ASCII). The card's ID number is 3133078222, and the PIN is NUKE. The ID# and PIN are valid and matching entries exist in the database. In fact, they have cleared the database and your test card and PIN are the ONLY ones that should be allowed while you are debugging the problem (this will make scarching the database much faster). You know the database entry itself is correct. The idea is that you can swipe enter the pin, and then immediately check the contents of memory. The goal is to determine the error is occurring on Chip 1, Chip 2, Chip 3 (or any combination of these). You can do comparing what you see in memory to what you know was input into the program for each chip and whether or not you get access. Below are some possible sets of results. The first number is the hexadecimal number in memory representing the ID number read in by Chip 1. The second number is the hexadecimal number representing the PIN that was read in and stored by Chip 2. The third value represents wncing hu Chin The third value represents whether access wa allowed or denied as determined by Chip 3. In each case these are SEPARATE cases), specify on which chip(s) the error(s) occur(s). (There may be more than one error: if so, you should least list them all.) a. BABEFAC1, 4E554A45, access denied b. BABEFACE, 4E544445, access denied c. BABEFAC1, 4E554345, access denied d. BABEFACE, 4E554845, access denied e. BABEFAC1, 4E554845, access allowed f. BABEFAC1, 4E544445, access allowed in the following subset of codewords, created for a 7-bit memory word with dove even or odd parity? Ex

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions