Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

JAVA #2: Costs $80,000, and will facilitate profits of $19,500/year. Assign the Second host IP address from Network Q subnet to PC2. g. Assign the

JAVA #2: Costs $80,000, and will facilitate profits of $19,500/year. Assign the Second host IP address from Network Q subnet to PC2. g. Assign the Last host IP address from Network R subnet to G0/1 interface of R3. h. Assign the First host IP address from Network R subnet to S3. i. Assign the Second host IP address from Network R subnet to PC3. j. Assign the First host IP address from Network X subnet to S0/1/0 interface of Ri. k. Assign the Last host IP address from Network X subnet to S0/1/1 interface of R2. 1. Assign the First host IP address from Network Y subnet to S0/1/0 interface of R2. m. Assign the Last host IP address from Network Y subnet to S0/1/1 interface of R3. n. on of a Turing machine that is specified by a quintuplet description. [4 marks] (c) Define the configuration of a Turing machine at step t, and establish equations that specify the configuration of a k-symbol Turing machine at step (t + 1) in terms of the configuration at the previous step t. [6 marks] (d) Well-known utility functions may be assumed to be available. 3 (TURN OVER) CST.2016.1.4 SECTION B 3 Object-Oriented Programming Java generics allows an ArrayList object to be constrained to use a single specific type (e.g. ArrayList). However, some applications require the ability to store objects of multiple unrelated types. In this question the aim is to store Integer objects alongside LinkedList objects. Define a sort or types (in C, Java, or ML) appropriate for holding a theoretical linguistic structure tree coming about because of your solution to part (b). (e) Give a brief and rudimentary clarification of the standards of how the language coming about because of part (b) may be utilized to make a sentence structure analyser taking a token stream as information (by means of calls to work lex()) and giving as result an theoretical language structure tree relating to part (d). Assign the First host IP address from Network Z subnet to S0/1/0 interface of R3. 0. 2 Hosts 50/1/1 S0/1/0 R1 R2 GOM S2 PC2 GO1 50/1/1 NW:10.10.100.0/24 50/170 Network P: 15 Hosts Network Q: 10 Hosts Network Z: 2 Hosts Network Y: 2 Hosts 50/110 50/1/1 R3 G0/1 Network R: 4 Hosts 53 PC3 Part 1: Design the VLSM Address Scheme Divide the 10.10.100.0/24 network based on the number of hosts per subnet and complete the Subnet Table. You will subnet the network address 10.10.100.0/24. The network has the following requirements: Network P (LAN) requires 15 Usable host IP addresses. (Use the third available subnet) Network Q (LAN) requires 10 Usable host IP addresses. (Use the next available subnet) One solution is to use ArrayList, since all Java objects extend Object. Explain why this is bad practice. [2 marks] (b) Seeking to provide a solution that allows an arbitrary set of constrained types, a programmer writes an abstract ConstrainedArray base class. To use it, the class is extended and a specialised void add(...) method should be provided for each acceptable type. public abstract class ConstrainedArray { protected ArrayList mArray = new ArrayList(); public Object get(int idx) {return mArray.get(idx);} public int size() { return mArray.size(); } } (i) Show how to a class IntListArray that extends this base class and accepts only Integer or LinkedList objects. Where appropriate, objects should be copied on insertion. [4 marks] Notice both transcribed also, consequently created grammar analysers. List the terminal images and non-terminal images, and count the creation rules both in the first syntax and in the sentence structure in your response to part (b). Demonstrate the beginning image in the two sentence structures. [2 marks] 6 CST.2004.13.7 7 Artificial Intelligence In the following, N is a feedforward neural network architecture taking a vector x T = ( x1 x2 xn ) of n inputs. The complete collection of weights for the network is denoted w and the output produced by the network when applied to input x using weights w is denoted N(w, x). Network R (LAN) requires 4 Usable host IP addresses. (Use the next available subnet) Network X (WAN) requires 2 Usable host IP addresses. (Use the next available subnet) Network Y (WAN) requires 2 Usable host IP addresses. (Use the next available subnet) Network Z (WAN) requires 2 Usable host IP addresses. (Use the next available subnet) Subnet Table: Subnet Description Network Address First Host Address Second Host Address Last Host Address Broadcast Address Subnet Mask Network P Network Network R Network X NA Network Y NA Network Z NA Part 2: Complete the Addressing Table Document the addressing scheme and complete the addressing table. a. Show how this would affect your IntListArray class and discuss the advantages of the change from protected to private. [5 marks]

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Computer Networking A Top-Down Approach

Authors: James Kurose, Keith Ross

7th edition

978-0133594140

More Books

Students also viewed these Programming questions