. What is the primary difference between UDP and TCP?
33. A router deals with which part of the IP address:
34. A hop in a TCP/IP network refers to:
35. How many subnets (excluding all 0’s and all 1’s) can be uniquely identified with 4 bits?
36. How many subnets (excluding all 0’s and all 1’s) can be uniquely identified with 5 bits?
37. What is one of the main purposes of IP version 6 (IP Next Generation)?
38. Address 205.169.85.0 is assigned by ICANN as a corporate IP address. Which of the following statements is true:
In: Computer Science
Write in assembly 8086.
Write a program to input nine numbers in 4*4 array and
prints the maximum value of
each row and then prints the minimum of each column.
In: Computer Science
Question 1:
The following questions contains real numbers for COVID-19 daily report made on 2020-09-07
Use the CREATE TABLE command and Insert command to create the following table. For each field, pick the most appropriate data type for it.
Give the table name COVID_REPORT and make “Country_name” as Primary Key.
Question 1:
The following questions contains real numbers for COVID-19 daily report made on 2020-09-07
Use the CREATE TABLE command and Insert command to create the following table. For each field, pick the most appropriate data type for it.
Give the table name COVID_REPORT and make “Country_name” as Primary Key.
|
Country_name |
Continent |
new_cases |
new_deaths |
total_cases |
total_deaths |
|
Saudi Arabia |
Asia |
895 |
32 |
320827 |
4081 |
|
Bahrain |
Asia |
676 |
2 |
54771 |
198 |
|
United Kingdom |
Europe |
2988 |
2 |
347152 |
41551 |
|
France |
Europe |
7071 |
3 |
324777 |
30701 |
|
Lebanon |
Asia |
415 |
4 |
20426 |
191 |
|
Country_name |
Continent |
new_cases |
new_deaths |
total_cases |
total_deaths |
|
Saudi Arabia |
Asia |
895 |
32 |
320827 |
4081 |
|
Bahrain |
Asia |
676 |
2 |
54771 |
198 |
|
United Kingdom |
Europe |
2988 |
2 |
347152 |
41551 |
|
France |
Europe |
7071 |
3 |
324777 |
30701 |
|
Lebanon |
Asia |
415 |
4 |
20426 |
191 |
In: Computer Science
To be Completed in C#
Write a program that creates an exception class called ManyCharactersException, designed to be thrown when a string is discovered that has too many characters in it. Consider a program that takes in the last names of users. The driver class of the program reads the names (strings) from the user until the user enters "DONE". If a name is entered that has more than 20 characters, throw the exception. Design the program such that it catches and handles the exception if it is thrown. Handle the exception by printing an appropriate message, and then continue processing more names by getting more inputs from the user. Note: Your program should exit only when the user enters "DONE".
SAMPLE OUTPUT:
Enter strings. When finished enter DONE
Short string
You entered: Short string
Medium size string
You entered: Medium size string
Really really long string, someone stop me!
You entered too many characters
DONE
You entered:
DONE
Good bye!
In: Computer Science
Whenever an exception arises, it terminates the program
execution, which means it stops the execution of the current java
program.
a) Identify and explain how the remedy for the exception is
considered.
b) Implement the above-identified remedy in the java program to
overcome the problem raised in the exceptional case when we try to
open and close the files.
In: Computer Science
In: Computer Science
DHCP Troubleshooting
Review the following technical support email from a junior IT admin:
Facilitation
Dear IT Admin:
I am working at a branch office and have been tasked with changing out the DHCP scope to match the overall corporate IP address scheme. The main office assigned me an IP address range of 192.168.0.200 through 192.168.0.225. I changed the scope on Friday afternoon and came in on Monday morning to discover that only some of the workstations had picked up new leases from the new DHCP scope. Any ideas as to what may be happening, what I might check or adjust?
Thank you, Junior Admin
-- Respond in detail with clarifying questions, suggested approaches and/or possible solutions
In: Computer Science
List two algorithms commonly used to identify a frame for replacement
In: Computer Science
In: Computer Science
What characteristics need to be exhibited by an organization to improve its software process?
In: Computer Science
In Software Engineer, What is forward engineering? Explain in detail.
In: Computer Science
In: Computer Science
Please write in C using linux or unix.please include pictures of the terminal output.
Write a program that will simulate non - preemptive process scheduling algorithm:
First Come – First Serve
Your program should input the information necessary for the calculation of average turnaround time including:
The output of the program should include: starting and terminating time for each job, turnaround time for each job, average turnaround time.
Step 1: generate the input data (totally 10 jobs) and save it in the array of structure composing the arrival time, service time, termination time, turnaround time. The service time follows the uniform distribution in the range of [5, 25], and the arrival time is generated by uniform distribution in the range of [0,10] accumulated based on the previous arrival time.
Step 2: program FCFS algorithm.
Note: be careful about the situation that one job is finished while the next job is not arrived yet, so you have the idle time between them.
Step 3: output
print out one line for each job with arrival time, start time, service, termination time, turnaround time, finally average turnaround time in the last line.
In: Computer Science
In: Computer Science
Garden
Lili inherited her grandfather’s land and wanted to start gardening. Lili’s garden size is X × Y with various types of plants marked with integer c.
Given a two-dimensional array that contains the type of plant in the garden. Lily wants to make T changes to the garden. For each change made, Lili will plant c in the a-th row of the b-th column of the array. The row and column starts from number 1.
Format Input:
The input consists of integers X and Y followed by an array of X × Y , then contains an integer T which is the number of changes made by Lili. The next T line contains three numbers a, b, c which contains the array location index you want to change to the integer c.
Format Output:
The output contains a two dimensional array in the form of a Lili garden plan after a change is made.
Constraints
• 1 ≤ a, b, c, X, Y ≤ 100
• 1 ≤ T ≤ 1000
Sample Input 1 (standard input):
3 3
1 1 1
1 1 1
1 1 1
3
1 1 3
2 2 3
3 3 3
Sample Output 1 (standard output):
3 1 1
1 3 1
1 1 3
Sample Input 2 (standard input):
5 3
1 2 3
4 5 6
7 8 9
10 11 12
13 14 15
3
1 1 16
1 2 17
1 3 18
Sample Output 2 (standard output):
16 17 18
4 5 6
7 8 9
10 11 12
13 14 15
note : USE C language, integer must be the same as the constraint, DONT USE VOID, RECURSIVE(RETURN FUNCTION), RESULT, code it under int main (must be blank){
In: Computer Science