Questions
Let us say we are given the task of building an automated taxi. Define the constraints....

Let us say we are given the task of building an automated taxi. Define the constraints. What are the inputs? What is the output? How can we communicate with the passenger? Do we need to communicate with the other automated taxis, that is, do we need a “language”?

In: Computer Science

An operating system uses the Round Robin (RR) without priority CPU scheduling algorithm, with a quantum...

An operating system uses the Round Robin (RR) without priority CPU scheduling algorithm, with a quantum = 4.

Consider the following set of processes in this OS, with the length of the CPU burst time given in milliseconds, and the shown priority.

The processes are assumed to have arrived in the order P1, P2, P3, P4, P5, all at time 0.

Process Burst Time Priority
P1 5 2
P2 10 5
P3 4 1
P4 6 4
P5 9 3

a) Draw a Gantt chart illustrating the order of execution of these processes, showing their completion times.

b) Calculate each process’ waiting time, and then compute the average waiting time for this set.

Note:  waiting time = completion time – arrival time – burst time

=> Write your answers on scratch paper (make sure it is visible) then take a picture of it and upload it here.

In: Computer Science

Given the following business scenario, create a Crow’s Foot ERD using a specialization hierarchy (EER) if...

Given the following business scenario, create a Crow’s Foot ERD using a specialization hierarchy (EER) if appropriate.

Two-Bit Drilling Company keeps information on employees and their insurance dependents. Each employee has an employee number, name, date of hire, and title. If an employee is a full-time inspector, then the date of certification, the renewal date for that certification, and the yearly salary should also be recorded in the system. If an employee is a part-time inspector, then the date of certification, the renewal date for that certification, and the hourly wage should also be recorded in the system. For all employees, the Social Security number and dependent names should be kept. All dependents must be associated with one and only one employee. Some employees will not have dependents, while others will have many dependents.

In: Computer Science

Imagine we have two possibilities: We can scan and email the image, or we can use...

Imagine we have two possibilities: We can scan and email the image, or we can use an optical character reader (OCR) and send the text file. Discuss the advantage and disadvantages of the two approaches in a comparative manner. When would one be preferable over the other?

In: Computer Science

create calculator standard using java language with OOP rule and interfaces.

create calculator standard using java language with OOP rule and interfaces.

In: Computer Science

Write a C++ program that takes input from the keyboard of the 3 dimensions of a...

Write a C++ program that takes input from the keyboard of the 3 dimensions of a room (W,L,H in feet) and calculates the area (square footage) needed to paint the walls only. Use function overloading in your program to pass variables of type int and double. You should have two functions: one that accepts int datatypes and one that accepts double datatypes. Also assume a default value of 8 if the height parameter is omitted when calling the functions.

In: Computer Science

Write a Java program where you will set the datatype and variables to find the value...

Write a Java program where you will set the datatype and variables to find the value of following expression.

The Values of the variables to be used are given below

a) 101 + 0) / 3

b) 3.0e-6 * 10000000.1

c) true && true

d) false && true

e) (false && false) || (true && true)

f) (false || false) && (true && true)

In: Computer Science

PUT IN PYTHON LANGUAGE CODE # Write one while-loop that starts at 500 and prints every...

PUT IN PYTHON LANGUAGE CODE

# Write one while-loop that starts at 500 and prints every 6th number down to 300
# (i.e., prints 500, 494, 488, . . . etc., but does not print any number lower than 300).

# Write one while-loop that starts at 80 and prints every 12h number thereafter,
# but does not print any number greater than 210

# Write one while-loop that prints all the numbers from 30 through 70,
# except for the numbers 41 and 57.

# Write one while-loop that prints the sum of all the even numbers
# (50, 52, 54, . . . etc.,) from 50 through 2000.

# Write one while-loop that prints the count of all the numbers
# from 20 through 2500 that are divisible by 9
# (in other words prints out how many numbers are divisible by 9).

In: Computer Science

1. Use long division to convert decimal fraction into a binary expansion. 3/5 2. Find the...

1. Use long division to convert decimal fraction into a binary expansion. 3/5

2. Find the decimal equivalent for the following binary numbers. 1101.11102

3. Use long division to convert decimal fraction into a binary expansion. 3/4

4. Find the binary equivalent the following decimal numbers. 14. 25390625 1

5. Find the decimal equivalent for the following binary numbers. 0.110001102

6. Exactly how many bytes are in the following? 60MB

In: Computer Science

Create a Python file num_utils.py that includes: A function sum_of_nums that accepts 1 or more number...

Create a Python file num_utils.py that includes:

  • A function sum_of_nums that accepts 1 or more number parameters and returns their sum without displaying anything
  • A function product_of_nums that accepts 1 or more number  parameters and returns their product without displaying anything
  • A function average_of_nums  that accepts 1 or more number  parameters and returns their average without displaying anything

Create a Python file test_num_utils.py that:

  • Imports num_utils
  • Defines a function test_num_utils that demonstrates the use of the utilities in num_utils.py
  • Executes test_num_utils

In: Computer Science

1. Add the following binary numbers in 4-bit, two's complement notation. Identify any overflow errors. 01102...

1. Add the following binary numbers in 4-bit, two's complement notation. Identify any overflow errors. 01102 + 01002

2.Add the following binary numbers in 4-bit, two's complement notation. Identify any overflow errors. 10102 + 11112

3.Add the following binary numbers in 4-bit, two's complement notation. Identify any overflow errors. 10112 + 01112

In: Computer Science

Given the following memory values and address instruction with an accumulator. Determine the values with the...

Given the following memory values and address instruction with an accumulator. Determine the values with the following instructions load into accumulator.

Word 16 contains 22

Word 18 contains 24

Word 20 contains 26

Word 22 contains 28

Word 24 contains 30

Word 26 contains 32

Word 28 contains 34

i. LOAD IMMEDIATE 16

ii. LOAD DIRECT 16

iii. LOAD INDIRECT 16

iv. LOAD IMMEDIATE 18

v. LOAD DIRECT 18

vi. LOAD INDIRECT 20

vii. LOAD IMMEDIATE 24

viii. LOAD DIRECT 26

ix. LOAD INDIRECT 22

x. LOAD DIRECT 28

[10 Marks]

In: Computer Science

Identify any THREE (3) input devices and THREE (3) output devices which are common used in...

Identify any THREE (3) input devices and THREE (3) output devices which are

common used in our life. Discuss the benefits of using these devices in our daily

life.

[18 Marks]

In: Computer Science

1. Add the following binary number in 8-bit. Rewrite each problem in decimal notation to check...

1. Add the following binary number in 8-bit. Rewrite each problem in decimal notation to check you work. 10110101112 + 011001002

2. Find the binary equivalent the following decimal numbers. 0.25

3. Find the decimal equivalent for the following binary numbers. 1110102/100000002

4. Find the decimal equivalent for the following binary numbers. 0.00102

5. Give the multiplying factor associated with each of the following metric prefixes. Deci-

6. Find the binary equivalent the following decimal numbers. 0.6875

7. Exactly how many bits are in the following? 40 GB

8. Use long division to convert decimal fraction into a binary expansion. 3/5

9. Find the decimal equivalent for the following binary numbers. 1101.11102

10. Use long division to convert decimal fraction into a binary expansion. 3/4

11. What is the best approximation of the decimal fraction 2/3, using a denominator of 8, 16, 256?

12. Find the binary equivalent the following decimal numbers. 14. 25390625

13. Find the decimal equivalent for the following binary numbers. 0.110001102

14. Exactly how many bytes are in the following? 60MB

In: Computer Science

SQL Program True/False Question 1. Which of the following is true of a many to many...

SQL Program True/False Question

1. Which of the following is true of a many to many relationship? T/F

2. Security is rarely a concern for most databases. T/F

3. A security requirement refers to the need to restrict who can access some of the database data. T/F

4. Report requirements refer to the input forms the database will need. T/F

5. Insert permission is the permission to add records to the database. T/F

6. A trigger is code usually written in SQL which is triggered by a database event such as an insert or delete. T/F

7. A data requirement refers to the need to gather data about the database. T/F

8. One to one relationships are the most common relationship in a relational database. T/F

9. If you have an attribute that can have multiple values you should just number them 1, 2, 3, etc. T/F

10. Ideally every attribute in a database should have a unique name. T/F

11. Lookup entities have no effect on data consistency and integrity T/F

In: Computer Science