Let us say we are given the task of building an automated taxi. Define the constraints. What are the inputs? What is the output? How can we communicate with the passenger? Do we need to communicate with the other automated taxis, that is, do we need a “language”?
In: Computer Science
An operating system uses the Round Robin (RR) without priority CPU scheduling algorithm, with a quantum = 4.
Consider the following set of processes in this OS, with the length of the CPU burst time given in milliseconds, and the shown priority.
The processes are assumed to have arrived in the order P1, P2, P3, P4, P5, all at time 0.
Process | Burst Time | Priority |
P1 | 5 | 2 |
P2 | 10 | 5 |
P3 | 4 | 1 |
P4 | 6 | 4 |
P5 | 9 | 3 |
a) Draw a Gantt chart illustrating the order of execution of these processes, showing their completion times.
b) Calculate each process’ waiting time, and then compute the average waiting time for this set.
Note: waiting time = completion time – arrival time – burst time
=> Write your answers on scratch paper (make sure it is visible) then take a picture of it and upload it here.
In: Computer Science
Given the following business scenario, create a Crow’s Foot ERD using a specialization hierarchy (EER) if appropriate.
Two-Bit Drilling Company keeps information on employees and their insurance dependents. Each employee has an employee number, name, date of hire, and title. If an employee is a full-time inspector, then the date of certification, the renewal date for that certification, and the yearly salary should also be recorded in the system. If an employee is a part-time inspector, then the date of certification, the renewal date for that certification, and the hourly wage should also be recorded in the system. For all employees, the Social Security number and dependent names should be kept. All dependents must be associated with one and only one employee. Some employees will not have dependents, while others will have many dependents.
In: Computer Science
Imagine we have two possibilities: We can scan and email the image, or we can use an optical character reader (OCR) and send the text file. Discuss the advantage and disadvantages of the two approaches in a comparative manner. When would one be preferable over the other?
In: Computer Science
create calculator standard using java language with OOP rule and interfaces.
In: Computer Science
Write a C++ program that takes input from the keyboard of the 3 dimensions of a room (W,L,H in feet) and calculates the area (square footage) needed to paint the walls only. Use function overloading in your program to pass variables of type int and double. You should have two functions: one that accepts int datatypes and one that accepts double datatypes. Also assume a default value of 8 if the height parameter is omitted when calling the functions.
In: Computer Science
Write a Java program where you will set the datatype and variables to find the value of following expression.
The Values of the variables to be used are given below
a) 101 + 0) / 3
b) 3.0e-6 * 10000000.1
c) true && true
d) false && true
e) (false && false) || (true && true)
f) (false || false) && (true && true)
In: Computer Science
PUT IN PYTHON LANGUAGE CODE
# Write one while-loop that starts at 500 and prints every 6th
number down to 300
# (i.e., prints 500, 494, 488, . . . etc., but does not print any
number lower than 300).
# Write one while-loop that starts at 80 and prints every 12h
number thereafter,
# but does not print any number greater than 210
# Write one while-loop that prints all the numbers from 30
through 70,
# except for the numbers 41 and 57.
# Write one while-loop that prints the sum of all the even
numbers
# (50, 52, 54, . . . etc.,) from 50 through 2000.
# Write one while-loop that prints the count of all the
numbers
# from 20 through 2500 that are divisible by 9
# (in other words prints out how many numbers are divisible by
9).
In: Computer Science
1. Use long division to convert decimal fraction into a binary expansion. 3/5
2. Find the decimal equivalent for the following binary numbers. 1101.11102
3. Use long division to convert decimal fraction into a binary expansion. 3/4
4. Find the binary equivalent the following decimal numbers. 14. 25390625 1
5. Find the decimal equivalent for the following binary numbers. 0.110001102
6. Exactly how many bytes are in the following? 60MB
In: Computer Science
Create a Python file num_utils.py that includes:
Create a Python file test_num_utils.py that:
In: Computer Science
1. Add the following binary numbers in 4-bit, two's complement notation. Identify any overflow errors. 01102 + 01002
2.Add the following binary numbers in 4-bit, two's complement notation. Identify any overflow errors. 10102 + 11112
3.Add the following binary numbers in 4-bit, two's complement notation. Identify any overflow errors. 10112 + 01112
In: Computer Science
Given the following memory values and address instruction with an accumulator. Determine the values with the following instructions load into accumulator.
Word 16 contains 22
Word 18 contains 24
Word 20 contains 26
Word 22 contains 28
Word 24 contains 30
Word 26 contains 32
Word 28 contains 34
i. LOAD IMMEDIATE 16
ii. LOAD DIRECT 16
iii. LOAD INDIRECT 16
iv. LOAD IMMEDIATE 18
v. LOAD DIRECT 18
vi. LOAD INDIRECT 20
vii. LOAD IMMEDIATE 24
viii. LOAD DIRECT 26
ix. LOAD INDIRECT 22
x. LOAD DIRECT 28
[10 Marks]
In: Computer Science
Identify any THREE (3) input devices and THREE (3) output devices which are
common used in our life. Discuss the benefits of using these devices in our daily
life.
[18 Marks]
In: Computer Science
1. Add the following binary number in 8-bit. Rewrite each problem in decimal notation to check you work. 10110101112 + 011001002
2. Find the binary equivalent the following decimal numbers. 0.25
3. Find the decimal equivalent for the following binary numbers. 1110102/100000002
4. Find the decimal equivalent for the following binary numbers. 0.00102
5. Give the multiplying factor associated with each of the following metric prefixes. Deci-
6. Find the binary equivalent the following decimal numbers. 0.6875
7. Exactly how many bits are in the following? 40 GB
8. Use long division to convert decimal fraction into a binary expansion. 3/5
9. Find the decimal equivalent for the following binary numbers. 1101.11102
10. Use long division to convert decimal fraction into a binary expansion. 3/4
11. What is the best approximation of the decimal fraction 2/3, using a denominator of 8, 16, 256?
12. Find the binary equivalent the following decimal numbers. 14. 25390625
13. Find the decimal equivalent for the following binary numbers. 0.110001102
14. Exactly how many bytes are in the following? 60MB
In: Computer Science
SQL Program True/False Question
1. Which of the following is true of a many to many relationship? T/F
2. Security is rarely a concern for most databases. T/F
3. A security requirement refers to the need to restrict who can access some of the database data. T/F
4. Report requirements refer to the input forms the database will need. T/F
5. Insert permission is the permission to add records to the database. T/F
6. A trigger is code usually written in SQL which is triggered by a database event such as an insert or delete. T/F
7. A data requirement refers to the need to gather data about the database. T/F
8. One to one relationships are the most common relationship in a relational database. T/F
9. If you have an attribute that can have multiple values you should just number them 1, 2, 3, etc. T/F
10. Ideally every attribute in a database should have a unique name. T/F
11. Lookup entities have no effect on data consistency and integrity T/F
In: Computer Science