Questions
Draw a small diagram of a MAC address. Note the OUI. Note how many bits in...

Draw a small diagram of a MAC address. Note the OUI. Note how many bits in each section.

In: Computer Science

Java Programming Preferably Concepts: Generics Arrays Objects Part I: Write a routine in Java that takes...

Java Programming Preferably

Concepts:

Generics

Arrays

Objects

Part I: Write a routine in Java that takes an array, the length of the array, and an element and returns the position of the element in the array. For example, given the array with values [2, 4, 6, 8] and element 6, the routine should return 2 (since counting from 0, 6 occurs at position 2 in the array). Your routine should use generics to enable your routine to be reusable for different element types. Be sure to test your code with a Java compiler before you submit it.

Part II: Write a generic “greater-than” function that (a) takes two objects as arguments, each of which has a “value” method which returns an integer; and (b) returns the argument whose “value” method returns the larger integer. Your generic function should constrain its type argument so that types without a “value” method cannot be used.Please review the test harness example to ensure your program meets the requirements. Find the test harness below;

public class TestGenerics {

public static void main(String[] args) {

MyFirstObject myObj1 = new MyFirstObject();

MySecondObject myObj2 = new MySecondObject();

MyGenerics mg = new MyGenerics();

Integer[] array = {2,4,6,8};

System.out.println( mg.partOne(array, array.length, 6) );

System.out.println( mg.partTwo(myObj1, myObj2) );

}

}

In: Computer Science

Create a C++ integer linked list program that performs the following methods below: Please create these...

Create a C++ integer linked list program that performs the following methods below:

Please create these three source files: intList.h, intList.cpp, & intListTest.cpp.

Implement recursive routines in the intList class to do the following:

  • Print the list in reverse order
  • Return the value in the middle node
  • Return the average of all the odd values
  • Remove every node containing an odd value

Modify main (in IntListTest.cpp) so it does the following:

  1. Insert the numbers 1, 3, 4, 6, 7, 10, 15, 20, 33.
  2. Find the sum of all values.
  3. Print the list in reverse order.
  4. Print the value of the middle node.
  5. Print the average of all the odd values.
  6. Remove every node containing an odd value.
  7. Print the list in reverse order.
  8. Print the value of the middle node.

Steps 3-8 must use recursion.

Please follow requirements.

In: Computer Science

Question 1: The word size of a computer generally indicates the largest integer it can process...

Question 1: The word size of a computer generally indicates the largest integer it can process in a single instruction. Discuss two different word sizes of computer systems and provide a brief comparison of both word size systems.(Discuss in one full page)

Question 2: A computer has RAM of size 64 M words, its instruction set has 32 instructions and 16 registers in the CPU. What is the format and size of each of the following instructions?

ADD R1,R2,R3

Move a, R1

Halt

In: Computer Science

4.31 Implement function duplicate() that takes as input the name (a string) of a file in...

4.31 Implement function duplicate() that takes as input the name (a string) of a file in the current directory and returns True if the file contains duplicate words and False otherwise. duplicate('Duplicates.txt') True duplicate('noDuplicates.txt') False

Please solve using Python Language and without using str.maketrans please. Just simple programming, Thank youuuuu!!!!!

In: Computer Science

. What is the primary difference between UDP and TCP? One is connection-oriented, one is connectionless...

. What is the primary difference between UDP and TCP?

  1. One is connection-oriented, one is connectionless
  2. One uses checksums, one does not
  3. One is used by a router, the other by a bridge
  4. One is used by IP, the other is used by ICMP
  5. They are identical

33. A router deals with which part of the IP address:

  1. NIC
  2. PORT
  3. Host ID
  4. Network ID

34. A hop in a TCP/IP network refers to:

  1. Going through a bridge
  2. Going through a router
  3. Going through a NIC
  4. Going through a web server

35. How many subnets (excluding all 0’s and all 1’s) can be uniquely identified with 4 bits?

  1. 14
  2. 28
  3. 30
  4. 64

36. How many subnets (excluding all 0’s and all 1’s) can be uniquely identified with 5 bits?

  1. 28
  2. 30
  3. 31
  4. 64

37. What is one of the main purposes of IP version 6 (IP Next Generation)?

  1. Allows for more applications
  2. Allows for more IP addresses
  3. Allows for more Class C addresses
  4. Creates a connection-oriented mode for IP

38. Address 205.169.85.0 is assigned by ICANN as a corporate IP address. Which of the following statements is true:

  1. It is a class C address
  2. It is a class B address
  3. It is a class A address
  4. It is a loopback address

In: Computer Science

Write in assembly 8086. Write a program to input nine numbers in 4*4 array and prints...

Write in assembly 8086.

Write a program to input nine numbers in 4*4 array and
prints the maximum value of
each row and then prints the minimum of each column.

In: Computer Science

Question 1: The following questions contains real numbers for COVID-19 daily report made on 2020-09-07 Use...

Question 1:

The following questions contains real numbers for COVID-19 daily report made on 2020-09-07

Use the CREATE TABLE command and Insert command to create the following table. For each field, pick the most appropriate data type for it.

Give the table name COVID_REPORT and make “Country_name” as Primary Key.

Question 1:

The following questions contains real numbers for COVID-19 daily report made on 2020-09-07

Use the CREATE TABLE command and Insert command to create the following table. For each field, pick the most appropriate data type for it.

Give the table name COVID_REPORT and make “Country_name” as Primary Key.

Country_name

Continent

new_cases

new_deaths

total_cases

total_deaths

Saudi Arabia

Asia

895

32

320827

4081

Bahrain

Asia

676

2

54771

198

United Kingdom

Europe

2988

2

347152

41551

France

Europe

7071

3

324777

30701

Lebanon

Asia

415

4

20426

191

Country_name

Continent

new_cases

new_deaths

total_cases

total_deaths

Saudi Arabia

Asia

895

32

320827

4081

Bahrain

Asia

676

2

54771

198

United Kingdom

Europe

2988

2

347152

41551

France

Europe

7071

3

324777

30701

Lebanon

Asia

415

4

20426

191

In: Computer Science

To be Completed in C# Write a program that creates an exception class called ManyCharactersException, designed...

To be Completed in C#

Write a program that creates an exception class called ManyCharactersException, designed to be thrown when a string is discovered that has too many characters in it. Consider a program that takes in the last names of users. The driver class of the program reads the names (strings) from the user until the user enters "DONE". If a name is entered that has more than 20 characters, throw the exception. Design the program such that it catches and handles the exception if it is thrown. Handle the exception by printing an appropriate message, and then continue processing more names by getting more inputs from the user. Note: Your program should exit only when the user enters "DONE".

SAMPLE OUTPUT:

Enter strings. When finished enter DONE

Short string

You entered: Short string

Medium size string

You entered: Medium size string

Really really long string, someone stop me!

You entered too many characters

DONE

You entered:

DONE

Good bye!

In: Computer Science

Whenever an exception arises, it terminates the program execution, which means it stops the execution of...

Whenever an exception arises, it terminates the program execution, which means it stops the execution of the current java program.
a) Identify and explain how the remedy for the exception is considered.
b) Implement the above-identified remedy in the java program to overcome the problem raised in the exceptional case when we try to open and close the files.

In: Computer Science

Create HiArrayPerson class to store objects of type class Person (in java ) and Give example

  1. Create HiArrayPerson class to store objects of type class Person (in java ) and Give example

In: Computer Science

DHCP Troubleshooting Review the following technical support email from a junior IT admin: Facilitation Dear IT...

DHCP Troubleshooting

Review the following technical support email from a junior IT admin:

Facilitation

Dear IT Admin:

I am working at a branch office and have been tasked with changing out the DHCP scope to match the overall corporate IP address scheme. The main office assigned me an IP address range of 192.168.0.200 through 192.168.0.225. I changed the scope on Friday afternoon and came in on Monday morning to discover that only some of the workstations had picked up new leases from the new DHCP scope. Any ideas as to what may be happening, what I might check or adjust?

Thank you, Junior Admin

-- Respond in detail with clarifying questions, suggested approaches and/or possible solutions

In: Computer Science

List two algorithms commonly used to identify a frame for replacement

List two algorithms commonly used to identify a frame for replacement

In: Computer Science

1a. Computers that predated the transistor (such as the ENIAC) used what technology to implement binary...

1a. Computers that predated the transistor (such as the ENIAC) used what technology to implement binary logic?

1b. How many electons does each of the following elements have?

silicon

boron

phosphorus


1c. A diode has how many terminals and how many junctions ?

A transistor has how many terminals and how many junctions?

In: Computer Science

What characteristics need to be exhibited by an organization to improve its software process?

What characteristics need to be exhibited by an organization to improve its software process?

In: Computer Science