Question : Suppose that the BCR stores only one bit value. Calculate the total number of memory bytes present in the system. Do not include the BCR register in the total.
|
Create a class named Horse that contains data fields for the name, color, and birth year. Include get and set methods for these fields. Next, create a subclass named RaceHorse, which contains an additional field that hol ...
|
Suppose that a data warehouse consists of the four dimensions date, spectator, location, and game, and the two measures count and charge, where charge is the fare that a spectator pays when watching a game on a given dat ...
|
Make a function first-char that consumes a nonempty string and produces a string consisting of the first character in the original string. Do not use string-ref.
|
Assume that the group has a portfolio of 6 stocks. There is 30% chance that any one of these stocks will increase in value. Find the probability that four of the six stocks increases in value.
|
All RSA cryptosystem has public key N = 35 and e = 7. Messages are encrypted one letter at a time, converting letters to numbers by A = 2, B = 3, .... Z = 27, space = 28. Showing your working, encrypt the message: BE GOO ...
|
Explain why some organizations may not place enough importance on disaster recovery. What might happen to these organizations in the event of an actual disaster?
|
Construct a frequency distribution for the number of different residences occu-pied by graduating seniors during their college career, namely 1, 4, 2, 3, 3, 1, 6, 7, 4, 3, 3, 9, 2, 4, 2, 2, 3, 2, 3, 4, 4, 2, 3, 3, 5
|
Question : Suppose you want to store the following information: Student_id Course Mark 111 Maths 78 111 Physics 90 222 Biology 89 333 Physics 60 333 Chemistry 75 1.a Is this table in first normal form? Why or Why Not? 1. ...
|
What are Security Planning Principles? What is policy-based security? (Hint for both: pure definition is not good enough. Answers need to be illustrated in the context of an example or scenario).
|
|