Computer science

The Architecture of Computer Hardware, Systems Software and Networking An Information Technology App Textbook Questions And Answers

US$14.99 US$24.00

b Chapter: 3 -Problem: 22 /b Using whatever programming language is appropriate for you, write a program that converts a whole number input by the user from base 8 to base 10. Your program should flag as an error any input that contains the digits 8 or 9. brbAnswer Preview/

Description

Chapter: 3 -Problem: 22 >> Using whatever programming language is appropriate for you, write a program that converts a whole number input by the user from base 8 to base 10. Your program should flag as an error any input that contains the digits 8 or 9.
Answer Preview: This is a programming problem with a number of different solutions The easiest approach is to ac…

, Chapter: 13 -Problem: 19 >> What are the specific so-called “qualities” that quality of service attempts to measure and achieve? Describe the two methods that are normally used as an attempt to achieve this quality.
Answer Preview: QoS is concerned primarily with the consistent and smooth transmission of streaming data requiring h…

, Chapter: 14 -Problem: 18 >> Explain the relationship between QAM with phase and amplitude modulation.
Answer Preview: Relationship between QAM both phase and amplitude Modulation In Amplitude modulation we can module o…

, Chapter: 3 -Problem: 11 >> Using the powers of each digit in base 8, convert the decimal number 6026 to octal.
Answer Preview: The powers of digits in 8 …

, Chapter: 7 -Problem: 7 >> If the memory register for a particular computer is 32 bits wide, how much memory can this computer support?
Answer Preview: Memory 2 32 B …

, Chapter: 12 -Problem: 12 >> What is the difference between physical topology and logical topology? Which one is more important when locating the wires for construction of a network? Which is more important in describing the operation of a network?
Answer Preview: The physical topology shows the structure of how devices a…

, Chapter: 3 -Problem: 25 >> Convert the following numbers from decimal to hexadecimal. If the answer is irrational, stop at four hexadecimal digits:a. 0.6640625 b. 0.3333 c. 69/256
Answer Preview: a b c 69256 64 4 1256 1…

, Chapter: 12 -Problem: 14 >> What is the purpose of a backbone network?
Answer Preview: A backbone is nothing but which interconnects various networks If …

, Chapter: 11 -Problem: 10 >> What is a “loosely coupled” computer system? How does it differ from a “tightly coupled” system?
Answer Preview: loosely coupled system It is a notion of system format and computing where loosely coupled system is one in which each and every individual thing has …

, Chapter: 17 -Problem: 3 >> What is a file attribute? Give two or three examples of a file attribute. Where would the file attributes of a particular file be found?
Answer Preview: File attributes are settings associated with computer files that grant or deny certain rig…

, Chapter: 13 -Problem: 7 >> Explain carefully the purpose and use of the sequence number and acknowledgment number in connection-oriented communications. Create a multi packet example that illustrates exactly how these packets are used by TCP.
Answer Preview: This problem requires external research since it goes beyond the discussion in the text Data in TCP …

, Chapter: 14 -Problem: 7 >> What is the basic unit of analog signaling?
Answer Preview: Actually analogy signals have no particular unit it is combination of m…

, Chapter: 18 -Problem: 28 >> Figure 18E.2 shows that, for a given process, the page fault rate in a virtual storage system increases as the page size is increased and then decreases to 0 as the page size approaches P, the size of the process. Explain the various parts of the curve.Figure 18E.2 Transcribed Image Text: Page size
Answer Preview: This graph demonstrates the effect of page size on the rate of page faults for a process …

, Chapter: 18 -Problem: 17 >> What are the contents of a page table? Explain how a page table relates pages and frames.
Answer Preview: The page table holds the mapping between a virtual a…

, Chapter: 13 -Problem: 1 >> Name each of the layers in the TCP/IP-Ethernet set of protocols. Name at least one important protocol in each of the three top layers. What is the major advantage of layering in the network model?
Answer Preview: TCPIP Protocol Architecture TCPIP Protocol contains 4 layers where as corresponding OSI layer has 7 …

, Chapter: 3 -Problem: 12 >> Use the division method to convert 1234510 to base 2. Verify your answer by using the weights method to convert your answer back to base 10.
Answer Preview: Converting From Decimal To Binary 12345 2 6172 and 1 is remind…

, Chapter: 1 -Problem: 6 >> Protocols and standards are an important feature of networks. Why is this so?
Answer Preview: Protocols are necessary in networks so that the components at each …

, Chapter: 11 -Problem: 12 >> Briefly explain each of the four reasons for creating a cluster. Give an example of each reason if you can.
Answer Preview: Four Reasons for counting a cluster 1 For Security Reading a cluster en…

, Chapter: 4 -Problem: 6 >> What is image metadata? Give an at least three examples of metadata that would be required for a bitmap image.
Answer Preview: Metadata is basically a set of information that describes and gives information about a certain item s content Or we can say Metadata means data about …

, Chapter: 2 -Problem: 1 >> The human body is an example of an object that can be represented as a system. Consider the various ways in which you could represent the human body as a system. Select a representation and identify the components that constitute the system. Select one component and decompose it to the next subsystem level. Now consider a completely different system representation of the human body and repeat this
Answer Preview: There are a number of possibilities Here are two a functiona…

, Chapter: 12 -Problem: 20 >> What is routing? Explain the difference between circuit switching and virtual circuit switching. What is a third, more common, alternative? How does it differ from the other two?
Answer Preview: Routing A Router is a process of selecting path along which the data can be transferred from source to the destination Routing is performed by a special device known as a router A Router works at the …

, Chapter: 3 -Problem: 1 >> In the book we show that 52710 represents 5 × 102 +2 × 101 +7 × 100. What is the representation for 5278? What would its equivalent base 10 value be?
Answer Preview: 527 8 5 …

, Chapter: 13 -Problem: 24 >> Is it possible to build a network that can simultaneously recognize more than one protocol suite? If so, explain how this could be done.
Answer Preview: The header of each packet needs to contain some metainformation that allows the …

, Chapter: 12 -Problem: 4 >> What is a message in the context of data communications?
Answer Preview: The Message is the basic component for working of a communication system T…

, Chapter: 8 -Problem: 2 >> Consider a CPU that implements a single instruction fetch–decode–execute–write back pipeline for scalar processing. The execution unit of this pipeline assumes that the execution stage requires one step. Describe, and show in diagram form, what happens when an instruction that requires one execution step follows one that requires four execution steps.
Answer Preview: The instruction that requires fou…

, Chapter: 12 -Problem: 5 >> Explain briefly the communications between a Web browser and a Web server in fulfilling a Web page request.
Answer Preview: communication between web browser and web server Step 1 The user on the client computer type a url l…

, Chapter: 18 -Problem: 28 >> Describe the tasks that are performed by a hypervisor.
Answer Preview: A hypervisor is a process that creates and runs virtual machines I…

, Chapter: 11 -Problem: 5 >> What is the predominant master bus found on modern personal computers? What advantages does this bus offer over other buses?
Answer Preview: The most predominant bus found in the modern computer The predominate Master …

, Chapter: 18 -Problem: 19 >> What kind of fragmentation would you find in virtual storage? Is this a serious problem? Justify your answer. Discuss the relationship between fragmentation and page size.
Answer Preview: For most virtual systems physical memory is divided into pages of fixed s…

, Chapter: 13 -Problem: 2 >> The DNS database is described as “a directory system of servers”. Based upon your understanding of DNS from the text, explain the meaning of this description.
Answer Preview: The DNS is arranged in a hierarchy similar to a directory tree with a root at the top Each m…

, Chapter: 12 -Problem: 13 >> It is common to characterize networks by their range or area of coverage. What are the major categories of networks based on this criterion?
Answer Preview: Based on the range of networksit is divided by 3 Major categories LAN MAN WAN L…

, Chapter: 18 -Problem: 21 >> The manual for an old operating system pointed out that the number of concurrent users on the system can be increased if the users are sharing programs, such as editors, mail readers, or compilers. What characteristics of virtual storage make this possible?
Answer Preview: If the users are sharing programs their processes are sharing the pages that hold the pro…

, Chapter: 17 -Problem: 14 >> What does it mean to mount a volume into a file system?
Answer Preview: It means that information (directories and files) in a storage …

, Chapter: 2 -Problem: 4 >> Thinking in terms of systems allows us to analyze situations that are too complicated for us to understand as a whole. What specific characteristics and features of system thinking make this possible?
Answer Preview: The key to system analysis is the ability to divide a system i…

, Chapter: 18 -Problem: 27 >> An operating system designer has proposed using inverted page tables for each process instead of conventional page tables as the lookup tables for each memory reference. Since there are always fewer frames than pages in the page table, this would reduce the amount of memory required for the tables themselves. Is this a good idea? Why or why not?
Answer Preview: Using inverted page tables for each process instead of conventional page tables can re…

, Chapter: 18 -Problem: 14 >> What is the basic problem that memory management is supposed to solve? What is the shortcoming of memory partitioning as a solution?
Answer Preview: The memory management is used to provide allocation of parts of the memory to programs which require or request it and is reusable for different reque…

, Chapter: 3 -Problem: 15 >> Using the multiplication method, convert the following numbers to decimal:a. 11000101001000012 b. C52116 c. 3ADF16 d. 245567
Answer Preview: a Converting 1100010100100001 to decimal Working from lef…

, Chapter: 4 -Problem: 2 >> Name the three standards in common use for alphanumeric characters. Which standard is designed to support all of the world’s written languages? Which language is used primarily with legacy programs that execute on mainframe computers?
Answer Preview: The three standards in common use for alphanumeric ch…

, Chapter: 17 -Problem: 11 >> What operation can a user perform to improve the ratio of contiguous to non-contiguous files in a system?
Answer Preview: Contiguous Memory Allocation : Contiguous memory allocation is basically a method in which a single contiguous section/part of memory is allocated to …

, Chapter: 4 -Problem: 3 >> What character string does the binary ASCII code1010100 1101000 1101001 1110011 0100000 1101001 1110011 0100000 1000101 1000001 1010011 1011001 0100001represent?
Answer Preview: Converting the code to hexadecimal …

, Chapter: 18 -Problem: 4 >> How does a process differ from a program?
Answer Preview: Program Process Program is a set of instructions to perform a s…

, Chapter: 4 -Problem: 5 >> What are the major characteristics of a bitmap image? What are the major characteristics of an object or vector image? Which is used for displays? What types of images must be stored and manipulated as bitmap images? Why?
Answer Preview: Characteristics of bitmap images involve two parameters the color of the depth of each pixel and the …

, Chapter: 15 -Problem: 11 >> The basic role of a file management system is to provide a mapping service. Between what and what?
Answer Preview: file management system a file management system is a software designated …

, Chapter: 1 -Problem: 7 >> Although there is substantial overlap between protocols and standards there are protocols that are not standards and standards that are not protocols. With the help of a dictionary, identify the differences between the definition of protocol and the definition of standard; then, identify a specific example of a standard that is not a protocol; identify a specific example of a protocol that is not
Answer Preview: Although most protocols are designed to be standards it is possible to create a private pr…

, Chapter: 18 -Problem: 26 >> What are the differences, trade-offs, advantages, and disadvantages between an OS that implements deadlock prevention versus deadlock avoidance versus deadlock detection and recovery?
Answer Preview: Deadlock prevention is designed to prevent deadlock by eliminating the conditions that make deadlock …

, Chapter: 17 -Problem: 6 >> Give at least three examples of file operations that manipulate the data within the file itself.
Answer Preview: 1)Directory operations modify the names space of files Modify means some chang…

, Chapter: 3 -Problem: 20 >> Convert the base 3 number 2101023 to octal. What process did you use to do this conversion?
Answer Preview: This conversion is performed using de…

, Chapter: 4 -Problem: 3 >> What is the relationship between the ASCII Latin-1 character set and its Unicode equivalent that makes conversion between the two simple?
Answer Preview: The relationship between the American Standard Code for Information Interchange ASCII Latin 1 charac…

, Chapter: 17 -Problem: 7 >> Give three examples of file operations that operate only on the directories, not on the files themselves.
Answer Preview: These are the three examples of file opera…

, Chapter: 3 -Problem: 21 >> Convert the octal number 277458 to hexadecimal. Do not use decimal as an intermediary for your conversion. Why does a direct octal-hexadecimal conversion not work in this case? What can you use instead?
Answer Preview: This conversion is performed us…

, Chapter: 4 -Problem: 14 >> Explain the difference between numeric characters and numbers. Under what conditions would you expect the computer to use numeric characters? When would you expect the computer to use numbers? When numeric data is entered at the keyboard, which form is used? Which form is used for calculations? Which form is used for display?
Answer Preview: A numeral is a symbol or name that stands for a number Examples 3 49 and twelve are all numerals So …

, Chapter: 18 -Problem: 16 >> What is a frame in virtual storage? What is the relationship between a frame and physical memory?
Answer Preview: When a program is selected for execution, the system brings it into virtual storage, di…

, Chapter: 3 -Problem: 12 >> Using the powers of each digit in hexadecimal, convert the decimal number 6026 to hexadecimal.
Answer Preview: The powers of digits in he…

, Chapter: 13 -Problem: 23 >> Describe clearly, step-by-step, and layer-by-layer, the operation that takes place when passing a datagram through an intermediate node in a switching network.
Answer Preview: For the link from the sending node to the intermediate node the netw…

, Chapter: 2 -Problem: 9 >> What are the principal responsibilities of a system architect?
Answer Preview: A System Architect is a technologist with immense experience in the field of …

, Chapter: 13 -Problem: 13 >> Prior to the invention of Ethernet, researchers at the University of Hawaii proposed a broadcast radio network called ALOHANet as a means to provide wireless links between the Hawaiian islands. Each node had a radio transmitter which could be used to send data packets. When two stations attempted to transmit simultaneously, a collision occurred, and like Ethernet, each station would wait for a ran
Answer Preview: The fundamental concepts incorporated in ALOHANet are very similar to those of Ethernet Each allows …

, Chapter: 3 -Problem: 11 >> Use the division method to convert 1234510 to base 16. Verify your answer by using the weights method to convert your answer back to base 10.
Answer Preview: Convert Decimal to Hexadecimal 12345 is dividing with 16 then 12345 16 …

, Chapter: 16 -Problem: 1 >> What is the primary purpose for a user interface?
Answer Preview: A user interface is a communication portal between …

, Chapter: 4 -Problem: 2 >> a. What is the ASCII representation for the numeral ?3.1415 in binary? in octal? in hexadecimal? in decimal?b. What is the EBCDIC representation for the numeral +1,250.1? (Include the comma.)
Answer Preview: a Binary 0101101 0110011 0101100 011000…

, Chapter: 18 -Problem: 1 >> Describe, in step-by-step form, the procedure that the operating system would use to switch from one user to another in a multi-user time sharing system.
Answer Preview: Users represent processes in a preemptive multitasking system The m…

, Chapter: 18 -Problem: 5 >> What are user processes? What are system processes?
Answer Preview: A system process is initiated, and owne…

, Chapter: 13 -Problem: 6 >> Explain the technique that is used by DNS to distribute the load of large websites.
Answer Preview: A large site will have many IP addresses associated with a single domain name The DNS database …

, Chapter: 3 -Problem: 8 >> Using the weights in base 16, convert 11710 into base 16. Convert 117010 into base 16.
Answer Preview: Ans 1 1170 10 492 16 Step by step solution Step 1 Divi…

, Chapter: 2 -Problem: 6 >> What is the primary concern of application architecture? Give an example of application architecture, either your own, or one from the examples in the book. Explain how this example fulfills the features and requirements of the concept of application architecture.
Answer Preview: PRIMARY CONCERN OF APPLICATION ARCHITECTURE An application architecture describes the patterns and t…

, Chapter: 18 -Problem: 22 >> Explain the concept of a working set.
Answer Preview: The "working set" is an informal term meaning the memory that\'s being accessed "frequently" (for …

, Chapter: 13 -Problem: 22 >> Packages and high-priority mail are handled by The Typical Large Corporation (TyplCorp) in a way that is typical of large corporations. Each company building has a centralized mailroom where packages are received from personnel from various departments. Packages destined for other offices in the same building are delivered directly by the mailroom to those offices. Other packages are picked up by
Answer Preview: The districts defined by OPS are like the networks in TCPIP model The address u…

, Chapter: 1 -Problem: 4 >> The book divides the software component of a computer system into two major categories. Identify each category and give an example of each that you are already familiar with. Briefly explain the role of each category.
Answer Preview: Different types of Software 1 SYSTEM SOFTWARE A system software aids the user and the hardware to fu…

, Chapter: 17 -Problem: 17 >> Windows and Linux use two different methods to identify files on a network. Briefly describe each method.
Answer Preview: Windows: Your software package provides every user account with its own folders once you discovered many totally different user accounts on constant l…

, Chapter: 18 -Problem: 4 >> Why is there no path on the process diagram from blocked state to running state?
Answer Preview: There is no path from the blocked state to the running state becaus…

, Chapter: 16 -Problem: 5 >> Discuss the major trade-offs between a command line interface and a graphical user interface.
Answer Preview: CLI GUI It consumes low memory. While consumes more memory. In CLI we ca…

, Chapter: 2 -Problem: 2 >> Explain the relationships among the following words: system, environment, boundary, and interface.
Answer Preview: A system is an assortment of components connected together and coord…

, Chapter: 18 -Problem: 18 >> Explain how page translation makes it possible to execute a program that is stored in memory non-contiguously.
Answer Preview: Prerequisite Variable Partitioning, Fixed Partitioning Paging and Segmentation are the two ways that …

, Chapter: 1 -Problem: 1 >> Look at the computer ads on the business pages of a large daily newspaper and make a list of all the terms used that you don’t understand. Save this list and check it from time to time during the semester. Cross out the items that you now understand and look up the items that have been covered but which you still don’t understand.
Answer Preview: A successful advertising campaign will spread the word about your products and services attract customers and generate sales Whether you are trying to encourage new customers to buy an existing produc…

, Chapter: 17 -Problem: 12 >> NTFS file records are made up of components which are also called attributes, although the word has a different meaning. What is an NTFS attribute? What are the contents of an NTFS data attribute?
Answer Preview: NTFS file system attributes: New Technology File System (NTFS) composes each and every file or directory as a set of attributes (NTFS attributes). Fil…

, Chapter: 3 -Problem: 5 >> What are the first six weights in base 2? Using these weights, convert 1001012 to base 10.
Answer Preview: The first 6 weights of base 2 are following 2 0 1 2 1 2 2 2 …

, Chapter: 4 -Problem: 9 >> Explain briefly how an A-to-D converter converts audio data into binary data.
Answer Preview: Firstly we understand about mechanism of analogue to digital A D conversion Analog to digital conversion is the process of transforming the signal of …

, Chapter: 18 -Problem: 16 >> Create a page table that meets the translation requirements of Figure 18E.1. Assume a page size of 10.Figure 18E.1 Transcribed Image Text: Program 80 100 130 150 310 200 Logical 410 450 memory 500 500 Physical memory
Answer Preview: This page table contains 20 entries numbered 0 to …

, Chapter: 16 -Problem: 4 >> What is the advantage of offering the same user interface for applications, user programs, and commands?
Answer Preview: Advantage of offering the same U ser Interface for Applications, User Programs, and Commands :- (a) …

, Chapter: 1 -Problem: 7 >> What is a protocol? What is a standard? Do all protocols have to be standards? Explain. Are all standards protocols? Explain.
Answer Preview: PROTOCOLS A protocol is not a set of rules It includes all the rules and conventions for communicati…

, Chapter: 18 -Problem: 15 >> Show in a drawing similar to Figure 18.18 how two different programs with the same logical address space can be transformed by virtual storage partially into the same part of physical memory and partially into independent parts of physical memory. Assume that the two programs use the same program code, located from logical addresses 0 to 100, and that they each have their own data region, located
Answer Preview: A VM provides an isolated environment for running its own OS and applications independently from the underlying host system or from other VMs on that host. The VM's OS is commonly referred to as the …

, Chapter: 18 -Problem: 31 >> Consider the operation of a jukebox. Each table has a jukebox terminal where customers can feed coins to play songs (50 cents apiece, three for a dollar). Prior to the iPod era, the queue to hear your songs in a busy restaurant could be quite long, sometimes longer than the average dining time, in fact.Discuss the various disk scheduling algorithms as methods of selecting the order in which to pla
Answer Preview: At first glance it would seem that an FCFS algorithm is both easiest and fairest Careful analysis in…

, Chapter: 15 -Problem: 19 >> The UNIX kernel is described as a monolithic organization. What does this mean? What are the major challenges presented by a monolithic organization?
Answer Preview: Unix is a Monolithic operating architecture which makes it different fro…

, Chapter: 5 -Problem: 20 >> For the format used in Exercise 5.19, what decimal number is represented by each of the following numbers in floating point format? a. C2F0000016 b. 3C54000016Data from Exercise 5.19Convert the following binary and hexadecimal numbers to floating point format. Assume a binary format consisting of a sign bit (negative = 1), a base 2, 8-bit, excess-128 exponent, and 23 bits of mantissa, with the imp
Answer Preview: a C2F00000 16 1100001011110 The exponent is 10000101 and the mantissa is 1110 Shifting the n…

, Chapter: 3 -Problem: 10 >> Use the division method to convert 117010 to base 16. Confirm that your answer is the same as that in question 8, above.Data from Question 8Using the weights in base 16, convert 11710 into base 16. Convert 117010 into base 16.
Answer Preview: To convert base 10 or decimal number to base 16 or hexadecimal number usin…

, Chapter: 15 -Problem: 21 >> How do real-time systems differ from other types of operating systems?
Answer Preview: 1-General purpose operating system cannot perform real time tasks whereas real time operating syste…

, Chapter: 18 -Problem: 5 >> Describe what occurs when a user types a keystroke on a terminal connected to a multitasking system. Does the system respond differently for a preemptive or non-preemptive system? Why or why not? If the response is different, how is it different?
Answer Preview: When a user types a keystroke on a multiuser system it interrupts the system …

, Chapter: 15 -Problem: 20 >> Describe the organization of a hierarchically structured operating system.
Answer Preview: Hierarchical architecture views the whole system as a hierarchy structure, in which the software sys…

, Chapter: 1 -Problem: 1 >> Any computer system, large or small, can be represented by the four elements of an IPO model. Draw an IPO model; clearly label each of the four elements in your drawing.
Answer Preview: Input Proce…

, Chapter: 13 -Problem: 20 >> Explain the purpose of non-repudiation. How does non-repudiation differ from authentication? Create a business scenario that illustrates the importance of each.
Answer Preview: In network security nonrepudiation is defined as the ability of the receiver of a message to …

, Chapter: 18 -Problem: 13 >> There are a number of different factors, both hardware and OS software, that affect the operating speed of a virtual storage system. Explain carefully each of the factors and its resulting impact on system performance.
Answer Preview: The major hardware factor affecting virtual storage performance is the amount of installed physical …

, Chapter: 15 -Problem: 13 >> Explain the concept of a process. How does a process differ from a program?
Answer Preview: Process is an instance of program that is being executed. …

, Chapter: 4 -Problem: 7 >> Name two advantages to the use of object images.
Answer Preview: Two advantages to the use of object images are in the following ways 1 Information fi…

, Chapter: 17 -Problem: 5 >> Give at least three examples of file operations that operate on the file as a whole.
Answer Preview: 4 1 Basic Operations To handel file lookups fast we store …

, Chapter: 13 -Problem: 10 >> Explain the concept of a DHCP lease. How is it obtained? How is it used? What does it provide?
Answer Preview: A DHCP lease is an agreement in which a network node or client negotiates and a…

, Chapter: 18 -Problem: 29 >> Assume that you have a program to run on a Little Man-type computer that provides virtual storage paging. Each page holds ten locations (in other words, one digit). The system can support up to one hundred pages of memory. As Figure 18E.3 shows, your program is sixty-five instructions long. The available frames in physical memory are also shown in the diagram. All blocked-in areas are already occu
Answer Preview: a Here are two sample starting page tables The left one simply loads as much of the program as fits …

, Chapter: 18 -Problem: 14 >> Show in a drawing similar to Figure 18.18 how two different programs with the same logical address space can be transformed by virtual storage into independent parts of physical memory. Figure 18.18? Transcribed Image Text: Process 1 Frame Physical memory Process 3 – Page 1 Frame 0 Page 8 Process 1
Answer Preview: Mapping for Three Processes Process 1 Page 0 1 2 Page 0 1 Frame 8 1 3 Process 2 1 2 3 4 5 6 7 8 9 10 …

, Chapter: 12 -Problem: 5 >> A short-circuit failure is a failure in which the connection point signal line is electrically shorted to ground. Although NIC short-circuit failures are extremely rare, they do occur occasionally. What is the effect on a bus-based network if a short-circuit failure occurs? How would a repair person locate the source of the problem? What is the effect of an open-circuit failure?
Answer Preview: A shortcircuit failure in an NIU is potentially serious …

, Chapter: 4 -Problem: 1 >> When data is input to a computer, it is nearly always manipulated and stored in some standard data format. Why is the use of data standards considered important, or indeed, crucial in this case?
Answer Preview: The use of data standards is considered important or ind…

, Chapter: 16 -Problem: 11 >> Identify and explain the purpose of several features provided by an operating system API.
Answer Preview: Application Programming Interface - API It characterizes the sorts of calls or demands that can be made, how to make them, the information designs that ought to be utilized, the shows to follow, and s…

, Chapter: 12 -Problem: 4 >> Consider the e-business system of a large automobile manufacturer such as Ford. List at least a dozen mission-critical ways that this system would be used to communicate between its various locations, between itself and its suppliers, and between itself and its dealers. For each item, indicate the benefit that results from the networking capability of such a system.
Answer Preview: There are lots of possible answers for this exercise Here are just a few Between its various locatio…

, Chapter: 18 -Problem: 10 >> Earlier versions of Windows used an essentially non-preemptive dispatching technique that Microsoft called “cooperative multitasking”. In cooperative multitasking, each program was expected to voluntarily give up the CPU periodically to give other processes a chance to execute. Discuss. What potential difficulties can this method cause?
Answer Preview: While this method works under ideal conditions it has tw…

, Chapter: 2 -Problem: 10 >> Many system architects base their IT system designs on an n-tier architecture, where n is a number with value 2 or greater. Explain the difference between a single-tier architecture and an n-tier architecture. What are the main advantages claimed for an n-tier architecture?
Answer Preview: One tier application is also known as standalone application One tier architectu…

, Chapter: 3 -Problem: 27 >> Convert the following numbers from decimal to binary and then to hexadecimal:a. 27.625 b. 4192.37761
Answer Preview: a 27625 16 8 2 1 625 Either rec…

, Chapter: 18 -Problem: 6 >> Explain the purpose of a spawning operation. What is the result when the spawning operation is complete?
Answer Preview: Dear Student, Purpose of a spawning operation. Spawn in computing refers to a function that …

, Chapter: 3 -Problem: 17 >> Convert the following hexadecimal numbers to binary:a. 4F6A b. 9902 c. A3AB d. 1000
Answer Preview: a b c …

, Chapter: 3 -Problem: 15 >> What number in base 10 is equivalent to D in base 16? What number in base 16 is equivalent to the number 10 in base 10? Use the weights method to convert the number 5D16 to base 10. Use the division method to convert your answer back to base 16.
Answer Preview: 13 in base 10 is equal to D in base 16 A in base 16 is equi…

, Chapter: 17 -Problem: 18 >> How does a storage area network differ from a client–server approach to storage?
Answer Preview: Dear student, A SAN stores data at the block level, while NAS accesses data as files. T…

, Chapter: 2 -Problem: 5 >> What does the top-down approach allow a system architect to do that might be more difficult otherwise?
Answer Preview: The top down approach allows a system architect to both an…

, Chapter: 18 -Problem: 13 >> UNIX systems use a dynamic priority algorithm where the priority is based on the ratio of CPU time to the total time a process has been in the system. Explain how this reduces to round robin in the absence of any I/O.
Answer Preview: Round Robin also called (RR) algorithm performs optimally in timeshare systems …

, Chapter: 3 -Problem: 13 >> Use the multiplication method to convert 10112 to base 10. Verify your answer by using the weights method to convert the number back to base 2.
Answer Preview: converting from binary to decimal 1101 2 12 0 02 1 12 …

, Chapter: 18 -Problem: 25 >> Describe at least three network services offered by most operating systems in addition to protocol services.
Answer Preview: Network services offered by Operating systems - 1. Directory services - These are a mapping se…

, Chapter: 4 -Problem: 12 >> What is a page description language? Give an example of a page description language.
Answer Preview: The appearance of a printed page is …

, Chapter: 16 -Problem: 10 >> Use the batch file or shell script capability of your system to build a menuing interface that implements the most common commands that you use.
Answer Preview: Batch Script is incorporated to automate command sequences which are repetitive in nature. Scripting …

, Chapter: 1 -Problem: 3 >> Explain the differences between primary storage and secondary storage. What is each type used for?
Answer Preview: Primary Memory a Main memory or internal memory b RAM …

, Chapter: 15 -Problem: 18 >> What is the purpose of system generation?
Answer Preview: Ans- Lot of number of propose of system generation- 1- System g…

, Chapter: 3 -Problem: 17 >> Convert the number 11110011011002 directly from binary to hexadecimal. Without looking at the original number, convert your answer directly back to binary and compare your final answer with the original number.
Answer Preview: Converting binary to decimal 1111001101100 2 02 0 02 …

, Chapter: 17 -Problem: 1 >> The file management system provides a connection between a logical view of files and a physical view of files. What is meant by a “logical view of files”? What is meant by a “physical view of files”?
Answer Preview: logical view of files Logical view of files means files are looked at as a collection of records, or…

, Chapter: 3 -Problem: 9 >> Use the division conversion method to convert 321210 into base 8. Confirm that your answer is the same as that in question 7, above.Data from Question 7Using the weights in base 8, convert 21210 into base 8. Convert 321210 into base 8.
Answer Preview: To convert base 10 or decimal number to base 8 or octal number using division …

, Chapter: 18 -Problem: 7 >> Draw and label the process state diagram used for dispatching work to the CPU. Explain each state and the role of each connector.
Answer Preview: Process state diagram consist: 1. New State : The state in which process are present in the secondary memory. 2. Ready State : The state in which process are present in the RAM memory. And ready to us…

, Chapter: 2 -Problem: 7 >> Most modern computing in organizations is based on client–server models. Explain why this tends to be the case. Give an example of client–server computing that you are familiar with and explain the characteristics of your example that fulfill the concept of client–server computing.
Answer Preview: In peer to peer to computing all the nodes are equal and share data with each other directly Client Server computing is believed to be a subcategory of the peer to peer computing The Client server mod…

, Chapter: 16 -Problem: 10 >> Although Web-based user interfaces are somewhat limited when compared to CLIs and GUIs, their use in organizations has grown and continues to grow. What advantages do Web interfaces offer over CLIs and GUIs?
Answer Preview: Although Web-based user interfaces are somewhat limited when compared to CLIs a…

, Chapter: 4 -Problem: 13 >> Name five simple data types that are provided in most high-level programming languages.
Answer Preview: Most of the High level programming lan…

, Chapter: 17 -Problem: 6 >> Select a directory and list the files in that directory. For each file, determine how many blocks would be required if the block size were to be 512 bytes, 1 KB, 4 KB, and 8KB. Calculate the internal fragmentation for each file and for each block size. How much disk space on your PC is wasted for each block size? Also give the answer as a percentage of the total block space used for that directory
Answer Preview: By using the dir command in DOS prompt you can take a particular directory,and list all the files. H…

, Chapter: 4 -Problem: 8 >> What is the function of a video codec? What is the function of a video “container”? Name at least two different codecs. Name at least two different containers.
Answer Preview: Function of video codec A video codec is a software or …

, Chapter: 16 -Problem: 8 >> Sketch or “print screen” a typical GUI screen. Label each of the major components on the screen.
Answer Preview: Edit Student Information - Microsoft Internet Explorer …

, Chapter: 18 -Problem: 2 >> What values would you expect to find in the process state entry in a process control block? What purpose is served by the program counter and register save areas in a process control block? (Note that the program counter entry in a PCB is not the same as the program counter!)
Answer Preview: The process state value would normally be running ready or blocked or …

, Chapter: 4 -Problem: 11 >> Explain the difference between lossless and lossy data compression. Which type normally provides a smaller file? What is “lost” in lossy audio data compression? Under what circumstances is it impossible to use lossy data compression?
Answer Preview: Lossy and Lossless compression Data compression is a technique of reducing the size of a larger file to a smaller one The compressed file then can be …

, Chapter: 17 -Problem: 19 >> You are given the directory tree in Figure 17E.1. Assume that you are currently located at the point indicated with the arrow labeled (A) in the diagram. What is the relative path name for the file ourfile.doc? What is the absolute path name for this file? Suppose you are user Joan, located at the point indicated by the arrow labeled (B). What is your relative path name to the file ourfile.doc? Fi
Answer Preview: Relative pathname for file ourfile doc from point A -> bill/IS224…

, Chapter: 18 -Problem: 20 >> Explain why page sharing can reduce the number of page faults that occur in a virtual storage system.
Answer Preview: With page sharing several processes are sharing the same physical page Since the page is being s…

, Chapter: 17 -Problem: 16 >> What is the difference between a relative path name and an absolute path name? How does the system know which one a user is specifying at a particular time?
Answer Preview: Path: is a location of a file or a folder in a file syst…

, Chapter: 2 -Problem: 8 >> Web-based system architecture is a popular approach to many organizational systems because it offers a number of advantages to the users and to the organization over other types of systems. Discuss the primary advantages to this approach.
Answer Preview: Web Based Applications have evolved significantly over recent years and with improvements in securit…

, Chapter: 18 -Problem: 11 >> Explain the first-in-first-out dispatch algorithm. Discuss the advantages and disadvantages of this algorithm. Is this a preemptive or non-preemptive algorithm?
Answer Preview: A: First in first out dispatch algorithm is also known as first come first serve . This i…

, Chapter: 17 -Problem: 8 >> A program file is always read in its entirety. Would this file be accessed sequentially or randomly or by indexed access? Explain.
Answer Preview: Under the sequential access …

, Chapter: 16 -Problem: 6 >> Describe the user interface provided by a CLI command shell.
Answer Preview: Shell is a type of user interface which are used to access the operating system. Technical…

, Chapter: 5 -Problem: 24 >> Using the same notation as in Exercise 5.23, multiply the following numbers. Present your answer in standard decimal notation.a.05452500 04822200b.94650000 94450000Data from Exercise 5.23The following decimal numbers are stored in excess-50 floating point format, with the decimal point to the left of the first mantissa digit. Add them. A 9 is used as a negative sign. Present your result in standar
Answer Preview: a Multiplying the mantissas 0525 0222 0116550 …

, Chapter: 16 -Problem: 3 >> What is the purpose of a command language or scripting language?
Answer Preview: A scripting language is used to write scripts. These contain a …

, Chapter: 18 -Problem: 23 >> The CPU scheduling algorithm (in UNIX) is a simple priority algorithm. The priority for a process is computed as the ratio of the CPU time actually used by the process to the real time that has passed. The lower the figure, the higher the priority. Priorities are recalculated every tenth of a second.a. What kind of jobs are favored by this type of algorithm?b. If there is no I/O being performed, t
Answer Preview: a This algorithm favors jobs that require substantial amounts of IO While these jobs are blocked rea…

, Chapter: 15 -Problem: 12 >> If you have access to the system administrator of a large system, find out the steps that are required to perform a sysgen on the system. Also, determine the options that are available for that system.
Answer Preview: Stage 1 - A collection of SYSGEN Macros Stage 2 - The result of as…

, Chapter: 18 -Problem: 18 >> Develop an example that explains thrashing clearly.
Answer Preview: This is of course an exercise with a multitude of possible solutions One solution has three proc…

, Chapter: 18 -Problem: 12 >> Explain how the shortest job first algorithm can result in starvation.
Answer Preview: A: In SJF( Shortest Job First) algorithm the process with shortest burs…

, Chapter: 1 -Problem: 3 >> Suppose you would like to buy a computer for your own needs. What are the major considerations and factors that would be important in your decision? What technical factors would influence your decision? Now try to lay out a specification for your machine. Consider and justify the features and options that you would like your machine to have.
Answer Preview: Most importantly know what you want to use it for and set aside a realistic budget Your budget The first thing that most of us are constrained to is b…

, Chapter: 15 -Problem: 12 >> Briefly describe at least three of the four major services provided by a file management system.
Answer Preview: Here are three major services provid…

, Chapter: 18 -Problem: 7 >> Discuss the shortest-job-first scheduling method in terms of the various objectives given in the text.
Answer Preview: The shortest job first algorithm attempts to execute jobs nonpreem…

, Chapter: 17 -Problem: 13 >> Describe the contents and format of a free space bitmap.
Answer Preview: his technique is used to implement the free space management When the free space is implemented as t…

, Chapter: 18 -Problem: 33 >> Discuss possible tape scheduling algorithms for a tape controller. Assume that files are stored contiguously on tape. What effect would non-contiguous, linked files have on your algorithm?
Answer Preview: First if the files are stored contiguously the entire file will be read at once regardless of the search algorithm chosen Therefore the only question …

, Chapter: 3 -Problem: 4 >> Use the base 2 addition table to add 101012 and 11102. Use the base 2 multiplication table to multiply 101012 and 11102.
Answer Preview: Base 2 Addition 1 0 1 0 12 1 1 1 02 1 0 0 0 1 12 The Answer is 100011 base 2 Explanation The add…

, Chapter: 18 -Problem: 10 >> What are the potential difficulties that can occur when non-preemptive dispatching is used in an interactive system?
Answer Preview: Non-preemptive planning, any new procedure needs to hold …

, Chapter: 3 -Problem: 6 >> What are the first three weights in base 16? Using these weights, convert 35916 to base 10. (Notice that the same technique works for any base, even if the base is larger than 10.)
Answer Preview: The weights in base 16 are all powers of 16 which increases from right to left The first t…

, Chapter: 18 -Problem: 23 >> The not used recently page replacement algorithm stores two bits with each page to determine a page that is suitable for replacement. What does each bit represent? Which combination of bits makes a page the most desirable for replacement? Justify your answer. What combination would be second best?
Answer Preview: The not recently used page algorithm stores two bits with each page to determine a page that is suit…

, Chapter: 4 -Problem: 10 >> Describe briefly the most important characteristics and features of an MP3 audio file.
Answer Preview: The MP3 sound file is a MPEG sound layer 3 file format The vital component of MP3 files is the press…

, Chapter: 16 -Problem: 7 >> Describe the format of a CLI command. What is an operand? What is the difference between a keyword operand and a positional operand?
Answer Preview: CLI is nothing but it is a Command Line Interface. It is actually a user interface based on commands…

, Chapter: 18 -Problem: 12 >> Discuss the impact of virtual storage on the design of an operating system. Consider the tasks that must be performed, the various methods of performing those tasks, and the resulting effect on system performance.
Answer Preview: The operating system must work in synergy with the virtual storage hardware for …

, Chapter: 3 -Problem: 7 >> Using the weights in base 8, convert 21210 into base 8. Convert 321210 into base 8.
Answer Preview: 1 212 10 192 10 16 49 36410 …

, Chapter: 8 -Problem: 15 >> Explain the locality of reference principle and its relationship to cache memory performance and the hit ratio.
Answer Preview: Cache Memory is a special very high speed memory that acts as a buffer between RAM and the CPU It holds frequently requested data and instructions so that they are immediately available to the CPU whe…

, Chapter: 18 -Problem: 3 >> What are the major items found in a process control block?
Answer Preview: Major items found in Process Control Block (PCB) are as follows : (1) Pointer This …

, Chapter: 2 -Problem: 1 >> What are the most important ideas, keywords, and phrases that are stated in the de?nition of a system?
Answer Preview: A System means a mechanism or procedure established to achieve the desired result A set of …

, Chapter: 6 -Problem: 12 >> Even if he runs out of instructions to execute, the Little Man only stops trying to execute instructions under one condition. What is that condition? What happens if the Little Man runs out of instructions and that condition is not met?
Answer Preview: It is the COB coffebreak instruction if i…

, Chapter: 15 -Problem: 16 >> Identify at least four different tasks performed by a sysadmin.
Answer Preview: Ans- Important tasks performed by a sysadmin are- 1- V…

, Chapter: 18 -Problem: 32 >> Tanenbaum notes that the problem of scheduling an elevator in a tall building is similar to that of scheduling a disk arm. Requests come in continuously, calling the elevator to floors at random. One difference is that once inside, riders request that the elevator move to a different floor. Discuss the various disk scheduling algorithms as options for scheduling the elevator in terms of fairness,
Answer Preview: This is a situation in which FCFS is impractical because the direction of the eleva…

, Chapter: 5 -Problem: 26 >> Write a program in your favorite language that converts numbers represented in the decimal floating point formatSEEM M M M Minto 10’s complementary integer form. Round any fractional decimal value.
Answer Preview: 10th complement of a number is to be obtained as 1 A given number is subtracted from 9th compleme…

, Chapter: 5 -Problem: 16 >> When adding two floating point numbers, what must be true for the exponents of the two numbers?
Answer Preview: To add two floating p…

, Chapter: 18 -Problem: 20 >> Virtual storage makes it possible to execute a program that is larger than the available amount of memory. What obvious characteristic of program code makes this possible?
Answer Preview: The Modularity characteristic of programs made it possible to execute a program that is larger than …

, Chapter: 4 -Problem: 4 >> What is a collating sequence?
Answer Preview: Collating Sequence The alphabet that Java uses in comparing characters is known asa collating sequence All characters are positionedinto this sequence so any two characters can be compared Here is the …

, Chapter: 10 -Problem: 6 >> Suppose a disk is rotating at 7200 rpm. What is the minimum latency time for this disk? What is the maximum latency time for this disk?
Answer Preview: Ans Minimum latency time is 0 best case when rotational loca…

, Chapter: 3 -Problem: 2 >> How many different digits would you expect to find in base 6? What is the largest digit in base 6? Let z represent that largest digit. What is the next value after 21z if you’re counting up by 1s? What is the next value after 4zz if you’re counting up by 1s?
Answer Preview: In any base r we have r number of different digits starting from 0 1 2 r 1 Therefore in base 6 we ha…

, Chapter: 6 -Problem: 7 >> Write a Little Man program that accepts two numbers as input and outputs the numbers in reverse order.
Answer Preview: INP STA first IN…

, Chapter: 18 -Problem: 15 >> What is a page in virtual storage? What is the relationship between a program and pages?
Answer Preview: page is a contiguous and fixed length block of virtual memory. Page i…

, Chapter: 18 -Problem: 30 >> What is a real-time system? Discuss the impact of a real-time system on the design of the operating systems, paying particular note to the various components and algorithms to be used.
Answer Preview: A realtime system is one that supports timecritical processes Since rea…

, Chapter: 9 -Problem: 3 >> Explain the purpose of a buffer.
Answer Preview: A buffer contains data that is stored for a short period of …

, Chapter: 18 -Problem: 2 >> Where is the first stage of a bootstrap loader for a computer stored? What tasks does it perform?
Answer Preview: First we discuss about what is Bootstrap Loader. It is also known as Initial Program …

, Chapter: 1 -Problem: 2 >> For the computer that you normally use, identify which pieces constitute the hardware and which pieces constitute the system software. Now think about the file system of your computer. What part of the file system is hardware, what part software, and what part data?
Answer Preview: A computer is an electronic device operating under the control of instructions stored in its own memory that concept data manipulate the data accordin…

, Chapter: 7 -Problem: 21 >> Explain the difference between SHIFT and ROTATE instructions.
Answer Preview: The shift instruction moves the bits in any of the direction and replace…

, Chapter: 18 -Problem: 21 >> Describe the process that takes place when a page fault occurs? What happens if there are no frames available when a page fault occurs?
Answer Preview: A page fault occurs when a program attempts to access da…

, Chapter: 18 -Problem: 8 >> What is the risk that can result from the mixed non-preemptive–preemptive scheduling system taken by Linux, as discussed in the text?
Answer Preview: Linux operating system modules are executed nonpremptively This means that they must be test…

, Chapter: 6 -Problem: 1 >> Without looking at the book, draw a Little Man Computer. Label each of the components in your drawing.
Answer Preview: hese are main components in the window that are easily recognizable The window for typing in the code The two buttons to load the code into memory and then run The window for an input if any not neces…

, Chapter: 18 -Problem: 19 >> A program?s page table is shown in Figure 18Q.1. Assume that each page is 4KB in size. (4 KB = 12 bits). The instruction currently being executed is to load data from location 5E2416. Where is the data located in physical memory? Figure 18Q.1 Transcribed Image Text: Page Frame 2A 1 2B 2 3 17 4 18 5
Answer Preview: As page size is 4KB, which means 2^12 = 4096, then we exclude the fir…

, Chapter: 3 -Problem: 14 >> Use the multiplication method to convert 135716 to base 10. Verify your answer by using the division method to convert your answer back to base 16.
Answer Preview: 1357 16 10 1x 16 3 3 16 2 5x 16 1 7 16 0 4096 32…

, Chapter: 9 -Problem: 10 >> What are the three primary conditions that are required for DMA to take place?
Answer Preview: DIRECT MEMORY ACCESS DMA The process by which the i o devices directly access the …

, Chapter: 15 -Problem: 14 >> Describe at least two primary tasks performed by the memory management component of an operating system.
Answer Preview: Ans- primary tasks performed by the memory management component of an operating system- 1- Mem…

, Chapter: 18 -Problem: 25 >> Why is the working set concept much more effective if it is implemented dynamically, that is, recalculated while a process is executing?
Answer Preview: Different programs have different working set requirements and there is no way to determine th…

,

, Chapter: 18 -Problem: 24 >> Explain the working set concept. What is the relationship between the working set concept and the principle of locality?
Answer Preview: The working set concept is an attempt to balance the optimum u…

, Chapter: 10 -Problem: 10 >> What do the numbers 1920 × 1080 represent when describing a display?
Answer Preview: this display has a resolution of 1920 x 108…

, Chapter: 6 -Problem: 3 >> Describe, step by step, what the Little Man does to execute a STORE instruction.
Answer Preview: Little man arrives at the calculator and reads the number…

, Chapter: 8 -Problem: 9 >> What performance improvement is offered by memory interleaving?
Answer Preview: When the CPU needs data it requests temporary storage memory RAM To s…

, Chapter: 5 -Problem: 21 >> Represent the decimal number 171.625 in 32-bit IEEE 754 format.
Answer Preview: 171625 10 10101011101 2 The IEEE 754 format require…

, Chapter: 8 -Problem: 5 >> Which class of instructions can reduce performance by potentially invalidating the instructions in a pipeline? Identify two methods that can be used to partially overcome this problem.
Answer Preview: Answer The class of instruction which has the C…

, Chapter: 7 -Problem: 10 >> Many older computers used an alternative to the BRANCH ON CONDITION instruction called SKIP ON CONDITION that worked as follows: if the condition were true, the computer would skip the following instruction and go on to the one after; otherwise, the next instruction in line would be executed. Programmers usually place a jump instruction in the “in-between” location to branch on a FALSE condition.
Answer Preview: This ones tough It requires some real thought on the part of the s…

, Chapter: 15 -Problem: 15 >> Explain what is meant by preemptive and non-preemptive scheduling.
Answer Preview: CPU Scheduling used two type of Scheduling techniques 1 Preemptive Scheduling 2 Non-Preemptive Sched…

, Chapter: 8 -Problem: 1 >> The x86 series is an example of a CPU architecture. As you are probably aware, there are a number of different chips, including some from different manufacturers even, that qualify as x86 CPUs. What, exactly, defines the x86 architecture? What word defines the difference between the various CPUs that share the same architecture? Name at least one different CPU architecture.
Answer Preview: x86 architecture is an instruction set architecture series for computer processors It is developed by Intel organisation and x86 architecture defines how a microprocessor runs and handles instructions …

, Chapter: 15 -Problem: 20 >> a. Of what use is the list of active processes shown in Figure 15.5? What changes might a system administrator make in the system on the basis of this information?b. What does the average number of processes data tell you about the way that this system is normally used?c. Compare the three graphs in the figure.Figure 15.5

Additional Information

Book:
The Architecture of Computer Hardware, Systems Software and Networking An Information Technology App
Isbn:
ISBN: 978-1118322635
Edition:
5th edition
Author:
Authors: Irv Englander
Image:
1806.jpg

9 Reviews for The Architecture of Computer Hardware, Systems Software and Networking An Information Technology App Textbook Questions And Answers

Bobby Blevins
Thanks again for another great job. Best tutor around.
Amiyah Ford
This was a huge help to me, thank you. Great work.
Diamond Andrade
Always deliver a great work. The Best!!!
Taliyah Rhodes
Great/Perfect at as always.
Virginia Hampton

Add a review

Your Rating

61623

Character Limit 400