Discuss the y-two-k problem as problem of software evolution

Assignment Help Computer Engineering
Reference no: EM131889549

Problem

1. Study concurrency features in Ada, and provide a detailed description of the case where any number of consumers (defined by a task type) and one producer may access a given buffer to append characters to it and remove characters.

2. At the turn of the century, much attention was drawn to the so-called Y2K ("year 2000") problem. Most existing software was designed to handle dates by using two digits to denote the year. This would have generated errors because, for example, "00" could have been interpreted as the year 1900. Discuss the Y2K problem as a problem of software evolution. In particular, address the following issues: What was the source of the problem? Could the problem have been anticipated? Why was it not? How would you detect such errors in a program and how could you solve them?

Reference no: EM131889549

Questions Cloud

Determine the organization competitive position : Write a 1,400-word minimum internal environmental analysis in which you include the following: Assess the organization's internal environment.
Substitute the area of the enclosed space : Please help with what is the equation for the area of the enclosed space in the form y = (side length)2. Don't forget to add x to each side of the hot tub.
Describe the work packages involved in building a house : Describe the work packages involved in building a house, and show how they are organized sequentially and in parallel.
How much kinetic energy does that same car : Compared to a car moving at 10 miles per hour (mph), how much kinetic energy does that same car have when it moves at 75 miles per hour?
Discuss the y-two-k problem as problem of software evolution : Discuss the Y2K problem as a problem of software evolution. In particular, address the following issues: What was the source of the problem?
What is the temperature of the soda : What is the temperature of the soda 20 minutes after it is placed in the refrigerator. (Round to the nearest tenth of a degree.)
Determine two strategies that hershey is actually pursuing : Determine two strategies that Hershey is actually pursuing. Give some pros and cons of those two new Hershey strategies. Please look up the website for Hershey.
How many more miles did they travel on the way home : The trip home was 920 miles. How many more miles did they travel on the way home?
Would exported operations in provide any useful abstraction : Would the exported operations in provide any useful abstraction when they are called by the module's clients? Why? Why not?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Calculate the mttf of two redundant disk drives

Calculate the MTTF of two redundant disk drives where the MTTF is 1.2 million hours and the MTTR is 20 hours. Calculate the effective CPI.

  Select two organizations in which you are interested and

select two organizations in which you are interested and use the internet and strayer library to research the

  How to handle performance deterioration in wlan

South West State University installed a series of 4 Wi-Fi omni-directional APs (access points) spread across the ceiling of the key floor of their library.

  Discuss the technologies play in information security

write an explanation of the roles each of the technologies play in information security

  How to use a sorting algorithm

Prompt the user for name and age of a group of people. The group's size is unknown at first , so the program must keep asking the user if they want to enter more data.

  What is the capacity of the drive

Given the instruction set for MARIE in this chapter, decipher the following MARIE machine language instructions. (Write the assembly language equivalent.)

  Give specialize version of distribution counting for sorting

Give a specialized version of distribution counting for sorting files where elements have only one of two values (either x or y).

  Discuss long-term ramifications of the threat

damage done by the threat, long-term ramifications of the threat, and how the threat could have been mitigated or eliminated

  Give snmp help to monitor a network

What are some of the factors other then network itself that can cause the network to seem slow.

  Explain how both given situations can happen

If a file has the permissions 000, you may or may not be able to delete the file. Explain how both situations can happen.

  What are the main concepts in the materials covered

The concepts of recursive descent parsing (implementing a procedure for each nonterminal): Write your own questions. I would want to see diversity from you all.

  Create code for and16 logic using quartus two software

I need to create code for AND16 logic using Quartus 2 version 16.0 software. Also I need a brief description of how the AND16 logic works.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd