What problem is addressed by checksums

Assignment Help Basic Computer Science
Reference no: EM13808957

Part 1-

a. Circle any of the following which offer persistent byte storage: CPU, Flash Memory, Hard Drive, Random Access Memory (RAM), Ethernet

b. How many distinct patterns can be stored with 3 bits?

c. Note that Firefox is written in C++. What is the predominant type of instruction stored in the Firefox.exe file?

d. Alice has 1000 images, each 400 KB in size. About how much space do they take up overall?

e. Suppose we have a video camera that records at a rate of 2 GB per hour. Recording for 15 minutes creates about how much data, expressed in MB?

Part 2-

a. Suppose computers A, B, C, and D are connected to an ethernet cable, similar to the setup shown in lecture. Computer A begins transmitting a packet on the cable, but it collides with another transmission, so A stops transmitting. What does computer A do next?

b. Suppose we are using the following checksum scheme: add up all the bytes, and take just the last two digits of the sum. What is the checksum of the following bytes: 101, 202, 103, 100, 210, 120

c. What problem is addressed by checksums? (one sentence answer)

d. A computer connected to the internet is identified by what kind of address (the specific name, not just "internet address"):

e. Circle any of the addresses below which are not valid internet addresses:  1.2.3.4,   11.250.3.4,   45.67.212.100,   42.257.99.11,   171.64.64.171

f. True or false. Routing on the internet from Nick's office to the east bay is about 15 hops, and to Poland is about 1000 hops.

g. The following is the output of a famous networking utility.

 1  yoza-vlan70 (171.64.70.2)  2.039 ms
 2  bbra-rtr-a (171.64.255.129)  0.932 ms
 3  boundarya-rtr (172.20.4.2)  3.174 ms
 4  dca-rtr (68.65.168.51)  27.085 ms
 5  dc-svl-agg1--stanford-10ge.cenic.net (137.164.50.157)  2.485 ms
 6  dc-oak-core1--svl-agg1-10ge.cenic.net (137.164.47.123)  3.262 ms
 7  dc-paix-px1--oak-core1-ge.cenic.net (137.164.47.174)  4.046 ms
 8  hurricane--paix-px1-ge.cenic.net (198.32.251.70)  14.252 ms
 9  10gigabitethernet1-2.core1.fmt1.he.net (184.105.213.65)  9.117 ms
10  linode-llc.10gigabitethernet2-3.core1.fmt1.he.net (64.62.250.6)  4.975 ms
11  li229-70.members.linode.com (173.255.219.70)  4.761 ms

What does this output show?

h. You open your laptop and type "https://www.blah.com/news/today.html" into your browser and hit return. Three questions, 1-3 word answers:

What computer does your laptop contact to request this web page?

What is the content of the request?

What is the content of the response?

Part 3-

a. What does the above sound like?

b. Why is a digital signal more resistant to noise?

c. Suppose we have these 6 samples: 1000, 1001, 1010, 1005, 1006, 1002. Consider the compression scheme from lecture, recording the first sample followed by the local delta for each sample. Write out the encoding of the 6 samples using this scheme:

d. Is the above compression scheme lossy or lossless?

e. Suppose we have two versions of the same image, differing only in their JPEG compression level. Image A is compressed at q1 and is 100 KB. Image B is compressed at q5 and is 400 KB. Which of these two images is more likely to exhibit JPEG compression artifacts?

f. Circle any of the following which are video encoding formats:  HTTP, PNG, H.264, JPEG, OGG VORBIS

g. "Network effect" means that users select among competing products based on what feature of each product?

h. Suppose Stanford is using the open source software YoYoMatic widely and is dependent on it. Describe an example scenario where Stanford would gain significant benefit from having access to the YoYoMatic source code.

i. Suppose there is a website foo.com and you have a password to log in to it. What are threedifferent, non-physical techniques a bad guy might use to obtain your password (non-physical meaning other than breaking in to your house and making you tell them):

j. Consider the brake pedal in a car -- what is the abstraction the brake pedal presents to the driver?

Part 4-

Write code to print all the girl rows where the rank is greater than 900.

table = new SimpleTable("baby-2010.csv");

for (row: table) {

Part 5-

Write code to count the number of people who identified "purple" as their favorite color and print the result in the following format.

purple: 5

table = new SimpleTable("survey-2012.csv"); for (row: table) {

Part 6-

Here is some code that does something.

image = new SimpleImage("flowers.jpg");
for (pixel: image) {
  print("pixel");
}
print("image");

Suppose that flowers.jpg has 150,000 pixels. Describe the output of the above program:

Part 7-

This problem is similar to a bluescreen computation. As usual, we have two images -- image and back, and the back image is at least as large as the main image. Write code that for each pixel in image, if the red, green, or blue value is less than 60, then copy just the blue value from back to image.

image = new SimpleImage("image.jpg");
back = new SimpleImage("back.jpg");
for (pixel: image) { 

Part 8-

Write code to print the rows of all names beginning with J, except do not print John or Jess.

table = new SimpleTable("baby-2010.csv");

for (row: table) {

Part 9-

Consider the people who identified "coke" as their favorite soda. Write code to count and print how many of them identified "red" or "blue" as their favorite color with output in the following format.

red: 6
blue: 8
table = new SimpleTable("survey-2012.csv");
table.convertToLowerCase();
for (row: table) {

Part 10-

We'll say that a pixel is intense if its red or green value is over 150. Write code below to count the number of intense pixels in flowers.jpg and print result in the following format.

intense: 12623

image = new SimpleImage("flowers.jpg"); for (pixel: image) {

Part 11-

We'll say that "A" names start with "A" and end with any letter other than "a". Likewise "B" names start with "B" and end with any letter other than "b". Count both types of name and print the result in the following format:

A: 123
B: 61
table = new SimpleTable("baby-2010.csv");

for (row: table) {

Reference no: EM13808957

Questions Cloud

Contextual family therapy model : Contextual Family Therapy model
Legal requirements of staffing systems : How would you try to get individual managers to be more aware of the legal requirements of staffing systems and to take steps to ensure that they themselves engage in legal staffing actions?
Create a profile of the ideal leader for the company : Create a profile of the ideal leader for the company you researched in which you describe the most appropriate leadership characteristics in terms of leadership style.
Assignment on discussion-managing capacity : Capacity management in businesses is a function of their operations and environment. In today's business world, evaluating and managing capacities is becoming significantly more difficult. Therefore, managers need to do a balancing act to reduce c..
What problem is addressed by checksums : Suppose computers A, B, C, and D are connected to an ethernet cable, similar to the setup shown in lecture. Computer A begins transmitting a packet on the cable, but it collides with another transmission, so A stops transmitting. What does compute..
Examine two approaches that the original company has taken : Examine two approaches that the original company you selected has taken in order to embrace technological advancements for innovation and thus improve business offerings.
The nature of belief-philosophy : The Nature of Belief-Philosophy
Define economic groups that would tend to conflict : List two examples of economic groups that would tend to conflict, and two examples of non-economic groups that would conflict. In other words
Description of the organization and industry : Choose a specific organization, preferably in an industry in which you are interested, and use that organization as a basis for your paper.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd