Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
ADDIS ABABA UNIVERSITY, FACULTY OF SCIENCE
Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
Department of Mathematics and Computer Science
Entrance examination for the Masters of Science Programme in Computer Science
Date : June Time allowed:
Full Name :
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Grade Obtained :
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part I: Computer organization and assembly (11 (11 pts total)
1. Base your answer to the questions below on the following fragment of code t hat sorts a list of num meusing updates Scribdsort algorithm. Assume that the list is already stored in the memo ascendingSend order thefrom bubble mov cx, p dec cx lp1: mov di, cx Sign Up mov bx, 0 By registering a Scribd lp2: mov ax, a[bx]account, you agree to our Terms of Service and Privacy Policy cmp ax, a[bx+2] jle continue xchg ax, a[bx+2] Already have mov a[bx], ax an account? Sign in continue: add bx, 2 loop lp2 mov cx, di loop lp1 1.1. (1 pt) List the variables used in the code.
1.2. (1 pt) Which variable contains the size (ie. Number of elements) of the list?
1.3. (1 pt) Which variable contains the list of numbers?
1.4. (1 pt) What size (or type) are the variables a and p?
Master your semester with Scribd Read Free Foron 30this Days 1.5. (3 pts) List the different addressing modes used in the code. Sign up to vote title & The New York Times Useful Not useful Special offer for students: Only $4.99/month.
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part I: Computer organization and assembly (11 (11 pts total)
1. Base your answer to the questions below on the following fragment of code t hat sorts a list of num meusing updates Scribdsort algorithm. Assume that the list is already stored in the memo ascendingSend order thefrom bubble mov cx, p dec cx lp1: mov di, cx Sign Up mov bx, 0 By registering a Scribd lp2: mov ax, a[bx]account, you agree to our Terms of Service and Privacy Policy cmp ax, a[bx+2] jle continue xchg ax, a[bx+2] Already have mov a[bx], ax an account? Sign in continue: add bx, 2 loop lp2 mov cx, di loop lp1 1.1. (1 pt) List the variables used in the code.
1.2. (1 pt) Which variable contains the size (ie. Number of elements) of the list?
1.3. (1 pt) Which variable contains the list of numbers?
1.4. (1 pt) What size (or type) are the variables a and p?
Master your semester with Scribd Read Free Foron 30this Days 1.5. (3 pts) List the different addressing modes used in the code. Sign up to vote title & The New York Times Useful Not useful Special offer for students: Only $4.99/month.
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
1.6. (4 pts) Modify the code as little as possible so that it sorts in descending order. Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part II: Programming (16 pts total)
Sheet Music
1.
Send me updates from Scribd
a. (2 pts) Give an abstract definition of a linked list
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview
b. (6 pts) Write the algorithmUnlock of a function an element in a linked list of intege full accessthat withinserts a free trial. FIFO.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
2. (8 pts) Design a detailed algorithm to sort a given data of integers into ascending order using a sort algorithm. Write a function that implements this algorithm in a programming language of choice. Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part III: Software Engineering (14 pts total) 1. (3 pts) Compare and contrast procedural and object-oriented programming languages.
Sheet Music
Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
2. (3 pts) What is the relationship between abstract data types and classes?
3. (4 pts) Give three phases of your choice among the phases of the software development life give, for each phase, its role in the software development process. A maximum of one sentence accepted for each phase.
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
4. (4 pts) Choose one of the following topic (a, b or c) and explain very briefly. a. Waterfall, Spiral, and Prototyping models. For what type of development projects are e these development models used? Send mesoftware updates from Scribd b. Software metrics. Discuss size, complexity, and quality metrics. c. Structural and functional software testing methods. Discuss the various structural and f Sign Up testing techniques, which are commonly used in software development projects. Give chosen topic here (a, byou or agree c): _______________ By registering a Scribd account, to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part 4: Database Systems (15 pts total) Send me updates from Scribd
1. FIFA would like to keep track of information about events of the World cup 2002 in Korea/Ja following are definitions ofUp some of the tables identified to organize the database for FIFA. Sign information to answer subsequent questions. By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Table Definitions
Player (Id, Name, Specialization, Country) Already have an account? Sign in
Foreign key – Country references History Played (Id, Match, Goals, Cards, Fouls, Offsites) Foreign key – Id references Player, Match references Games Games (Match, Stadium, Date) Foreign key – Stadium references Places Places (Stadium, Host) History (Country, Population, Worldcup, Won)
Reading Preview Dictionary describing attribute You're names useda in the tables Unlock full access with a free trial. Id- Official id given by FIFA to each player
Name – Family name of a player
Download With Free Trial
Specialization – Roll of the player (goalkeeper, defender, midfielder, striker…) Country – Country the player is playing for Date – Date on witch game is played Matchsemester – Official match number by FIFA to each game Master your withgiven Scribd Read Free Foron 30this Days Sign up to vote title Stadium – Name of stadium where game is played & The New York Times Useful Not useful Host – Host country (Japan or Korea) Special offer for students: Only $4.99/month.
Goals – Number of goals scored by a player
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Using the above information, write an SQL statement that performs the following:
1.1 (2 pts) Create a table with name Dangerous-Players and store Id, Name, Country, Match and Send mecommitted updates frommore Scribdthan 3 fouls in a single game. players who
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
1.2 (3 pts) Display Match, Stadium, Date and Host for matches in which more than four goals are
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
(3 pts) Display Name, Id and Country of a player who came from a country with good w Master 1.3 your semester with Scribd history (won world cup at least ones) and who has neverRead played invote any game in this world cu Free Foron 30this Days Sign up to title on aYork reserve bench). & The New Times Useful Not useful Special offer for students: Only $4.99/month.
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
2. (4 pts) Normalization is one of the important aspects of relational database design. Discuss the normal forms 2NF). Elaborate your answer using Examples. Send (1NF, me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
3.
(3 pts) Concurrency is one of the major problem areas that the database designer has to deal w shared database environments. Describe veryReading briefly any two of such concurrency problems an You're a Preview methods used to overcome the problems. Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part 5: Operating system (14 pts total) me are updates from Scribd 1) (2 pts)Send What the two major purposes of an operating system?
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? in and the functions involved in the transition of processe 2) (3 pts) Describe the three processSign states one state to another. Use a diagram to demonstrate your answer.
Reading Preview 3) (3 pts) Selection of the value of theYou're quantum time ina CPU scheduling is one important aspect o algorithms. Discuss the problems associated with the selection of a very small quantum value a Unlock full access with a free trial. large one? Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
4) (6 pts) Write a program that runs on UNIX (i.e. that uses UNIX system calls) and creates two p The first process should write PING, then the second should write PONG, then the first should PING,Send thenme the second should updates from Scribdwrite PONG, etc. indefinitely. You can use any communication synchronization method available on UNIX and any programming language.
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part 6: Networking (15 pts total)
me updates from Scribd 1) (3 pts)Send Choose two layers out of the seven layers of the ISO/OSI Networking model. Describe words the main role (function) of each of the two layers that you have chosen (1 small sentence layer)
Sign Up
Layer Name
Description
By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
2) (2 pts) Give at least two popular physical media used for computer networking. Compare brie characteristics for communication.
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
3) (2.5 pts) Explain briefly what Carrier Sense Multiple A ccess/ Collision Detection (CSMA/CD where it is used and what are its two main concepts.
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
4) (2.5 pts) Given a base IP address 195.201.121.0 and using the first three bits of the host addre the IP address as a sub network prefix: Send me updates from Scribd
a. What is the standard class of this IP address? _________________________________________________________________
Sign Up
b. What will be the subnet mask? _________________________________________________________________ By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
c. What will be the number of usable subnets? _________________________________________________________________ Already an account? in d. What willhave be the number Sign of unique host addresses supported in each subnet?
_________________________________________________________________
e. What will be the first available IP address that can be assigned to a PC connected in usable subnet? _________________________________________________________________
5) (5 pts) Write the letter of the descriptions under column B that best matches phrases under col the space provided. Answer
Column A
Column B
1. Circuit Switching
A. Ensures that external communications confirm to the local network policy. You're Readingsecurity a Preview
2. DNS
B. Responsible for assigning Internet addresses to Unlock users.full access with a free trial.
3. Gateway
C. Physical layer protocol of X.25.
4. Routers
D. One of the ISDN channel services provided at a single interface.
5. Fire Wall
E. Packet switching technology that involves fixed length data unit.
Download With Free Trial
Converts numerical IP address in to readable text Master your semester withF.Scribd 6. FDM or TDM Read Free Foron 30this Days Sign up to vote title form. & The New York Times Useful Not useful G. Allows several transmission sources to share a larger 7. RS-232 Special offer for students: Only $4.99/month.
Cancel anytime.
transmission capacity.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
General questions on ICT in Ethiopia and abroad (15 pts total)
any two
Instruction: Attempt of the following five questions. If you attempt more than two non Send me updates from Scribd accepted. Each question is given 7.5 points as long as you follow the above instructions.
Sign Up
1. IBM mainframe computers used to be called a closed/proprietary system: What does it mean? By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview
2. Do you see advantages/drawbacks in liberalizing the telecom sector in the Ethiopian context? J your answer. Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
3. List three major obstacles against the development of ICT in Ethiopia. Argument your answer.
Documents
Sheet Music
Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
4. It is nowadays very commonly said that there is convergence of information technologies and communication technologies. What does this statement mean? Give examples to j ustify your a
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Special offer for Onlyexplain $4.99/month. 5.students: State and two ethical rules an IT professional must follow in Ethiopia.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
ADDIS ABABA UNIVERSITY FACULTY OF INFORMATICS
Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Department of Computer Science
Already have an account? Sign in
Entrance examination for the Masters of Science Programme in Computer Science
Date: August 2 Time allowed:
You're Reading a Preview Unlock full access with a free trial.
Full Name : Download With Free Trial Grade Obtained :
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Important Note
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part I: Computer organization and assembly (15 points total)
Send me updates from Scribd where writing the code in assembly language rather than 1. (4 points) Give two applications level language is compulsory or highly beneficial. Explain very succinctly why it is compulsory highly beneficial. Sign Up
#
Application
Reason
1
By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
2
Already have an account? Sign in
2. (2 points) Give two major concepts that make the difference between RISC and CISC technologies and how these concepts contribute in improving the performance of the process
You're Reading a Preview Unlock full access with a free trial.
3. (1 point) Give the name of an existing processor is Trial built based on RISC technology. Download Withthat Free
Master your semester with Scribd & The4.New York Times (2 points) Give two major functions of the CPU.
Read Free Foron 30this Days Sign up to vote title
Special offer for students: Only $4.99/month.
#
Application
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Upload
Sign In
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
5. (2 Points) Give the name of the character encoding system that is most widely used for e of texts in most alphabets and scripts of the World. What are the differences between this sy and the Latin character encoding system almost exclusively used, until recently, to encode te Latin characters? are itsScribd advantages and its drawbacks ? Answer very succinctly in th Send meWhat updates from
Name of the Sign Up character encoding system By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Differences Advantages ofAlready have an account? Sign in the character encoding system Drawbacks of the character encoding system
6. (4 points) We would like to write a fragment of code of the virtual memory manager of an operating system in INTEL 8086 assembly language. The objective is to write a fragment of t assembly language code that calculates the physical (real) address corresponding to a given address. Write this fragment of code knowing that: You're Reading a Preview The virtual address is in AX o o The page size is 256 Bytes Unlock full access with a free trial. The page table is in memory at the address PAGE_TABLE. Each entry of the p o table occupies one byte and contains only theTrial page frame number. Download With Free We consider that all pages of the virtual memory are always in the real memory o is no page fault) The result (real address) should be in BX o You should use the simplest and minimum number of instructions in order to m o the execution time of this code INS If there is a mnemonic of an instruction that you have forgotten use INST1, o Read Free Foron 30this Days Sign up to vote title and explain what this instruction does. This will be accepted only if an instructio Useful Not useful does exactly what you say exists in INTEL 8086. Cancel anytime. Special offer for students: Only Explain how your$4.99/month. program works and give your commented program.
Master your semester with Scribd & The New York Times
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Program
Documents
Sheet Music
Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
Part II: Programming and Data structure (14 points total)
1. (6 points) Write a function SearchList that recursively searches a linked list of integer specified value. The function should return a pointer to the value if it is found; otherwis should be returned. Write the code in your language of choice.
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
2. (8 points) Write a program segment to put N numbers into ascending order using a bi search tree. Assume that inorder traversal of the tree gives the numbers in ascending Write the code in your language of choice. Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview Unlock full access with a free trial.
Part III: Software Engineering (16 points total)
1. Give precise answers to the following questions Download With Free Trial a. (3 points) What are the basic concepts of object-oriented approach?
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
c. (3 points) Explain the differences between testing a procedural program and a oriented program. Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
2. (5 points) To properly satisfy Sign the basic goals of a system, a software requirements Already have an account? in specification should have certain properties. What are the desirable properties that a g software requirements specification should have? Describe each of the properties.
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master 3.your semester Scribd Explain thewith difference between validation and verification, which are (3 points) import Read Free Foron 30this Days Sign up to vote title concepts in software quality. & The New York Times Useful Not useful Special offer for students: Only $4.99/month.
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part IV: Database Systems (14 points total)
Documents
Sheet Music
1. (3 points) The two general integrity rules in relational database model are, entity integrity referential integrity rule. State Send me updates from Scribdthe rules.
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
2. (3 points) Transaction recovery is one of the data protection mechanisms used in databa systems. Describe transaction recovery and show how it is implemented.
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd Read Free Foron 30this Days Sign up to vote title the following & TheUse New York information Times to answer subsequent questions Useful Not useful Cancel anytime.
Special offer for students: Only $4.99/month. Office of the African Union (AU) is planning to organize the second ordinary summit of heads
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Participant(Name, Fname, CountryName, HotelName) Primary key(Name, Fname) Foreign key HotelName references Hotel, CountryName Send me updates from Scribd references Country WillAttend( Name, Fname, SessionNo, WillSpeak) Sign Up Primarykey(Name,Fname, SessionNo) Foreign key (Name,Fname) references Participant, SessionNo Session By registering a Scribd account, references you agree to our Terms of Service and Privacy Policy
3. Answer the following questions Using the above information a) (2 points) Draw relational Already have an account? diagram Sign in of the above relational tables indicating their cardinalities.
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
b) (2 points) Assuming that all the other tables are created, write an SQL statement t
Master yourcreates semester with Scribd the WillAttend Table above. & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
c) (2 points) Write SQL statement that deletes all participants who will not speak and
Documents
Sheet Music
reservations are in 5 star hotels. Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
d) (2 Points) Write SQL statement that displays all participants who are scheduled to all the sessions.
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Part V: Operating systems (11 points total)
Input/outputs in general and disk in particular are the major bottlenecks of (3 points) Master 1)your semester with Scribd Read Free For 30 Days Sign up to vote on this title computer system. Give two very efficient mechanisms used by the operating system to & The New Times useful thisYork problem. Explain briefly how each of the mechanism contributes this purpose. Useful Not for Special offer for students: Only $4.99/month.
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
2) (6 points) Write a program in C programming language that runs on UNIX or Linux sy The program requests 10 whole numbers from the user, finds the maximum of the ten numbers and the sum and displays both. The programs should have three processes. readsSend the me input from theScribd user. The second finds the maximum and displays it. The third updates from calculates the sum and displays it.
Sign Up - For the communication and synchronization between the processes you can us semaphores (you use any commonly syntax for semaphores not nec By registeringi.a Scribd account, you agreecan to our Terms foundand onPrivacy UNIX/Linux) of Service Policy ii. signals iii. pipes iv. parent/child inheritance Already have an account? Sign in
Note
-
Proper comments are necessary.
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
3) (2 points) Many client/server applications such as web servers create one thread to p the request of a client at the server side than creating a process for each client. Explai why? Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview Part VI: Networking (15 points total) 1. (3 points) What is the advantage of introducing Unlock full access redundancy with a free trial. in network connectivity?
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
2. (3 points) Sub-networking is used to overcome congestion problems posed by a flat,
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
3. (3 points) Discuss media access control techniques in Ethernet and Token ring. Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
4. (3 points) The two major categories of WAN connections are packet switched an switched. What are packet switching and circuit switching? Give examples for both.
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd lines. W 5. (3 points) Multiplexing is used to make efficient use of high-speed communication Read Free For 30this Days Sign up to vote on title & The New Times Useful Not useful the twoYork common forms of multiplexing? Discuss how they work. Special offer for students: Only $4.99/month.
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part VII: General questions on ICT in Ethiopia and abroad (15 points total)
Documents
Sheet Music
any one
Instruction: Attempt of the following three questions. If you attempt more than o will be accepted. Send me updates from Scribd
1. Some years back, the Federal Government and many of the state of the United States America sued Microsoft. Sign UpWhat was the reason why they sued this company? Microsoft to have escaped the worst. Do you think the World has anything to lose or gain from th result? Argument your answer in about 10 lines (average handwriting). By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
2. What is E-commerce? Do you think it has a great future in the World in general and in in particular. What are the technical issues that have to be considered if we want to se development of E-commerce in Ethiopia. Argument your answer in about 10 lines (ave handwriting). Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview Unlock full access with a free trial.
3. In Ethiopia, nowadays, computer applications are becoming necessity in businesses and o Download With Free Trialwith the use of local languages environments. However, there are many problems associated computing. What are the situations in using local languages like Amharic, Afan Oromo, Tigrig in computing environment? Give specific examples of the problems and their impact. Sugges solutions on how we can overcome such problems. Present your answer in about 10 lines (av handwriting).
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
ADDIS ABABA UNIVERSITY, FACULTY OF INFORMATICS
Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Department Computer Science
Already have an account? Sign in
Entrance examination for the Masters of Science Programme in Computer Science
Date: June 3 Time allowed You're Reading a Preview
Full Name :
Unlock full access with a free trial.
Download With Free Trial
Grade Obtained :
Master your semester with Scribd & The New York Times Special offer for students:Note Only $4.99/month. Important
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Magazines
News
Documents
Part I: Computer organization and assembly (7 points total)
Sheet Music
1. (One point) What is the importance of having a hierarchy of memory instead of a single memo Send me updates from Scribd computer architecture?
Password
(at least 6 characters)
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
2. (One point) What is Microprogramming? What are the advantages and drawbacks of microprog compared to hardwired programming?
3. (One point) Explain briefly how the buses are used for the communication between several compo You're Reading a Preview computer (Example: CPU and memory) Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
4. (4 points) Write two assembly language subroutines for 8086 architecture that will respectively en decrypt data located at memory address $2004 using the famous Cesar’s encryption algorithm encryption algorithm consists of shifting every letter two positions to the right in the alphabet. For de the encryptedSend letter be from shifted by two positions to the left in order to obtain the original lette me will updates Scribd special cases of ‘y’ and ‘z’, they will be encrypted as ‘a’ and ‘b’ respectively. For example: ‘a’ will be encrypted to ‘c’, ‘b’ to ‘d’…’z’ to ‘b’ etc. Therefore, the word “hi” will be e Sign Up as “jk”. By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part II: Programming (17 points total) Send me updates from Scribd
[You can use a programming language of your preference.] 1.
Sign Up a. Define a recursive function.[1 points] By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? b. Write a recursive functionSign thatincomputes the greatest common divisor (GCD) of two po integers.[5 points]
You're Reading a Preview Unlock full access with a free trial.
2.
a. Write a function that accepts a positive integer and displays the digits of the number in Download With Free Trial order.[3 points]
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
b. Analyze your subprogram for big O.[ 1 points] Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
c. Write a detailed algorithm of quick sort algorithm.[ 8 points]
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part III: Software Engineering (14 points total) Send me updates from Scribd
1. a. Define Formal Software Specification. Sign Up
(1 pt.)
By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Alreadythe have an account? Sign in b. Though idea of Formal Specification to software is novel, it is not widely used in th software industry. Describe the reasons behind this.
(2 pts.)
You're Reading a Preview 2.
Unlock full access with a free trial. a. Define software system design. (1 pt.)
Download With Free Trial
b. Compare and contrast function-oriented and object-oriented design methods. (maximum lines for each design method). (3 pts.) Read Free Foron 30this Days Sign up to vote title
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
c. What are the three most important design goals during the design of an interactive syste is to be used by non-computer literate users? (2 pts.) Send me updates from Scribd
Sign Up
3.
By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
a. Define regression testing.
(1 pt.)
Already have an account? Sign in
b. How are test cases generated during regression testing?
(2 pts.)
You're Reading a Preview Unlock full access with a free trial.
c. What coverage criteria shall be used for regression testing? Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
(2 pts.)
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part IV: Database Systems (14 points total) 1. (2 points) Why is indexing very important in databases?
Sheet Music
Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
2. (2 points) Explain what is a view in relational databases and for what purpose it is us ed?
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial 3. (2 points) How can a Database administrator manage the security of the database using SQL comm
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
The Product table gives the manufacturer, model number and type (PC, Laptop, or Printer) of various Assume that model numbers are unique over all manufacturers and product types. The PC table give model number that is a PC the speed (of the processor, in megahertz), the amount of RAM (in megab size of the hard disk gigabytes), the speed and type of the removable disk (CD or DVD), and the p Send me (in updates from Scribd Laptop table is similar, except that the screen size (in inches) is recorded in place of information removable disk. The Printer table records for each printer model whether the printer produces col Upink-jet, or bubble), and the price. (true, if so), the process typeSign (laser, Using the above information answer the queries below: By registering a Scribd account, you agree to our Terms
Service and Privacy Policy i) (1 point) Write anofSQL statement that give the manufacturer and speed of Laptops with hard disk o thirty giga bytes.
Already have an account? Sign in
ii) (2.5 points) Write an SQL statement that finds the manufacturer of the color printer with the lowest
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
iii) (1.5 points) Write an SQL statement that find, for each different speed the average price of a PC. Master your semester with Scribd Read Free Foron 30this Days Sign up to vote title & The New York Times Useful Not useful Special offer for students: Only $4.99/month.
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
5. (3 points) A database is being constructed to keep track of the teams and games of EURO 2004. A a number of players. It is desired to keep track of the players participating in each game for each they played in me a game and theScribd result of the game. Send updates from Design an ER-schema diagram for this application. Stating any assumptions you make.
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Magazines
News
Documents
Part V: Operating system (14 points total)
Sheet Music
1. (3 points) Explain why a time-sharing operating system is not suitable for applications with hard r Send me updates from Scribd requirements.
Password
(at least 6 characters)
Sign Up
2. (2
By registering a Scribd account, you agree to our Terms Service and Privacy Policy points) Howofcan processes communicate in a distributed
system where there is no shared memo
Already have an account? Sign in
3. (4 points total) In modern operating systems, we can run programs with huge memory requiremen on computers with small amounts of RAM. i) What techniques make this possible?
ii) So why buy large amounts of RAM at all?
You're Reading a Preview Unlock full access with a free trial.
4. (3 points total) Suppose a brand new kind of printer is invented this week. Even though this printe exist when Windows 98 was released, we may stillWith be able toTrial configure a computer running Windo Download Free that it can print documents to this printer. i) What change, if any, would you have to make to the system to allow it to print to this new print
Master ii)your semester with Scribd Explain how the operating system has been designed to run independently device-specific de Read Free Foron 30of Days Sign up to vote this title & The New York Times Useful Not useful Special offer for students: Only $4.99/month.
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Magazines
News
Documents
Part VI: Networking (14 points total)
Sheet Music
1. (2 points) Describe the advantages and the disadvantages of fiber optics cable compared to copper Sendcommunications? me updates from Scribd for computer
Password
(at least 6 characters)
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
2. (2 points) Explain what Ethernet is? How it solves the collision problem?
You're Reading a Preview
Unlock full access with a free trial. 3. (4 points) Explain the difference between a connection-oriented network service and a connection service. Give an example of an application for which a connection-oriented service makes more se an example of an application for whichDownload a connectionless service makes more sense. In both cases, With Free Trial explain why.
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
4. (2 points) Explain the fundamental differences between a hub and a switch. Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
5. (4 points total) Consider the following simple network: Already have an account? Sign in
A 111.222.111.222 B3-E4-88-03-A1-DB
111.222.111.221
222.111.222.112
56-82-4F-3D-90-66
9A-02-33-7C-DD-42
Router
You're Reading a Preview Unlock full access with a free trial. E
Download With Free Trial
222.111.222.111 45-3D-C9-30-D2-86
i) (2 points) Write down an IP address for each interface at all hosts and routers in the network addresses for A and E are as given. You should assign IP addresses so that interfaces on the sa network have the same network-part of their IP address. Indicate the number of bits in the netw of this address. Read Free Foron 30this Days Sign up to vote title
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part VII: General questions on ICT in Ethiopia and abroad (20 points total)
any two If you attempt more than two all of them will be discarded Instruction: Attempt of the following five questions within the available spaces. Send me updates from Scribd
Sign Up
Each question is given 10 points as long as you follow the above instructions. By registering a Scribd account, you agree to our Terms
The following will be considered for the grade: Quality of language, Writing skills, Correctness a of Service and Privacy Policy Quality of arguments and Neatness. Your answers should have about 20 lines (average handwriting size). Already have an account? Sign in
1) What are Open Source Software (OSS) and proprietary software? Give two examples of OSS a examples of proprietary software. What are the main differences between the two? Do you thin good for Ethiopia? Explain. 2) Ethiopian audio-visual artists won a major battle this year? What is it? Do you think it has any relevance for Information and Communication Technology professionals? Explain.
3) Spams are becoming a major problem for internet users. Describe what spams are, what are the problems they cause and what solutions exist for individuals. Propose ideas on how spams can eliminated (or at least highly limited) from the Internet in the future.
You're Reading a Preview 4) Describe the Weredanet and the SchoolNet project of the Ethiopian Government. What are the opportunities and the challenges ahead? Unlock full access with a free trial.
5) Microsoft is going to develop an Amharic version of Windows XP and Microsoft Office. There Download With that Freethis Trial already an Amharic version of Linux. Do you think evolution is very important for Eth Explain. Answer in the following pages.
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
First chosen question (write just the number): _________
Documents
Sheet Music
Answer below Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Second chosen question (write just the number): _________
Documents
Sheet Music
Answer below Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Ababa Terms Addis of Service and Privacy Policy
University Faculty of Informatics
Department of Computer Science Already have an account? Sign in
Entrance Examination for the M. Sc. Program in Computer Scienc
Date: March Time allowe
You're Reading a Preview
Name: _______________________________________________
Unlock full access with a free trial.
Instructions
Download With Free Trial
1.
Read the instructions and the questions carefully.
2.
Write your name only on this page. Writing your name on the other pages will automatically disq
from this exam. Master your semester with Scribd Free Foron 30 Days Sign to vote this titlePlease make 3. Answer all questions eligibly on the spaces provided onRead the up question papers. & The New York Times Useful Not useful sentences are short, grammatically and logically correct. You can use the back side of each pa Special offer for students: Only $4.99/month.
space is not sufficient. In such a case, please indicate so.
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
For Office Use Only
Documents
Sheet Music
Part I (35)
Send me updates from Scribd Part
Sign Up
Part II (25)
Part III (20)
Part IV (20)
Tot (10
Marks
By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Part I: Programming, Structures, Already haveData an account? Sign in and Software Engineering (35 points) 1.
Discuss the basic components of an SRS (Software Requirements Specification). (6 pts)
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News Documents
Sheet Music
Join
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
3.
Sign In
Upload
RELATED TITLES
1
AAU Exam
(at least 6 characters)
Answer the following questions. a.
Define a binary tree. (2 pts) Send me updates from Scribd
b.
Sign Up of a binary tree. Illustrate your answer by an example. (4 pts) Explain array representation By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
c.
What are binary tree traversals? Give their recursive algorithms. (6 pts)
You're Reading a Preview
Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News Documents
Sheet Music
Join
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
4.
Sign In
Upload
RELATED TITLES
1
AAU Exam
(at least 6 characters)
For each of the following three multiple choice questions, circle the letter of the correct answer. i.
Which of the following is true about structured programming or structured problem solving? a.
Send updatesisfrom Scribd into The me problem divided
a set of time dependent/sequential statements that determ
part is executed how many times and how long. b.
Up into a set of functionally independent units. The problem isSign divided
c.
The language gives emphasis to data structures needed in solving the given problem.
By registering a Scribd account, you agree to our Terms of Service d. All except c. and Privacy Policy
ii.
Which of the following is true about recursive problem solving? a.
havewill an account? in solution if each iteration (calling) leads the problem TheAlready problem have a Sign known
where we know how to solve. b.
Even if the solution is inefficient because of performance and storage reasons, it is reco as it increases the readability of the program than the iterative counter part.
c.
It is recommended as it is not possible to solve some problems iteratively.
d.
All of the above.
iii. In Ethiopia, every citizen is called with his/her name rather than his/her family's name as is t
most other countries. It is possible that the name of a person, say, "XYZ" to be the same as
of his/her grandfather. In a gathering where only children exist, the name XYZ is meant to re You're Reading a Preview
child rather than the grandfather. Which of the following scope rule represents t he above hyp Unlock full access with a free trial.
a.
XYZ is a global name, it is used equally everywhere without ambiguity.
b.
XYZ is a Local name.
c.
XYZ can be both global and local. When it is used in the local context, it is given priorit
d.
None of the above.
Download With Free Trial
5. your In modular programming, with functionsScribd communicate through parameters (arguments). Parameter p Master semester Read Free Foron 30this Days Signthan up tousing vote title passing by value is recommended to improve the performance of a system parameter & The New York Times Useful Not useful Why? (3 pts) Special offer for students: Only $4.99/month.
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
3
2.2K views
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Join
Sign Up With Facebook
Sign Up With Google or with email
Name
Save
Embed
Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
6.
Sign In
Upload
RELATED TITLES
1
AAU Exam
(at least 6 characters)
In enterprise applications development, securing data from disclosure to unauthorized users is
challenges. One means of tackling the challenge is to encrypt before sending and decrypti
receiving end with the same key. Write two functions Encrypt and Decrypt that accept a string an Sheet Music
Send me updates from Scribd
as to encrypt and decrypt the text. The encryption algorithm adds 1 to the ASCII value of each and subtracts one from the ASCII value of each character for decryption. (8 pts)
Sign Up
Hint: if one wants to send “Hello”, it is “Ifoop” that is sent and when decrypted it will be Hello. By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part II: Operating Systems and Computer Architecture (25 points)
Documents
Sheet Music
1.
Describe three features which might make one process scheduling algorithm preferable to another Send me updates from Scribd
Sign Up
2.
By registering a Scribd account, you agree to our Terms of Service and page Privacy Policy What distinguishes a good replacement algorithm
from a bad page replacement algorithm? (
Already have an account? Sign in
3.
In general terms, give two different ways of solving the problem of deadlock. (2 pts)
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial 4.
When a UNIX process forks a child process, name one thing the parent and child process common, and two things the parent and child processes don’t have in common. (3 pts)
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News Documents
Sheet Music
Join
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
6.
Sign In
Upload
RELATED TITLES
1
AAU Exam
(at least 6 characters)
What is the basic advantage of using interrupt-initiated data transfer over transfer under progra without an interrupt? (4 pts) Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
7.
The purpose of the communication link is to resolve the differences that exist between the central and each peripheral. Listan any two such (4 pts) Already have account? Signdifferences. in
8.
Compare and contrast physical segments and logical segments in Memory Address Space (MAS)
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part III: Database Management Systems (20 points)
Documents
Sheet Music
1.
How do you tackle a database designing problem that involves many-to-many relationship in the Send updates from Scribd RDBMSs? (4me pts)
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
2.
The Ethiopian Athletics Federation wants to keep track of the records of Ethiopian athletes who part in International competitions. To this effect, the following relations are identified: Athlet_Info(AID, FName, SName, BirthDate), where AID refers to the ID of an athlete,
Comptetion_Info(CID, AID, Cdescription, PlaceHeld, DateHeld, TimeToFinsih, Distanc
CID refers to an ID of a competition, and RecordHolder_Info(AID, CID )
Entries in the first two tables are mandatory, whereas entries in the third table may or may not ex athlete as it depends on whether an athlete hasReading won a competition You're a Preview with a new record or not. Based on the above information answer the following questions:
Unlock full access with a free trial.
a.
Write a DDL statement to create the table named RecordHolder_Info. (3 pts)
Download With Free Trial
Master your semester with Scribd Read Free Foron 30this Days Sign up to vote title b. Are all the above relations in 2NF? Justify your answer. (3 pts) & The New York Times Useful Not useful Special offer for students: Only $4.99/month.
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News Documents
Sheet Music
Join
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
c.
Sign In
Upload
RELATED TITLES
1
AAU Exam
(at least 6 characters)
Write an SQL statement that computes the total number of records held by an athlete. (2 pts)
Send me updates from Scribd
Sign Up
d.
By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Write an SQL statement that finds the best time of an athlete on a specific distance o competitions that he/she has taken part. (3 pts) Already have an account? Sign in
e.
Write an SQL statement that returns a query output containing list of names of athletes who in the competitions held in “Boston”, USA. (2 pts)
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial 3.
Explain what new or emerging class(es) of applications that RDBMSs have failed to cope with o (3 pts)
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part IV: Networking (20 points) Documents
1.
What are the two categories of transmission media? List all possible transmission media in each c and briefly describe their characteristics. (7 pts) Send me updates from Scribd
Sheet Music
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
2.
Consider two LANs, one based on the Ethernet protocol (i.e., IEEE 802.3) standard and the other based on the Token Ring protocol (i.e., IEEE 802.5) standard. a.
You're Reading a Preview
What is the biggest conceptual difference between the two LANs when it comes to handling collisions? (3 pts)
Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Suppose stations connected to both LANs have information to transmit. Which of the two Special offer forb. students: Onlyall $4.99/month. the most “fair”? Motivate your answer. (3 pts)
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News Documents
Sheet Music
Join
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
3.
Sign In
Upload
RELATED TITLES
1
AAU Exam
(at least 6 characters)
Distinguish between packet switching and circuit switching. Which one is the most appropriate m computer networking? Why? (4 pts) Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview Unlock full access with a free trial.
4.
Distinguish between physical (MAC) address and IP address. At which layers of the OSI referenc is each used? (3 pts)
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Send me updates from Scribd
Sign Up By registering a Scribd account, Department you agree to our Terms of Computer of Service and Privacy Policy
Science
Faculty of Informatics Addis Ababa University
Already have an account? Sign in
Entrance Examination for the M. Sc. Program in Computer Scienc
Date: June Time allowe
____________________________________________ ___________________ ___ Name: ____________________________
Instructions
1.
Read the instructions and the questions carefully.
2.
Write your name only on this page. Writing your name on the other pages will automatically d
you fromsemester this exam. Master your with Scribd Read Free Foron 30this Days Sign up to vote title AnswerYork all questions question s eligibly on the spaces provided on on the question Not papuseful ers. Please make & The3. New Times Useful papers. Cancel anytime.
are $4.99/month. short, grammatically and logically correct. You can use the back side of each pa Special offer forsentences students: Only space is not sufficient. In such a case, please indicate so.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
For Office Use Only
Documents
Sheet Music
Send me updates from Scribd Part
Sign Up
Part I (35)
Part II (25)
Part III (20)
Part IV (20)
Tot (10
Marks
By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Part I: Programming, Structures, Already haveData an account? Sign in and Software Engineering (35 points) 1.1 Discuss briefly software process, project and product.
(6
1.2 a.
(2
Define coupling and cohesion.
Master your semester with Scribd Read Free Foron 30this Days Sign up to vote title b. How are coupling and cohesion used in modularization criteria? & The New York Times Useful Not useful Special offer for students: Only $4.99/month.
Cancel anytime.
(2
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
1.3 Write a pseudo code for a function file_copy function file_copy that copies the content of one file to a new file. The
Documents
takes one argument, original_file, which is the path to the file to be copied and returns the name o
file. If an error occurred, NULL should be returned. The function will have the following signatur Sheet Music
Send me updates from Scribd
function file_copy (original_file : string) : copy_file : string
Sign Up
(7 p
To write the function, use the following built-in pseudo functions for file manipulation: By( file_path registering a:Scribd account, agree) to our Terms fopen string, : char : integer – opens the file whose path is passed to it as an modeyou of Service and Privacy Policy
and returns a file handle and sets the read pointer at the first byte of the file. On error, it returns indicates the mode in which the file is opened and it can take one of the following values: r, w have an account? Sign in for read and Already write, respectively.
fclose( file_handle file_handle : integer ) – closes the file whose file handle is passed to it as an argument. O
returns -1.
fread( file_handle : integer ) : ByteStream – reads up to 1 KB of stream of bytes starting from th
position of the read pointer. On error, it returns -1. fwrite( file_handle: integer, data: ByteStream) : integer – writes up to 1 KB of stream of bytes
whose handle is passed as an argument at the current end of file. On error, it returns -1.
eof ( file_handle : integer ) : boolean – returns TRUE if end of file is encountered, otherwis
FALSE.
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters) The answer for question 1.3 may continue on this page.
Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Top Charts
Books
Audiobooks
Magazines
News
Join
Sign Up With Facebook
Uploaded by Melkamu Asmare
Sign In
Upload
RELATED TITLES
1
AAU Exam
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
1.4 Consider the following binary search tree: If the root node, 50, is deleted, which node will be
Documents
Sheet Music
new root?
(4
Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
Answer: __________________________
1.5. Given the sorting algorithm represented in the following pseudo code, attempt the questions th Assume A has n elements, where the first index is 1 and the last index is n. 1: for i n-1downto 1 2: begin You're Reading a Preview 3: sorted TRUE 4: 1 to i for j Unlock full access with a free trial. 5: begin 6: if A[ j] < A[ j + 1] then 7: SWAP( A[ j], A[ j + 1])Download With Free Trial 8: sorted FALSE 9: end 10: if sorted then return 11: end ←
←
←
←
Master your semester with Scribd Read Free Foron 30this Days a. What is the best case for this algorithm? What is the best case computing time Sign up to vote titlein “big O” no & The Newpoints) York Times Useful Not useful Special offer for students: Only $4.99/month.
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
1.6 Consider a linked list with data values sorted in descending order. The following is given as a sam
Documents
Sheet Music
First
20
15
9
5
3
me updates Scribd Write an Send algorithm thatfrom inserts an element in the appropriate position. Your algorithm must han
special cases. Make your writing clear; otherwise marks will be deducted.
(5
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Read Free Foron 30this Days Sign up to vote title
Not useful Cancel anytime.
Useful
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part II: Computer Architecture and Operating Systems (25 points) Documents Sheet Music
2.1 For interactive operating systems, write the advantages of preemptive scheduling algorithms ove preemptive scheduling algorithms. Send me updates from Scribd
(3
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
2.2 Explain whyAlready a cache memory, in addition have an account? Sign in to RAM (or primary memory), is needed in computer s points)
2.3 In process swapping, write briefly how important process relocation is.
(3 1/2
You're Reading a Preview Unlock full access with a free trial.
Download With Free Trial
Master your semester with Scribd 2.4 Give two possible methods that are used to reduce disk access time. Read Free Foron 30this Days Sign up to vote title & The New York Times Useful Not useful Special offer for students: Only $4.99/month.
Cancel anytime.
(2
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Documents
Password
(at least 6 characters)
2.6 For each of the following questions, circle the letter of the correct answer.
Join
RELATED TITLES
1
AAU Exam
i.
(1 point
The amount of time required to read a block of data from a disk into memory is composed time, rotational latency, and transfer time. Rotational latency refers to Send me updates from Scribd
Sheet Music
a.
the time it takes for the platter to make a full rotation.
b.
the time it takes forUp the read-write head to move into position over the appropriate track. Sign
c.
the time it takes for the platter to rotate the correct sector under the head.
By registering a Scribd account, you agree to our Terms d. none of above. of the Service and Privacy Policy
ii.
Interrupts can be generated in response to a.
detected program such asinarithmetic overflow or division by zero. Already have an errors account? Sign
b.
detected hardware faults.
c.
Input/Output activities.
d.
internal timers.
e.
all of the above.
f.
all except a.
2.7 If a magnetic disk has 100 cylinders, each containing 10 tracks of 10 sectors, and each sector can 128 bytes, what is the maximum capacity of the disk in bytes? _______________________
(2 p
You're Reading a Preview fullindependent access with a free 2.8 The computer system bus is made up Unlock of three bustrial. types. What are they?
(3
Download With Free Trial
Master your semester with Scribd 2.9 A computer’s memory is composed of 8K words of 32 bits Read each.upFree How many bits are required fo For 30this Days Sign to vote on title address if the smallest addressable memory unit is a word? _____________________ (2 & The New York Times Useful Not useful Special offer for students: Only $4.99/month.
Cancel anytime.
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part III: Database Management Systems (20 points)
Documents
Sheet Music
3.1 Based on the description given below, answer the questions that follow. Send me updates from Scribd
The Cheapest Car Company sells new and used cars from different makers such as Ford, Volvo an and of different models such as Camry, Falcon, Corolla, Carina. custNo, serialNo and staffNo
Sign Up
keys of Customer, Car and Staff , respectively. Customers make orders to buy cars; a customer
several orders. Each order has a unique order number ( orderNo) and only one car is ordered in o By registering a Scribd account, you agree to our Terms
An order is processed byand one staff Policy member. of Service Privacy Customer(custNo, custName, street, city, postcode) Already have an account? Sign in
Car(serialNo, model, year, maker, price) Staff(staffNo, staffName, position)
Order(orderNo, staffNo, date, custNo, serialNo, amount_paid)
Attribute amount_paid of relation Order is the amount that a customer pays for an order; a Custo not pay in full for the order. The other attributes are self-explanatory. a.
Discuss the likely Functional Dependencies in Order.
(2
You're Reading a Preview Unlock full access with a free trial.
b.
Give the foreign keys in Order and the relevant referential integrity constraints.
Master your semester with Scribd c. Write an SQL query for each of the following: Read Free Foron 30this Days Sign up to vote title & The Newi. York In howTimes many cities does the company have customers? Useful Not useful Special offer for students: Only $4.99/month.
(2
Download With Free Trial
Cancel anytime.
(2
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
iii. Cars with price greater than Birr 280,000 are luxury cars. List the customer number, n
Documents
Sheet Music
address of customers who have ordered more than one luxury car.
(3
Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
iv. List the name and position of staff members who have only sold cars to customers liv Already have an account? Sign in cities “Addis Ababa” or “Mekelle”.
(3
You're Reading a Preview Unlock full access with a free trial.
3.2 When is the concept of a weak entity used in database modeling?
(2
Download With Free Trial
Master your semester with Scribd Read Free Foron 30this Days Sign up to vote title 3.3 Discuss the various reasons that lead to the occurrence of null values in relations? & The New York Times Useful Not useful Special offer for students: Only $4.99/month.
Cancel anytime.
(2
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join
Search
Home
Saved
2.2K views
3
Sign up to download AAU Exam
Uploaded by Melkamu Asmare
Top Charts
Books
Audiobooks
Magazines
News
Sign In
Upload
Join
RELATED TITLES
1
AAU Exam
Sign Up With Facebook
Sign Up With Google or with email
Save
Embed
Name Share
IP Address Subnetting
Print
DownloadEmail
1
of 69
MELJUN CORTES It 422 Computer
Researching Network Attacks
Search document
Password
(at least 6 characters)
Part IV: Computer Networks and Data Communications (20 points) Documents Sheet Music
4.1 Compare and contrast virtual circuit switching and datagram switching based on factor addressing (addressing information in every packet), routing and effects of node failures. Send me updates from Scribd
Sign Up By registering a Scribd account, you agree to our Terms of Service and Privacy Policy
Already have an account? Sign in
4.2 For each of the following questions, circle the letter of the correct answer. i.
ii.
You're Reading a Preview
(1 point
Which of the following is a deterministic medium access control protocol? a.
ALOHA/Slotted ALOHA
c.
CSMA
Unlock full access with a free trial.
b.
Token passing
CSMA/CD Download Withd.Free Trial
In a data communication network, a sender has a sliding window of size 15 and the first 15 p
have been sent. The first ACK received by the sender was ACK 5, which frame(s) has the rec received?
Master your semester with Scribd a. Frame 5 b. Frame 4 & The New Times iii. A York transport-layer address is called Special offer for students: Only $4.99/month.
a.
MAC address
c.
Frame 0Free toto2vote d.this Frame Read Foron 30 Days Sign up title 0 to 4
b.
Not useful Cancel anytime.
Useful
Port number
Home
Saved
Top Charts
Books
Audiobooks
Magazines
News
Documents
Sheet Music
Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month.
Upload
Sign In
Read Free For 30 Days Cancel anytime.
Join