Computer Science

Using a writing speed of 800 Mbits/s, how long would it take to store a 40 GB raw video file on a blue ray disk? How small would the 40 GB raw video file become if it is compressed with a compression ratio of 8.

Using a writing speed of 800 Mbits/s, how long would it take to store a 40 GB raw video file on a blue ray disk? How small would the 40 GB raw video file become if it is compressed with a compression ratio of 8. EXPERT ANSWER Formula :-Time taken to store the video on …

Using a writing speed of 800 Mbits/s, how long would it take to store a 40 GB raw video file on a blue ray disk? How small would the 40 GB raw video file become if it is compressed with a compression ratio of 8. Read More »

Taking the speed of the radio signal as 3×108 meters per second, calculate the time taken for a signal to reach a GPS receiver from a GPS satellite at a position 23500 km distant from the receiver. Assume that the speed of the signal is unchanged over the whole path length. Express your answer in milliseconds.

Taking the speed of the radio signal as 3×108 meters per second, calculate the time taken for a signal to reach a GPS receiver from a GPS satellite at a position 23500 km distant from the receiver. Assume that the speed of the signal is unchanged over the whole path length. Express your answer in milliseconds.         …

Taking the speed of the radio signal as 3×108 meters per second, calculate the time taken for a signal to reach a GPS receiver from a GPS satellite at a position 23500 km distant from the receiver. Assume that the speed of the signal is unchanged over the whole path length. Express your answer in milliseconds. Read More »

Bell Labs of USA (1946) offered incompatible mobile telephone services. However, that offered limited coverage areas and a small number of available channels. Additionally, Russian inventor Leonid Kupriyanovich (1957), developed a number of mobile phones that looked surprisingly similar to modem mobile devices. One of Leonid’s phones weighed just 70 grams and could easily fit into the palm of your hand. Nevertheless, was designed for use in cars. Furthermore, American inventor Martin Cooper (1973), released onto the market, the first cell phone. It weighed 1.1kg and was 23cm long. Against the pretext: a) What are the recommendations that could be derived from such an observation? Major Topics EV 7 The art and science of engineering b) Propose a model per the recommendations in question (a). Major Topic5 CR 7 Engineering design notes configuration and the design practice c) Implement the proposed model in question (b). Major Topics CR 6 Engineering design notes configuration and the design practice TOTAL SCORE: 20

EXPERT ANSWER // A C++ program to count all possible paths // from top left to bottom right #include <iostream> using namespace std; // Returns count of possible paths to reach cell at row // number m and column number n from the topmost leftmost // cell (cell at 1, 1) int numberOfPaths(int m, int …

Bell Labs of USA (1946) offered incompatible mobile telephone services. However, that offered limited coverage areas and a small number of available channels. Additionally, Russian inventor Leonid Kupriyanovich (1957), developed a number of mobile phones that looked surprisingly similar to modem mobile devices. One of Leonid’s phones weighed just 70 grams and could easily fit into the palm of your hand. Nevertheless, was designed for use in cars. Furthermore, American inventor Martin Cooper (1973), released onto the market, the first cell phone. It weighed 1.1kg and was 23cm long. Against the pretext: a) What are the recommendations that could be derived from such an observation? Major Topics EV 7 The art and science of engineering b) Propose a model per the recommendations in question (a). Major Topic5 CR 7 Engineering design notes configuration and the design practice c) Implement the proposed model in question (b). Major Topics CR 6 Engineering design notes configuration and the design practice TOTAL SCORE: 20 Read More »

Write a Hack Assembly Language program to calculate the quotient from a division operation. The values of dividend a and divisor b are stored in RAM[0] (R0) and RAM[1] (R1), respectively. The dividend a is a non-negative integer, and the divisor b is a positive integer. Store the quotient in RAM[2] (R2). Ignore the remainder.

Write A Hack Assembly Language Program To Calculate The Quotient From A Division Operation. The Values Of Dividend A And Divisor B Are Stored In RAM0 And RAM1, Respectively. The Dividend A Is A Non-Negative Integer, And The Divisor B Is A Positive Integer. Store The Quotient In RAM2. Ignore The Remainder. Example: if you …

Write a Hack Assembly Language program to calculate the quotient from a division operation. The values of dividend a and divisor b are stored in RAM[0] (R0) and RAM[1] (R1), respectively. The dividend a is a non-negative integer, and the divisor b is a positive integer. Store the quotient in RAM[2] (R2). Ignore the remainder. Read More »

Task 1.1 – Add and Subtract (8 points) Write a program in Hack assembly to calculate a +b – c a Complete the code in AddSub.asm Inputs: R1 contains the value for a R2 contains the value for b R3 contains the value for c Outputs: • Write your final answer to RØ Test Cases: . • Write at least 2 test cases. A sample test case is provided in AddSub00.tst • Each test case should be in a file named AddSubXX. tst where xx is a number starting at 01. • You should also submit any supporting files such as CMP files.

EXPERT ANSWER

Provide the transmission media (Guided or Unguided) used in the following networks and explain the functions and characteristics (bandwidth, Security, Throughput) and explain what these networks are primarily used for. 1. Satellite Cable TV Network 2. Campus LAN 3. 5G Network 4. Airport IP Telephony Network 5. VLAN 6. VANET 7. ZigBee Network 8. FTTH Network 9. VoIP 10. SKYPE

EXPERT ANSWER Satellite Cable TV Network Campus LAN 5G Network Airport IP Telephony Network VLAN VANET ZigBee Network FTTH Network VoIP SKYPE

Provide an example of each threat action and identify the CIA affected in each threat. Threat Example CIA affected Spam and Phishing Viruses Worms

EXPERT ANSWER First we explain about CIA:- CIA means confidentiality, integrity and availability. It forms a triad of confidentiality+integrity+availability. Now, we explain the Spam and Phishing threat and the example of spam refers the electronic junk mail or unwanted mail that are received on your computer. The example of  phishing is email and link to collect some important information …

Provide an example of each threat action and identify the CIA affected in each threat. Threat Example CIA affected Spam and Phishing Viruses Worms Read More »

Work: Write a program to solve the following customized 8-puzzle problem using the breadth first search algorithm. Note that we will be having two 4’s and two 5’s in this problem and no 3 or 6. Your program will ask the user to enter the starting position as a string (i.e. 142045578 the 0 is used for space). It then should show that position as: 1 4 2 4 5 5 7 8 Then it should output the sequence of actions that will lead to the goal: 1 2 4 4 5 5 7 8 Also print out the number of generated states and expanded states up to finding the goal state. In your code, always consider the following order of actions for expanding nodes: Up, Down, Right, then Left. Note that if any action is illegal (can’t be performed) then you should ignore it (don’t generate the illegal node).

EXPERT ANSWER

Question 01: Implement the following UML class diagrams which include an abstract class Employee, an interface TaxCalculator, and a child class Faculty. Employee > TaxCalculator +TAX PERCENT Hinta 15 – id:int name : String – age : int + yearlyIncome Tax(: double + yearlyIncome WithoutTax(: double Employee (id: int, name: String, age int) + Getters + Setters + yearlySalaryo : int //abstract + yeanyIncome() : int l’abstract Faculty – initial : String monthly Salary: int – yearlyBonus : int + Faculty (id:int, name : String, age : int, initial : String, monthly Salary: int, yearlyBonus : int) + Getters + Setters + toString : String Now write a test program that performs the following tasks: 1. Create a Faculty object with an id of 1001, name as Gareth Bale, age of 43 years, initial as GB, the monthly salary of 30000 BDT, the yearly bonus of 40000 BDT. 2. Call the toString() method of the Faculty class where yearlySalary.yearlylncome, yearlyIncome Tax, yearlyIncome Without Tax are included. In console: Faculty (initial=GB, monthlySalary=30000, yearlyBonus=40000, yearlySalary=360000, yearlyIncome=400000, yearlyIncome Tax=60000.0, yearlyIncome Without Tax=340000.0 3. Now modify the Faculty class in such a way so that objects can’t be created with a negative yearly bonus. If any Faculty object is created with a negative yearly bonus, it’ll throw an exception such as IllegalArgumentException with an appropriate error message like “Yearly bonus can’t be negative”. 4. Create another Faculty object with an id of 1002, name as lan Goodfellow, age of 46 years, initial as IGF, the monthly salary of 30000 BDT, the yearly bonus of – 40000 BDT. 5. Then catch with an appropriate error message, if any exception occurs here.

EXPERT ANSWER TaxCalculator.java Step 2 : Step 3: Faculty.java Step 4 : Test.java } } Step 5 : *********output*********** Step 6 : If Bonus less than 0 shown below output

Write a method that takes as parameters two sorted stacks of integers sl and s2 (where the lowest value is at the top) and returns a sorted stack (lowest on top) that contains the values of both sl and s2. You are allowed to use only the stack operations such as pop, push, and top. You are allowed to use only stacks as temporary storage. No other data structures such as arrays are allowed. The header of the method is: public static Stack merge SortedStacks (Stack si, Stack s2) Write a main method in which you create two sorted stacks and call the above method to test it.

EXPERT ANSWER Answer : // THIS ANSWER IS IN C++ LANGUAGE