STARTING OUT W/PROGRAM.LOGIC...-TEXT
5th Edition
ISBN: 2810022369454
Author: GADDIS
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 1, Problem 3E
Program Plan Intro
ASCII character Set:
The ASCII is stands for “American Standard Code for Information Interchange”.
- It uses 128 unique characters which represent the English letters, punctuation marks and other characters.
- It uses seven bits to represent each character in the set. Check bit is used as the eighth bit to ensure proper data transmission.
- Extended ASCII character version includes the eighth bit and allows 256 unique characters, which includes some additional symbols and some accented letters.
- ASCII has a finite number of characters; so it lists them all and assigns binary string value to each one of them.
- ASCII character set as well as Unicode character set treats uppercase and lowercase letters distinctly.
- For example, the ASCII code for A is 65. When “A” is typed on keyboard, its equivalent ASCII value “65" will be automatically stored in the memory.
Expert Solution & Answer

Want to see the full answer?
Check out a sample textbook solution
Students have asked these similar questions
A3Q3.c - You are to write a C program that implements the following disk scheduling
algorithms:
a. FCFS [10 marks]
b. SCAN [10 marks]
c. C-SCAN [10 marks]
d. SSTF [10 marks]
e. LOOK [10 marks]
f. C-LOOK [10 marks]
•
Your program will service a disk with 300 cylinders numbered 0 to 299.
•
•
•
•
The program will service the requests (a list of 20 cylinder numbers) given in the file
request.bin.
This file contains (4 byte) integer values representing requests ranging from 0-299.
Your program will take the initial position of the disk head as the first command line
argument and the direction of the head as the second command line argument.
It will then output the requests in the order in which they are serviced, and the total
amount of head movements required by each algorithm.
In particular, your program needs to do the following:
Your program should take two command line arguments
a) First command line argument - initial position of the disk head (an integer value)
b) Second command line…
2. The memory management has contiguous memory allocation, dynamic partitions,
and paging. Compare the internal fragmentation and external fragmentation for
these three approaches. [2 marks]
3. Suppose we have Logical address space = 24 = 16 (m = 4), Page size=2² =4 (n = 2),
Physical address space = 26 = 64 (r = 6). Answer the following questions: [4 marks]
1) Total # of pages ?
2) Total # of frames ?
3) Number of bits to represent logical address?
4) Number of bits to represent offset ?
5) Number of bits to represent physical address?
6) Number of bits to represent a page number?
7) Number of bits to represent a frame number /
4. What is translation look-aside buffers (TLBS)? Why we need them to implement the
page table? [2 marks]
5. Why we need shared pages for multiple processes? Give one example to show the
benefits. [2 marks]
6. How to implement the virtual memory by using page out and page in? Explain with
an example. [2 marks]
7. We have a reference string of referenced page…
8. List three HDD scheduling algorithms. [2 marks]
9. True or False? The NVM has the same scheduling algorithms with HDD. Explain
why? [2 marks]
10. Why the modern mouses use polling to detect movements instead of interrupts? [2
marks]
11. What is thrashing? How does it happen? [2 marks]
12. Given a reference string of page numbers
7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 0, 3, 2, 1, 2, 0, 1, 7, 0, 1
and 4 frames show how the page replacement algorithms work, and how many page
faults? [6 marks],
1) FIFO algorithm? [2 marks]
2) Optimal algorithm? [2 marks]
3) LRU algorithm? [2 marks]
13. List at least three file systems that you know. [2 marks]
14. In C programming, how the seek to a specific position in the file by offset? [2 marks]
Chapter 1 Solutions
STARTING OUT W/PROGRAM.LOGIC...-TEXT
Ch. 1.2 - What is a program?Ch. 1.2 - What is hardware?Ch. 1.2 - List the five major components of a computer...Ch. 1.2 - What part of the computer actually runs programs?Ch. 1.2 - Prob. 1.5CPCh. 1.2 - Prob. 1.6CPCh. 1.2 - Prob. 1.7CPCh. 1.2 - Prob. 1.8CPCh. 1.3 - What amount of memory is enough to store a letter...Ch. 1.3 - Prob. 1.10CP
Ch. 1.3 - Prob. 1.11CPCh. 1.3 - Prob. 1.12CPCh. 1.3 - Prob. 1.13CPCh. 1.3 - Prob. 1.14CPCh. 1.4 - A CPU understands instructions that are written...Ch. 1.4 - Prob. 1.16CPCh. 1.4 - When a CPU executes the instructions in a program,...Ch. 1.4 - What is assembly language?Ch. 1.4 - What type of programming language allows you to...Ch. 1.4 - Prob. 1.20CPCh. 1.4 - What do you call a program that translates a...Ch. 1.4 - What do you call a program that both translates...Ch. 1.4 - Prob. 1.23CPCh. 1.5 - Prob. 1.24CPCh. 1.5 - Prob. 1.25CPCh. 1.5 - Word processing programs, spreadsheet programs,...Ch. 1 - A(n) _______ is a set of instructions that a...Ch. 1 - Prob. 2MCCh. 1 - Prob. 3MCCh. 1 - Today, CPUs are small chips known as ____. a....Ch. 1 - Prob. 5MCCh. 1 - Prob. 6MCCh. 1 - Prob. 7MCCh. 1 - Prob. 8MCCh. 1 - Prob. 9MCCh. 1 - Prob. 10MCCh. 1 - Prob. 11MCCh. 1 - In a(n) ______ numbering system, all numeric...Ch. 1 - A bit that is turned off represents the following...Ch. 1 - Prob. 14MCCh. 1 - Prob. 15MCCh. 1 - Prob. 16MCCh. 1 - Prob. 17MCCh. 1 - Prob. 18MCCh. 1 - Prob. 19MCCh. 1 - Prob. 20MCCh. 1 - Computers can only execute programs that are...Ch. 1 - Prob. 22MCCh. 1 - The words that make up a high-level programming...Ch. 1 - Prob. 24MCCh. 1 - A(n) _______ program translates a high-level...Ch. 1 - Today, CPUs are huge devices made of electrical...Ch. 1 - Prob. 2TFCh. 1 - Any piece of data that is stored in a computers...Ch. 1 - Prob. 4TFCh. 1 - Machine language is the only language that a CPU...Ch. 1 - Assembly language is considered a high-level...Ch. 1 - An interpreter is a program that both translates...Ch. 1 - A syntax error does not prevent a program from...Ch. 1 - Prob. 9TFCh. 1 - Word processing programs, spreadsheet programs,...Ch. 1 - Why is the CPU the most important component in a...Ch. 1 - Prob. 2SACh. 1 - Prob. 3SACh. 1 - What are the words that make up a high-level...Ch. 1 - What are the short words that are used in assembly...Ch. 1 - What is the difference between a compiler and an...Ch. 1 - Prob. 7SACh. 1 - Prob. 1ECh. 1 - Use what you've learned about the binary numbering...Ch. 1 - Prob. 3ECh. 1 - Use the Web to research the history of the BASIC,...
Knowledge Booster
Similar questions
- Is developed App in play store much easier than in app store because i look app like human anonymus and like walter labs prioritize iphone app store first is it difficult to developed app on play store ? And btw i want to move to iphone anroid suckarrow_forwardQ12- A three phase transformer 3300/400 V,has D/Y connected and working on 50Hz. The line current on the primary side is 12A and secondary has a balanced load at 0.8 lagging p.f. Determine the i) Secondary phase voltage ii) Line current iii) Output power Ans. (230.95 V, 99.11 A, 54.94 kW)arrow_forwardmake corrections of this program based on the errors shown. this is CIS 227 .arrow_forward
- Create 6 users: Don, Liz, Shamir, Jose, Kate, and Sal. Create 2 groups: marketing and research. Add Shamir, Jose, and Kate to the marketing group. Add Don, Liz, and Sal to the research group. Create a shared directory for each group. Create two files to put into each directory: spreadsheetJanuary.txt meetingNotes.txt Assign access permissions to the directories: Groups should have Read+Write access Leave owner permissions as they are “Everyone else” should not have any access Submit for grade: Screenshot of /etc/passwd contents showing your new users Screenshot of /etc/group contents showing new groups with their members Screenshot of shared directories you created with files and permissionsarrow_forward⚫ your circuit diagrams for your basic bricks, such as AND, OR, XOR gates and 1 bit multiplexers, ⚫ your circuit diagrams for your extended full adder, designed in Section 1 and ⚫ your circuit diagrams for your 8-bit arithmetical-logical unit, designed in Section 2. 1 An Extended Full Adder In this Section, we are going to design an extended full adder circuit (EFA). That EFA takes 6 one bit inputs: aj, bj, Cin, Tin, t₁ and to. Depending on the four possible combinations of values on t₁ and to, the EFA produces 3 one bit outputs: sj, Cout and rout. The EFA can be specified in principle by a truth table with 26 = 64 entries and 3 outputs. However, as the EFA ignores certain inputs in certain cases, it is easier to work with the following overview specification, depending only on t₁ and to in the first place: t₁ to Description 00 Output Relationship Ignored Inputs Addition Mode 2 Coutsjaj + bj + Cin, Tout= 0 Tin 0 1 Shift Left Mode Sj = Cin, Cout=bj, rout = 0 rin, aj 10 1 1 Shift Right…arrow_forwardShow the correct stereochemistry when needed!! mechanism: mechanism: Show the correct stereochemistry when needed!! Br NaOPh diethyl ether substitutionarrow_forward
- In javaarrow_forwardKeanPerson #keanld:int #keanEmail:String #firstName:String #lastName: String KeanAlumni -yearOfGraduation: int - employmentStatus: String + KeanPerson() + KeanPerson(keanld: int, keanEmail: String, firstName: String, lastName: String) + getKeanld(): int + getKeanEmail(): String +getFirstName(): String + getLastName(): String + setFirstName(firstName: String): void + setLastName(lastName: String): void +toString(): String +getParkingRate(): double + KeanAlumni() + KeanAlumni(keanld: int, keanEmail: String, firstName: String, lastName: String, yearOfGraduation: int, employmentStatus: String) +getYearOfGraduation(): int + setYearOfGraduation(yearOfGraduation: int): void +toString(): String +getParkingRate(): double In this question, write Java code to Create and Test the superclass: Abstract KeanPerson and a subclass of the KeanPerson: KeanAlumni. Task 1: Implement Abstract Class KeanPerson using UML (10 points) • Four data fields • Two constructors (1 default and 1 constructor with all…arrow_forwardPlz correct answer by best experts...??arrow_forward
- Q3) using the following image matrix a- b- 12345 6 7 8 9 10 11 12 13 14 15 1617181920 21 22 23 24 25 Using direct chaotic one dimension method to convert the plain text to stego text (hello ahmed)? Using direct chaotic two-dimension method to convert the plain text to stego text?arrow_forward: The Multithreaded Cook In this lab, we'll practice multithreading. Using Semaphores for synchronization, implement a multithreaded cook that performs the following recipe, with each task being contained in a single Thread: 1. Task 1: Cut onions. a. Waits for none. b. Signals Task 4 2. Task 2: Mince meat. a. Waits for none b. Signals Task 4 3. Task 3: Slice aubergines. a. Waits for none b. Signals Task 6 4. Task 4: Make sauce. a. Waits for Task 1, and 2 b. Signals Task 6 5. Task 5: Finished Bechamel. a. Waits for none b. Signals Task 7 6. Task 6: Layout the layers. a. Waits for Task 3, and 4 b. Signals Task 7 7. Task 7: Put Bechamel and Cheese. a. Waits for Task 5, and 6 b. Signals Task 9 8. Task 8: Turn on oven. a. Waits for none b. Signals Task 9 9. Task 9: Cook. a. Waits for Task 7, and 8 b. Signals none At the start of each task (once all Semaphores have been acquired), print out a string of the task you are starting, sleep for 2-11 seconds, then print out a string saying that you…arrow_forwardProgramming Problems 9.28 Assume that a system has a 32-bit virtual address with a 4-KB page size. Write a C program that is passed a virtual address (in decimal) on the command line and have it output the page number and offset for the given address. As an example, your program would run as follows: ./addresses 19986 Your program would output: The address 19986 contains: page number = 4 offset = 3602 Writing this program will require using the appropriate data type to store 32 bits. We encourage you to use unsigned data types as well. Programming Projects Contiguous Memory Allocation In Section 9.2, we presented different algorithms for contiguous memory allo- cation. This project will involve managing a contiguous region of memory of size MAX where addresses may range from 0 ... MAX - 1. Your program must respond to four different requests: 1. Request for a contiguous block of memory 2. Release of a contiguous block of memory 3. Compact unused holes of memory into one single block 4.…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
- C++ for Engineers and ScientistsComputer ScienceISBN:9781133187844Author:Bronson, Gary J.Publisher:Course Technology PtrNp Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage

Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning

C++ for Engineers and Scientists
Computer Science
ISBN:9781133187844
Author:Bronson, Gary J.
Publisher:Course Technology Ptr
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage