
Materials Science and Engineering, Binder Ready Version: An Introduction
9th Edition
ISBN: 9781118477700
Author: William D. Callister Jr., David G. Rethwisch
Publisher: WILEY
expand_more
expand_more
format_list_bulleted
Question
Chapter 3.17, Problem 61QP
(a)
To determine
To derive:
The planar density expression for the BCCunit cell
(b)
To determine
To compute:
The planar density value for
Expert Solution & Answer

Want to see the full answer?
Check out a sample textbook solution
Students have asked these similar questions
A ROP (Return-Oriented Programming) attack can be used to execute arbitrary
instructions by chaining together small pieces of code called "gadgets." Your goal is
to create a stack layout for a ROP attack that calls a function located at '0x4018bd3'.
Below is the assembly code for the function 'getbuf', which allocates 8 bytes of stack
space for a 'char' array. This array is then passed to the 'gets' function. Additionally,
you are provided with five useful gadgets and their addresses. Use these gadgets to
construct the stack layout.
Assembly for getbuf
1 getbuf:
2
sub
$8, %rsp
3
mov
%rsp, %rdi
4
call
gets
56
add
$8, %rsp
ret
#Allocate 8 bytes for buffer
#Load buffer address into %rdi
#Call gets with buffer
#Restore the stack pointer
#Return to caller.
Stack
Layout
(fill
in
Gadgets
each
8-byte
section)
Address
Gadget
Address
Value (8 bytes)
0x4006a7 pop %rdi; ret
0x7fffffffdfc0
Ox4006a9 pop %rsi; ret
0x7fffffffdfb8
0x4006ab pop %rax; ret
0x7fffffffdfb0
0x7fffffffdfa8
Ox4006ad mov %rax,…
In each of the following C code snippets, there are issues that can prevent the compilerfrom applying certain optimizations. For each snippet:• Circle the line number that contains compiler optimization blocker.• Select the best modification to improve optimization.1. Which line prevents compiler optimization? Circle one: 2 3 4 5 6Suggested solution:• Remove printf or move it outside the loop.• Remove the loop.• Replace arr[i] with a constant value.1 int sum( int ∗ ar r , int n) {2 int s = 0 ;3 for ( int i = 0 ; i < n ; i++) {4 s += a r r [ i ] ;5 p r i n t f ( ”%d\n” , s ) ;6 }7 return s ;8 }2. Which line prevents compiler optimization? Circle one: 2 3 4 5 6Suggested solution:• Move or eliminate do extra work() if it’s not necessary inside the loop.• Remove the loop (but what about scaling?).• Replace arr[i] *= factor; with arr[i] = 0; (why would that help?).1 void s c a l e ( int ∗ ar r , int n , int f a c t o r ) {2 for ( int i = 0 ; i < n ; i++) {3 a r r [ i ] ∗= f a c t o r…
123456
A ROP (Return-Oriented Programming) attack can be used to execute arbitrary
instructions by chaining together small pieces of code called "gadgets." Your goal is
to create a stack layout for a ROP attack that calls a function located at 'Ox4018bd3'.
Below is the assembly code for the function 'getbuf, which allocates 8 bytes of stack
space for a 'char' array. This array is then passed to the 'gets' function. Additionally,
you are provided with five useful gadgets and their addresses. Use these gadgets to
construct the stack layout.
Assembly for getbuf
1 getbuf:
sub
mov
$8, %rsp
%rsp, %rdi
call
gets
add
$8, %rsp
6
ret
#Allocate 8 bytes for buffer
#Load buffer address into %rdi
#Call gets with buffer
#Restore the stack pointer
#Return to caller
Stack
each
Layout (fill
in
Gadgets
8-byte
section)
Address Gadget
Address Value (8 bytes)
0x7fffffffdfc0
0x7fffffffdfb8
0x7fffffffdfb0
0x7fffffffdfa8
0x7fffffffdfa0
0x7fffffffdf98
0x7fffffffdf90
0x7fffffffdf88
Original
0x4006a7 pop %rdi;…
Chapter 3 Solutions
Materials Science and Engineering, Binder Ready Version: An Introduction
Ch. 3.17 - Prob. 1QPCh. 3.17 - Prob. 2QPCh. 3.17 - Prob. 3QPCh. 3.17 - Prob. 4QPCh. 3.17 - Prob. 5QPCh. 3.17 - Prob. 6QPCh. 3.17 - Prob. 7QPCh. 3.17 - Prob. 8QPCh. 3.17 - Prob. 9QPCh. 3.17 - Prob. 10QP
Ch. 3.17 - Prob. 11QPCh. 3.17 - Prob. 12QPCh. 3.17 - Prob. 13QPCh. 3.17 - Prob. 14QPCh. 3.17 - Prob. 15QPCh. 3.17 - Prob. 16QPCh. 3.17 - Prob. 17QPCh. 3.17 - Prob. 18QPCh. 3.17 - Prob. 19QPCh. 3.17 - Prob. 20QPCh. 3.17 - Prob. 21QPCh. 3.17 - Prob. 22QPCh. 3.17 - Prob. 23QPCh. 3.17 - Prob. 24QPCh. 3.17 - Prob. 25QPCh. 3.17 - Prob. 26QPCh. 3.17 - Prob. 27QPCh. 3.17 - Prob. 28QPCh. 3.17 - Prob. 29QPCh. 3.17 - Prob. 31QPCh. 3.17 - Prob. 32QPCh. 3.17 - Prob. 33QPCh. 3.17 - Prob. 34QPCh. 3.17 - Prob. 35QPCh. 3.17 - Prob. 36QPCh. 3.17 - Prob. 37QPCh. 3.17 - Prob. 38QPCh. 3.17 - Prob. 39QPCh. 3.17 - Prob. 40QPCh. 3.17 - Prob. 41QPCh. 3.17 - Prob. 42QPCh. 3.17 - Prob. 43QPCh. 3.17 - Prob. 44QPCh. 3.17 - Prob. 45QPCh. 3.17 - Prob. 46QPCh. 3.17 - Prob. 47QPCh. 3.17 - Prob. 48QPCh. 3.17 - Prob. 49QPCh. 3.17 - Prob. 50QPCh. 3.17 - Prob. 51QPCh. 3.17 - Prob. 52QPCh. 3.17 - Prob. 53QPCh. 3.17 - Prob. 54QPCh. 3.17 - Prob. 55QPCh. 3.17 - Prob. 56QPCh. 3.17 - Prob. 57QPCh. 3.17 - Prob. 58QPCh. 3.17 - Prob. 59QPCh. 3.17 - Prob. 60QPCh. 3.17 - Prob. 61QPCh. 3.17 - Prob. 62QPCh. 3.17 - Prob. 63QPCh. 3.17 - Prob. 64QPCh. 3.17 - Prob. 65QPCh. 3.17 - Prob. 66QPCh. 3.17 - Prob. 67QPCh. 3.17 - Prob. 68QPCh. 3.17 - Prob. 69QPCh. 3.17 - Prob. 70QPCh. 3.17 - Prob. 71QPCh. 3.17 - Prob. 72QPCh. 3.17 - Prob. 73QPCh. 3.17 - Prob. 74QPCh. 3.17 - Prob. 75QPCh. 3.17 - Prob. 76QPCh. 3.17 - Prob. 77QPCh. 3.17 - Prob. 1SSPCh. 3.17 - Prob. 1FEQPCh. 3.17 - Prob. 2FEQPCh. 3.17 - Prob. 3FEQP
Knowledge Booster
Similar questions
- Determine the required solids retention time (SRT) of a completely mixed activated sludge aeration tank for a conventional activated sludge system treating a design flow rate of 34,560 m³/d, where the effluent standards are 30.0 mg/L for BODs and 30.0 mg/L for total suspended solids (TSS). Assume that the BOD5 of the effluent TSS is 70% of the TSS concentration. Assume the BODs concentration leaving the primary clarifier is 128 mg/L that the MLVSS concentration (X₂) is 2,500 mg/L. Assume the following values for the growth constants: Ks 100 mg/L BODS ⚫ Hm - 2.5 d 1 kd = 0.050 d 1 Y = 0.50 mg VSS/mg BODs removed Express your answer in days and round to the nearest 0.1.arrow_forwardCharacter Hex value || Character Hex value | Character Hex value 'A' 0x41 יני Ox4a 'S' 0x53 0x42 'K' 0x4b 'T" 0x54 0x43 'L' Ox4c 0x55 0x44 'M' Ox4d 0x56 0x45 'N' Ox4e 'W' 0x57 0x46 Ox4f 'X' 0x58 0x47 'P' 0x50 'Y' 0x59 'H' 0x48 'Q' 0x51 'Z' Охба 'T' 0x49 'R' 0x52 '\0' 0x00 Now consider what happens on a Linux/x86 machine when callfoo calls foo with the input string "ZYXWVUTSRQPONMLKJIHGFEDCBA". A. On the left draw the state of the stack just before the execution of the instruction at address Ox40053a; make sure to show the frames for callfoo and foo and the exact return address, in Hex at the bottom of the callfoo frame. Then, on the right, draw the state of the stack just after the instruction got executed; make sure to show where the string "ZYXWVUTSRQPONMLKJIHGFEDCBA" is placed and what part, if any, of the above return address has been overwritten. B. Immediately after the ret instruction at address 0x400543 executes, what is the value of the program counter register %rip? (That is…arrow_forwardProblem: Textbook Problem 10.52 and 10.53. Determine the moment of inertia of the area about the x- axis and the y-axis. 3 in. 3 in. 6 in. 2 in. 4 in. xarrow_forward
- Draw out the way each of these structs looks in memory, including padding! Number the offsets in memory. 1 struct okay Name 2 { short a; 3 4 long number; 5 int also_a_number; 6 7 }; char* text; 1 struct badName 2 { 3 4 5 }; short s; struct okay Name n;arrow_forwardConsider the circuit diagram below, where the load is indicated by the dashed box. Compute the apparent power and power factor of the load. Use power factor correction to correct the power factor of the load to 0.8 lagging. Your solution should include a circuit diagram of your modified circuit.arrow_forwardYou can create your own AutoCorrect entries. Question 19Select one: True Falsearrow_forward
- By default, all text is formatted using the Normal Style. Question 20Select one: True Falsearrow_forwardNode.js, Express.js, MongoDB, and Mongoose: Create, Read, Update, and Delete Operations There is a program similar to this assignment given as the last example, CRUD, in the lecture notes for the week that discusses the introduction to MongoDB. Basically, you need to adapt this example program to the data given in this assignment. This program will take more time that previous assignments. So, hopefully you'll start early and you've kept to the schedule in terms of reading the lecture notes. You can use compass if you want to create this database. Or, when your connection string in the model runs it will create the database for you if one does not yet exist. So, ⚫ create a Mongoose model based on the info given below. The index.html page is given in the same folder as these notes. • When you successfully run index.js and instantiate the model, your database is created. • Once the database is created, you need to perfect the addCar route so you can add data using the index.html page. •…arrow_forwardConsider the circuit diagram below. What is the power factor of the circuit? Is it leading or lagging? Draw the power factor triangle of the circuit without calculating the individual power consumption of each component.arrow_forward
- Several reactions are carried out in a closed vessel. The following data are taken for the concentration of compounds A, B, and C [grams per liter] as a function of time [minutes], from the start of the reaction. Show the resulting data and trendlines, with equation and value, on the appropriate graph type (rectilinear, semilog, or log–log) to make the data appear linear.arrow_forward1. Enabled with SSL, HTTPS protocol is widely used to provide secure Web services to Web users using Web browsers on the Internet. How is a secure communication channel established at the start of communication between a Web server running HTTPS and a Web browser? Consider the following threats to Web security and how each of these threats is countered by a particular feature of SSL. Man-in-the-middle attack: An attacker interposes during key exchange, acting as the client to the server and as the server to the client. Password sniffing: Passwords in HTTP or other application traffic are “eavesdropped.” SYN flooding: An attacker sends TCP SYN messages to request a connection but does not respond to the final message to establish the connection fully. The attacked TCP module typically leaves the “half-open” connection around for a few minutes. Repeated SYN messages can clog the TCP module.arrow_forwardFor the gravity concrete dam shown in the figure, the following data are available: Unit weight of concrete (7)-2.4 ton/m Neglect Wave pressure, silt pressure, ice force and earth quake force) -0.65, (7)-1 ton/m' Solve on paper and sketch Find factor of safety against sliding and overturning (F.Sa & F.S), If heel and toe stresses (Pain & P) are 57.17ton/m2 and 84.53 ton/m² respectively. Solve in table on paper w.s.l 83m 10m 8m 80marrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- MATLAB: An Introduction with ApplicationsEngineeringISBN:9781119256830Author:Amos GilatPublisher:John Wiley & Sons IncEssentials Of Materials Science And EngineeringEngineeringISBN:9781337385497Author:WRIGHT, Wendelin J.Publisher:Cengage,Industrial Motor ControlEngineeringISBN:9781133691808Author:Stephen HermanPublisher:Cengage Learning
- Basics Of Engineering EconomyEngineeringISBN:9780073376356Author:Leland Blank, Anthony TarquinPublisher:MCGRAW-HILL HIGHER EDUCATIONStructural Steel Design (6th Edition)EngineeringISBN:9780134589657Author:Jack C. McCormac, Stephen F. CsernakPublisher:PEARSONFundamentals of Materials Science and Engineering...EngineeringISBN:9781119175483Author:William D. Callister Jr., David G. RethwischPublisher:WILEY

MATLAB: An Introduction with Applications
Engineering
ISBN:9781119256830
Author:Amos Gilat
Publisher:John Wiley & Sons Inc

Essentials Of Materials Science And Engineering
Engineering
ISBN:9781337385497
Author:WRIGHT, Wendelin J.
Publisher:Cengage,

Industrial Motor Control
Engineering
ISBN:9781133691808
Author:Stephen Herman
Publisher:Cengage Learning

Basics Of Engineering Economy
Engineering
ISBN:9780073376356
Author:Leland Blank, Anthony Tarquin
Publisher:MCGRAW-HILL HIGHER EDUCATION

Structural Steel Design (6th Edition)
Engineering
ISBN:9780134589657
Author:Jack C. McCormac, Stephen F. Csernak
Publisher:PEARSON

Fundamentals of Materials Science and Engineering...
Engineering
ISBN:9781119175483
Author:William D. Callister Jr., David G. Rethwisch
Publisher:WILEY