
Big Java Late Objects
2nd Edition
ISBN: 9781119330455
Author: Horstmann
Publisher: WILEY
expand_more
expand_more
format_list_bulleted
Concept explainers
Textbook Question
Chapter 4.10, Problem 46SC
How do you simulate a coin toss with the Math.random () method?
Expert Solution & Answer

Want to see the full answer?
Check out a sample textbook solution
Students have asked these similar questions
Question D.4: FIFO Page Replacement
Consider the following page reference string:
e, c, b, e, a, g, d, c, e, g, d, a
Considering 4 frames, fill in the following table and then answer how many page faults would occur with the
FIFO page replacement algorithm.
RS: reference string; FO: frame 0, F1: frame 1, etc.
Hint: all frames are initially empty, so your first unique pages will all cost one fault each.
Time
1234567891011
12
RS
e
cb
e agd ce g d
a
FO
F1
F2
F3
Page fault?
b) Total # page faults:
c) Briefly (1-2 sentences) explain Belady's Anomaly that can occur in FIFO Page Replacement.
Consider a system that uses a fixed-partition scheme, with equal partitions of size 2" bytes, and the main
memory has 2¹8 bytes. A process table is maintained with a pointer to the resident partition for each resident
process. How many bits are required for the pointer in the process table? Show all your steps.
Use the same semaphore notation shown above to describe how we can ensure the execution order of the
following process execution graph:
P6
P2
P7
P1
P3
P4
P5
Use all of the following semaphores in your answer:
s1=0; s2=0; s3=0; s4=0; s5=0; s6=0;
Chapter 4 Solutions
Big Java Late Objects
Ch. 4.1 - How many years does it take for the investment to...Ch. 4.1 - If the interest rate is 10 percent per year, how...Ch. 4.1 - Modify the program so that the balance after each...Ch. 4.1 - Suppose we change the program so that the...Ch. 4.1 - What does the following loop print? int n = 1;...Ch. 4.2 - Hand-trace the following code, showing the value...Ch. 4.2 - Hand-trace the following code, showing the value...Ch. 4.2 - Hand-trace the following code, assuming that a is...Ch. 4.2 - Trace the following code. What error do you...Ch. 4.2 - Prob. 10SC
Ch. 4.3 - Write the for loop of the InvestmentTable.java...Ch. 4.3 - How many numbers does this loop print? for (int n...Ch. 4.3 - Write a for loop that prints all even numbers...Ch. 4.3 - Write a for loop that computes the sum of the...Ch. 4.3 - How would you modify the for loop of the...Ch. 4.4 - Prob. 16SCCh. 4.4 - Rewrite the input check do loop using a while loop...Ch. 4.4 - Suppose Java didnt have a do loop. Could you...Ch. 4.4 - Write a do loop that reads integers and computes...Ch. 4.4 - Write a do loop that reads integers and computes...Ch. 4.5 - What does the SentinelDemo.java program print when...Ch. 4.5 - Why does the SentinelDemo.java program have to...Ch. 4.5 - What would happen if the declaration of the salary...Ch. 4.5 - In the last example of this section, we prompt the...Ch. 4.5 - Prob. 25SCCh. 4.6 - Prob. 26SCCh. 4.6 - Google has a simple interface for converting...Ch. 4.6 - Consider a modification of the program in Self...Ch. 4.6 - Prob. 29SCCh. 4.6 - Produce a storyboard for a program that compares...Ch. 4.7 - What total is computed when no user input is...Ch. 4.7 - Prob. 32SCCh. 4.7 - What are the values of position and ch when no...Ch. 4.7 - Prob. 34SCCh. 4.7 - Prob. 35SCCh. 4.7 - Prob. 36SCCh. 4.8 - Why is there a statement System.out.println(); in...Ch. 4.8 - How would you change the program to display all...Ch. 4.8 - Prob. 39SCCh. 4.8 - What do the following nested loops display? for...Ch. 4.8 - Prob. 41SCCh. 4.9 - Prob. 42SCCh. 4.9 - You need to write a program for DNA analysis that...Ch. 4.9 - Prob. 44SCCh. 4.9 - Consider the task of finding numbers in a string....Ch. 4.10 - How do you simulate a coin toss with the...Ch. 4.10 - How do you simulate the picking of a random...Ch. 4.10 - Why does the loop body in Dice.java call...Ch. 4.10 - Prob. 49SCCh. 4.10 - Prob. 50SCCh. 4 - Given the variables String stars = ""; String...Ch. 4 - What do these loops print? a. int i = 0; int j =...Ch. 4 - What do these code snippets print? a. int result =...Ch. 4 - Write awhile loop that prints a. All squares less...Ch. 4 - Write a loop that computes a. The sum of all even...Ch. 4 - Provide trace tables for these loops. a. int i =...Ch. 4 - What do these loops print? a. for (int i = 1; i ...Ch. 4 - What is an infinite loop? On your computer, how...Ch. 4 - Write a program trace for the pseudocode in...Ch. 4 - What is an off-by-one error? Give an example from...Ch. 4 - What is a sentinel value? Give a simple rule when...Ch. 4 - Which loop statements does Java support? Give...Ch. 4 - How many iterations do the following loops carry...Ch. 4 - Write pseudocode for a program that prints a...Ch. 4 - Prob. 15RECh. 4 - Write pseudocode for a program that reads a...Ch. 4 - Write pseudocode for a program that reads a...Ch. 4 - Rewrite the following for loop into a while loop....Ch. 4 - Rewrite the following do loop into a while loop....Ch. 4 - Provide trace tables of the following loops. a....Ch. 4 - What do the following loops print? Work out the...Ch. 4 - What do the following program segments print? Find...Ch. 4 - Prob. 23RECh. 4 - Add a storyboard panel for the conversion program...Ch. 4 - In Section 4.6, we decided to show users a list of...Ch. 4 - Change the storyboards in Section 4.6 to support a...Ch. 4 - Draw a flowchart for a program that carries out...Ch. 4 - In Section 4.7.5, the code for finding the largest...Ch. 4 - What are nested loops? Give an example where a...Ch. 4 - The nested loops for (int 1 = 1; 1 = height; i++)...Ch. 4 - Suppose you design an educational game to teach...Ch. 4 - In a travel simulation, Harry will visit one of...Ch. 4 - Write programs with loops that compute a. The sum...Ch. 4 - Write programs that read a sequence of integer...Ch. 4 - Write programs that read a line of input as a...Ch. 4 - Complete the program in How To 4.1 on page 171....Ch. 4 - Write a program that reads a set of floating-point...Ch. 4 - Translate the following pseudocode for finding the...Ch. 4 - Translate the following pseudocode for randomly...Ch. 4 - Write a program that reads a word and prints each...Ch. 4 - Write a program that reads a word and prints the...Ch. 4 - Write a program that reads a word and prints the...Ch. 4 - Write a program that reads a word and prints the...Ch. 4 - Write a program that reads a word and prints all...Ch. 4 - Write a program that reads a string and prints the...Ch. 4 - Write a program that reads a sequence of words and...Ch. 4 - Write a program that prints all powers of 2 from...Ch. 4 - Write a program that reads a number and prints all...Ch. 4 - Prob. 18PECh. 4 - Write a program that reads an integer and...Ch. 4 - Write a program that reads an integer and...Ch. 4 - Write a program to plot the following face.Ch. 4 - Write a graphical application that displays a...Ch. 4 - Enhance Worked Example 4.1 to check that the...Ch. 4 - Mean and standard deviation. Write a program that...Ch. 4 - The Fibonacci numbers are defined by the sequence...Ch. 4 - Factoring of integers. Write a program that asks...Ch. 4 - Prime numbers. Write a program that prompts the...Ch. 4 - The game of Nim. This is a well-known game with a...Ch. 4 - The Drunkards Walk. A drunkard in a grid of...Ch. 4 - The Monty Hall Paradox. Marilyn vos Savant...Ch. 4 - A simple random generator is obtained by the...Ch. 4 - The Buffon Needle Experiment. The following...Ch. 4 - In the 17th century, the discipline of probability...Ch. 4 - Write a program that reads an initial investment...Ch. 4 - Currency conversion. Write a program that first...Ch. 4 - Write a program that first asks the user to type...Ch. 4 - Your company has shares of stock it would like to...Ch. 4 - Write an application to pre-sell a limited number...Ch. 4 - You need to control the number of people who can...Ch. 4 - Credit Card Number Check. The last digit of a...Ch. 4 - In a predator-prey simulation, you compute the...Ch. 4 - Projectile flight. Suppose a cannonball is...Ch. 4 - Radioactive decay of radioactive materials can be...Ch. 4 - The photo at left shows an electric device called...Ch. 4 - Write a graphical application that draws a spiral,...Ch. 4 - Prob. 28PPCh. 4 - Draw a picture of the four-leaved rose whose...
Additional Engineering Textbook Solutions
Find more solutions based on key concepts
Assume a telephone signal travels through a cable at two-thirds the speed of light. How long does it take the s...
Electric Circuits. (11th Edition)
In Exercises 53 through 56, determine the output produced by the lines of code where Courier New is the font se...
Introduction To Programming Using Visual Basic (11th Edition)
How do you determine the number of bytes that a file contains?
Starting Out with C++ from Control Structures to Objects (9th Edition)
Consider the following skeletal C program: void fun1(void); / prototype / void fun2(void); / prototype / void f...
Concepts Of Programming Languages
Find the error in each of the following program segments. Explain how to correct the error. 1 void g() { 2 Syst...
Java How to Program, Early Objects (11th Edition) (Deitel: How to Program)
Determine the force in each member of the truss, and state if the members are in tension or compression Set = ...
INTERNATIONAL EDITION---Engineering Mechanics: Statics, 14th edition (SI unit)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Consider the set of process: Process ID Arrival Time Burst Time P1 0 5 P2 0 10 P3 + 15 P4 18 10 P5 22 20 a) Draw the GANTT chart for the Round Robin time quantum -5) scheduling algorithm. Use the same implementation you used for the programming assignmenti.e. the processes should always run in PID order. Assume there is no context-switch overhead. Show your work for partial credit. b) Write your answer to the following performance metrics given your above CANTT charts. Show your work for partial credit. Average Response time: Average Wating time: Average Turnaround time:arrow_forwardConsider a file currently consisting of 10 blocks. Assume that the file control block and the new block information to be added are already in memory. Calculate how many disk I/O operations are required for the linked allocation strategy, if, for one block, the following conditions hold: HINTS: 1) ignore disk I/O associated with the file control block. 2) each read and each write is an explicit disk I/O. 3) assume a pointer to the end of the list for linked allocation a. The block is added at the beginning. b. The block is added in the middle. c. The block is added at the end. d. The block is removed from the beginning. e. The block is removed from the middle. f. The block is removed from the end.arrow_forwardSegment Base (original) Length Base (after compaction) 0 100 300 1 1400 600 2 450 100 3 3200 80 4 2200 500 5 3300 33 1. Given the original base addresses, what are the physical addresses for the following logical addresses? If it's an invalid address, just write "invalid". Note that (X, Y) => segment X, offset Y a) (0,350) b) (1,599) c) (2,50) d) (3,81) e) (4,300) f) (5.0) g) (5,34)arrow_forward
- Process Allocation A Max BCDABC D A Available B C PO 3 0 2 1 4 2 4 2 1 0 0 P1 0 1 0 1 0 2 2 2 P2 1 2 0 0 3 2 1 0 P3 0 1 1 2 1 1 1 2 P4 0 0 1 1 1 - 0 2 1 a) What is the content of the matrix Need? Process PO P1 P2 P3 P4 A Need BC D D ° b) Is the system in a safe state? If yes, give a safe sequence of processes. If not, explain why the system is not in a safe state. c) If a request from process P4 arrives for (1,0,0,0), can the request be granted immediately? Please state the reason.arrow_forwardConsider N processes sharing the CPU in a round-robin fashion (N>=2). Assume that each context switch takes S ms and that each time quantum is Q ms. For simplicity, assume that processes never block on any event and simply switch between the CPU and the ready queue. Also, assume that a process is still in the ready queue while a context switch is happening. a) What happens if Q is much smaller than S? What happens when Q→→ ∞, i.e. is much larger than the maximum turnaround time of all the processes? Be brief (1-2 sentences max) in your answer. b) If you use RR for scheduling, which of the three performance metrics (waiting, response, turnaround time) is more likely to be improved? Why (1-2 sentences max)?arrow_forwardCompute the jackknife estimate of bias and standard error for the correlation statistics from the law82 data using r languagearrow_forward
- Question D.1: Effective Access Time A computer keeps its page tables in memory. Memory access time is 100 nanoseconds (ns). Answer the following questions about the performance of this setup. Show your work. a) What is the effective access time (i.e. reading a word in memory) with no caching and a two-level page table? b) Consider the above scenario but with a TLB having a cache hit rate of 98%. If the TLB takes 20 ns to access, what is the effective access time of this setup when considering this TLB?arrow_forwardThe data law82 in bootstrap library contains LSAT and GPA for 82 law schools. 1. Write you own R code to estimate the correlation between LSAT and GPA scores, and compute the bootstrap estimate of the standard error and bias of the sample correlation. 2. Use the boot function in boot library to compute the bootstrap estimate of the standard error and bias of the sample correlation. Compare your results in 1 with the function output. using r languagearrow_forwardi would like to get help to resolve the following casearrow_forward
- Challenge: Assume that the assigned network addresses are correct. Can you deduce (guess) what the network subnet masks are? Explain while providing subnet mask bits for each subnet mask. [Hint: Look at the addresses in binary and consider the host ids]arrow_forwardWhat is the main difference between Static routing and Dynamic routing (OSPF)? in terms of either wildcard mask or subnet mask, or especially for increasing the number of networks, explaining the reason while providing a specific example like what command they use in CLIarrow_forwardAdd a new class Checking Account that inherits from the BankAccount class, and has a double instance variable overdraftLimit in addition to the variables inherited from the superclass. Create a constructor for the Checking Account class that takes in the account number, account holder name, initial balance, account type and overdraft limit as input, and uses the super keyword to call the constructor of the superclass, passing in the account number, account holder name and initial balance, account type. Re-write the withdraw() method in the CheckingAccount class so that it first checks if the withdrawal amount is less than the current balance plus the overdraft limit. If it is, the withdrawal is allowed and the balance is updated. If not, the method should return an error message "Insufficient funds". Create a new method displayOverdraft Limit() that returns the overdraft limit of the Checking Account. In the BankAccountTest class, create a new object of type Checking Account with…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengageMicrosoft Visual C#Computer ScienceISBN:9781337102100Author:Joyce, Farrell.Publisher:Cengage Learning,
- Programming Logic & Design ComprehensiveComputer ScienceISBN:9781337669405Author:FARRELLPublisher:CengageEBK JAVA PROGRAMMINGComputer ScienceISBN:9781337671385Author:FARRELLPublisher:CENGAGE LEARNING - CONSIGNMENTC++ for Engineers and ScientistsComputer ScienceISBN:9781133187844Author:Bronson, Gary J.Publisher:Course Technology Ptr
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage

Microsoft Visual C#
Computer Science
ISBN:9781337102100
Author:Joyce, Farrell.
Publisher:Cengage Learning,
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage

EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT

C++ for Engineers and Scientists
Computer Science
ISBN:9781133187844
Author:Bronson, Gary J.
Publisher:Course Technology Ptr
Java Math Library; Author: Alex Lee;https://www.youtube.com/watch?v=ufegX5o8uc4;License: Standard YouTube License, CC-BY