The processor or cpu is the main component of the computer. Identify types of processors, and explain the factors that influence individual choices when selecting a processor.
Marks distinction
a. Introduction
b. Ability to identify types of processors and explanation
c. Ability to identify factors and explanation
c. Conclusion
is an electronic circuit having a combinational circuit with a memory
1. Pretend that you have been charged with the task of redesigning the interface for the ATM at any local bank of your choice. Develop two personas and two use scenarios for it. 2. Pretend that you have been charged with the task of redesigning the interface for the ATM for any local bank of your choice. Design an ISD that shows how a user would navigate among the screens.
You are working as project manager for a major software company. You have been asked to lead a team that is developing “next generation” word-processing software. What types of risk associated with this project? You are also required to do risk analysis (Probability and its effects) and risk planning for the risk identified for this project.
Case Study: for Question-4
Consider the following operation contract of a tour reservation system
Name: makeReservation (Date, Customer_Inf, Duration, Credit_card)
Responsibility: Record the payment, calculate balance and print receipt.
Type: System
Cross Reference: System Functions R2.1
Use cases: Process Reservation
Pre-conditions:
Post-conditions:
Reservation was created
Reservation was associated with Cashier
Date of Reservation was set
Customer_Inf of the Reservation was set
Payment was created
Payment was associated with Reservation
Payment was computed from Duration and Payment.amount of Payment was set
Payment mode of Payment was set to “Credit” and Credit_Card number of the Payment was is set.
Question 4: Scenario type
Create the class diagram from the communication diagram.
Consider the following classes: public abstract class Cat { private int age; private double weight; private double top_speed; public void run(double newSpeed) { ... } private void eat(double portionSize) { ... } // ... -> getXXX() and setXXX() methods here } } public class Cheetah extends Cat { private String type; public Cheetah(int age, double wt, double sp, String type) { this.type = type; setAge(age); setWeight(wt); setTopSpeed(sp); } private void run(double newSpeed) { ... } public void camouflage() { ... } // ... -> // getXXX() // and setXXX() methods here } } Which design principles are violated by these classes? Explain it and then correct it
1. In a common cathode 7 segment LED, what should be the BCD code to display the digit ‘5’?
2. Explain the advantages of using Twisted Nematic (TN) phase of Liquid Cristal for LCD Display.
3. Mention the steps of the data communication between to Data terminal Equipment using RS232 Standard.
. How has the “open source” software movement made an impact, personally, on you and your life?
1. Show the contents of the output frames for a synchronous TDM multiplexer that combines three sources sending the following characters. Note that the characters are sent in the same order that they are typed. Multiplexing unit is 2 characters.
a. Source 1 message:MUHAMMAD
b. Source 2 message: DHAKA
c. Source 3 message:NABINAGAR
2. Assume the message to be sent comprises 120 octets. Each packet contains 4 octets of control information. These packets are first transmitted from X to a then to b then to c and to Y. Ignoring switching time, calculate the total transmission time for 6-packet message and 10-packet message. Which of the case will be better for this transmission.
3. Five equal-size datagrams belonging to the same message leave for the destination one after another. However, they travel through different paths as shown in following table:
Datagram Visited Switches
1 1,3,5
2 1,2,5
3 1,2,3,5
4 1,4,5
5 1,4,3,5
Draw the whole transmission scenario of this switching network.
1. Consider a swapping system in which memory consists of the following hole sizes in memory order: 10 MB, 4 MB, 20 MB, 18 MB, 7 MB, 9 MB, 12 MB, and 15 MB.
Which hole is taken for successive segment requests of (a) 12 MB (b) 10 MB (c) 9 MB for first fit? Now repeat the question for best fit, worst fit, and next fit.
2. A system has two processes and three identical resources. Each process needs a maximum of two resources. Is deadlock possible? Explain your answer.