Recent questions tagged tanenbaum

203
views
0 answers
0 votes
The family-of-computers idea was introduced in the $1960s$ with the IBM System$/360$ mainframes. Is this idea now dead as a doornail or does it live on?
211
views
0 answers
0 votes
Instructions related to accessing I/O devices are typically privileged instructions, that is, they can be executed in kernel mode but not in user mode. Give a reason why these instructions are privileged.
2.0k
views
2 answers
1 votes
On early computers, every byte of data read or written was handled by the CPU (i.e., there was no DMA). What implications does this have for multiprogramming?
1.1k
views
2 answers
0 votes
To use cache memory, main memory is divided into cache lines, typically $32$ or $64$ bytes long. An entire cache line is cached at once. What is the advantage of caching an entire line instead of a single byte or word at a time?
217
views
1 answers
0 votes
What is the difference between timesharing and multiprogramming systems?
1.1k
views
1 answers
0 votes
In Section $1.4$, nine different types of operating systems are described. Give a list of applications for each of these systems (one per operating systems type).
439
views
1 answers
0 votes
What are the two main functions of an operating system$?$
784
views
1 answers
0 votes
A math class has 25 students. Assuming that all of the students were born in the firsthalf of the year-between January 1st and June 30th- what is the ... ? Assume that nobody was born on leap day,so there are 181 possible birthdays.
507
views
0 answers
0 votes
33. Two users can establish a shared secret key using the Diffie-Hellman algorithm, evenif they have never met, share no secrets, and have no certificates(a) ... middle attack.(b) How would this susceptibility change if n or g were secret?
1.8k
views
1 answers
0 votes
The Diffie-Hellman key exchange is being used to establish a secret key betweenAlice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice'ssecret ... 's secret number, y, is 3. Show how Alice and Bobcompute the secret key.
489
views
0 answers
0 votes
Alice wants to communicate with Bob, using public-key cryptography. She establishesa connection to someone she hopes is Bob. She asks him for his public key andhe sends it ... who he is talking to(e.g., Bob is some kind of public service).
1.2k
views
1 answers
0 votes
Alice and Bob use RSA public key encryption in order to communicate between them.Trudy finds out that Alice and Bob shared one of the primes used to determine thenumber ... pb q. How can Trudy use this information to break Alice's code?
2.5k
views
2 answers
1 votes
Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26.(a) If p = 5 and q = 13, list five legal values for d.(b) If p = 5, q = 31, and d = 37, find e.(c) Using p = 3, q = 11, and d = 9, find e and encrypt ‘‘hello’’.
219
views
0 answers
0 votes
Write a program in JavaScript that accepts an integer greater than 2 and tells whetherit is a prime number. Note that JavaScript has if and while statements with the samesyntax ... is %. If you need the square root of x, useMath.sqrt (x).
219
views
0 answers
0 votes
Some cybersquatters have registered domain names that are misspellings of commoncorporate sites, for example, www.microsfot.com. Make a list of at least five such domains.
349
views
0 answers
0 votes
Numerous people have registered DNS names that consist of www.word.com, whereword is a common word. For each of the following categories, list five such Web ... parts. For the last category, please stick to body parts above the waist.
219
views
0 answers
0 votes
Rewrite the server of Fig. 6-6 as a true Web server using the GET command for HTTP1.1. It should also accept the Host message. The server ... cache offiles recently fetched from the disk and serve requests from the cache when possible.
426
views
0 answers
0 votes
Imagine that someone in the math department at Stanford has just written a new documentincluding a proof that he wants to distribute by FTP for his colleagues to ... /pub/forReview/newProof.pdf. What isthe URL for this program likely to be?
446
views
0 answers
0 votes
Although it was not mentioned in the text, an alternative form for a URL is to use theIP address instead of its DNS name. Use this information to explain why a DNS namecannot end with a digit.
990
views
1 answers
0 votes
Does Webmail use POP3, IMAP, or neither? If one of these, why was that one chosen?If neither, which one is it closer to in spirit?
384
views
0 answers
1 votes
In any standard, such as RFC 5322, a precise grammar of what is allowed is needed sothat different implementations can interwork. Even simple ... between the tokens. Give two plausiblealternative definitions of white space between tokens.
259
views
0 answers
0 votes
Suppose that John just set up an auto-forwarding mechanism on his work email address,which receives all of his business-related emails, to forward them to his ... machine. What happens whenan email is received at John's work email address?
789
views
1 answers
0 votes
A large law firm, which has many employees, provides a single email address for eachemployee. Each employee's email address is <login>@lawfirm.com. However, ... all its employees. How can this be donewithout rocking the boat too much?
425
views
0 answers
0 votes
Electronic mail systems need directories so people's email addresses can be lookedup. To build such directories, names should be broken up into standard ... some problems thatmust be solved for a worldwide standard to be acceptable.
468
views
0 answers
0 votes
Some email systems support a Content Return: header field. It specifies whether thebody of a message is to be returned in the event of nondelivery. Does this field belongto the envelope or to the header?
380
views
0 answers
0 votes
The number of companies with a Web site has grown explosively in recent years. Asa result, thousands of companies are registered in the com domain, causing ... ). It is permitted that your solution requires changes to the client code.
351
views
0 answers
1 votes
The number of companies with a Web site has grown explosively in recent years. Asa result, thousands of companies are registered in the com domain, causing ... ). It is permitted that your solution requires changes to the client code.
622
views
1 answers
0 votes
Can a machine with a single DNS name have multiple IP addresses? How could thisoccur?
418
views
0 answers
0 votes
John wants to have an original domain name and uses a randomized program to generatea secondary domain name for him. He wants to register this domain name ... characters long.Will the com registrar allow this domain name to be registered?
2.2k
views
1 answers
0 votes
DNS uses UDP instead of TCP. If a DNS packet is lost, there is no automatic recovery.Does this cause a problem, and if so, how is it solved?