Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged tanenbaum
0
votes
0
answers
301
Andrew S. Tanenbaum (OS) Edition 4 Exercise 1 Question 7 (Page No. 81)
The family-of-computers idea was introduced in the $1960s$ with the IBM System$/360$ mainframes. Is this idea now dead as a doornail or does it live on?
The family-of-computers idea was introduced in the $1960s$ with the IBM System$/360$ mainframes. Is this idea now dead as a doornail or does it live on?
admin
190
views
admin
asked
Oct 23, 2019
Operating System
tanenbaum
operating-system
descriptive
+
–
0
votes
0
answers
302
Andrew S. Tanenbaum (OS) Edition 4 Exercise 1 Question 6 (Page No. 81)
Instructions related to accessing I/O devices are typically privileged instructions, that is, they can be executed in kernel mode but not in user mode. Give a reason why these instructions are privileged.
Instructions related to accessing I/O devices are typically privileged instructions, that is, they can be executed in kernel mode but not in user mode. Give a reason why ...
admin
202
views
admin
asked
Oct 23, 2019
Operating System
tanenbaum
operating-system
instruction-format
descriptive
+
–
1
votes
2
answers
303
Andrew S. Tanenbaum (OS) Edition 4 Exercise 1 Question 5 (Page No. 81)
On early computers, every byte of data read or written was handled by the CPU (i.e., there was no DMA). What implications does this have for multiprogramming?
On early computers, every byte of data read or written was handled by the CPU (i.e., there was no DMA). What implications does this have for multiprogramming?
admin
1.9k
views
admin
asked
Oct 20, 2019
Operating System
tanenbaum
operating-system
multi-programming
dma
descriptive
+
–
0
votes
2
answers
304
Andrew S. Tanenbaum (OS) Edition 4 Exercise 1 Question 4 (Page No. 81)
To use cache memory, main memory is divided into cache lines, typically $32$ or $64$ bytes long. An entire cache line is cached at once. What is the advantage of caching an entire line instead of a single byte or word at a time?
To use cache memory, main memory is divided into cache lines, typically $32$ or $64$ bytes long. An entire cache line is cached at once. What is the advantage of caching ...
admin
1.0k
views
admin
asked
Oct 20, 2019
Operating System
tanenbaum
operating-system
cache-memory
descriptive
+
–
0
votes
1
answer
305
Andrew S. Tanenbaum (OS) Edition 4 Exercise 1 Question 3 (Page No. 81)
What is the difference between timesharing and multiprogramming systems?
What is the difference between timesharing and multiprogramming systems?
admin
196
views
admin
asked
Oct 20, 2019
Operating System
tanenbaum
operating-system
descriptive
+
–
0
votes
1
answer
306
Andrew S. Tanenbaum (OS) Edition 4 Exercise 1 Question 2 (Page No. 81)
In Section $1.4$, nine different types of operating systems are described. Give a list of applications for each of these systems (one per operating systems type).
In Section $1.4$, nine different types of operating systems are described. Give a list of applications for each of these systems (one per operating systems type).
admin
1.0k
views
admin
asked
Oct 20, 2019
Operating System
tanenbaum
operating-system
descriptive
+
–
0
votes
1
answer
307
Andrew S. Tanenbaum (OS) Edition 4 Exercise 1 Question 1 (Page No. 81)
What are the two main functions of an operating system$?$
What are the two main functions of an operating system$?$
admin
417
views
admin
asked
Apr 15, 2019
Operating System
tanenbaum
operating-system
descriptive
+
–
0
votes
1
answer
308
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 22 (Page No. 873)
A math class has 25 students. Assuming that all of the students were born in the first half of the year—between January 1st and June 30th— what is the probability that at least two students have the same birthday? Assume that nobody was born on leap day, so there are 181 possible birthdays.
A math class has 25 students. Assuming that all of the students were born in the firsthalf of the year—between January 1st and June 30th— what is the probability that...
ajaysoni1924
710
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
network-security
cryptography
+
–
0
votes
0
answers
309
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 33 (Page No. 874)
33. Two users can establish a shared secret key using the Diffie-Hellman algorithm, even if they have never met, share no secrets, and have no certificates (a) Explain how this algorithm is susceptible to a man-in-the-middle attack. (b) How would this susceptibility change if n or g were secret?
33. Two users can establish a shared secret key using the Diffie-Hellman algorithm, evenif they have never met, share no secrets, and have no certificates(a) Explain how ...
ajaysoni1924
491
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
network-security
cryptography
descriptive
+
–
0
votes
1
answer
310
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 32 (Page No. 874)
The Diffie-Hellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’s secret number, x, is 12, and Bob’s secret number, y, is 3. Show how Alice and Bob compute the secret key.
The Diffie-Hellman key exchange is being used to establish a secret key betweenAlice and Bob. Alice sends Bob (227, 5, 82). Bob responds with (125). Alice’ssecret numbe...
ajaysoni1924
1.7k
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
network-security
cryptography
+
–
0
votes
0
answers
311
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 25 (Page No. 873)
Alice wants to communicate with Bob, using public-key cryptography. She establishes a connection to someone she hopes is Bob. She asks him for his public key and he sends it to her in plaintext along with an X.509 certificate signed ... that Bob does not care who he is talking to (e.g., Bob is some kind of public service).
Alice wants to communicate with Bob, using public-key cryptography. She establishesa connection to someone she hopes is Bob. She asks him for his public key andhe sends i...
ajaysoni1924
477
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
network-security
tanenbaum
cryptography
+
–
0
votes
1
answer
312
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 18 (Page No. 873)
Alice and Bob use RSA public key encryption in order to communicate between them. Trudy finds out that Alice and Bob shared one of the primes used to determine the number n of their public key pairs. In other words, Trudy found out that na = pa × q and nb = pb × q. How can Trudy use this information to break Alice’s code?
Alice and Bob use RSA public key encryption in order to communicate between them.Trudy finds out that Alice and Bob shared one of the primes used to determine thenumber n...
ajaysoni1924
1.1k
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
network-security
rsa-security-networks
tanenbaum
+
–
1
votes
2
answers
313
Andrew S. Tanenbaum Edition 5th Exercise 8 Question 17 (Page No. 873)
Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26. (a) If p = 5 and q = 13, list five legal values for d. (b) If p = 5, q = 31, and d = 37, find e. (c) Using p = 3, q = 11, and d = 9, find e and encrypt ‘‘hello’’.
Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26.(a) If p = 5 and q = 13, list five legal values for d.(b) If p = 5, q = 31, and d = 37, find...
ajaysoni1924
2.3k
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
network-security
rsa-security-networks
+
–
0
votes
0
answers
314
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 32 (Page No. 761)
Write a program in JavaScript that accepts an integer greater than 2 and tells whether it is a prime number. Note that JavaScript has if and while statements with the same syntax as C and Java. The modulo operator is %. If you need the square root of x, use Math.sqrt (x).
Write a program in JavaScript that accepts an integer greater than 2 and tells whetherit is a prime number. Note that JavaScript has if and while statements with the same...
ajaysoni1924
200
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
0
answers
315
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 46 (Page No. 762)
Some cybersquatters have registered domain names that are misspellings of common corporate sites, for example, www.microsfot.com. Make a list of at least five such domains.
Some cybersquatters have registered domain names that are misspellings of commoncorporate sites, for example, www.microsfot.com. Make a list of at least five such domains...
ajaysoni1924
208
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
0
answers
316
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 47 (Page No. 762)
Numerous people have registered DNS names that consist of www.word.com, where word is a common word. For each of the following categories, list five such Web sites and briefly summarize what it is (e.g., www.stomach. ... , foods, household objects, and body parts. For the last category, please stick to body parts above the waist.
Numerous people have registered DNS names that consist of www.word.com, whereword is a common word. For each of the following categories, list five such Web sitesand brie...
ajaysoni1924
321
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
0
answers
317
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 48 (Page No. 762)
Rewrite the server of Fig. 6-6 as a true Web server using the GET command for HTTP 1.1. It should also accept the Host message. The server should maintain a cache of files recently fetched from the disk and serve requests from the cache when possible.
Rewrite the server of Fig. 6-6 as a true Web server using the GET command for HTTP1.1. It should also accept the Host message. The server should maintain a cache offiles ...
ajaysoni1924
181
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
http
program
+
–
0
votes
0
answers
318
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 23 (Page No. 759)
Imagine that someone in the math department at Stanford has just written a new document including a proof that he wants to distribute by FTP for his colleagues to review. He puts the program in the FTP directory ftp/pub/forReview/newProof.pdf. What is the URL for this program likely to be?
Imagine that someone in the math department at Stanford has just written a new documentincluding a proof that he wants to distribute by FTP for his colleagues to review.H...
ajaysoni1924
395
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
descriptive
tanenbaum
application-layer-protocols
+
–
0
votes
0
answers
319
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 23 (Page No. 759)
Although it was not mentioned in the text, an alternative form for a URL is to use the IP address instead of its DNS name. Use this information to explain why a DNS name cannot end with a digit.
Although it was not mentioned in the text, an alternative form for a URL is to use theIP address instead of its DNS name. Use this information to explain why a DNS nameca...
ajaysoni1924
417
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
descriptive
application-layer-protocols
+
–
0
votes
1
answer
320
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 20 (Page No. 759)
Does Webmail use POP3, IMAP, or neither? If one of these, why was that one chosen? If neither, which one is it closer to in spirit?
Does Webmail use POP3, IMAP, or neither? If one of these, why was that one chosen?If neither, which one is it closer to in spirit?
ajaysoni1924
965
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
application-layer-protocols
descriptive
tanenbaum
+
–
1
votes
0
answers
321
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 15 (Page No. 759)
In any standard, such as RFC 5322, a precise grammar of what is allowed is needed so that different implementations can interwork. Even simple items have to be defined carefully. The SMTP headers allow white space between the tokens. Give two plausible alternative definitions of white space between tokens.
In any standard, such as RFC 5322, a precise grammar of what is allowed is needed sothat different implementations can interwork. Even simple items have to be definedcare...
ajaysoni1924
356
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
descriptive
application-layer-protocols
+
–
0
votes
0
answers
322
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 14 (Page No. 759)
Suppose that John just set up an auto-forwarding mechanism on his work email address, which receives all of his business-related emails, to forward them to his personal email address, which he shares with his wife. John' ... vacation daemon on his work machine. What happens when an email is received at John's work email address?
Suppose that John just set up an auto-forwarding mechanism on his work email address,which receives all of his business-related emails, to forward them to his personalema...
ajaysoni1924
248
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
1
answer
323
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 10 (Page No. 759)
A large law firm, which has many employees, provides a single email address for each employee. Each employee's email address is <login>@lawfirm.com. However, the firm did not explicitly define the format of the login. ... for the email addresses of all its employees. How can this be done without rocking the boat too much?
A large law firm, which has many employees, provides a single email address for eachemployee. Each employee’s email address is <login>@lawfirm.com. However, thefirm did...
ajaysoni1924
740
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
0
answers
324
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 9 (Page No. 759)
Electronic mail systems need directories so people’s email addresses can be looked up. To build such directories, names should be broken up into standard components (e.g., first name, last name) to make searching possible. Discuss some problems that must be solved for a worldwide standard to be acceptable.
Electronic mail systems need directories so people’s email addresses can be lookedup. To build such directories, names should be broken up into standard components(e.g....
ajaysoni1924
401
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
application-layer-protocols
descriptive
tanenbaum
+
–
0
votes
0
answers
325
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 8 (Page No. 759)
Some email systems support a Content Return: header field. It specifies whether the body of a message is to be returned in the event of nondelivery. Does this field belong to the envelope or to the header?
Some email systems support a Content Return: header field. It specifies whether thebody of a message is to be returned in the event of nondelivery. Does this field belong...
ajaysoni1924
436
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
descriptive
application-layer-protocols
+
–
0
votes
0
answers
326
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 7 (Page No. 759)
The number of companies with a Web site has grown explosively in recent years. As a result, thousands of companies are registered in the com domain, causing a heavy load on the top-level server for this domain. ... introducing new top-level domain names). It is permitted that your solution requires changes to the client code.
The number of companies with a Web site has grown explosively in recent years. Asa result, thousands of companies are registered in the com domain, causing a heavyload on...
ajaysoni1924
337
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
1
votes
0
answers
327
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 3 (Page No. 759)
The number of companies with a Web site has grown explosively in recent years. As a result, thousands of companies are registered in the com domain, causing a heavy load on the top-level server for this domain. ... introducing new top-level domain names). It is permitted that your solution requires changes to the client code.
The number of companies with a Web site has grown explosively in recent years. Asa result, thousands of companies are registered in the com domain, causing a heavyload on...
ajaysoni1924
321
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
1
answer
328
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 6 (Page No. 759)
Can a machine with a single DNS name have multiple IP addresses? How could this occur?
Can a machine with a single DNS name have multiple IP addresses? How could thisoccur?
ajaysoni1924
564
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
0
answers
329
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 4 (Page No. 759)
John wants to have an original domain name and uses a randomized program to generate a secondary domain name for him. He wants to register this domain name in the com generic domain. The domain name that was generated is 253 characters long. Will the com registrar allow this domain name to be registered?
John wants to have an original domain name and uses a randomized program to generatea secondary domain name for him. He wants to register this domain name in thecom gener...
ajaysoni1924
401
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
0
votes
1
answer
330
Andrew S. Tanenbaum Edition 5th Exercise 7 Question 4 (Page No. 759)
DNS uses UDP instead of TCP. If a DNS packet is lost, there is no automatic recovery. Does this cause a problem, and if so, how is it solved?
DNS uses UDP instead of TCP. If a DNS packet is lost, there is no automatic recovery.Does this cause a problem, and if so, how is it solved?
ajaysoni1924
2.1k
views
ajaysoni1924
asked
Mar 19, 2019
Computer Networks
computer-networks
tanenbaum
application-layer-protocols
descriptive
+
–
Page:
« prev
1
...
6
7
8
9
10
11
12
13
14
15
16
next »
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register