Urgent help in information systems

Please help me.  It’s 10 questions, I have done some but need help/answers on others.

3. (10 pt) ASCII, Unicode, and EBCDIC are, of course, not the only numeric / character codes. The Sophomites from the planet Collegium use the rather strange code shown in the Figure below. There are only thirteen characters in the Sophomite alphabet, and each character uses a 5-bit code. In addition, there are four numeric digits, since the Sophomites use base 4 for their arithmetic. Given the following Sophomite sequence, what is the corresponding binary message being sent by the Sophomites?

(HINT: Decode the sequence reading from left to right then write the corresponding binary sequence, leaving a space between each binary sequence.)

Character 

Codes Numeric Codes

00001 

10000  11111000

00010  10011  11111011

00100  10101  11111101

+ 01000

 10110  11111110

 01011

 11001


* 11010

 01110

        +

Input / Output

5. Answer the follow questions about interrupts.

a. (5 pt) Describe in detail the steps that occur when a system receives an interrupt.

b. (5 pt) Describe how these steps differ in the case when a system receives multiple interrupts

Computer Systems

6. Answer the following questions about clusters.

a. (5 pt) Describe how you might use a cluster to provide fault-tolerant computing

b. (5 pt) Describe how you might use a cluster architecture to provide rapid scalability for a Web-based company experiencing rapid growth.


7. Answer the following questions about communication protocols.

a. (5 pt) Using the operations of UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) as a basis, carefully explain the difference between connectionless and connection-oriented communication.

b. (5 pt) If you were ordering a number of items from an online seller, such as amazon.com, which Protocol (TCP or UDP) would you recommend and explain why.

8. In the context of network security,

a. (3 pt) explain the purpose of non-repudiation.

b. (3 pt) How does non-repudiation differ from authentication?

c. (4 pt) Create a business scenario that illustrates the importance of each.

Data Communications

9. (2 pt each) Circle or highlight the correct answer to the following questions / statements about data communications:

(a) What characteristic of an analog signal is measured in Hertz, or cycles per second?



(b) What measurement unit describes the speed and capacity of a communication channel?

Response Time

Access Time
Data Transfer Rate

(c) ____ can be produced by a variety of sources, including electric motors, radio equipment, and nearby power transmission or communication lines.


Signal/noise (S/N) ratio

(d) A(n) ____ can extend the range of an electrical signal by boosting signal power to overcome attenuation.


return wire
signal wire

(e) Which of the following does not allow multiple messages to be carried on a single channel?

time division multiplexing
packet switching

frequency division multiplexing

Operating Systems

10. Answer the following questions about user interfaces:

(a) (5 pt) List and explain at least two of the definite advantages to the use of a command line interface (CLI) over other types of interfaces.

(b) (5 pt) There are some capabilities that are easy to achieve with a GUI (graphical user interface), but much more difficult with a CLI. Describe at least two of these capabilities.

File Management

11. Answer the following:

a. (5 pt) Use the following four processes that have arrived in the ready queue in the sequence shown below and answer the following about process scheduling:

· Process 1 has a total run time of 25 seconds and a priority of 2, but it will require 15 seconds of I/O after 10 seconds of execution

· Process 2 has a total run time of 30 seconds, a priority of 1, but it will require 10 seconds of I/O after 20 seconds of execution

· Process 3 has a total run time of 15 seconds and a priority of 3

· Process 4 has a total run time of 20 seconds, a priority of 2, but it will require 15 seconds of I/O after 5 seconds of execution

(i) Both shortest job first and non-preemptive priority queue scheduling algorithms will complete all four processes at the same time, but not in the same order. In which algorithm will Process 1 finish first? Provide the time Process 1 finishes and explain your answer.

(ii) If the round robin scheduling algorithm is used, which process will finish first? At what time will it complete?

b. (5 pt) Using a variable-partitioned multiprogramming memory, which of the four holes shown below will be used to satisfy a 40 KB program requirement under the conditions of:





0-15 KB

15-40 KB

40-125 KB

125-155 KB

155-275 KB

275-330 KB

330-420 KB

420-470 KB

470-505 KB


Hole A

Hole B

Hole C

Hole D

___ Best-fit

___ Worst-fit


12. (10 pt) Show the bit pattern in an asynchronous transmission with even parity if the data to be sent is the character string “EXAMS“. Use 7-bit ASCII code table found in Englander’s Figure 4.3 (page 102) and be sure to include start and stop bits.

Still stressed with your coursework?
Get quality coursework help from an expert!