Computer Science

What is the output produced by the following code? int *p1, *p2; p1 new int; p2 new int p1 10

Question: Answer: int *p1, *p2; //declare 2 integer pointer p1 = new int; //allocating a storage for an integer and assigning address of that storage to p1 p2 = new int; //allocating a storage for an integer and assigning address of that storage to p2 *p1 = 10; //storing 10 to the address p1 *p2 …

What is the output produced by the following code? int *p1, *p2; p1 new int; p2 new int p1 10 Read More »

The DBA denormalized some of the data in the TAL Distributors database to improve performance, and one of the resulting tables is the following:

Question: The DBA denormalized some of the data in the TAL Distributors database to improve performance, and one of the resulting tables is the following: Customer (CustomerNum, CustomerName, Street, City, State, PostalCode, Balance, CreditLimit, RepNum, RepName) Which field or fields cause the table to no longer be in third normal form? In which normal form …

The DBA denormalized some of the data in the TAL Distributors database to improve performance, and one of the resulting tables is the following: Read More »

Consider an affine cipher whose key parameters are defined as follows

Question: Consider an affine cipher whose key parameters are defined as follows: a = 7 and b = 22. Decrypt the following text: falszztysyjzyjkywjrztyjztyynaryjkyswarztyegyyj Who wrote the line? Answer: We first need identify these letters with integer values .a=0, b=1…z=25These values are then used as inputs to a function of the following form .f(x)=ax+b mod(26)where …

Consider an affine cipher whose key parameters are defined as follows Read More »