Short Answer 1 (10) a. Circle any of the following which offer persistent byte storage: CPU, Flash Memory, Hard Drive, Random Access Memory (RAM), Ethernet b. How many distinct patterns can be stored with 3 bits? c. Note that Firefox is written in C++. What is the predominant type of instruction stored in the Firefox.exe file? d. Alice has 1000 images, each 400 KB in size. About how much space do they take up overall? e. Suppose we have a video camera that records at a rate of 2 GB per hour. Recording for 15 minutes creates about how much data, expressed in MB? Short Answer 2 (15) a. Suppose computers A, B, C, and D are connected to an ethernet cable, similar to the setup shown in lecture. Computer A begins transmitting a packet on the cable, but it collides with another transmission, so A stops transmitting. What does computer A do next? b. Suppose we are using the following checksum scheme: add up all the bytes, and take just the last two digits of the sum. What is the checksum of the following bytes: 101, 202, 103, 100, 210, 120 c. What problem is addressed by checksums? (one sentence answer) d. A computer connected to the internet is identified by what kind of address (the specific name, not just “internet address”): e. Circle any of the addresses below which are not valid internet addresses: 1.2.3.4,   11.250.3.4,   45.67.212.100,   42.257.99.11,   171.64.64.171 f. True or false. Routing on the internet from Nick’s office to the east bay is about 15 hops, and to Poland is about 1000 hops. g. The following is the output of a famous networking utility. 1 yoza-vlan70 (171.64.70.2) 2.039 ms
2 bbra-rtr-a (171.64.255.129) 0.932 ms
3 boundarya-rtr (172.20.4.2) 3.174 ms
4 dca-rtr (68.65.168.51) 27.085 ms
5 dc-svl-agg1–stanford-10ge.cenic.net (137.164.50.157) 2.485 ms
6 dc-oak-core1–svl-agg1-10ge.cenic.net (137.164.47.123) 3.262 ms
7 dc-paix-px1–oak-core1-ge.cenic.net (137.164.47.174) 4.046 ms
8 hurricane–paix-px1-ge.cenic.net (198.32.251.70) 14.252 ms
9 10gigabitethernet1-2.core1.fmt1.he.net (184.105.213.65) 9.117 ms
10 linode-llc.10gigabitethernet2-3.core1.fmt1.he.net (64.62.250.6) 4.975 ms
11 li229-70.members.linode.com (173.255.219.70) 4.761 ms What does this output show? (one sentence) h. You open your laptop and type “http://www.blah.com/news/today.html” into your browser and hit return. Three questions, 1-3 word answers: What computer does your laptop contact to request this web page? What is the content of the request? What is the content of the response? Short Answer 3 (15) a. What does the above sound like? b. Why is a digital signal more resistant to noise? c. Suppose we have these 6 samples: 1000, 1001, 1010, 1005, 1006, 1002. Consider the compression scheme from lecture, recording the first sample followed by the local delta for each sample. Write out the encoding of the 6 samples using this scheme: d. Is the above compression scheme lossy or lossless? e. Suppose we have two versions of the same image, differing only in their JPEG compression level. Image A is compressed at q1 and is 100 KB. Image B is compressed at q5 and is 400 KB. Which of these two images is more likely to exhibit JPEG compression artifacts? f. Circle any of the following which are video encoding formats: HTTP, PNG, H.264, JPEG, OGG VORBIS g. “Network effect” means that users select among competing products based on what feature of each product? h. Suppose Stanford is using the open source software YoYoMatic widely and is dependent on it. Describe an example scenario where Stanford would gain significant benefit from having access to the YoYoMatic source code. i. Suppose there is a website foo.com and you have a password to log in to it. What are three different, non-physical techniques a bad guy might use to obtain your password (non-physical meaning other than breaking in to your house and making you tell them): j. Consider the brake pedal in a car — what is the abstraction the brake pedal presents…

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay