SOLUTION: CSE 278 Miami University Computer Science and Software Engineering Question

CSE278 Final Exam Study Guide and Sample Questions
Spring 2020

All Linux/UNIX commands from Lab0.., Lab5, Lab6, Lab7, Lab8, Lab9

All C++ coding from Lab0.., Lab5, Lab6, Lab7, Lab8, Lab9

All C++ coding from Homework0.., HW5, HW6, HW7, HW8, HW9

All Questions from Lab0.., Lab5, Lab6, Lab7, Lab8, Lab9

All Questions from Homework0.., HW5, HW6, HW7, HW8, HW9

Questions types similar to Mid Term Exam

C++ Lecture Slideds: Part1..Part4

Lecture Slides: Database (Part1, Part2 and System Integration)

Lecture Slides: ComputerArchitecture

Lecture Slides: Computer Security

Lecture Slides: NumberSystems

ClassNotes txt

C++ MySQL Connectivity

Understanding DBMS, DDL, DML
Text Coverage:
• “C++ How to Program” by Paul Deitel and Harvey Deitel. Prentice Hall. See Canvas
• Chapter 1 (Introduction)
• Chapter 2 (Expressions & I/O)
• Chapter 3.1, 3.2 (String & methods)
• Chapter 4 (if-statements)
• Chapter 5.1 – 5.10 (loops & switch)
• Chapter 6 (functions/methods)
• Chapter 7.10 (std::vector)
• Chapter 8 (Pointers)
• Chapter 9 (Classes)

Chapter 10 (Operator overloading)
• Chapter 14.1 – 14.6 (File I/O)

Chapter 15.6.4: Associative Containers (std::unordered_map)
• Appendix D: Number conversions
Short Questions
1. The list of all passwords is kept within the operating system. Thus, if a user manages to read
this list, password protection is no longer provided. Suggest a scheme that will avoid this
problem. (Hint: Use different internal and external representations.)
2. Discuss how the asymmetric encryption algorithm can be used to achieve the following goals:
b. Authentication: the receiver knows that only the sender could have generated the
c. Secrecy: only the receiver can decrypt the message
d. Authentication and Secrecy: only the receiver can decrypt the message, and the
receiver knows that only the sender could have generated the message.
3. What is the difference between a packet filtering firewall and a stateful inspection
4. What is the difference between passive and active security threats?
5. List and briefly define categories of security mechanisms.
6. What is the benefit of the TCP three-way handshake mechanism?
7. In OS terminology, what is a pipe and how does the OS manage it?
8. Pointers
o Concept of memory and address
o Basics of pointers to hold addresses
o Basic pointer operators
o Address of operator (&)
o Indirections/dereferencing a pointer (*)
o Using object dereference operator (->)
o Pointer arithmetic
o Pointers « array operation similarities and code conversion
o Understanding command-line arguments
o Array of pointers.
13. Other exercises
i. Converting English statements to corresponding C++ statements
ii. Describing C++ statements in English
iii. Code walkthroughs to determine operation and output from a C++ program
iv. Developing a C++ program given a functional description
v. Identifying performance or memory issues in C++ programs
vi. Rewriting C++ program to address memory or performance issue
14. Computer architecture concepts
a. Terms and acronyms for key subsystems/components of a computer system: CPU, ALU,
Registers, Memory, BIOS
b. Units for: Time, Frequency, Memory
c. Endianness of CPU
d. Symbol table, symbols, and memory addresses
e. Relationship between memory addressing modes and C++ operations
f. Von Neumann architecture
g. Mnemonics and assembly language programming
h. Relationship between assembly and machine language
i. The hardware-software interface
j. What do you understand by Little Endian and Big Endian System?
k. What is pipelining? What are the 4 common stages in a CPU pipeline and what does each
stage do?
15. Number System
a. Convert the following Decimal number 30303 into an equivalent Hexadecimal
number. Show all of your mathematical works.
Convert the following numbers from one base to another: (Show all of your
mathematical works/steps)
b. From 252 Decimal to Hexadecimal
c. From F8C Hexadecimal to Decimal
From 88 Decimal to Binary
16. DBMS
What is the difference between procedural and nonprocedural DMLs?
b. What is the difference between normalized and denormalized databases?
Define the two principle integrity rules for the relational model. Discuss why
it is desirable to enforce these rules.
d. Write SQL statements to do the following on the database schema
e. The following tables form part of a database held in a relational DBMS:
Hotel (hotelNo, hotelName, city)
Room (roomNo, hotelNo, type, price)
Booking (hotelNo, guestNo, dateFrom, dateTo, roomNo)
Guest (guestNo, guestName, guestAddress)
Where Hotel contains hotel details and hotelNo is the primary key;
Room contains room details for each hotel and (roomNo, hotelNo) forms the
primary key;
Booking contains details of bookings and (hotelNo, guestNo, dateFrom)
forms the primary key;
Guest contains guest details and guestNo is the primary key.
Identify the foreign keys in this schema. Explain how the entity and referential
integrity rules apply to these relations.
Given the following 2 related tables, write the SQL SELECT statement to solve the
following queries about developers (Dev) and programs (Prog). The id column in Dev
and Prog is the relation between the two tables.
Dev(id, name, dept, salary)
Prog(id, title, language, lines, size);
a. List at least 3 advantages (max 2 sentences each) of separating interface from
implementation of a class? How is it accomplished in C++?
b. Why are some methods declared as friends in C++?
What is the difference between unordered_map and vector?
d. C++ class development (Example PhoneNumber.cpp)
e. Test for overloaded operator (Example from PhoneNumber.h)
C++ function prototype: return type void vs bool
Preparation Suggestions:
1. As a general note you should expect to repeat questions from lab exercises and
2. You should know all the material in lecture slides.
3. Do read the E-book materials used in homework while paying attention to
implementation/application details.
4. Redo lab exercises. Develop short programs to test/verify your understanding of
concepts. Review developing classes and overloading operators. Review how to call
overloaded operators. Review vectors, how to use vectors. Review unordered_map
and how to use it.
5. Review homework solutions on Canvas.
6. Review the functionality of pertinent methods and commands in the supplied
method/command sheet.
7. Review the handouts material and videos on Canvas.

Purchase answer to see full

Order a unique copy of this paper
(550 words)

Approximate price: $22

Our Basic features
  • Free title page and bibliography
  • Plagiarism-free guarantee
  • Unlimited revisions
  • Money-back guarantee
  • 24/7 support
Our Options
  • Writer’s samples
  • Expert Proofreading
  • Overnight delivery
  • Part-by-part delivery
  • Copies of used sources
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

AcademicWritingCompany guarantees

Our customer is the center of what we do and thus we offer 100% original essays..
By ordering our essays, you are guaranteed the best quality through our qualified experts.All your information and everything that you do on our website is kept completely confidential.

Money-back guarantee always strives to give you the best of its services. As a custom essay writing service, we are 100% sure of our services. That is why we ensure that our guarantee of money-back stands, always

Read more

Zero-plagiarism tolerance guarantee

The paper that you order at is 100% original. We ensure that regardless of the position you are, be it with urgent deadlines or hard essays, we give you a paper that is free of plagiarism. We even check our orders with the most advanced anti-plagiarism software in the industry.

Read more

Free-revision guarantee

The thrives on excellence and thus we help ensure the Customer’s total satisfaction with the completed Order.To do so, we provide a Free Revision policy as a courtesy service. To receive free revision the Academic writing Company requires that the you provide the request within Fifteen (14) days since the completion date and within a period of thirty (30) days for dissertations and research papers.

Read more

Privacy and Security policy

With, your privacy is the most important aspect. First, the academic writing company will never resell your personal information, which include credit cards, to any third party. Not even your lecturer on institution will know that you bought an essay from our academic writing company.

Read more

Adherence to requirements guarantee

The academic writing company writers know that following essay instructions is the most important part of academic writing. The expert writers will, therefore, work extra hard to ensure that they cooperate with all the requirements without fail. We also count on you to help us provide a better academic paper.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2020 at 10:52 AM
Total price:
The price is based on these factors:
Customer Academic level
Number of pages required
Urgency of paper