CSE278 Final Exam Study Guide and Sample Questions
All Linux/UNIX commands from Lab0.., Lab5, Lab6, Lab7, Lab8, Lab9
All C++ coding from Lab0.., Lab5, Lab6, Lab7, Lab8, Lab9
All C++ coding from Homework0.., HW5, HW6, HW7, HW8, HW9
All Questions from Lab0.., Lab5, Lab6, Lab7, Lab8, Lab9
All Questions from Homework0.., HW5, HW6, HW7, HW8, HW9
Questions types similar to Mid Term Exam
C++ Lecture Slideds: Part1..Part4
Lecture Slides: Database (Part1, Part2 and System Integration)
Lecture Slides: ComputerArchitecture
Lecture Slides: Computer Security
Lecture Slides: NumberSystems
C++ MySQL Connectivity
Understanding DBMS, DDL, DML
• “C++ How to Program” by Paul Deitel and Harvey Deitel. Prentice Hall. See Canvas
• Chapter 1 (Introduction)
• Chapter 2 (Expressions & I/O)
• Chapter 3.1, 3.2 (String & methods)
• Chapter 4 (if-statements)
• Chapter 5.1 – 5.10 (loops & switch)
• Chapter 6 (functions/methods)
• Chapter 7.10 (std::vector)
• Chapter 8 (Pointers)
• Chapter 9 (Classes)
Chapter 10 (Operator overloading)
• Chapter 14.1 – 14.6 (File I/O)
Chapter 15.6.4: Associative Containers (std::unordered_map)
• Appendix D: Number conversions
1. The list of all passwords is kept within the operating system. Thus, if a user manages to read
this list, password protection is no longer provided. Suggest a scheme that will avoid this
problem. (Hint: Use different internal and external representations.)
2. Discuss how the asymmetric encryption algorithm can be used to achieve the following goals:
b. Authentication: the receiver knows that only the sender could have generated the
c. Secrecy: only the receiver can decrypt the message
d. Authentication and Secrecy: only the receiver can decrypt the message, and the
receiver knows that only the sender could have generated the message.
3. What is the difference between a packet filtering firewall and a stateful inspection
4. What is the difference between passive and active security threats?
5. List and briefly define categories of security mechanisms.
6. What is the benefit of the TCP three-way handshake mechanism?
7. In OS terminology, what is a pipe and how does the OS manage it?
o Concept of memory and address
o Basics of pointers to hold addresses
o Basic pointer operators
o Address of operator (&)
o Indirections/dereferencing a pointer (*)
o Using object dereference operator (->)
o Pointer arithmetic
o Pointers « array operation similarities and code conversion
o Understanding command-line arguments
o Array of pointers.
13. Other exercises
i. Converting English statements to corresponding C++ statements
ii. Describing C++ statements in English
iii. Code walkthroughs to determine operation and output from a C++ program
iv. Developing a C++ program given a functional description
v. Identifying performance or memory issues in C++ programs
vi. Rewriting C++ program to address memory or performance issue
14. Computer architecture concepts
a. Terms and acronyms for key subsystems/components of a computer system: CPU, ALU,
Registers, Memory, BIOS
b. Units for: Time, Frequency, Memory
c. Endianness of CPU
d. Symbol table, symbols, and memory addresses
e. Relationship between memory addressing modes and C++ operations
f. Von Neumann architecture
g. Mnemonics and assembly language programming
h. Relationship between assembly and machine language
i. The hardware-software interface
j. What do you understand by Little Endian and Big Endian System?
k. What is pipelining? What are the 4 common stages in a CPU pipeline and what does each
15. Number System
a. Convert the following Decimal number 30303 into an equivalent Hexadecimal
number. Show all of your mathematical works.
Convert the following numbers from one base to another: (Show all of your
b. From 252 Decimal to Hexadecimal
c. From F8C Hexadecimal to Decimal
From 88 Decimal to Binary
What is the difference between procedural and nonprocedural DMLs?
b. What is the difference between normalized and denormalized databases?
Define the two principle integrity rules for the relational model. Discuss why
it is desirable to enforce these rules.
d. Write SQL statements to do the following on the database schema
e. The following tables form part of a database held in a relational DBMS:
Hotel (hotelNo, hotelName, city)
Room (roomNo, hotelNo, type, price)
Booking (hotelNo, guestNo, dateFrom, dateTo, roomNo)
Guest (guestNo, guestName, guestAddress)
Where Hotel contains hotel details and hotelNo is the primary key;
Room contains room details for each hotel and (roomNo, hotelNo) forms the
Booking contains details of bookings and (hotelNo, guestNo, dateFrom)
forms the primary key;
Guest contains guest details and guestNo is the primary key.
Identify the foreign keys in this schema. Explain how the entity and referential
integrity rules apply to these relations.
Given the following 2 related tables, write the SQL SELECT statement to solve the
following queries about developers (Dev) and programs (Prog). The id column in Dev
and Prog is the relation between the two tables.
Dev(id, name, dept, salary)
Prog(id, title, language, lines, size);
a. List at least 3 advantages (max 2 sentences each) of separating interface from
implementation of a class? How is it accomplished in C++?
b. Why are some methods declared as friends in C++?
What is the difference between unordered_map and vector?
d. C++ class development (Example PhoneNumber.cpp)
e. Test for overloaded operator (Example from PhoneNumber.h)
C++ function prototype: return type void vs bool
1. As a general note you should expect to repeat questions from lab exercises and
2. You should know all the material in lecture slides.
3. Do read the E-book materials used in homework while paying attention to
4. Redo lab exercises. Develop short programs to test/verify your understanding of
concepts. Review developing classes and overloading operators. Review how to call
overloaded operators. Review vectors, how to use vectors. Review unordered_map
and how to use it.
5. Review homework solutions on Canvas.
6. Review the functionality of pertinent methods and commands in the supplied
7. Review the handouts material and videos on Canvas.
Purchase answer to see full
Our customer is the center of what we do and thus we offer 100% original essays..
By ordering our essays, you are guaranteed the best quality through our qualified experts.All your information and everything that you do on our website is kept completely confidential.
Academicwritingcompany.com always strives to give you the best of its services. As a custom essay writing service, we are 100% sure of our services. That is why we ensure that our guarantee of money-back stands, alwaysRead more
The paper that you order at academicwritingcompany.com is 100% original. We ensure that regardless of the position you are, be it with urgent deadlines or hard essays, we give you a paper that is free of plagiarism. We even check our orders with the most advanced anti-plagiarism software in the industry.Read more
The Academicwritingcompany.com thrives on excellence and thus we help ensure the Customer’s total satisfaction with the completed Order.To do so, we provide a Free Revision policy as a courtesy service. To receive free revision the Academic writing Company requires that the you provide the request within Fifteen (14) days since the completion date and within a period of thirty (30) days for dissertations and research papers.Read more
With Academicwritingcompan.com, your privacy is the most important aspect. First, the academic writing company will never resell your personal information, which include credit cards, to any third party. Not even your lecturer on institution will know that you bought an essay from our academic writing company.Read more
The academic writing company writers know that following essay instructions is the most important part of academic writing. The expert writers will, therefore, work extra hard to ensure that they cooperate with all the requirements without fail. We also count on you to help us provide a better academic paper.Read more