Premium Essay

Submitted By clarabelle

Words 266

Pages 2

Words 266

Pages 2

What is reverse engineering? Ans: Reverse Engineering is taking apart an abject to see how it works in order to duplicate or enhance the object. This practice is frequently used on computer hardware and software.

What are the advantages and disadvantages of using reverse engineering to discover the logics of a software program? Ans: Software reverse engineering is done to retrieve the source code of a program because the source code was lost, to study how the program performs certain operations, to improve the performance of a program, to fix a “bug” or error in the program.Hardware reverse engineering involves taking apart a device to see how it works. If a processor manufacturer wants to see how a competitor’s processor works, they can purchase a competitor’s processor, disassemble it, and then make a processor similar to it.

Find any one tool available to perform reverse engineering of software programs. What are at least five features of that tool? Ans: One tool used is a hexadecimal dumper, which prints and displays the binary numbers of a program in hexadecimal format(which is easier to read than a binary format.

Short Answer Questions:

5. What two things must you normally specify in a variable declaration? Ans: The variable’s name and the variable’s data type

6. What value is stored in uninitialized variables? Ans: zero

Algorithm Workbench

3. Write assignment statements that perform the following operations with the variables a, b, and c.

a. Adds 2 to a and stores the result in b…...

Free Essay

...Programming Logic and Design, 6th Edition Chapter 2 Exercises 1. Explain why each of the following names does or does not seem like a good variable name to you. Answer: Answers will vary. A possible solution: a. | c | – | Valid, but probably too short to be descriptive | b. | cost | – | Good | c. | costAmount | – | Good, but redundant | d. | cost amount | – | Invalid, spaces aren’t allowed | e. | cstofdngbsns | – | Valid, but difficult to read | f. | costOfDoingBusinessThisFiscalYear | – | Valid, but long and awkward | g. | costYear2012 | – | Good | h. | 2012YearCost | – | Invalid, cannot start with a digit | 17 2. If myAge and yourRate are numeric variables, and departmentName is a string variable, which of the following statements are valid assignments? If a statement is not valid, explain why not. Answer: a. | myAge = 23 | – | Valid | b. | myAge = yourRate | – | Valid | c. | myAge = departmentName | – | Invalid, cannot assign string to numeric | d. | myAge = “departmentName” | – | Invalid, cannot assign string to numeric | e. | 42 = myAge | – | Invalid, cannot assign a value to a literal constant | f. | yourRate = 3.5 | – | Valid | g. | yourRate = myAge | – | Valid | h. | yourRate = departmentName | – | Invalid, cannot assign string to numeric | i. | 6.91 = yourRate | – | Invalid, cannot assign a value to a......

Words: 1719 - Pages: 7

Premium Essay

...Programming Logic and Design, 6th Edition Chapter 5 Exercises 1. What is output by each of the pseudocode segments in Figure 5-22? Answer: a. 5, 22, 5 b. 4, 6, 7 c. 5, 6 d. Goodbye Goodbye Goodbye Goodbye Goodbye Goodbye Goodbye Goodbye Goodbye e. Hello Hello Hello f. Adios Adios Adios Adios Adios Adios Adios Adios 2. Design the logic for a program that outputs every number from 1 through 10. Answer: A sample solution follows Flowchart: Pseudocode: start Declarations num number housekeeping() number = 1 while number 99999 output “Please enter a valid zip code” input custZip endwhile return validateCustAge() while custAge < 10 OR custAge > 110 output “Please enter a valid customer age” input custAge endwhile return validateNumItems() Declarations num attempts = 0 num LIMIT = 2 validNumItems = 1 while (numItems < 1 OR numItems > 12) AND attempts < LIMIT output “Please reenter the number of items” input numItems attempts = attempts + 1 endwhile if attempts = 2 AND numItems < 0 then output “An invalid number of items was entered” output “This order will not be counted” validNumItems = 0 endif return housekeeping() output ZIP_PROMPT input custZip return detailLoop() output AGE_PROMPT input custAge output ITEM_PROMPT input......

Words: 1493 - Pages: 6

Premium Essay

...Programming Logic and Design, 6th Edition Chapter 6 Exercises 1. a. Design the logic for a program that allows a user to enter 10 numbers, then displays them in the reverse order of their entry. Answer: A sample solution follows Flowchart: Pseudocode: start Declarations num index num SIZE = 10 num numbers[SIZE] = 0,0,0,0,0,0,0,0,0,0 getReady() while index < SIZE getNumbers() endwhile finishUp() stop getReady() index = 0 return getNumbers() output “Enter a number for position ”, index input numbers[index] index = index + 1 return finishUp() output “The numbers in reverse order are: ” while index > 0 index = index – 1 output numbers[index] endwhile return b. Modify the reverse-display program so that the user can enter up to 10 numbers until a sentinel value is entered. Answer: A sample solution follows Flowchart: Pseudocode: start Declarations num index num SIZE = 10 num numbers[SIZE] = 0,0,0,0,0,0,0,0,0,0 string CONTINUE = “Y” string moreNumbers = CONTINUE getReady() while index < SIZE AND moreNumbers equal to CONTINUE getNumbers() endwhile finishUp() stop getReady() index = 0 output “Do you want to enter a number? (Y/N)” input moreNumbers return getNumbers() output “Enter a number for position ”, index input numbers[index] index =......

Words: 4366 - Pages: 18

Premium Essay

...Assignment 2: Logical Design, Part 1 Due Week 2 and worth 50 points You have been hired by ACME Global Consulting to procure requirements for a large database. In developing database management systems, E-R models are used to graphically depict complex relationships between entities. In this assignment, you are to convince a set of clients of the benefits of using an E-R model in developing a database. Write a two to three (2-3) page paper in which you: 1. List the advantages of a relational model specific to ACME Global Consulting. 2. Summarize in your own words the purpose of an E-R model specific to ACME Global Consulting. 3. List and describe essential components of the model such as entities, attributes, keys, relationships, roles, and dependencies specific to ACME Global Consulting. 4. Describe the need for the enhanced E-R model and how we can create sophisticated models to help us in complex environments. 5. Outline and describe the advantage of using the relational model. 6. Create an E-R diagram using graphical depicting software that could theoretically be used in a restaurant application. Note: The graphically depicted solution is not included in the required page length. Acceptable software used to depict the solution includes any drawing tool, such as Microsoft Visio, Microsoft Paint, open source alternatives or similar drawing tools. You are free to formulate constraints, entities, attributes, etc. Potential entities may include but are not limited to......

Words: 449 - Pages: 2

Free Essay

...12/11/2013 Digital Logic Design CSE-241 Unit 21 4-bit Asynchronous Counter: 2 Muhammad Usman Arif 12/11/2013 1 12/11/2013 MODULUS OF A COUNTER: The modulus of a counter is the number of unique states that the counter will sequence through. The maximum possible number of states (maximum modulus) of a counter is 2n. Where n is the number of flip-flops in the counter. TRUNCATED SEQUENCES: Counters can also be designed that have a number of states in their sequence that is less than the maximum of 2n.the resulting sequence is called a truncated sequence. Muhammad Usman Arif 3 12/11/2013 ASYNCHRONOUS DECADE COUNTER: To obtain a truncated sequence, it is necessary to force the counter to recycle before going through all of its possible states. For example, the BCD decade counter must recycle back to the 0000 state after the 1001 state. One way to make the counter recycle after the count of nine (1001) is to decode count ten (1010) with a NAND gate and connect the output the clear (CLR) input. 4 Muhammad Usman Arif 12/11/2013 2 12/11/2013 ASYNCHRONOUS DECADE COUNTER: 5 Muhammad Usman Arif 12/11/2013 PARTIAL DECODING: Notice in the figure that only Q1 and Q3 are connected to the NAND gate inputs. This arrangement is an example of partial decoding; in which the two unique states (Q1 = 1 and Q3 =1 ) are sufficient to decode the count of ten because none of the other states (zero through nine)......

Words: 492 - Pages: 2

Premium Essay

...Discussion Responses: My Teaching Philosophy My teaching philosophy is to make sure that each child gets a quality education. To what end: My objective as a teacher is to make sure that all students are focus and on task, so that they can learn. Also, it is important to instill in them the importance of getting an education. I would like to teach them their academic and much more. By what mean: In order to teach someone you have to be taught, I do not know of anyone that was born knowing everything. Therefore, my goal is to teach them to the best of my ability and know my job and know what I am doing. To what degree: After teaching an individual there will come a time that they will have to show what they know. A good way to find out that they are learning is to give an assessment or a test. In that instance I will start evaluating them by grading. Once I am done with the grading process, I will then know where I stand as their teacher and know where they stand as the student. Why: I feel that there need to be quality and educated trained teachers to work hard and get the job done. I have worked in the school system now for three years and I know it takes a good hearted person to be a teacher. Also, I feel that one should have love and compassion for which they are reliable for. When I do become a teacher I plan to make a difference in the education world. Zero Tolerance Policy The zero tolerance policy is definitely a great thing to have. I feel......

Words: 388 - Pages: 2

Premium Essay

...Declare String name Call Module1 (agem Real_Income, Name) 5. 6. 7. Debugging Exercises, p.117 (3 pts. Ea. / 12 pts. Total ) 1. 2. 3. 4. Programming Exercises, (#1 - p.117) (10 points total) #1. Kilometer Converter Design a modular program that asks the user to enter a distance in kilometers, and the converts that distance to miles. The conversion formula is as follows: Miles = Kilometers * 0.6214 Additional Instructions: 1. Design using pseudocode. 2. Use the following module names: getKilometers – read kilometers from user keyboard input and store in ‘kilometers’ variable showMiles – accepts ‘kilometers’ variable as input argument and displays the equivalent value in miles Module main () Declare Real kilometers Call getKilometers (kilometers) Call showMiles (kilometers) End Module Module getKilometers (Real Ref kilometers) Display “Enter distance in kilometers” Input kilometers End Module Module showMiles(Real Kilometers) Declare Real miles Set miles = kilometers * 0.6214 Display “That is equal “, miles, “ miles.” End Module Programming Exercises, (#2 - p.118) (15 points total) #2. Sales Tax Program Design a modular program that will ask the user to enter the amount of a purchase. The program should then compute the state and county sales tax. Assume the state sales tax is 4 percent and the county sales tax is 2 percent. The program should display the amount of......

Words: 645 - Pages: 3

Premium Essay

...Starting and Ignition Systems Gas turbines unlike piston engines employ a continuous combustion process to provide the heat input to their working cycle. Once ignited the fuel burns continuously until the engine is shut down, at this point the combustion is extinguished by cutting off the fuel supply. When a gas turbine is started, a means of igniting the fuel is required, in most cases this is provided by an electric spark. One or more ignitor plugs are placed in the combustion chamber usually close to a fuel burner nozzle. When the fuel is switched on the spray from the burner reaches the plug and ignites. Most small gas turbines only have one ignitor plug, but in some cases when an engine is constructed with an annular combustion chamber, two are fitted at opposite sides of the combustion chamber. Ingination Like piston engines GTEs are also fitted with dual ignition systems. These are rated in Joules (watt per second or w/s). The life of the igniters is extended by limiting the amount of energy required. So if continuous use is necessary, for example in heavy rain, snow and or turbulence, power output is reduced. Most systems have low and high output igniters and both are used during start where the low output igniter is used for continuous use. Modern electronic igniter systems can be regulated in energy output (J) as required High Tension Ignition This process is not dissimilar to piston engine ignition systems. A step up transformer or "ignition coil"......

Words: 3792 - Pages: 16

Free Essay

...1.2.1.AK Combinational Logic Design Introduction Combinational and sequential logic are the fundamental building blocks of digital electronics. Combinational logic, which is sometimes referred to as "combinatorial logic”, is characterized by its output being a function of the current input value. A variety of different logic gates can be used to implement combinational logic circuits. Many of these gates will be studied in future units of this course. In this introductory unit, we will limit our designs to AND, OR, and INVERTER gates for the sake of simplicity. In this activity you will use the Circuit Design Software (CDS) to build and test your first combinational logic circuits. Equipment * Circuit Design Software (CDS) Procedure Now it’s time for you to implement your first AOI combinational logic circuit. The circuit that we will use for this purpose is a Car Safety Buzzer design.The design specifications are as follows: The buzzer is on whenever the door is open or when the key is in the ignition and the seat belt is not buckled. 1. Create a table that describes these design specification in terms of “highs” (1) and “lows” (0). This is when the sensor or indicator is active or not active. Seat Belt | 0 = SEAT BELT NOT BUCKLED | | 1 = SEAT BELT BUCKLED | Key | 0 = KEY NOT IN THE IGNITION | | 1 = KEY IN THE IGNITION | Door | 0 = DOOR IS NOT OPEN | | 1 = DOOR IS OPEN | Buzzer | 0 = BUZZER is OFF | | 1 = BUZZER is ON | 2.......

Words: 690 - Pages: 3

Premium Essay

...Brown University Ed Wheeler, University of Tennessee Allen Webster, Bradley University S. R. smross@usc.edu This page intentionally left blank C H A P T E R 1 Combinatorial Analysis 1.1 1.2 1.3 1.4 1.5 1.6 INTRODUCTION THE BASIC PRINCIPLE OF COUNTING PERMUTATIONS COMBINATIONS MULTINOMIAL COEFFICIENTS THE NUMBER OF INTEGER SOLUTIONS OF EQUATIONS 1.1 INTRODUCTION Here is a typical problem of interest involving probability: A communication system is to consist of n seemingly identical antennas that are to be lined up in a linear order. The resulting system will then be able to receive all incoming signals—and will be called functional—as long as no two consecutive antennas are defective. If it turns out that exactly m of the n antennas are defective, what is the probability that the resulting system will be functional? For instance, in the special case where n = 4 and m = 2, there are 6 possible system conﬁgurations, namely, 0 0 1 0 1 1 1 1 0 0 0 1 1 0 1 1 0 0 0 1 0 1 1 0 where 1 means that the antenna is working and 0 that it is defective. Because the resulting system will be functional in the ﬁrst 3 arrangements and not functional in the remaining 3, it seems reasonable to take 3 = 1 as the desired probability. In 2 6 the case of general n and m, we could compute the probability that the system is functional in a similar fashion. That is, we could count the number of conﬁgurations that result......

Words: 121193 - Pages: 485

Free Essay

...4.1. Структура компьютера — это: * ------------------------------------------------- 1) комплекс электронных устройств, осуществляющих обработку информации * ------------------------------------------------- 2) некоторая модель, устанавливающая состав, по- рядок и принципы взаимодействия входящих в нее компонентов * ------------------------------------------------- 3) комплекс программных и аппаратных средств. 4.2. Основная функция ЭВМ: * ------------------------------------------------- 1) общение человека и машины * ------------------------------------------------- 2) разработка задач * 3) принцип программного управления. 4.3. Персональный компьютер состоит из: * ------------------------------------------------- 1) системного блока * ------------------------------------------------- 2) монитора * ------------------------------------------------- 3) клавиатуры * ------------------------------------------------- 4) дополнительных устройств * 5) комплекса мультимедиа. 4.4. Системный блок включает в себя: * ------------------------------------------------- 1) системную плату * ------------------------------------------------- 2) блок питания * ------------------------------------------------- 3) модулятор-демодулятор * ------------------------------------------------- 4) накопители на дисках * ------------------------------------------------- 5) платы расширений * 6) средства связи и......

Words: 3164 - Pages: 13

Free Essay

...Austin Jones Ch. 2 Multiple Choice 1. A 2. A 3. D 4. B 5. A 6. C 7. C 8. A 9. B 10. D 11. B 12. A 13. C 14. A 15. D 16. B 17. B 18. C 19. D 20. A True or False 1. FALSE 2. TRUE 3. FALSE 4. TRUE 5. FALSE 6. TRUE 7. TRUE 8. TRUE 9. FALSE 10. FALSE Short Answer 1. Figure out what the user wants and how it can be mathematically solved. 2. pseudocode is "fake" code, or code without syntax 3. Sequence, Decision and Iteration 4. The program is easy for the user to navigate through and use. 5. the name and what kind of data type it will hold 6. nothing. Algorithim Workbench 1. Display “Height” Input Height Display “here is the height that you entered:” , height 2. Display “Favorite color” Input favorite color Display “Here is your favorite color you entered:” , color 3. b = a + 2 a = b * 4 b = a/3.14 a = b - 8 4. a. Set result = x + y b. Set result = z * 2 c. Set result = y / x d. Set result = y – z result = x++ - y; Answer -4 result = 4 – 8 = -4 result = ++w + y; Answer w = w + 1 = 5 + 1 = 6 result = 6 + 8 = 14 5. Declare Real price= 0.00 Display "the original price." Input item original price Display "price" 6. Declare Real price= 0.00 Display "the original price." Input item original price Display "price" 7. count := 27 8....

Words: 253 - Pages: 2

Free Essay

...engineering as a method is not confined to any particular purpose, but is often an important part of the scientific method and technological development. The process of taking something apart and revealing the way in which it works is often an effective way to learn how to build a technology or make improvements to it. When reverse engineering software, researchers are able to examine the strength of systems and identify their weaknesses in terms of performance, security, and interoperability. The reverse engineering process allows researchers to understand both how a program works and also what aspects of the program contribute to its not working. • What are the advantages and disadvantages of using reverse engineering to discover the logics of a software program? Reverse engineering in software is reversing a program's machine code back into it's original source code. The advantages to using this technique is that one can repair certain bugs, see how a program operates, and improve the operation of the program. The disadvantage is that certain other bugs may be introduced during this process. • Find any one tool available to perform reverse engineering of software programs. What are at least five features of that tool? REC Studio 4 - Reverse Engineering Compiler Multihost: Rec Studio runs on Windows XP/Vista/7, Ubuntu Linux, Mac OS X. Symbolic information support using Dwarf 2 and partial recognition of Microsoft's PDB......

Words: 301 - Pages: 2

Premium Essay

...Purpose: Calculate the result of a number raised to the power of another number input by the user using iterative logic without overflow of 32-bit integers## //Program start// START //declare variables // declare unsigned int base, exp, answer, errorInput, errorOutput Declare var string exit Global var constant int multiply = 1, maxValue = 2147483647 Set answer = 1 Set base = 1 Set exp = 1 // determine if input fits in unsigned 32 bit int and set exit sentinel // //welcome message// Display “This program will determine the value of an integer (X) raised to the power of a second integer (N).” WHILE exit !=n //set repeat of input if error message is flagged and reset error flags// DO SET errorInput = 0 Set errorOutput = 0 //user input prompts// Display “Please Enter first integer: “ Input base Display “Please enter second integer: ” Input exp IF (base,exp) >= maxValue THEN //error message// Display “ Error! Value exceeds maximum available input. Please enter a value less than 2147483647” SET errorInput = 1 END IF WHILE errorInput = 1 //perform calculation with iterative multiplication// //check for error outputs & unneccessary execution of loop// IF exp != 0 THEN FOR (errorOutput ! =1 && multiply maxValue THEN SET errorOutput = 1 END IF END FOR //end calculation and check for maximum value......

Words: 266 - Pages: 2

Free Essay

... Logic Application After evaluating the game of “Guess your Card”, I assume that my cards could only be 4, 5, and 9. I came up with this logic by starting with Andy. I add all three numbers together from each player. Andy has the cards of 1, 3, and 7 with a sum of 11. Belle has the cards 3, 4, and 7 with a sum of 14, and Carol has the cards 4, 6 and 8 with a sum of 18. Since each player have a different sum I took the players with the highest sum which is Belle and Carol to see which player cards would add up with my cards. Next, Belle draw the question card, “of the five odd numbers”, how many different odd numbers do you see? She answer all of them. Only because the only odd numbers she see is from Andy and Carol which are 1, 3, and 7. That's how I came up with the numbers of 5 and 9. I then, add together 5 and 9 which is 14, let's not forget in the beginning I said the sums must add up to either 14 or 18. Since 5+9=14, and the smallest card is 1 so my cards must add up to more than 14. The sum of my cards must be 18. In order for me to find out what is my final card I must subtract 18 from 9 and 5 which gives me 4. You can also see why Andy knew what cards he had. He realize that the only odd numbers Belle could see from Carol and myself were 5 and 9, but yet she claim she could see all five odd numbers. So the remaining three: 1, 3 and 7 must have come from Andy himself. That's how he figure out what he had. The logic of......

Words: 342 - Pages: 2