Explore BrainMass

Program Execution

Program execution has nothing to do with cancellation or termination. All programs are essentially sets of instructions for a computer to carry out, and that act of carrying them out is known as execution. Each instruction may cause a number of actions to be taken by the processing machine, with effects that can affect any number of components of that computer, depending on how the instructions were written. The systems that do the executing for a machine are known as interpreters as they read the code in and follow its instructions. A human typing commands into a terminal is an example of an interpreter in action, interfacing between the human input and the processor, but programs may also execute in batch processes without any human interaction necessary. Interpreters can be held in contrast to compilers which perform a translation of the code a programmer writes into a more low-level language that can be directly executed by a processor much more simply and quickly than the original high-level sourcecode. The file produced by a compiler this way is often called the executable.

The compiling process to get an executable for 3 common OSes from a program written in Java.  Image credit Loboh.

As only a few types of programs are executable on a bare machine, most programs are designed with assumptions, both implicit and explicit, about the resources available for execution. The presence of an operating system is almost always a safe bet, and most programs do rely on the support of such a system at the very least. Run-time libraries specific to the language the program is written in are another thing programs tend to rely on access to which are not supplied by the computer from factory settings.

Election Algorithm

Derive an election algorithm for bidirectional rings that is more efficient than the ring algorithm: The ring algorithm assumes that the links are unidirectional and that each process sends its message to the neighbor on the right. The main data structure used by the algorithm is the active list, a list that contains the prio

Enterprise Resource Planning Systems

What are the fundamental stages of an enterprise system life cycle? How is this different from a traditional software development life cycle (SDLC)? How can you define and distinguish between ERP configuration and customization? Why is this important to the success of the implementation project? What makes project/program

SDLC methodology.

Describe the importance of documentation under an systems development life cycle (SDLC) methodology.

IT Project Failures

What are the major reasons for IT project failures? Are they because of problems with project management life cycle, product development life cycle, project manager incompetence, poor execution, or something else? Why do you believe some projects do not meet their objective or scope?

System Analysis and Design Questions to assist with system implementation.

1. Describe three approaches to organizing programming teams. For what types of projects or development activities is each approach best suited? 2. How does implementing a maintenance change differ from a new system development project? 3. List and briefly describe implementation phase QA activities other than software tes

Can scope creep be good for a project?

There is a school of thought that argues that, far from being undesirable, some degree of scope creep may in fact be beneficial for certain types of projects e.g. it encourages stakeholder engagement, indicates responsiveness, and shows that objectives and WBS tasks are being regularly re-evaluated and re-aligned. The only cavea

Strategic Role of Enterprise Project Management (EPM)

Please help me with an assignment by answering the following: Does EPM actually significantly change the way individual projects are managed, or does it just simply affect how they are selected and prioritized by management, at a strategic level?

Under-Utilized or Misused Applications

Companies sometimes purchase expensive applications, and then under-utilize or misuse these. In a sense, the economic downturn has been beneficial, as many companies are beginning to more regularly scrutinize the programs they are investing in, to confirm they are purchased for the right reasons, and used more effectively. Ha

Word Processing Software

Please help me with the following case study: Boardman Management Group manages the Baderman Island resort. They are considering whether to upgrade the word processing software currently in use at the resort or to purchase a new word processing software application. Boardman plans to hire Smith Systems Consulting to help them

Compute the speedup for options used to improve the processor performance.

Processor X has a clock speed of 2Ghz and takes 1 cycle for integer operations, 2 cycles for memory operations, and 4 cycles for floating point operations. Empirical data shows that programs run on Processor X are typically composed of 35% floating point operations, 30% memory operations, and 35% integer operations. You are d

Java Code to Calculate Mortgage Payments

I need help with a program that will calculate mortgage payments. The program must be written in Java that will calculate and display the monthly payment amount to fully amortize a $200,000.00 loan over a 30 year term at 5.75? interest. Part 1: Complete Change Request #4 in Service Request SR-mf-003: Part 2: Complete Cha

Difference between the two codes listed below

Details: Coding style is a very important characteristic for those entering the technology field. Here are two sample Java programs that do exactly the same thing according to the user. Please identify the differences in the code samples and discuss the style of each sample. Make sure to address readability as a characteristic

ERD, UML, Flowcharts

Please explain what ERD, and UML terms are, as well as the differences between them.

Array index out of bounds

Please assist with the following problem. I am totally lost with this so if you could also include statements telling me what you did, I would appreciate it. The entire chapter talks about array index out of bounds which has completely confused me and there are no examples in the book to help. If you could complete this progra

Explain in your own words the difference between testing and debugging.

Explain in your own words the difference between testing and debugging. [I know debugging is going through the code in an attempt to isolate the cause of the problem] Which activity is more time consuming and why? Why do companies often release software that is not bug-free? Discuss testing and debugging in terms of

Program Verification and Performance Tuning

How do you envision the ways program verification and performance tuning will be accomplished in the future? Will it still be a work of art? Will it always be the result of one's experience? Or do you forecast more and more automatic ways (algorithms?) to accomplish these tasks?

Write a C program that prints out the first n primes.

Write a program that prints out the first n primes, and n is input by the user. Example as follows: How many do you want to see? 3000 1: 2 2: 3 .... 25: 97 26: 101 .... 2999: 27437 3000: 27449 Program should be written in three files: primes.h main.c is_primes.c Attached are parts of two files (prim

Isvowel() function testing whether vowel or not

****This needs to be in "C"**** Write a function isvowel() that test whether or not charachter is a vowel. Use your function in a program that reads the standard input file and writes to the standard output file, deleting all vowels. Use redirection on a file containing some English text to test your program. ****This need

Software QA and QC roles

Hi, I need assistance in the following problem. What are the essential functionalities of a test manager and a project manager? Best Regards,

Buffer Overflow Attack

Need some help with the attached buffer overflow attack assignment. Here is a link with pertinent information: In the foo function pushing 43 A's for example will cause the buffer to overflow.