Define what unspecified behaviour means in the C standard and give two examples of such behaviour. [3 marks] (ii) Briefly explain why it is important to have unspecified behaviour in the definition of the C language. [1 mark] (b) Compare and contrast the struct and union keywords in C, supplying an example of a situation where it would be more appropriate to use a union rather than a struct. [4 marks] (c) Explain the following C or C++ language concepts. You may find it helpful to use short code fragments or diagrams to illustrate your answer. (i) The virtual keyword used to qualify a C++ member function and its impact on generated code. [4 marks] 2 Hosts 50/1/1 S0/1/0 R1 R2 GOM S2 PC2 GO1 50/1/1 NW:10.10.100.0/24 50/170 Network P: 15 Hosts Network Q: 10 Hosts Network Z: 2 Hosts Network Y: 2 Hosts 50/110 50/1/1 R3 G0/1 Network R: 4 Hosts 53 PC3 Part 1: Design the VLSM Address Scheme Divide the 10.10.100.0/24 network based on the number of hosts per subnet and complete the Subnet Table. You will subnet the network address 10.10.100.0/24. The network has the following requirements: • Network P (LAN) requires 15 Usable host IP addresses. (Use the third available subnet) • Network Q (LAN) requires 10 Usable host IP addresses. (Use the next available subnet) • Network R (LAN) requires 4 Usable host IP addresses. (Use the next available subnet) • Network X (WAN) requires 2 Usable host IP addresses. (Use the next available subnet) • Network Y (WAN) requires 2 Usable host IP addresses. (Use the next available subnet) Network Z (WAN) requires 2 Usable host IP addresses. Show how this would affect your IntListArray class and discuss the advantages of the change from protected to private. [5 marks] (c) The solutions in parts (a) and (b) both involve a get() method returning an Object reference. (i) Explain why this is bad practice. [1 mark] (ii) Propose an alternative solution for a constrained array of Integer or LinkedList objects (only) that addresses this issue. [5 marks] 4 CST.2016.1.5 4 Object-Oriented Programming (a) Using example Java code, distinguish between overloading, overriding and shadowing when applied to Java methods. Define the configuration of a Turing machine at step t, and establish equations that specify the configuration of a k-symbol Turing machine at step (t + 1) in terms of the configuration at the previous step t. [6 marks] (d) Explain how you would use your equations to simulate a specific Turing machine by a register machine whose program encodes the quintuplet description. 8 Computer Graphics and Image Processing Describe an algorithm for performing scan conversion of a set of 3D polygons, including details of clipping, projection, and the underlying 2D polygon scan conversion algorithm. You may assume that you are given the colour of each polygon and that no lighting calculations are required. Here is your task – In this task, the sample solution template found in the Resources section. a list of tasks required to complete the and then assign each task to a developer by sprint. Aim to spend an hour on this task. i) In a Hopfield neural network configured as an associative memory, withall of its weights trained and fixed, what three possible behaviours mayoccur over time in configuration space as the net continues to iterate inresponse to a given input? [3 marks]
(ii) How many stable content-addressable memories would you expect a fullyconnected Hopfield network consisting of 100 neurons to be capable of
storing?To task, do the following:Step 1: Review the information included in the Resources below. Download the Sample Solution Template. Software Design #1: Costs $30,000, and will facilitate profits of $8,000/year
Software Design #3: Costs $90,000, and will facilitate profits of $8,500/year
Which Software Design should they choose?