All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
business
finance
Questions and Answers of
Finance
What are the main goals of regulators for (a) Commercial banks. (b) Securities firms. (c) Insurance firms. (d) Pension funds?
Why could the government not trust the shareholders and creditors of a bank to monitor its risks?
United Airlines recently went into bankruptcy and dumped its pension plan on the PBGC, a federal insurance fund that charges fixed premiums irrespective of the risk of the pension plan. Explain how
Define moral hazard. Explain how it applies to the banking industry and why this problem arises when deposit insurance premiums are fixed. Why does this problem lead to risk-sensitive capital
What is the cost of heavy-handed government regulation?
What is tier 1 capital under the Basel Accord? What percentage of capital charge should be covered by tier 1 capital?
What is the main drawback of the Basel I rules for credit risk?
Suppose that the distribution of daily log returns is i.i.d. and follows a student t distribution with n = 6 degrees of freedom. As the horizon extends, what distribution should the log return tend
Which is a measure of dispersion of a probability distribution, the mean or the standard deviation?
In the same experiment, compute the lower quantile that has a cumulative probability of at most 5 percent.
Describe how we decompose the potential for loss into exposure and the distribution of the risk factor using an example of an investment in bonds. Which of these components is under control the of
In the fixed-income market, which measure reflects exposure to movements in underlying risk variable? How about the stock market and the derivatives market?
Provide two programming examples in which multithreading does not provide better performance than a single-threaded solution
Describe the actions taken by a thread library to context switch between user-level threads.
Under what circumstances does a multithreaded solution using multiple kernel threads provide better performance than a single-threaded solution on a single-processor system?
Can a multithreaded solution using multiple user-level threads achieve better performance on amultiprocessor system than on a single-processor system?
As described in Section 4.5.2, Linux does not distinguish between processes and threads. Instead, Linux treats both in the same way, allowing a task to be more akin to a process or a thread depending
Consider a multiprocessor system and a multithreaded program written using the many-to-many threading model. Let the number of user-level threads in the program be more than the number of processors
A U.S. fund is invested in U.S. and Japanese government bonds. Which of the four classes of risk factors is this portfolio exposed to? Give examples of movements in the risk factors that could cause
The distribution of the dollar/euro exchange rate is described below, What is the mean and standard deviation of the distribution?
The distribution of General Electric's stock price is described below. Compute the 95 percent VAR and the expected tail loss (ETL). VAR is defined from the cutoff price in the table such that the
The risk manager has 10 years of monthly data for a time series of realizations of the risk factor. The sample skewness and kurtosis are "0,2 and 3.5. Check whether these numbers are consistent with
Why is it important for the scheduler to distinguish I/O-bound programs from CPU-bound programs?
Explain the differences in the degree to which the following scheduling algorithms discriminate in favor of short processes: a. FCFS b. RR c. Multilevel feedback queues
Discuss how the following pairs of scheduling criteria conflict in certain settings.a. CPU utilization and response timeb. Average turnaround time and maximum waiting timec. I/O device utilization
Consider the exponential average formula used to predict the length of the next CPU burst. What are the implications of assigning the following values to the parameters used by the algorithm? a. α =
Consider the following set of processes, with the length of the CPU-burst time given in milliseconds:The processes are assumed to have arrived in the order P1, P2, P3, P4, P5, all at time 0. a. Draw
Consider a variant of the RR scheduling algorithm where the entries in the ready queue are pointers to the PCBs.a. What would be the effect of putting two pointers to the same process in the ready
Consider a system running ten I/O-bound tasks and one CPU-bound task. Assume that the I/O-bound tasks issue an I/O operation once for every millisecond of CPU computing and that each I/O operation
Consider a system implementing multilevel queue scheduling. What strategy can a computer user employ to maximize the amount of CPU time allocated to the user's process?
For what purposes is a long time horizon advisable when computing the VAR?
Explain why backtesting and capital adequacy lead to diametrically opposed choices for the confidence level and horizon.
What are three alternative approaches to measuring VAR and their benefits?
Is EVT the ideal solution for distributions that have extreme events not reflected in historical data?
List factors that result in a decrease in VAR assuming a normal distribution.
What are the Basel Committee requirements for the confidence level, trading day horizon, length of historical data, and frequency of data update (monthly, quarterly, yearly?), respectively, for VAR
Consider a portfolio position of $10 million on which returns are assumed to be normally distributed with a current standard deviation of 20 percent per annum. The average VAR on the previous 60 days
The first known correct software solution to the critical-section problem for two processes was developed by Dekker. The two processes, P0 and P1, share the following variables: boolean flag[2]; /*
Show how to implement the wait() and signal() semaphore operations in multiprocessor environments using the Test And Set() instruction. The solution should exhibit minimal busy waiting.
Demonstrate that monitors and semaphores are equivalent insofar as they can be used to implement the same types of synchronization problems.
Write a bounded-buffer monitor in which the buffers (portions) are embedded within the monitor itself.
The strictmutual exclusion within a monitor makes the bounded-buffer monitor of Exercise 6.13 mainly suitable for small portions. a. Explain why this is true. b. Design a new scheme that is suitable
Discuss the tradeoff between fairness and throughput of operations in the readers-writers problem. Propose a method for solving the readers writers problem without causing starvation.
How does the signal() operation associated with monitors differ from the corresponding operation defined for semaphores?
Suppose the signal() statement can appear only as the last statement in a monitor procedure. Suggest how the implementation described in Section 6.7 can be simplified.
Consider a system consisting of processes P1, P2, ..., Pn, each of which has a unique priority number. Write a monitor that allocates three identical line printers to these processes, using the
A file is to be shared among different processes, each of which has a unique number. The file can be accessed simultaneously by several processes, subject to the following constraint: The sum of all
The first known correct software solution to the critical-section problem for n processes with a lower bound on waiting of n − 1 turns was presented by Eisenberg and McGuire. The processes share
When a signal is performed on a condition inside amonitor, the signaling process can either continue its execution or transfer control to the process that is signaled. How would the solution to the
Suppose we replace the wait() and signal() operations of monitors with a single construct await(B), where B is a general Boolean expression that causes the process executing it to wait until B
Write a monitor that implements an alarm clock that enables a calling program to delay itself for a specified number of time units (ticks). You may assume the existence of a real hardware clock that
Why do Solaris, Linux, and Windows 2000 use spinlocks as a synchronization mechanism only on multiprocessor systems and not on single processor systems?
In log-based systems that provide support for transactions, updates to data items cannot be performed before the corresponding entries are logged. Why is this restriction necessary?
Show that the two-phase locking protocol ensures conflict serializability.
What are the implications of assigning a new timestamp to a transaction that is rolled back? How does the system process transactions that were issued after the rolled-back transaction but that have
Assume that a finite number of resources of a single resource type must be managed. Processes may ask for a number of these resources and -once finished-will return them. As an example, many
The decrease count() function in the previous exercise currently returns 0 if sufficient resources are available and -1 otherwise. This leads to awkward programming for a process that wishes obtain a
What is the meaning of the term busy waiting? What other kinds of waiting are there in an operating system? Can busy waiting be avoided altogether? Explain your answer.
Explain why spinlocks are not appropriate for single-processor systems yet are often used in multiprocessor systems.
Explain why implementing synchronization primitives by disabling interrupts is not appropriate in a single-processor system if the synchronization primitives are to be used in user-level programs.
Explain why interrupts are not appropriate for implementing synchronization primitives in multiprocessor systems.
Describe how the Swap() instruction can be used to provide mutual exclusion that satisfies the bounded-waiting requirement.
Servers can be designed to limit the number of open connections. For example, a server may wish to have only N socket connections at any point in time. As soon as N connections are made, the server
Show that, if the wait() and signal() semaphore operations are not executed atomically, then mutual exclusion may be violated.
Define backtesting and exceptions.
A bank reports 6 exceptions to its 99 percent VAR over the last year (252 days), including 4 that follow another day of exception. Compute the likelihood-ratio tests, and discuss whether
The Berkowitz and O'Brien study indicates that bank are conservative, that is, generate VAR forecasts that are too large in relation to actual risks. What could explain this observation?
How is type 1 error different from type 2 error for a decision rule? Explain the meaning of these errors for backtesting the trading book of a bank. Can both errors be avoided?
For a fixed type 1 error rate, how can a test minimize the probability of a type 2 error?
Say that a bank reports 9 exceptions to its 99 percent daily VAR over the last year (252 days). Give two interpretations of this observation.
Backtesting is usually conducted on a short horizon, such as daily returns. Explain why.
Why is it useful to consider not only unconditional coverage but also conditional coverage?
Consider the traffic deadlock depicted in Figure 7.1. a. Show that the four necessary conditions for deadlock indeed hold in this example. b. State a simple rule for avoiding deadlocks in this system.
We can obtain the banker's algorithm for a single resource type from the general banker's algorithm simply by reducing the dimensionality of the various arrays by 1. Show through an example that the
Consider the following snapshot of a system:
Answer the following questions using the banker's algorithm: a. What is the content of the matrix Need? b. Is the system in a safe state? c. If a request from process P1 arrives for (0, 4, 2, 0), can
A single-lane bridge connects the two Vermont villages of North Tunbridge and South Tunbridge. Farmers in the two villages use this bridge to deliver their produce to the neighboring town. The bridge
Modify your solution to Exercise 7.15 so that it is starvation-free.
Consider thedeadlock situation that could occur in the dining-philosophers problem when the philosophers obtain the chopsticks one at a time. Discuss how the four necessary conditions for deadlock
Compare the circular-wait schemewith the deadlock-avoidance schemes (like the banker's algorithm) with respect to the following issues: a. Runtime overheads b. System throughput
In a real computer system, neither the resources available nor the demands of processes for resources are consistent over long periods (months). Resources break or are replaced, new processes come
Consider a system consisting of four resources of the same type that are shared by three processes, each of which needs at most two resources. Show that the system is deadlock-free.
Consider the dining-philosophers problem where the chopsticks are placed at the center of the table and any two of them could be used by a philosopher. Assume that requests for chopsticks are made
Consider the same setting as the previous problem. Assume now that each philosopher requires three chopsticks to eat and that resource requests are still issued separately. Describe some simple rules
An investor holds a position that includes $100,000 invested in a 10-year Canadian government bond futures contract (CGB) and $100,000 invested in a Canadian stock index futures contract (SXF). Their
VAR is claimed not to be a coherent risk measure. Explain the meaning of this term and whether this criticism applies to normal distributions.
What is the relationship between marginal VAR and incremental VAR?
On average, what is the relationship between component VAR and individual VAR for a particular position?
Explain the difference between internal and external fragmentation.
Why are segmentation andpaging sometimes combined into one scheme?
Explain why it is easier to share a reentrant module using segmentation than it is to do so when pure paging is used.
Consider the following segment table:What are the physical addresses for the following logical addresses? a. 0,430 b. 1, 10 c. 2,500 d. 3,400 e. 4,112
What is the purpose of paging the page tables?
Consider the hierarchical paging scheme used by the VAX architecture. How many memory operations are performed when an user program executes a memory load operation?
Compare the segmented paging scheme with the hashed page tables scheme for handling large address spaces. Under what circumstances is one scheme preferrable over the other?
Consider the Intel address translation scheme shown in Figure 8.22.a. Describe all the steps that the Intel 80386 takes in translating a logical address into a physical address.b. What are the
Consider the following process for generating binaries. A compiler is used to generate the object code for individual modules, and a linkage editor is used to combine multiple object modules into a
Given five memory partitions of 100 KB, 500 KB, 200 KB, 300 KB, and 600 KB (in order), how would each of the first-fit, best-fit, and worst-fit algorithms place processes of 212 KB, 417 KB, 112 KB,
Most systems allow programs to allocate more memory to its address space during execution. Data allocated in the heap segments of programs is an example of such allocated memory. What is required to
Compare the main memory organization schemes of contiguous-memory allocation, pure segmentation, and pure paging with respect to the following issues: a. External fragmentation b. Internal
Showing 16300 - 16400
of 19056
First
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
Last