A bit stream 10011101 is transmitted using the standard CRC method described in the text. The generator polynomial is x3 + 1. Show the actual bit string transmitted. Suppose the third bit from the...
List four significant differences between a file-processing system and a DBMS.
Consider a two-dimensional integer array of size n m that is to be used in your favorite programming language. Using the array as an example, illustrate the difference (a) Between the three levels...
Construct an E-R diagram for a car-insurance company whose customers own one or more cars each. Each car has associated with it zero to any number of recorded accidents.
A university registrars office maintains data about the following entities: (a) Courses, including number, title, credits, syllabus, and prerequisites; (b) Course offerings, including course number,...
A car-rental company maintains a vehicle database for all vehicles in its current fleet. For all vehicles, it includes the vehicle identification number, license number, manufacturer, model, date of...
Show, by giving a DTD, how to represent the books nested-relation from Section 9.1, using XML
Construct a B+-tree for the following set of key values: (2, 3, 5, 7, 11, 17, 19, 23, 29, 31) Assume that the tree is initially empty and values are added in ascending order. Construct B+-trees for...
Given relation r (a, b, d, d), Show how to use the extended SQL features to generate a histogram of d versus a, dividing a into 20 equal-sized partitions (thatis, where each partition contains 5...
Define in your own words the following terms: agent, agent function, agent program, rationality, autonomy, reflex agent, model-based agent, goal-based agent, utility-based agent, learning agent.
Describe a state space iii which iterative deepening search performs much worse than depth-first search (for example. O(n2) vs. O(n)).
Write a general set of facts and axioms to represent the assertion Wellington heard about Napoleons death and to correctly answer the question Did Napoleon hear about Wellingtons death?
Using the set axioms as examples write axioms for the list domain, including all the constants, functions, and predicates mentioned in the chapter.
Consider the network for car diagnosis shown in Figure. a. Extend the network with the Boolean variables Icy Weather and Starter Motor. b. Give reasonable conditional probability tables for all the...
We never test the same attribute twice along one path in a decision tree. Why not?
For each of the following determinations write down the logical representation and explain why the determination is true (if it is): a. Zip code determines the state (U.S.). b. Design and...
Starting with the passive ADP agent modify it to use an approximate ADP algorithm us discussed in the text. Do this in two steps: a. Implement a priority queue for adjustments to the utility...
Adapt the vacuum world for reinforcement learning by including rewards for picking up each piece of dirt and for getting home and switching off. Make the world accessible by providing suitable...
Investigate the application of reinforcement learning ideas to the modeling of human and animal behavior.
Describe a business problem your university has that you would like to see solved. How can information technology help solve it?
Explain how just in time project management is used for adaptive projects.
What would you do if you got conflicting answers for the same procedure from two different people you interviewed? What would you do if one was a clerical person and the other was the department...
How does public key (asymmetric) encryption work? What are its strengths? What are its weaknesses?
Develop a deployment diagram for the following description of a Face book application. The Face book platform is available for entrepreneurs to develop applications for use among all Face book users....
Why do some companies in a given industry, like eCourier above, adopt and deploy innovative technologies while others in the same line of business do not? Break into small groups with your classmates...
Suppose you are a manager being asked to develop computer-based applications to gain a competitive advantage in an important market for your company. What reservations might you have about doing so?...
Do you think that information appliances like PDAs will replace personal computers (PCs) in business applications? Explain.
You have the responsibility to manage software training for Sales, Accounting, and Operations Department workers in your organization. You have surveyed the workers to get a feel for the amounts of...
Which applications of AI have the potential value for use in the operations and management of a business? Defend your choices.
What does gradual refinement mean in the context of SDLC?
Outline suggestions to make observation a useful, reliable requirements elicitation technique.
Discuss several ways to verify the correctness of a process model.
Create a set of use cases for the following system: Picnics R Us (PRU) is a small catering firm with five employees. During a typical summer weekend, PRU caters 15 picnics with 20 to 50 people each....
Explain the differences between object-action order and action-object order.
What are some basic database functions that a spreadsheet cannot perform.
Explain why the two following commands produce different results. SELECT DISTINCT COUNT (V_CODE) FROM PRODUCT; SELECT COUNT (DISTINCT V_CODE) FROM PRODUCT;
Write the SQL code to change the EMP_PCT value to 3.85 for the person whose employee number (EMP_NUM) is 103. Next, write the SQL command sequences to change the EMP_PCT values as shown in...
Using the data in the ASSIGNMENT table, write the SQL code that will yield the total number of hours worked for each employee and the total charges stemming from those hours worked. The results of...
Write a query to display the employee number, last name, first name, salary from date, salary end date, and salary amount for employees 83731, 83745, and 84039. Sort the output by employee number and...
What is the SQL command to list the total sales by customer and by product, with subtotals by customer and a grand total for all product sales?
OS/2 is an obsolete OS for PCs from IBM. In OS/2, what is commonly embodied in the concept of process in other operating systems is split into three separate types of entities: session, processes,...
Prove that, among non-preemptive scheduling algorithms, SPN provides the minimum average waiting time for a batch of jobs that arrive at the same time. Assume that the scheduler must always execute a...
Consider a set of five aperiodic tasks with the execution profiles of Table. Develop scheduling diagrams similar to those of Figure for this set of tasks. Arrival Time 10 20 40 50 60 Execution Time...
Maximum urgency first (MUF) is a real-time scheduling algorithm for periodic tasks. Each task is assigned an urgency that is defined as a combination of two fixed priorities and one dynamic priority....
The following pairs of Web storefronts have market segments that overlap in some way. Briefly visit each site of each pair:
How is a 1:1 relationship between two entities mapped into a relational schema?
Microsoft offers free licenses of certain software products to students at colleges and universities that participate in its DreamSpark program [formerly known as the Microsoft Developer Network...
Describe, in general terms, the work that needs to be accomplished to create the applications you identified in question 1.
What kinds of errors can Wally, Maria, and Ann make that are not captured by SAP? One example is that Wally might count 20 bottles and 30 cages but mistakenly enter 20 cages and 30 bottles. Describe...
List the names of borrowers with overdue books.
Create an ER model to represent the data use by the library. The library provides books to borrowers. Each book is described by title, edition and year of publication and is uniquely identified using...
On completion of Exercise 14.15 examine the 3NF relations created to represent the attributes shown in the relation that displays dentist/patient appointment data in Figure 14.19. Determine whether...
Figure 3-13 shows the development of entity clusters for the Pine Valley Furniture E-R diagram. In Figure 3-13b, explain the following: a. Why is the minimum cardinality next to the DOES BUSINESS IN...
Write SQL queries to answer the following questions: a. What are the courses included in the Section table? List each course only once. b. List all students in alphabetical order by StudentName. c....
Write an SQL query to determine the total number of hours and the total number of lessons Tutor 106 taught in June and July 2015.
For every order that has been received, display the order ID, the total dollar amount owed on that order (you'll have to calculate this total from attributes in one or more tables; label this result...
Write a query to list the number of products produced in each work center (label as TotalProducts). If a work center does not produce any products, display the result with a total of 0.
Create a strategy for reviewing your database implementation with the appropriate stakeholders . Which stakeholders should you meet with? What information would you bring to this meeting? Who do you...
You have been asked to prepare a report that evaluates possible client/server solutions to handle a new customer application system for all branch offices. What business characteristics would you...
Agents change territories over time. If necessary, redesign your answer to Problem and Exercise 9-39 to handle this changing dimensional data. Fitchwood Insurance Company, which is primarily involved...
Customers may have relationships with one another (e.g., spouses, parents and children). Redesign your answer to Problem and Exercise 9-40 to accommodate these relationships. Fitchwood Insurance...
A certain part is routed through six machines in a batch production plant. The setup and operation times for each machine are given in the table below. The batch size is 100 and the average non...
The average part produced in a certain batch manufacturing plant must be processed sequentially through six machines on average. Twenty (20) new batches of parts are launched each week. Average...
What is the difference between repeatability and accuracy in a robotic manipulator?
The AS/RS aisle of Problem 11.5 will be organized following a class-based dedicated storage strategy. There will be two classes, according to activity level. The more active stock is stored in the...
The cost to operate a certain 20-station transfer line is $72/hr. The line operates with an ideal cycle time of 0.85 min. Downtime occurrences happen on average once per 14 cycles. Average downtime...
A six-station dial indexing machine is designed to perform four assembly operations at stations 2 through 5 after a base part has been manually loaded at station 1. Station 6 is the unload station....
A dial indexing machine has six stations that perform assembly operations on a base part. The operations, element times, q and m values for components added are given in the table below (NA means q...
Describe the six major categories of hardware, and provide an example of each.
What are the most important HRIS applications?
A non inverting amplifier uses an op-amp as shown in Figure E2.5. Assume an ideal op-amp model and determine v0/vin. R2 R1 , FIGURE E2.5 A noninverting amplifier using an op-amp.
A single-input, single-output system is described by y(t) = [0 1]x(t) Obtain the transfer function G(s) = Y(s)/U(s) and determine the response of the system to a unit step input. () (1)
A system is described by the state variable equations Determine G(s) = Y(s)/U(s). 004 10 10 0 131 [1 142 y
A machine tool is designed to follow a desired path so that r(t) = (1 - t)u(t), where u(t) is the unit step function. The machine tool control system is shown in Figure AP4.3. (a) Determine the...
A system has a characteristic equation s3 + I0s2 + 2s + 30 = 0. Using the Routh-Hurwitz criterion, show that the system is unstable.
A system has the characteristic equation q(s) = s3 + 10s2 + 29s + K = 0. Shift the vertical axis to the right by 2 by using s = sn - 2, and determine the value of gain K so that the complex roots are...
A system has a characteristic equation s3 + 2s2 + (K + 1)s + 8 = 0. Find the range of K for a stable system.
A closed-loop system is shown in Figure AP5.3. Plot the response to a unit step input for the system with Ñp = 0, 0.5, 2, and 5. Record the percent overshoot, rise time, and settling time...
A unity feedback system has the loop transfer function (a) Determine the breakaway and entry points of the root locus and sketch the root locus for K > 0. (b) Determine the gain K when the two...
A bottle-filling line uses a feeder screw mechanism, as shown in Figure AP6.4. The tachometer feedback is used to maintain accurate speed control. Determine and plot the range of K and p that permits...
A negative unity feedback system has a loop transfer function where T = 0.1 s. Show that an approximation for the time delay is Using obtain the root locus for the system for K > 0. Determine the...
A feedback system is shown in Figure AP7.10. Sketch the root locus as K varies when K ¥ 0. Determine a value for K that will provide a step response with an overshoot less than 5% and a settling...
A feedback control system is shown in Figure P7.18. The filter Gc(s) is often called a compensator, and the design problem involves selecting the parameters α and β. Using...
The speed control system for an isolated power system is shown in Figure P7.7. The valve controls the steam flow input to the turbine in order to account for load changes ÎL(s) within the power...
A high-performance jet airplane is shown, and the roll-angle control system is shown. Design a controller Gc(s) so that the step response is well behaved and the steady-state error is zero.
Determine the feedback gain k of Example 11.13 that minimizes the performance index when xT (0) = [1 1]. Plot the performance index j versus the gain k. (x'x + u'u) dt
A system has a matrix differential equation What values for h1 and b2 are required so that the system is controllable? 2 2
Consider a computer system that has cache memory, main memory (RAM) and disk, and an operating system that uses virtual memory. It takes 1 nsec to access a word from the cache, 10 nsec to access a...
One mode that some DMA controllers use is to have the device controller send the word to the DMA controller, which then issues a second bus request to write to memory. How can this mode be used to...
The Morris-Thompson protection scheme with n-bit random numbers (salt) was designed to make it difficult for an intruder to discover a large number of passwords by encrypting common strings in...
List and briefly define the possible states that define an instruction execution.
Develop an SEC code for a 16-bit data word. Generate the code for the data word 0101000000111001. Show that the code will correctly identify an error in data bit 5.
A process references five pages, A, B, C, D, and E, in the following order: A; B; C; D; A; B; E; A; B; C; D; E Assume that the replacement algorithm is first-in-first-out and find the number of page...
List and briefly explain two common ways of generating the condition to be tested in a conditional branch instruction.
Consider the following code fragment: if K > 10 L: = K + 1 else L: = K - 1; A straightforward translation of this statement into SPARC assembler could take the following form: The code contains a nop...
Assume that propagation delay along the bus and through the ALU of Figure 15.6 are 20 and 100 ns, respectively. The time required for a register to copy data from the bus is 10 ns. What is the time...
Assume a microinstruction set that includes a microinstruction with the following symbolic form: where AC0 is the sign bit of the accumulator and are the first seven bits of the microinstruction....
Could you get enough information from the Internet to take out a loan in another person's name?
Specify the following queries on the COMPANY relational database schema shown in Figure 3.5, using the relational operators discussed in this chapter. Also show the result of each query as it would...
Suppose we have the following requirements for a university database that is used to keep track of students' transcripts: (a) The university keeps track of each student's name (SNAME), student number...