Consider the following two versions of a program to add two vectors: a. The program on the left executes on a uniprocessor. Suppose each line of code L2, L4, and L6 takes one processor clock cycle to...
The Gray code is a binary code for integers. It differs from the ordinary binary representation in that there is just a single bit change between the representations of any two numbers. This is...
What is the difference between a hardware pipeline and a software pipeline?
An algorithm that can utilize four floating-point instructions per cycle is coded for IA-64. Should instruction groups contain four floating-point operations? What are the consequences if the machine...
List some reasons why it is worthwhile to study assembly language programming.
Core War is a programming game introduced to the public in the early 1980s [DEWD84], which was popular for a period of 15 years or so. Core War has four main components: a memory array of 8000...
Consider the ER diagram of Figure 7.20, which shows a simplified schema for an airline reservations system. Extract from the ER diagram the requirements and constraints that resulted in this schema....
Consider the BANK ER schema of Figure 7.21, and suppose that it is necessary to keep track of different types of ACCOUNTS (SAVINGS_ACCTS, CHECKING_ACCTS, ...) and LOANS (CAR_LOANS, HOME_LOANS, ...)....
Map the COMPANY ER schema of Figure 7.2 into ODL classes. Include appropriate methods for each class.
Consider the following relation: CAR_SALE (CarID, Option_type, Option_Listprice, Sale_date, Discounted_price) This relation refers to options installed on cars (e.g.- cruise control) that were sold...
What update anomalies occur in the EMP_PROJ and EMP_DEPT relations of Figure 15.3 and 15.4?
A file has r=20,000 STUDENT records of fixed-length. Each record has the following fields: NAME (30 bytes), SSN (9 bytes), ADDRESS (40 bytes), PHONE (9 bytes), BIRTHDATE (8 bytes), SEX (1 byte),...
Suppose that only 80% of the STUDENT records from Exercise 17.28 have a value for PHONE, 85% for MAJORDEPTCODE, 15% for MINORDEPTCODE, and 90% for DEGREEPROGRAM, and we use a variable-length record...
Consider a reliable data transfer protocol that uses only negative acknowledgments. Suppose the sender sends data only infrequently. Would a NAK-only protocol be preferable to a protocol that uses...
Suppose within your Web browser you click on a link to obtain a Web page. The IP address for the associated URL is not cached in your local host, so a DNS lookup is necessary to obtain the IP...
Referring to Problem P7, suppose the HTML file references eight very small objects on the same server. Neglecting transmission times, how much time elapses with a. Non-persistent HTTP with no...
If all the links in the Internet were to provide reliable delivery service, would the TCP reliable delivery service be redundant? Why or why not?
Suppose that all the Switches In FIgure S .16 are replaced by hubs. All links are 100 Mbps. Now answer the questions posed in problem P29.
Consider the scenario shown in Figure 6.33, in which there are four wireless nodes, A, B, C, and D. The radio coverage of the four nodes is shown via the shaded ovals; all nodes share the same...
Notown Records has decided to store information about musicians who perform on its albums (as well as other company data) in a database. The company has wisely chosen to hire you as a database...
Draw an inheritance hierarchy for students at a university similar to the hierarchy shown in Fig. 9.2. Use Student as the superclass of the hierarchy, then extend Student with classes Undergraduate...
Read [Nog00] and write a two- or three-page paper that discusses the impact of "chaos" on software engineering.
Develop a complete use case for one of the following activities: a. Making a withdrawal at an ATM b. Using your charge card for a meal at a restaurant c. Buying a stock using an on-line brokerage...
When should a modular design be implemented as monolithic software? How can this be accomplished? Is performance the only justification for implementation of monolithic software?
Assume that Marcia has created a database with the tables described at the end of Chapter 7: CUSTOMER (Customer, First Name, Last Name, Phone, Email) INVOICE (Invoice Number, CustomerID, Date In,...
Describe the process of assigning an FC address to a node when logging on to the network for the first time.
List three of the many drawbacks of cloud computing for organizations.
What costs need to be estimated to prepare a budget?
Match the following terms with their definitions: 1. Business continuity plan (BCP) 2. Completeness check 3. Hash total 4. Incremental daily backup 5. Archive 6. Field check 7. Sign check 8. Change...
Fidelity Corporation offers to hire Ron to replace Monica, who has given Fidelity a month's notice to quit. Fidelity gives Ron a week to decide whether to accept. Two days later, Monica signs an...
What problems and challenges did Home Depot experience?
Add the above two assignment statements to your cipher.html page so that it properly encodes messages containing both uppercase and lowercase letters. As before, any non-letters (including spaces and...
Suppose you need to generate a random permutation of the first N integers. For example, {4, 3, 1, 5, 2} and {3, 1, 4, 2, 5} are legal permutations, but {5, 4, 1, 2, 1} is not, because one number (1)...
Efficiently implement a queue class using a singly linked list, with no header or tail nodes.
Show the result of inserting the keys 10111101, 00000010, 10011011, 10111110, 01111111, 01010001, 10010110, 00001011, 11001111, 10011110, 11011011, 00101011, 01100001, 11110000, 01101111 into an...
Sort the sequence 3, 1, 4, 1, 5, 9, 2, 6, 5 using insertion sort.
Using the quicksort implementation in this chapter, determine the running time of quicksort for a. Sorted input b. Reverse-ordered input c. Random input
a. Find the shortest path from A to all other vertices for the graph in Figure 9.82. b. Find the shortest unweighted path from B to all other vertices for the graph in Figure 9.82. 3 D 3. 2.
The input is a list of league game scores (and there are no ties). If all teams have at least one win and a loss, we can generally prove, by a silly transitivity argument, that any team is better...
The object of the Kevin Bacon Game is to link a movie actor to Kevin Bacon via shared movie roles. The minimum number of links is an actor's Bacon number. For instance, Tom Hanks has a Bacon number...
Identify at least three ways a TPS can provide a firm with a competitive advantage. Develop an example of one way a firm could gain a competitive advantage from a TPS.
Rogers Communications is one of Canada's largest telecom companies. It offers home phone services, wireless phone services, Internet service, and cable TV service. Rogers provides small shops in 93...
For hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three-layer hierarchy? A good starting place is the...
The byte-counting variant of the leaky bucket algorithm is used in a particular system. The rule is that one 1024-byte packet, or two 512-byte packets, etc., may be sent on each tick. Give a serious...
What are five main functions of a database administrator?
List seven programming languages that are procedural and two that are nonprocedural. Which group is easier to learn and use? Explain your answer.
Define the concept of aggregation. Give two examples of where this concept is useful.
List two major problems with processing update operations expressed in terms of views.
Let R = (A, B, C), and let r1 and r2 both be relations on schema R. Give an expression in the domain relational calculus that is equivalent to each of the following: a. IIA(r1) b. B =17 (r1) c. r1 ...
Consider the relational database of Figure. Give an expression in SQL for each of the following queries. a. Modify the database so that Jones now lives in Newtown. b. Give all employees of First Bank...
Consider a view branch-cust defined as follows: create view branch-cust as select branch-name, customer-name from depositor, account where depositor.account-number = account.account-number Suppose...
List the three design goals for relational databases, and explain why each is desirable.
Redesign the database of Exercise 9.1 into first normal form and fourth normal form. List any functional or multivalued dependencies that you assume. Also list all referential-integrity constraints...
For each B+-tree as shown below show the steps involved in the following queries: a. Find records with a search-key value of 11. b. Find records with a search-key value between 7 and 17, inclusive....
For each B+-tree as shown below show the form of the tree after each of the following series of operations: a. Insert 9. b. Insert 10. c. Insert 8. d. Delete 23. e. Delete 19. Construct a B+-tree for...
Repeat as shown below for a B-tree. Construct a B+-tree for the following set of key values: (2, 3, 5, 7, 11, 17, 19, 23, 29, 31) Assume that the tree is initially empty and values are added in...
Estimate the number of block accesses required by your solution to Exercise for r1 r2, where r1 and r2 are as defined in Exercise.
Describe how to incrementally maintain the results of the following operations, on both insertions and deletions. a. Union and set difference b. Left outer join
Consider the following two transactions: T 31 : read (A); read (B); If A = 0 then B: = B + 1; write (B). T 32 : read (B); read (A); If B = 0 then A: = A + 1; write (A). Add lock and unlock...
In timestamp ordering, W-timestamp (Q) denotes the largest timestamp of any transaction that executed write (Q) successfully. Suppose that, instead, we defined it to be the timestamp of the most...
Compare the deferred- and immediate-modification versions of the log-based recovery scheme in terms of ease of implementation and overhead cost.
Why is it relatively easy to port a database from a single processor machine to a multiprocessor machine if individual queries need not be parallelized?
Consider a main-memory database system recovering from a system crash. Explain the relative merits of Loading the entire database back into main memory before resuming transaction processing ...
Define in your own words: (a) Intelligence, (b) Artificial intelligence, (c) Agent.
How could introspectionreporting on ones inner thoughtsbe inaccurate? Could I be wrong about what Im thinking? Discuss.
Examine the Al literature to discover whether the following tasks can currently be solved by computers: a. Playing a decent game of table tennis (ping-pong). b. Driving in the center of Cairo. c....
Implement a simple reflex agent for the vacuum environment in Exercise 2.7. Run the environment simulator with this agent for all possible initial dirt configurations and agent locations. Record the...
Repeat Exercise 2.10 for the case in which the location sensor is replaced with a bump sensor that detects the agents attempts to move into an obstacle or to cross the boundaries of the environment....
Give the initial state, goal test, successor function, and cost function for each of the following. Choose a formulation that is precise enough to be implemented. a. You have to color a planar map...
Give the name of the algorithm those results from each of the following special cases: a. Local beam search with k = 1. b. Local beam search with one initial state and no limit on the number of...
Explain why it is a good heuristic to choose the variable that is most constrained, but the value that is 1act constraining in a CSP search
What is the worst-case complexity of running AC-3 on a tree-structured CSP?
Consider a vocabulary with only four propositions, A, B, C, and D. How many models are there for the following sentences? a. (A AB) V (B C) b. A V B c. A B C
Decide whether each of the following sentences is valid, un-satisfiable, or neither. Verify your decisions using truth tables or the equivalence rules of Figure. a. Smoke Smoke b. Smoke Fire c....
Is the sentence x, y x = y valid? Explain.
Consider a symbol vocabulary that contains c constant symbols, predicate symbols of each arity k, and fk function symbols of each arity k, where 1 k A. Let the domain size be fixed at D. For any...
Write down logical representations for the following sentences, suitable for use with Generalized Modus Ponens: a. Horses, cows and pigs arc mammals. b. An offspring of a horse is a horse. c....
In this question we will use the sentences you wrote in Exercise 9.9 to answer a question using a backward-chaining algorithm. a. Draw the proof tree generated by an exhaustive backward-chaining...
In this exercise, we will look at sorting in Prolog. a. Write Prolog clauses that define the predicate sorted (L), which is true if and only if list L is sorted in ascending order. b. Write a Prolog...
Investigate ways to extend the event calculus to handle simultaneous events. Is it possible to avoid a combinatorial explosion of axioms?
Here are two sentences in the language of first-order logic: a. Assume that the variables range over all the natural numbers 0, 1, 2, . . , and that > predicate means is greater than or equal to....
Explain why dropping negative effects from every action schema in a STRIPS problem results in a relaxed problem.
A complete solution to the problem of inexact matches to the buyers description in shopping is very difficult and requires a full array of natural language processing and information retrieval...
Recall that inheritance information in semantic networks can be captured logically by suitable implication sentences. In this exercise, we will consider the efficiency of using such sentences for...
Conditional effects were illustrated for the Suck action in the vacuum worldwhich square becomes clean depends on which square the robot is in. Can you think of a new set of propositional variables...
The following quotes are from the backs of shampoo bottles. Identify each as an unconditional, conditional, or execution monitoring plan. (a) Lather, Rinse, Repeat, (b) Apply shampoo to scalp and let...
Consider the following problem: A patient arrives at the doctors office with symptoms that could have been caused either by dehydration or by disease D (but not both). There are two possible actions:...
It is quite often useful to consider the effect of some specific propositions in the context of some general background evidence that remains fixed, rather than in the complete absence of...
Consider the following argument: In a framework that allows uncertain initial stares, disjunctive effects are just a notational convenience, not a source of additional representational power. For any...
Calculate the most probable path through the HMM in Figure for the output sequence [C1, C2, C3, C4, C4, C6, and C 7]. Also give itsprohahi1ity Phone HMM for [m]: 0.3 0.9 0.4 (0.7 0.1 0.6 FINAL Onset...
Assess your own utility for different incremental amounts of money by running a series of preference tests between some definite amount M1 and a lottery [p, M2; (1p), 0]. Choose different values of...
Write a computer program to automate the process in Exercise 16.4. Try your program out on several people of different net worth and political outlook. Comment on the consistency of your results,...
Can any finite search problem be translated exactly into a Markov decision problem such that an optimal solution of the latter is also an optimal solution of the former? If so, explain precisely how...
Consider an undiscounted MDP having three states, (1, 2, 3), with rewards 1, 2, 0 respectively. State 3 is a terminal stale. In states I and 2 there are two possible actions: a and b. The transition...
Solve the game of three-finger Morra.
Prior to 1999, teams in the National Hockey League received 2 points for a win, 1 for a tie, and 0 for a loss. Is this a constant-sum game? In 1999, the rules were amended so that a team receives 1...
The following payoff matrix, from Blinder (1983) by way of Bernstein (1996), shows a game between politicians and the Federal Reserve. Politicians can expand or contract fiscal policy, while the Fed...
Suppose that an attribute splits the set of examples E into subsets E i and that each subset has p, positive examples and n negative examples. Show that the attribute has strictly positive...
Show, by translating into conjunctive normal form and applying resolution, that the conclusion drawn concerning Brazilians is sound.
Fill in the missing values for the clauses C1 or C2 (or both) in the following sets of clauses, given that C is the re solvent of C1 and C2: a. C = True P (A, B), C1 = P (x, y) Q(x, y), C2 =?? b. C...