Show the structure of a PLA with three inputs (C, B, A) and four outputs (O0, O1, O2, O3), with the outputs defined as follows: o,-ABC AB + AB O ABC ABC 02-C 03-AB + AB
Design an 8-to-1 multiplexer.
Define predication and predicated execution.
Define control speculation.
What is the purpose of the NaT bit?
Define data speculation.
Suppose that an IA-64 opcode accepts three registers as operands and produces one register as a result. What is the maximum number of different operations that can be defined in one major opcode...
Simplify the following expressions: a. A = S T + V W + R S T b. A = T U V + X Y + Y c. A = F (E + F + G) d. A = (P Q + R + S T)T S e. f. g. A = (B E + C + F) C A D.DE
Assume that a stack register frame is created with size equal to SOF = 48. If the size of the local register group is SOL = 16, a. How many output registers (SOO) are there? b. Which registers are in...
What is the maximum effective number of major opcodes?
The initial Itanium implementation had two M-units and two I-units. Which of the templates in Table 21.3 cannot be paired as two bundles of instructions that could be executed completely in parallel?
In Section 21.3, we introduced the following constructs for predicated execution: where crel is a relation, such as eq, ne, etc.; p1, p2, and p3 are predicate registers; a is either a register or an...
For the predicated program in Section 21.3, which implements the flowchart of Figure 21.4, indicate a. Those instructions that can be executed in parallel b. Those instructions that can be bundled...
List some disadvantages of assembly language compared to high-level languages.
List some advantages of assembly language compared to high-level languages.
What happens if we pit Imp against Dwarf?
Give three examples of social engineering not listed in the text.
(a) What are the advantages of placing security within IT? (b) What are the disadvantages of placing security within IT? (c) What do most IT security analysts recommend about placing or not placing...
(a) What is the most common attack against wireless networks? Why? (b) Which IEEE standard governs WLAN transmission? (c) Which device acts as a relay between wired and wireless networks? (d) What is...
(a) Why do hosts use ARP? (b) Can ARP poisoning be used outside the LAN? Why not? (c) Why do hosts send ARP requests? (d) What is ARP spoofing? (e) How could an attacker use ARP spoofing to...
(a) Distinguish between mandatory access controls and discretionary access controls. (b) What is multilevel security? (c) What are SBU documents? (d) Do they need to be considered in access controls?...
a) How does a SQL injection attack work? b) What is SQL? c) What is error-based inference? d) What is the difference between in-band and out-of-band SQL injection? e) What is blind SQL injection? f)...
a) What different actions do criminal and civil law deal with? b) How do punishments differ in civil and criminal law? c) Who brings lawsuits in civil and criminal cases? d) What is the normal...
Identify some informal queries and update operations that you would expect to apply to the database shown in Figure 1.2.
Specify the following queries in SQL on the database schema of Figure 1.2. (a) Retrieve the names and major departments of all straight-A students (students who have a grade of A in all their...
Show the FP tree that would be made for the data from Exercise 28.14.
Consider the following relation: CAR_SALE(Car#, Date_sold, Salesman#, Commision%, Discount_amt Assume that a car may be sold by multiple salesmen and hence {CAR#, SALESMAN#} is the primary key....
In what normal form is the LOTS relation schema in Figure 15.12(a) with respect to the restrictive interpretations of normal form that take only the primary key into account? Would it be in the same...
Prove that any relation schema with two attributes is in BCNF.
Consider the universal relation R = {A, B, C, D, E, F, G, H, I} and the set of functional dependencies F = { {A, B} -> {C}, {A} -> {D, E}, {B} -> {F}, {F} -> {G, H}, {D} -> {I, J} }. What is the key...
Specify a template dependency for join dependencies.
Can you think of techniques other than an unordered overflow file that can be used to make insertion in an ordered file more efficient?
Modify the data structures for multiple-mode locks and the algorithms for read_lock(X), write_lock(X), and unlock(X) so that upgrading and downgrading of locks are possible.
Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k time units, where k is small and fixed). Also, when such an application...
What is an overlay network? Does it include routers? What are the edges in the overlay network? How is the query-flooding overlay network created and maintained?
This elementary problem begins to explore propagation delay and transmission delay, two central concepts in data networking. Consider two hosts, A and B, connected by a single link of rate R bps....
Consider a short, l0-meter link, over which a sender can transmit at a rate of 150 bits/sec in both directions. Suppose that packets containing data are 100,000 bits long, and packets containing only...
Consider the GBN and SR protocols. Suppose the sequence number space is of size k. What is the largest allowable sender window that will avoid the occurrence of problems such as that in Figure 3.27...
Answer true or false se to the following questions and briefly justify your answer: a. With the SR protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its...
Suppose we have two network entities, A and B. B has a supply of data messages that will be sent to A according to the following conventions. When A gets a request from the layer above to get the...
In Section 3.5.3, we discussed TCP's estimation of RTT. Why do you think T P avoids measuring the SampleRTT for retransmitted segments?
Consider Figure 3.46(b). If in increases beyond R/2, can Out increase beyond R/3 ? Explain. Now consider Figure 3.46(c). If in increases beyond R/2, can Out increase beyond R/4 under the assumption...
Consider Figure 3.58. Assuming TCP Reno is the protocol experiencing the behavior shown above, answer the following questions. In all cases, you should provide a short discussion justifying your...
Recall the macroscopic description of TCP throughput. In the period of time from when the connection's rate varies from W/(2. RTT) to W/RTT, only one packet is lost (at the very end of the period)....
In our discussion of TCP futures in Section 3.7, we noted that to achieve a throughput of 10 Gbps, TCP could only tolerate a segment loss probability of 2 10-)10 (or equivalently, one loss event for...
Repeat Problem 43, but replacing the 10 Mbps link with a 10 Gbps link. Note that in your answer to part c, you will realize that it takes a very long time for the congestion window size to reach its...
What is the difference between a group-shared tree and a source-based tree in the context of multicast routing?
Consider the network setup in Figure 4.22. Suppose that the ISP instead assigns the router the address 24.34.112.235 and that the network address of the home network is 192.168. 1124. a) Assign...
Consider the network shown in Problem P24. Using Dijkstra's algorithm, and showing your work using a table similar to Table 4.3, do the following: a. Compute the shortest path from t to all network...
Consider the operation of the reverse path forwarding (RPF) algotithm in Figure 4.44. Using the same topology, find a set of paths from all nodes to the source node A (and indicate these paths in a...
Consider three LANs interconnected by two routers, as shown in Figure 5JX. a. Assign IP addresses to all of the interfaces. For Subnet I use addresses of the form 192.168. I .xxx; for Subnet 2 uses...
Consider a 100 Mbps 100BASE-T Ethernet with all nodes directly connected to a hub. To have an efficiency of 0.50, what should be the maximum distance between a node and the hub? Assume a frame length...
Suppose the information portion of a packet (D in Figure SA) contains 10 bytes consisting of the 8-bit unsigned binary ASCII representation of string "Link Layer." Compute the Internet checksum for...
In this problem, we explore some of the properties of the CRC. For the generator G (=1001) given in Section 5.2.3, answer the following questions. a. Why can it detect any single bit error in data D?...
What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity? Can you have integrity without confidentiality? Justify your answer.
Assume that you will use simple parity protection in Exercises 6.24 through 6.27. Specifically, assume that you will be computing one parity block for each file in the file system. Further, assume...
Write a Python program in which the user enters either 'A', 'B', or 'C'. If 'A' is entered, the program should display the word 'Apple'; if 'B' is entered, it displays 'Banana'; and if 'C' is...
Identify all the errors in the following repetition statements. Some errors are syntactical while others are logical (e.g., infinite loops). a. for (int i = 10; i > 0; i++) { x = y; a = b; } b. int...
What are the advantages of a virtualized data center over a classic data center?
Suppose m and r are integers. Write a Java expression for mr2 to obtain a floating point result.
The following algorithm is designed to print the beginning of what is known as the Fibonacci sequence. Identify the body of the loop. Where is the initialization step for the loop control? The...
Describe agility (for software projects) in your own words.
Write a program that reads in an investment amount, the annual interest rate, and the number of years, and displays the future investment value using the following formula: futureInvestmentValue =...
Write a program that creates a Random object with seed 1000 and displays the first 50 random integers between 0 and 100 using the nextInt(100) method.
Briefly answer the following questions: 1. Explain the intuition behind the two rules in the Bell-LaPadula model for mandatory access control. 2. Give an example of how covert channels can be used to...
Listing 2.6, ShowCurrentTime.java, gives a program that displays the current time in GMT. Revise the program so that it prompts the user to enter the time zone offset to GMT and displays the time in...
1. In what way are general-purpose registers and main memory cells similar? 2. In what way do general-purpose registers and main memory cells differ?
1.Which of the following is a valid delegate definition? a.private delegate float MyDelegate(float); b.private delegate MyDelegate(x); c.private delegate MyDelegate(float x); d.private delegate void...
1.What is the parameter in this method known as? public void displayAbsoluteValue(int value = 1) a.Modified b.Optional c.Named d.Default 2.When you create an abstract method, how do you use that...
If the message xxy yyx xxy xxyy were compressed using LZW with a starting dictionary whose first, second, and third entries were x, y, and space, respectively, what would be the entries in the final...
Declare variables to represent a person's name, age, and hourly wage.
Encode the following values using the 8-bit floating-point format described in Figure 1.26.Indicate each case in which a truncation error occurs. a. - 7 b. c. - 3 d. 732 e. 3132
Which components constitute the disk service time? Which component contributes the largest percentage of the disk service time in a random I/O operation?
An application has 1,000 heavy users at a peak of 2 IOPS each and 2,000 typical users at a peak of 1 IOPS each. It is estimated that the application also experiences an overhead of 20 percent for...
Define load balancing and scaling in the context of multiprocessor architectures.
Is unit testing possible or even desirable in all circumstances? Provide examples to justify your answer.
A yield sign encloses the word YIELD within a triangle. Write a program that displays a yield sign. (Use stars to represent the sides of the triangle.) Discuss.
Is it possible to begin coding immediately after an analysis model has been created? Explain your answer and then argue the counterpoint.
Consider schedules S3, S4, and S5 below. Determine whether each schedule is strict, cascadeless, recoverable, or nonrecoverable. (Determine the strictest recoverability condition that each schedule...
Identify a situation in a multiprogramming system in which a process does not consume the entire time slice allocated to it.
Create an interface MessageEncoder that has a single abstract method encode(plainText), where plainText is the message to be encoded. The method will return the encoded message. Create a class...
Consider the page table for a system with 12-bit virtual and physical addresses with 256-byte pages. The list of free page frames is D, E, F (that is, D is at the head of the list E is second, and F...
Elementary physics states that when an object is subjected to a constant acceleration a, the relationship between distance d and time t is given by d = (1/2)*a*t^2. Suppose that, during a seek, the...
Assuming there are no accidents or delays, the distance that a car travels down the interstate can be calculated with the following formula: Distance = Speed Time Create a VB application that allows...
Many financial experts advice that property owners should insure their homes or buildings for at least 80% of the amount it would cost to replace the structure. Create a VB application that lets the...
Why were the tables populated in the order shown in Review Questions 7.14-7.17? In Review Questions 7.14, write INSERT statements to add the data shown in Figure 1-30 to the DEPARTMENT table. Run...
Suppose a right triangle is placed in a plane as shown below. The right-angle point is at (0, 0), and the other two points are at (200, 0), and (0, 100). Write a program that prompts the user to...
Hardware vendor XYZ Corp. claims that their latest computer will run 100 times faster than that of their competitor, Prunes, Inc. If the Prunes, Inc. computer can execute a program on input of size n...
Some CPUs provide for more than two modes of operation. What are two possible uses of these multiple modes? Discuss.
If each sector on a magnetic disk contains 1024 bytes, how many sectors are required to store a single page of text (perhaps 50 lines of 100 characters) if each character is represented in Unicode?
Encode the following sentences in ASCII using even parity by adding a parity bit at the high-order end of each character code: a. Does 100/5 = 20? b. The total cost is $7.25.
Encode each of the following bit patterns using dotted decimal notation. a. 000001010001001000100011 b. 1000000000100000
Give an example of a set of steps that conforms to the informal definition of an algorithm given in the opening paragraph of Section 5.1 but does not conform to the formal definition given in Figure...
What problems could arise during maintenance if a large software system were designed in such a way that all of its data elements were global?
Why does the lossy nature of standard Ethernet make it unsuitable for a layered FCoE implementation? How does Converged Enhanced Ethernet (CEE) address this problem?
Answer each of the following in terms of an operating system that you use: a. How does the operating system restrict access to only those who are approved users? b. How do you ask the operating...
What is the focus when referring to a running application?
What primary characteristics should an OID possess?
Consider the following relation: a. Given the previous extension (state), which of the following dependencies may hold in the above relation? If the dependency cannot hold, explain why by specifying...
How does iSCSI handle the process of authentication? Research the available options.