Figure 17.23 shows the state diagrams of two possible cache coherence protocols. Deduce and explain each protocol, and compare each to MESI. Figure 17.23 Two Cache Coherence Protocols RO) RU) Wo Rii...
Convert the following decimal numbers to their binary equivalents: a. 64 b. 100 c. 111 d. 145 e. 255
An earlier version of the IBM mainframe, the S/390 G4, used three levels of cache.As with the z990, only the first level was on the processor chip [called the processor unit (PU)].The L2 cache was...
Consider the following problem. A designer has available a chip and decided what fraction of the chip will be devoted to cache memory (L1, L2, L3). The remainder of the chip can be devoted to a...
Consider the following C program: /* a simple C program to average 3 integers */ main ( ) { int avg; int i1 = 20; int i2 = 13; int i3 = 82; avg = (i1 + i2 + i3)/3; } Write an NASM version of this...
Specify all the relationships among the records of the database shown in Figure 1.2.
Consider an entity type SECTION in a UNIVERSITY database, which describes the section offerings of courses. The attributes of SECTION are SectionNumber, Semester, Year, CourseNumber, Instructor,...
Suppose that a disk unit has the following parameters: seek time s=20 msec; rotational delay rd=10 msec; block transfer time btt=1 msec; block size B=2400 bytes; interblock gap size G=600 bytes. An...
Consider the switch shown below. Suppose that all datagrams have the same fixed length, that the switch operates in a slotted, synchronous manner, and that in one time slot a datagram can be...
Consider the leaky-bucket policer (discussed in Section 7.5) that polices the average rate and burst size of a packet flow. We now want to police the peak rate, p , as well. Show how the output of...
Your company has just bought a new dual Pentium processor, and you have been tasked with optimizing your software for this processor. You will run two applications on this dual Pentium, but the...
Write a pseudocode algorithm that determines the batting average of a baseball player.
List five of the many benefits of cloud computing for organizations.
Create the problem definition for the CPU case. Read the interview with Hy Perteks in the CPU case found in Chapter 4.Go to www.pearsonhighered.com/kendall and click the CPU Student.
Design and create a Web page named stats.html that simulates a number of dice rolls and displays statistics on those rolls. The user should be able to specify the number of dice rolls via a text box...
Show that X62 can be computed with only eight multiplications.
Let G be a directed graph with N vertices. A vertex s is called a sink if, for every v in V such that s v, there is an edge (v, s), and there are no edges of the form (s, v). Give an O(N) algorithm...
Valero Energy is North America's largest refiner. When they recently acquired some competing refineries, Valero tripled its annual revenue to $90 billion. While Valero's rapid growth has been good...
Design a relational database corresponding to the E-R diagram of Figure. model year address Ticense driver-id name location car owns report-number uOSAad date accident participated driver...
Suppose that we decompose the schema R = (A, B, C, D, E) into (A, B, C) (A, D, E). Show that this decomposition is a loss less-join decomposition if the following set F of functional dependencies...
Use Armstrongs axioms to prove the soundness of the decomposition rule.
Use Armstrongs axioms to prove the soundness of the pseudotransitivity rule.
Given the database schema R (a, b, c), and a relation r on the schema R, write an SQL query to test whether the functional dependency b c holds on relation r. Alsowrite an SQL assertion that...
Consider the database schema Emp = (ename, set of(Children), setof(Skills)) Children = (name, Birthday) Birthday = (day, month, year) Skills = (type, set of(Exams)) Exams = (year, city) Assume that...
Explain why the allocation of records to blocks affects database-system performance significantly.
In the sequential file organization, why is an overflow block used even if there is, at the moment, only one overflow record?
Develop a formal proof of correctness for alpha-beta pruning. To do this, consider the situation shown in Figure. The question is whether to prune node nj, which is a max- node and a descendant of...
Prove each of the following assertions: a. is valid if and only if True | = . b. For any a, False | = . c. | = if and only if the sentence ( ) is valid. d. if and only if the sentence ( ) is...
Consider a knowledge base containing just two sentences: P() and P(h). Does this knowledge base entail V x P(x)? Explain your answer in terms of models.
For each pair of atomic sentences, give the most general unifier if it exists: a. P(A, B, B), P(x, y, z). b. Q(y, G (A, B)), Q (G(x, x), y) c. Older (Father (y), y), Older (Father(x), John). d. Knows...
Describe the event of trading something for something else. Describe buying as a kind of trading in which one of the objects traded is a sum of money.
To the medication problem in the previous exercise, add a Jest action that has the conditional effect Culture Growth when Disease is true and in any case has the perceptual effect Know (Culture...
In the childrens game of rock-paper-scissors each player reveals at the same time a choice of rock, paper, or scissors. Paper wraps rock, rock blunts scissors, and scissors cut paper. In the extended...
A simple perceptron cannot represent XOR (or, generally, the parity function of its inputs). Describe what happens to the weights of a four-input, step-function perceptron, and beginning with all...
Give an example of a business problem.
1. Describe the risks associated with planning the new CSS implementation and announcing the new Web ordering system to customers. Remember that the new CSS will replace the current telephone,...
In what major ways have information systems in business changed during the last 40 years? What is one major change you think will happen in the next 10 years? Refer to Figure to help you answer. The...
How have the Internet, intranets, and extranets affected the types and uses of data resources available to business professionals? What other database trends are also affecting data resource...
What challenges do you see for a company that wants to implement collaborative SCM systems? How would you meet such challenges?
Describe the principal steps in the analysis phase. What are the major deliverables?
What are the purposes of the system request and the feasibility analysis? How are they used in the project selection process?
Suppose that you are a project manager using the waterfall development methodology on a large and complex project. Your manager has just read the latest article in Computerworld that advocates...
Resolve the M:N relationship between the sale and available tune that is shown in Figure 6-14. What kinds of information could you capture about this relationship? What would the new ERD look like?...
Draw a data model for the following entities, considering the entities as representing a system for a patient billing system and including only the attributes that would be appropriate for this...
Draw the relationships that follow. Would the relationships be identifying or non identifying? Why? 1. A patient must be assigned to only one doctor, and a doctor can have many patients. 2. An...
List and describe the contents of the system specification.
I worked with a large financial institution in the southeast that suffered serious financial losses several years ago. A new chief executive officer was brought in to change the strategy of the...
Assume that you are developing a new system for a local real estate agency. The agency wants to keep a database of its own property listings and also wants to have access to the citywide multiple...
Why do we prototype the user interface design?
Why is it important to perform an interface evaluation before the system is built?
Under what conditions is heuristic evaluation justified?
Draw an ISD for a Web site that sells some retail products (e.g., books, music, clothes).
Create a physical level 0 DFD for the following, and compare it with the logical model that you created in Chapter 5: A Real Estate Inc. (AREI) sells houses. People who want to sell their houses sign...
What are the two dimensions in which to optimize a relational database?
Suppose that you are leading the conversion from one word processor to another at your university. Develop a conversion strategy. You have also been asked to develop a conversion strategy for the...
What are the three basic steps in managing organizational change?
Suppose that you are leading the installation of a new decision support system to help admissions officers manage the admissions process at your university. Develop a change management plan (i.e.,...
How is the use case diagram similar to the context and level 0 data flow diagrams (DFDs)? How is it different?
Identify and discuss the serious data redundancy problems exhibited by the file structure shown inFigure. PROJ NUM PROJ NAME EMP NUMEMP NAME JOB CODE JOB_ CHG HOUR PROJ HOURS EMP PHONE 1 Hurricane 1...
Create the relational diagram to show the relationship between DIRECTOR and PLAY.
For each table, identify the primary key and the foreign key(s). If a table does not have a foreign key, write None in the space provided.
Create the relational diagram for this database.
Write the business rules reflected in this ERD.
Use the following business rules to create a Crows Foot ERD. Write all appropriate connectivities and cardinalities in the ERD. a. A department employs many employees, but each employee is employed...
What is a subtype discriminator? Given an example of its use.
Given the following business scenario, create a Crows Foot ERD using a specialization hierarchy if appropriate. Two-Bit Drilling Company keeps information on employees and their insurance dependents....
Explain why it might be more appropriate to declare an attribute that contains only digits as a character data type instead of a numeric data type.
Using tables named T1 and T2, write a query example for each of the three join types you described in Question 2. Assume that T1 and T2 share a common column named C1.
Modify the query in Problem 30 to include the number of individual product purchases made by each customer. (In other words, if the customers invoice is based on three products, one per LINE_NUMBER,...
A computer has a cache, main memory, and a disk used for virtual memory. If a referenced word is in the cache, 20 ns are required to access it. If it is in main memory but not in the cache, 60 ns are...
A software approach to mutual exclusion is Lamports bakery algorithm [LAMP74], so called because it is based on the practice in bakeries and other shops in which every customer receives a numbered...
A process contains eight virtual pages on disk and is assigned a fixed allocation of four page frames in main memory. The following page trace occurs: a. Show the successive pages residing in the...
A 32-bit computer has two selector channels and one multiplexor channel. Each selector channel supports two magnetic disk and two magnetic tape units. The multiplexor channel has two line printers,...
Consider a 4-drive, 200 GB-per-drive RAID array. What is the available data storage capacity for each of the RAID levels, 0, 1, 3, 4, 5, and 6?
Until June 2012, PixelSense was called Surface. At that time, Microsoft repurposed the name to use on its tablet devices. Surface was changed to PixelSense. What conclusions do you draw from these...
Summarize the benefits of third-party cookies to consumers.
What does it mean to qualify a field name? How would you qualify the Street field in the Customer table?
Using data from the Premiere Products database, define a view named TopLevelCust. It consists of the number, name, address, balance, and credit limit of all customers with credit limits that are...
Write a program that stores names and telephone numbers in a database. Write another program that stores names and addresses in a database. Modify the programs to use external, conceptual, and...
Discuss the differences between DDL and DML? What operations would you typically expect to be available in each language?
Consider your business school or other academic unit as a business enterprise. a. Define several major data entity types and draw a preliminary enterprise data model (similar in notation to Figure...
Answer the following questions concerning Figures 1-17 and 1-18: Figures 1-17 Figures 1-18 a. What will be the field size for the ProductLineName field in the Product table? Why? b. In Figure 1-18,...
Why is it recommended that every ternary relationship be converted into an associative entity?
Explain where you can find business rules in an organization.
Match the following terms and definitions: _________ Supertype. a. subset of supertype _________ Entity cluster b. entity belongs to two subtypes _________ Subtype. c. subtype gets supertype...
For each of the following relations, indicate the normal form for that relation. If the relation is not in third normal form, decompose it into 3NF relations. Functional dependencies (other than...
Based on the EER diagram constructed for Problem and Exercise 3-34, develop a sample definition for each entity type, attribute, and relationship in the diagram. Consultant There are two types of...
Map the EER diagram you developed in Chapter 3, 3-44 to a relational schema using the techniques described in this chapter. Be sure to appropriately identify the primary and foreign keys as well as...
Indexing can clearly be very beneficial. Why should you not create an index for every column of every table of your database?
Suppose you are designing a default value for the age field in a student record at your university. What possible values would you consider, and why? How might the default vary by other...
Write SQL queries to answer the following questions: a. How many students are enrolled in Section 2714 in the first semester of 2015? b. Which faculty members have qualified to teach a course since...
Match the following terms to the appropriate definition: _________ Equijoina. Undoes changes to a table _________ Natural join..b. user-define data type _________ Outer join.c. SQL.: 1999 extension...
Write an SQL query to answer the following question: Which instructors are qualified to teach ISM 3113?
Write SQL queries to answer the following questions: a. How many students were enrolled in section 2714 during semester 1-2015? b. How many students were enrolled in ISM 3113 during semester 1-2015?
Which tutor needs to be reminded to turn in reports? Write the SQL command. Show how you constructed this query using a Venn or other type of diagram.
Write an SQL command to display each item ordered for order number 1, its standard price, and the total price for each item ordered.
Display the customer ID, name, and order ID for all customer orders. For those customers who do not have any orders, include them in the display once by showing order ID 0.
Indicate whether data administration or database administration is typically responsible for each of the following functions: a. Managing the data repository b. Installing and upgrading the DBMS c....
For each of the situations described below, select the type of analytics that would address the specific organizational need and justify your selection. a. A mid-sized bank would like to provide as...
What is the difference between an analog sensor and a discrete sensor?