What potential advantages do optical processors offer compared with electrical processors?
Which is the better measure of computer system performance a benchmark, such as SPEC CINT, or a processor speed measure, such as GHz, MIPS, or MFLOPS? Why?
In what way(s) is/are SSDs an improvement over magnetic disk drives? In what way(s) isn't/aren't they an improvement over magnetic disk drives?
List and briefly describe the standards for recordable and rewritable CDs and DVDs. Are any of them to clearly superior to their competitors?
Describe three types of multicomputer configurations. What are their comparative advantages and disadvantages?
What are the binary, octal, and hexadecimal representations of the decimal number 10?
What is excess notation? What is twos complement notation? Why are they needed? In other words, why cant integer values be represented by ordinary binary numbers?
How is an array stored in main memory? How is a linked list stored in main memory? What are their comparative advantages and disadvantages? Give examples of data that would be best stored as an array...
Given two strings a = a 0 a 1 . . .a p and b = b 0 b 1 . . .b q , where each a i and each b j is in some ordered set of characters, we say that string a is lexicographically less than string b if...
What are special-purpose registers? Give three examples of special-purpose registers and explain how each is used.
Define word size. What are the advantages and disadvantages of increasing word size?
Why should you defragment magnetic disk drives? Why should you avoid defragmenting SSDs?
Describe the processes of reading from and writing to a phase-change optical disc. How to the performance and areal density of these discs compare with magnetic disks?
Which factors do magnetic storage device manufacturers balance to ensure high capacity and performance at reasonable cost and reliability?
The DatagramPacket class has two constructors (see Table 25.11). Which constructor can be used as a sending packet? Table 25.11 Some methods in DatagramPacket class public final class...
Give examples of 1:1, 1:N, and N:M relationships (other than those presented in this chapter). Draw two E-R diagrams for each of your examples: one using the traditional diamond notation and one...
Describe the factors that contribute to a disk drives average access time. Which of these factors is improved if the spin rate is increased? Which is improved if areal density is increased?
How is data stored and retrieved on a magnetic mass storage device?
Describe serial, random, and parallel access. What types of storage devices use each method?
Why isnt flash RAM commonly used to implement primary storage?
Explain the need for each of the actions in Figure 6-29(b). Actions When Child Is Required Child Required Action on Parent Get a child. Prohibit. Update the foreign key of (at least one) child....
Explain the need for each of the actions in Figure 6-29(a). Parent Required Action on Parent Action on Child Insert None. Get a parent. Prohibit. Change children's foreign Modify key or foreign key...
You're is professional, and your boss has asked you to prepare a briefing for senior staff on the comparative advantages and disadvantages of three competing secondary storage technologies: magnetic...
What are the differences between static and dynamic RAM?
What factors limit the speed of an electrically based processing device?
What characteristics of the CPU and primary storage should be balanced to achieve maximum system performance?
What improvements are offered by synchronous DRAM compared with ordinary DRAM?
Why is the areal density of optical discs higher than the areal density of magnetic disks? What factors limit this areal density?
What is the system bus? What are its primary components?
What is a bus master? What is the advantage of having devices other than the CPU be a bus master?
What is an interrupt? How is an interrupt generated? How is it processed?
Describe the execution of the push and pop operations.
Whats the difference between a physical access and logical access?
What is a buffer? Why might one be used?
How can a cache be used to improve performance when reading data from and writing data to a storage device?
Whats the difference between lossy and lossless compression? For what types of data is lossy compression used?
Describe the process by which keystrokes are recognized by the software.
What is a font? What is point size?
What are the additive colors? What are the subtractive colors? What types of I/O devices use each kind of color?
What is a bitmap? How does a bitmaps chromatic resolution affect its size?
What is an image description language? What are the advantages of representing images with image description languages?
Why does a video controller have its own processor and memory?
Describe the technologies used to implement flat panel displays. What are their comparative advantages and disadvantages?
1. Based on the information here, draw a domain model class diagram for the MLS system. Be sure to consider what information needs to be included versus information that is not in the problem domain....
What is a state transition?
List and briefly describe the three elements of the fraud triangle. Over which element can a system designer exercise the greatest control?
Describe three low-level P2P interprocess communication standards. What are the advantages and disadvantages of using these standards to implement distributed multilayer applications?
Whats the difference between a real resource and a virtual resource?
Briefly define the terms technology architecture and application architecture. How are they different? How are they interdependent?
Given the database table in Figure 9-27 of university course and sections offered, normalize the table so that it is in third normal form. Hint: Look for functional dependencies.
1. Based on the use case diagram and other project information, develop a list of software components (subsystems) that must be acquired or developed. Describe the function(s) of each component in...
Section 7.7.1 provides some of the successor-state axioms required for the wumpus world. Write down axioms for all remaining fluent symbols.
Explain why every nonempty propositional clause, by itself, is satisfiable. Prove rigorously that every set of five 3-SAT clauses is satisfiable, provided that each clause mentions exactly three...
Prove that GRAPH-SEARCH satisfies the graph separation property illustrated in Figure 3.9. Begin by showing that the property holds at the start, then show that if it holds before an iteration of the...
Prove, or find a counterexample to, each of the following assertions: a. If or |= (or both) then ( ) b. If ( ) then and . c. If ( ) then or (or both).
Let us examine the rationality of various vacuum-cleaner agent functions. a. Show that the simple vacuum-cleaner agent function described in Figure 2.3 is indeed rational under the assumptions listed...
Trace the behavior of DPLL on the knowledge base in Figure 7.16 when trying to prove Q, and compare this behavior with that of the forward-chaining algorithm. Figure 7.16 LAM = P P L 3D M L L B...
Construct an example of two clauses that can be resolved together in two different ways giving two different outcomes.
In the blocks world we were forced to introduce two action schemas, Move and MoveToTable, in order to maintain the Clear predicate properly. Show how conditional effects can be used to represent both...
Suppose the Flip action always changes the truth value of variable L. Show how to define its effects by using an action schema with conditional effects. Show that, despite the use of conditional...
Suppose you are given a coin that lands heads with probability x and tails with probability 1 x. Are the outcomes of successive flips of the coin independent of each other given that you know the...
Consider a vocabulary with the following symbols: Occupation(p, o): Predicate. Person p has occupation o. Customer (p1, p2): Predicate. Person p1 is a customer of person p2. Boss(p1, p2): Predicate....
Prove that the judgments B A and C D in the Allais paradox violate the axiom of substitutability.
Run an SQL SELECT query to demonstrate that the view PopularShowsView was constructed correctly.
In his letter of August 24, 1654, Pascal was trying to show how a pot of money should be allocated when a gambling game must end prematurely. Imagine a game where each turn consists of the roll of a...
Show that the statement of conditional independence is equivalent to each of the statements P(X,Y |Z) = P(X Z)P(Y | Z) P(X |Y, Z) = P(X|Z) and P(BX,Z)= P(Y|Z). and P(B|X, Z) = P(Y | Z).
Write an SQL CREATE TABLE statement to create a table named PICTURE using the column characteristics as shown in Figure 10C-98. Run the SQL statement to create the PICTURE table in the MEDIA database.
This exercise explores the stationary distribution for Gibbs sampling methods. a. The convex composition [, q 1 ; 1 , q 2 ] of q 1 and q 2 is a transition probability distribution that first chooses...
Economists often make use of an exponential utility function for money: U(x) = e x/R , where R is a positive constant representing an individuals risk tolerance. Risk tolerance reflects how likely an...
Translate 0xabcdef12 into decimal.
Do routers have IP addresses? If so, how many?
This exercise is concerned with filtering in an environment with no landmarks. Consider a vacuum robot in an empty room, represented by an nmrectangular grid. The robots location is hidden; the only...
Garden Glory is a partnership that provides gardening and yard maintenance services to individuals and organizations. Garden Glory is owned by two partners. They employ two office administrators and...
Languages that let you use an easily understood vocabulary of descriptive terms, such as read, write, or add, are known as ____________languages. a. Procedural b. High-level c. Machine d....
The rules of a programming language constitute its ____________. a. Syntax b. Logic c. Format d. Objects
Arguments to methods always appear within ____________. a. Parentheses b. Double quotation marks c. Single quotation marks d. Curly braces
You save text files containing Java source code using the file extension ____________. a. .java b. .class c. .txt d. .src
Which of the following elements is not required in a variable declaration? a. A type b. An identifier c. An assigned value d. A semicolon
The assignment operator in Java is _____________. a. = b. == c. := d. ::
A boolean variable can hold _____________. a. Any character b. Any whole number c. Any decimal number d. The value true or false
The value 137.68 can be held by a variable of type _____________. a. int b. float c. double d. Two of these are correct.
An escape sequence always begins with a(n) _____________. a. e b. Forward slash c. Backslash d. Equal sign
Which Java statement produces w on one line and xyz on the next line? a. System.out.println(wxyz); b. System.out.println(w + xyz); c. System.out.println(w xyz); d. System.out.println(w x y z);
In Java, what is the value of 3 + 7 * 4 + 2? a. 21 b. 33 c. 42 d. 48
Which assignment is correct in Java? a. double money = 12; b. double money = 12.0; c. double money = 12.0d; d. All of the above are correct.
Which assignment is correct in Java? a. char aChar = 5.5; b. char aChar = W; c. char aChar = '*'; d. Two of these are correct.
In each case, determine the problem and fix the application. After you correct the errors, save each file using the same filename preceded with Fix. For example, DebugTwo1.java will become...
A public static method named computeSum() is located in ClassA. To call the method from within ClassB, use the statement _____________. a. ClassA.computeSum(); b. ClassB(computeSum()); c....
The method public static boolean testValue(int response) returns _____________. a. No value b. An int value c. A boolean value d. You cannot determine what is returned.
A structure that allows repeated execution of a block of statements is a ____________. a. Cycle b. Ring c. Loop d. Band
A loop that never ends is a(n) ____________loop. a. Infinite b. Iterative c. Structured d. Illegal
To construct a loop that works correctly, you should initialize a loop control ____________. a. Condition b. Constant c. Structure d. Variable
What is the output of the following code? b = 3; while(b < 6) { System.out.print(b + " "); b = b + 1; } a. 3 b. 3 4 5 c. 3 4 5 6 d. 3 3 3 3 3 3
If m = 9, then after n = m++, the value of m is ____________. a. 8 b. 9 c. 10 d. 11
If m = 9, then after n = m++, the value of n is ____________. a. 8 b. 9 c. 10 d. 11
If j = 5 and k = 6, then the value of j++ == k is ____________. a. 5 b. 6 c. True d. False
You must always include ____________ in a for loops parentheses. a. Two semicolons b. Three semicolons c. Two commas d. Three commas
What does the following program segment output? d = 0; do { System.out.print(d + " "); d++; } while (d < 2); a. 0 b. 0 1 c. 0 1 2 d. Nothing
Suppose that you declare two String objects as: String word1 = new String("happy"); String word2 = new String("happy"); The value of word1.equals(word2) is ____________. a. True b. False c. Illegal...
Eliza is a famous 1966 computer program written by Joseph Weizenbaum. It imitates a psychologist (more specifically, a Rogerian therapist) by rephrasing many of a patients statements as questions and...