One mode that some DMA controllers use is to have the device controller send the word to the DMA controller, which then issues a second bus request to write to memory. How can this mode be used to...
The Morris-Thompson protection scheme with n-bit random numbers (salt) was designed to make it difficult for an intruder to discover a large number of passwords by encrypting common strings in...
List and briefly define the possible states that define an instruction execution.
Develop an SEC code for a 16-bit data word. Generate the code for the data word 0101000000111001. Show that the code will correctly identify an error in data bit 5.
A process references five pages, A, B, C, D, and E, in the following order: A; B; C; D; A; B; E; A; B; C; D; E Assume that the replacement algorithm is first-in-first-out and find the number of page...
List and briefly explain two common ways of generating the condition to be tested in a conditional branch instruction.
Consider the following code fragment: if K > 10 L: = K + 1 else L: = K - 1; A straightforward translation of this statement into SPARC assembler could take the following form: The code contains a nop...
Assume that propagation delay along the bus and through the ALU of Figure 15.6 are 20 and 100 ns, respectively. The time required for a register to copy data from the bus is 10 ns. What is the time...
Assume a microinstruction set that includes a microinstruction with the following symbolic form: where AC0 is the sign bit of the accumulator and are the first seven bits of the microinstruction....
Consider the following C program: /* a simple C program to average 3 integers */ main ( ) { int avg; int i1 = 20; int i2 = 13; int i3 = 82; avg = (i1 + i2 + i3)/3; } Write an NASM version of this...
Could you get enough information from the Internet to take out a loan in another person's name?
Specify the following queries on the COMPANY relational database schema shown in Figure 3.5, using the relational operators discussed in this chapter. Also show the result of each query as it would...
Suppose we have the following requirements for a university database that is used to keep track of students' transcripts: (a) The university keeps track of each student's name (SNAME), student number...
Suppose Alice and Bob are sending packets to each other over a computer network. Suppose Trudy position. herself in the network so that she can capture all the packets sent by Alice and send whatever...
Now suppose that there are M paths between the server and the client. No two paths share any link. Path k (k = 1, . . . , M ) consists of N links with transmission rates Rk1, Rk2, .. . , RkN. If the...
We have said that an application may choose UDP for a transport protocol because UDP offers finer application control (than TCP) of what data is sent in a segment and when. a. Why does an application...
Host A is sending an enormous file to Host B over a TCP connection. Over this connection there is never any packet loss and the timers never expire. Denote the transmission rate of the link...
Let T (measured by RTT) denote the time interval that a TCP connection takes to increase its congestion window size from W/2 to W, where W is the maximum congestion window size. Argue that T is a...
In our discussion of TCP congestion control in Section 3.7, we implicitly assumed that the TCP sender always had data to send. Consider now the case that the TCP sender sends a large amount of data...
Consider two nodes, A and B, that use the slotted ALOHA protocol to contend for a channel. Suppose node A has more data to transmit than node B. and node A's retransmission probability PAis greater...
The following relations keep track of airline flight information: Flights (flno: integer, from: string, to: string, distance: integer, departs: time, arrives: time, price: real) Aircraft (aid:...
Consider the following BCNF relational schema for a portion of a company database (type information is not relevant to this question and is omitted): Project(pno, proj name, proj base dept, proj mgr,...
1. What is an advantage of a linked list over an array? A. Linked lists take up less space per element B. Linked lists can grow dynamically to hold individual new elements without copying existing...
Consider an ONLINE_AUCTION database system in which members (buyers and sellers) participate in the sale of items. The data requirements for this system are summarized as follows: The online site...
Consider the following MAILORDER relational schema describing the data for a mail order company. PARTS(Pno, Pname, Qoh, Price, Olevel) CUSTOMERS(Cno, Cname, Street, Zip, Phone) EMPLOYEES(Eno, Ename,...
Seventeen switches, with 16 ports each, are connected in a full mesh topology. How many ports are available for host and storage connectivity?
Create the explosion data flow diagram for process 4, DELETE COMPUTER. The following table summarizes input, process, and output. Describe each process and data flow in the repository. When...
Create and print the COMPUTER state chart diagram. There are two columns of states. In the left column, include the following states from the top to the bottom: NEW COMPUTER, CLEANING COMPUTER, and...
What are the benefits of implementing systems and software using cloud computing?
Match the following terms with their definitions TERM a. Data processing b. Source documents c. Turnaround documents d. Source data automation e. General ledger f. Subsidiary ledger g. Control...
Create a Web page named craps.html that simulates a game of craps. When the user clicks a button, this event should call a function that rolls the dice until the player wins or loses. When...
1. How does the Internet put small businesses on the same footing as large organizations? 2. What are two ways social networking sites such as Twitter can help a small business? 3. How can a site...
Given input {4371, 1323, 6173, 4199, 4344, 9679, 1989} and a hash function h(x) = x mod 10, show the resulting: a. Separate chaining hash table. b. Hash table using linear probing. c. Hash table...
Show the result of the following sequence of instructions: union(1,2), union(3,4), union(3,5), union(1,7), union(3,6), union(8,9), union(1,8), union(3,10), union (3,11), union(3,12), union(3,13),...
Find a topological ordering for the graph in Figure 9.81. A 2 2. 4 3 4 3 3 3 2. 4 6. 4) 2. 2.
a. Explain how to modify Dijkstra's algorithm to produce a count of the number of different minimum paths from v to w. b. Explain how to modify Dijkstra's algorithm so that if there is more than one...
Consider the problem of placing eight queens on an (eight-by-eight) chess board. Two queens are said to attack each other if they are on the same row, column, or (not necessarily main) diagonal. a....
How would you distinguish data and information? Information and knowledge?
Develop a brief proposal for creating a business Web site. How could you use Web services to make creating and maintaining the Web site easier and less expensive? Develop a simple spreadsheet to...
A disaster recovery plan should place emphasis on recovery of what sort of transaction processing systems?
Figure 4-32 shows a class list for Millennium College. Convert this user view to a set of 3NF relations using an enterprise key. Assume the following: An instructor has a unique location. A student...
Figure 4-34 (page 197) shows an EER diagram for a restaurant, its tables, and the waiters and waiting staff managers who work at the restaurant. Your assignment is to: a. Develop a relational schema....
Table 4-4 shows a relation called GRADE REPORT for a university. Your assignment is as follows: a. Draw a relational schema and diagram the functional dependencies in the relation. b. In what normal...
Figure 4-37 includes an EER diagram describing a publisher specializing in large edited works. Transform the diagram into a relational schema that shows referential integrity constraints (see Figure...
Consider the employee database of Figure. Give expressions in QBE, and Datalog for each of the following queries: a. Find the names of all employees who work for First Bank Corporation. b. Find the...
When is it preferable to use a dense index rather than a sparse index? Explain your answer. Discuss.
Suppose we extend Evanss ANALOGY program so that it can score 200 on a standard IQ test. Would we then have a program more intelligent than a human? Explain.
How much is a micro-mort worth to you? Devise a protocol to determine this. Ask questions based both on paying to avoid risk and being paid to accept risk.
Is reinforcement learning an appropriate abstract model for evolution? What connection exists, if any, between hardwired reward signals and evolutionary fitness?
1. Do you agree with Alice and the others about the importance of problem-solving skills? Industry-specific insight? Communication skills? Discuss. 2. Should you research how a hospital is managed...
1. How do information technologies contribute to the business success of the companies depicted in the case? Provide an example from each company explaining how the technology implemented led to...
Are enterprise information portals making executive information systems unnecessary? Explain your reasoning.
Create a set of use cases for the following system: A Real Estate, Inc. (AREI), sells houses. People who want to sell their houses sign a contract with AREI and provide information on their house....
I've had the opportunity to develop two multilingual systems. The first was a special-purpose decision support system to help schedule orders in paper mills called BCW-Trim. The system was installed...
How can a system be designed to be used by both experienced and first-time users?
Design an interface template for Exercise E.
Discuss each of the following terms: a. Data b. Field c. Record d. File
Why are entity integrity and referential integrity important in a database?
Create the relational diagram for this database.
Given the following business scenario, create a Crows Foot ERD using a specialization hierarchy if appropriate. Two-Bit Drilling Company keeps information on employees and their insurance dependents....
Why does the order of the operands (tables) matter in a MINUS query but not in a UNION query?
Search the Internet for Web application servers. Choose one and prepare a short presentation for your class.
Name and describe the most prevalent characteristics of cloud computing services.
Consider the following program: boolean blocked [2]; int turn; void P (int id) { while (true) { blocked[id] = true; while (turn != id) { while (blocked[1-id]) /* do nothing */; turn = id; } /*...
What is a primary key? What is the primary key for each table in the Henry Books database shown in Chapter 1?
The relation shown in Figure 15.11 lists members of staff (staff Name) working in a given ward (ward Name) and patients (patient Name) allocated to a given ward. There is no relationship between...
Interview a systems analyst or database analyst and ask questions about how that organization uses data modeling and design tools in the systems development process. Concentrate your questions on how...
Draw an ERD for the following situation (Batra et al., 1988). Also, develop the list of words for qualifiers and classes that you use to form attribute names. Explain why you chose the words on your...
Refer to the EER diagram for patients in Figure 3-3. Make any assumptions you believe are necessary. Develop sample definitions for each entity type, attribute, and relationship in the diagram....
Doctors Information Technology (DocIT) is an IT services company supporting medical practices with a variety of computer technologies to make medical offices more efficient and less costly to run....
Table 4-8 shows a portion of a shipment table for a large manufacturing company. Each shipment (identified by Shipment*) uniquely identifies the shipment Origin, Destination, and Distance. The...
Write an SQL query to answer the following question: Is any instructor qualified to teach ISM 3113 and not qualified to teach ISM 4930?
Write SQL queries to answer the following questions: a. How many students were enrolled in section 2714 during semester 1-2015? b. How many students were enrolled in ISM 3113 during semester 1-2015?
Write an SQL query to answer the following question: Which students were not enrolled in any courses during semester 1-2015?
List all active students in June by name. (Make up names and other data if you are actually building a prototype database.) Include the number of hours students received tutoring and how many lessons...
Write an SQL query to list each customer who bought at least one product that belongs to product line Basic in March 2015. List each customer only once.
Based on the table above as well as additional research, write a memo in support of or against the following statement: "Cloud databases will increasingly eliminate the need for data/database...
What are some of the differences between rail-guided vehicles and automated guided vehicles?
What are some of the objectives and reasons behind company decisions to automate their storage operations? Name six of the ten objectives and reasons listed in Table 11.3.
A rail-guided vehicle system is being planned as part of an assembly cell. The system consists of two parallel lines, as in Figure P10.8. In operation, a base part is loaded at station 1 and...
A stamping plant must be designed to supply an automotive engine plant with sheet metal stampings. The plant will operate one 8hour shift for 250 days per year and must produce 15,000,000 good...
The following table lists the weekly quantities and routings of ten parts that are being considered for cellular manufacturing in a machine shop. Parts are identified by letters and machines are...
What is the difference between accuracy and precision in measurement? Define these two terms.
In the previous problem, a second proposal has been made to reduce the purging time of 3.5 hours during a changeover to less than 1.5 hours by sequencing the batches of parts so as to reduce the...
Determine the transfer function V0(s)/V(s) of the operational amplifier circuit shown in Figure E2.20. Assume an ideal operational amplifier. Determine the transfer function when R1 = R2 = 100 k, C1...
An LC ladder network is shown in Figure P2.18. One may write the equations describing the network as follows: I1 = (V1 - Va)Y1, Va = (I1 - Ia)Z2. Ia = (Va - V2)Y3, V2 = IaZ4. Construct a flow graph...
A closed-loop control system is shown in Figure P2.50. (a) Determine the transfer function T(s) = Y(s)/R(s). (b) Determine the poles and zeros of T(s). (c) Use a unit step input, R(s) = l/s, and...
A system can be represented by the state vector differential equation of Equation (3.16), where Find the characteristic roots of the system. 2 0
Determine a state-space representation for the system shown in Figure P3.35. The motor inductance is negligible, the motor constant is Km = 10, the back electromagnetic force constant is Kb = 0.0706,...
Consider the closed-loop system in Figure E4.11, where G(s) = K / s + 10 and H(s) = 14 / s2 + 5s + 6 (a) Compute the transfer function T(s) = Y(s)/R(s). (b) Define the tracking error to be E(s) =...
A closed-loop transfer function is (a) Determine the steady-state error for a unit step input R(s) = 1/s. (b) Assume that the complex poles dominate, and determine the overshoot and settling time to...
A negative feedback system has a loop transfer function L(s) = K(s + 2) / s(s - 1). (a) Find the value of the gain when the of the closed-loop roots is equal to 0.707. (b) Find the value of the gain...
New concepts in passenger airliner design will have the range to cross the Pacific in a single flight and the efficiency to make it economical [16. 29]. These new designs will require the use of...
A precision speed control system (Figure P7.12) is required for a platform used in gyroscope and inertial system testing where a variety of closely controlled speeds is necessary. A direct-drive DC...
A mobile robot using a vision system as the measurement device is shown in Figure DP7.7(a) [36]. The control system is shown in Figure DP7.7(b) where G(s) = 1 / (s + 1)(0.5s + 1). and Gc(.f) is...
A numerical path-controlled machine turret lathe is an interesting problem in attaining sufficient accuracy [2, 23]. A block diagram of a turret lathe control system is shown. The gear ratio is n =...
Can the Count = write(fd, buffer, nbytes); call return any value in count other than nbytes? If so, why?
Suppose that the WSClock page replacement algorithm uses a of two ticks, and the system state is the following: where the three flag bits V, R, and M stand for Valid, Referenced, and Modified,...
Suppose four cars each approach an intersection from four different directions simultaneously. Each corner of the intersection has a stop sign. Assume that traffic regulations require that when two...
The following two ER diagrams contain both a cardinality ratio constraint and a participation constraint. a. In the first ER diagram, is the instance diagram on the right consistent with the ER...