What is a relation schema? What is the difference between a relation, a relation schema, and a relational schema?
Consider the Presentation Layer ER diagram that appears in Figure 4.21. a. What makes SCHOOL part of the specialization lattice involving SCHOOL, NOT_FOR_PROFIT_ORGANIZATION, and PUBLIC_SCHOOL, and,...
List and briefly define two approaches to dealing with multiple interrupts.
The Intel 8086 is a 16-bit processor similar in many ways to the 8-bit 8088. The 8086 uses a 16-bit bus that can transfer 2 bytes at a time, provided that the lower-order byte has an even address....
The purpose of this exercise is to give you an opportunity to create the tables for Bearcat Incorporated. The tables themselves are based on the relations that appear in the following figure. L1:...
Consider a hypothetical 32-bit microprocessor having 32-bit instructions composed of two fields: the first byte contains the opcode and the remainder the immediate operand or an operand address. a....
Consider two microprocessors having 8- and 16-bit-wide external data buses, respectively. The two processors are identical otherwise and their bus cycles take just as long. a. Suppose all...
Consider two different machines, with two different instruction sets, both of which have a clock rate of 200 MHz. The following measurements are recorded on the two machines running a given set of...
Consider the following code: for (i = 0; i < 20; i++) for ( j = 0; j < 10; j++) a[i] = a[i]* j a. Give one example of the spatial locality in the code. b. Give one example of the temporal locality in...
To clarify the results of the preceding problem, we look at a simpler example. a. Compute the arithmetic mean value for each system using X as the reference machine and then using Y as the reference...
For the hexadecimal main memory addresses 111111, 666666,BBBBBB, show the following information, in hexadecimal format: a. Tag, Line, and Word values for a direct-mapped cache, using the format of...
Design a backup strategy for a computer system. One option is to use plug-in external disks, which cost $150 for each 500 GB drive. Another option is to buy a tape drive for $2500, and 400 GB tapes...
Consider a 4-drive, 200GB-per-drive RAID array. What is the available data storage capacity for each of the RAID levels, 0, 1, 3, 4, 5, and 6?
Examination of the timing diagram of the 8237A indicates that once a block transfer begins, it takes three bus clock cycles per DMA cycle. During the DMA cycle, the 8237A transfers one byte of...
Assume that in the system of the preceding problem, a memory cycle takes 750 ns. To what value could we reduce the clocking rate of the bus without effect on the attainable data transfer rate?
Consider a microprocessor that has a block I/O transfer instruction such as that found on the Z8000. Following its first execution, such an instruction takes five clock cycles to re-execute. However,...
A system is based on an 8-bit microprocessor and has two I/O devices. The I/O controllers for this system use separate control and status registers. Both devices handle data on a 1-byte-at-a-time...
Suppose the page table for the process currently executing on the processor looks like the following. All numbers are decimal, everything is numbered starting from zero, and all addresses are memory...
Use the Booth algorithm to multiply 23 (multiplicand) by 29 (multiplier), where each number is represented using 6 bits.
Given the following memory values and a one-address machine with an accumulator, what values do the following instructions load into the accumulator? Word 20 contains 40. Word 30 contains 50. Word...
A PC-relative mode branch instruction is stored in memory at address 62010. The branch is made to location 53010.The address field in the instruction is 10 bits long. What is the binary value in the...
One limitation of the multiple-stream approach to dealing with branches in a pipeline is that additional branches will be encountered before the first branch is resolved. Suggest two additional...
Consider the following sequence of instructions, where the syntax consists of an opcode followed by the destination register followed by one or two source registers: Assume the use of a four-stage...
Figure 14.14 shows an example of a superscalar processor organization. The processor can issue two instructions per cycle if there is no resource conflict and no data dependence problem. There are...
Figure 17.23 shows the state diagrams of two possible cache coherence protocols. Deduce and explain each protocol, and compare each to MESI. Figure 17.23 Two Cache Coherence Protocols RO) RU) Wo Rii...
An earlier version of the IBM mainframe, the S/390 G4, used three levels of cache.As with the z990, only the first level was on the processor chip [called the processor unit (PU)].The L2 cache was...
Consider the following problem. A designer has available a chip and decided what fraction of the chip will be devoted to cache memory (L1, L2, L3). The remainder of the chip can be devoted to a...
Convert the following decimal numbers to their binary equivalents: a. 64 b. 100 c. 111 d. 145 e. 255
Specify all the relationships among the records of the database shown in Figure 1.2.
Consider an entity type SECTION in a UNIVERSITY database, which describes the section offerings of courses. The attributes of SECTION are SectionNumber, Semester, Year, CourseNumber, Instructor,...
Suppose that a disk unit has the following parameters: seek time s=20 msec; rotational delay rd=10 msec; block transfer time btt=1 msec; block size B=2400 bytes; interblock gap size G=600 bytes. An...
Consider the switch shown below. Suppose that all datagrams have the same fixed length, that the switch operates in a slotted, synchronous manner, and that in one time slot a datagram can be...
Consider the leaky-bucket policer (discussed in Section 7.5) that polices the average rate and burst size of a packet flow. We now want to police the peak rate, p , as well. Show how the output of...
Your company has just bought a new dual Pentium processor, and you have been tasked with optimizing your software for this processor. You will run two applications on this dual Pentium, but the...
Write a pseudocode algorithm that determines the batting average of a baseball player.
List five of the many benefits of cloud computing for organizations.
Create the problem definition for the CPU case. Read the interview with Hy Perteks in the CPU case found in Chapter 4.Go to www.pearsonhighered.com/kendall and click the CPU Student.
Design and create a Web page named stats.html that simulates a number of dice rolls and displays statistics on those rolls. The user should be able to specify the number of dice rolls via a text box...
Show that X62 can be computed with only eight multiplications.
Let G be a directed graph with N vertices. A vertex s is called a sink if, for every v in V such that s v, there is an edge (v, s), and there are no edges of the form (s, v). Give an O(N) algorithm...
Valero Energy is North America's largest refiner. When they recently acquired some competing refineries, Valero tripled its annual revenue to $90 billion. While Valero's rapid growth has been good...
Design a relational database corresponding to the E-R diagram of Figure. model year address Ticense driver-id name location car owns report-number uOSAad date accident participated driver...
Suppose that we decompose the schema R = (A, B, C, D, E) into (A, B, C) (A, D, E). Show that this decomposition is a loss less-join decomposition if the following set F of functional dependencies...
Use Armstrongs axioms to prove the soundness of the decomposition rule.
Use Armstrongs axioms to prove the soundness of the pseudotransitivity rule.
Given the database schema R (a, b, c), and a relation r on the schema R, write an SQL query to test whether the functional dependency b c holds on relation r. Alsowrite an SQL assertion that...
Consider the database schema Emp = (ename, set of(Children), setof(Skills)) Children = (name, Birthday) Birthday = (day, month, year) Skills = (type, set of(Exams)) Exams = (year, city) Assume that...
Explain why the allocation of records to blocks affects database-system performance significantly.
In the sequential file organization, why is an overflow block used even if there is, at the moment, only one overflow record?
Develop a formal proof of correctness for alpha-beta pruning. To do this, consider the situation shown in Figure. The question is whether to prune node nj, which is a max- node and a descendant of...
Prove each of the following assertions: a. is valid if and only if True | = . b. For any a, False | = . c. | = if and only if the sentence ( ) is valid. d. if and only if the sentence ( ) is...
Consider a knowledge base containing just two sentences: P() and P(h). Does this knowledge base entail V x P(x)? Explain your answer in terms of models.
For each pair of atomic sentences, give the most general unifier if it exists: a. P(A, B, B), P(x, y, z). b. Q(y, G (A, B)), Q (G(x, x), y) c. Older (Father (y), y), Older (Father(x), John). d. Knows...
Describe the event of trading something for something else. Describe buying as a kind of trading in which one of the objects traded is a sum of money.
To the medication problem in the previous exercise, add a Jest action that has the conditional effect Culture Growth when Disease is true and in any case has the perceptual effect Know (Culture...
In the childrens game of rock-paper-scissors each player reveals at the same time a choice of rock, paper, or scissors. Paper wraps rock, rock blunts scissors, and scissors cut paper. In the extended...
A simple perceptron cannot represent XOR (or, generally, the parity function of its inputs). Describe what happens to the weights of a four-input, step-function perceptron, and beginning with all...
Give an example of a business problem.
1. Describe the risks associated with planning the new CSS implementation and announcing the new Web ordering system to customers. Remember that the new CSS will replace the current telephone,...
In what major ways have information systems in business changed during the last 40 years? What is one major change you think will happen in the next 10 years? Refer to Figure to help you answer. The...
How have the Internet, intranets, and extranets affected the types and uses of data resources available to business professionals? What other database trends are also affecting data resource...
What challenges do you see for a company that wants to implement collaborative SCM systems? How would you meet such challenges?
Describe the principal steps in the analysis phase. What are the major deliverables?
What are the purposes of the system request and the feasibility analysis? How are they used in the project selection process?
Suppose that you are a project manager using the waterfall development methodology on a large and complex project. Your manager has just read the latest article in Computerworld that advocates...
Resolve the M:N relationship between the sale and available tune that is shown in Figure 6-14. What kinds of information could you capture about this relationship? What would the new ERD look like?...
Draw a data model for the following entities, considering the entities as representing a system for a patient billing system and including only the attributes that would be appropriate for this...
Draw the relationships that follow. Would the relationships be identifying or non identifying? Why? 1. A patient must be assigned to only one doctor, and a doctor can have many patients. 2. An...
List and describe the contents of the system specification.
I worked with a large financial institution in the southeast that suffered serious financial losses several years ago. A new chief executive officer was brought in to change the strategy of the...
Assume that you are developing a new system for a local real estate agency. The agency wants to keep a database of its own property listings and also wants to have access to the citywide multiple...
Why do we prototype the user interface design?
Why is it important to perform an interface evaluation before the system is built?
Under what conditions is heuristic evaluation justified?
Draw an ISD for a Web site that sells some retail products (e.g., books, music, clothes).
Create a physical level 0 DFD for the following, and compare it with the logical model that you created in Chapter 5: A Real Estate Inc. (AREI) sells houses. People who want to sell their houses sign...
What are the two dimensions in which to optimize a relational database?
Suppose that you are leading the conversion from one word processor to another at your university. Develop a conversion strategy. You have also been asked to develop a conversion strategy for the...
What are the three basic steps in managing organizational change?
Suppose that you are leading the installation of a new decision support system to help admissions officers manage the admissions process at your university. Develop a change management plan (i.e.,...
How is the use case diagram similar to the context and level 0 data flow diagrams (DFDs)? How is it different?
Identify and discuss the serious data redundancy problems exhibited by the file structure shown inFigure. PROJ NUM PROJ NAME EMP NUMEMP NAME JOB CODE JOB_ CHG HOUR PROJ HOURS EMP PHONE 1 Hurricane 1...
Create the relational diagram to show the relationship between DIRECTOR and PLAY.
For each table, identify the primary key and the foreign key(s). If a table does not have a foreign key, write None in the space provided.
Create the ERD to show the relationship between STORE and REGION.
Create the relational diagram to show the relationships among EMPLOYEE, STORE, and REGION.
Create the relational diagram to show the relationship between EMPLOYEE and JOB.
Do the tables exhibit entity integrity? Answer yes or no and then explain your answer. Discuss.
Do the tables exhibit entity integrity? Answer yes or no and then explain your answer. Discuss in detail.
Create the ERD for this database.
Create the relational diagram.
Write the business rules reflected in this ERD.
Use the following business rules to create a Crows Foot ERD. Write all appropriate connectivities and cardinalities in the ERD. a. A department employs many employees, but each employee is employed...
What is a surrogate primary key, and when would you use one?
What is a subtype discriminator? Given an example of its use.
Explain why it might be more appropriate to declare an attribute that contains only digits as a character data type instead of a numeric data type.
Using tables named T1 and T2, write a query example for each of the three join types you described in Question 2. Assume that T1 and T2 share a common column named C1.
Modify the query in Problem 30 to include the number of individual product purchases made by each customer. (In other words, if the customers invoice is based on three products, one per LINE_NUMBER,...
A computer has a cache, main memory, and a disk used for virtual memory. If a referenced word is in the cache, 20 ns are required to access it. If it is in main memory but not in the cache, 60 ns are...
A software approach to mutual exclusion is Lamports bakery algorithm [LAMP74], so called because it is based on the practice in bakeries and other shops in which every customer receives a numbered...