On the VAX SBI, the lowest-priority device usually has the lowest average wait time. For this reason, the processor is usually given the lowest priority on the SBI. Why does the priority 16 device...
Draw and explain a timing diagram for a PCI write operation.
Four benchmark programs are executed on three computers with the following results: The table shows the execution time in seconds, with 100,000,000 instructions executed in each of the four programs....
Describe a simple technique for implementing an LRU replacement algorithm in a four-way set-associative cache.
The following table, based on data reported in the literature [HEAT84], shows the execution times, in seconds, for five different benchmark programs on three machines. a. Compute the speed metric for...
Consider a memory system with the following parameters: Tc = 100 ns Cc = 10-4 $/bit Tm = 1200 ns Cm = 10-5 $/bit a. What is the cost of 1 Mbyte of main memory? b. What is the cost of 1 Mbyte of main...
A two-way set-associative cache has lines of 16 bytes and a total size of 8 kbytes. The 64-Mbyte main memory is byte addressable. Show the format of main memory addresses.
A processor accesses main memory with an average access time of T2. A smaller cache memory is interposed between the processor and main memory. The cache has a significantly faster access time of T1...
A computer has a cache, main memory, and a disk used for virtual memory. If a referenced word is in the cache, 20 ns are required to access it. If it is in main memory but not in the cache, 60 ns are...
Consider a hypothetical microprocessor generating a 16-bit address (for example, assume that the program counter and the address registers are 16 bits wide) and having a 16-bit data bus. a. What is...
Consider a computer system that contains an I/O module controlling a simple keyboard/printer teletype. The following registers are contained in the processor and connected directly to the system bus:...
On the Motorola 68020 microprocessor, a cache access takes two clock cycles. Data access from main memory over the bus to the processor takes three clock cycles in the case of no wait state...
Consider a 32-bit microprocessor that has an on-chip 16-KByte four-way set-associative cache. Assume that the cache has a line size of four 32-bit words. Draw a block diagram of this cache showing...
For the Hamming code shown in Figure 5.10, show what happens when a check bit rather than a data bit is in error? Bit position Position number Data bit Check bit 12 10987 6 53 2 1100 101 1010 1001...
For a compact disk, audio is converted to digital with 16-bit samples, and is treated a stream of 8-bit bytes for storage. One simple scheme for storing this data, called direct recording, would be...
A DMA module is transferring characters to memory using cycle stealing, from a device transmitting at 9600 bps. The processor is fetching instructions at the rate of 1 million instructions per second...
A 32-bit computer has two selector channels and one multiplexor channel. Each selector channel supports two magnetic disk and two magnetic tape units. The multiplexor channel has two line printers,...
Given x = 0101 and y = 1010 in twos complement notation (i.e., x = 5, y = -6), compute the product p = x y with Booth's algorithm.
Prove that the multiplication of two n-digit numbers in base B gives a product of no more than 2n digits.
Express the following numbers in IEEE 32-bit floating-point format: a. -5 b. -6 c. -1.5 d. 384 e. 1/16 f. -1/32
Suppose we wished to apply the x86 CMP instruction to 32-bit operands that contained numbers in a floating-point format. For correct results, what requirements have to be met in the following areas?...
Convert the following formulas from infix to reverse Polish: a. A + B + C + D + E h. (A + B) (C + D) + E c. (A B) + (C D) + E d. (A - B) (((C - D E)/F)/G) H
For each of the following packed decimal numbers, show the decimal value: a. 0111 0011 0000 1001 b. 0101 1000 0010 c. 0100 1010 0110
Pipelining can be applied within the ALU to speed up floating-point operations. Consider the case of floating-point addition and subtraction. In simplified terms, the pipeline could have four stages:...
Consider the "in-order-issue/in-order-completion" execution sequence shown in Figure 14.13. a. Identify the most likely reason why I2 could not enter the execute stage until the fourth cycle. Will...
Yeh's dynamic branch prediction algorithm, used on the Pentium 4, is a two-level branch prediction algorithm. The first level is the history of the last n branches. The second level is the branch...
Show the micro-operations and control signals in the same fashion as Table 15.1 for the processor in Figure 15.5 for the following instructions: ¢ Load Accumulator ¢ Store Accumulator...
A simple processor has four major phases to its instruction cycle: fetch, indirect, execute, and interrupt. Two 1-bit flags designate the current phase in a hardwired implementation. a. Why are these...
Consider the pipeline depiction in Figure 12.13b, which is redrawn in Figure 17.25a, with the fetch and decode stages ignored, to represent the execution of thread A. Figure 17.25b illustrates the...
Consider an SMP with both L1 and L2 caches using the MESI protocol. As explained in Section 17.3, one of four states is associated with each line in the L2 cache. Are all four states also needed for...
What organizational alternative is suggested by each of the illustrations in Figure 17.24? Figure 17.24 Diagram for Problem 18.9 (b) (d) (a) (c)
An application program is executed on a nine-computer cluster. A benchmark program took time T on this cluster. Further, it was found that 25% of T was time in which the application was running...
Consider the following two versions of a program to add two vectors: a. The program on the left executes on a uniprocessor. Suppose each line of code L2, L4, and L6 takes one processor clock cycle to...
The Gray code is a binary code for integers. It differs from the ordinary binary representation in that there is just a single bit change between the representations of any two numbers. This is...
What is the difference between a hardware pipeline and a software pipeline?
An algorithm that can utilize four floating-point instructions per cycle is coded for IA-64. Should instruction groups contain four floating-point operations? What are the consequences if the machine...
List some reasons why it is worthwhile to study assembly language programming.
Core War is a programming game introduced to the public in the early 1980s [DEWD84], which was popular for a period of 15 years or so. Core War has four main components: a memory array of 8000...
Consider the ER diagram of Figure 7.20, which shows a simplified schema for an airline reservations system. Extract from the ER diagram the requirements and constraints that resulted in this schema....
Consider the BANK ER schema of Figure 7.21, and suppose that it is necessary to keep track of different types of ACCOUNTS (SAVINGS_ACCTS, CHECKING_ACCTS, ...) and LOANS (CAR_LOANS, HOME_LOANS, ...)....
Map the COMPANY ER schema of Figure 7.2 into ODL classes. Include appropriate methods for each class.
Consider the following relation: CAR_SALE (CarID, Option_type, Option_Listprice, Sale_date, Discounted_price) This relation refers to options installed on cars (e.g.- cruise control) that were sold...
What update anomalies occur in the EMP_PROJ and EMP_DEPT relations of Figure 15.3 and 15.4?
A file has r=20,000 STUDENT records of fixed-length. Each record has the following fields: NAME (30 bytes), SSN (9 bytes), ADDRESS (40 bytes), PHONE (9 bytes), BIRTHDATE (8 bytes), SEX (1 byte),...
Suppose that only 80% of the STUDENT records from Exercise 17.28 have a value for PHONE, 85% for MAJORDEPTCODE, 15% for MINORDEPTCODE, and 90% for DEGREEPROGRAM, and we use a variable-length record...
Consider a reliable data transfer protocol that uses only negative acknowledgments. Suppose the sender sends data only infrequently. Would a NAK-only protocol be preferable to a protocol that uses...
Suppose within your Web browser you click on a link to obtain a Web page. The IP address for the associated URL is not cached in your local host, so a DNS lookup is necessary to obtain the IP...
Referring to Problem P7, suppose the HTML file references eight very small objects on the same server. Neglecting transmission times, how much time elapses with a. Non-persistent HTTP with no...
If all the links in the Internet were to provide reliable delivery service, would the TCP reliable delivery service be redundant? Why or why not?
Suppose that all the Switches In FIgure S .16 are replaced by hubs. All links are 100 Mbps. Now answer the questions posed in problem P29.
Consider the scenario shown in Figure 6.33, in which there are four wireless nodes, A, B, C, and D. The radio coverage of the four nodes is shown via the shaded ovals; all nodes share the same...
Notown Records has decided to store information about musicians who perform on its albums (as well as other company data) in a database. The company has wisely chosen to hire you as a database...
Draw an inheritance hierarchy for students at a university similar to the hierarchy shown in Fig. 9.2. Use Student as the superclass of the hierarchy, then extend Student with classes Undergraduate...
Read [Nog00] and write a two- or three-page paper that discusses the impact of "chaos" on software engineering.
Develop a complete use case for one of the following activities: a. Making a withdrawal at an ATM b. Using your charge card for a meal at a restaurant c. Buying a stock using an on-line brokerage...
When should a modular design be implemented as monolithic software? How can this be accomplished? Is performance the only justification for implementation of monolithic software?
Assume that Marcia has created a database with the tables described at the end of Chapter 7: CUSTOMER (Customer, First Name, Last Name, Phone, Email) INVOICE (Invoice Number, CustomerID, Date In,...
Describe the process of assigning an FC address to a node when logging on to the network for the first time.
List three of the many drawbacks of cloud computing for organizations.
What costs need to be estimated to prepare a budget?
Match the following terms with their definitions: 1. Business continuity plan (BCP) 2. Completeness check 3. Hash total 4. Incremental daily backup 5. Archive 6. Field check 7. Sign check 8. Change...
Fidelity Corporation offers to hire Ron to replace Monica, who has given Fidelity a month's notice to quit. Fidelity gives Ron a week to decide whether to accept. Two days later, Monica signs an...
What problems and challenges did Home Depot experience?
Add the above two assignment statements to your cipher.html page so that it properly encodes messages containing both uppercase and lowercase letters. As before, any non-letters (including spaces and...
Suppose you need to generate a random permutation of the first N integers. For example, {4, 3, 1, 5, 2} and {3, 1, 4, 2, 5} are legal permutations, but {5, 4, 1, 2, 1} is not, because one number (1)...
Efficiently implement a queue class using a singly linked list, with no header or tail nodes.
Show the result of inserting the keys 10111101, 00000010, 10011011, 10111110, 01111111, 01010001, 10010110, 00001011, 11001111, 10011110, 11011011, 00101011, 01100001, 11110000, 01101111 into an...
Sort the sequence 3, 1, 4, 1, 5, 9, 2, 6, 5 using insertion sort.
Using the quicksort implementation in this chapter, determine the running time of quicksort for a. Sorted input b. Reverse-ordered input c. Random input
a. Find the shortest path from A to all other vertices for the graph in Figure 9.82. b. Find the shortest unweighted path from B to all other vertices for the graph in Figure 9.82. 3 D 3. 2.
The input is a list of league game scores (and there are no ties). If all teams have at least one win and a loss, we can generally prove, by a silly transitivity argument, that any team is better...
The object of the Kevin Bacon Game is to link a movie actor to Kevin Bacon via shared movie roles. The minimum number of links is an actor's Bacon number. For instance, Tom Hanks has a Bacon number...
Identify at least three ways a TPS can provide a firm with a competitive advantage. Develop an example of one way a firm could gain a competitive advantage from a TPS.
Rogers Communications is one of Canada's largest telecom companies. It offers home phone services, wireless phone services, Internet service, and cable TV service. Rogers provides small shops in 93...
For hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three-layer hierarchy? A good starting place is the...
The byte-counting variant of the leaky bucket algorithm is used in a particular system. The rule is that one 1024-byte packet, or two 512-byte packets, etc., may be sent on each tick. Give a serious...
What are five main functions of a database administrator?
List seven programming languages that are procedural and two that are nonprocedural. Which group is easier to learn and use? Explain your answer.
Define the concept of aggregation. Give two examples of where this concept is useful.
List two major problems with processing update operations expressed in terms of views.
Let R = (A, B, C), and let r1 and r2 both be relations on schema R. Give an expression in the domain relational calculus that is equivalent to each of the following: a. IIA(r1) b. B =17 (r1) c. r1 ...
Consider the relational database of Figure. Give an expression in SQL for each of the following queries. a. Modify the database so that Jones now lives in Newtown. b. Give all employees of First Bank...
Consider a view branch-cust defined as follows: create view branch-cust as select branch-name, customer-name from depositor, account where depositor.account-number = account.account-number Suppose...
List the three design goals for relational databases, and explain why each is desirable.
Redesign the database of Exercise 9.1 into first normal form and fourth normal form. List any functional or multivalued dependencies that you assume. Also list all referential-integrity constraints...
For each B+-tree as shown below show the steps involved in the following queries: a. Find records with a search-key value of 11. b. Find records with a search-key value between 7 and 17, inclusive....
For each B+-tree as shown below show the form of the tree after each of the following series of operations: a. Insert 9. b. Insert 10. c. Insert 8. d. Delete 23. e. Delete 19. Construct a B+-tree for...
Repeat as shown below for a B-tree. Construct a B+-tree for the following set of key values: (2, 3, 5, 7, 11, 17, 19, 23, 29, 31) Assume that the tree is initially empty and values are added in...
Estimate the number of block accesses required by your solution to Exercise for r1 r2, where r1 and r2 are as defined in Exercise.
Describe how to incrementally maintain the results of the following operations, on both insertions and deletions. a. Union and set difference b. Left outer join
Consider the following two transactions: T 31 : read (A); read (B); If A = 0 then B: = B + 1; write (B). T 32 : read (B); read (A); If B = 0 then A: = A + 1; write (A). Add lock and unlock...
In timestamp ordering, W-timestamp (Q) denotes the largest timestamp of any transaction that executed write (Q) successfully. Suppose that, instead, we defined it to be the timestamp of the most...
Compare the deferred- and immediate-modification versions of the log-based recovery scheme in terms of ease of implementation and overhead cost.
Why is it relatively easy to port a database from a single processor machine to a multiprocessor machine if individual queries need not be parallelized?
Consider a main-memory database system recovering from a system crash. Explain the relative merits of Loading the entire database back into main memory before resuming transaction processing ...
Define in your own words: (a) Intelligence, (b) Artificial intelligence, (c) Agent.
How could introspectionreporting on ones inner thoughtsbe inaccurate? Could I be wrong about what Im thinking? Discuss.
Examine the Al literature to discover whether the following tasks can currently be solved by computers: a. Playing a decent game of table tennis (ping-pong). b. Driving in the center of Cairo. c....
Implement a simple reflex agent for the vacuum environment in Exercise 2.7. Run the environment simulator with this agent for all possible initial dirt configurations and agent locations. Record the...
Repeat Exercise 2.10 for the case in which the location sensor is replaced with a bump sensor that detects the agents attempts to move into an obstacle or to cross the boundaries of the environment....