Top Selling Computer science Questions

Implement a digital circuit to increment (for Cin = 1) or decrement (for Cin = 0) a 4-bit signed number by 1 generating outputs in twos complement form. Note that Cin is the input carry to the full... Design an arithmetic logic unit to perform the following functions: Use multiplexers, binary adders, and gates as needed. Assume that A and B are 4-bit numbers. Draw a logic circuit. S 0 0 1 1 So 0 1... Design a 4-bit arithmetic unit as follows: Assume that A and B are 4-bit numbers. S 0 1 F A plus B A plus 1 Consider the following normalized relations for a sports league: TEAM(TeamID, TeamName, TeamLocation) PLAYER(PlayerID, PlayerFirstName, PlayerLastName, PlayerDateOfBirth, PlayerSpecialtyCode)... Use SQL to define the following view: StudentID StudentName Letersky 38214 Altvater 54907 54907 Altvater Aiken 66324 Consider the following two relations for Millennium College: STUDENT(StudentID, StudentName, CampusAddress, GPA) REGISTRATION(StudentID, CourseID, Grade) Following is a typical query against these... The Is Married To relationship in Figure 2-12a would seem that is, until time plays a role in modeling data. Draw a data model for the PERSON entity type and the Is Married To relationship for each... Write an HDL module for the circuit in Exercise 3.32. Data from problem 3.32 Repeat Exercise 3.31 for the FSM shown in Figure 3.73. Recall that the s and r register inputs indicate set and reset,... Open the VB2017\Chap12\FixIt Solution\FixIt Solution.sln file. Start the application. Click the Grade radio button, type the letter a in the Grade box, and then click the Display button. The... Another definition for the finite difference is the backward difference: ( 1 [x(nT s )]=T s approximates the derivative of x(t)). (a) Indicate how this new definition connects with the finite... Write a program that prompts the user to enter the minutes (e.g., 1 billion), and displays the number of years and days for the minutes. For simplicity, assume a year has 365 days. Here is a sample... Write a program that prompts the user to enter three cities and displays them in ascending order. Here is a sample run: Enter the first city: Chicago JEnter Enter the second city: Los Angeles JEnter... Write a method that finds the number of occurrences of a specified character in a string using the following header: public static int count(String str, char a) For example, count("Welcome", 'e')... Write a program that reads in ten numbers and displays the number of distinct numbers and the distinct numbers separated by exactly one space (i.e., if a number appears multiple times, it is... Suppose you save $100 each month into a savings account with the annual interest rate 5%. So, the monthly interest rate is 0.05 / 12 = 0.00417. After the first month, the value in the account becomes... The Eight Queens problem is to find a solution to place a queen in each row on a chessboard such that no two queens can attack each other. Write a program to solve the Eight Queens problem using... Write a recursive method that displays a string reversely on the console using the following header: public static void reverseDisplay(String value) For example, reverseDisplay("abcd") displays dcba.... Let Ax b be a system of m difference constraints in n unknowns. Show that the Bellman-Ford algorithm, when run on the corresponding constraint graph, maximizes n 1=1 x i subject to Ax b and x i 0... Consider an RSA key set with p = 11, q = 29, n = 319, and e = 3. What value of d should be used in the secret key? What is the encryption of the message M = 100? Write a program that obtains the execution time of selection sort, bubble sort, merge sort, quick sort, heap sort, and radix sort for input size 50,000, 100,000, 150,000, 200,000, 250,000, and... What is the best way to multiply a chain of matrices with dimensions that are 105, 52, 220, 2012, 124, and 460? Show your work. Web-based system architecture is a popular approach to many organizational systems because it offers a number of advantages to the users and to the organization over other types of systems. Discuss... Suppose we allow the pattern P to contain occurrences of a gap character???that can match an arbitrary string of characters (even one of zero length). For example, the pattern ab???ba???c occurs in... When does Oracle 11g automatically create an index for a table? In a double-entry accounting system, every business transaction has to be entered as two separate transactions, in different two accounts, once as a debit and once as a credit. For example, if a... Suppose we are given a sequence S of n elements, on which a total order relation is defined. Describe an efficient method for determining whether there are two equal elements in S. What is the... A limousine company must process pickup requests every day, for taking customers from their various homes to the local airport. Suppose this company receives pickup requests from n locations and... Draw a quad-tree for the following set of points, assuming a 16 16 bounding box: {(1, 2),(4, 10),(14, 3),(6, 6),(3, 15),(2, 2),(3, 12),(9, 4),(12, 14)}. Explain why each of the following names does or does not seem like a good variable name to you. Choose a simple childrens game and describe its logic, using a structured flowchart or pseudocode. For example, you might try to explain Rock, Paper, Scissors; Musical Chairs; Duck, Duck, Goose; the... ShoppingBay is an online auction service that requires several reports. Data for each auctioned item includes an ID number, item description, length of auction in days, and minimum required bid.... Mark Daniels is a carpenter who creates personalized house signs. He wants an application to compute the price of any sign a customer orders, based on the following factors: The minimum charge for... The statements executed within a loop are known collectively as the _______________. a. Loop body b. Loop controls c. Sequences d. Sentinels 10. Black Dot Printing is attempting to organize carpools to save energy. Each input record contains an employees name and town of residence. Ten percent of the companys employees live in Wonder... The subscripts of any array are always __________. a. Integers b. Fractions c. Characters d. Strings of characters Create the logic for the dice game Pig, in which a player can compete with the computer. The object of the game is to be the first to score 100 points. The user and computer take turns rolling a pair... The Jumpin Jive coffee shop charges $2.00 for a cup of coffee, and offers the add-ins shown in Table 6-2. Product Price ($) Whipped cream 0.89 Cinnamon 0.25 Chocolate sauce 0.59 Amaretto 1.50 Irish... Which is true of text files? a. Text files contain data that can be read in a text editor. b. Text files commonly contain images and music. c. Both of the above d. None of the above Create two parallel arrays that represent a standard deck of 52 playing cards. One array is numeric and holds the values 1 through 13 (representing Ace, 2 through 10, Jack, Queen, and King). The... Laramie Park District has files of participants in its summer and winter programs this year. Each file is in participant ID number order and contains additional fields for first name, last name, age,... The Apgar Medical group keeps a patient file for each doctor in the office. Each record contains the patients first and last name, home address, and birth year. The records are sorted in ascending... Design an application that accepts 15 words and displays them in alphabetical order. a. Create the logic for a program that performs arithmetic functions. Design the program to contain two numeric variables, and prompt the user for values for the variables. Pass both variables to... Complete the following tasks: a. Design a class named StockTransaction that holds a stock symbol (typically one to four characters), stock name, and price per share. Include methods to set and get... Complete the following tasks: a. Design a class named ItemForSale that holds data about items placed for sale on Carloss List, a classified advertising website. Fields include an ad number, item... Starting with the regular expressions for integer and decimal, construct an equivalent NFA, the set-of-subsets DFA, and the minimal equivalent DFA. Be sure to keep separate the final states for the... Give an example of a grammar that captures right associativity for an exponentiation operator (e.g., ** in Fortran). Build a complete recursive descent parser for the calculator language. As output, have it print a trace of its matches and predictions. In your favorite language with generics, write code for simple versions of the following abstractions: (a) A stack, implemented as a linked list (b) A priority queue, implemented as a skip list or a... Repeat the preceding two exercises, modifying your code to include runtime checking of array subscript bounds. Write a for-each loop that calls the addInterest method on each BankAccount object in a collection called accounts. What is required for that loop to work? Write a method called charsSorted that accepts a string as its parameter and returns true if the characters in the string appear in sorted alphabetical order. For example, the calls of... Once upon a time in a kingdom far away, the king hoarded food and the people starved. His adviser recommended that the food stores be used to help the people, but the king refused. One day a small... Design a skeletal program and a calling sequence that results in an activation record instance in which the static and dynamic links point to different activation-recorded instances in the run-time... Design and implement a C++ program that defines a base class A, which has a subclass B, which itself has a subclass C. The A class must implement a method, which is overridden in both B and C. You... Write pseudocode for the main module and Display Welcome Message module. You do not have to write pseudocode for the other three modules. Suppose that you are asked to write a program that computes... Write a program that prompts the user to enter a string and displays the number of the uppercase letters in the string. Enter a string: Welcome to Java The number of uppercase letters is 2 Define a class named ComparableCircle that extends Circle and implements Comparable. Draw the UML diagram and implement the compareTo method to compare the circles on the basis of area. Write a test... Write a server for a client. The client sends the weight and height for a person to the server (see Figure 33.18a). The server computes BMI (Body Mass Index) and sends back to the client a string... Find your last grade report. Given the guidelines presented in this chapter, identify flaws in the design of this grade report. Redesign this report to correct these flaws. Draw examples of the four basic DFD symbols. What is the relationship between logical and physical models? What are the most significant differences among structured, O-O, and agile methods? What do they have in common? Consider the ER schema for the MOVIES database in Figure 3.25. Assume that MOVIES is a populated database. ACTOR is used as a generic term and includes actresses. Given the constraints shown in the... Specify queries c, d, and f of Exercise 8.18 in both tuple and domain relational calculus. Exercise 8.18 Consider the LIBRARY relational database schema shown in Figure 8.14, which is used to keep... The steps that the Little Man performs are closely related to the way in which the CPU actually executes instructions. Draw a flow chart that carefully describes the steps that the Little Man follows... Loris Manufacturing makes 1,000 products per month and has been increasing production at a rate of 6 percent each month. Write a program that accepts a production goal from the user. If the entered... The data flow symbols shown in Figure 5-1 were designed by Ed Yourdon, who was a well-known IT author, lecturer, and consultant. Many IT professionals consider him to be among the most influential... Suppose you have an oracle, OM(s), that correctly predicts the opponents move in any state. Using this, formulate the definition of a game as a (single-agent) search problem. Describe an algorithm... Describe four fundamental information system types based on their sphere of influence. Locate a news article in an IT trade website (e.g., Computerworld.com, InformationWeek.com) about an organization that is implementing a new computer system. Describe the tangible and intangible... Select a GUI program that you have never used before. Describe how well it conforms to the GUI design guidelines listed in this chapter. Write a program that asks the user to enter todays sales for five stores. The program should display a bar chart comparing each stores sales. Create each bar in the bar chart by displaying a row of... Suppose that two entries of an array A are equal to each other. After running the insertion-sort algorithm of Code Fragment 3.7, will they appear in the same relative order in the final sorted order... Assume that the current population of California is 39 million and that the population of Texas is 28 million. The population of Texas appears to be growing at a faster rate than that of California.... List five Websites you can go to for information about: a. IT auditing b. IT security and privacy issues Please indicate whether the following statements are true of false a. If the only difference between two MDPs is the value of the discount factor then they must have the same optimal policy. b. When... Extend the Arithlang programming language to support two new expressions, greatest-of (>? a b) and least-of ( a b). The following interaction log illustrates the intended semantics of this... Extend the Arithlang programming language to support the modulus expression (% a b), also called a remainder sometimes. The following interaction log illustrates the intended semantics of this... You would like to train a neural network to classify digits. Your network takes as input an image and outputs probabilities for each of the 10 classes, 0-9. The networks prediction is the class that... Suppose that the plant in Fig. P5.4-4 has the discrete state model Derive the state model for the closed-loop system, in terms of A, B, C, and D. 1 (k+ 1) = Ax(k) + Bm(k) y (k) = Cx(k) + Dm(k) Assume that \($s0\) is initialized to 11 and \($s1\) is initialized to 22. Suppose you executed the code below on a version of the pipeline that does not handle data hazards (i.e., the programmer is... For the following problems, the table holds C code functions. Assume that the first function listed in the table is called first. You will be asked to translate these C code routines into MIPS... Consider the following instruction: Instruction: and rd, rsl, rs2 Interpretation: Reg[rd] = Reg[rs1] AND Reg[rs2] 1.What are the values of control signals generated by the control in Figure 4.10 for... Examine the difficulty of adding a proposed ss rt, rs, imm (Store Sum) instruction to MIPS. Interpretation: Mem[Reg[rt]=Reg[rs]+immediate 1. Which new functional blocks (if any) do we need for this... Consider the following loop. LOOP: ld $s0, 0($s3) ld $s1, 8($s3) add $s2, $s0, $s1 addi $s3, $s3, -16 bnez $s2, LOOP Assume that perfect branch prediction is used (no stalls due to control hazards),... Find the inverse z-transform of each E(z) below by the four methods given in the text. Compare the values of e(z) , for k = 0, 1, 2, and 3, obtained by the four methods. (a) E(z) = 0.5z (2-1)(z-0.6)... Find a discrete state variable model of the closed-loop system shown in Fig. P5.4-4 if the discrete state model of the plant is given by: Fig. P5.4-4 (a) x(k+1)= 0.7x(k)+0.3m (k) y (k) = 0.2x(k) +... Let T = 0.05 s and (a) Without calculating E(z), find its poles. (b) Give the rule that you used in part (a). (c) Verify the results of part (a) by calculating E(z). (d) Compare the zero of E(z)... Consider the system described in Problem 2.10-2. (a) Find the transfer function of this system. (b) Let u(k) = 1, k 0 (a unit step function) and x(0) = 0 . Use the transfer function of part (a) to... Construct a table like that shown in Figure C.21 to check for WAW stalls in the RISC V FP pipeline of Figure C.30. Do not consider FP divides. Figure C.21 Figure C.30 Situation No dependence... Many computer manufacturers now include tools or simulators that allow you to measure the instruction set usage of a user program. Among the methods in use are machine simulation, hardware-supported... Using a table similar to that shown in Figure 3.10, calculate 74 divided by 21 using the hardware described in Figure 3.8. You should show the contents of each register on each step. Assume both... When processor designers consider a possible improvement to the processor datapath, the decision usually depends on the cost/performance trade-off . In the following three problems, assume that we... In this exercise, we examine how pipelining affects the clock cycle time of the processor. Problems in this exercise assume that individual stages of the datapath have the following latencies: Also,... In this exercise, we examine how resource hazards, control hazards, and Instruction Set Architecture (ISA) design can affect pipelined execution. Problems in this exercise refer to the following... In this exercise we look at memory locality properties of matrix computation. The following code is written in C, where elements within the same row are stored contiguously. Assume each word is a... This exercise examines the impact of different cache designs, specifically comparing associative caches to the direct-mapped caches from Section 5.4. For these exercises, refer to the address stream... If G is a simple undirected graph with 12 vertices and 3 connected components, what is the largest number of edges it might have? What are the types of addresses (identifiers) used in each of the following layers? a. Application layer b. Network layer c. Data-link layer
Showing 1300 - 1400 of 5000