1. Based on the use case diagram and other project information, develop a list of software components (subsystems) that must be acquired or developed. Describe the function(s) of each component in...
Section 7.7.1 provides some of the successor-state axioms required for the wumpus world. Write down axioms for all remaining fluent symbols.
Explain why every nonempty propositional clause, by itself, is satisfiable. Prove rigorously that every set of five 3-SAT clauses is satisfiable, provided that each clause mentions exactly three...
Prove, or find a counterexample to, each of the following assertions: a. If or |= (or both) then ( ) b. If ( ) then and . c. If ( ) then or (or both).
Prove that GRAPH-SEARCH satisfies the graph separation property illustrated in Figure 3.9. Begin by showing that the property holds at the start, then show that if it holds before an iteration of the...
Construct an example of two clauses that can be resolved together in two different ways giving two different outcomes.
Let us examine the rationality of various vacuum-cleaner agent functions. a. Show that the simple vacuum-cleaner agent function described in Figure 2.3 is indeed rational under the assumptions listed...
In the blocks world we were forced to introduce two action schemas, Move and MoveToTable, in order to maintain the Clear predicate properly. Show how conditional effects can be used to represent both...
Suppose the Flip action always changes the truth value of variable L. Show how to define its effects by using an action schema with conditional effects. Show that, despite the use of conditional...
Suppose you are given a coin that lands heads with probability x and tails with probability 1 x. Are the outcomes of successive flips of the coin independent of each other given that you know the...
Trace the behavior of DPLL on the knowledge base in Figure 7.16 when trying to prove Q, and compare this behavior with that of the forward-chaining algorithm. Figure 7.16 LAM = P P L 3D M L L B...
Prove that the judgments B A and C D in the Allais paradox violate the axiom of substitutability.
Run an SQL SELECT query to demonstrate that the view PopularShowsView was constructed correctly.
Consider a vocabulary with the following symbols: Occupation(p, o): Predicate. Person p has occupation o. Customer (p1, p2): Predicate. Person p1 is a customer of person p2. Boss(p1, p2): Predicate....
Write an SQL CREATE TABLE statement to create a table named PICTURE using the column characteristics as shown in Figure 10C-98. Run the SQL statement to create the PICTURE table in the MEDIA database.
In his letter of August 24, 1654, Pascal was trying to show how a pot of money should be allocated when a gambling game must end prematurely. Imagine a game where each turn consists of the roll of a...
Show that the statement of conditional independence is equivalent to each of the statements P(X,Y |Z) = P(X Z)P(Y | Z) P(X |Y, Z) = P(X|Z) and P(BX,Z)= P(Y|Z). and P(B|X, Z) = P(Y | Z).
This exercise explores the stationary distribution for Gibbs sampling methods. a. The convex composition [, q 1 ; 1 , q 2 ] of q 1 and q 2 is a transition probability distribution that first chooses...
Translate 0xabcdef12 into decimal.
Do routers have IP addresses? If so, how many?
Economists often make use of an exponential utility function for money: U(x) = e x/R , where R is a positive constant representing an individuals risk tolerance. Risk tolerance reflects how likely an...
Languages that let you use an easily understood vocabulary of descriptive terms, such as read, write, or add, are known as ____________languages. a. Procedural b. High-level c. Machine d....
The rules of a programming language constitute its ____________. a. Syntax b. Logic c. Format d. Objects
Arguments to methods always appear within ____________. a. Parentheses b. Double quotation marks c. Single quotation marks d. Curly braces
You save text files containing Java source code using the file extension ____________. a. .java b. .class c. .txt d. .src
This exercise is concerned with filtering in an environment with no landmarks. Consider a vacuum robot in an empty room, represented by an nmrectangular grid. The robots location is hidden; the only...
Which of the following elements is not required in a variable declaration? a. A type b. An identifier c. An assigned value d. A semicolon
The assignment operator in Java is _____________. a. = b. == c. := d. ::
A boolean variable can hold _____________. a. Any character b. Any whole number c. Any decimal number d. The value true or false
The value 137.68 can be held by a variable of type _____________. a. int b. float c. double d. Two of these are correct.
An escape sequence always begins with a(n) _____________. a. e b. Forward slash c. Backslash d. Equal sign
Which Java statement produces w on one line and xyz on the next line? a. System.out.println(wxyz); b. System.out.println(w + xyz); c. System.out.println(w xyz); d. System.out.println(w x y z);
In Java, what is the value of 3 + 7 * 4 + 2? a. 21 b. 33 c. 42 d. 48
Which assignment is correct in Java? a. double money = 12; b. double money = 12.0; c. double money = 12.0d; d. All of the above are correct.
Which assignment is correct in Java? a. char aChar = 5.5; b. char aChar = W; c. char aChar = '*'; d. Two of these are correct.
In each case, determine the problem and fix the application. After you correct the errors, save each file using the same filename preceded with Fix. For example, DebugTwo1.java will become...
A public static method named computeSum() is located in ClassA. To call the method from within ClassB, use the statement _____________. a. ClassA.computeSum(); b. ClassB(computeSum()); c....
The method public static boolean testValue(int response) returns _____________. a. No value b. An int value c. A boolean value d. You cannot determine what is returned.
A structure that allows repeated execution of a block of statements is a ____________. a. Cycle b. Ring c. Loop d. Band
A loop that never ends is a(n) ____________loop. a. Infinite b. Iterative c. Structured d. Illegal
To construct a loop that works correctly, you should initialize a loop control ____________. a. Condition b. Constant c. Structure d. Variable
What is the output of the following code? b = 3; while(b < 6) { System.out.print(b + " "); b = b + 1; } a. 3 b. 3 4 5 c. 3 4 5 6 d. 3 3 3 3 3 3
If m = 9, then after n = m++, the value of m is ____________. a. 8 b. 9 c. 10 d. 11
If m = 9, then after n = m++, the value of n is ____________. a. 8 b. 9 c. 10 d. 11
If j = 5 and k = 6, then the value of j++ == k is ____________. a. 5 b. 6 c. True d. False
You must always include ____________ in a for loops parentheses. a. Two semicolons b. Three semicolons c. Two commas d. Three commas
What does the following program segment output? d = 0; do { System.out.print(d + " "); d++; } while (d < 2); a. 0 b. 0 1 c. 0 1 2 d. Nothing
Suppose that you declare two String objects as: String word1 = new String("happy"); String word2 = new String("happy"); The value of word1.equals(word2) is ____________. a. True b. False c. Illegal...
Eliza is a famous 1966 computer program written by Joseph Weizenbaum. It imitates a psychologist (more specifically, a Rogerian therapist) by rephrasing many of a patients statements as questions and...
Write an application that contains an array of 10 multiple-choice quiz questions related to your favorite hobby. Each question contains three answer choices. Also create an array that holds the...
In each case, determine the problem and fix the program. After you correct the errors, save each file using the same filename preceded with Fix. For example, DebugEight1.java will become...
Employing inheritance reduces errors because ____________. a. Subclasses have access to fewer data fields b. Subclasses have access to fewer methods c. Methods that have been created in the...
Which of the following choices is the best example of a parent class/child class relationship? a. BodyOfWater/River b. Apple/Banana c. Spaniel/Dog d. Sparrow/Bird
A class named Building has a public, nonstatic method named getFloors(). If School is a child class of Building, and modelHigh is an object of type School, which of the following statements is valid?...
In Java, the concept of keeping data private is known as ____________. a. Polymorphism b. Concealing fields c. Data deception d. Information hiding
When a parent class contains a static method, child classes ____________ override it. a. Frequently b. Seldom c. Must d. Cannot
Parent classes are ____________ than their child classes. a. Less specific b. More specific c. Easier to understand d. More cryptic
Abstract classes differ from other classes in that you ____________. a. Must not code any methods within them b. Must instantiate objects from them c. Cannot instantiate objects from them d. Cannot...
Abstract classes can contain ____________. a. Abstract methods b. Nonabstract methods c. Both of the above d. None of the above
An abstract class Dwelling has two subclasses, SingleFamily and MultiFamily. None of the constructors for these classes requires any arguments. Which of the following statements is legal? a. Dwelling...
Which of the following statements is true? a. Superclass objects are members of their subclass. b. Superclasses can contain abstract methods. c. You can create an abstract class object using the new...
When you create a ____________ in Java, you create a variable name in which you can hold the memory address of an object. a. Field b. Reference c. Recommendation d. Pointer
An applications ability to select the correct subclass method to execute is known as ____________ method binding. a. Polymorphic b. Intelligent c. Early d. Dynamic
Which statement creates an array of five references to an abstract class named Currency? a. Currency[] = new Currency[5]; b. Currency[] currencyref = new Currency[5]; c. Currency[5] currencyref = new...
You ____________ override the toString() method in any class you create. a. Cannot b. Can c. Must d. Must implement StringListener to
The Object class equals() method takes ____________. a. No arguments b. One argument c. Two arguments d. As many arguments as you need
Assume that the following statement appears in a working Java program and that the equals() method has been overridden correctly in things class: if(thing.equals(anotherThing)) x = 1; You know that...
The Object class equals() method considers two object references to be equal if they have the same ____________. a. Value in all data fields b. Value in any data field c. Data type d. Memory address
Each Java subclass has the ability to inherit from ____________ parent class(es). a. Zero b. One c. Two d. Any number of
The alternative to multiple inheritance in Java is known as a(n) ____________. a. Superobject b. Abstract class c. Interface d. None of the above
When you create a class that uses an interface, you include the keyword ____________ and the interfaces name in the class header. a. interface b. implements c. accoutrements d. listener
An abstract class Employee has two subclasses, Permanent and Temporary. The Employee class contains an abstract method named setType(). Before you can instantiate Permanent and Temporary objects,...
You can instantiate concrete objects from a(n) ____________. a. Abstract class b. Interface c. Either a or b d. Neither a nor b
In Java, a class can ____________. a. Inherit from one abstract superclass at most b. Implement one interface at most c. Both a and b d. Neither a nor b
You created a Quiz class that contains an array of 10 multiplechoice questions to which the user was required to respond with an A, B, or C. At the time, you knew how to handle the users response if...
A jframe is a descendant of each of the following classes except the ____________ class. A. Component B. Container C. Jar D. Window
Unlike a window, a jframe ____________. A. Has a title bar and border B. Can be made visible C. Can have descendants D. Can hold other objects
When a user closes a jframe, the default behavior is for ____________. A. The jframe to close and the application to keep running b. The jframe to be hidden and the application to keep running c. The...
Suppose that you create an application in which you instantiate a JFrame named frame1 and a JLabel named label1. Which of the following statements within the application adds label1 to frame1? a....
The arguments required by the font constructor include all of the following except ____________. A. Typeface b. Mode c. Style d. Point size
Within an event-driven program, a component on which an event is generated is the ____________. A. Performer B. Listener C. Source D. Handler
A class that will respond to button-press events must use which phrase in its header? a. Import java.event b. Extends action c. Extends j frame d. Implements action listener
A JFrame contains a JButton named button1 that should execute an actionPerformed() method when clicked. Which statement is needed in the JFrame class? a. addActionListener(this); b....
A class can implement ____________. A. One listener B. Two listeners C. As many listeners as it needs D. Any number of listeners as long as they are not conflicting listeners
When you write a method that reacts to JCheckBox changes, you name the method ____________. a. itemStateChanged() b. actionPerformed() c. checkBoxChanged() d. Any legal identifier you choose
If a class contains two components that might each generate a specific event type, you can determine which component caused the event by using the ____________ method. a. addActionListener() b....
Build a Gantt chart by using Microsoft Project based on the list of tasks as shown in Figure C-16. This mini-project is to build part of the user interface for a new system. The following Gantt...
The work breakdown structure shown in Figure C-17 is for a final iteration to deploy a new application in a new data center. The ABC company has a contract with Super ISP to host the system, and the...
Perform the following unsigned multiplication in binary using a minimum number of bits required for each decimal number using pencil and paper method: 12 x 52
Find the odd parity bit for the following binary message to be transmitted: 10110000.
Repeat Problem 2.20 using repeated addition. Data From Problem 20 Perform the following unsigned multiplication in binary using a minimum number of bits required for each decimal number using pencil...
For the format used in Exercise 5.19, what decimal number is represented by each of the following numbers in floating point format? a. C2F00000 16 b. 3C540000 16 Data from Exercise 5.19 Convert the...
Draw a logic diagram to implement F = ABCDE using only 3-input AND gates.
Using truth tables, express each one of the following functions and their complements in terms of sum of minterms and product of maxterms: (a) F = ABC + ABD + A B C + ACD (b) F = (W+ X + Y)(WX + Y)...
Minimize each of the following functions using a K-map: (a) F(A, B, C) = m(0, 1, 4, 5) (b) F(A, B, C) = m(0, 1, 2, 3, 6) (c) F(X, Y, Z) = m(0, 2, 4, 6)
Minimize each of the following expressions for F using a K-map. (a) F(A,B,C) = BC + ABC + ABC (b) F(A,B,C) = ABC + BC (c) F(A,B,C) = AC + A(BC + BC)
Figure 13-34 is an SSD for the use case Record dental procedure in the dental clinic system. Do the following: a. Develop a first-cut sequence diagram that only includes the actor and problem domain...
What is the three-character extension appended to solution filenames in Visual Basic? a. .prg b. .sln c. .src d. .vbs
Explain the difference between a forms Text property and its Name property.
How do you verify the name of the startup form?