Question Answers
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Tutor
AI Flashcards
FREE
Search
Search
Sign In
Register
study help categories
/
Computer science
Top Selling Computer science Questions
What is a data structure? List several types of common data structures.
What is an address? What is a pointer? What purpose are they used for?
Your computer sends a DNS request message to your local DNS server. After an unusually long time, your computer receives a DNS response message that the host name in your request message does not...
How does a class differ from other data structures?
Describe the operation of a MOVE instruction. Why is the name move a misnomer?
Why does program execution speed generally increase as the number of general-purpose registers increases?
How does a RISC processor differ from a CISC processor? Is one processor type better than the other? Why or why not?
What factors account for the dramatic improvements in microprocessor clock rates over the past three decades?
What potential advantages do optical processors offer compared with electrical processors?
Which is the better measure of computer system performance a benchmark, such as SPEC CINT, or a processor speed measure, such as GHz, MIPS, or MFLOPS? Why?
a. What happens in each stage of the PlanProtectRespond cycle? 2a.) Firewall operation takes place during the _______ phase. a. Plan b. Protect c. Response d. None of the above b. Which stage...
In what way(s) is/are SSDs an improvement over magnetic disk drives? In what way(s) isn't/aren't they an improvement over magnetic disk drives?
List and briefly describe the standards for recordable and rewritable CDs and DVDs. Are any of them to clearly superior to their competitors?
Describe three types of multicomputer configurations. What are their comparative advantages and disadvantages?
What are the binary, octal, and hexadecimal representations of the decimal number 10?
What is excess notation? What is twos complement notation? Why are they needed? In other words, why cant integer values be represented by ordinary binary numbers?
How is an array stored in main memory? How is a linked list stored in main memory? What are their comparative advantages and disadvantages? Give examples of data that would be best stored as an array...
What are special-purpose registers? Give three examples of special-purpose registers and explain how each is used.
Define word size. What are the advantages and disadvantages of increasing word size?
Why should you defragment magnetic disk drives? Why should you avoid defragmenting SSDs?
In this problem, we prove that the average depth of a node in a randomly built binary search tree with n nodes is O(lg n). Although this result is weaker than that of Theorem 12.4, the technique we...
Describe the processes of reading from and writing to a phase-change optical disc. How to the performance and areal density of these discs compare with magnetic disks?
Which factors do magnetic storage device manufacturers balance to ensure high capacity and performance at reasonable cost and reliability?
Describe the factors that contribute to a disk drives average access time. Which of these factors is improved if the spin rate is increased? Which is improved if areal density is increased?
How is data stored and retrieved on a magnetic mass storage device?
During the course of an algorithm, we sometimes find that we need to maintain past versions of a dynamic set as it is updated. We call such a set persistent. One way to implement a persistent set is...
Modern computers use a cache to store a small amount of data in a fast memory. Even though a program may access large amounts of data, by storing a small subset of the main memory in the cache-a...
Describe serial, random, and parallel access. What types of storage devices use each method?
Given two strings a = a 0 a 1 . . .a p and b = b 0 b 1 . . .b q , where each a i and each b j is in some ordered set of characters, we say that string a is lexicographically less than string b if...
Why isnt flash RAM commonly used to implement primary storage?
What are the differences between static and dynamic RAM?
What factors limit the speed of an electrically based processing device?
What characteristics of the CPU and primary storage should be balanced to achieve maximum system performance?
What improvements are offered by synchronous DRAM compared with ordinary DRAM?
In the depth-determination problem, we maintain a forest F = {T i } of rooted trees under three operations: MAKE-TREE () creates a tree whose only node is . FIND-DEPTH () returns the depth of node ...
Why is the areal density of optical discs higher than the areal density of magnetic disks? What factors limit this areal density?
What is the system bus? What are its primary components?
What is a bus master? What is the advantage of having devices other than the CPU be a bus master?
What is an interrupt? How is an interrupt generated? How is it processed?
Describe the execution of the push and pop operations.
Whats the difference between a physical access and logical access?
What is a buffer? Why might one be used?
A scaling algorithm solves a problem by initially considering only the highest-order bit of each relevant input value (such as an edge weight). It then refines the initial solution by looking at the...
How can a cache be used to improve performance when reading data from and writing data to a storage device?
Whats the difference between lossy and lossless compression? For what types of data is lossy compression used?
In the computer generation of musical sounds, pure tones need to be windowed to make them more interesting. Windowing mimics the way a musician would approach the generation of a certain sound....
Consider an envelope detector that is used to detect the message sent in the AM system shown in the examples. The envelope detector as a system is composed of two cascaded systems: one which computes...
Describe the process by which keystrokes are recognized by the software.
What is a font? What is point size?
What are the additive colors? What are the subtractive colors? What types of I/O devices use each kind of color?
What is a bitmap? How does a bitmaps chromatic resolution affect its size?
What is an image description language? What are the advantages of representing images with image description languages?
Why does a video controller have its own processor and memory?
The following problems relate to linearity, time-invariance, and causality of systems. (a) A system is represented by the equation z(t) = v(t) f(t) + B where v(t) is the input, z(t) the output, f(t)...
Describe the technologies used to implement flat panel displays. What are their comparative advantages and disadvantages?
The DatagramPacket class has two constructors (see Table 25.11). Which constructor can be used as a sending packet? Table 25.11 Some methods in DatagramPacket class public final class...
Give examples of 1:1, 1:N, and N:M relationships (other than those presented in this chapter). Draw two E-R diagrams for each of your examples: one using the traditional diamond notation and one...
Explain the need for each of the actions in Figure 6-29(b). Actions When Child Is Required Child Required Action on Parent Get a child. Prohibit. Update the foreign key of (at least one) child....
Explain the need for each of the actions in Figure 6-29(a). Parent Required Action on Parent Action on Child Insert None. Get a parent. Prohibit. Change children's foreign Modify key or foreign key...
You're is professional, and your boss has asked you to prepare a briefing for senior staff on the comparative advantages and disadvantages of three competing secondary storage technologies: magnetic...
1. To what events must the MLS system respond? List each event, the type of event, and the resulting use case. Be sure to consider all the use cases that would be needed to maintain the data in the...
What is a state transition?
List and briefly describe the three elements of the fraud triangle. Over which element can a system designer exercise the greatest control?
1. Based on the information here, draw a domain model class diagram for the MLS system. Be sure to consider what information needs to be included versus information that is not in the problem domain....
Refer to the RMO CSMS Marketing subsystem shown in Figure 3-10. Draw a use case diagram that shows all actors and all use cases. Use a drawing tool such as Microsoft Visio if it is available. Use...
Describe three low-level P2P interprocess communication standards. What are the advantages and disadvantages of using these standards to implement distributed multilayer applications?
Whats the difference between a real resource and a virtual resource?
Briefly define the terms technology architecture and application architecture. How are they different? How are they interdependent?
Given the database table in Figure 9-27 of university course and sections offered, normalize the table so that it is in third normal form. Hint: Look for functional dependencies.
Refer to the RMO CSMS Reporting subsystem shown in Figure 3-10. These reports were identified by asking users about temporal events, meaning points in time that require the system to produce...
The heuristic path algorithm (Pohl, HEURISTIC PATH 1977) is a best-first search in which the evaluation function is f(n) = (2 w)g(n) + wh(n). For what values of w is this complete? For what values...
Whats the difference between a world state, a state description, and a search node? Why is this distinction useful?
Review the case description and your solution for the Web scenario of the use case Request package pickup from Chapter 5. Then, using a presentation tool, such as Microsoft PowerPoint or Apple...
Is AI a science, or is it engineering? Or neither or both? Explain.
Section 7.7.1 provides some of the successor-state axioms required for the wumpus world. Write down axioms for all remaining fluent symbols.
The Board of Realtors Multiple Listing Service (MLS) system isnt very large in terms of use cases and domain classes. In that respect, the functional requirements are simple and well understood. MLS...
1. Based on the use case diagram and other project information, develop a list of software components (subsystems) that must be acquired or developed. Describe the function(s) of each component in...
1. Create a System Vision Document. 2. Review all the use cases that you identified in Chapter 2 and then enhance the list to achieve a complete solution based on the narratives that you have read in...
Explain why every nonempty propositional clause, by itself, is satisfiable. Prove rigorously that every set of five 3-SAT clauses is satisfiable, provided that each clause mentions exactly three...
Prove, or find a counterexample to, each of the following assertions: a. If or |= (or both) then ( ) b. If ( ) then and . c. If ( ) then or (or both).
Define in your own words the terms constraint, backtracking search, arc consistency, back jumping, min-conflicts, and cycle cutset.
We introduced Sudoku as a CSP to be solved by search over partial assignments because that is the way people generally undertake solving Sudoku problems. It is also possible, of course, to attack...
The traveling salesperson problem (TSP) can be solved with the minimum-spanning tree (MST) heuristic, which estimates the cost of completing a tour, given that a partial tour has already been...
Construct an example of two clauses that can be resolved together in two different ways giving two different outcomes.
On page 68, we said that we would not consider problems with negative path costs. In this exercise, we explore this decision in more depth. a. Suppose that actions can have arbitrarily large negative...
In the blocks world we were forced to introduce two action schemas, Move and MoveToTable, in order to maintain the Clear predicate properly. Show how conditional effects can be used to represent both...
Suppose the Flip action always changes the truth value of variable L. Show how to define its effects by using an action schema with conditional effects. Show that, despite the use of conditional...
Suppose you are given a coin that lands heads with probability x and tails with probability 1 x. Are the outcomes of successive flips of the coin independent of each other given that you know the...
Prove that the judgments B A and C D in the Allais paradox violate the axiom of substitutability.
For the DBN specified in Exercise 15.13 and for the evidence values e 1 = not red eyes, not sleeping in class e 2 = red eyes, not sleeping in class e 3 = red eyes, sleeping in class perform the...
Trace the behavior of DPLL on the knowledge base in Figure 7.16 when trying to prove Q, and compare this behavior with that of the forward-chaining algorithm. Figure 7.16 LAM = P P L 3D M L L B...
Run an SQL SELECT query to demonstrate that the view PopularShowsView was constructed correctly.
Write an SQL CREATE TABLE statement to create a table named PICTURE using the column characteristics as shown in Figure 10C-98. Run the SQL statement to create the PICTURE table in the MEDIA database.
Consider a vocabulary with the following symbols: Occupation(p, o): Predicate. Person p has occupation o. Customer (p1, p2): Predicate. Person p1 is a customer of person p2. Boss(p1, p2): Predicate....
Translate 0xabcdef12 into decimal.
In his letter of August 24, 1654, Pascal was trying to show how a pot of money should be allocated when a gambling game must end prematurely. Imagine a game where each turn consists of the roll of a...
Do routers have IP addresses? If so, how many?
Show that the statement of conditional independence is equivalent to each of the statements P(X,Y |Z) = P(X Z)P(Y | Z) P(X |Y, Z) = P(X|Z) and P(BX,Z)= P(Y|Z). and P(B|X, Z) = P(Y | Z).
Languages that let you use an easily understood vocabulary of descriptive terms, such as read, write, or add, are known as ____________languages. a. Procedural b. High-level c. Machine d....
The rules of a programming language constitute its ____________. a. Syntax b. Logic c. Format d. Objects
Showing 4000 - 4100
of 5000
First
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
Last