In your response take the main piece to be on the right. Along these lines you ought
Question:
In your response take the main piece to be on the right. Along these lines you ought to hope to see: ?- ripple_carry_adder(2, [[1,1], [0,0]], 0, Cout, S). Cout = 0, S = [0, 1]. ?- ripple_carry_adder(2, [[0,0], [1,0]], 0, Cout, S). Cout = 0, S = [0, 1]. ?- ripple_carry_adder(2, [[0,0], [1,1]], 0, Cout, S). Cout = 1, S = [0, 0]. [2 marks] (g) Define the predicate test(X,Y,N) which tests ripple_carry_adder/5 against Prolog's inherent expansion work for up to N pieces of accuracy, or at least, fixed width test(X,Y,N) falls flat assuming flood happens (i.e., the convey bit is set). You might expect you are given predicates dec2bin(Dec,BinList) and bin2dec(BinList,Dec) for changing over among whole numbers and arrangements of pieces, and length(List,N) which relates records with their lengths. [4 marks]?
Assuming that a stack stores N things, portray how it very well may be seen as a nearly adjusted twofold tree. Distinction's best there be between the best and least lengths of ways from the foundation of the tree to a leaf? What activities should be performed to move from one hub in the tree to (a) its parent and (b) its posterity? [5 marks] Describe, and gauge the expenses of, methods to (a) embed another thing into a current load; (b) erase the highest thing from a non-void stack; (c) beginning from an exhibit holding N things in inconsistent request, adjust those things so they structure a store, taking time not exactly that which would be required assuming the things were simply embedded into the pile in a steady progression. [6 marks] A steady arranging strategy is one where things whose keys look at as equivalent will show up in the result in as per the pattern in which that they showed up in the info list. Could a stack sort in view of the calculations you have archived be steady? Legitimize your response. [5 marks] 6 Topics in Artificial Intelligence Give a few motivations behind why a few errands are fit to being addressed by utilizing requirements. Represent your response with instances of such errands and the strategies by which limitations are utilized to settle them. [20 marks] 7 Operating System Foundations Consider the activity of a scheduler in a framework where there are framework level and client level cycles. Client cycles might be IO bound or CPU bound and may have client controlled (negative) need. Depict the information structures that the scheduler could utilize, including portions of cycle descriptors that the scheduler would work on. [10 marks] Describe exhaustively the conditions under which the scheduler would be placed and for each unique situation frame a planning calculation that may be utilized. [10 marks] 4 CST.95.11.5 8 Operating System Functions A working framework for a shrewd card is required that is a typical run-time framework for the savvy card, which has some arrangement of utilizations stacked into the card at the time the card is given. What tasks should the memory the board part of the working framework support in such a framework? [12 marks] The equipment engineers are worried about complex memory the executives equipment consuming an excessive amount of force, yet the client requests memory assurance between the applications. Portray a few arrangements that could fulfill these needs.
How is a page shortcoming dealt with in the event that it is set off by an interaction giving a compose for which it has authorization on a machine with adequate free memory at the point the page issue happens? [6 marks] (c) If the machine doesn't have adequate free memory at the point that the page shortcoming happens, a casualty page should be chosen for substitution. Depict the ideal calculation for taking care of this case, and make sense of why it can't be executed. [2 marks] (d) Now depict a down to earth calculation for choosing a casualty page for substitution. In your response you ought to talk about its exhibition, stockpiling and time overheads, demonstrating any presumptions you make. [6 marks] (e) What is B'el'ady's Anomaly? Can the calculation depicted in Part (d) experience the ill effects of it? Legitimize your response. (Note: You are not expected to show a case of B'el'ady's Anomaly happening.) [4 marks] 5 (TURN OVER) CST0.2018.2.6 Segment C 5 Software and Security Engineering (a) Although the accompanying code accumulates and executes without blunder, give four motivations behind why it is an unfortunate test. @Test public void testIt() { long time = System.currentTimeMillis(); twofold r = solve(40229321L); if (r < 1000.0) { assertThat(r == 430.6).isTrue(); } long passed = System.currentTimeMillis() - time; assertThat(elapsed).isLessThan(3000); } [8 marks] (b) You are running a venture to foster the following variant of a working framework that upholds compulsory access control and restricts the incognito channel data transfer capacity that an interaction at security level High can use to flag down to a cycle at security level Low. Talk about the general commitment of unit testing, coordination testing and relapse testing in making sure that the secret channel data transmission is still acceptably low. [8 marks] (c) The working framework is presently going to be utilized in an alternate climate so that the heap example will change. How should this influence secretive channel data transfer capacity?
(a) Define the terms idleness and limit as applied to correspondence channels. [2 marks] (b) Is there a severe connection between the two? [1 mark] (c) Show how the inertness of a channel can straightforwardly affect the limit of a higher-layer channel which utilizes it. [10 marks] (d) How could the limit of the greater layer at any point channel be improved (keeping the attributes of the hidden channel unaltered)? [4 marks] (e) In what conditions could these enhancements have just restricted benefit? [3 marks] 4 Concurrent Systems and Applications (a) An exchange handling framework is utilizing a compose ahead log as an instrument for giving persevering stockpiling. What data should be kept in touch with the log (I) when an exchange begins; (ii) when an exchange plays out a procedure on a steady item; (iii) when an exchange commits? [2 marks each] (b) Describe how the log can be utilized to roll-back an exchange that has cut off or on the other hand become gridlocked. [6 marks] (c) The log can likewise be utilized to recuperate after certain sorts of framework disappointment. (I) Describe how the log can be utilized to recuperate after a fizzle stop crash. [2 marks] (ii) What is implied by checkpointing? What will utilizing it mean for the design of the log and the recuperation methodology after an accident? [6 marks] 3 [TURN OVER CST.2004.6.4 Segment B 5 Computer Graphics and Image Processing (a) Explain why show gadgets have all the earmarks of being ready to imitate (nearly) all the shades of the range utilizing just red, green and blue light. [4 marks] (b) Describe a calculation (other than thresholding) which will change over a greyscale picture (8 pieces for every pixel) to a bi-level high contrast picture (1 bit for each pixel), with similar number of pixels, while holding however much detail as could be expected. [8 marks] (c) Explain what specular and diffuse reflection are in reality. State and make sense of conditions for working out approximations for both in a PC. [8 marks] 6 Databases (a) Define the administrators of the center social polynomial math. [5 marks] (b) Let R be a connection with outline (A1, . . . , An, B1, . . . , Bm) and S be a connection with outline (B1, . . . , Bm). The remainder of R and S, composed R S, is the set of tuples t over credits (A1, . . . , An) to such an extent that for each tuple s in S, the tuple ts (for example the connection of tuples t and s) is an individual from R. Characterize the remainder administrator utilizing the administrators of the center social variable based math. [8 marks] (c) The center social variable based math can be reached out with a copy disposal administrator, and a gathering administrator. (I) Define cautiously these two administrators. [3 marks] (ii) Assuming the gathering administrator, show how the copy end administrator is, truth be told, pointless. [2 marks] (iii) Can the gathering administrator be utilized to characterize the projection administrator? Legitimize your response.
A city board has chosen to mount Bluetooth checking hardware at each major street intersection across the city and to utilize the data accumulated to upgrade traffic streams. Specifically, it expects to control both the time span for which explicit traffic signals are green, and the general timing of the approvals at various intersections. What execution, wellbeing and security issues could emerge, and what approaches ought to be carried out to deal with the related dangers? [20 marks] Note: You ought to accept that the filtering hardware can acquire an exceptional network address for most of vehicles and of cell phones conveyed by cyclists traveling through the city. The filtering hardware doesn't contain any exploitable weaknesses yet you might accept that an aggressor can recreate the presence of numerous Bluetooth gadgets from a solitary cell phone situated almost a scanner.
N. Wirth's reading material Algorithms + information structures = programs (1976) contains the following story. I wedded a widow (call her W) who has an adult girl (D). My dad (F), who visited us frequently, became hopelessly enamored with my step-girl and wedded her. Thus my dad turned into my child in-regulation also, my progression girl turned into my mom. A few months after the fact, my significant other brought forth a child (S1), who turned into the brother by marriage of my dad, as well as my uncle. The spouse of my dad - that is, my progression little girl - likewise had a child (S2). Utilizing Prolog, make a rundown of realities that addresses what is happening in the above story. [5 marks] Add rules characterizing the family connections (like father by marriage) depicted in the story. [5 marks] Show how a Prolog framework would utilize your program to demonstrate the objective "I'm my own granddad". [10 marks] 9 Databases Make sense of the ANSI/SPARC engineering for Data Base Management Systems, and show how it upholds information freedom. [5 marks] Depict the social model of information presented by E.F. Codd in 1970. [4 marks] What are its assets and shortcomings? [7 marks] What elements have prompted its predominant situation in the commercial center today?In your response take the main piece to be on the right. Along these lines you ought to hope to see: ?- ripple_carry_adder(2, [[1,1], [0,0]], 0, Cout, S). Cout = 0, S = [0, 1]. ?- ripple_carry_adder(2, [[0,0], [1,0]], 0, Cout, S). Cout = 0, S = [0, 1]. ?- ripple_carry_adder(2, [[0,0], [1,1]], 0, Cout, S). Cout = 1, S = [0, 0]. [2 marks] (g) Define the predicate test(X,Y,N) which tests ripple_carry_adder/5 against Prolog's inherent expansion work for up to N pieces of accuracy, or at least, fixed width test(X,Y,N) falls flat assuming flood happens (i.e., the convey bit is set). You might expect you are given predicates dec2bin(Dec,BinList) and bin2dec(BinList,Dec) for changing over among whole numbers and arrangements of pieces, and length(List,N) which relates records with their lengths. [4 marks]?
Assuming that a stack stores N things, portray how it very well may be seen as a nearly adjusted twofold tree. Distinction's best there be between the best and least lengths of ways from the foundation of the tree to a leaf? What activities should be performed to move from one hub in the tree to (a) its parent and (b) its posterity? [5 marks] Describe, and gauge the expenses of, methods to (a) embed another thing into a current load; (b) erase the highest thing from a non-void stack; (c) beginning from an exhibit holding N things in inconsistent request, adjust those things so they structure a store, taking time not exactly that which would be required assuming the things were simply embedded into the pile in a steady progression. [6 marks] A steady arranging strategy is one where things whose keys look at as equivalent will show up in the result in as per the pattern in which that they showed up in the info list. Could a stack sort in view of the calculations you have archived be steady? Legitimize your response. [5 marks] 6 Topics in Artificial Intelligence Give a few motivations behind why a few errands are fit to being addressed by utilizing requirements. Represent your response with instances of such errands and the strategies by which limitations are utilized to settle them. [20 marks] 7 Operating System Foundations Consider the activity of a scheduler in a framework where there are framework level and client level cycles. Client cycles might be IO bound or CPU bound and may have client controlled (negative) need. Depict the information structures that the scheduler could utilize, including portions of cycle descriptors that the scheduler would work on. [10 marks] Describe exhaustively the conditions under which the scheduler would be placed and for each unique situation frame a planning calculation that may be utilized. [10 marks] 4 CST.95.11.5 8 Operating System Functions A working framework for a shrewd card is required that is a typical run-time framework for the savvy card, which has some arrangement of utilizations stacked into the card at the time the card is given. What tasks should the memory the board part of the working framework support in such a framework? [12 marks] The equipment engineers are worried about complex memory the executives equipment consuming an excessive amount of force, yet the client requests memory assurance between the applications. Portray a few arrangements that could fulfill these needs.
How is a page shortcoming dealt with in the event that it is set off by an interaction giving a compose for which it has authorization on a machine with adequate free memory at the point the page issue happens? [6 marks] (c) If the machine doesn't have adequate free memory at the point that the page shortcoming happens, a casualty page should be chosen for substitution. Depict the ideal calculation for taking care of this case, and make sense of why it can't be executed. [2 marks] (d) Now depict a down to earth calculation for choosing a casualty page for substitution. In your response you ought to talk about its exhibition, stockpiling and time overheads, demonstrating any presumptions you make. [6 marks] (e) What is B'el'ady's Anomaly? Can the calculation depicted in Part (d) experience the ill effects of it? Legitimize your response. (Note: You are not expected to show a case of B'el'ady's Anomaly happening.) [4 marks] 5 (TURN OVER) CST0.2018.2.6 Segment C 5 Software and Security Engineering (a) Although the accompanying code accumulates and executes without blunder, give four motivations behind why it is an unfortunate test. @Test public void testIt() { long time = System.currentTimeMillis(); twofold r = solve(40229321L); if (r < 1000.0) { assertThat(r == 430.6).isTrue(); } long passed = System.currentTimeMillis() - time; assertThat(elapsed).isLessThan(3000); } [8 marks] (b) You are running a venture to foster the following variant of a working framework that upholds compulsory access control and restricts the incognito channel data transfer capacity that an interaction at security level High can use to flag down to a cycle at security level Low. Talk about the general commitment of unit testing, coordination testing and relapse testing in making sure that the secret channel data transmission is still acceptably low. [8 marks] (c) The working framework is presently going to be utilized in an alternate climate so that the heap example will change. How should this influence secretive channel data transfer capacity?
(a) Define the terms idleness and limit as applied to correspondence channels. [2 marks] (b) Is there a severe connection between the two? [1 mark] (c) Show how the inertness of a channel can straightforwardly affect the limit of a higher-layer channel which utilizes it. [10 marks] (d) How could the limit of the greater layer at any point channel be improved (keeping the attributes of the hidden channel unaltered)? [4 marks] (e) In what conditions could these enhancements have just restricted benefit? [3 marks] 4 Concurrent Systems and Applications (a) An exchange handling framework is utilizing a compose ahead log as an instrument for giving persevering stockpiling. What data should be kept in touch with the log (I) when an exchange begins; (ii) when an exchange plays out a procedure on a steady item; (iii) when an exchange commits? [2 marks each] (b) Describe how the log can be utilized to roll-back an exchange that has cut off or on the other hand become gridlocked. [6 marks] (c) The log can likewise be utilized to recuperate after certain sorts of framework disappointment. (I) Describe how the log can be utilized to recuperate after a fizzle stop crash. [2 marks] (ii) What is implied by checkpointing? What will utilizing it mean for the design of the log and the recuperation methodology after an accident? [6 marks] 3 [TURN OVER CST.2004.6.4 Segment B 5 Computer Graphics and Image Processing (a) Explain why show gadgets have all the earmarks of being ready to imitate (nearly) all the shades of the range utilizing just red, green and blue light. [4 marks] (b) Describe a calculation (other than thresholding) which will change over a greyscale picture (8 pieces for every pixel) to a bi-level high contrast picture (1 bit for each pixel), with similar number of pixels, while holding however much detail as could be expected. [8 marks] (c) Explain what specular and diffuse reflection are in reality. State and make sense of conditions for working out approximations for both in a PC. [8 marks] 6 Databases (a) Define the administrators of the center social polynomial math. [5 marks] (b) Let R be a connection with outline (A1, . . . , An, B1, . . . , Bm) and S be a connection with outline (B1, . . . , Bm). The remainder of R and S, composed R S, is the set of tuples t over credits (A1, . . . , An) to such an extent that for each tuple s in S, the tuple ts (for example the connection of tuples t and s) is an individual from R. Characterize the remainder administrator utilizing the administrators of the center social variable based math. [8 marks] (c) The center social variable based math can be reached out with a copy disposal administrator, and a gathering administrator. (I) Define cautiously these two administrators. [3 marks] (ii) Assuming the gathering administrator, show how the copy end administrator is, truth be told, pointless. [2 marks] (iii) Can the gathering administrator be utilized to characterize the projection administrator? Legitimize your response.
A city board has chosen to mount Bluetooth checking hardware at each major street intersection across the city and to utilize the data accumulated to upgrade traffic streams. Specifically, it expects to control both the time span for which explicit traffic signals are green, and the general timing of the approvals at various intersections. What execution, wellbeing and security issues could emerge, and what approaches ought to be carried out to deal with the related dangers? [20 marks] Note: You ought to accept that the filtering hardware can acquire an exceptional network address for most of vehicles and of cell phones conveyed by cyclists traveling through the city. The filtering hardware doesn't contain any exploitable weaknesses yet you might accept that an aggressor can recreate the presence of numerous Bluetooth gadgets from a solitary cell phone situated almost a scanner.
N. Wirth's reading material Algorithms + information structures = programs (1976) contains the following story. I wedded a widow (call her W) who has an adult girl (D). My dad (F), who visited us frequently, became hopelessly enamored with my step-girl and wedded her. Thus my dad turned into my child in-regulation also, my progression girl turned into my mom. A few months after the fact, my significant other brought forth a child (S1), who turned into the brother by marriage of my dad, as well as my uncle. The spouse of my dad - that is, my progression little girl - likewise had a child (S2). Utilizing Prolog, make a rundown of realities that addresses what is happening in the above story. [5 marks] Add rules characterizing the family connections (like father by marriage) depicted in the story. [5 marks] Show how a Prolog framework would utilize your program to demonstrate the objective "I'm my own granddad". [10 marks] 9 Databases Make sense of the ANSI/SPARC engineering for Data Base Management Systems, and show how it upholds information freedom. [5 marks] Depict the social model of information presented by E.F. Codd in 1970. [4 marks] What are its assets and shortcomings? [7 marks] What elements have prompted its predominant situation in the commercial center today?