Assuming a 1-KB page size, what are the page numbers and offsets for the following address references (provided as decimal numbers): a. 3085 b. 42095 c. 215201 d. 650000 e. 2000001
The following pseudocode algorithm has an error. The program is supposed to ask the user for the length and width of a rectangular room, and then display the room's area. The program must multiply...
What are the sources of big data for text analytics?
Each computer may have more than one operating system, and each operating system may be installed on more than one computer. Add an associative entity called COMPUTER OPERATING SYSTEM between...
Your nursery sells various types and sizes of trees, bedding plants, vegetable plants, and shrubs. It also sells fertilizer and potting soil. Design a coding scheme for your nursery.
Figure 12-18 depicts the activities performed in the revenue cycle by the Newton Hardware Company. a. Identify at least 7 weaknesses in Newton Hardware's revenue cycle. Explain the resulting threat...
What people, organization, and technology factors should be addressed when deciding whether to allow employees to use their personal smartphones for work?
What are the core problem-solving steps for developing new information systems? 1. List and describe the problem-solving steps for building a new system. 2. Define information requirements and...
Alan Turing is considered one of computer science's founding fathers. Describe two of his contributions to the discipline, and explain the importance of those contributions?
Create a text file named string.js and enter the Capitalize function into that file. Then, modify your strdemo.html page so that it loads this library file. When the button in the page is clicked, in...
Define database management system (DBMS). Give an example of a DBMS for PCs and one for mainframe computers.
1. What are some business applications of Google Maps' Street View? 2. How has Google Maps' Street View created privacy and other legal issues? 3. What is Google Books, and how has it created...
. A bus is a link between devices connected to the computer. It can be parallel or serial, internal (local) or external. True or False? 2. Second generation of computers are identified by vacuum...
1. By 2020 how many smartphones will be available globally? 2. Who are the two companies that generate the biggest revenue from mobile ads? 3. What does PlaceIQ do for businesses? 4. For what purpose...
1. What processes did the Lotus platform automate and streamline? 2. What are some benefits of the new Web interface? 3. Which of the development methods discussed in this chapter would be most...
What is one major difference between virtual and augmented reality?
An algorithm takes 0.5 ms for input size 100. How large a problem can be solved in 1 min if the running time is the following (assume low-order terms are negligible): a. linear b. O(N logN) c....
The Josephus problem is the following game: N people, numbered 1 to N, are sitting in a circle. Starting at person 1, a hot potato is passed. After M passes, the person holding the hot potato is...
In the quadratic probing hash table, suppose that instead of inserting a new item into the location suggested by findPos, we insert it into the first inactive cell on the search path (thus, it is...
Repeat Exercise 7.20 when the pivot is chosen as a. The first element b. The larger of the first two distinct elements c. A random element d. The average of all elements in the set In exercise Using...
The clique problem can be stated as follows: Given an undirected graph G = (V, E) and an integer K, does G contain a complete subgraph of at least K vertices? The vertex cover problem can be stated...
The longest common subsequence problem is as follows: Given two sequences A = a1, a2, . . . , aM, and B = b1, b2, . . . , bN, find the length, k, of the longest sequence C = c1, c2, . . . , ck such...
Identify the functions of a transaction processing system.
Identify the steps in the systems development process and state the goal of each.
What are the components of any information system?
What is the difference between e-commerce and m-commerce?
What role does an information system play in today's organizations?
What is quality? What is total quality management (TQM)?
What advantages do fuel cells offer over batteries for use in portable electronic devices? Do they have any disadvantages?
How can application software improve the effectiveness of a large enterprise? What are some of the benefits associated with implementation of an enterprise resource planning system? What are some of...
If you were the database administrator for the iTunes store, how might you use predictive analysis to determine which artists and movies will sell most next year?
What functions do decision support systems support in business organizations? How does a DSS differ from a TPS and an MIS?
As the head buyer for a major supermarket chain, you are constantly being asked by manufacturers and distributors to stock their new products. Over 50 new items are introduced each week. Many times,...
Draw an ERD for the following situation (Batra et al., 1988). Also, develop the list of words for qualifiers and classes that you use to form attribute names. Explain why you chose the words on your...
Procter & Gamble (P&G) owns a large portfolio of familiar brands such as Pampers, Tide, Bounty, Folgers, Pringles, Charmin, and Crest. P&G operates in more than 80 countries worldwide, with net sales...
Draw an ERD for the following situation. (State any assumptions you believe you have to make in order to develop a complete diagram.) Also, draw a data model for this situation using the tool you...
Explore the data included in Table 4-9. Assume that the primary key of this relation consists of two components: Author's ID (AID) and Book number (BNbr). The relation includes data regarding...
Imagine that you have trained your St. Bernard, Bernie, to carry a box of three 8mm tapes instead of a flask of brandy. (When your disk fills up, you consider that an emergency.) These tapes each...
An alternative to a LAN is simply a big timesharing system with terminals for all users. Give two advantages of a client-server system using a LAN.
A collection of five routers is to be connected in a point-to-point subnet. Between each pair of routers, the designers may put a high-speed line, a medium-speed line, a low-speed line, or no line....
List two advantages and two disadvantages of having international standards for network protocol?
If a binary signal is sent over a 3-kHz channel whose signal-to-noise ratio is 20 dB, what is the maximum achievable data rate?
A laser beam 1 mm wide is aimed at a detector 1 mm wide 100 m away on the roof of a building. How much of an angular diversion (in degrees) does the laser have to have before it misses the detector?
Ten signals, each requiring 4000 Hz, are multiplexed on to a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel? Assume that the guard bands are 400 Hz wide.
Three packet-switching networks each contain n nodes. The first network has a star topology with a central switch, the second is a (bidirectional) ring, and the third is fully interconnected, with a...
Suppose that x bits of user data are to be transmitted over a k-hop path in a packet-switched network as a series of packets, each containing p data bits and h header bits, with x >> p + h. The bit...
In a typical mobile phone system with hexagonal cells, it is forbidden to reuse a frequency band in an adjacent cell. If 840 frequencies are available, how many can be used in a given cell?
Sometimes when a mobile user crosses the boundary from one cell to another, the current call is abruptly terminated, even though all transmitters and receivers are functioning perfectly. Why?
Suppose that A, B, and C are simultaneously transmitting 0 bits, using a CDMA system with the chip sequences of Fig. 2-45(b). What is the resulting chip sequence?
The following character encoding is used in a data link protocol: A: 01000111; B: 11100011; FLAG: 01111110; ESC: 11100000 Show the bit sequence transmitted (in binary) for the four-character frame: A...
The following data fragment occurs in the middle of a data stream for which the byte-stuffing algorithm described in the text is used: A B ESC C ESC FLAG D. What is the output after stuffing?
A bit string, 0111101111101111110, needs to be transmitted at the data link layer. What is the string actually transmitted after bit stuffing?
Sixteen-bit messages are transmitted using a Hamming code. How many check bits are needed to ensure that the receiver can detect and correct single bit errors? Show the bit pattern transmitted for...
A 12-bit Hamming code whose hexadecimal value is 0xE4F arrives at a receiver. What was the original value in hexadecimal? Assume that not more than 1 bit is in error.
What is the remainder obtained by dividing x7 + x5 + 1 by the generator polynomial x3 + 1?
A group of N stations share a 56-kbps pure ALOHA channels. Each station outputs a 1000-bit frame on an average of once every 100 sec, even if the previous one has not yet been sent (e.g., the...
How long does a station, s, have to wait in the worst case before it can start transmitting its frame over a LAN that uses (a) The basic bit-map protocol? (b) Mok and Ward's protocol with permuting...
Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using the adaptive tree walk protocol. If all the stations whose addresses are prime numbers suddenly become...
Six stations, A through F, communicate using the MACA protocol. Is it possible that two transmissions take place simultaneously? Explain your answer.
Consider building a CSMA/CD network running at 1 Gbps over a 1-km cable with no repeaters. The signal speed in the cable is 200,000 km/sec. What is the minimum frame size?
Assuming that all routers and hosts are working properly and that all software in both is free of all errors, is there any chance, however small, that a packet will be delivered to the wrong...
The CPU in a router can process 2 million packets/sec. The load offered to it is 1.5 million packets/sec, if a route from source to destination contains 10 routers, how much time is spent being...
Consider the quoted-printable MIME encoding scheme. Mention a problem not discussed in the text and proposes a solution.
From an ISP's point of view, POP3 and IMAP differ in an important way. POP3 users generally empty their mailboxes every day. IMAP users keep their mail on the server indefinitely. Imagine that you...
An HTML page is as follows: "www.info-source.com/welcome.html" If the user clicks on the link, a TCP connection is opened and a series of lines is sent to the server. List all the lines sent.
In Fig. 7-57(c) quantization noise occurs due to the use of 4-bit samples to represent nine signal values. The first sample, at 0, is exact, but the next few are not. What is the percent error for...
Can a 1-bit error in an MPEG frame affect more than the frame in which the error occurs? Explain your answer.
In the Needham-Schroeder protocol, Alice generates two challenges, RA and RA2. This seems like overkill. Would one not have done the job?
Consider sorting n numbers stored in array A by first finding the smallest element of A and exchanging it with the element in A[1]. Then find the second smallest element of A, and exchange it with A...
Professor Armstrong suggests the following procedure for generating a uniform random permutation: PERMUTE-BY-CYCLIC (A) 1 n length [A] 2 offset RANDOM (1, n) 3 for i 1 to n 4 do dest i + offset 5 if...
Illustrate the operation of MAX-HEAP-INSERT (A, 10) on the heap A = 15, 13, 9, 5, 12, 8, 7, 4, 0, 6, 2, 1. Use the heap of Figure 6.5 as a model for the HEAP-INCREASE-KEY call.
Show how to sort n integers in the range 0 to n2 - 1 in O (n) time.
The next two parts will prove inequality (2.3). b. State precisely a loop invariant for the for loop in lines 2-4, and prove that this loop invariant holds. Your proof should use the structure of the...
A hash table of size m is used to store n items, with n m/2. Open addressing is used for collision resolution. a. Assuming uniform hashing, show that for i = 1, 2, ..., n, the probability that the...
During the course of an algorithm, we sometimes find that we need to maintain past versions of a dynamic set as it is updated. Such a set is called persistent. One way to implement a persistent set...
A directed graph G = (V, E) is said to be semi connected if, for all pairs of vertices u, v V, we have u v or v u. Give an efficient algorithm to determine whether or not G is semi connected. Prove...
Consider the relation of as shown below, which shows the result of the query ?Find the names of all customers who have a loan at the bank.? Rewrite the query to include not only the name, but also...
Show that, in SQL, < > all is identical to not in.
Consider the relational database of Figure. Using SQL, define a view consisting of manager-name and the average salary of all employees who work for that manager. Explain why the database system...
Consider the employee database of Figure, where the primary keys are underlined. Give an expression in SQL for each of the following queries. a. Find the names of all employees who work for First...
Consider the insurance database of Figure, where the primary keys are underlined. Construct the following QBE queries for this relational-database. a. Find the total number of people who owned cars...
Complete the SQL DDL definition of the bank database of Figure to include the relations loan andborrower. create table customer (customer-name char(20), customer-street char(30), customer-city...
Show that the following decomposition of the schema R of Exercise 7.2 is not loss less-join decomposition: (A, B, C) (C, D, E).
Give an example of a relation schema R` and set F` of functional dependencies such that there are at least three distinct lossless-join decompositions of R` into BCNF.
In designing a relational database, why might we choose a non-BCNF design?
Consider a system that provides persistent objects. Is such a system necessarily a database system? Explain your answer.
Give an SQL: 1999 schema definition of the E-R diagram in Figure below, which contains specializations. city street name person ISA credit-rating salary ploye customer ISA officer teller secretary...
Give the DTD for an XML representation of the following nested-relational schema Emp = (ename, ChildrenSet setof (Children), SkillsSet setof (Skills)) Children = (name, Birthday) Birthday = (day,...
Write a query in XQuery on the XML representation as shown below to compute the left outer join of customer elements with account elements. account-number ID #REQUIRED owners IDREFS #REQUIRED >...
Consider the following recursive DTD. ] > a. Give a small example of data corresponding to the above DTD. b. Show how to map this DTD to a relational schema. You can assume that part names are...
List two advantages and two disadvantages of each of the following strategies for storing a relational database: a. Store each relation in one file. b. Store multiple relations (perhaps even the...
Consider the relations r1 (A, B, C), r2 (C, D, E), and r3 (E, F), with primary keys A, C, and E, respectively. Assume that r1 has 1000 tuples, r2 has 1500 tuples, and r3 has 750 tuples. Estimate the...
Since every conflict-serializable schedule is view serializable, why do we emphasize conflict serializability rather than view serializability?
Consider a variant of the tree protocol called the forest protocol. The database is organized as a forest of rooted trees. Each transaction Ti must follow the following rules: The first lock in each...
When a transaction is rolled back under timestamp ordering, it is assigned a new timestamp. Why can it not simply keep its old timestamp?
Although SIX mode is useful in multiple-granularity locking, an exclusive and intend-shared (XIS) mode is of no use. Why is it useless?
Explain the difference between a system crash and a disaster.
For each of the following requirements, identify the best choice of degree of durability in a remote backup system: a. Data loss must be avoided but some loss of availability may be tolerated. b....
In typical clientserver systems the server machine is much more powerful than the clients; that is, its processor is faster, it may have multiple processors, and it has more memory and disk capacity....
What form of parallelism (interquery, interoperation, or intraoperation) is likely to be the most important for each of the following tasks? a. Increasing the throughput of a system with many small...