Calculate the product of 8.0546875 10 0 and -1.79931640625 10 1 by hand, assuming A and B are stored in the 16-bit half precision format described in Exercise 3.27. Assume 1 guard, 1 round bit, and...
The ssthresh value for a Taho TCP station is set to 6 MSS. The station now is in the slow-start state with cwnd = 4 MSS. Show the values of cwnd, sstresh, and the state of the station before and...
Create a class named FormLetterWriter that includes two overloaded methods named displaySalutation(). The first method takes one String parameter that represents a customers last name, and it...
In this exercise, you modify the Chopkins Toys application from Exercise 11. Use Windows to make a copy of the Chopkins Solution folder. Rename the copy Modified Chopkins Solution. Open the Chopkins...
A rental car agency classifies the vehicles it rents into four categories: compact, midsize, full size, and sport utility. The agency wants to record the following data for all vehicles: Vehicle ID,...
Recall that we have two write policies and write allocation policies, and their combinations can be implemented either in L1 or L2 cache. Assume the following choices for L1 and L2 caches: L1...
Server farms such as Google and Yahoo! provide enough compute capacity for the highest request rate of the day. Imagine that most of the time these servers operate at only 60% capacity. Assume...
The neural structure of the sea slug Aplysia has been widely studied (first by Nobel Laureate Eric Kandel) because it has only about 20,000 neurons, most of them large and easily manipulated....
A professor wants to know if students are getting enough sleep. Each day, the professor observes whether the students sleep in class, and whether they have red eyes. The professor has the following...
Create a Windows Forms application. Use the following names for the project and solution, respectively: Chopkins Project and Chopkins Solution. Save the application in the VB2017\Chap03 folder....
A Manchester signal has a data rate of 100 Kbps. Using Figure 4.8, calculate the value of the normalized energy (P) for frequencies at 0 Hz, 50 KHz, 100 KHz. Figure 4.8 O is L 1 is 1 Save = N ave 2...
The citys Crimes Analysis unit has submitted the following data requests. Provide the SQL statements to satisfy these requests. Test the statements and show the query results. 1. Show the average...
Cecilias Boutique wants several lists of salesperson data. Design a flowchart or pseudocode for the following: a. A program that accepts one salespersons ID number, number of items sold in the last...
In real-time interactive audio/video, what will happen if a packet arrives at the receiver site after the scheduled playback time?
a. Create an abstract class named Book. Include a String field for the books title and a double field for the books price. Within the class, include a constructor that requires the book title, and...
Th e eight great ideas in computer architecture are similar to ideas from other fields. Match the eight ideas from computer architecture, Design for Moores Law, Use Abstraction to Simplify Design,...
Consider the equation Ax 2 + B = 0. If B/A < 0, this equation has two solutions. The solutions are: (1) X 1 = Sqrt(B/A) (2) X 2 = Sqrt(B/A) If B/A = 0, this equation has one solution which is X = 0...
Create a TaxReturn class with fields that hold a taxpayers Social Security number, last name, first name, street address, city, state, zip code, annual income, marital status, and tax liability....
a. Draw the hierarchy chart and design the logic for a program needed by the manager of the Stengel County softball team, who wants to compute slugging percentages for his players. A slugging...
The Barking Lot is a dog day care center. Design a flowchart or pseudocode for following: a. A program that accepts data for an ID number of a dogs owner, and the name, breed, age, and weight of the...
Design a retirement planning calculator for Skulling Financial Services. Allow a user to enter a number of working years remaining in the users career and the annual amount of money the user can...
Describe in words what the state machine in Figure 3.69 does. Using binary state encodings, complete a state transition table and output table for the FSM. Write Boolean equations for the next state...
Consider the following idealized LTE scenario. The downstream channel (see Figure 7.21) is slotted in time, across F frequencies. There are four nodes, A, B, C, and D, reachable from the base station...
Le Chef Heureux Restaurant has 20 tables that can be reserved at 5 pm, 7 pm, or 9pm. Design a program that accepts reservations for specific tables at specific times; the user enters the number of...
A program is running on a computer with a four-entry fully associative (micro) translation lookaside buffer (TLB): The following is a trace of virtual page numbers accessed by a program. For each...
A bus company is responsible for offering public transportation in the suburbs of a large metropolitan area. The company has significant data management requirements: It needs to keep track of its...
Draw a circle with three random points on the circle. Connect the points to form a triangle. Display the angles in the triangle. Use the mouse to drag a point along the perimeter of the circle. As...
Write a method called pairCounts that accepts a list of strings representing individual words and counts the number of occurrences of all 2-character sequences of letters in those words. For example,...
a. Write the following IPv6 address in canonical form using RFC 5952: 2001:0ed2:056b:00d3:000c:abcd:0bcd:0fe0. 21a.) If I simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef, I get ________....
In Programming Exercise 9.7, the Account class was defined to model a bank account. An account has the properties account number, balance, annual interest rate, and date created, and methods to...
The basic single-cycle MIPS implementation in Figure 4.2 can only implement some instructions. New instructions can be added to an existing Instruction Set Architecture (ISA), but the decision...
Write an application that asks a user to enter three integers. Display them in ascending and descending order. Save the file as AscendingAndDescending.java.
Mean Time Between Failures (MTBF), Mean Time To Replacement (MTTR), and Mean Time To Failure (MTTF) are useful metrics for evaluating the reliability and availability of a storage resource. Explore...
Write an attribute grammar whose BNF basis is that of Example 3.6 in Section 3.4.5 but whose language rules are as follows: Data types cannot be mixed in expressions, but assignment statements need...
The ping program allows you to send a test packet to a given location and see how long it takes to get there and back. Try using ping to see how long it takes to get from your location to several...
Write an application that stores at least five different college courses (such as CIS101), the time it first meets in the week (such as Mon 9 am), and the instructor (such as Johnson) in a...
Suppose you work for a major airline and are given the job of writing the algorithm for processing upgrades into first class on various flights. Any frequent flyer can request an upgrade for his or...
Write a program that produces calendars as output. Your program should have a method that outputs a single months calendar like the one below, given parameters to specify how many days are in the...
Assume a GPU architecture that contains 10 SIMD processors. Each SIMD instruction has a width of 32 and each SIMD processor contains 8 lanes for single-precision arithmetic and load/store...
a. Write an application that prompts a user for the number of years the user has until retirement and the amount of money the user can save annually. If the user enters 0 or a negative number for...
a. Design a program for Hunterville College. The current tuition is $20,000 per year, and tuition is expected to increase by 3 percent each year. Display the tuition each year for the next 10 years....
The following list reflects current data requests from city managers. Provide the SQL statement to satisfy each request. Test the statements and show execution results. 1. List the following...
You are designing an adder for the blindingly fast 2-bit RePentium Processor. The adder is built from two full adders such that the carry out of the first adder is the carry in to the second adder,...
Write pseudocode for each example (a through e) in Exercise 2, making sure your pseudocode is structured and accomplishes the same tasks as the flowchart segment. Data From Exercise 2 a. b. D Yes NO...
Define the Circle2D class that contains: Two double data fields named x and y that specify the center of the circle with getter methods. A data field radius with a getter method. A no-arg...
Ben Bitdiddle has designed the circuit in Figure 3.74 to compute a registered four-input XOR function. Each two-input XOR gate has a propagation delay of 100 ps and a contamination delay of 55 ps....
This problem shows a special case in checksum handling. A sender has two data items to send: (4567) 16 and (BA98) 16 . What is the value of the checksum?
Draw an EER diagram for the following situation: TomKat Entertainment is a chain of theaters owned by former husband and wife actors/entertainers who, for some reason, cant get a job performing...
Is the circuit in Figure 3.66 combinational logic or sequential logic? Explain in a simple fashion what the relationship is between the inputs and outputs. What would you call this circuit? CLK
Draw a structured flowchart or write structured pseudocode describing how to decide what college to attend. Include at least two decisions and two loops.
Open the Multiplication Solution.sln file contained in the VB2017\Chap05\Multiplication Solution folder. Code the application to display a multiplication table similar to the one shown in Figure...
Using a text editor, create a file that contains a list of at least 15 six-digit account numbers. Read in each account number and display whether it is valid. An account number is valid only if the...
Although it can be formally proved that the code in Table 10.3 is both linear and cyclic, use only two tests to partially prove the fact: Table 10.3 a. Test the cyclic property on codeword 0101100....
Carlys Catering provides meals for parties and special events. Write a program that displays Carlys motto, which is Carlys makes the food that makes it a party. Save the file as CarlysMotto.java....
Professor Diogenes has n supposedly identical integrated-circuit chips that in principle are capable of testing each other. The professor?s test jig accommodates two chips at a time. When the jig is...
For the MIPS assembly instructions below, what is the corresponding C statement? Assume that the variables f, g, h, i, and j are assigned to registers $s0, $s1, $s2, $s3, and $s4, respectively....
Write a program that will count the number of characters, words, and lines in a file. Words are separated by whitespace characters. The file name should be passed as a command-line argument, as shown...
Write an application that counts the words in a String entered by a user. Words are separated by any combination of spaces, periods, commas, semicolons, question marks, exclamation points, or dashes....
In Code Fragment 5.1, we perform an experiment to compare the length of a Python list to its underlying memory usage. Determining the sequence of array sizes requires a manual inspection of the...
Garden Glory is a partnership that provides gardening and yard maintenance services to individuals and organizations. Garden Glory is owned by two partners. They employ two office administrators and...
The indented parenthetic representation of a tree T is a variation of the parenthetic representation of T (see Code Fragment 8.26) that uses indentation and line breaks as illustrated in Figure 8.22....
Create two tables based on the E-R model shown in Figure 4-41 and the business rules in the following list for a work order tracking database. Include all the constraints in the CREATE TABLE...
In this exercise, you will complete the Property Tax application that you created in Exercise 3 in Chapter 2. a. Use Windows to copy the Tax Solution folder from the VB2017\Chap02 folder to the...
Listing 15.17 BallPane.java using a thread to animate bouncing ball movements. Listing 1 import javafx.animation.KeyFrame; 2 import javafx.animation.Timeline; 3 import...
Convert the following program from machine language into MIPS assembly language. The numbers on the left are the instruction addresses in memory, and the numbers on the right give the instruction at...
Use the construction given in Theorem 1.39 to convert the following two nondeterministic finite automata to equivalent deterministic finite automata. a 1 1 2 a a,b a ,b 2 () (b) 3. (6)
Create an abstract Student class for Parker University. The class contains fields for student ID number, last name, and annual tuition. Include a constructor that requires parameters for the ID...
Issue the commands to disable and then enable the CHECK constraint on the Base_salary column.
The Freemont Automobile Factory has discovered that the longer a worker has been on the job, the more parts the worker can produce. Write an application that computes and displays a workers...
Recall the simple model for HTTP streaming shown in Figure 9.3. Suppose the client application buffer is infinite, the server sends at the constant rate x, and the video consumption rate is r with r...
Suppose that you have created a program with only the following variables. int age = 34; int weight = 180; double height = 5.9; Suppose that you also have a method with the following header: public...
Refer to earlier chapters for the functional details of this application. Large delivery companies like UPS and FedEx use highly customized portable hardware devices to enable their drivers to track...
In this exercise, you create an application that allows the user to enter the gender (either F or M) and GPA for any number of students. The application should calculate the average GPA for all...
Write an HDL module for the FSM with the state transition diagram given in Figure 3.69 from Exercise 3.22.? Data from Problem 3.22 Describe in words what the state machine in Figure 3.69 does. Using...
Let F be the language of all strings over {0,1} that do not contain a pair of 1s that are separated by an odd number of symbols. Give the state diagram of a DFA with five states that recognizes F....
a. Complete the traffic table in Figure 3-13. b. In Figure 3-12, add 392 Mbps of traffic for Seattle-Ogden communication. Using a picture like the one in the figure, show your work. c. Do it again...
a. Create an interface named Turner, with a single method named turn(). Create a class named Leaf that implements turn() to display Changing colors. Create a class named Page that implements turn()...
Programming Exercise 11.1 defined the Triangle class with three sides. In a triangle, the sum of any two sides is greater than the other side. The Triangle class must adhere to this rule. Create the...
a. Create a class named Blanket with fields for a blankets size, color, material, and price. Include a constructor that sets default values for the fields as Twin, white, cotton, and $30.00. Include...
Consider the following three CPU organizations: CPU SS: A 2-core superscalar microprocessor that provides out-of-order issue capabilities on 2 function units (FUs). Only a single thread can run on...
Each week, the Pickering Trucking Company randomly selects one of its 30 employees to take a drug test. Write an application that determines which employee will be selected each week for the next 52...
Consider the hierarchical network in Figure 6.30 and suppose that the data center needs to support e-mail and video distribution among other applications. Suppose four racks of servers are reserved...
The Dash Cell Phone Company charges customers a basic rate of $5 per month to send text messages. Additional rates are as follows: The first 100 messages per month, regardless of message length, are...
1. List possible objects in the new business, including their attributes and methods, and create a use case diagram that shows how an on-site service request would be handled. 2. Create a sequence...
Mary is trying to decide which graduate programs she will apply to. She wants to stay in the southeastern region of the United States, but if a program is considered one of the top 10 in the country,...
Write a server for a client. The client sends loan information (annual interest rate, number of years, and loan amount) to the server (see Figure 31.17a). The server computes monthly payment and...
Write a program that displays a bean machine introduced in Exercise, as shown in Figure. The bean machine, also known as a quincunx or the Galton box, is a device for statistics experiments named...
In the following, a "max" tree consists only of max nodes, whereas an "expectimax" tree consists of a max node at the root with alternating layers of chance and max nodes. At chance nodes, all...
Modify Listing 20.12, EvaluateExpression.java, to add operators ^ for exponent and % for remainder. For example, 3 ^ 2 is 9 and 3 % 2 is 1. The ^ operator has the highest precedence and the %...
a. Create a class to hold data about a high school sports team. The Team class holds data fields for high school name (such as Roosevelt High), sport (such as Girls Basketball), and team name (such...
Figure 22.6 shows the log corresponding to a particular schedule at the point of a system crash for four transactions T 1 , T 2 , T 3 , and T 4 . Suppose that we use the immediate update protocol...
An airport is developing a computer simulation of air-traffic control that handles events such as landings and takeoffs. Each event has a time stamp that denotes the time when the event will occur....
Consider the following portions of two different programs running at the same time on four processors in a symmetric multicore processor (SMP). Assume that before this code is run, both x and y are...
a. Create a class named Salesperson. Data fields for Salesperson include an integer ID number and a double annual sales amount. Methods include a constructor that requires values for both data...
Select one of the books in the REORDERINFO view and try to change its ISBN. Was an error message displayed when performing this step? If so, what was the cause of the error message?
Extend your modulo 8 Gray code counter from Exercise 3.27 to be an UP/DOWN counter by adding an UP input. If UP = 1, the counter advances to the next number. If UP = 0, the counter retreats to the...
Develop formulas for the hybrid hash-join algorithm for calculating the size of the buffer for the first bucket. Develop more accurate cost estimation formulas for the algorithm.
1. Write a brief memo to Zoe explaining the importance of data validation during the input process. 2. Suggest at least three specific data validation checks that might help reduce input errors. 3....
Morgans Department Store distributes bonuses to its salespeople after the holiday rush. Table 9-6 shows the bonuses, which are based on full weeks worked during the season and the number of positive...
Minimize each of the Boolean equations from Exercise 2.1. Data From Problem 1 Write a Boolean equation in sum-of-products canonical form for each of the truth tables in Figure 2.80. (a) (b) (c) (d)...