What is a font? What is point size?
What are the additive colors? What are the subtractive colors? What types of I/O devices use each kind of color?
What is a bitmap? How does a bitmaps chromatic resolution affect its size?
What is an image description language? What are the advantages of representing images with image description languages?
Why does a video controller have its own processor and memory?
A scaling algorithm solves a problem by initially considering only the highest-order bit of each relevant input value (such as an edge weight). It then refines the initial solution by looking at the...
Describe the technologies used to implement flat panel displays. What are their comparative advantages and disadvantages?
In the computer generation of musical sounds, pure tones need to be windowed to make them more interesting. Windowing mimics the way a musician would approach the generation of a certain sound....
Consider an envelope detector that is used to detect the message sent in the AM system shown in the examples. The envelope detector as a system is composed of two cascaded systems: one which computes...
The following problems relate to linearity, time-invariance, and causality of systems. (a) A system is represented by the equation z(t) = v(t) f(t) + B where v(t) is the input, z(t) the output, f(t)...
What is a state transition?
List and briefly describe the three elements of the fraud triangle. Over which element can a system designer exercise the greatest control?
Describe three low-level P2P interprocess communication standards. What are the advantages and disadvantages of using these standards to implement distributed multilayer applications?
The DatagramPacket class has two constructors (see Table 25.11). Which constructor can be used as a sending packet? Table 25.11 Some methods in DatagramPacket class public final class...
Give examples of 1:1, 1:N, and N:M relationships (other than those presented in this chapter). Draw two E-R diagrams for each of your examples: one using the traditional diamond notation and one...
Explain the need for each of the actions in Figure 6-29(b). Actions When Child Is Required Child Required Action on Parent Get a child. Prohibit. Update the foreign key of (at least one) child....
Explain the need for each of the actions in Figure 6-29(a). Parent Required Action on Parent Action on Child Insert None. Get a parent. Prohibit. Change children's foreign Modify key or foreign key...
Whats the difference between a real resource and a virtual resource?
Briefly define the terms technology architecture and application architecture. How are they different? How are they interdependent?
Given the database table in Figure 9-27 of university course and sections offered, normalize the table so that it is in third normal form. Hint: Look for functional dependencies.
You're is professional, and your boss has asked you to prepare a briefing for senior staff on the comparative advantages and disadvantages of three competing secondary storage technologies: magnetic...
1. To what events must the MLS system respond? List each event, the type of event, and the resulting use case. Be sure to consider all the use cases that would be needed to maintain the data in the...
1. Based on the information here, draw a domain model class diagram for the MLS system. Be sure to consider what information needs to be included versus information that is not in the problem domain....
Refer to the RMO CSMS Marketing subsystem shown in Figure 3-10. Draw a use case diagram that shows all actors and all use cases. Use a drawing tool such as Microsoft Visio if it is available. Use...
Refer to the RMO CSMS Reporting subsystem shown in Figure 3-10. These reports were identified by asking users about temporal events, meaning points in time that require the system to produce...
Section 7.7.1 provides some of the successor-state axioms required for the wumpus world. Write down axioms for all remaining fluent symbols.
Review the case description and your solution for the Web scenario of the use case Request package pickup from Chapter 5. Then, using a presentation tool, such as Microsoft PowerPoint or Apple...
Explain why every nonempty propositional clause, by itself, is satisfiable. Prove rigorously that every set of five 3-SAT clauses is satisfiable, provided that each clause mentions exactly three...
Prove, or find a counterexample to, each of the following assertions: a. If or |= (or both) then ( ) b. If ( ) then and . c. If ( ) then or (or both).
The Board of Realtors Multiple Listing Service (MLS) system isnt very large in terms of use cases and domain classes. In that respect, the functional requirements are simple and well understood. MLS...
1. Based on the use case diagram and other project information, develop a list of software components (subsystems) that must be acquired or developed. Describe the function(s) of each component in...
1. Create a System Vision Document. 2. Review all the use cases that you identified in Chapter 2 and then enhance the list to achieve a complete solution based on the narratives that you have read in...
Construct an example of two clauses that can be resolved together in two different ways giving two different outcomes.
In the blocks world we were forced to introduce two action schemas, Move and MoveToTable, in order to maintain the Clear predicate properly. Show how conditional effects can be used to represent both...
Suppose the Flip action always changes the truth value of variable L. Show how to define its effects by using an action schema with conditional effects. Show that, despite the use of conditional...
Suppose you are given a coin that lands heads with probability x and tails with probability 1 x. Are the outcomes of successive flips of the coin independent of each other given that you know the...
Prove that GRAPH-SEARCH satisfies the graph separation property illustrated in Figure 3.9. Begin by showing that the property holds at the start, then show that if it holds before an iteration of the...
Prove that the judgments B A and C D in the Allais paradox violate the axiom of substitutability.
For the DBN specified in Exercise 15.13 and for the evidence values e 1 = not red eyes, not sleeping in class e 2 = red eyes, not sleeping in class e 3 = red eyes, sleeping in class perform the...
Run an SQL SELECT query to demonstrate that the view PopularShowsView was constructed correctly.
Write an SQL CREATE TABLE statement to create a table named PICTURE using the column characteristics as shown in Figure 10C-98. Run the SQL statement to create the PICTURE table in the MEDIA database.
Let us examine the rationality of various vacuum-cleaner agent functions. a. Show that the simple vacuum-cleaner agent function described in Figure 2.3 is indeed rational under the assumptions listed...
Trace the behavior of DPLL on the knowledge base in Figure 7.16 when trying to prove Q, and compare this behavior with that of the forward-chaining algorithm. Figure 7.16 LAM = P P L 3D M L L B...
Translate 0xabcdef12 into decimal.
Consider a vocabulary with the following symbols: Occupation(p, o): Predicate. Person p has occupation o. Customer (p1, p2): Predicate. Person p1 is a customer of person p2. Boss(p1, p2): Predicate....
Do routers have IP addresses? If so, how many?
Languages that let you use an easily understood vocabulary of descriptive terms, such as read, write, or add, are known as ____________languages. a. Procedural b. High-level c. Machine d....
The rules of a programming language constitute its ____________. a. Syntax b. Logic c. Format d. Objects
Arguments to methods always appear within ____________. a. Parentheses b. Double quotation marks c. Single quotation marks d. Curly braces
In his letter of August 24, 1654, Pascal was trying to show how a pot of money should be allocated when a gambling game must end prematurely. Imagine a game where each turn consists of the roll of a...
You save text files containing Java source code using the file extension ____________. a. .java b. .class c. .txt d. .src
Show that the statement of conditional independence is equivalent to each of the statements P(X,Y |Z) = P(X Z)P(Y | Z) P(X |Y, Z) = P(X|Z) and P(BX,Z)= P(Y|Z). and P(B|X, Z) = P(Y | Z).
Which of the following elements is not required in a variable declaration? a. A type b. An identifier c. An assigned value d. A semicolon
The assignment operator in Java is _____________. a. = b. == c. := d. ::
A boolean variable can hold _____________. a. Any character b. Any whole number c. Any decimal number d. The value true or false
The value 137.68 can be held by a variable of type _____________. a. int b. float c. double d. Two of these are correct.
An escape sequence always begins with a(n) _____________. a. e b. Forward slash c. Backslash d. Equal sign
Consider the network shown in Figure 14.22 (ii), and assume that the two telescopes work identically. N {1, 2, 3} and M 1 , M 2 {0, 1, 2, 3, 4}, with the symbolic CPTs as described in Exercise 14.12....
This exercise explores the stationary distribution for Gibbs sampling methods. a. The convex composition [, q 1 ; 1 , q 2 ] of q 1 and q 2 is a transition probability distribution that first chooses...
Which Java statement produces w on one line and xyz on the next line? a. System.out.println(wxyz); b. System.out.println(w + xyz); c. System.out.println(w xyz); d. System.out.println(w x y z);
In Java, what is the value of 3 + 7 * 4 + 2? a. 21 b. 33 c. 42 d. 48
Which assignment is correct in Java? a. double money = 12; b. double money = 12.0; c. double money = 12.0d; d. All of the above are correct.
Which assignment is correct in Java? a. char aChar = 5.5; b. char aChar = W; c. char aChar = '*'; d. Two of these are correct.
Economists often make use of an exponential utility function for money: U(x) = e x/R , where R is a positive constant representing an individuals risk tolerance. Risk tolerance reflects how likely an...
This exercise is concerned with filtering in an environment with no landmarks. Consider a vacuum robot in an empty room, represented by an nmrectangular grid. The robots location is hidden; the only...
Garden Glory is a partnership that provides gardening and yard maintenance services to individuals and organizations. Garden Glory is owned by two partners. They employ two office administrators and...
In each case, determine the problem and fix the application. After you correct the errors, save each file using the same filename preceded with Fix. For example, DebugTwo1.java will become...
A public static method named computeSum() is located in ClassA. To call the method from within ClassB, use the statement _____________. a. ClassA.computeSum(); b. ClassB(computeSum()); c....
The method public static boolean testValue(int response) returns _____________. a. No value b. An int value c. A boolean value d. You cannot determine what is returned.
A structure that allows repeated execution of a block of statements is a ____________. a. Cycle b. Ring c. Loop d. Band
A loop that never ends is a(n) ____________loop. a. Infinite b. Iterative c. Structured d. Illegal
To construct a loop that works correctly, you should initialize a loop control ____________. a. Condition b. Constant c. Structure d. Variable
What is the output of the following code? b = 3; while(b < 6) { System.out.print(b + " "); b = b + 1; } a. 3 b. 3 4 5 c. 3 4 5 6 d. 3 3 3 3 3 3
If m = 9, then after n = m++, the value of m is ____________. a. 8 b. 9 c. 10 d. 11
If m = 9, then after n = m++, the value of n is ____________. a. 8 b. 9 c. 10 d. 11
If j = 5 and k = 6, then the value of j++ == k is ____________. a. 5 b. 6 c. True d. False
You must always include ____________ in a for loops parentheses. a. Two semicolons b. Three semicolons c. Two commas d. Three commas
What does the following program segment output? d = 0; do { System.out.print(d + " "); d++; } while (d < 2); a. 0 b. 0 1 c. 0 1 2 d. Nothing
Suppose that you declare two String objects as: String word1 = new String("happy"); String word2 = new String("happy"); The value of word1.equals(word2) is ____________. a. True b. False c. Illegal...
Eliza is a famous 1966 computer program written by Joseph Weizenbaum. It imitates a psychologist (more specifically, a Rogerian therapist) by rephrasing many of a patients statements as questions and...
Write an application that contains an array of 10 multiple-choice quiz questions related to your favorite hobby. Each question contains three answer choices. Also create an array that holds the...
In each case, determine the problem and fix the program. After you correct the errors, save each file using the same filename preceded with Fix. For example, DebugEight1.java will become...
Employing inheritance reduces errors because ____________. a. Subclasses have access to fewer data fields b. Subclasses have access to fewer methods c. Methods that have been created in the...
Which of the following choices is the best example of a parent class/child class relationship? a. BodyOfWater/River b. Apple/Banana c. Spaniel/Dog d. Sparrow/Bird
A class named Building has a public, nonstatic method named getFloors(). If School is a child class of Building, and modelHigh is an object of type School, which of the following statements is valid?...
In Java, the concept of keeping data private is known as ____________. a. Polymorphism b. Concealing fields c. Data deception d. Information hiding
When a parent class contains a static method, child classes ____________ override it. a. Frequently b. Seldom c. Must d. Cannot
Parent classes are ____________ than their child classes. a. Less specific b. More specific c. Easier to understand d. More cryptic
Abstract classes differ from other classes in that you ____________. a. Must not code any methods within them b. Must instantiate objects from them c. Cannot instantiate objects from them d. Cannot...
Abstract classes can contain ____________. a. Abstract methods b. Nonabstract methods c. Both of the above d. None of the above
An abstract class Dwelling has two subclasses, SingleFamily and MultiFamily. None of the constructors for these classes requires any arguments. Which of the following statements is legal? a. Dwelling...
Which of the following statements is true? a. Superclass objects are members of their subclass. b. Superclasses can contain abstract methods. c. You can create an abstract class object using the new...
When you create a ____________ in Java, you create a variable name in which you can hold the memory address of an object. a. Field b. Reference c. Recommendation d. Pointer
An applications ability to select the correct subclass method to execute is known as ____________ method binding. a. Polymorphic b. Intelligent c. Early d. Dynamic
Which statement creates an array of five references to an abstract class named Currency? a. Currency[] = new Currency[5]; b. Currency[] currencyref = new Currency[5]; c. Currency[5] currencyref = new...
An abstract class Employee has two subclasses, Permanent and Temporary. The Employee class contains an abstract method named setType(). Before you can instantiate Permanent and Temporary objects,...
You ____________ override the toString() method in any class you create. a. Cannot b. Can c. Must d. Must implement StringListener to
The Object class equals() method takes ____________. a. No arguments b. One argument c. Two arguments d. As many arguments as you need
Assume that the following statement appears in a working Java program and that the equals() method has been overridden correctly in things class: if(thing.equals(anotherThing)) x = 1; You know that...
The Object class equals() method considers two object references to be equal if they have the same ____________. a. Value in all data fields b. Value in any data field c. Data type d. Memory address