Which of the following best describes the Zips table in DBDL if City is often used for sorting? a. Zips (City, Zip) PK Zip SK City b. Zips (City, Zip) PK Zip c. Zips (City, Zip) PK Zip FK City d....
Add the following instructions to the computer of Sec 7-3 (EA is the effective address). Write the symbolic microprogram for each routine as in Table 7-2. (Note that AC must not change in value...
How would you write the DBDL for the five tables in the student-advisor-assignments.accdb Access database?
Write down the binary bit pattern assuming a format similar to that employed by the DEC PDP-8 (the leftmost 12 bits are the exponent stored as a twos complement number, and the rightmost 24 bits are...
Calculate A (B + C) by hand, assuming A, B, and C are stored in the modified 16-bit NVIDIA format described in 3.11.2 (and also described in the text). Assume 1 guard, 1 round bit, and 1 sticky bit,...
Why is a help desk function critical to system development? Discuss its interrelationship with the problem management and reporting system.
NVIDIA has a half format, which is similar to IEEE 754 except that it is only 16 bits wide. The leftmost bit is still the sign bit, the exponent is 5 bits wide and stored in excess-56 format, and the...
When we use gcc to compile combine3 with command-line option -02, we get code with substantially better CPE performance than with -01: We achieve performance comparable to that for combine4, except...
For a write-back, write-allocate cache, assuming 30% of replaced data cache blocks are dirty, what are the minimal read and write bandwidths needed for a CPI of 2? Consider the following program and...
Write a query to display the customer code, balance, and total purchases for each customer. Total purchase is calculated by summing the line subtotals (as calculated in Problem 12) for each customer....
Two clerks at Pitt Fitness need to update an address in the Access database for the customer Min Jee Choi. One clerk sees a note about updating the address and begins to edit Min Jees record. At the...
The new IT person hired by Pitt Fitness is becoming familiar with the database and requests the database schema. How can you generate the schema from the current Access database? a. Click the All...
The Pitt Fitness program director wants to list customer last names and first names along with the classes they are taking. He creates a query using the Customers and Classes tables. In the query...
Which operations can isolate a field in a word? 1. AND 2. A shift left followed by a shift right
I. C has many statements for decisions and loops, while MIPS has few. Which of the following do or do not explain this imbalance? Why? 1. More decision statements make code easier to read and...
For a given function, which programming language likely takes the most lines of code? Put the three representations below in order. 1. Java 2. C 3. MIPS assembly language
Given the importance of registers, what is the rate of increase in the number of registers in a chip over time? 1. Very fast: They increased as fast as Moores law, which predicted doubling the number...
What is the decimal value of this 64-bit twos complement number? 1111 1111 11111111 1111 11111111 1111 11111111 1111 11111111 11111111 1000 2)-8 3) -16, 4) 18,446,744,073,709,551.608. What is the...
What MIPS instruction does this represent? Choose from one of the four options below. op rs 8 00 rt 9 rd 10 shamt funct 0 34 1. sub $t0, $t1,$t2 2. add $t2, $t0, $t1 3. sub $t2, $t1, $t0 4. sub $t2,...
Which of the following statements about C and Java are generally true? 1. C programmers manage data explicitly, while its automatic in Java. 2. C leads to more pointer bugs and memory leak bugs than...
I. Which of the following statements about characters and strings in C and Java are true? 1. A string in C takes about half the memory as the same string in Java. 2. Strings are just an informal...
I. What is the range of addresses for conditional branches in MIPS (K = 1024)? 1. Addresses between 0 and 64 K1 2.Addresses between 0 and 256 K1 3.Addresses up to about 32 K before the branch to...
Which of the advantages of an interpreter over a translator do you think was most important for the designers of Java? 1. Ease of writing an interpreter 2. Better error messages 3. Smaller object...
How many of the five classic components of a computershown in Figures 4.1 and 4.2 include? Figure 4.1 Figure 4.2 PC Add Address Instruction Instruction memory Add Data Register # Registers Register...
True or false: Because the register file is both read and written on the same clock cycle, any MIPS datapath using edge-triggered writes must have more than one copy of the register file.
I. Which of the following is correct for a load instruction? Refer to Figure 4.10. a.MemtoReg should be set to cause the data from memory to be sent to the register file. b.MemtoReg should be set to...
When silicon chips are fabricated, defects in materials (e.g., silicon) and manufacturing errors can result in defective circuits. A very common defect is for one signal wire to get broken and always...
Look at the control signals in Figure 4.22. Can you combine any together? Can any control signal output in the figure be replaced by the inverse of another? If so, can you use one signal for the...
1. True or false: Since the jump instruction does not depend on the register values or on computing the branch target address, it can be completed during the second state, rather than waiting until...
Add NOP instructions to the code below so that it will run correctly on a pipeline that does not handle data hazards. addi $s0, $s1, 5 add $s2, $s0, $s1 addi $s3, $s0, 15 add $s4, $s2, $s1
Examine the difficulty of adding a proposed lwi.drd, rsl, rs2 (Load With Increment) instruction to MIPS. Interpretation: Reg[rd] = Mem[Reg[rs1] + Reg[rs2]] 1. Which new functional blocks (if any) do...
Examine the difficulty of adding a proposed swap rs, rt instruction to MIPS. Interpretation: Reg[rt] = Reg[rs]; Reg[rs] = Reg[rt] 1. Which new functional blocks (if any) do we need for this...
In the following table, does all the data conform to empno name?
In this exercise we look at memory locality properties of matrix computation. The following code is written in C, where elements within the same row are stored contiguously. Assume each word is a...
Use a computer-based logic minimization program to design the instruction decoder for a RISC from Table 10-3. Create an HDL model of your design and verify its correctness in simulation. Table 10-3...
For the RISC CPU in Figure 10-8, manually simulate, in hexadecimal, the processing of the instruction ADI R1 R16 2F01 located in PC = 10F. Assume that R16 contains 0000001F. Show the contents of each...
Inputs X i and Y i of each full adder in an arithmetic circuit have digital logic specified by the Boolean functions where S is a selection variable, C in is the input carry, and A i and B i are...
Repeat Problem 4-59, assuming that the circuit consists of two copies of the circuit in Figure 4-49 with input X of the second circuit copy driven by output Y of the first circuit copy. Problem 4-59...
The state diagram for a sequential circuit appears in Figure 4-51. Figure 4-51 (a) Find the state table for the circuit. (b) Make a state assignment for the circuit using 3-bit codes for the six...
Find two different state-variable formulations that model the system whose difference equation is given by: (a) y(k+ 2) + 6y(k+1) + 5y (k)= 2e(k) (b) y(k + 2) + 6y(k+1) + 5y(k) = e(k+1) + 2e(k) (c)...
Trace the Shirt program in Figures 8.6, 8.7a, and 8.7b, using either the short form or the long form. To help you get started, heres the trace setup, including the input. If you use the long form,...
Given the system described by the state equations (a) Calculate the transfer function Y(z)/U(z), using (2-84). (b) Draw a simulation diagram for this system, from the state equations given. (c) Use...
For the system of Fig. P5.3-1 (a) , suppose that the sampler in the forward path samples at t = 0, T, 2T, , and the sampler in the feedback path samples at t = T 2, 3T 2, 5T 2 , . . . . (a) Find the...
Find the system response at the sampling instants to a unit-step input for the system of Fig. P4.3-5. E(s) = -=-/ 1 3+0.5 T=1s Fig. P4.3-5 1-g-7's S 38 (s + 1)(s+2) C(s)
A system is defined as linear if the principle of superposition applies. Is a sampler/zero-order-hold device linear? Prove your answer.
Given the second-order digital-filter transfer function Figure p2.8-2 Figure p2. 8-1 2z-2.4z+0.72 z - 1.4z +0.98 (a) Find the coefficients of the 3D structure of Fig. P2.8-1 such that D(z) is...
Shown in Fig. P2.8-2 is the second-order digital-filter structure 1X. e(k) 83 84 fi(k) f(k) b 81 T 82 82 T 81 FIGURE P2.8-2 Digital-filter structure 1X. y(k)
Given the extended LAN shown in Figure 3.46, indicate which ports are not selected by the spanning tree algorithm. Figure 3. 46) E G A B1 1 B7 B4 D B2 (B3) B6 (B5 F H J B
Let T = 0.1 s for the system of Fig. P5.4-4. Derive a set of discrete state equations for the close dloop system, for the plant described by each of the differential equations. U(s) + M(s) T 1-8-7's...
How long does it take to transmit x kB over a y-Mbps link? Give your answer as a ratio of x and y.
In the system of Fig. P5.3-11, the ideal time delay represents the time required to complete the computations in the computer. (a) Derive the output function C (z) for this system. (b) Suppose that...
Find the z-transform of the following functions, using z-transform tables. Compare the pole-zero locations of E(z) in the z-plane with those of E(s) and E * (s) in the s-plane. Let T = 0.1s- (a) (c)...
Consider the circuits in Figure P10-6 and answer the following questions. (a) What is the maximum number of poles possible for each of the circuits? (b) Can any of the circuits shown have an unstable...
Consider the following fragment of assembly language that is to be executed on a generic three way superscalar processor that can accommodate one memory access per clock. Rewrite the code to improve...
Consider the robot-joint control system of Fig. P5.3-13. This system is described in Problem 1.5-4. Problem 1.5-4 T Controller D(z) Volts Power Zero-order hold Servomotor Ea 200 100 s (0.5 s + 1)...
When do you use primitives like load linked and store conditional? 1. When cooperating threads of a parallel program need to synchronize to get proper behavior for reading and writing shared data 2....
Repeat Problem 4.3-2 for the case that T = 0.1 s and the plant transfer function is given by: Problem 4.3-2 (a) Find the system response at the sampling instants to a unit step input for the system...
Suppose a 100-Mbps point-to-point link is being set up between Earth and a new lunar colony. The distance from the moon to the Earth is approximately 385,000 km, and data travel over the link at the...
Suppose we want to process the continuous-time signal \[x_{\mathrm{a}}(t)=3 \cos (2 \pi 1000 t)+7 \sin (2 \pi 1100 t)\] using a discrete-time system. The sampling frequency used is 4000 samples per...
The results of the SPEC CPU 2006 bzip2 benchmark running on an AMD Barcelona has an instruction count of 2.389E12, an execution time of 750 s, and a reference time of 9650 s. 1. Find the CPI if the...
For the following MIPS assembly instructions above, what is a corresponding C statement? add f, g, h add f, i, f
Assume a 15 cm diameter wafer has a cost of 12, contains 84 dies, and has 0.020 defects/cm 2 . Assume a 20 cm diameter wafer has a cost of 15, contains 100 dies, and has 0.031 defects/cm 2 . 1. Find...
Th e Pentium 4 Prescott processor, released in 2004, had a clock rate of 3.6 GHz and voltage of 1.25 V. Assume that, on average, it consumed 10 W of static power and 90 W of dynamic power. The Core...
Compilers can have a profound impact on the performance of an application. Assume that for a program, compiler A results in a dynamic instruction count of 1.0E9 and has an execution time of 1.1 s,...
For the following C statement, what is the corresponding MIPS assembly code? Assume that the variables f, g, h, and i are given and could be considered 32-bit integers as declared in a C program. Use...
Find the shortest sequence of MIPS instructions that extracts bits 16 down to 11 from register $t0 and uses the value of this field to replace bits 31 down to 26 in register $t1 without changing the...
Write the MIPS assembly code that creates the 32-bit constant 0010 0000 0000 0001 0100 1001 0010 0100two and stores that value to register $t1.
Assume 185 and 122 are signed 8-bit decimal integers stored in sign-magnitude format. Calculate 185 - 122. Is there overflow, underflow, or neither?
Write down the binary representation of the decimal number 63.25 assuming it was stored using the single precision IBM format (base 16, instead of base 2, with 7 bits of exponent).
IEEE 754-2008 contains a half precision that is only 16 bits wide. The left most bit is still the sign bit, the exponent is 5 bits wide and has a bias of 15, and the mantissa is 10 bits long. A...
The Hewlett-Packard 2114, 2115, and 2116 used a format with the left most 16 bits being the fraction stored in twos complement format, followed by another 16-bit fi eld which had the left most 8 bits...
Calculate by hand 8.625 10 1 divided by -4.875 10 0 . Show all the steps necessary to achieve your answer. Assume there is a guard, a round bit, and a sticky bit, and use them if necessary. Write...
For the problems in this exercise, assume that there are no pipeline stalls and that the breakdown of executed instructions is as follows: 1. In what fraction of all cycles is the data memory used?...
Give an implementation of the size( ) method for the DoublyLinkedList class, assuming that we did not maintain size as an instance variable.
In this exercise, we examine how data dependences affect execution in the basic 5-stage pipeline described in Section 4.5. Problems in this exercise refer to the following sequence of instructions:...
This exercise is intended to help you understand the cost/complexity/ performance trade-off s of forwarding in a pipelined processor. Problems in this exercise refer to pipelined datapaths from...
Give an algorithm for concatenating two doubly linked lists L andM, with header and trailer sentinel nodes, into a single list L.
The number of operations executed by algorithms A and B is 8nlogn and 2n 2 , respectively. Determine n 0 such that A is better than B for n n 0 .
This exercise is intended to help you understand the relationship between forwarding, hazard detection, and ISA design. Problems in this exercise refer to the following sequence of instructions, and...
Show that (n+1) 5 is O(n 5 ).
In this exercise we compare the performance of 1-issue and 2-issue processors, taking into account program transformations that can be made to optimize for 2-issue execution. Problems in this...
This exercise explores energy efficiency and its relationship with performance. Problems in this exercise assume the following energy consumption for activity in Instruction memory, Registers, and...
Given an array A of n arbitrary integers, design an O(n)-time method for finding an integer that cannot be formed as the sum of two integers in A.
Redo the justification of Proposition 7.2 assuming that the the cost of growing the array from size k to size 2k is 3k cyber-dollars. How much should each push operation be charged to make the...
The java.util.ArrayList includes a method, trimToSize( ), that replaces the underlying array with one whose capacity precisely equals the number of elements currently in the list. Implement such a...
Given the set of element {a,b,c,d,e, f } stored in a list, show the final state of the list, assuming we use the move-to-front heuristic and access the elements according to the following sequence:...
Is the search tree of Figure 11.22(a) a (2,4) tree? Why or why not? Figure 11.22(a) 22 5 10 25 3 4 23 24 6 8 14 27 11 13 17 (a)
The ALU supported set on less than (slt) using just the sign bit of the adder. Lets try a set on less than operation using the values -7 ten and 6 ten . To make it simpler to follow the example, lets...
Assume that we are using a linked representation of a complete binary tree T, and an extra reference to the last node of that tree. Show how to update the reference to the last node after operations...
Give an implementation of the deque ADT using an array list for storage.
Give a precise and complete definition of the concept of matching for grouping symbols in an arithmetic expression. Your definition may be recursive.
Would you use the adjacency matrix structure or the adjacency list structure in each of the following cases? Justify your choice. a. The graph has 10,000 vertices and 20,000 edges, and it is...
Give an example input that requires merge-sort and heap-sort to take O(nlogn) time to sort, but insertion-sort runs in O(n) time. What if you reverse this list?
Suppose we are given two n-element sorted sequences A and B each with distinct elements, but potentially some elements that are in both sequences. Describe an O(n)-time method for computing a...
The rules for a deletion in an AVL tree specifically require that when the two subtrees of the node denoted as y have equal height, child x should be chosen to be aligned with y (so that x and y are...
Repeat the previous problem, considering the case in which ys children start with different heights. Previous problem Consider a deletion operation in an AVL tree that triggers a trinode...
Match the following to one or more layers of the TCP/IP protocol suite: a. Route determination b. Connection to transmission media c. Providing services for the end user
When we use local telephones to talk to a friend, are we using a circuit switched network or a packet-switched network?
What are the three criteria necessary for an effective and efficient network?
What is an internet? What is the Internet?