Popek and Goldbergs definition of a virtual machine said that it would be indistinguishable from a real machine except for its performance. In this question, we will use that definition to find out...
What business rule(s) and relationships can be described for the ERD in Figure QB.4? Figure QB.4: PART VEND PART VENDOR PK PART COOE O PK,FK1 VEND ID PKFK2 PARI CODE PK VEND R PART_PROD PK,FK1 PART...
Assume a hypothetical GPU with the following characteristics: Clock rate 1.5 GHz Contains 16 SIMD processors, each containing 16 single-precision floatingpoint units Has 100 GB/sec off-chip memory...
How would you change the code of an application to avoid false sharing? What might be done by a compiler and what might require programmer directives?
Assume a directory-based cache coherence protocol. The directory currently has information that indicates that processor P1 has the data in exclusive mode. If the directory now gets a request for the...
A directory controller can send invalidates for lines that have been replaced by the local cache controller. To avoid such messages and to keep the directory consistent, replacement hints are used....
One performance optimization commonly used is to pad synchronization variables to not have any other useful data in the same cache line as the synchronization variable. Construct a pathological...
Prove that in a two-level cache hierarchy, where L1 is closer to the processor, inclusion is maintained with no extra action if L2 has at least as much associativity as L1, both caches use line...
Multiprocessors and clusters usually show performance increases as you increase the number of the processors, with the ideal being nx speedup for n processors. The goal of this biased benchmark is to...
This exercise studies the impact of aggressive techniques to exploit instruction-level parallelism in the processor when used in the design of shared-memory multiprocessor systems. Consider two...
The memory consistency model provides a specification of how the memory system will appear to the programmer. Consider the following code segment, where the initial values are a. At the end of the...
When trying to perform detailed performance evaluation of a multiprocessor system, system designers use one of three tools: analytical models, trace-driven simulation, and execution-driven...
Because of the massive scale of WSCs, it is very important to properly allocate network resources based on the workloads that are expected to be run. Different allocations can have significant...
An entity is represented in an E-R model as a(n): a. Arrow b. Crows foot c. Dashed line d. None of the above
Some memory systems handle TLB misses in software (as an exception), while others use hardware for TLB misses. a. What are the trade-offs between these two methods for handling TLB misses? b. Will...
A reduced hardware implementation of the classic five-stage RISC pipeline might use the EX stage hardware to perform a branch instruction comparison and then not actually deliver the branch target PC...
Create a simple E-R model depicting entities and relationship lines for data scenario. Every employee in a company is assigned to one department. Every department can contain many employees.
What is a NULL value?
If a customer inquired about a book written in 2003 by an author named Thompson, which access path (tables and fields) would you need to follow to find the list of books meeting the customers...
List the title and publication date for each book in the BOOKS table. Use the column heading Publication Date for the Pubdate field.
Which of the following SELECT statements displays a list of customer names from the CUSTOMERS table? a. SELECT customer names FROM customers; b. SELECT "Names" FROM customers; c. SELECT firstname,...
List all information for each order item. Include an item total, which can be calculated by multiplying the Quantity and Paideach columns. Use a column alias for the calculated value to show the...
Which command is used to create a table based on data already contained in an existing table?
Which of the following is a correct statement? a. You can restore the data deleted with the DROP COLUMN clause, but not the data deleted with the SET UNUSED clause. b. You cant create empty tablesall...
Delete the EndDate column from the EMPLOYEES table.
Which of the following commands can be used to enable a disabled constraint? a. ALTER TABLEMODIFY b. ALTER TABLEADD c. ALTER TABLEDISABLE d. ALTER TABLEENABLE
Modify the following SQL command so that the Rep_ID column is the PRIMARY KEY for the table and the default value of Y is assigned to the Comm column. (The Comm column indicates whether the sales...
Change the STORE_REPS table so that NULL values cant be entered in the name columns (First and Last).
Assuming the HOMEWORK10 table has three columns (Col1, Col2, and Col3, in this order), which of the following commands stores a NULL value in Col3 of the HOMEWORK10 table? a. INSERT INTO homework10...
Which of the following commands removes all orders placed before April 1, 2009? a. DELETE FROM orders WHERE orderdate
Execute a command that undoes the change in Step 7.
If a column has high selectivity or cardinality, which index type is most appropriate? a. IOT b. B-tree c. Bitmap d. Function-based index
Which of the following is a valid command? a. CREATE INDEX book_profit_idx ON (retail-cost) WHERE (retail-cost) > 10; b. CREATE INDEX book_profit_idx ON (retail-cost); c. CREATE FUNCTION INDEX...
What is the purpose of data security?
Which of the following commands creates a private synonym? a. CREATE PRIVATE SYNONYM b. CREATE NONPUBLIC SYNONYM c. CREATE SYNONYM d. CREATE PUBLIC SYNONYM
In the following exercises, you will use the data in the TAL Distributors database shown in Figure 2-1. In each step, indicate how to use relational algebra to obtain the desired results. 1. List the...
If youre logged in to Oracle 12c, how can you determine which privileges are currently available to your account?
How can you remove a user account from Oracle 12c?
Create a bitmap index on the CUSTOMERS table to speed up queries that search for customers based on their state of residence. Verify that the index exists, and then delete the index.
Which of the following statements assigns the role CUSTOMERREP as the default role for Maurice Cain? a. ALTER ROLE mcain DEFAULT ROLE customerrep; b. ALTER USER mcain TO customerrep; c. SET DEFAULT...
Which of the following statements is most accurate? a. Authentication procedures prevent any data stored in the Oracle 12c database from being stolen or damaged. b. Authentication procedures are used...
Write the SQL commands to grant the following privileges: a. User Stetson must be able to retrieve data from the Customer table. b. Users Webster and Bremer must be able to add new orders and order...
Change the setting of MY_FIRST_SEQ so that the minimum value that can be generated is 1000.
Which of the following privileges must be granted to a users account before the user can connect to the Oracle 12c database? a. CONNECT b. CREATE SESSION c. CONNECT ANY DATABASE d. CREATE ANY TABLE
Which of the following privileges allows a user to truncate tables in a database? a. DROP ANY TABLE b. TRUNCATE ANY TABLE c. CREATE TABLE d. TRUNC TABLE
Which of the following tables or views displays the current enabled privileges for a user? a. SESSION_PRIVS b. SYSTEM_PRIVILEGE_MAP c. USER_ASSIGNED_PRIVS d. V$ENABLED_PRIVILEGES
Which of the following commands eliminates only the user ELOPEZs ability to enter new books in the BOOKS table? a. REVOKE insert ON books FROM elopez; b. REVOKE insert FROM elopez; c. REVOKE INSERT...
Which of the following commands is used to assign a privilege to a role? a. CREATE ROLE b. CREATE PRIVILEGE c. GRANT d. ALTER PRIVILEGE
Which clause is used to restrict rows or perform selection? a. SELECT b. FROM c. WHERE d. ORDER BY
Which of the following SQL statements is valid? a. SELECT order# FROM orders WHERE shipdate = NULL; b. SELECT order# FROM orders WHERE shipdate = 'NULL'; c. SELECT order# FROM orders WHERE shipdate =...
Which of the following doesnt return a customer with the last name THOMPSON in the query results? a. SELECT lastname FROM customers WHERE lastname = "THOMPSON"; b. SELECT * FROM customers; c. SELECT...
Whats the default sort sequence for the ORDER BY clause? a. Ascending b. Descending c. The order in which records are stored in the table d. Theres no default sort sequence.
Which of the following doesnt include the display of books published by Publisher 2 and having a retail price of at least $35.00? a. SELECT * FROM books WHERE pubid = 2, retail >= $35.00; b. SELECT *...
Which of the following finds all orders placed before April 5, 2009 that havent yet shipped? a. SELECT * FROM orders WHERE orderdate < '04-05-09' AND shipdate = NULL; b. SELECT * FROM orders WHERE...
Whats the difference between the NVL and NVL2 functions?
Determine the calendar date of the next occurrence of Wednesday, based on todays date.
Which of the following queries identifies customers who have ordered the same books as customers 1001 and 1005? a. SELECT customer# FROM orders JOIN books USING (isbn) WHERE isbn = (SELECT isbn FROM...
List the title of all books in the same category as books previously purchased by customer 1007. Dont include books this customer has already purchased.
Determine the number of different customers who have placed an order for books written or cowritten by James Austin.
Construct the truth table for a four-input odd-parity function (see page B-65 for a description of parity).
You are probably wearing on your wrist one of the worlds most common types of objects a watch. Discuss how each of the following terms and concepts applies to the notion of a watch: object,...
Fill in the blanks in each of the following statements: a) A table in a relational database consists of _________and _________in which values are stored. b) The _________uniquely identifies each row...
The following matrix represents a generator matrix for a (7, 4) block code. What is the corresponding parity check matrix H? 100 0 1 1 0] 0 10 0 0 1 1 G = 0 0 10 1 1 1 0 0 0 1 10 1
Consider the rate r = 1/2 in the convolutional encoder shown below. Find the encoder output (Y 1 Y 2 ) produced by the message sequence 10111. . . Modulo 2 adder First bit Flip Flop X Output 11101 Y2
Two adjacent BSs i and j are 30 km apart. The signal strength received by the MS is given by the following expressions. Where and x is the distance of the MS from BS i. Assume unity gain for G r and...
A cellular scheme employed a cluster of 16 cells. Later on, it was decided to use two different clusters of 7 and 9 cells. Is it possible to replace each original cluster by two new clusters? Explain...
What is meant by handoff interval and handoff region? Explain their usefulness with appropriate diagrams.
What are the advantages of cell sectoring? How do you compare this with SDMA?
Assume that you just got out of an airplane and you switched on your cell phone. If the closest BS is located at a distance of 5 km, what are the minimum and the maximum delay before a contact is...
In ad hoc networks, it is sometimes desirable to transmit packets of a single message using multiple paths using an 802.11 protocol. (a) Can you think of any specific reasons for this? (b) If you...
a. List the main elements in SNMP. 13a.) Which of the following is NOT governed by the SNMP standard? a. Agents b. The MIB c. The network management program d. The network visibility program b. Does...
a. At what layers are Ethernet standards defined? 2a1.) Ethernet standards are specified at the ______ layer. a. Physical b. Internet c. Both A and B d. Neither A nor B 2a2.) Ethernet standards are...
a. How are switches in an Ethernet LAN organized? 17a.) In Ethernet, switches are organized in a _____. a. Ring b. Mesh c. Hierarchy d. Any of the above b. Because of this organization, how many...
Write, test, validate, and debug (if necessary) markup documents and JavaScript files for the following: The document must have a paragraph of at least 10 lines of text that describe you. This...
Create an XML schema for a catalog of cars, where each car has the child elements make, model, year, color, engine, number_of_doors, transmission_type, and accessories. The engine element has the...
Parameter: An array of strings. Return value: A list of the unique strings in the parameter array. Write, test, and debug (if necessary) PHP scripts for the specifications that above. For Exercise,...
Revise the survey sample servlet Survey.java to record the number of votes so far in the data file and then display that count every time a vote is submitted or a survey result is requested. Also,...
a. Describe RTS/CTS. 20a.) In ________, when a wireless host wishes to send, it first sends a message to the wireless access point asking for permission to send. When the access point sends back a...
a. How does MIMO use spatial streams to increase transmission speed? 24a.) MIMO _______. a. Bonds two or more channels for higher speed b. Is used in all forms of 802.11 c. Uses a single spatial...
Write, test, and debug (if necessary) a Ruby program with the following specification: Input: Three names, on separate lines, from the keyboard. Output: The input names in alphabetical order. Do not...
a. In Figure 8-11, how will a router test whether Row 3 matches the IPv4 address 60.168.6.7? Show the calculations in the format given in Figure 8-12. b. Is the row a match? c. Why is the last row...
Write, test, and debug (if necessary) a Ruby program with the following specification: Input: Three numbers, a, b, and c, each on its own line, from the keyboard. Output: The value of the expression...
Thinking in terms of systems allows us to analyze situations that are too complicated for us to understand as a whole. What specific characteristics and features of system thinking make this possible?
Consider this textbook. Using the detailed table of contents as a reference, we can represent this textbook as a hierarchical system. As a first pass, we can define this book by the five component...
Although there is substantial overlap between protocols and standards there are protocols that are not standards and standards that are not protocols. With the help of a dictionary, identify the...
Locate a current reference that lists the important protocols that are members of the TCP/IP protocol suite. Explain how each protocol contributes to the operation and use of the Internet.
Suppose you have a program that reads an integer, followed by a character, using the following prompt and READ statement: WRITE(Enter an integer and a character READ (intval, charval); When you run...
Using the Web as a resource, create a table that compares the features and capabilities of .PNG, .GIF, and .JPEG.
a. Find the 16-bit 2s complementary binary representation for the decimal number 1987. b. Find the 16-bit 2s complementary binary representation for the decimal number 1987. c. From your answer in...
Add the following two 12-bit binary 2s complement numbers. Then, convert each number to decimal and check the results. a. 11001101101 111010111011 b. 101011001100 111111111100
Some systems use a branch prediction method known as static branch prediction, so called because the prediction is made on the basis of the instruction, without regard to history. One possible...
Show a sequence of instructions that will cause a program to branch to location 75 if the value in the calculator is greater than zero.
When we discussed conditional branching we claimed that a BRANCH NEGATIVE instruction is not necessary. Show a sequence of BRANCH instructions that will cause a program to branch to location 50 if...
The following Little Man program is supposed to add two input numbers, subtract a third input number from the sum, and output the result, i.e., OUT = IN1 + IN2 IN3 What is wrong with this program?...
You are probably familiar with the standard Windows interface. Suppose you could replace the Windows shell with a different interface shell. What might be the advantages and disadvantages of...
A sinc signal x(t) = sin(0.5t)/(t)is passed through an ideal low-pass filter with a frequency response H(j) = u( + 0.5) u( 0.5) (a) Find the Fourier transform X()and carefully plot it. (b) Find the...
How does PGP create a set of security parameters?
To see the effect of the zeros on the complete response of a system, sup-pose you have a system with a transfer function (a) Find and plot the poles and zeros of H(s). Is this BIBO stable? (b) Find...
A key distribution center (KDC) is designed to solve the problem of distributing __________ keys. a. Secret b. Public c. Private
Assume Alice needs to send a confidential signed document to 100 people. How many keys does Alice need to use to prepare 100 copies if she uses asymmetric-key confidentiality? Explain.