Consider the COMPANY database described in Figure 5.6. Using the syntax of Oracle triggers, write active rules to do the following: a. Whenever an employees project assignments are changed, check if...
Suppose that the system crashes before the [read_item, T 3 , A] entry is written to the log in Figure 22.1(b). Will that make any difference in the recovery process? Figure 22.1(b) (b) A BCD 30 15 40...
Cludadwy Chairs sells a patented seat that spectators can take to youth soccer games. The seat folds so it is small enough to fit in the glove box of most vehicles. The company operates a factory in...
Fill in the blanks below to complete the following Apache Spark program which computes the number of occurrences of each word in a file. For simplicity we assume that words only occur in lowercase,...
Java is architecturally _________________. a. Neutral b. Oriented c. Specific d. Abstract
Drilling often accounts for one-third to two-thirds of the total cost in the search for fluid. Advances in drilling technology can reduce these costs substantially. The key point is redesigning the...
Create an index on the CustomerID column of the Customer_T and Order_T table in Figure 4-4. Figure 4-4 A CustomerID 4 A + + G + + 14 + f Record: H E 16:0 A OrderID # 3 Record: 14 Customer_T...
Repeat Exercise R-14.7 for the adjacency list representation, as described in the chapter. Exercise R-14.7 Give pseudo-code for performing the operation insert edge(u,v,x) in O(1) time using the...
Design a collection of database tables for an online store from which you intend to sell products you handcraft. The data you need to store includes the following attributes: Product number Product...
When you join the Benevolent Order of Programmers, you can be known at BOP meetings by your real name, your job title, or your secret BOP name. Write a program that can list members by real name, by...
Listing 4.6 illustrates a problem created by following numeric input with line-oriented string input. How would replacing this: cin.getline(address,80); with this: cin >> address; affect the working...
Rewrite the Stock class, as described in Listings 10.7 and 10.8 in Chapter 10 so that it uses dynamically allocated memory directly instead of using string class objects to hold the stock names. Also...
Enhance the String class declaration (that is, upgrade string1.h to string2.h) by doing the following: a. Overload the + operator to allow you to join two strings into one. b. Provide a stringlow()...
A complex number has two parts: a real part and an imaginary part. One way to write an imaginary number is this: (3.0, 4.0). Here 3.0 is the real part and 4.0 is the imaginary part. Suppose a =...
Modify the Vector class header and implementation files (Listings 11.13 and 11.14) so that the magnitude and angle are no longer stored as data components. Instead, they should be calculated on...
Consider a simple thermostat that turns on a furnace when the temperature is at least 3 degrees below the setting, and turns off a furnace when the temperature is at least 3 degrees above the...
Write an essay on the relationship between evolution and one or more of autonomy, intelligence, rationality, and learning.
The resurgence of interest in AI in the 2010s is often attributed to deep learning. Explain what deep learning is, how it relates to AI as a whole, and where the core technical ideas actually...
You can describe a simple list as follows: The simple list can hold zero or more items of some particular type. You can create an empty list. You can add items to the list. You can determine whether...
Do Programming Exercise 1 from Chapter 9 but replace the code shown there with an appropriate golf class declaration. Replace setgolf(golf &, const char*, int) with a constructor with the appropriate...
Investigate the state of the art for domestic robots: what can be done (with what assumptions and restrictions on the environment) and what problems remain unsolved? Where is research most needed?
Find and analyze at least three sets of proposed principles for the governance of AI. What do the sets of principles have in common? How do they differ? How implementable are these principles?
Define in your own words: (a) Intelligence, (b) Artificial intelligence, (c) Agent, (d) Rationality, (e) Logical reasoning.
Here is a header file: // golf.h -- for pe9-1.cpp const int Len = 40; struct golf { char fullname[Len]; int handicap; }; // non-interactive version: // function sets golf structure to provided name,...
What changes would need be made to Listing 7.15 so that the functions fill() and show() use reference parameters? Heres a sample run: Enter Spring expenses: 212 Enter Summer expenses: 256 Enter Fall...
This exercise provides practice in writing functions dealing with arrays and structures. The following is a program skeleton. Complete it by providing the described functions: #include using...
Describe three different task environments in which the performance measure is easy to specify completely and correctly, and three in which it is not.
Redo Listing 7.15 without using the array class. Do two versions: a. Use an ordinary array of const char * for the strings representing the season names, and use an ordinary array of double for the...
Redo Listing 7.7, modifying the three array-handling functions to each use two pointer parameters to represent a range. The fill_array() function, instead of returning the actual number of items...
Section 19.6.5 (page 684) noted that the output of the logistic function could be interpreted as a probability p assigned by the model to the proposition that f(x) = 1; the probability that f(x) = 0...
Many state lotteries use a variation of the simple lottery portrayed by Listing 7.4. In these variations you choose several numbers from one set and call them the field numbers. For example, you...
Here is part of a program that reads keyboard input into a vector of string objects, stores the string contents (not the objects) in a file, and then copies the file contents back into a vector of...
Consider the TooBig functor in Listing 16.15.What does the following code do, and what values get assigned to bo? bool bo = TooBig(10)(15); One functor (f100) is a declared object, and the second...
Compared to an array, a linked list features easier addition and removal of elements but is slower to sort.This raises a possibility: Perhaps it might be faster to copy a list to an array, sort the...
Modify Listing 16.9 (vect3.cpp) as follows: Heres a sample run of the program in Listing 16.9: Enter book title (quit to quit): The Cat Who Can Teach You Weight Loss Enter book rating: 8 Enter book...
Listing 15.16 uses two catch blocks after each try block so that the nbad_index exception leads to the label_val() method being invoked. Modify the program so that it uses a single catch block after...
Redo Listing 16.3 so that it gets it words from a file. One approach is to use a vector object instead of an array of string.Then you can use push_back() to copy how ever many words are in your data...
This exercise is the same as Programming Exercise 2, except that the exceptions should be derived from a base class (itself derived from logic_error) that stores the two argument values, the...
Modify Listing 15.11 so that the two exception types are classes derived from the logic_error class provided by the header file. Have each what() method report the function name and the nature of the...
Use the template definitions in this chapter to define the following: An array of string objects A stack of arrays of double An array of stacks of pointers to Worker objects How many template class...
Define a QueueTp template.Test it by creating a queue of pointers-to-Worker (as defined in Listing 14.10) and using the queue in a program similar to that in Listing 14.12. Here is a sample run of...
Here are some class declarations: // emp.h -- header file for abstr_emp class and children #include #include class abstr_emp { private: std::string fname; // abstr_emp's first name std::string lname;...
The Benevolent Order of Programmers maintains a collection of bottled port. To describe it, the BOP Portmaster has devised a Port class, as declared here: #include using namespace std; class Port {...
A Person class holds the first name and the last name of a person. In addition to its constructors, it has a Show() method that displays both names.A Gunslinger class derives virtually from the...
Start with the following class declaration: // base class class Cd { // represents a CD disk private: char performers[50]; char label[20]; int selections; // number of selections double playtime; //...
The Wine class has a string class object member (see Chapter 4) that holds the name of a wine and a Pair object (as discussed in this chapter) of valarray objects (as discussed in this chapter).The...
Consider the following variation of the Stack class defined in Listing 10.10: // stack.h -- class declaration for the stack ADT typedef unsigned long Item; class Stack { private: enum {MAX = 10}; //...
What is the purpose of risk management? Outline the risks you faced on the first day of college. Have any of these risks changed since then?
Modify Listing 8.14 so that it uses two template functions called SumArray() to return the sum of the array contents instead of displaying the contents. The program now should report the total number...
Modify Listing 11.15 so that instead of reporting the results of a single trial for a particular target/step combination, it reports the highest, lowest, and average number of steps for N trials,...
Modify Listing 11.15 so that it writes the successive locations of the random walker into a file. Label each position with the step number. Also have the program write the initial conditions (target...
Prove the validity of the simple rule for finding the 2s complement of a number, which was presented in Section 3.3. Recall that the rule states that scanning a number from right to left, all 0s and...
Compare and contrast the role of requirements analyst, change management analyst, and project manager.
Use the Venn diagram to prove DeMorgans theorem, as given in expression 15b in Section 2.5. Section 2.5 In 1849 George Boole published a scheme for the algebraic description of processes involved in...
Go to www.bls.gov and perform a search for systems analyst. What is the employment outlook for this career? Compare and contrast the skills listed with the skills that were presented in this chapter.
Think of an online retailer youve recently used or considered using for a purchase. Why is good design of that retailers interface important for the retailer? Visit the online retailer and evaluate...
MERs Fine Timepieces is a thriving business that specializes in sales and service of fine watches and clocks. Although the market for timepieces has changed as many people purchase inexpensive,...
ComputerBuddies is a group that was formed in the Chicago metro area as an information exchange and social outlet for people with interests in computers. Members of ComputerBuddies range from...
Example 4.35 and Figure 4.56 show how a circuit that generates an ASCII byte suitable for sending over a communications link may be defined. Write Verilog code for its counterpart at the receiving...
Section 4.1.2 shows Shannons expansion in sum-of-products form. Using the principle of duality, derive the equivalent expression in product-of-sums form. Section 4.1.2 Figures 4.6 through 4.9...
Birdie Masters is a chain of golf schools that operates throughout the southwestern United States and California.Using a combination of innovative teaching techniques and a staff of effective...
Which method of representing quantities involves discrete steps?
Prove Shannons expansion theorem presented in Section 4.1.2. Section 4.1.2 Figures 4.6 through 4.9 illustrate how truth tables can be interpreted to implement logic functions using multiplexers. In...
Write Verilog code that defines the serial subtractor designed in Problem 6.40. Data From Problem 6.40 Section 6.5 presents a design for the serial adder. Derive a similar circuit that functions as a...
Section 6.5 presents a design for the serial adder. Derive a similar circuit that functions as a serial subtractor which produces the difference of operands A and B. Data From Section 6.5 We will now...
The IT manager at Pitt Fitness wants to secure the database using a method that includes processing logic to periodically change and synchronize with passwords stored on the database. Which of the...
Pitt Fitness is now routinely creating backups of their database. They store them on a server and have a number of backup files that need to be deleted. Which of the following files is the correct...
Write Verilog code for the FSM designed in Problem 6.37. Data From Problem 6.37 The arbiter FSM defined in Section 6.8 (Figure 6.72) may cause device 3 to never get serviced if devices 1 and 2...
Derive the circuits that implement the state tables in Figures 6.55 and 6.56. Compare the costs of these circuits. Present state S1 S2 S3 S4 S5 S6 S7 S8 S9 Next state DN = 00 01 10 S1 S3 S3 S2 S2 S5...
Which of the following data integrity constraints would ensure Pitt Fitness has a consistent method to record customer phone numbers? a. Format (Input Mask) b. Legal values c. Data type d. Validation...
The IT manager at Pitt Fitness is creating a backup of the company database. What is the best location for storing the backup? a. At the Downtown location b. Next to the current database for easy...
Suppose Pitt Fitness were using an enterprise-level DBMS when a thunderstorm caused a brief power loss to the database, stopping a class registration entry in midstream. When the power was fully...
Pitt Fitnesss IT person backs up the database every day at the end of business hours. After completing their evening classes, customers register for classes for the upcoming week. Assume that a...
Use the cubical representation and the method discussed in Section 8.4.2 to find a minimum cost SOP realization of the function f (x 1 , . . . , x 4 ) defined by the ON-set ON = {00x0, 100x, x010,...
Section 7.5 shows how to implement the traditional long division that is done by hand. A different approach for implementing integer division is to perform repeated subtraction as indicated in the...
(a) For the ASM chart derived in Problem 7.4, show another ASM chart that specifies the required control signals to control the data path circuit in the processor. Assume that multiplexers are used...
Popular classes at Pitt Fitness fill up almost immediately. What database technique would work well to determine which people should be admitted into a popular class based on when they requested...
The new DBA at Pitt Fitness is working on catalog services in Microsoft Access. This employee has published an internal report on the database schema, but the managers receiving this report are...
GitHub and BitBucket are popular websites for . a. Hosting projects that use the Git language for version control b. Completing full-stack web app projects c. Posting technical questions and...
Which of the following changes to a database would most likely require the most rework to existing programs and queries? a. Adding a new field to a table b. Creating a new index c. Changing...
Which of the following is not a constraint on the primary key field for a table? a. There may be no null values. b. All values must be unique. c. All values must have a matching value in the foreign...
(a) For the ASM chart derived in Problem 7.1, show another ASM chart that specifies the required control signals to control the datapath circuit. Assume that multiplexers are used to implement the...
Pitt Fitness would like to analyze their options for an in-house database versus a cloud database-as-a-service. What are the benefits to moving their database to the cloud?
Which SQL statement would give user cyclone1 the ability to select, insert, update, or delete records from the Students table? a. GRANT SELECT, INSERT on STUDENTS to cyclone1 b. GRANT ALL on STUDENTS...
Which feature potentially helps you recover data in an Access database? a. Journaling b. Incremental backups c. Two-step locking d. Compact and repair
Data consistency means . a. Allowing two or more users to access the database at the same time b. Giving each user a consistent view of the data including changes c. Using properties such as the...
Which of the following tables could be considered a composite entity in an ERM and a junction table in an E-R diagram? a. ClassInstructors b. Instructors c. Customers d. Classes
Which of the following tables could be considered a composite entity in an ERM and a junction table in an E-R diagram? a. Classes b. Instructors c. Reservations d. Customers
What is the relationship between the tables Classes and Customers? a. One to one b. One to many c. Many to many d. The tables arent related.
The circuit in Figure 11.12 provides an easily testable implementation of the FSM in Figure 6.76. In Example 11.3 we showed how this circuit may be tested by testing the combinational part using...
What is the relationship between the tables Instructors and Classes? a. One to one b. One to many c. Many to many d. The tables arent related.
What is the relationship between the tables Classes and Reservations? a. One to one b. One to many c. Many to many d. The tables arent related.
What field(s) in the Customers table would be the most appropriate for a CustomerName index? a. LastName b. LastName and FirstName c. LastName, FirstName, and BirthDate d. CustomerID
For the table Customers (CustomerID, LastName, FirstName, StreetAddress, City, State, ZipCode, EmailAddress, PhoneNumber, BirthDate), which of the following is a secondary key? a. LastName, FirstName...
For the table Customers (CustomerID, LastName, FirstName, StreetAddress, City, State, ZipCode, EmailAddress, PhoneNumber, BirthDate), which field is a foreign key? a. LastName b. CustomerID c. There...
Define data classification schemes as a formal access control methodology used to assign a level of confidentiality to an information asset, restricting the number of people who can access it. Point...
A software company sells a package that retails for $99. Quantity discounts are given according to the following table: Write a program that asks the user to enter the number of packages purchased....
For the table Customers (CustomerID, LastName, FirstName, StreetAddress, City, State, ZipCode, EmailAddress, PhoneNumber, BirthDate), which field is the primary key field? a. LastName b. BirthDate c....
Which of the following is not a feature that Access uses to demonstrate and leverage the power of one-to-many relationships? a. Subdatasheets b. Lookup properties c. Automatically refreshing related...
Define the purpose of the business impact analysis (BIA). Stress that this document is the first major component of the CP process and what it is intended for. As mentioned in the text, it serves as...