Questions
SHORT ANSWER __________ refers to those attributes of a system visible to a programmer. 2. _________...

SHORT ANSWER

  1. __________ refers to those attributes of a system visible to a programmer.

2. _________ refers to the operational units and their interconnections that realize the architectural specifications.

3. Control signals, interfaces between the computer and peripherals, and the memory technology used are all examples of _________ attributes.

4. The instruction set, the number of bits used to represent various data types, I/O mechanisms and techniques for addressing memory are all examples of _________ attributes.

  1. The __________ architecture is the architecture of IBM’s mainframe product line.
  2. _________ is the way in which the components are interrelated.
  3. _________ is the operation of each individual component as part of the structure.
  4. The basic functions that a computer can perform are: data processing, data movement, control, and _________.
  5. When data are received from or delivered to a device that is directly connected to the computer, the process is known as __________.
  6. The four main structural components of the computer are: main memory, I/O, system interconnection, and __________.
  7. Often referred to as processor the ________ controls the operation of the computer and performs its data processing functions.
  8. A common example of system interconnection is by means of a ________, consisting of a number of conducting wires to which all the other components attach.
  9. The major structural components of the CPU are: control unit, register, CPU interconnection, and __________.
  10. A __________ control unit operates by executing microinstructions that define the functionality of the control unit.
  11. The _________ controls the operation of the CPU and hence the computer.

Problems:

  1. A program consists of 100,000 instructions as follows:

Instruction Type

Instruction Count

Cycles per Instruction

Integer arithmetic

45,000

4

Data transfer

32,000

6

Floating point arithmetic

15,000

10

Control transfer

8,000

3

1) Determine

  1. the program execution time,
  2. the effective CPI for the machine,
  3. MIPS rate for the following processors.

*Please show work for each answer placed in the Table.

Processor

Execution Time

CPI

MIPS rate

M1 - 350 MHz

M2 - 800 MHz

M3 - 1 GHz

2) What is the speed up of M2 from M1?

3) what is the speed up of M3 from M1?

4) What is the speed up of M3 from M2?

  1. Consider two different machines with two different instruction sets, both of which have a clock rate of 400 MHz. The following measurements are recorded on the two machines running a given set of benchmark programs.

Instruction Type

Instruction Count (millions)

Cycles per

Instruction

Machine A

Arithmetic and logic

Load and store

Branch

Others

8

4

2

4

1

3

4

3

Machine B

Arithmetic and logic

Load and store

Branch

Others

10

8

2

4

1

2

3

4

  1. Determine
    1. the program execution time,
    2. the effective CPI for the machine,
    3. MIPS rate for each machine.

*Please show work for each answer in the Table.

Processor

Execution Time

CPI

MIPS rate

Machine A

Machine B

2) Comment on the result.

  1. We have two types of machine as follows:

Processor

Clock Rate (MHz)

MIPS rate

CPU time (sec)

Machine A

5

1

12 x

Machine B

25

18

x

Mache A requires 12 times longer than Machine B measured in CPU time. For example, a program takes 1 second in Machine B will take 12 seconds.

1) What is the relative size of the instruction count for the program running on the two machines?

2) What is the effective CPI for the two machines?

In: Computer Science

// Programmer: // Date: // The Saurian class has the ability to translate English to Saurian...

// Programmer:
// Date:
// The Saurian class has the ability to translate English to Saurian
// and Saurian to English

public class Saurian
{
   // data

   // constants used for translating
   // note M = M and m = m so M and m are not needed
   public static final char[] ENGLISHARR = {'A','B','C','D','E','F','G','H','I','J','K','L','N','O','P','Q','R','S','T','U','V','W','X','Y','Z','a','b','c','d','e','f','g','h','i','j','k','l','n','o','p','q','r','s','t','u','v','w','x','y','z'};
   public static final char[] SAURIANARR = {'U','R','S','T','O','V','W','X','A','Z','B','C','D','E','F','G','H','J','K','I','L','N','P','O','Q','u','r','s','t','o','v','w','x','a','z','b','c','d','e','f','g','h','j','k','i','l','n','p','o','q'};
   public static final int ARRLENGTH = ENGLISHARR.length;   // should be the same length for ENGLISHARR and SAURIANARR

}

In: Computer Science

Having trouble getting started on this Overview As a programmer, you have be asked by a...

Having trouble getting started on this

Overview

As a programmer, you have be asked by a good friend to create a program that will allow them to keep track of their personal expenses. They want to be able to enter their expenses for the month, store them in a file, and then have the ability to retrieve them later. However, your friend only wants certain people to have the ability to view his or her expenses, so they are requesting that you include some sort of login functionality.

Instructions

For this challenge, you will start this application for your friend by concentrating on the login functionality. You will have a standard report in a text file where you will build login functionality to access. Below you will find the step by step instructions on how to develop this application.

  1. Declaring Variables - You will start the application by declaring the following variables:
    1. username - initialized with an empty string to store the username entered by the user
    2. password - initialized with an empty string to store the password entered by the user
    3. repeat - initialized with the letter 'y' to control the looping of the program
    4. passwordLength - intialized with the number 8 to validate password length
    5. Four flags set to false named hasAmpersand, hasValidLength, isValidUsername, and isValidPassword
  2. Display the program header as shown in the images below
  3. Your program must allow the program to repeat without re-displaying the program header.
  4. You must obtain the username from the user then check to see if the username contains the @ symbol. If does, set the hasAmpersand flag to true and allow the program to continue. If it doesn't, alert the user that it is an invalid email and use the continue command to skip the rest of the code and repeat the program.
  5. Obtain the user password and use a while loop to make sure that the user has entered a password greater than the number stored in the passwordLength variable. After the password has been validated to be greater than the stated password length, change the hasValidLength flag to true.
  6. You will then use the hasAmpersand and hasValidLength flags to confirm whether or not to open the logins.txt file to confirm that this login information is present in the file. This is when you would change the appropriate isValid flags to state that they are in the file. (HINT: You can check first that the username is in the file, if not, then there is no need to check for the password.) If the username is not in the file, use the break statement to end the program as shown below.
  7. The report stored in the PersonalExpense.txt file should only be display if both the username and password is correct.
  8. The text files for this application are attached to the Dropbox. You may download and add them to your solution. Or feel free to create your own login and report pages

what I have so far:

hasAt=False

while (not hasAt):

username= input("what is your username?")

if "@" not in username:

print ("wrong username")

print ("try again loser")

else:

password= input ("what is your password?")

hasAt=True

In: Computer Science

1. True or False? If one programmer in a large team is given the task of...

1. True or False? If one programmer in a large team is given the task of writing a single function for the team project, this programmer is more likely to need a function driver than a function stub.

2. A(n) ____________________ is a dummy function that is included for testing the higher-level code.

3. ____________________ is the principle that a module should perform exactly one abstract action.

4.

For the function definition
int SomeFunc( /* in */ int alpha,
/* in */ int beta )
{
int gamma;
alpha = alpha + beta;
gamma = 2 * alpha;
return gamma;
}
what is the function postcondition?

a. // Postcondition: gamma == 2*alpha

b. // Postcondition: alpha == alpha@entry + beta
// && gamma == 2*alpha

c. // Postcondition: Function value == gamma

d. // Postcondition: Function value == 2*alpha

e. // Postcondition: Function value == 2*(alpha@entry + beta)

5. ____________________ is a measure of the quantity of information passing through a module's interface.

6. In contrast to promotion, ____________________ of data values can potentially cause loss of information.

7.

Using the library functions available through the header file cctype, which of the following can be used to determine if the variable someChar contains either a digit character or a lowercase letter?

a. if (isalnum(someChar) || isdigit(someChar))

b. if (isalpha(someChar) || isdigit(someChar))

c. if (isalnum(someChar) && !isupper(someChar))

d. if (islower(someChar) || isdigit(someChar))

e. c and d above

8. True or False? For team programming to succeed, it is essential that all of the module interfaces be defined explicitly and the coded modules adhere strictly to the specifications for those interfaces.

9.

Which of the following could cause an unexpected side effect?

a. modifying a global variable

b. changing the value of a value parameter

c. referencing a global constant

d. declaring an incoming-only parameter to be a reference parameter

e. a and d above

10. True or False? Unsigned types are most appropriate for advanced techniques that manipulate individual bits within memory within memory cells to avoid errors caused by, for example, using unsigned variables for ordinary numeric computations.

In: Computer Science

What is a Canadian Mortgage? The September 2020 update on house prices, states that the average...

What is a Canadian Mortgage? The September 2020 update on house prices, states that the average price of a house in Windsor is $430,000. A family has saved 5% of this amount that is required to make a down payment for an average home. If the current posted rate is 3% would you recommend a family with a monthly income of $5000 buy a house? The Canadian Housing Mortgage Corporation recommends that the cost of a mortgage should not exceed 35% of your monthly income.

In: Finance

1. The relationship National Saving = Y – C – G holds for: A closed economy...

1. The relationship National Saving = Y – C – G holds for:

A closed economy only

An open economy only

Either an open or closed economy

2. The relationship Saving = Investment holds for:

A closed economy only

An open economy only

Either an open or closed economy

3. True or false: a trade deficit implies a positive net capital outflow.

True
False


In: Economics

Use the Article to answer the questions please: Social Distancing to Test If Technology Can Solve...

Use the Article to answer the questions please: Social Distancing to Test If Technology Can Solve the Loneliness Epidemic By NICOLE VAN GRONINGEN

Article link: https://www.statnews.com/2020/04/07/using-social-distancing-to-test-if-technology-can-solve-the-loneliness-epidemic/

1) Who do you think is the intended audience (reader) of this article? That is, who is the author, Nicole Groningen, writing the article for? Explain your answer in 1-2 sentences.

2) What is the purpose of this article? What verb (argue, explain, suggest, or another verb) best describes what she is doing, and how can you tell? Explain your answer in 1-2 sentences.

3) According to paragraphs 11 and 12, how might technology companies benefit from this period of social distancing during COVID-19? Explain your answer in 1-2 sentences.

4) Based on the article, which of the following does NOT appear to be an interest of the author’s:

1. the wellbeing of the elderly

2. the finances of technology companies

3. the loneliness epidemic in the United States

4. Americans’ physical health

Explain your answer in several sentences by discussing how she addresses the other three topics in her article. You are not required to use paragraph # citations, but you may if you want to.

5) In one sentence and using your own words, explain the overall main idea of the article

6) Explain your reaction to this article. What stuck out to you? What connections did you make (text-to-text, text-to-self, text-to-world)? What questions did you have while reading? What was interesting? Did anything surprise you? Does it match your experience with technology? Share your reactions to the article in a paragraph of at least four sentences.

In: Nursing

1) The worksheet Engines in the HW8 data workbook on Moodle describe a suppliers shipments of...

1) The worksheet Engines in the HW8 data workbook on Moodle describe a suppliers shipments of engines per year to their customers from 1999 through 2018.

a) Use simple regression with Shipments as the independent or Y variable and Year as the dependent or X variable to fit the data. Determine MAE, MSE and MAPE for the simple regression model. Construct a chart that has the observed data and the fit line by Year. Use the simple regression model to predict Shipments for years 2019 and 2020.

b) Use a three time period Moving Average to fit the rate data. Determine MAE, MSE and MAPE for the Moving Average model. Construct a chart that has the observed data and the fit line by Year. Use the Moving Average model to predict Shipments for years 2019 and 2020.

c) Use exponential smoothing with a smoothing constant of 0.15 to fit the data. Determine MAE, MSE and MAPE for the exponential smoothing model. Use the model to forecast Shipments for years 2019 and 2020.

d) Short answer. Which of the three above forecasting models (simple regression, moving average and exponential smoothing) would you use to model the data and why would you use that model.

Year Shipments
1999 157
2000 168
2001 186
2002 171
2003 198
2004 222
2005 246
2006 233
2007 342
2008 413
2009 517
2010 588
2011 600
2012 524
2013 384
2014 403
2015 522
2016 604
2017 815
2018 955

In: Statistics and Probability

a.) Write down all feasible samples of size 2 of the values in the following table...

a.) Write down all feasible samples of size 2 of the values in the following table and calculate the average number of cases in each. (Hint: There are 45 possible combinations of size 2.)
b.) Compare the average value of the distribution of sample means with that of the population. Write what you observe.
c.) In a graph compare the dispersion of the population with that of the sample means. Write what you observe.

Validity

Zone A

01/01/2019

$102.68

01/01/2018

$88.36

01/01/2017

$80.04

01/01/2016

$73.04

01/01/2015

$70.10

01/01/2014

$67.29

01/01/2013

$64.76

01/01/2012

$62.33

01/01/2011

$59.82

01/01/2010

$57.46

In: Statistics and Probability

Assume that the regression line for the New York City murder rate per 100,000 residents between...

Assume that the regression line for the New York City murder rate per 100,000 residents between 2000 and 2010 is given by y=−0.24x+488.7, where x is the year and y is the murder rate. Interpolate to get an approximate value for the rate in 2006. Round your answer to one decimal place.

Interpolated rate

The table below shows the murder rate per 100,000 residents for a large American city over a twelve-year period.

Year

2000

2001

2002

2003

2004

2005

2006

2007

2008

2009

2010

2011

Rate

8.8

7.1

7.2

6.8

6.4

7.1

5.8

6.1

5.4

6.2

6.1

4.9

Enter the coefficients of the regression line for this data, rounding each to two decimal places:

Slope:

Intercept:

Use your regression line (with rounded coefficients) to estimate this city’s murder rate in 2012. Round your answer to the nearest tenth.

Estimate:

The table below shows per capita cheese consumption, in pounds, for several years for one American state.

Year

2000

2001

2002

2003

2004

2006

2007

2008

2009

Cheese Consumed

26.1

26.8

28.2

28.8

29.8

29.6

31

30.8

32.1

Which of the following is the equation of the regression line for this data?

A. y=−0.595x+1163.4
B. y=1163.4x−0.595
C. y=0.595x−1163.4
D. y=0.595x+1163.4
E. y=1163.4x+0.595
F. y=−0.595x−1163.4

Using the regression line, estimate the per-capita consumption in 2005 to the nearest tenth of a pound.

Estimate:

Did you just perform interpolation or extrapolation?
A. interpolation
B. extrapolation

Would you expect the regression line for the price of a camera vs. the number sold to slope up or down, or would it be pretty much horizontal?

A. up
B. down
C. horizontal

In: Statistics and Probability