This website uses cookies to ensure you have the best experience.

# Computer Science Essay

557 words - 3 pages

Exercises
1. Compare the processors’ access to printers and other I/O devices for the
master/slave and the symmetric multiprocessing configurations. Give a real-life
example where the master/slave configuration might be preferred.
2. Compare the processors’ access to main memory for the loosely coupled
configuration and the symmetric multiprocessing configurations. Give a
real-life example where the symmetric configuration might be preferred.
3. Describe the programmer’s role when implementing explicit parallelism.
4. Describe the programmer’s role when implementing implicit parallelism.
5. What steps does a well-designed multiprocessing system follow when it detects
that a processor is failing? What is the central goal of most multiprocessing
systems?
6. Give an example from real life of busy ...view middle of the document...

To do so,
break down the equation into the correct order of operations with one
calculation per step. Show the formula for each step.
b. Find the value of G: if A = 5, B = 10, C = 3, D = 8, and E = 5.
11. Consider this formula:
G = D + (A + C2) * E / (D + B)3
a. Show the order that a processor would follow to calculate G. To do so,
break down the equation into the correct order of operations with one
calculation per step. Show the formula for each step.
b. Find the value of G: if A = 5, B = 10, C = 3, D = 8, and E = 5.
199
Exercises
12. Rewrite each of the following arithmetic expressions to take advantage of
concurrent processing and then code each. Use the terms COBEGIN and
COEND to delimit the sections of concurrent code.
a. A+B*R*Z – N*M+C2
b. (X*(Y*Z*W*R)+M+N+P)
c. ((J+K*L*M*N)*I)
13. Rewrite each of the following expressions for concurrent processing and then
code each one. Use the terms COBEGIN and COEND to delimit the sections of
concurrent code. Identify which expressions, if any, might NOT run faster in
a concurrent processing environment.
a. H2*(O*(N+T))
b. X*(Y*Z*W*R)
c. M*T* R
14. Use the test and increment (P and V) semaphore operations to simulate the
traffic flow at the intersection of two one-way streets. The following rules
should be satisfied:
• Only one car can be crossing at any given time.
• A car should be allowed to cross the intersection only if there are no cars
coming from the other street.
• When cars are coming from both streets, they should take turns to prevent
indefinite postponements in either street.
15. Compare and contrast the critical region and working set.
16. Consider the following program segments for two different processes (P1, P2)
executing concurrently and where B and A are not shared variables, but x
starts at 0 and is a shared variable.
Processor #1: Processor #2:
for(a = 1; a

## Other Papers Like Computer Science

### Computer Science C++ Essay

6570 words - 27 pages the eve of its new standard. by Danny Kalev Bjarne Stroustrup, inventor of the C++ programming language, is a computer scientist and the College of Engineering Chair Professor of Computer Science at Texas A&M University. He has always been highly involved in the standardization of C++. Since 2004, Bjarne and the standards committee have been busy hammering out the details of a new standard, temporarily titled C++0x. Bjarne was gracious enough

### Computer Science Notes Essay

5011 words - 21 pages hypothetical computer called Java Virtual Machine the JVM has an instruction set and manipulates various memory areas at run time the compiler places the bytecode to be interpreted by the JVM into a class file THEN the JVM interprets the bytecode in the class file to execute the program there are separate class files for JVM to run, it must be able to locate the class file with the bytecode JVM uses an envio variable named CLASSPATH to help it search

### College Essay for Computer Science

777 words - 4 pages It was the year 1994 when I was first introduced to a computer in school and 10 years later, i.e., 2004 I found myself pursuing Engineering program in the Aligarh Muslim University, with computer science as major. And in those 10 years, I continued getting fascinated more and more by the extensive use of computer technologies in every walk of life. The very first program I wrote in school was a simple BASIC one to calculate the factorial of a

### Computer Science: The Underlying Processes

1572 words - 7 pages The list of advances made in computer science is endless and involves just about everything imaginable. In many ways, the advances that have happened over the last few decades have laid the foundation for a much more profound change in the years ahead. "Today there are about a billion PC's in use around the world". (Network World, 2008) Computers are available everywhere, in the office and the home, in our cars, in stores and restaurants. We use

### Computer Science

954 words - 4 pages his account. Thus, if the bank has 1,000,000 customers, then this programmer would get \$10,000 each month from this salami slicing attack. What type of malware is such a program? Question 8 There was an email joke chain letter that called itself the Amish virus. It stated that its author had no computer available in order to write it; hence, it can't run as an executable program or document macro. Instead, it asked the recipient to forward the

### Computer Science

1621 words - 7 pages technology observers and national security, the emergence of this worm is a risk that threatens or causes harms many activities that are deemed critical to the functioning of the modern society (Theohary, Rollins & Paul, 1). The virus did not affect the functioning of a windows computer performance because it was designed to affect some specific models of programmable logic controllers. Some of the targeted computers were those that were made by

### Computer Science

684 words - 3 pages connected SQL Azure database. A data definition language or data description language (DDL) is syntax similar to a computer programming language for defining data structures especially database schemas. Schema objects do not have a one-to-one correspondence to physical files on disk that store their information. However, Oracle databases store schema objects logically within atablespace of the database. The data of each object is

### Computer Science - 714 words

714 words - 3 pages Email objective | Template email | 1. Applying approval mail sent to unit manager. | Dear Unit manager,Please note that I applied for the new announced position sent from the recruitment side as my interest to have career development and I am kindly seeking your approval as mandatory to complete the applying cycle process or the request will be not eligible Many Thanks | 2. Not eligible reason. |  Dear Employee,Thank you so much for

### Computer Science Siwes Report on Time and Attendance Management (Jantek)

4678 words - 19 pages KOGI STATE POLYTECHNIC SCHOOL OF APPLIED SCIENCES, MATHS/STAT/COMPUTER SCIENCE DEPARTMENT PMB 1101, LOKOJA, KOGI STATE A TECHNICAL REPORT ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) AT THE TIME OFFICE, DANGOTE CEMENT PLC OBAJANA BY AIYEDE JOHN E. 2010/ND/CPS/370 IN PARTIAL Fulfillment of THE REQUIREMENT FOR THE AWARD OF NATIONAL DIPLOMA (ND) IN COMPUTER SCIENCE. FEBRUARY 2012. CHAPTER ONE

### Computer Science Industrial Attachment

1081 words - 5 pages resulting information is displayed in such a pattern that is very easy to understand. Boston:McGraw-Hill Irwin,(2004). Executive information system is ‘a computer based system that serves the information that is needed by the various top executives. It provides very rapid access to the timely information and also offers the direct access to the different management reports.’ Executive Information System is very user friendly in the nature. It

### Computer Science Xyz Company

1026 words - 5 pages About Organization: ABC Inc. is a leading telecom provider with a customer base of over million of users. It provides all the telephone and internet services to its customers. Management Controls Risk Management ABC Inc. is ready with the disaster recovery technique, so the risks can be handled in the organization with care and proper management; they are also maintaining a risk assessment report. Review of Security Controls They have

## Related Essays

### Computer Science Essay 802 Words

802 words - 4 pages COMPUTER SCIENCE PROJECT FILE ON BOOK-SHOP PROJECT PREPARED BY: SUKHJEET SINGH XII-C SESSION:2014-2015 VIVEKANAND PUBLIC SCHOOL TABLE OF CONTENT * Acknowledgement * Certificate * Introduction * Hardware and Software Requirement * Header Files & their purpose * Files Generated * Coding * Output * Bibliography ACKNOWLEDGEMENT It would be my utmost pleasure to express my sincere

### Computer Science Essay 2155 Words

2155 words - 9 pages DEPARTMENT OF INFORMATION TECHNOLOGY AND DEPARTMENT OF COMPUTER SCIENCE INFT 452 / COSC 325: COMPUTER SECURITY / ENTERPRISE INFORMATION SECURITY ASSIGNMENT III STUDENT NAME: DESMOND PAA-OBENG JOHNSON JOELON ERIC STUDENT ID: 211IT02007335 211IT02007305 LECTURER: MR. EBENEZER LARYEA SUBMISSION DATE: 17TH APRIL 2014

### Computer Science Essay 823 Words

823 words - 4 pages Computer Science (083) Practical File for Class XI | Index for C++ Programming | | SN. | Program Description | Topic | 1. | Write a program to play the following game:The player guesses a number from 2 to 19 and then the program generates three random numbers from 101 to 199. If the sum of the digits of any of these numbers matches the player’s number, then the player is declared a winner otherwise the player looses the game. | C

### Computer Science Essay 4919 Words

4919 words - 20 pages ] Figure 7.18 [pic] 7a.7 Compound Conditions In English class, you have learned that two complete sentences can be joined together with a conjunction. In Computer Science, two conditions can be joined together with a Logic Operator. There are 4 logic operators: OR, AND, XOR, and NOT. You probably noticed that some of these are also conjunctions in English. To understand how these work, we are going to look at an example of each