18.11 In the memory management schemes used in earlier operating… 18.11 In the memory management schemes used in earlier operating systems

18.11 In the memory management schemes used in earlier operating… 18.11 In the memory management schemes used in earlier operating systems, it wasnecessary to modify the addresses of most programs when they were loadedinto memory because they were usually not loaded into memory starting atlocation 0. The OS program loader was assigned this task, which was called648 PART FIVE THE SOFTWARE COMPONENTprogram relocation. Why is program relocation unnecessary when virtual storageis used for memory managementWrite Prolog programs that define the following predicates. Your programs shouldensure that backtracking does not produce spurious alternative solutions.(a) The nth element of a list: nth(X,N,L) instantiates X to the Nth element oflist L. Assume that list elements are numbered increasing from 1. [4 marks](b) The last element of a list: last(X,L) instantiates X to the last element of list L.[4 marks](c) Remove an element from a list: remove(X,L,M) instantiates M to a listcontaining all the elements of list L except for every occurrence of term X.[6 marks](d) Substitute one element for another: subst(L,X,Y,M) instantiates M to a listcontaining all the elements of list L except that every occurrence of term X inL is replaced by term Y in M. Write  program to print your name on the screen.Write  program to print “Welcome to C++” on the screenWrite to program to calculate the area of a square.Write  program to find sum of all even numbers between 1 to n.Write  program to print all natural numbers from 1 to n. A majority gate with three inputs signals logic one on its output if two or more ofits inputs are one, and zero otherwise. A minority gate is its complement.(a) Give the boolean equation for a minority gate as a sum of products.(b) Sketch the circuit diagram for a minority gate using NAND gates and inverters.(c) Sketch the transistor-level circuit diagram for an alternative implementationas a single stage of CMOS logic. [3 marks](d) Calculate the number of transistors required for each implementation.(e) Assuming that a conducting p-channel has a resistance twice that of a similarlysized n-channel, use logical effort to compare the performance of the twoimplementations.3 Digital Communication II(a) The Transmission Control Protocol (TCP) employs a transmit windowand cumulative acknowledgement and timeout system, as well as sequencenumbering of packets, to achieve reliable delivery of data.(i) Outline the procedure for round-trip time estimation and the calculationof the retransmission timer.(ii) Explain the function of buffering at the sender and receiver.(iii) How do fast retransmit and fast recovery improve performance afterpacket loss?(b) In a wireless network, delay to access the channel due to scheduling of themedia access control protocol, and random packet loss due to interference,may be non-negligible.(i) Explain how this can interfere with the round-trip time estimation processabove.(ii) Explain how this can interfere with the congestion control scheme thatTCP employs. Information retrieval systems vary in the expressivity of the query languages theyemploy. For instance, some systems support proximity search: if two query termsare connected by the “Next” operator, then only those documents are retrievedwhere the query terms appear close together (i.e., within a certain number of wordsof each other).(a) List and briefly describe other ways in which the syntax and the interpretationof query languages may vary.(b) Describe with an example how the “Next” operator described above isimplemented efficiently in modern information retrieval systems. Your answershould include a description of the data structure(s) necessary to support it.(c) A search engine supports error correction in the following way: If an error issuspected in a query term, the system provides a link labelled “Did you meanX?”, where X is the corrected term, in addition to its normal results. Thelink leads to a list of retrieved documents, corresponding to a variant of theoriginal query, with X replacing the misspelled term.(i) Explain why it is non-trivial to implement this feature efficiently.(ii) Discuss methods for implementing this feature in a realistic setting.(a) (i) Briefly describe the purpose of broadband fixed wireless access (FWA)and give typical situations where it could be deployed.(ii) What advantages does radio offer over traditional wired access?(b) Explain how intersymbol interference (ISI) arises in a wireless communicationsystem and its effect on system performance.(c) (i) Describe how• linear equalisation• orthogonal frequency division multiplexing (OFDM)can be used to combat ISI. [4 marks]Image transcription textEnumerable and Recursive Sets 1. Are the following setsrecursive? Are they recursively enumerable? Justify yourconjectures. a) { x [ x is an even integer } b) { i | M;… Show more… Show moreImage transcription text2. A set (language) is recursive if it isdecided by a Turing machine. A set isrecursively enumerable (r…. Show more… Show more  Computer Science Engineering & Technology Information Security CS 1234cv Share QuestionEmailCopy link