Computer Science Textbook Solutions - 28
Computer Science Textbook Solutions - 28
com
There is a bulleted list associated with Figure 2-22 that describes the entities and their
relationships in Pine Valley Furniture. For each of the 10 points in the list, identify the subset of
Figure 2-22 described by that point.
Give an example, other than those described in this chapter, of a weak entity type. Why is it
necessary to indicate an identifying relationship?
Match the following terms and definitions. _________ Composite attribute _________
Associative entity _________ Unary relationship _________ Weak entity _________ Attribute
_________ Entity _________ Relationship type _________ Cardinality _________ Constraint
_________ Degree _________ Identifier _________
List 10 potential benefits of the database approach over conventional file systems.
Explain the differences between an enterprise data model and a conceptual data model. How
many databases does each represent? What scope of the organization does each address? What
are other salient differences?
Figure 1-21 shows an enterprise data model for a music store. a. What is the relationship between
Album and Store (one-to-one, many-to-many, or one-to-many)? b. What is the relationship
between Artist and Album? c. Do you think there should be a relationship between Artist and
Store?
Interview a systems analyst or database analyst and ask questions about the typical composition
of an information systems development team. Specifically, what role does a database analyst
play in project teams? Is a database analyst used throughout the systems development process or
is the database analyst used only at
In this chapter, we described four important data models and their properties: enterprise,
conceptual, logical, and physical. In the following table, summarize the important properties of
these data models by entering a Y (for Yes) or an N (for No) in each cell of the table.
Are there procedures and processes that are common to the use of SDLC, prototyping, and agile
methodologies? Explain any that you can identify and then indicate why the methodologies are
considered to be different even though fundamental procedures and processes are still included.
Consider the two E-R diagrams in Figure 2-25, which represent a database of community service
agencies and volunteers in two different cities (A and B). For each of the following three
questions, place a check mark under City A, City B, or Can't Tell for the choice that is the best
answer. Figure 2-25
Describe the differences between the Document Type Definition (DTD) and the XML Schema.
Because Visio does not explicitly show associative entities, it is not clear in Figure 2-22 which
entity types are associative. List the associative entities in this figure. Why are there so many
associative entities in Figure 2-22?
What is your reaction to the representation of the systems development life cycle included in this
chapter? Explain any problems you have with it.
Consider an organization with which you frequently interact, such as a bank, credit card
company, university, or insurance company, from which you receive several computer-generated
messages, such as monthly statements, transaction slips, and so forth. Depict the data included in
each message you receive from the organ
Identify two examples of natural and surrogate keys in the property sales DM and discuss the
benefits associated with using surrogate keys in general.
The purpose of this exercise is to present a scenario that requires you to act in the role of
business intelligence (BI) consultant for your university (or college) and produce a report to
guide management on the opportunities and issues associated with the business intelligence.
For each of the following pairs of related entities, indicate whether (under typical circumstances)
there is a one-to-many or a many-to-many relationship. Then, using the shorthand notation
introduced in the text, draw a diagram for each of the relationships. a. Student and course
(students register for courses) b. B
Create an XML Query Data Model for each of the XML documents created above.
List five disadvantages of file processing systems.
What does the term data independence mean, and why is it an important goal?
Contrast the following terms: a. Data dependence; data independence b. Structured data;
unstructured data c. Data; information d. Repository; database e. Entity; enterprise data model f.
Data warehouse; ERP system g. Personal database: multitier database h. System development
life cycle: prototyping i. E
Table 1-1 shows example metadata for a set of data items. Identify three other columns for these
data (i.e., three other metadata characteristics for the listed attributes) and complete the entries of
the table in Table 1-1 for these three additional columns.
Create an XML document and an XML Schema for the Hotel Schema given in the Exercises at
the end of Chapter 4. Now attempt to write XQuery expressions for Exercises 6.7 – 6.26.
Discuss how you would change the DM to support the queries identified in Exercise 32.11.
Figure 4-32 shows a class list for Millennium College. Convert this user view to a set of 3NF
relations using an enterprise key. Assume the following: • An instructor has a unique location.
• A student has a unique major. • A course has a unique title. Figure 4-32
Draw an EER diagram for the following problem using this text's EER notation, the Visio
notation, or the subtypes inside supertypes notation, as specified by your instructor. A nonprofit
organization depends on a number of different types of persons for its successful operation. The
organization is interested in the f
Figure 4-35 shows an EER diagram for Vacation Property Rentals. This organization rents
preferred properties in several states. As shown in the figure, there are two basic types of
properties: beach properties and mountain properties. a. Transform the EER diagram to a set of
relations and develop a relational schema.
Identify three types of analysis that the DM cannot support about property sales.
State three conditions that suggest the designer should model a relationship as an associative
entity type.
Create an EER diagram for FAME that extends the E-R diagram you developed in Chapter 2, 2-
60, but accommodates the information gleaned from the e-mails from Pat Smith and Shannon
Howard.
State two conditions that indicate when a database designer should consider using
supertype/subtype relationships.
A bank has three types of accounts: checking, savings, and loan. Following are the attributes for
each type of account: CHECKING: Acct No, Date Opened, Balance, Service Charge SAVINGS:
Acct No, Date Opened, Balance, Interest Rate LOAN: Acct No, Date Opened, Balance, Interest
Rate, Payment Assume that each bank accou
State six general guidelines for naming data objects in a data model.
Define each of the following terms: a. Supertype b. Subtype c. Specialization d. Entity cluster e.
Completeness constraint f. Enhanced entity-relationship (EER) model g. Subtype discriminator
h. Total specialization rule i. Generalization j. Disjoint rule k. Overlap rule 1. Partial
specialization rule m. U
Develop an EER model for the following situation using the traditional EER notation, the Visio
notation, or the subtypes inside supertypes notation, as specified by your instructor: An
international school of technology has hired you to create a database management system to
assist in scheduling classes. After several
Add the following to Figure 3-16: An EMPLOYMENT party relationship is further explained by
the positions and assignments to positions during the time a person is employed. A position is
defined by an organization unit, and a unit may define many positions over time. Over time,
positions are assigned to various employme
Emerging Electric wishes to create a database with the following entities and attributes: •
Customer, with attributes Customer ID, Name, Address (Street, City, State, Zip Code), and
Telephone • Location, with attributes Location ID, Address (Street, City, State, Zip Code),
and Type (values of Business or Resident
Briefly describe four typical problems that often arise in merging relations and common
techniques for addressing those problems.
Draw an ERD for the following situation. (State any assumptions you believe you have to make
in order to develop a complete diagram.) Also, draw a data model for this situation using the tool
you have been told to use in your course: The A. M. Honka School of Business operates
international business programs in 10 loca
The materials manager at Pine Valley Furniture Company maintains a list of suppliers for each
of the material items purchased by the company from outside vendors. Table 4-7 shows the
essential data required for this application. a. Draw a dependency diagram for this data. You may
assume the following: • Each materi
Draw an ERD for the following situation (Batra et al., 1988). Also, develop the list of words for
qualifiers and classes that you use to form attribute names. Explain why you chose the words on
your list. Also, draw a data model for this situation using the tool you have been told to use in
your course. Projects, Inc.
Examine the set of relations in Figure 4-39. What normal form are these in? How do you know
this? If they are in 3NF, convert the relations into an EER diagram. What assumptions did you
have to make to answer these questions?
Draw an ERD to represent what you have discovered. Identify a business rule in this description
and explain how this business rule is modeled on the E-R diagram. Also draw a data model for
this situation using the tool you have been told to use in your course. 2-46. Obtain several
common user views such as a credit car
Refer to your answer to Problem and Exercise 2-51 in Chapter 2. The description for DocIT
explained that there were to be data in the database about people who are not patients but are
related to patients. Also, it is possible for some staff members to be patients or to be related to
patients. And, some staff members h
For Problem and Exercise 4-50, draw the ER diagram based on the normalized relations.
For your answers to the following Problems and Exercises from prior chapters, transform the
EER diagrams into a set of relational schemas, diagram the functional dependencies, and convert
all the relations to third normal form. a. Chapter 3, Problem and Exercise 3-32 b. Chapter 3,
Problem and Exercise 3-37
Redo the enterprise data model you created in Chapter 1 to accommodate the information
gleaned from Alex Martin, Dale Dylan, and Sandy Wallis' e-mails.
Ask a database administrator or database or system analyst in a local company to show you an
EER (or E-R) diagram for one of the organization's primary databases. Does this organization
model have supertype/subtype relationships? If so, what notation is used, and does the CASE
tool the company uses support these relat
Contrast the following terms: a. Normal form; normalization b. Candidate key; primary key c.
Partial dependency; transitive dependency d. Composite key; recursive foreign key e.
Determinant; candidate key f. Foreign key; primary key g. Enterprise key; surrogate key
Refer to your answer to Problem and Exercise 2-44 in Chapter 2. Develop entity clusters for this
E-R diagram and redraw the diagram using the entity clusters. Explain why you chose the entity
clusters you used.
Draw an EER diagram for the following description of a law firm: Each case handled by the firm
has a unique case number; a date opened, date closed, and judgment description are also kept on
each case. A case is brought by one or more plaintiffs, and the same plaintiff may be involved in
many cases. A plaintiff has a
Give an example (other than those discussed in the chapter) of a supertype/subtype relationship.
Draw an ERD for each of the following situations. (If you believe that you need to make
additional assumptions, clearly state them for each situation.) Draw the same situation using the
tool you have been told to use in the course. a. A company has a number of employees. The
attributes of EMPLOYEE include Employee ID
Table 4-4 shows a relation called GRADE REPORT for a university. Your assignment is as
follows: a. Draw a relational schema and diagram the functional dependencies in the relation. b.
In what normal form is this relation? c. Decompose GRADE REPORT into a set of 3NF
relations. d. Draw a relational schema for your 3N
Table 4-5 shows a shipping manifest. Your assignment is as follows: a. Draw a relational schema
and diagram the functional dependencies in the relation. b. In what normal form is this relation?
c. Decompose MANIFEST into a set of 3NF relations. d. Draw a relational schema for your 3NF
relations and show the referen
For your answers to Problem and Exercise 3-33 from Chapter 3, transform the EER diagrams
into a set of relational schemas, diagram the functional dependencies, and convert all the
relations to third normal form.
Develop an EER model for the following situation, using the traditional EER notation, the Visio
notation, or the subtypes inside supertypes notation, as specified by your instructor: A
technology company provides offerings to its customers. Offerings are of two separate types:
products and services. Offerings are iden
Review your answer to Problem and Exercise 2-49; if necessary, change the names of the
entities, attributes, and relationships to conform to the naming guidelines presented in this
chapter. Then, using the definition guidelines, write a definition for each entity, attribute, and
relationship. If necessary, state assump
For a library, the entity type HOLDING has four subtypes: BOOK, AUDIO BOOK, DVD, and
SOFTWARE. Draw a separate EER diagram segment for each of the following situations: a. At
a given time, a holding must be exactly one of these subtypes. b. A holding may or may not be
one of these subtypes. However, a holding that is
Refer to the EER diagram for patients in Figure 3-3. Make any assumptions you believe are
necessary. Develop sample definitions for each entity type, attribute, and relationship in the
diagram.
In what ways is starting a data modeling project with a packaged data model different from
starting a data modeling project with a clean sheet of paper?
Add a subtype discriminator for each of the supertypes shown in Figure 3-10. Show the
discriminator values that assign instances to each subtype. Use the following subtype
discriminator names and values: a. PERSON: Person Type (Employee? Alumnus? Student?) b.
EMPLOYEE: Employee Type (Faculty, Staff) c. STUDENT: Stud
Add a subtype discriminator (named Person Type) to the diagram you created in Problem and
Exercise 2-29.
Figure 4-37 includes an EER diagram describing a publisher specializing in large edited works.
Transform the diagram into a relational schema that shows referential integrity constraints (see
Figure 4-5 for an example of such a schema). In addition, verify that the resulting relations are in
3NF.
In the chapter, when describing Figure 2-4a, it was argued that the Received and Summarizes
relationships and TREASURER entity were not necessary. Within the context of this
explanation, this is true. Now, consider a slightly different situation. Suppose it is necessary, for
compliance purposes (e.g., Sarbanes-Oxley co
Create an E-R diagram for FAME based on the enterprise data model you developed in 1-52.
Clearly state any assumptions you made in developing the diagram.
Give four reasons why a business rules approach is advocated as a new paradigm for specifying
information systems requirements.
Refer to your answer to Problem and Exercise 3-24. Develop entity clusters for this E-R diagram
and redraw the diagram using the entity clusters. Explain why you chose the entity clusters you
used.
Develop an EER model for the following situation using the traditional EER notation, the Visio
notation, or the subtypes inside supertypes notation, as specified by your instructor: Wally Los
Gatos and his partner Henry Chordate have formed a new limited partnership, Fin and Finicky
Security Consultants. Fin and Finic
Wally Los Gatos, owner of Wally's Wonderful World of Wallcoverings, Etc., has hired you as a
consultant to design a database management system for his new online marketplace for
wallpaper, draperies, and home decorating accessories. He would like to track sales, prospective
sales, and customers. Ultimately, he'd like t
Review Figure 2-8 and Figure 2-22. a. Identify any attributes in Figure 2-22 that might be
composite attributes but are not shown that way. Justify your suggestions. Redraw the ERD to
reflect any changes you suggest. b. Identify any attributes in Figure 2-22 that might be
multivalued attributes but are not shown that
Transform Figure 2-15a, attribute version, to 3NF relations. Transform Figure 2-15b,
relationship version, to 3NF relations. Compare these two sets of 3NF relations with those in
Figure 4-10. What observations and conclusions do you reach by comparing these different sets
of 3NF relations?
Modify Figure 2-lla to model the following additional information requirements: The training
director decides for each employee who completes each class who (what employees) should be
notified of the course completion. The training director needs to keep track of which employees
are notified about each course completio
Figure 4-38 includes an EER diagram for a medium-size software vendor. Transform the
diagram into a relational schema that shows referential integrity constraints (see Figure 4-5 for
an example of such a schema). In addition, verify that the resulting relations are in 3NF.
Describe the most common way in which relationships in an E-R diagram are expressed in a
corresponding relational data model.
Explain three conditions that suggest a surrogate key should be created for the primary key of a
relation.
Table 4-3 (page 196) contains sample data for parts and for vendors who supply those parts. In
discussing these data with users, we find that part numbers (but not descriptions) uniquely
identify parts and that vendor names uniquely identify vendors. a. Convert this table to a relation
(named PART SUPPLIER) in first n
After completing a course in database management, you are asked to develop a preliminary ERD
for a symphony orchestra. You discover the entity types that should be included as shown in
Table 2-3. During further discussions you discover the following: • A concert season
schedules one or more concerts. A particular c
Refer to Problem and Exercise 2-44 in Chapter 2, Part f. Redraw the ERD for your answer to this
exercise using appropriate supertypes and subtypes. In Exercise 2-44 Part f You may see various
additional capabilities for the VC database. However, in the final phase you will consider in this
exercise, you are to create
Figure 4-33 (page 196) shows an EER diagram for a simplified credit card environment. There
are two types of card accounts: debit cards and credit cards. Credit card accounts accumulate
charges with merchants. Each charge is identified by the date and time of the charge as well as
the primary keys of merchant and credi
Assume that at Pine Valley Furniture, each product (described by product number, description,
and cost) is composed of three components (described by component number, description, and
unit of measure), and components are used to make one or many products. In addition, assume
that components are used to make other comp
Use the narratives in Chapter 1 and above to identify the typical outputs (reports and displays)
the various stakeholders might want to retrieve from your database. Now, revisit the E-R
diagram you created in 2-60 to ensure that your model has captured the information necessary to
generate the outputs desired. Update y
Draw an EER diagram for the following situation: TomKat Entertainment is a chain of theaters
owned by former husband and wife actors/entertainers who, for some reason, can't get a job
performing anymore. The owners want a database to track what is playing or has played on each
screen in each theater of their chain at
Based on the EER diagram constructed for Problem and Exercise 3-34, develop a sample
definition for each entity type, attribute, and relationship in the diagram. Consultant There are
two types of consultants: business consultants and technical consultants. Business consultants are
contacted by a business in order to
The Public Safety office at Millennium College maintains a list of parking tickets issued to
vehicles parked illegally on the campus. Table 4-6 shows a portion of this list for the fall
semester. (Attribute names are abbreviated to conserve space.) a. Convert this table to a relation
in first normal form by entering a
Document your thought process around what changes you made to the model developed in
Chapter 2, 2-60, to accommodate the new information. Pay particular attention to what changes
you had to make to the original model to accommodate the need for supertype/subtype
relationships that emerged from the new information.
For each of the following relations, indicate the normal form for that relation. If the relation is
not in third normal form, decompose it into 3NF relations. Functional dependencies (other than
those implied by the primary key) are shown where appropriate. a. CLASSfCourseNo,
SectionNo) b. CLASSfCourseNo, SectionNo.
Transform the relational schema developed in Problem and Exercise 4-37 into an EER diagram.
State any assumptions that you have made.
Does a data modeling project using a packaged data model require less or greater skill than a
project not using a packaged data model? Why or why not?
Refer to the employee EER diagram in Figure 3-2. Make any assumptions that you believe are
necessary. Develop a sample definition for each entity type, attribute, and relationship in the
diagram.
How can data profiling be used during a data modeling project, especially one using a packaged
data model?
What are the benefits of enforcing the integrity constraints as part of the database design and
implementation process (instead of doing it in application design)?
Describe how the following components of an E-R diagram are transformed into relations: a.
Regular entity type b. Relationship (1:M) c. Relationship (M:N) d. Relationship
(supertype/subtype) e. Multivalued attribute f. Weak entity g. Composite attribute
A pet store currently uses a legacy flat file system to store all of its information. The owner of
the store, Peter Corona, wants to implement a Web-enabled database application. This would
enable branch stores to enter data regarding inventory levels, ordering, and so on. Presently, the
data for inventory and sales tr
For each of the following E-R diagrams from Chapter 2: I. Transform the diagram to a relational
schema that shows referential integrity constraints (see Figure 4-5 for an example of such a
schema): II. For each relation, diagram the functional dependencies (see Figure 4-23 for an
example). III. If any of the relatio
Table 4-8 shows a portion of a shipment table for a large manufacturing company. Each
shipment (identified by Shipment*) uniquely identifies the shipment Origin, Destination, and
Distance. The shipment Origin and Destination pair also uniquely identifies the Distance. a.
Develop a diagram that shows the functional dep
For your answers to the following Problems and Exercises from prior chapters, transform the
EER diagrams into a set of relational schemas, diagram the functional dependencies, and convert
all the relations to third normal form: a. Chapter 2, Problem and Exercise 2-37b b. Chapter 2,
Problem and Exercise 2-37g c. Chap
Each semester, each student must be assigned an adviser who counsels students about degree
requirements and helps students register for classes. Each student must register for classes with
the help of an adviser, but if the student's assigned adviser is not available, the student may
register with any adviser. We must
Describe the primary differences between the conceptual and logical data models.
Figure 4-36 includes an EER diagram describing a car racing league. Transform the diagram into
a relational schema that shows referential integrity constraints (see Figure 4-5 for an example of
such a schema). In addition, verify that the resulting relations are in 3NF. Figure 4-36
Figure 4-34 (page 197) shows an EER diagram for a restaurant, its tables, and the waiters and
waiting staff managers who work at the restaurant. Your assignment is to: a. Develop a relational
schema. b. Show the functional dependencies. c. Develop a set of 3NF relations using an
enterprise key.
Figure 3-13 shows the development of entity clusters for the Pine Valley Furniture E-R diagram.
In Figure 3-13b, explain the following: a. Why is the minimum cardinality next to the DOES
BUSINESS IN associative entity coming from CUSTOMER zero? b. What would be the
attributes of ITEM (refer to Figure 2-22)? c. What
For simplicity, subtype discriminators were left off many figures in this chapter. Add subtype
discriminator notation in each figure listed below. If necessary, create a new attribute for the
discriminator. a. Figure 3-2 b. Figure 3-3 c. Figure 3-4b d. Figure 3-7a e. Figure 3-7b
Virtual Campus (VC) is a social media firm that specializes in creating virtual meeting places for
students, faculty, staff, and others associated with different college campuses. VC was started as
a student project in a database class at Cyber University, an online polytechnic college, with
headquarters in a research
Give reasons that the page size in a virtual memory system should be neither very small nor very
large.
Consider a paged logical address space (composed of 32 pages of 2 KBytes each) mapped into a
1-MByte physical memory space. a. What is the format of the processor's logical address? b.
What is the length and width of the page table (disregarding the "access rights" bits)? c. What is
the effect on the page table if t
List three conditions that you can apply to determine whether a relation that is in first normal
form is also in second normal form.
For each of the following EER diagrams from Chapter 3: I. Transform the diagram into a
relational schema that shows referential integrity constraints (see Figure 4-5 for an example of
such a schema). II. For each relation, diagram the functional dependencies (see Figure 4-23 for
an example). III. If any of the relat
Suppose the program statement for (i = 1; i <= n; i++) a[i] = b[i] + c[i]; is executed in a memory
with page size of 1000 words. Let n = 100. Using a machine that has a full range of register-to-
register instructions and employs index registers, write a hypothetical program to implement the
foregoing statement. Then
Consider a 4-drive, 200GB-per-drive RAID array. What is the available data storage capacity for
each of the RAID levels, 0, 1, 3, 4, 5, and 6?
Consider a fixed partitioning scheme with equal-size partitions of 216 bytes and a total main
memory size of 224 bytes. A process table is maintained that includes a pointer to a partition for
each resident process. How many bits are required for the pointer?
Consider a reduced 7-bit IEEE floating-point format, with 3 bits for the exponent and 3 bits for
the significand. List all 127 values.
A DMA module is transferring characters to memory using cycle stealing, from a device
transmitting at 9600 bps. The processor is fetching instructions at the rate of 1 million
instructions per second (1 MIPS). By how much will the processor be slowed down due to the
DMA activity?
What differences between a CD and a DVD account for the larger capacity of the latter?
Assume a task is divided into four equal-sized segments and that the system builds an eight-entry
page descriptor table for each segment. Thus, the system has a combination of segmentation and
paging. Assume also that the page size is 2 KBytes. a. What is the maximum size of each
segment? b. What is the maximum logic
Divide -145 by 13 in binary twos complement notation, using 12-bit words. Use the algorithm
described in Section 9.3.
Consider a microprocessor that has a block I/O transfer instruction such as that found on the
Z8000. Following its first execution, such an instruction takes five clock cycles to re-execute.
However, if we employ a non blocking I/O instruction, it takes a total of 20 clock cycles for
fetching and execution. Calculate t
Use the Booth algorithm to multiply 23 (multiplicand) by 29 (multiplier), where each number is
represented using 6 bits.
Let 5BCA0000 be a floating-point number in IBM format, expressed in hexadecimal. What is the
decimal value of the number?
Consider a system employing interrupt-driven I/O for a particular device that transfers data at an
average of 8 KB/s on a continuous basis. a. Assume that interrupt processing takes about 100 μs
(i.e., the time to jump to the interrupt service routine (ISR), execute it, and return to the main
program). Determine what
The following sequence of virtual page numbers is encountered in the course of execution on a
computer with virtual memory: 3 4 2 6 4 7 1 3 2 6 3 5 1 2 3 Assume that a least recently used
page replacement policy is adopted. Plot a graph of page hit ratio (fraction of page references in
which the page is in main memor
The twos complement integer division algorithm described in Section 9.3 is known as the
restoring method because the value in the A register must be restored following unsuccessful
subtraction. A slightly more complex approach, known as non restoring, avoids the unnecessary
subtraction and addition. Propose an algorith
A DMA controller serves four receive-only telecommunication links (one per DMA channel)
having a speed of 64 Kbps each. a. Would you operate the controller in burst mode or in cycle-
stealing mode? b. What priority scheme would you employ for service of the DMA channels?
Express the following numbers in IBM's 32-bit floating-point format, which uses a 7-bit
exponent with an implied base of 16 and an exponent bias of 64 (40 hexadecimal).A normalized
floating-point number requires that the leftmost hexadecimal digit be nonzero; the implied radix
point is to the left of that digit.
A similar instruction format is used in the Zilog Z8000 microprocessor family. In this case, there
is a direct port addressing capability, in which a 16-bit port address is part of the instruction, and
an indirect port addressing capability, in which the instruction references one of the 16-bit
general purpose register
Consider a magnetic disk drive with 8 surfaces, 512 tracks per surface, and 64 sectors per track.
Sector size is 1 KB. The average seek time is 8 ms, the track-to-track access time is 1.5 ms, and
the drive rotates at 3600 rpm. Successive tracks in a cylinder can be read without head
movement. a. What is the disk capac
Explain the difference between a simple CAV system and a multiple zoned recording system.
Numerical values A and B are stored in the computer as approximations A′ and B′.
Neglecting any further truncation or round off errors, show that the relative error of the product
is approximately the sum of the relative errors in the factors.
On a typical microprocessor, a distinct I/O address is used to refer to the I/O data registers and a
distinct address for the control and status registers in an I/O controller for a given device. Such
registers are referred to as ports. In the Intel 8088, two I/O instruction formats are used. In one
format, the 8-bit o
Consider a computer system with both segmentation and paging. When a segment is in memory,
some words are wasted on the last page. In addition, for a segment size s and a page size p, there
are s/p page table entries. The smaller the page size, the less waste in the last page of the
segment, but the larger the page tab
What would be the bias value for a. A base-2 exponent (B = 2) in a 6-bit field? b. A base-8
exponent (B = 8) in a 7-bit field?
What are the differences among positive overflow, exponent overflow, and significand
overflow?
Find the following differences using twos complement arithmetic: a. 111000 -110011 b.
11001100 - 101110 c. 111100001111 -110011110011 d. 11000011 -11101000
One of the most serious errors in computer calculations occurs when two nearly equal numbers
are subtracted. Consider A = 0.22288 and B = 0.22211. The computer truncates all values to four
decimal digits. Thus A′ = 0.2228 and B′ = 0.2221. a. What are the relative errors for A′
and B′? b. What is the relative
In virtually all systems that include DMA modules, DMA access to main memory is given higher
priority than CPU access to main memory. Why?
In the context of RAID, what is the distinction between parallel access and independent access?
In Section 7.3, one advantage and one disadvantage of memory-mapped I/O, compared with
isolated I/O, were listed. List two more advantages and two more disadvantages.
Design a backup strategy for a computer system. One option is to use plug-in external disks,
which cost $150 for each 500 GB drive. Another option is to buy a tape drive for $2500, and 400
GB tapes for $50 apiece. (These were realistic prices in 2008.) A typical backup strategy is to
have two sets of backup media onsit
Assume numbers are represented in 8-bit twos complement representation. Show the calculation
of the following: a. 6 + 13 b. -6 + 13 c. 6 - 13 d. -6 - 13
It should be clear that disk striping can improve data transfer rate when the strip size is small
compared to the I/O request size. It should also be clear that RAID 0 provides improved
performance relative to a single large disk, because multiple I/O requests can be handled in
parallel. However, in this latter case, i
Define the terms seek time, rotational delay, access time, and transfer time.
The text mentions that a 32-bit format can represent a maximum of 232 different numbers. How
many different numbers can be represented in the IEEE 32-bit format? Explain.
Draw a figure similar to Figure 8.23 for ARM virtual memory translation when main memory is
divided into sections.
Is the following a valid alternative definition of overflow in twos complement arithmetic? If the
exclusive-OR of the carry bits into and out of the leftmost column is 1, then there is an overflow
condition. Otherwise, there is not.
In the VAX computer, user page tables are located at virtual addresses in the system space. What
is the advantage of having user page tables in virtual rather than main memory? What is the
disadvantage?
What is the difference between the twos complement representation of a number and the twos
complement of a number?
Assume that in the system of the preceding problem, a memory cycle takes 750 ns. To what
value could we reduce the clocking rate of the bus without effect on the attainable data transfer
rate?
Suppose that we have a multi programmed computer in which each job has identical
characteristics. In one computation period, T, for a job, half the time is spent in I/O and the other
half in processor activity. Each job runs for a total of N periods. Assume that a simple round-
robin priority is used, and that I/O opera
Draw a number line similar to that in Figure 9.19b for the floating-point format of Figure 9.21b.
Represent the following decimal numbers in both binary sign/magnitude and twos complement
using 16 bits: +512; -29.
For a compact disk, audio is converted to digital with 16-bit samples, and is treated a stream of
8-bit bytes for storage. One simple scheme for storing this data, called direct recording, would be
to represent a 1 by a land and a 0 by a pit. Instead, each byte is expanded into a 14-bit binary
number. It turns out that
Consider a disk that rotates at 3600 rpm. The seek time to move the head between adjacent tracks
is 2 ms. There are 32 sectors per track, which are stored in linear order from sector 0 through
sector 31.The head sees the sectors in ascending order. Assume the read/write head is positioned
at the start of sector 1 on tr
Prove that the multiplication of two n-digit numbers in base B gives a product of no more than
2n digits.
Consider a floating-point format with 8 bits for the biased exponent and 23 bits for the
significand. Show the bit pattern for the following numbers in this format: a. -720 b. 0.645
Express the following numbers in IEEE 32-bit floating-point format: a. -5 b. -6 c. -1.5 d. 384 e.
1/16 f. -1/32
For each of the ARM virtual address formats shown in Figure 8.24, show the physical address
format.
Assume that one 16-bit and two 8-bit microprocessors are to be interfaced to a system bus. The
following details are given: 1. All microprocessors have the hardware features necessary for any
type of data transfer: programmed I/O, interrupt-driven I/O, and DMA. 2. All microprocessors
have a 16-bit address bus. 3. Tw
Consider a disk with N tracks numbered from 0 to (N - 1) and assume that requested sectors are
distributed randomly and evenly over the disk. We want to calculate the average number of
tracks traversed by a seek. a. First, calculate the probability of a seek of length j when the head is
currently positioned over track
A computer has a cache, main memory, and a disk used for virtual memory. If a referenced word
is in the cache, 20 ns are required to access it. If it is in main memory but not in the cache, 60 ns
are needed to load it into the cache, and then the reference is started again. If the word is not in
main memory, 12 ms are
When people speak about inaccuracy in floating-point arithmetic, they often ascribe errors to
cancellation that occurs during the subtraction of nearly equal quantities. But when X and Y are
approximately equal, the difference X - Y is obtained exactly, with no error. What do these
people really mean?
A computer consists of a processor and an I/O device D connected to main memory M via a
shared bus with a data bus width of one word. The processor can execute a maximum of 106
instructions per second. An average instruction requires five machine cycles, three of which use
the memory bus. A memory read or write operati
Consider a dynamic partitioning scheme. Show that, on average, the memory contains half as
many holes as segments.
Consider a system in which bus cycles takes 500 ns. Transfer of bus control in either direction,
from processor to I/O device or vice versa, takes 250 ns. One of the I/O devices has a data
transfer rate of 50 KB/s and employs DMA. Data are transferred one byte at a time. a. Suppose
we employ DMA in a burst mode. That
A system is based on an 8-bit microprocessor and has two I/O devices. The I/O controllers for
this system use separate control and status registers. Both devices handle data on a 1-byte-at-a-
time basis. The first device has two status lines and three control lines. The second device has
three status lines and four cont
If A = 1.427, find the relative error if A is truncated to 1.42 and if it is rounded to 1.43.
In IBM's mainframe operating system, OS/390, one of the major modules in the kernel is the
System Resource Manager (SRM). This module is responsible for the allocation of resources
among address spaces (processes). The SRM gives OS/390 a degree of sophistication unique
among operating systems. No other mainframe OS, an
A data source produces 7-bit IRA characters, to each of which is appended a parity bit. Derive an
expression for the maximum effective data rate (rate of IRA data bits) over an R-bps line for the
following: a. Asynchronous transmission, with a 1.5-unit stop bit b. Bit-synchronous
transmission, with a frame consisting
Briefly explain the following representations: sign magnitude, twos complement, biased.
The IBM System/370 architecture uses a two-level memory structure and refers to the two levels
as segments and pages, although the segmentation approach lacks many of the features described
earlier in this chapter. For the basic 370 architecture, the page size may be either 2 Kbytes or 4
Kbytes, and the segment size is
The following numbers use the IEEE 32-bit floating-point format. What is the equivalent
decimal value? a. 1 10000011 11000000000000000000000 b. 0 01111110
10100000000000000000000 c. 0 10000000 00000000000000000000000
For programmed I/O, Figure 7.5 indicates that the processor is stuck in a wait loop doing status
checking of an I/O device. To increase efficiency, the I/O software could be written so that the
processor periodically checks the status of the device. If the device is not ready, the processor
can jump to other tasks. Aft
Suppose the page table for the process currently executing on the processor looks like the
following. All numbers are decimal, everything is numbered starting from zero, and all addresses
are memory byte addresses. The page size is 1024 bytes. a. Describe exactly how, in general, a
virtual address generated by the CPU
An I/O-bound program is one that, if run alone, would spend more time waiting for I/O than
using the processor. A processor-bound program is the opposite. Suppose a short-term
scheduling algorithm favors those programs that have used little processor time in the recent
past. Explain why this algorithm favors I/O-bound
Examination of the timing diagram of the 8237A indicates that once a block transfer begins, it
takes three bus clock cycles per DMA cycle. During the DMA cycle, the 8237A transfers one
byte of information between memory and I/O device. a. Suppose we clock the 8237A at a rate of
5 MHz. How long does it take to transfer
If we treat 2 twos complement numbers as unsigned integers for purposes of addition, the result
is correct if interpreted as a twos complement number. This is not true for multiplication. Why?
Any floating-point representation used in a computer can represent only certain real numbers
exactly; all others must be approximated. If A′ is the stored value approximating the real value
A, then the relative error, r, is expressed as r = A - A′/A Represent the decimal quantity +0.4
in the following floating-po
Consider a single-platter disk with the following parameters: rotation speed: 7200 rpm; number
of tracks on one side of platter: 30,000; number of sectors per track: 600; seek time: one ms for
every hundred tracks traversed. Let the disk receive a request to access a random sector on a
random track and assume the disk
A distinction is made between physical records and logical records. A logical record is a
collection of related data elements treated as a conceptual unit, independent of how or where the
information is stored. A physical record is a contiguous area of storage space that is defined by
the characteristics of the storage
A 32-bit computer has two selector channels and one multiplexor channel. Each selector channel
supports two magnetic disk and two magnetic tape units. The multiplexor channel has two line
printers, two card readers, and 10 VDT terminals connected to it. Assume the following transfer
rates: Disk drive .................
A program computes the row sums of an array A that is 100 by 100. Assume that the computer
uses demand paging with a page size of 1000 words, and that the amount of main memory
allotted for data is five page frames. Is there any difference in the page fault rate if A were stored
in virtual memory by rows or columns? E
Robots can be used in manufacturing and assembly operations that require accurate, fast, and
versatile manipulation [10, 11]. The open-loop transfer function of a direct-drive arm may be
approximated by G(s)H(s) = K(s + 10) / s(s + 3)(s2 + 4s + 8). (a) Determine the value of gain K
when the system oscillates. (b) Ca
A very interesting and useful velocity control system has been designed for a wheelchair control
system. We want to enable people paralyzed from the neck down to drive themselves in
motorized wheelchairs. A proposed system utilizing velocity sensors mounted in a headgear is
shown in Figure P6.8.The headgear sensor prov
a. Consider a fixed-point representation using decimal digits, in which the implied radix point
can be in any position (e.g., to the right of the least significant digit, to the right of the most
significant digit, and so on). How many decimal digits are needed to represent the
approximations of both Planck's constant
Given x = 0101 and y = 1010 in twos complement notation (i.e., x = 5, y = -6), compute the
product p = x × y with Booth's algorithm.
A unity feedback system has a loop transfer function (a) Determine the angle of departure of the
root locus at the complex poles. (b) Sketch the root locus. (c) Determine the gain K when the
roots are on the jω-axis and determine the location of these roots.
The elevator in Yokohama's 70-story Landmark Tower operates at a peak speed of 45 km/hr. To
reach such a speed without inducing discomfort in passengers, the elevator accelerates for longer
periods, rather than more precipitously. Going up, it reaches full speed only at the 27th floor; it
begins decelerating 15 floors
Utilizing the Routh-Hurwitz criterion, determine the stability of the following polynomials: (a)
s2 + 5s + 2 (b) s3 + 4s2 + 8s + 4 (c) s3 + 2s2 - 6s + 20 (d) s4 + s3 + 2s2 + 12s + 10 (e) s4 + s3 +
3s2 + 2s + X (f) s5 + s4 + 2s3 + s + 6 (g) s5 + s4 + 2s3 + s2 + s + K Determine the number of
roots, if any, in the
A precision speed control system (Figure P7.12) is required for a platform used in gyroscope and
inertial system testing where a variety of closely controlled speeds is necessary. A direct-drive
DC torque motor system was utilized to provide (1) a speed range of 0.01°/s to 600°/s, and
(2) 0.1% steady-state error maxi
Determine the root sensitivity of the dominant roots of the power system of Problem P7.7.
Evaluate the sensitivity for variations of (a) The poles at s = -4, and (b) The feedback gain, 1/R.
A closed-loop feedback system is shown in Figure E7.25. For what range of values of the
parameters K is the system stable? Sketch the root locus as 0 < K < ∞. FIGURE E7.25 Non
unity feedback system with parameter K.
A system has the characteristic equation q(s) = s3 + 10s2 + 29s + K = 0. Shift the vertical axis to
the right by 2 by using s = sn - 2, and determine the value of gain K so that the complex roots are
s = -2 ± j.
Arc welding is one of the most important areas of application for industrial robots [11]. In most
manufacturing welding situations, uncertainties in dimensions of the part, geometry of the joint,
and the welding process itself require the use of sensors for maintaining weld quality. Several
systems use a vision system
A personal vertical take-off and landing (VTOL) aircraft is shown in Figure P6.20(a). A possible
control system for aircraft altitude is shown in Figure P6.20(b). (a) For K = 6, determine whether
the system is stable. (b) Determine a range of stability, if any, for K > 0. Figure P6.20 (a)
Personal VTOL aircraft. (
A feedback control system is shown in Figure P7.18. The filter Gc(s) is often called a
compensator, and the design problem involves selecting the parameters α and β. Using the root
locus method, determine the effect of varying the parameters. Select a suitable filter so that the
time to settle (to within 2% of the fi
The stability of a motorcycle and rider is an important area for study because many motorcycle
designs result in vehicles that are difficult to control [12, 13]. The handling characteristics of a
motorcycle must include a model of the rider as well as one of the vehicle. The dynamics of one
motorcycle and rider can be
Determine the root sensitivity for the dominant roots of the design for Problem P7.18 for the gain
K = 4α/β and the pole s = -2.
The loop transfer function of a single-loop negative feedback system is This system is called
conditionally stable because it is stable only for a range of the gain K such that k1 < K < k2.
Using the Routh-Hurwitz criteria and the root locus method, determine the range of the gain for
which the system is stable. Sketc
Consider the single-input, single-output system as described by x(t) = Ax(t) + Bu(t) y(t) = Cx(t)
where Assume that the input is a linear combination of the states, that is, u(t) = -Kx(t) + r(t),
where r(t) is the reference input. The matrix K = [K1 K2] is known as the gain matrix. If you
substitute u(t) into the
The linear model of a phase detector was presented in Problem P6.7. Sketch the root locus as a
function of the gain Kv = KaK. Determine the value of Kv attained if the complex roots have a
damping ratio equal to 0.60 [13].
A teleported control system incorporates both a person (operator) and a remote machine. The
normal teleportation system is based on a one-way link to the machine and limited feedback to
the operator. However, two-way coupling using bilateral information exchange enables better
operation [18]. In the case of remote cont
An antenna control system was analyzed in Problem P4.5, and it was determined that, to reduce
the effect of wind disturbances, the gain of the magnetic amplifier, ka, should be as large as
possible. (a) Determine the limiting value of gain for maintaining a stable system. (b) We want to
have a system settling time eq
A high-performance missile for launching a satellite has a unity feedback system with a loop
transfer function Sketch the root locus as K varies from 0 < K < ∞.
Consider the closed-loop system in Figure AP6.5. Suppose that all gains are positive, that is, K1
> 0, K2 > 0, K3 > 0, K4 > 0, and K5 > 0. (a) Determine the closed-loop transfer function T(s) =
Y(s)/R(s). (b) Obtain the conditions on selecting the gains K1, K2, K3, X4, and K5, so that the
closed-loop system is guaran
A spacecraft with a camera is shown in Figure AP6.6(a).The camera slews about 16° in a
canted plane relative to the base. Reaction jets stabilize the base against the reaction torques from
the slewing motors. Suppose that the rotational speed control for the camera slewing has a plant
transfer function G(s) = 1 / (s
The control of the spark ignition of an automotive engine requires constant performance over a
wide range of parameters [15]. The control system is shown in Figure DP6.1, with a controller
gain K to be selected. The parameter p is equal to 2 for many autos but can equal zero for those
with high performance. Select a ga
A unity-feedback control system is shown in Figure P6.6. Determine the relative stability of the
system with the following transfer functions by locating the complex roots in the s-plane: (a)
Gc(s)G(s) = 10s + 2/s2(s + 1) (b) Gc(s)G(s) = 24/s(s3 + 10s2 + 35s + 50) (c) Gc(s)G(s) = (s + 2)
(s + 3)/s(s + 4)(s + 6) Figu
A closed-loop feedback system is shown in Figure E6.25. For what range of values of the
parameters K and p is the system stable?
Consider a unity feedback system with L(s) = Gc(s)G(s) = K(s + 1) / s2 + 4s + 5 (a) Find the
angle of departure of the root locus from the complex poles. (b) Find the entry point for the root
locus as it enters the real axis.
New concepts in passenger airliner design will have the range to cross the Pacific in a single
flight and the efficiency to make it economical [16. 29]. These new designs will require the use
of temperature-resistant, lightweight materials and advanced control systems. Noise control is an
important issue in modern airc
A system has a closed-loop transfer function T(s) = 1 / s3 + 5s2 + 20s + 6. (a) Determine whether
the system is stable. (b) Determine the roots of the characteristic equation. (c) Plot the response
of the system to a unit step input.
A feedback control sys tern is shown in Figure P6.4. The controller and process transfer
functions are given by Gc(s) = K and G(s) = s + 40 / s(s + 10) and the feedback transfer function
is H(s) = l/(s + 20). (a) Determine the limiting value of gain K for a stable system. (b) For the
gain that results in marginal s
A control system, as shown in Figure E7.17, has a process G(s) = 1 / s(s - 1). (a) When Gc(s) =
K, show that the system is always unstable by sketching the root locus. (b) When Gc(s) K(s +
2) / s + 20, sketch the root locus and determine the range of K for which the system is stable.
Determine the value of K and t
(a) Plot the root locus for a unity feedback system with loop transfer function (b) Calculate the
range of K for which the system is stable. (c) Predict the steady-state error of the system for a
ramp input.
Consider the closed-loop transfer function T(s) = 1 / s5 + 2s4 + 2s3 + 4s2 + s + 2. (a) Using the
Routh-Hurwitz method, determine whether the system is stable. If it is not stable, how many
poles are in the right half-plane? (b) Compute the poles of T(s) and verify the result in part (a).
(c) Plot the unit step res
The attitude control system of a space shuttle rocket is shown in Figure DP6.4 [17]. (a)
Determine the range of gain K and parameter m so that the system is stable, and plot the region
of stability. (b) Select the gain and parameter values so that the steady-state error to a ramp input
is less than or equal to 10% of
The capstan drive system of problem CDP5.1 uses the amplifier as the controller. Determine the
maximum value of the gain Ka before the system becomes unstable.
A unity feedback system has a loop transfer function (a) Sketch the root locus for K > 0. (b) Find
the roots when K = 10 and 20. (c) Compute the rise time, percent overshoot, and settling time
(with a 2% criterion) of the system for a unit step input when K = 10 and 20.
Consider the single-input, single-output system is described by x(t) = Ax(t) + Bu(t) y(t) = Cx(t)
where Compute the characteristic polynomial and plot the root locus as 0 ≤ K < ∞. For what
values of K is the system stable?
A unity feedback system has a loop transfer function (a) Draw the root locus as z varies from 0
to 100. (b) Using the root locus, estimate the percent overshoot and settling time (with a 2%
criterion) of the system at z = 0.6, 2, and 4 for a step input. (c) Determine the actual overshoot
and settling time at z = 0.6
Consider the case of a navy pilot landing an aircraft on an aircraft carrier. The pilot has three
basic tasks. The first task is guiding the aircraft's approach to the ship along the extended
centerline of the runway. The second task is maintaining the aircraft on the correct glidesiope.
The third task is maintaining t
The goal of vertical takeoff and landing (VTOL) aircraft is to achieve operation from relatively
small airports and yet operate as a normal aircraft in level flight [16]. An aircraft taking off in a
form similar to a missile (on end) is inherently unstable. A control system using adjustable jets
can control the vehicle
The linear model of a phase detector (phase-lock loop) can be represented by Figure P6.7 [9].The
phase-lock systems are designed to maintain zero difference in phase between the input carrier
signal and a local voltage-controlled oscillator. Phase-lock loops find application in color
television, missile tracking, and s
Consider the feedback control system in Figure CP6.8. (a) Using the Routh-Hurwitz method,
determine the range of K1 resulting in closed-loop stability. (b) Develop an m-file to plot the
pole locations as a function of 0 < K1 < 30 and comment on the results. Figure CP6.8 Non unity
feedback system with parameter K1.
For the feedback system of Exercise E6.5, find the value of K when two roots lie on the
imaginary axis. Determine the value of the three roots.
A control system for an automobile suspension tester has negative unity feedback and a process
[12] L(s) = Gc(s)G(s) = K(s2 + 4s + 8) / s2(s + 4) We desire the dominant roots to have a ζ
equal to 0.5. Using the root locus, show that K = 7.35 is required and the dominant roots are s =
-1.3 ± j2.2.
Sketch the root locus for a unity feedback system with (a) Find the gain when all three roots are
real and equal. (b) Find the roots when all the roots are equal as in part (a).
Consider the system in Figure P6.13. Determine the conditions on K, p, and z that must be
satisfied for closed-loop stability. Assume that K > 0, ζ > 0, and ωn > 0. Figure P6.13 Control
system with controller with three parameters K, p, and z.
Consider the feedback control system in Figure CP6.6. Using the for function, develop an m-file
script to compute the closed-loop transfer function poles for 0 ≤ K ≤ 5 and plot the results
denoting the poles with the "X" symbol. Determine the maximum range of K for stability with
the Routh-Hurwitz method. Compute t
Consider the system described in state variable form by x(t) = Ax(t) + Bu(t) y(t) = Cx(t) where
and where k1 ≠k2 and both k1 and k2 are real numbers. (a) Compute the state transition
matrix Φ(t, 0). (b) Compute the eigenvalues of the system matrix A. (c) Compute the roots of the
characteristic polynomial. (
Determine the relative stability of the systems with the following characteristic equations (1) by
shifting the axis in the s-plane and using the Routh-Hurwitz criterion, and (2) by determining the
location of the complex roots in the s-plane: (a) s3 + 3s2 + 4s + 2 = 0. (b) s4 + 9s3 + 30s2 + 42s
+ 20 = 0. (c) s3 + 1
A human's ability to perform physical tasks is limited not by intellect but by physical strength. If,
in an appropriate environment, a machine's mechanical power is closely integrated with a human
arm's mechanical strength under the control of the human intellect, the resulting system will be
superior to a loosely inte
Control systems for maintaining constant tension on strip steel in a hot strip finishing mill are
called "loopers." A typical system is shown in Figure P7.16. The looper is an arm 2 to 3 feet long
with a roller on the end; it is raised and pressed against the strip by a motor [18]. The typical
speed of the strip passin
Consider a unity feedback system with a loop transfer function (a) Find the breakaway points on
the real axis. (b) Find the asymptote centroid. (c) Find the values of K at the breakaway points.
A unity feedback system has a loop transfer function L(s) = K / (s + l)(s + 3)(s + 6), where K =
20. Find the roots of the closed-loop system's characteristic equation.
Consider again the vibration absorber discussed in Problems 2.2 and 2.10 as a design problem.
Using the root locus method, determine the effect of the parameters M2 and k12. Determine the
specific values of the parameters M2 and k12 so that the mass M1 does not vibrate when F(t) = a
sin(ω0t). Assume that M1 = l, k1 =
A system has a characteristic equation s3 + 2s2 + (K + 1)s + 8 = 0. Find the range of K for a
stable system.
Let us consider a device that consists of a ball rolling on the inside rim of a hoop [11]. This
model is similar to the problem of liquid fuel sloshing in a rocket. The hoop is free to rotate
about its horizontal principal axis as shown in Figure E7.1. The angular position of the hoop may
be controlled via the torque T
A system has the third-order characteristic equation s3 + as2 + bs + c = 0, where a, b, and c are
constant parameters. Determine the necessary and sufficient conditions for the system to be
stable. Is it possible to determine stability of the system by just inspecting the coefficients of the
characteristic equation?
Consider the system represented in state variable form x = Ax + Bu y = Cx + Du, where (a) What
is the system transfer function? (b) For what values of k is the system stable?
Consider the case of rabbits and foxes in Australia. The number of rabbits is x1 and if left alone,
it would grow indefinitely (until the food supply was exhausted) so that x1 = kx1. However, with
foxes present on the continent, we have x1 = kx1 - ax2, where x2 is the number of foxes. Now, if
the foxes must have ra
A control system has the structure shown in Figure E6.4. Determine the gain at which the system
will become unstable. Figure E6.4 Feedforward system.
Sketch the root locus for the following loop transfer functions of the system shown in Figure
P7.1 when 0 < K < ∞: (a) (b) (c) (d) Figure P7.1
A system is represented by Equation (6.22) where Find the range of k where the system is stable.
The world's largest telescope is located in Hawaii. The primary mirror has a diameter of 10 m
and consists of a mosaic of 36 hexagonal segments with the orientation of each segment actively
controlled. This unity feedback system for the mirror segments has the loop transfer function (a)
Find the asymptotes and draw th
Consider the feedback system shown in Figure DP6.8.The process transfer function is marginally
stable. The controller is the proportional-derivative (PD) controller Gc(s) = KP + KDs.
Determine if it is possible to find values of KP and KD such that the closed-loop system is
stable. If so, obtain values of the control
A negative feedback system has a loop transfer function L(s) = K(s + 2) / s(s - 1). (a) Find the
value of the gain when the ζ of the closed-loop roots is equal to 0.707. (b) Find the value of the
gain when the closed-loop system has two roots on the imaginary axis.
A control system is shown in Figure AP6.3. We want the system to be stable and the steady-state
error for a unit step input to be less than or equal to 0.05 (5%). (a) Determine the range of α that
satisfies the error requirement. (b) Determine the range of α that satisfies the stability
requirement. (c) Select an
A unity feedback system has a loop transfer function Sketch the root locus. Determine the gain K
when the complex roots of the characteristic equation have a ζ approximately equal to 0.66.
A unity feedback system has the loop transfer function (a) Find the breakaway point on the real
axis and the gain for this point. (b) Find the gain to provide two complex roots nearest the jω-
axis with a damping ratio of 0.707. (c) Are the two roots of part (b) dominant? (d) Determine the
settling time (with a 2%
A traffic control system is designed to control the distance between vehicles, as shown in Figure
DP6.5 [15]. (a) Determine the range of gain K for which the system is stable. (b) If Km is the
maximum value of K so that the characteristic roots are on the yω-axis, then let K = Km/N,
where 6 < N < 7. We want the peak
A feedback control system has a characteristic equation s6 + 2s5 + 12s4 + 4s3 + 21s2 + 2s + 10
= 0. Determine whether the system is stable, and determine the values of the roots.
A unity negative feedback system has the loop transfer function Gc(s)G(s) = s + 1 / s3 + 4s2 + 6s
+ 10. Develop an m-file to determine the closed-loop transfer function and show that the roots of
the characteristic equation are s1 = -2.89 and s2,3 = -0.55 ± j1.87.
A closed-loop negative unity feedback system is used to control the yaw of the A-6 Intruder
attack jet. When the loop transfer function is determine (a) the root locus breakaway point and
(b) the value of the roots on the jω-axis and the gain required for those roots. Sketch the root
locus.
A unity feedback system has a loop transfer function (a) Determine the range of K for stability.
(b) Sketch the root locus. (c) Determine the maximum ζ of the stable complex roots.
Consider the unity feedback system in Figure E7.27. Sketch the root locus as 0 ≤ p < ∞.
Figure E7.27 Unity feedback system with parameter p.
A robot force control system with unity feedback has a loop transfer function [6] (a) Find the
gain K that results in dominant roots with a damping ratio of 0.707. Sketch the root locus. (b)
Find the actual percent overshoot and peak time for the gain K of part (a).
A "paper-pilot" model is sometimes utilized in aircraft control design and analysis to represent
the pilot in the loop. A block diagram of an aircraft with a pilot "in the loop" is shown in Figure
CP6.5. The variable Ñ‚ represents the pilot's time delay. We can represent a slower pilot with
Ñ‚ = 0.6 and a faster pilot
A bottle-filling line uses a feeder screw mechanism, as shown in Figure AP6.4. The tachometer
feedback is used to maintain accurate speed control. Determine and plot the range of K and p that
permits stable operation. Figure AP6.4 Speed control of a bottle-filling line. (a) System layout.
(b) Block diagram.