Download Errata1

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Knapsack problem wikipedia , lookup

Computational complexity theory wikipedia , lookup

Scheduling (computing) wikipedia , lookup

Multiple-criteria decision analysis wikipedia , lookup

Transcript
Errata (Last Updated: 1/5/2015)
(Notation: “pg” indicated page, “ln” indicates line, negative line number means count
from the bottom up)
pg 7, fig 1-4
replace: fl
with:
f1
(i.e., the number “1” rather than lower case letter “l”)
pg 8, ln 8
replace: presence
with:
the presence
pg 47, ln –3
replace: terminated
with:
terminate
pg 61, ln 9
replace: pi:
with:
p2:
pg 62, ln 9
replace: five functions
with:
five function
pg 65, ln –10
replace: project
with:
process
pg 72, fig 3-1(a)
replace: x_is_positive.wait
with:
X_is_positive.wait
(3 times)
pg 72, fig 3-1(a)
replace: p1
with:
p
(2 times)
pg 72, fig 3-1(b)
replace: p2
with:
q
pg 72, fig 3-1(b)
replace: p1
with:
p
pg 75, ln 18
replace: because of a
with:
because a
pg 83, ln 6
replace: standard input
with:
standard output
pg 83, ln 7
replace: standard output
with:
standard input
pg 92, ln –9
replace: (i+1)%5
with:
i%5+1
pg 99, ln 19, 20, –16
replace: (i+1)%5
with:
i%5+1
pg 104, ln –5
replace: (subscript) a
with:
(subscript) p1
(six times)
replace: (subscript) b
with:
(subscript) p2
(two times)
replace: (subscript) c
with:
(subscript) p3
(six times)
pg 104, ln –4
replace: (e) Assume another message was sent from process c to process a
with:
(b) Assume another message was sent from process p3 to process p1
pg 104, ln –3
replace: 10 according to c’s clock and received at time 2 according to a’s
with:
8 according to p3’s clock and received at time 2 according to p1’s
pg 119, Figure 4-7
add an arrow labeled “p” from p6 to p3
pg 158, ln –5
replace: Thus p2 will
with: Thus p1 will
pg 161, Figure 5-5
replace: SJN
with: SJF
pg 168, ln –11
replace: p2
with:
p3
pg 174, ln –15 and ln –9
replace: four
with:
three
pg 188, fig 6-5(c)
replace: p4
with: p5
(last line of figure)
pg 208, ln –15
replace: references are kept is
with: references are kept in
pg 210, ln 16:
replace: eternal
with:
external
pg 219, ln –9:
replace: H[1]
with:
H[0]
pg 232, ln –7
replace: ever instruction
with:
every instruction
pg 243, ln 9
replace: of 1 KB each
with:
of 4 KB each
pg 246, ln –2:
replace: advantage
with
advantages
pg 251, ln 9
replace: most recently loaded page, P[k]. On a page fault, page P[k+1 % m] is replaced
with:
least recently loaded page, P[k]. On a page fault, page P[k] is replaced
pg 255, ln 2 and ln 14
replace: second-chance
with:
third-chance
pg 262, ln 3
replace: set gradual
with:
set is gradual
pg 309, ln 2
replace: into this function
with: into this table
pg 311, ln 10
replace: can read
with:
can be read
pg 368, Figure 11-3(b)
replace: 34, 35, 36, 37, 38, … 52, 53, 54, 55, 56
with: 36, 37, 38, 39, 40, … 54, 55, 56, 57, 58
pg 371, ln –8
replace: 18.96 MB
with:
18.286 MB
pg 371, ln –18
replace: 0.66 GB
with:
0.64 GB
pg 371, ln –19
replace: 681,984
with:
681,984,000
pg 389 ln 16
replace: read pointer
with:
rear pointer
pg 430, ln 17
replace: where P is
with:
where DEA is the data encryption algorithm, P is
Part 5: Programming Projects
pg 484, ln –19
replace: ’allocated;’
with: ’allocated’;
pg 484, ln –18
replace: r;)
with:
r);
pg 484, ln –16
replace: ’blocked;’
with: ’blocked’;
pg 484, ln –13
replace: self; }
with:
self);
pg 485, ln 1
replace: (Waiting_List
with:
(r->Waiting_list
pg 485, ln 4/5
insert the following new line between lines 4 and 5: insert(q->Other_Resources, r;)
pg 488, ln –10 through –14
replace: (5)
insert(RL, q)
(6)
find highest priority process p;
(6)
p->Status.Type = ‘running’;
(7)
Scheduler();
(8) }
with: (5)
insert(RL, q);
(6)
Scheduler();
(7) }
pg 488, ln –7 through –4
replace: It then changes the status from … it starts the process p.
with:
It then calls the scheduler, which changes the status of the currently highest-priority process p
from ‘ready’ to ‘running’.
pg 489, ln 12
replace: (Ready List, self);
with: (RL, self);
pg 494, ln 18
replace: release(p)
with:
mm_release(p)
GLOSSARY
pg 512, ln –4
replace: unauthorized
with:
authorized
Solutions
Ch 2, problem 11:
ln –2 of program:
replace: P(s4); P(s3); P(s4) p8;
with:
P(s4); P(s4); P(s4) p8;
Ch 3, problem 18(b):
Figure:
move point u marking time step 9 of p1 to time 11 of p1
Ch 4, problem 19(c):
ln –2 of solution:
replace: (p3,50)
with:
(p3,35)
Ch 6, problem 1(a)
ln 3:
replace: B
with: p2
Ch 6, problem 1(b)
ln 4:
replace: B
with: p2
replace: A
with: p1
replace: C
with: p3
Ch 6, problem 17
ln 3:
replace: R5, R5, R2, R4
with: R5, R3, R2, R4
Ch 7, problem 1
right half of figure
replace: 0
with: 1550
replace: 170
with:
1670
replace: 50
with:
1550
ln 4:
replace: Figure 7-3
with: Figure 7-4
Ch8, problem 8a
table
replace: 20 | P1 of S4
with:
20 | P1 of S12
Ch 10, problem 8:
block numbers in the table refer to the original block numbers, i.e., before the deletion or insertion. For
example, when block 4 is deleted, we continue referring to the 3 blocks following block 4 as 5, 6, 7, even
though these blocks get shifted to the left and thus become the logical blocks 4, 5, 6 in the modified file.
delete bl. 4
insert bl. 2A
(a)
(b)
(c)
(e)
(a)
(b)
(c)
(e)
5, 6, 7
0, 1, 2, 3, 4
--3, 5, 6, 7
0, 1, 2
---
5, 6, 7
3
--2A, 3, 5, 6, 7
2, 2A
2A
2A
Ch 10, problem 13(a)
The new scheme needs to access 0.2 x (d-1) blocks for each file (not 0.2 x d) since one of the d blocks is in
the i-node. Thus the number of blocks accessed is reduced to 0.2(d-1)/(0.8+0.2d) = (d-1)/(4+d)
(b) For d=2, the reduction is (2-1)/(4+2) = 1/6 or 16.7%. For d=4, it is (4-1)/(4+4) = 3/8 or 37.5%