Functional programming languages

Assignment Help Basic Computer Science
Reference no: EM131060352

Question 1: (a) As computer programming languages have evolved, language designers have increasingly provided more features to help the programmer avoid errors (either at compile time or run time) in the implementation of a solution.

Discuss with critical comment, using appropriate illustrations from a range of programming languages, the extent to which the above statement can be considered true.

(b) Functional programming languages offer the possibility of eliminating some of the errors associated with concurrency. Discuss, using examples from a functional programming language, how this might be achieved.

Question 2: (a) An issue in imperative programming is concurrently executing threads accessing shared data: for example, in the programming language Java, two concurrently executing threads reading from and writing to an instance of an ArrayList. Carefully describe what these issues are, together with any possible solution. Do not include issues that occur when tasks with different priorities are involved.

(b) A potential consequence of concurrently executing threads that have individual priorities is "priority inversion". Describe carefully, using a realistic example, what "priority inversion" is and describe in the context of this example how the consequences of "priority inversion" may be overcome.

(c) Compare and contrast cyclic scheduling with rate-monotonic scheduling as a means of ensuring that the deadlines are met for events scheduled in a real-time system. In your comparison show clearly what these two forms of scheduling involve.

(d) When several threads access a common data structure there is the potential for the ABA problem to occur. Carefully describe, using an appropriate example, what the ABA problem is and how it may be avoided.

Question 3: (a) From the prospective of a user, discuss both the positive and negative implications of the use of cookies in the web pages which they access.

(b) Confidentiality and security of information are major issues for people who use local as well as remote computer systems.
Discuss with critical comment the steps that can be taken both by the user and the system to ensure that information is kept secure and safe.

(c) Discuss the advantages/ disadvantages of using a cluster of computers rather than a series of standalone machines to run many individual applications.

In your discussion, outline how a cluster can balance the workload across machines in the cluster even though individual applications start on and depend on resources from a specific machine in the cluster. What resource demands would make it difficult to migrate a program to another machine in the cluster?

Reference no: EM131060352

Questions Cloud

How awareness of such factors influences the decision : Examine how awareness of such factors influences the decision of hiring outside vendors. In addition, analyze how the stated factors help improve the overall facilitation and effectiveness of the risk management.
Price of a loaf weighing : A loaf of bread weighing 500 grams is sold at 23 dollars including VAT 18%.What should be the price of a loaf weighing 400 grams and VAT fixed at 16%.
Distributed computing applications : Distributed.net (www.distributed.net) is an organization that coordinates research on distributed computer applications. People and organizations can join Distributed.net and contribute idle computing power to ongoing research projects that requir..
How do humans impact biodiversity : What does the study of ecology include that is applicable to measuring biodiversity? How do humans impact biodiversity?
Functional programming languages : Discuss with critical comment, using appropriate illustrations from a range of programming languages, the extent to which the above statement can be considered true.
Explain dissection of fetus pig essay : Explain Dissection of fetus pig essay. We also need to explain the dissection of the specimen, describe part and your observations. provide measurements. What is the bump under the chin and what is the tendon that was attached to the umbilical.
Applications in an imperative programming language : There are a range of issues to consider when developing multi-threaded applications in an imperative programming language such as Ada, C++ or Java.
Medium to long-term strategy for your organisation : Assume that top management would like you to develop a medium to long-term strategy for your organisation (or alternatively for one of the following organisations):
Mainframe computers and personal computers : What are the main differences between operating systems for mainframe computers and personal computers?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What does the scheduled amount represent

Why does it drop off toward the end? How can it exceed the availability?

  Tthe address space of the workstation

A high speed workstation has 64 bit words and 64 bit addresses with address resolution at the byte level.  a.   How many words can in be in the address space of the workstation? ?

  How to create system restorepoint in task scheduling

how to create a system restorepoint in task scheduling using the GUI in Windows 7 and task scheduling using the AT command in Windows 7.

  Explain radio frequency identification technology

Write discussion of radio frequency identification (RFID) technology and Information Technology Infrastructure Library (ITIL) standards.

  Monthly costs for the chain of lasala restaurants

Eva Lorraine needs to analyze the monthly costs for the chain of LaSala restaurants that she manages. She has created a spreadsheet in Excel but is unsure as to how to create formulas. She has done most of the formatting work on the spreadsheet bu..

  Design a 3-bit counter, which can count either up or down

Design a 3-bit counter, which can count either up or down. The input has a clock, and a signal U. When U = 1, the counter counts up; when U = 0, the counter counts down. For example, assume the current counter Q(t) = 011. If U(t) = 0, then Q(t+1) = 0..

  Document for a information system transformation

4-6 pages Business Requirements Document for a Information System Transformation for a law firm and two other agencies a Security Firm; Investigation Firm all have seperate data base; I have to come up with how to create a centralized database

  Building microkernel-based operating systems

Explain how separation of policy and mechanism aids in building microkernel-based operating systems.

  What is flow control as a security measure

What is flow control as a security measure

  Calculate the product of the two numbers

In general ask the user for 2 numbers, calculate the product of the two numbers (mul) and store product in memory. Then divide the 2 numbers entered and store the quotient and remainder in memory.

  Performing system recovery

Identify the recovery option you would use for your provided example, and provide a rationale for its selection.

  Create a hierarchy chart depicting the chosen situation

Define the problem and the current need in the given situation. Create a hierarchy chart depicting the chosen situation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd