COMPUTER SCIENCE TRIPOS

Similar documents
COMPUTER SCIENCE TRIPOS

Design of Relational Database Schemas

Schema Design and Normal Forms Sid Name Level Rating Wage Hours

Relational Database Design

Functional Dependencies

Part I: Entity Relationship Diagrams and SQL (40/100 Pt.)

Chapter 7: Relational Database Design

Database Design and Normalization

Advanced Relational Database Design

Database Sample Examination

Relational Database Design: FD s & BCNF

CSCI-GA Database Systems Lecture 7: Schema Refinement and Normalization

Databases -Normalization III. (N Spadaccini 2010 and W Liu 2012) Databases - Normalization III 1 / 31

DATABASE MANAGEMENT SYSTEMS. Question Bank:

Decision Making under Uncertainty

CS143 Notes: Normalization Theory

Prime Time: Homework Examples from ACE

Schema Refinement and Normalization

Why Is This Important? Schema Refinement and Normal Forms. The Evils of Redundancy. Functional Dependencies (FDs) Example (Contd.)

Announcements. SQL is hot! Facebook. Goal. Database Design Process. IT420: Database Management and Organization. Normalization (Chapter 3)

CS 377 Database Systems. Database Design Theory and Normalization. Li Xiong Department of Mathematics and Computer Science Emory University

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]

Jordan University of Science & Technology Computer Science Department CS 728: Advanced Database Systems Midterm Exam First 2009/2010

Schema Refinement, Functional Dependencies, Normalization

Introduction Decomposition Simple Synthesis Bernstein Synthesis and Beyond. 6. Normalization. Stéphane Bressan. January 28, 2015

Database Constraints and Design

Data integration general setting

Lecture Notes on Database Normalization

Solutions to Math 51 First Exam January 29, 2015

Functional Dependencies and Finding a Minimal Cover

Functional Dependencies and Normalization

Introduction to Databases, Fall 2005 IT University of Copenhagen. Lecture 5: Normalization II; Database design case studies. September 26, 2005

6.830 Lecture PS1 Due Next Time (Tuesday!) Lab 1 Out today start early! Relational Model Continued, and Schema Design and Normalization

Access Control Fundamentals

Relational model. Relational model - practice. Relational Database Definitions 9/27/11. Relational model. Relational Database: Terminology

Normalization in Database Design

Compact Representations and Approximations for Compuation in Games

Algebra Unpacked Content For the new Common Core standards that will be effective in all North Carolina schools in the school year.

6.3 Conditional Probability and Independence

Access The Mathematics of Internet Search Engines

Methods for Finding Bases

A NOTE ON OFF-DIAGONAL SMALL ON-LINE RAMSEY NUMBERS FOR PATHS

Theory behind Normalization & DB Design. Satisfiability: Does an FD hold? Lecture 12

Fundamentals of Database System

Computer Science MS Course Descriptions

Core Syllabus. Version 2.6 B BUILD KNOWLEDGE AREA: DEVELOPMENT AND IMPLEMENTATION OF INFORMATION SYSTEMS. June 2006

normalisation Goals: Suppose we have a db scheme: is it good? define precise notions of the qualities of a relational database scheme

Lecture 9 - Message Authentication Codes

SoftwarePlanner Active Directory Authentication

Decision Mathematics D1 Advanced/Advanced Subsidiary. Tuesday 5 June 2007 Afternoon Time: 1 hour 30 minutes

Week 11: Normal Forms. Logical Database Design. Normal Forms and Normalization. Examples of Redundancy

MATHEMATICS: CONCEPTS, AND FOUNDATIONS Vol. III - Logic and Computer Science - Phokion G. Kolaitis

Chapter 15 Basics of Functional Dependencies and Normalization for Relational Databases

Database Design and Normal Forms

Normalization in OODB Design

User Manual. for the. Database Normalizer. application. Elmar Jürgens

GAP CLOSING. 2D Measurement. Intermediate / Senior Student Book

Determination of the normalization level of database schemas through equivalence classes of attributes

α = u v. In other words, Orthogonal Projection

Chapter 7: Relational Database Design

Introduction to Querying & Reporting with SQL Server

Math/Stats 425 Introduction to Probability. 1. Uncertainty and the axioms of probability

International Journal of Software and Web Sciences (IJSWS)

WORK SCHEDULE: MATHEMATICS 2007

Big Ideas in Mathematics

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Y. Xiang, Constraint Satisfaction Problems

Relational Databases

HECTOR a software model checker with cooperating analysis plugins. Nathaniel Charlton and Michael Huth Imperial College London

Factorizations: Searching for Factor Strings

The University of British Columbia

Database Systems Concepts, Languages and Architectures

The class slides, your notes, and the sample problem that we worked in class may be helpful for reference.

Microeconomics Sept. 16, 2010 NOTES ON CALCULUS AND UTILITY FUNCTIONS

Chapter 8. Database Design II: Relational Normalization Theory

LS.6 Solution Matrices

Graph Theory Problems and Solutions

Limitations of E-R Designs. Relational Normalization Theory. Redundancy and Other Problems. Redundancy. Anomalies. Example

Quiz 3: Database Systems I Instructor: Hassan Khosravi Spring 2012 CMPT 354

Krishna Institute of Engineering & Technology, Ghaziabad Department of Computer Application MCA-213 : DATA STRUCTURES USING C

MATH 304 Linear Algebra Lecture 18: Rank and nullity of a matrix.

Optimizing Description Logic Subsumption

Chapter 5: Logical Database Design and the Relational Model Part 2: Normalization. Introduction to Normalization. Normal Forms.

Properties of Real Numbers

True. All that perfect systems need are correct programs.

Graham Kemp (telephone , room 6475 EDIT) The examiner will visit the exam room at 15:00 and 17:00.

Geometry Solve real life and mathematical problems involving angle measure, area, surface area and volume.

Sudoku puzzles and how to solve them

Valmart Management System CS387 : Databases and Information Systems Lab

MapReduce examples. CSE 344 section 8 worksheet. May 19, 2011

LiTH, Tekniska högskolan vid Linköpings universitet 1(7) IDA, Institutionen för datavetenskap Juha Takkinen

A permutation can also be represented by describing its cycles. What do you suppose is meant by this?

o-minimality and Uniformity in n 1 Graphs

Limitations of DB Design Processes

Logo Symmetry Learning Task. Unit 5

Access Control Models Part I. Murat Kantarcioglu UT Dallas

CS558. Network Security. Boston University, Computer Science. Midterm Spring 2014.

IT2305 Database Systems I (Compulsory)

Chapter 10 Functional Dependencies and Normalization for Relational Databases

Theory of Relational Database Design and Normalization

Transcription:

CST.2010.4.1 COMPUTER SCIENCE TRIPOS Part IB Tuesday 1 June 2010 1.30 to 4.30 COMPUTER SCIENCE Paper 4 Answer five questions. Submit the answers in five separate bundles, each with its own cover sheet. On each cover sheet, write the numbers of all attempted questions, and circle the number of the question attached. You may not start to read the questions printed on the subsequent pages of this question paper until instructed that you may do so by the Invigilator STATIONERY REQUIREMENTS Script paper Blue cover sheets Tags SPECIAL REQUIREMENTS Approved calculator permitted

CST.2010.4.2 1 Artificial Intelligence I This question addresses the problem of colouring the following graph using a constraint satisfaction approach. 1 2 5 3 4 6 7 The colours available are amber, black and crimson which we will denote by A, B and C respectively. We want to assign a colour to each node in the graph in such a way that if there is an edge (n 1, n 2 ) between any pair of nodes then n 1 and n 2 have different colours. (a) Explain how this problem can be represented as a constraint satisfaction problem. Explain how we can apply forward checking in the process of solving a constraint satisfaction problem. Illustrate your answer using the above graph colouring problem where the initial steps are, in order, 1 = A, 2 = B, 6 = B, 5 = C. In particular, you should show how the process can reduce branching and induce backtracking. [8 marks] Explain how we can apply constraint propagation using arc consistency in the process of solving a constraint satisfaction problem. Illustrate your answer using the same initial steps in the same order. Determine whether or not backtracking occurs earlier in this case and explain why. [10 marks] 2

CST.2010.4.3 2 Artificial Intelligence I Evil Robot s creator has sent him on a mission. He must go to the Secret Mountain Hideout, put on an orange boiler suit so that he blends in, then pick up two items called Component 1 and Component 2 and join them together. Finally, he has to press the BIG RED BUTTON (which only works when the two components are joined together) in order to cause something horrible to happen. Evil Robot s internal systems have been constructed using the situation calculus and a theorem prover. (a) Give a brief outline of the situation calculus, concentrating on the fundamental elements that you would expect to see independently of any specific problem. Suggest three logical formulae that might appear in Evil Robot s knowledge base in order to describe the initial state for the above problem. Give an example of a unique names axiom that might appear in the knowledge base. Why might such axioms be required? (d) Give an example of a unique actions axiom that might appear in the knowledge base. [1 mark] (e) Give two examples of a possibility axiom that might appear in the knowledge base. (f ) Give two examples of a successor-state axiom that might appear in the knowledge base. One of these should in addition address the ramification problem. Explain how it does this. [6 marks] 3 Computer Graphics and Image Processing (a) Give an outline description of the painter s algorithm, z-buffer and BSP tree methods for rendering a set of 3D polygons. [3 4 marks] Compare and contrast the three methods. [8 marks] 3 (TURN OVER)

CST.2010.4.4 4 Computer Graphics and Image Processing (a) Homogeneous coordinates are often used to represent transformations in 3D: x H y H z H w H = a 11 a 12 a 13 b 1 a 21 a 22 a 23 b 2 a 31 a 32 a 33 b 3 c 1 c 2 c 3 d x H y H z H w H (i) Explain how to convert standard 3D coordinates, (x, y, z), to homogeneous coordinates, and how to convert homogeneous coordinates to standard 3D coordinates. (ii) Describe the types of transformations provided by each of the four blocks of coefficients in the matrix (a 11... a 33, b 1... b 3, c 1... c 3 and d). [5 marks] (iii) Explain what transformation is produced by each of the following matrices: 1 0 0 0 0 1 0 0 0 0 1 0 0 0 1 0 1 0 p p(1 + r) 0 1 q q(1 + r) 0 0 1 + r r(1 + r) 0 0 1 r [5 marks] Consider the following figure: (i) Give a matrix, or product of matrices, that will transform the square ABCD into the rectangle A B C D. [5 marks] (ii) Show what happens if the same transformation is applied to A B C D. 4

CST.2010.4.5 5 Databases (a) Suppose that R(A, B, C) is a relational schema with functional dependencies F = {A, B C, C B}. (i) Is this schema in 3NF? Explain. (ii) Is this schema in BCNF? Explain. Decomposition plays an important role in database design. (i) Define what is meant by a lossless-join decomposition. (ii) Define what is meant by a dependency preserving decomposition. Let R(A, B, C, D, E) be a relational schema with the following functional dependencies A, B C D, E C B D (i) What is the closure of {A, B}? (ii) What is the closure of {B, E}? (iii) Decompose the schema to BCNF in two different ways. In each case, are all dependencies preserved? Explain. [4 + 4 marks] 5 (TURN OVER)

CST.2010.4.6 6 Databases (a) Present two advantages and two disadvantages of eliminating logical redundancy in database schema design. What are NULL values in SQL, and with what problems are they associated? We are given a schema R(X) with key K X. Suppose that A, B, C X are non-key attributes and we want to verify that the functional dependency A, B C is not violated in our database. Consider the SQL query, select S.K, T.K as K1, K2 from R as S, R as T where S.A = T.A and S.B = T.B and S.C <> T.C Does this query return all key pairs of records that violate the functional dependency (i) when C is not allowed to be NULL? (ii) when C is allowed to be NULL? (d) Suppose that R(X, Y, Z) is a relational schema where X, Y, and Z are disjoint attribute sets. Prove that the following mixed transitivity rule holds: If X Y and Y Z, then X Z. [8 marks] 6

CST.2010.4.7 7 Introduction to Security (a) Briefly explain the following terms, and for each give one example of a technique that implements it: (i) secure commitment; (ii) mandatory access control policy; (iii) perfect secrecy; (iv) message authentication code. You have been hired by CustomWidgets Ltd to secure the web interface to a legacy system. This system is complex, its source code has been lost, and you have been unable to find a precise definition of allowable input values. You have been asked to write input validation procedures, that will identify values which are suspected to be malicious, and flag them for later manual inspection. For each of these input fields, explain one validation procedure you could perform, and justify why it is appropriate: (i) the name of a file in a particular directory on the server; (ii) a parameter that you believe will be used on a command-line; (iii) a string that will be loaded into memory and parsed. For one of the validation procedures you gave in part, discuss how a sophisticated attacker could circumvent detection. 7

CST.2010.4.8 8 Economics and Law (a) In a hawk dove game, doves share food, hawks take food from doves, and hawks fight each other (with a certain risk of death). (i) Write out this game in strategic form. (ii) Under what circumstances will there be an equilibrium with non-zero numbers of hawks and doves? (iii) What will the equilibrium be? Justify your answer. [8 marks] Why might people be more aggressive online than they are in face-to-face encounters? END OF PAPER 8