1. In which ways do smartphones help these companies be more profitable? To what extent are improvements in performance coming from revenue increases or cost reductions? Provide several examples from...
This diagram shows an example of memory configuration under dynamic partitioning, after a number of placement and swapping-out operations have been carried out. Addresses go from left to right; gray...
1. A domain model class diagram. 2. A use case diagram. 3. A fully developed description for two use cases such as Add a seller and Record a book order. 4. A system sequence diagram for each of the...
a. Rank the following functions by order of growth; that is, find an arrangement g1, g2, ..., g30 of the functions satisfying g1 = Ω(g2), g2 = Ω(g3), ..., g29 = Ω(g30). Partition...
1. By changing the way his group talks about IT investments, CIO Tim Schaefer is trying to change the way the rest of the company sees IT. Why do you think this is necessary? What would be the...
1. Cisco Systems went from a push to a pull approach to its supply chain after the dot-com debacle. How are these two approaches different? Does it depend on the state of the economy, which one...
1. Draw an ERD for the Winfield Public Transit Authority system. 2. Indicate cardinality. 3. Identify all fields you plan to include in the tables. 4. Create 3NF table designs. Winfield is a small...
1. The project that Nationwide undertook was quite clearly a success. What made this possible? Discuss three different practices that helped Nation wide pull this off. Use examples from the case...
Draw a level 0 data flow diagram (DFD) for the process of buying glasses in Exercise A, Chapter 4.
1. The case mentions the dependence of BPs IT organization on external contractors. Why would this be an issue? When is it a good idea for IT departments to hire contractors, and when is it not?...
1. Why does ERP customization lead to so many headaches when it is time to upgrade? 2. Why were the systems customized in the first place? 3. Cutting payments outright to ERP vendors may not be...
The following pseudocode is a correct implementation of the producer/consumer problem with a bounded buffer: Labels p1, p2, p3 and c1, c2, c3 refer to the lines of code shown above (p2 and c2 each...
1. For the prototype user interface, design a switchboard that leads from main sections to subsections of related system tasks. The main sections may include member information, registration,...
1. As stated in the case, The New York Times chose to deploy their innovation support group as a shared service across business units. What do you think this means? What are the advantages of...
Consider the sensor less, two-location vacuum world under Murphys Law. Draw the belief state space reachable from the initial belief state {1, 2, 3, 4, 5, 6, 7, 8), and explain why the problem is...
1. To what events must the ticket processing system respond? Create a complete event table listing the event, trigger, source, use case, response, and destination for each event. 2. Draw an...
1. Draw an ERD for the Parrot Palace information system. 2. Indicate cardinality. 3. Identify all fields you plan to include in the birds and tricks tables. For example, in the bird table, you might...
In the code below, three processes are competing for six resources labeled A to F. a. Using a resource allocation graph, show the possibility of a deadlock in this implementation. b. Modify the order...
1. Think about the business benefits of the mobile CRM deployments discussed in the case. How did Dow Corning and DirecTV benefit from these applications? What can they do that was not possible...
1. What are the two meanings of corporate ethics in organizations today? What does each definition imply for IT practices? How does the economic environment affect this? 2. How does IT provide more...
1. What are some of the most important benefits derived by the law enforcement agencies mentioned in the case? How do these technologies allow them to better fight crime? Provide several examples. 2....
a. Using the AIRPORT KLX Table, describe an example that illustrates the insertion anomaly. b. Using the AIRPORT KLX Table, describe an example that illustrates the deletion anomaly. c. Using the...
1. How do the companies involved benefit from the innovations discussed in the case? Is it about more transaction that is efficient processing, better reaching out to customers, or both? 2. Use...
1. What factors should companies take into consideration when making the decision between developing their own applications, purchasing them from a vendor, or taking the SaaS route, as discussed...
Professional and Scientific Staff Management (PSSM) is a unique type of temporary staffing agency. Many organizations today hire highly skilled technical employees on a short-term, temporary basis to...
Draw an entity relationship diagram (ERD) for the following situations: 1. Whenever new patients are seen for the first time, they complete a patient information form that asks their name, address,...
1. List possible objects in the new bike shop system, including their attributes and methods. 2. Identify at least three possible use cases and actors. 3. Create a use case diagram that shows how...
Sandy Shores Time Shares is one of the largest time-sharing and rental brokers for vacation cottages along the North Carolina coast. After 10 successful years of matching up owners and renters, Sandy...
1. Review the concept of supply chain management. Although Passing Lane offers services rather than products, could the SCM concept apply to the design of the new system? Why or why not? 2. What...
Create a complete ERD in Crows Foot notation that can be implemented in the relational model using the following description of operations. Hot Water (HW) is a small start-up company that sells spas....
1. Although a very detailed change proposal may prevent people from making their own connections, as discussed in the case, it may lead others to consider the proposal vague and unfinished. How do...
Given the following state for the Bankers Algorithm. 6 processes P0 through P5 4 resource types: A (15 instances); B (6 instances) C (9 instances); D (10 instances) Snapshot at time T0: a. Verify...
Using the STUDENT table structure shown in Table P6.4, do the following: a. Write the relational schema, draw its dependency diagram, and identify all dependencies, including all transitive...
1. What are some of the benefits afforded to organizations implementing voice recognition technologies in these settings? How can you quantify these benefits to assess the value of the investment?...
1. Create a decision table that describes Big State University course catalog regarding eligibility for MIS 260. Show all possible rules. 2. Simplify the table you just created. Describe the results....
Table 4-4 shows a relation called GRADE REPORT for a university. Your assignment is as follows: a. Draw a relational schema and diagram the functional dependencies in the relation. b. In what normal...
Define a structure chart in language that a non-IT person would understand easily. Also provide a step-by-step description of how to create a structure chart.
1. How does the job of the CIO change with the assumption of customer responsibilities? Do you agree with this new development? Why or why not? 2. Why would there be internal resistance to CIOs...
1. What does the position of enterprise architect entail? What qualifications or experiences would you think a good enterprise architect should have? Support your answer with examples from the case....
Minesweeper, the well-known computer game, is closely related to the wumpus world. A minesweeper world is a rectangular grid of N squares with M invisible mines scattered among them. Any square may...
Write the SQL queries that accomplish the following tasks in the ZAGI Retail Company Sales Department Database: a. Display the VendorID and VendorName for all vendors. b. Display the CustomerName and...
1. Why is it important to define the project scope? How would you define the scope of the payroll project in this case? 2. Review each constraint and identify its characteristics: present vs. future,...
Figure 3.9b contains seven states. In principle, one could draw a transition between any two states, for a total of 42 different transitions. a. List all of the possible transitions and give an...
1. How do information technologies contribute to the business success of Sew What? Inc.? Give several examples from the case regarding the business value of information technology that demonstrate...
1. Create an initial ERD for the new system that contains at least eight entities. 2. Analyze each relationship to determine if it is 1:1, 1:M, or M:N. 3. Normalize your designs for all tables to...
1. In your own words, summarize the dealer-broker record retention requirements. 2. Reread the SECs 2003 interpretation. In your own words, explain the difference between integrated hardware and...
1. Identify possible actors and use cases involved in ATAs bus operations. 2. Create a use case diagram for the bus system. 3. Create a sequence diagram for the use case you selected. 4. Create a...
1. List possible objects in the registration system, including their attributes and methods. 2. Identify possible use cases and actors. 3. Create a use case diagram that shows how students register....
Consider the following program: Note that the scheduler in a uniprocessor system would implement pseudo parallel execution of these two concurrent processes by interleaving their instructions,...
What are three typical reasons why companies develop their own information systems?
The Amberssen Specialty Company is a chain of 12 retail stores that sell a variety of imported gift items, gourmet chocolates, cheeses, and wines in the Toronto area. Amberssen has an IS staff of...
1. Draw a simple floor plan for New Century Wellness group and include the placement of all network nodes including the placement of a server, and network equipment. How many ports will your switch...
1. Design a suitable source document for ads that are telephoned or mailed in. 2. Explain user-centered design principles in a brief memo to Annie. 3. Suggest at least four user interface design...
1. Should Green Design adopt ERP? Why or why not? Provide specific reasons. 2. Is the experience of other companies relevant? Use the Internet to locate a software platform that may be useful to...
Global Computer Solutions (GCS) is an information technology consulting company with many offices located throughout the United States. The companys success is based on its ability to maximize its...
Figure 9.8 shows an ER schema for a database that may be used to keep track of transport ships and their locations for maritime authorities. Map this schema into a relational schema, and specify all...
1. In the case, both airlines upgraded to the same application but approached the upgrade process differently. What were those differences, and how much impact did they have on the outcome of the...
Martin is working to develop a preliminary costbenefit analysis for a new client-server system. He has identified a number of cost factors and values for the new system, summarized in the following...
1. Charles asks you, What is an entity, a table, a field, and a record? He also wants to know the different between primary key, candidate keys, foreign keys, secondary keys, and combination keys. 2....
Figure 4-36 includes an EER diagram describing a car racing league. Transform the diagram into a relational schema that shows referential integrity constraints (see Figure 4-5 for an example of such...
MIS author and consultant Peter Keen says: "We have learned that it is not technology that creates a competitive edge, but the management process that exploits technology." What does he mean? Do you...
Figure 4-32 shows a class list for Millennium College. Convert this user view to a set of 3NF relations using an enterprise key. Assume the following: ¢ An instructor has a unique location....
1. Clearly, Dynamo, Bigtable, and Cassandra are critical technology to the companies that create them. Why did they allow their employees to publish academic papers about them? Why did they not keep...
1. What is the underlying issue behind endpoint security, and why is it becoming even more difficult for companies to address it? Define the problem in your own words using examples from the case. 2....
Using Figure 7-5 as an example, redraw Figure 7-12 using an enterprise information system that processes a shared database. Explain the advantages of this system over the paper-based system in Figure...
On the Internet, locate at least three firms that offer CASE tools as shareware or free, public domain software. Describe what you found.
Write axioms describing the predicates Grand Child, Great Grandparent, Brother, Sister, Daughter, Son, Aunt, Uncle, Brother In Law, Sister In Law, and First cousin. Find out the proper definition of...
1. Create a decision table that describes the movement of inventory. 2. Draw a decision tree that describes the merchandise inventory management process. 3. Name four attributes that you can use to...
Trace the history of system architecture, with particular emphasis on the impact of the personal computer and the Internet. Be sure to include examples.
Consider the problem of constructing (not solving) crossword puzzles:5 fitting words into a rectangular grid. The grid, which is given as part of the problem, specifics which square are blank and...
Suppose the following two processes, foo and bar, are executed concurrently and share the semaphore variables S and R (each initialized to 1) and the integer variable x (initialized to 0). a. Can the...
A dynamic vibration absorber is shown in Figure P2.2. This system is representative of many situations involving the vibration of machines containing unbalanced components. The parameters M2 and kl2...
Figure 5.6 indicates how to construct a module of chips that can store 1 MByte based on a group of four 256-Kbyte chips. Let's say this module of chips is packaged as a single 1-Mbyte chip, where the...
The local city youth league needs a database system to help track children that sign up to play soccer. Data needs to be kept on each team and the children that will be playing on each team and their...
1. What are the companies mentioned in the case trying to control, or manage, through these projects? What is the problem? And how did they get there? 2. What are the business benefits of...
1. Using the guidelines and suggestions in this chapter, design a user interface. Draw storyboards then use Microsoft Access or another form-designing application to create the screens. 2. Determine...
Table 4-3 contains sample data for parts and for vendors who supply those parts. In discussing these data with users, we find that part numbers (but not descriptions) uniquely identify parts and that...
1. Describe the rules for creating DFDs. 2. What are the data flow and process combinations that must be avoided when creating a DFD? 3. Explain what a diagram 0 is and how it is used. 4. Ask...
Describe three main types of testing and the order in which they are performed.
Assume a system with N job positions. For job position i, the number of individual users in that position is Ui and the number of permissions required for the job position is Pi. a. For a traditional...
1. What options does Atrium have for acquiring a new system? 2. What are the pros and cons of in-house development versus purchasing a system? 3. If the decision is made to purchase a new system,...
Write the script for a one-minute explanation of basic project management concepts.
Table 4-5 shows a shipping manifest. Your assignment is as follows: a. Draw a relational schema and diagram the functional dependencies in the relation. b. In what normal form is this relation? c....
Millennium College wants you to help design a star schema to record grades for courses completed by students. There are four dimension tables, with attributes as follows: CourseSection..Attributes:...
1. Identify the entities and their relationships. Then create an ERD for the reservations system. 2. Create 3NF table designs for the system. 3. For each of the entities identified, design tables and...
1. What are the challenges faced by the CIOs mentioned in the case? Group them into categories and use examples from the case to define each. 2. The case mentions that the traditional approach toward...
A wealthy businessman owns a large number of paintings that he loans to museums all over the world. He is interested in setting up a system that records what he loans to whom so that he doesn't lose...
1. Prepare a context diagram for the new system. 2. Prepare a diagram 0 DFD for the new system. 3. Write a brief memo that explains at least five attributes that you can use to define a process in...
When a file is transferred between two computers, two acknowledgement strategies are possible. In the first one, the file is chopped up into packets, which are individually acknowledged by the...
1. Prepare a detailed list of pros and cons of in-house versus software purchase. 2. Calculate ROI for both options. 3. Calculate NPV for both options. Use an 8% discount factor. 4. Create a...
What are user applications? Suggest three examples that could boost user productivity.
1. From the perspective of a patient, how would you feel about being diagnosed by a doctor who could be hundreds or thousands of miles away from you? What kind of expectations or concerns would you...
Draw an entity-relationship diagram, including minimum and maximum cardinality for the following: The system stores information about two things: cars and owners. A car has attributes for make,...
The university computer lab's director keeps track of the lab usage, as measured by the number of students using the lab. This particular function is very important for budgeting purposes. The...
1. Identify possible actors and use cases involved in Osceolas business functions. 2. Create a use case diagram for Osceolas operations. 3. Select one of the use cases and create a class diagram. 4....
What is project scope? What are constraints? Provide an example of a mandatory, external, future constraint. Also provide an example of a discretionary, internal, present constraint.
1. Given the critical nature of defense activities, security in this environment is a primary concern. How do the agencies discussed in the case address this issue? Can you think of anything else...
In the new system under development for Holiday Travel Vehicles, seven tables will be implemented in the new relational database. These tables are New Vehicle, Trade-in Vehicle, Sales Invoice,...
Consider a Student table containing StudentNum, StudentName, students StudentMajor, students AdvisorNum, students AdvisorName, students AdvisorOfficeNum, students AdvisorPhone, students NumCredits,...
1. Implementing telepresence seems to have other, less tangible, advantages beyond travel cost savings. What are some of those? How do you quantify them to make the case for investing in the...