Both the search and the insertion time for a B-tree are a function of the height of the tree. We would like to develop a measure of the worst-case search or insertion time. Consider a B-tree of...
Assume your team is in charge of the implementation of the system you recommend in your answer to question 4.Describe how each of the four challenges discussed in Q3pertain to this implementation....
Create a database trigger for the following situations: (a) The price of all double rooms must be greater than 100. (b) The price of double rooms must be greater than the price of the highest single...
What benefit does rigorous two-phase locking provide? How does it compare with other forms of two-phase locking?
West Star Marinas is a chain of 12 marinas that offer lakeside service to boaters; service and repair of boats, motors, and marine equipment; and sales of boats, motors, and other marine accessories....
Pretend that you are building a Web-based system for the admissions office at your university. The system will be used to accept electronic applications from students. All the data for the system...
Visit www.salesforce.com/chatter to learn Chatters features and applications. Using what you learn, state one Chatter application for each of the value chain activities in Figure 8-6.
Suppose that you are interested in buying yourself a new computer. Create a cost-benefit analysis that illustrates the return on investment that you would receive from making this purchase....
Travelers Insurance Company of Hartford, Connecticut has adopted agile development methodologies. The insurance field can be competitive, and Travelers wanted to have the shortest time to implement...
Assume that the experience of hiring Ajit Barid worked well and that PRIDE Systems plans to continue application development with him. Describe factors that may make the investors nervous about this...
Describe a good way to parallelize each of the following. a. The difference operation b. Aggregation by the count operation c. Aggregation by the count distinct operation d. Aggregation by the avg...
Suppose that you are installing a new accounting package in your small business. What conversion strategy would you use? Develop a conversion plan (i.e., technical aspects only).
Some analysts believe that if the trend toward more powerful CASE tools continues, many tedious development tasks might be performed automatically. Is there a limit to the capabilities of future CASE...
Refer to the Real World Case on Nationwide Insurance in the chapter. Senior management was emphatic about maintaining a 24-month deadline at all cost. Should the scope of the project be adapted to...
For each of the following pairs of related entities, indicate whether (under typical circumstances) there is a one-to-many or a many-to-many relationship. Then, using the shorthand notation...
Let us consider how we might translate a set of STRIPS schemata into the successor-state axioms of situation calculus. Consider the schema for Fly (p, from. to). Write a logical definition for the...
Some operating systems have a treestructured file system but limit the depth of the tree to some small number of levels. What effect does this limit have on users? How does this simplify file system...
Describe the major elements and issues with the V-model.
One aspect of the new system under development at Holiday Travel Vehicles will be the direct entry of the sales invoice into the computer system by the salesperson as the purchase transaction is...
Write a query to produce the number of invoices and the total purchase amounts by customer, using the output shown in Figure P7.35 as your guide. CUS CODE Number of Invoices Total Customer Purchases...
Describe three situations that can be good candidates for denormalization.
In both parts of Fig. 6-6, there is a comment that the value of SERVER_PORT must be the same in both client and server. Why is this so important?
An important problem for television systems is the jumping or wobbling of the picture due to the movement of the camera. This effect occurs when the camera is mounted in a moving truck or airplane....
Develop two use scenarios for the DFD in exercise C in Chapter 5.
Consider just the tracking of recurring services, and list all of the requirements that you can imagine for that functionality. Be specific and answer at least the following: a. What data will you...
Apply the value chain model to a video game developer, such as Electronic Arts (www.EA.com). What is its competitive strategy? Describe the tasks Electronic Arts must accomplish for each of the...
Refer to the Real World Case on Cisco Systems and Others in the chapter. Are supply chains becoming so tightly integrated that resilience against external shocks is minimal? Discuss.
What is a release methodology? Why is version control important?
Draw a level 0 data flow diagram (DFD) for the Picnics R Us system in Exercise H, Chapter 4.
Sketch the layout of your room at home. Now write a description of the layout of your room. Are these both models of your room? Which is more accurate? More detailed? Easier to follow for someone...
Visit techcrunch.com/2010/05/16/iphone-app-sales-exposed.Summarize the returns earned by both the top and more typical applications.
How can a company use change management to minimize the resistance and maximize the acceptance of changes in business and technology? Give several examples.
Draw a precedence graph for each of the schedules (a) (e) in the previous exercise. (a) Read(T1, balx), read(T2, balx), write(T1, balx), write(T2, balx), commit(T1), commit(T2) (b) Read(T1, balx),...
Groupons Procurement process integrates with the spas Sales process. How is this integration accomplished?
Suppose that binary heaps are represented using explicit links. Give a simple algorithm to find the tree node that is at implicit position i.
Suppose you are given a bag containing n unbiased coins. You are told that n 1 of these coins are normal, with heads on one side arid tails on the other, whereas one coin is a fake, with heads on...
What is the purpose of developing an identifier for an entity?
What is Boolean logic? Provide three examples using everyday terms.
Search the Internet to find information about other firms that have transformed their IT organizations and the role that the CIO plays in the governance structure of the organization. What benefits...
Create a set of use cases for an online university registration system. The system should enable the staff of each academic department to examine the courses offered by their department, add and...
A robot includes significant flexibility in the arm members with a heavy load in the gripper [6, 20]. A two-mass model of the robot is shown in Figure. P2.26. Find the transfer function Y(s)/F(s)....
How does a BASE system differ from a traditional distributed database system?
Our description of Internet shopping omitted the all-important step of actually buying the product Provide a formal logical description of buying, using event calculus That is, define the sequence of...
What are the reasons underlying the popularity of online documentation?
A laser printer uses a laser beam to print copy rapidly for a computer. The laser is positioned by a control input r(t), so that we have Y(s) = 4(s + 50) / s2 + 30s + 200 R(s). The input r(t)...
How can the output of the Floyd-War shall algorithm be used to detect the presence of a negative-weight cycle?
Again review information about your own university. Create generalization/specialization hierarchies using the domain model class diagram notation for (1) Types of faculty, (2) Types of students, (3)...
Consider a paged logical address space (composed of 32 pages of 2 Kbytes each) mapped into a 1-Mbyte physical memory space. a. What is the format of the processors logical address? b. What is the...
Samantha Green owns and operates Twigs Tree Trimming Service. Samantha graduated from the forestry program of a nearby university and worked for a large landscape design firm, performing tree...
Repeat Problem 12.1 for the operation A B, where A contains 11110000 and B contains 0010100.
Describe in very general terms the as-is business process for registering for classes at your university. Collaborate with another student in your class and evaluate the process using activity...
Consider the CD cover in Figure 5-61. A. Specify identifiers and attributes for the entities CD, ARTIST, ROLE, and SONG. B. Construct a crow's foot model showing relationships among these four...
A payroll system has a data entry subsystem that is used to enter time card information for hourly employees. What kinds of controls would you implement to ensure that the data is correct and error...
Ms. Sapper, this years annual partner meeting coordinator for a global accounting firm, faced an interesting challenge. With 400 high-powered partners gathering from all around the world, she wanted...
Refer to the Real World Case about the U.S. Department of Defense and its adoption of open-source software in the chapter. Would such an approach work for a commercial organization, or is it limited...
a. Consider an L1 cache with an access time of 1 ns and a hit ratio of H = 0.95. Suppose that we can change the cache design (size of cache, cache organization) such that we increase H to 0.97, but...
1. Study the user interface in Visible Analyst or another CASE tool, consider the guidelines described in this chapter, and prepare a detailed recommendation for interface design changes, if any. Be...
Consider a multicomputer in which the network interface is in user mode, so only three copies are needed from source RAM to destination RAM. Assume that moving a 32-bit word to or from the network...
At my neighborhood Publix grocery store, the cashiers always handwrite the total amount of the charge on every credit card charge form, even though it is printed on the form. Why? Because the back...
Are deadlocks possible with the transport entity described in the text (Fig. 6-20)?
Assume (for simplicity in this exercise) that only one tuple fits in a block and memory holds at most 3 page frames. Show the runs created on each pass of the sort-merge algorithm, when applied to...
Review the real-world example about Walmart and Others in the chapter. How could these companies prepare for the unexpected changes in demand that brought down their Web sites? Explain your reasoning.
A RISC machine may do both a mapping of symbolic registers to actual registers and a rearrangement of instructions for pipeline efficiency. An interesting question arises as to the order in which...
The new information system at Jones Legal Investigation Services will be developed, using objects. The data to be managed by this system will be complex, consisting of large amounts of text, dates,...
Feedback systems do not always involve negative feedback. Economic inflation, which is evidenced by continually rising prices, is a positive feedback system. A positive feedback control system, as...
What are agile methods? Are they better than traditional methods? Why or why not?
Many opportunities await those who troll the big job boards, the free-agent sites, the reverse auction services, and the niche sites for specialized jobs and skills. Presented below are diverse...
Draw an ISD for the DFD in Exercise E in Chapter 5.
Describe the major elements and issues with iterative development.
What issues should be considered when resolving data requests in a distributed environment?
Show how a system of difference constraints can be solved by a Bellman-Ford-like algorithm that runs on a constraint graph without the extra vertex v0.
1. Do you think it would be possible to sum up the resulting values and make a decision based only on the numbers? Support your answer. 2. What factors, other than those in the matrix of weighted...
1. Draw a storyboard to show how the one form design concept might look as customer information, product information, and shipping information are added to the expanded form. 2. Can you describe or...
Go online and search for reports on the aftermath of these two incidents. What consequences, financial and otherwise, did the two organizations face? What changes, if any, were implemented as a...
Suppose you alert your boss to the security threats in Figure 12-3 and to the safeguards in Figure 12-7. Suppose he says, Very interesting. Tell me more. In preparing for the meeting, you decide to...
What is the distinction between an external trigger and a temporal trigger? Give two examples of each.
Can clustering of files occur after the files are populated with records? Why or why not?
List the components of a DBMS and describe the function of each.
Document your thought process around what changes you made to the model developed in Chapter 2, 2-60, to accommodate the new information. Pay particular attention to what changes you had to make to...
Consider the accompanying system, which was described in Chapter 4. Use the use cases and process models that you created in Chapters 4 and 5 to help you answer the questions that follow. The Campus...
What are the key issues in deciding between using perfectly normalized databases and denormalized databases?
Why is consistency in design important? Why can too much consistency cause problems?
What is the difference between COUNT, COUNT DISTINCT, and COUNT(*) in SQL? When will these three commands generate the same and different results?
In this exercise, we will consider the problem of planning a route for a robot to take from one city to another. The basic action taken by the robot is Go (x, y), which takes it from City x to city y...
How do use cases relate to the requirements stated in the requirements definition?
(Derived from Barton et al. (1987)) This exercise concerns a language we call Buffalo n , which is very much like English (or at least E 0 ) except that the only word in its lexicon is buffalo. Here...
1. List the owner number, last name, and first name of every boat owner. 2. List the complete Marina table (all rows and all columns). 3. List the last name and first name of every owner located in...
Explain the relationship between a DFD level 0 diagram and DFD level 1 diagram(s).
Create a strategy for reviewing your deliverables generated so far with the appropriate stakeholders . Which stakeholders should you meet with? What information would you bring to this meeting? Would...
Can computers think? Will they ever be able to? Explain why or why not.
Draw an EER diagram for the following situation: TomKat Entertainment is a chain of theaters owned by former husband and wife actors/entertainers who, for some reason, can't get a job performing...
Define what is meant by a data flow in a process model. How should a data flow be named? What information about a data flow should be stored in the CASE repository?
Refer to Figure 4-5. For each of the following reports (with sample data), indicate any indexes that you feel would help the report run faster as well as the type of index: a. State, by products...
1. Visit the Web site for Visible Analyst or another CASE tool, and investigate licensing options. Are network installations limited by the number of workstations, the number of users at any one...
What is the difference between the ability of a manager to retrieve information instantly on demand using an MIS and the capabilities provided by a DSS?
Magnetic levitation trains provide a high-speed, very low friction alternative to steel wheels on steel rails. The train floats on an air gap as shown in Figure P2.27 [25]. The levitation force FL is...
Explain how to apply the boosting method naive Bayes learning. Test the performance of the resulting algorithm on the restaurant learning problem.
The Journal of E-commerce Research Knowledge is a prestigious information systems research journal. It uses a peer-review process to select manuscripts for publication. Only about 10 percent of the...
An AS/RS with four aisles is 80 m long and 18 m high. The S/R machine has a maximum speed of 1.6 m/s in the horizontal direction. It accelerates from zero to 1.6 m/s in a distance of 2.0 m. On...
What is the purpose of creating a logical process model and then a physical process model?