The Journal of E-commerce Research Knowledge is a prestigious information systems research journal. It uses a peer-review process to select manuscripts for publication. Only about 10 percent of the...
Suppose that a learning algorithm is trying to find a consistent hypothesis when the classifications of examples are actually random. There are u Boolean attributes, and examples are drawn uniformly...
Suppose that you are asked by your boss for a summary of what your organization should do with regard to computer security. Using the knowledge of this chapter create a PowerPoint presentation for...
Explain how to apply the boosting method naive Bayes learning. Test the performance of the resulting algorithm on the restaurant learning problem.
What is the purpose of creating a logical process model and then a physical process model?
Consider the chaining example discussed at the end of Section 6.7.2. Suppose a mobile user visits foreign networks A, B, and C, and that a correspondent begins a connection to the mobile user when it...
Create the relational diagram to show the relationships among EMPLOYEE, BENEFIT, JOB, and PLAN.
Compare and contrast object frameworks, components, and service-oriented architecture in terms of ease of modification before system deployment, ease of modification after system deployment, and...
What are the key elements of the system proposal?
Suppose that you are installing a new room reservation system for your university that tracks which courses are assigned to which rooms. Assume that all the rooms in each building are "owned" by one...
Using OLAP Query 1 shown in Figure 9.11 (based on data from Figure 9.7) as a starting point, give an example that illustrates a slice and dice operation.
Consider applying the variable elimination algorithm to the umbrella DBN unrolled for three slices, where the query is P( R3U1,U2,U3), Show that the complexity of the algorithmthe size of the largest...
What are several e-business and e-commerce strategies and applications that should be developed and implemented by many companies today? Explain your reasoning.
Based on your answers to these questions create a general statement as to the desirability, considering only data security, of storing data on Azure and EC2 as compared to storing it on servers...
Your NewTech interview seemed to go well, but you did not get the job. During the meeting, the interviewer mentioned that NewTech uses structured analysis and relies heavily on modeling, prototyping,...
Discuss the evolution of client/server computing from file server to multilayer applications to Web-based applications. What has been the driving force behind this evolution? Where do you think...
Samantha Green (the same Samantha we met at the end of Chapter 3, p. 71) owns and operates Twigs Tree Trimming Service. Recall that Samantha has a degree from a forestry program and recently opened...
An alternative scheme for representing measures involves applying the units function to an abstract length object. In such a scheme, one would write Inches (Length (L1)) = 1.5. How does this scheme...
How can the object approach improve the systems development process?
A high-performance race car with an adjustable wing (airfoil) is shown in Figure P1.20. Develop a block diagram describing the ability of the airfoil to keep a constant road adhesion between the...
Consider an arbitrary Bayesian network, a complete data set for that network, and the likelihood for the data set according to the network. Give a simple proof that the likelihood of the data cannot...
What are three fundamental parts of most user interfaces?
a. The TinyOS Resource interface does not allow a component that already has a request in the queue for a resource to make a second request. Suggest a reason. b. However, the TinyOS Resource...
1. List the number and name of all customers. 2. List the complete Part table. 3. List the number and name of every customer represented by sales rep 35. 4. List the number and name of all customers...
For your answers to Problem and Exercise 3-33 from Chapter 3, transform the EER diagrams into a set of relational schemas, diagram the functional dependencies, and convert all the relations to third...
1. What were the most important factors contributing to MMCCs success with its new, secure, self-managed network? Explain the reasons for your choices. 2. What are some of the business benefits and...
Jerry is the project manager for a team developing a retail store management system for a chain of sporting goods stores. Company headquarters is in Las Vegas, and the chain has 27 locations...
A double-acting hydraulic cylinder has an inside diameter = 75 mm. The piston rod has a diameter = 14 mm. The hydraulic power source can generate up to 5.0 MPa of pressure at a flow rate of 200,000...
In Your Turn 14-2, you created a use case diagram for the campus housing service that helps students find apartments. From the use cases and the use case diagram, create a class diagram for the...
What are the major components of a migration plan?
Microsoft offers free licenses of certain software products to students at colleges and universities that participate in its DreamSpark program. If your college or university participates in this...
Apply the Apriori algorithm to the following data set: Trans IDItems Purchased 101 ....................................milk, bread, eggs 102 ....................................milk, juice 103...
Show that if (S, ) is a matroid, then (S, ) is a matroid, where = {A: S - A contains some maximal A }. That is, the maximal independent sets of (S, ) are just the complements of the maximal...
Describe how project portfolio management is used by IT departments.
The CISO of the ABC company is considering how to increase the strength of employee passwords. Currently, passwords must be eight characters, they must be case-sensitive, and they must contain at...
The members of a systems development project team have gone out for lunch together, and as often happens, the conversation has turned to work. The team has been working on the development of the user...
Given your answers to questions 15, would you rather be an existing ISV attempting to adapt to this new world or an entirely new company? Compare and contrast the advantages and disadvantages of each...
Define the predicate Fixed, where Fixed (Location(x)) means that the location of object x is fixed over time.
What is the difference between structured programming and event-driven programming?
Create a trigger named trg_mem_balance that will maintain the correct value in the membership balance in the MEMBERSHIP table when videos are returned late. The trigger should execute as an AFTER...
List three factors that need to be considered in query optimization for mobile computing that are not considered in traditional query optimizers.
Defined a proper policy for an MDP as one that is guaranteed to reach a terminal state, show that it is possible for a passive ADP agent to learn a transition model for which its policy is improper...
Can IPsec using AH be used in transport mode if one of the machines is behind a NAT box? Explain your answer.
What is the worst-case running time for the bucket-sort algorithm? What simple change to the algorithm preserves its linear expected running time and makes its worst-case running time O(n lg n)?
Name two types of legacy databases and the main problems associated with each type.
Shortly after the Gulf War in 1991 (Desert Storm), the U.S. Department of Defense realized that there were significant problems in its battlefield logistics systems that provided supplies to the...
Consider a computer system with both segmentation and paging. When a segment is in memory, some words are wasted on the last page. In addition, for a segment size s and a page size p, there are s/p...
In Chapter 7, you developed a use case diagram, an activity diagram, and a system sequence diagram for the use cases Rent movies and Return movies. In Chapter 11 you developed a first-cut DCD and...
Construct a representation for exchange rates between currencies that allows fluctuations on a daily basis.
Would it be possible to place the RTP code in the operating system kernel, along with the UDP code? Explain your answer.
In a database system using write-ahead logging, what is the worst-case number of disk accesses required to read a data item? Explain why this presents a problem to designers of real-time database...
Complete the missing step in the derivation of Equation (15.17), the first update step for the one-dimensional Kalman filter.
Distance Learning Distance learning is a growth business with an increasing number of accredited universities adding new online degrees to their offerings every year. However, prospective employers...
1. Using the types of entities found in the Alexamara Marina Group database (marinas, owners, boat slips, categories, and service requests), create an example of a table that is in first normal form...
The worst-case number T(n) of comparisons used by SELECT to select the ith order statistic from n numbers was shown to satisfy T(n) = Θ(n), but the constant hidden by the Θ-notation is...
Consider a set of three periodic tasks with the execution profiles of Table. Develop scheduling diagrams similar to those of Figure for this set of tasks. Process Arrival Time Execution Time 10 10...
The table below details price and capacity figures for common components of personal computers. Typical prices for microprocessors, random-access memory (RAM), and hard disk storage are displayed....
Visit the Web home page for your university and navigate through several of its Web pages. Evaluate the extent to which they meet the six design principles.
Using the Web (or past issues of computer industry magazines, such as Computerworld), locate a system that runs in a server-based environment. On the basis of your reading, why do you think the...
Compare and contrast modular conversion and whole-system conversion.
What is cohesion? What is the difference between close coupling and loose coupling?
Some of the operations in standard programming languages can be modeled as actions that change the state of the world. For example, the assignment operation copies the contents of a memory location,...
Explain four types of integrity controls for input forms. Which have you seen most frequently? Why are they important?
What is the purpose of developing use cases during systems analysis?
Define what is meant by a process in a process model. How should a process be named? What information about a process should be stored in the CASE repository?
The x86 Compare instruction (CMP) subtracts the source operand from the destination operand; it updates the status flags (C, P, A, Z, S, O) but does not alter either of the operands. The CMP...
Consider m data points (x j, y j), where the y j s are generated from the x j s according to the linear Gaussian model in Equation (20.5). Find the values of 1, 2 and that maximize the conditional...
Explain what is meant by a nonfunctional requirement. What are the primary types of nonfunctional requirements? Give two examples of each. What role do nonfunctional requirements play in the project...
Show that a depth-first search of an undirected graph G can be used to identify the connected components of G, and that the depth-first forest contains as many trees as G has connected components....
In the section "Disadvantages of File Processing Systems," the statement is made that the disadvantages of file processing systems can also be limitations of databases, depending on how an...
Name five types of files, and describe the primary purpose of each type.
Barry has recently been assigned to a project team that will be developing a new retail store management system for a chain of submarine sandwich shops. Barry has several years of experience in...
1. List the name of each publisher thats not located in New York. 2. List the title of each book published by Penguin USA. 3. List the title of each book that has the type MYS. 4. List the title of...
Many programs written with inheritance could be written with composition instead, and vice versa. Rewrite class Base Plus Commission Employee (Fig. 9.11) of the Commission Employee-Base Plus...
This exercise investigates the way in which conditional independence relationships affect the amount of information needed for probabilistic calculations. a. Suppose we wish to calculate P (he1, e2)...
What is a process model? What is a data flow diagram? Are the two related? If so, how?
Explain the distinctions between time and arrangements, fixed-price, and value-added outsourcing contracts. What are the pros and cons of each?
Consider the closed-loop system in Figure P5.21. Determine values of the parameters k and a so that the following specifications are satisfied: (a) The steady-state error to a unit step input is...
Assume you manage the choir and you foresee two possibilities: Keep the spreadsheet, but create procedures to reduce the likelihood of data integrity problems Create an Access database and database...
Design a form for a new company, Interburger, that allows hamburgers to be ordered via the Internet. The form should include the customer's name, address, and city, as well as a choice of size...
United Helpers is a nonprofit organization that provides aid to people after natural disasters. Based on the following brief description of operations, create the appropriate fully labeled Crows Foot...
Suppose Akbars company, noted earlier in the chapter introduction, is located in a hurricane zone and that it has been given 36 hours warning that a serious, category 4 hurricane is headed its way....
Consider the AIRLINE relational database schema shown in Figure 3.8, which describes a database for airline flight information. Each FLIGHT is identified by a flight NUMBER, and consists of one or...
In the recursive construction of decision trees, it sometimes happens that a mixed set of positive and negative examples remains at a leaf node, even after all the attributes have been used. Suppose...
Go online and research other users of virtualization technology (backup and disaster recovery being one of those). How do those differ from the ones described in the case? How are they similar?...
a. Perform the same type of analysis as that of Table for the following sequence of disk track requests: 27, 129, 110, 186, 147, 41, 10, 64, 120. Assume that the disk head is initially positioned...
Describe two ways to get into the SYN RCVD state of Fig. 6-33.
Apply the classification algorithm to the following set of data records. The class attribute is Repeat Customer. RID Age City Gender Education Repeat Customer 101 20..30 NY F 102 20.30 SF 103 31.40...
The block diagram model of an armature-current-controlled DC motor is shown in Figure AP5.6. (a) Determine the steady-state tracking error to a ramp input r(t) = t, t ¥ 0, in terms of K, Kb, and...
Nowadays new car buyers can configure the car of their dreams on Microsofts MSN Autos Web site, as well as those of Ford, GM, and other auto giants. Many independent online car purchase and research...
Given the axioms from Figure, what are all the applicable concrete instances of Fly (p, from, to) in the state described by At (P1, JFK) ^ At (P2, SF0) ^ Plane (P1) ^ Plane (P2) A Airport (JFK) ^...
In Chapter 8, you were asked to consider an alternative deployment scenario for RMO based on Apache Web servers running under Linux and an Oracle database server. Modify the network diagram in Figure...
What techniques can help e-mail communications? Provide specific examples.
Describe the elements of the use case's basic information section.
Consider the case of rabbits and foxes in Australia. The number of rabbits is x1 and if left alone, it would grow indefinitely (until the food supply was exhausted) so that x1 = kx1. However, with...
Let X, Y, Z be Boolean random variables. Label the eight entries in the joint distribution P (X. Y, Z) as a through h. Express the statement that X and Y are conditionally independent given Z as a...
Are there any limitations to online documentation? Explain.
Compare and contrast pilot conversion, phased conversion, and simultaneous conversion.
Suppose you lose your company laptop at an airport. What should you do? Does it matter what data is stored on your disk drive? If the computer contained sensitive or proprietary data, are you...
If the project manager feels that programming is falling behind schedule, should more programmers be assigned to the project? Why or why not?