How long does it take to load a 64-KB program from a disk whose average seek time is 5 msec, whose rotation time is 5 msec, and whose tracks hold 1 MB (a) For a 2-KB page size? (b) For a 4-KB page...
Compare and contrast object frameworks, components, and service-oriented architecture in terms of ease of modification before system deployment, ease of modification after system deployment, and...
Create the relational diagram to show the relationships among EMPLOYEE, BENEFIT, JOB, and PLAN.
Suppose that you are asked by your boss for a summary of what your organization should do with regard to computer security. Using the knowledge of this chapter create a PowerPoint presentation for...
What are the key elements of the system proposal?
Consider the chaining example discussed at the end of Section 6.7.2. Suppose a mobile user visits foreign networks A, B, and C, and that a correspondent begins a connection to the mobile user when it...
What are several e-business and e-commerce strategies and applications that should be developed and implemented by many companies today? Explain your reasoning.
Prepare a BPD that documents Beccan's business processes. As the internal auditor for No-Wear Products, you have been asked to document the companys payroll processing system. Based on your...
Based on your answers to these questions create a general statement as to the desirability, considering only data security, of storing data on Azure and EC2 as compared to storing it on servers...
Suppose that you are installing a new room reservation system for your university that tracks which courses are assigned to which rooms. Assume that all the rooms in each building are "owned" by one...
Discuss the evolution of client/server computing from file server to multilayer applications to Web-based applications. What has been the driving force behind this evolution? Where do you think...
Your NewTech interview seemed to go well, but you did not get the job. During the meeting, the interviewer mentioned that NewTech uses structured analysis and relies heavily on modeling, prototyping,...
Using OLAP Query 1 shown in Figure 9.11 (based on data from Figure 9.7) as a starting point, give an example that illustrates a slice and dice operation.
Consider applying the variable elimination algorithm to the umbrella DBN unrolled for three slices, where the query is P( R3U1,U2,U3), Show that the complexity of the algorithmthe size of the largest...
What are three fundamental parts of most user interfaces?
An alternative scheme for representing measures involves applying the units function to an abstract length object. In such a scheme, one would write Inches (Length (L1)) = 1.5. How does this scheme...
Consider an arbitrary Bayesian network, a complete data set for that network, and the likelihood for the data set according to the network. Give a simple proof that the likelihood of the data cannot...
1. What were the most important factors contributing to MMCCs success with its new, secure, self-managed network? Explain the reasons for your choices. 2. What are some of the business benefits and...
Samantha Green (the same Samantha we met at the end of Chapter 3, p. 71) owns and operates Twigs Tree Trimming Service. Recall that Samantha has a degree from a forestry program and recently opened...
For your answers to Problem and Exercise 3-33 from Chapter 3, transform the EER diagrams into a set of relational schemas, diagram the functional dependencies, and convert all the relations to third...
How can the object approach improve the systems development process?
1. List the number and name of all customers. 2. List the complete Part table. 3. List the number and name of every customer represented by sales rep 35. 4. List the number and name of all customers...
Show that if (S, ) is a matroid, then (S, ) is a matroid, where = {A: S - A contains some maximal A }. That is, the maximal independent sets of (S, ) are just the complements of the maximal...
Jerry is the project manager for a team developing a retail store management system for a chain of sporting goods stores. Company headquarters is in Las Vegas, and the chain has 27 locations...
In Your Turn 14-2, you created a use case diagram for the campus housing service that helps students find apartments. From the use cases and the use case diagram, create a class diagram for the...
What are the major components of a migration plan?
a. The TinyOS Resource interface does not allow a component that already has a request in the queue for a resource to make a second request. Suggest a reason. b. However, the TinyOS Resource...
Microsoft offers free licenses of certain software products to students at colleges and universities that participate in its DreamSpark program. If your college or university participates in this...
A double-acting hydraulic cylinder has an inside diameter = 75 mm. The piston rod has a diameter = 14 mm. The hydraulic power source can generate up to 5.0 MPa of pressure at a flow rate of 200,000...
What is the difference between structured programming and event-driven programming?
The CISO of the ABC company is considering how to increase the strength of employee passwords. Currently, passwords must be eight characters, they must be case-sensitive, and they must contain at...
Define the predicate Fixed, where Fixed (Location(x)) means that the location of object x is fixed over time.
Given your answers to questions 15, would you rather be an existing ISV attempting to adapt to this new world or an entirely new company? Compare and contrast the advantages and disadvantages of each...
Describe how project portfolio management is used by IT departments.
The members of a systems development project team have gone out for lunch together, and as often happens, the conversation has turned to work. The team has been working on the development of the user...
List three factors that need to be considered in query optimization for mobile computing that are not considered in traditional query optimizers.
Create a trigger named trg_mem_balance that will maintain the correct value in the membership balance in the MEMBERSHIP table when videos are returned late. The trigger should execute as an AFTER...
Can IPsec using AH be used in transport mode if one of the machines is behind a NAT box? Explain your answer.
Defined a proper policy for an MDP as one that is guaranteed to reach a terminal state, show that it is possible for a passive ADP agent to learn a transition model for which its policy is improper...
What is the worst-case running time for the bucket-sort algorithm? What simple change to the algorithm preserves its linear expected running time and makes its worst-case running time O(n lg n)?
Shortly after the Gulf War in 1991 (Desert Storm), the U.S. Department of Defense realized that there were significant problems in its battlefield logistics systems that provided supplies to the...
Name two types of legacy databases and the main problems associated with each type.
Would it be possible to place the RTP code in the operating system kernel, along with the UDP code? Explain your answer.
Apply the Apriori algorithm to the following data set: Trans IDItems Purchased 101 ....................................milk, bread, eggs 102 ....................................milk, juice 103...
In Chapter 7, you developed a use case diagram, an activity diagram, and a system sequence diagram for the use cases Rent movies and Return movies. In Chapter 11 you developed a first-cut DCD and...
Using the Web (or past issues of computer industry magazines, such as Computerworld), locate a system that runs in a server-based environment. On the basis of your reading, why do you think the...
The worst-case number T(n) of comparisons used by SELECT to select the ith order statistic from n numbers was shown to satisfy T(n) = Θ(n), but the constant hidden by the Θ-notation is...
In a database system using write-ahead logging, what is the worst-case number of disk accesses required to read a data item? Explain why this presents a problem to designers of real-time database...
Construct a representation for exchange rates between currencies that allows fluctuations on a daily basis.
Distance Learning Distance learning is a growth business with an increasing number of accredited universities adding new online degrees to their offerings every year. However, prospective employers...
Consider a computer system with both segmentation and paging. When a segment is in memory, some words are wasted on the last page. In addition, for a segment size s and a page size p, there are s/p...
Complete the missing step in the derivation of Equation (15.17), the first update step for the one-dimensional Kalman filter.
Visit the Web home page for your university and navigate through several of its Web pages. Evaluate the extent to which they meet the six design principles.
Compare and contrast modular conversion and whole-system conversion.
Consider a set of three periodic tasks with the execution profiles of Table. Develop scheduling diagrams similar to those of Figure for this set of tasks. Process Arrival Time Execution Time 10 10...
1. Using the types of entities found in the Alexamara Marina Group database (marinas, owners, boat slips, categories, and service requests), create an example of a table that is in first normal form...
The table below details price and capacity figures for common components of personal computers. Typical prices for microprocessors, random-access memory (RAM), and hard disk storage are displayed....
Some of the operations in standard programming languages can be modeled as actions that change the state of the world. For example, the assignment operation copies the contents of a memory location,...
Explain what is meant by a nonfunctional requirement. What are the primary types of nonfunctional requirements? Give two examples of each. What role do nonfunctional requirements play in the project...
What is the purpose of developing use cases during systems analysis?
Explain four types of integrity controls for input forms. Which have you seen most frequently? Why are they important?
What is cohesion? What is the difference between close coupling and loose coupling?
The x86 Compare instruction (CMP) subtracts the source operand from the destination operand; it updates the status flags (C, P, A, Z, S, O) but does not alter either of the operands. The CMP...
Define what is meant by a process in a process model. How should a process be named? What information about a process should be stored in the CASE repository?
Show that a depth-first search of an undirected graph G can be used to identify the connected components of G, and that the depth-first forest contains as many trees as G has connected components....
Many programs written with inheritance could be written with composition instead, and vice versa. Rewrite class Base Plus Commission Employee (Fig. 9.11) of the Commission Employee-Base Plus...
In the section "Disadvantages of File Processing Systems," the statement is made that the disadvantages of file processing systems can also be limitations of databases, depending on how an...
What is a process model? What is a data flow diagram? Are the two related? If so, how?
Name five types of files, and describe the primary purpose of each type.
Design a form for a new company, Interburger, that allows hamburgers to be ordered via the Internet. The form should include the customer's name, address, and city, as well as a choice of size...
This exercise investigates the way in which conditional independence relationships affect the amount of information needed for probabilistic calculations. a. Suppose we wish to calculate P (he1, e2)...
A high-performance race car with an adjustable wing (airfoil) is shown in Figure P1.20. Develop a block diagram describing the ability of the airfoil to keep a constant road adhesion between the...
Barry has recently been assigned to a project team that will be developing a new retail store management system for a chain of submarine sandwich shops. Barry has several years of experience in...
Explain the distinctions between time and arrangements, fixed-price, and value-added outsourcing contracts. What are the pros and cons of each?
a. Perform the same type of analysis as that of Table for the following sequence of disk track requests: 27, 129, 110, 186, 147, 41, 10, 64, 120. Assume that the disk head is initially positioned...
Consider m data points (x j, y j), where the y j s are generated from the x j s according to the linear Gaussian model in Equation (20.5). Find the values of 1, 2 and that maximize the conditional...
Go online and research other users of virtualization technology (backup and disaster recovery being one of those). How do those differ from the ones described in the case? How are they similar?...
Suppose Akbars company, noted earlier in the chapter introduction, is located in a hurricane zone and that it has been given 36 hours warning that a serious, category 4 hurricane is headed its way....
Assume you manage the choir and you foresee two possibilities: Keep the spreadsheet, but create procedures to reduce the likelihood of data integrity problems Create an Access database and database...
Describe two ways to get into the SYN RCVD state of Fig. 6-33.
In the recursive construction of decision trees, it sometimes happens that a mixed set of positive and negative examples remains at a leaf node, even after all the attributes have been used. Suppose...
1. List the name of each publisher thats not located in New York. 2. List the title of each book published by Penguin USA. 3. List the title of each book that has the type MYS. 4. List the title of...
United Helpers is a nonprofit organization that provides aid to people after natural disasters. Based on the following brief description of operations, create the appropriate fully labeled Crows Foot...
Given the axioms from Figure, what are all the applicable concrete instances of Fly (p, from, to) in the state described by At (P1, JFK) ^ At (P2, SF0) ^ Plane (P1) ^ Plane (P2) A Airport (JFK) ^...
Nowadays new car buyers can configure the car of their dreams on Microsofts MSN Autos Web site, as well as those of Ford, GM, and other auto giants. Many independent online car purchase and research...
What techniques can help e-mail communications? Provide specific examples.
In Chapter 8, you were asked to consider an alternative deployment scenario for RMO based on Apache Web servers running under Linux and an Oracle database server. Modify the network diagram in Figure...
Describe the elements of the use case's basic information section.
Let X, Y, Z be Boolean random variables. Label the eight entries in the joint distribution P (X. Y, Z) as a through h. Express the statement that X and Y are conditionally independent given Z as a...
SQL-92 provides an n-ary operation called coalesce, which is defined as follows: coalesce (A1,A2, . . . , An) returns the first nonnull Ai in the list A1,A2, . . .,An, and returns null if all of...
Examine the system flowchart for Rocky Mountain Outfitters in Figure. Develop a preliminary development plan based on IPO development order. Which programs are difficult to classify as input,...
If the project manager feels that programming is falling behind schedule, should more programmers be assigned to the project? Why or why not?
Are there any limitations to online documentation? Explain.
Compare and contrast pilot conversion, phased conversion, and simultaneous conversion.
Lithonia Lighting, located just outside of Atlanta, Georgia, is the world's largest manufacturer of light fixtures, with more than $1 billion in annual sales. One afternoon, the power transformer at...
Many versions of UNIX use an unsigned 32-bit integer to keep track of the time as the number of seconds since the origin of time. When will these systems wrap around (year and month)? Do you expect...
Describe how projects are selected in organizations.
Consider the case of rabbits and foxes in Australia. The number of rabbits is x1 and if left alone, it would grow indefinitely (until the food supply was exhausted) so that x1 = kx1. However, with...
Write definitions for the following: a. Exhaustive Part Decomposition b. Part Partition c. Part wise Disjoint These should he analogous to the definitions for Exhaustive Decomposition, Partition, and...
Figure shows the top levels of a hierarchy for everything. Extend it to include as many real categories as possible. A good way to do this is to cover all the things in your everyday life. This...