SQL-92 provides an n-ary operation called coalesce, which is defined as follows: coalesce (A1,A2, . . . , An) returns the first nonnull Ai in the list A1,A2, . . .,An, and returns null if all of...
Write definitions for the following: a. Exhaustive Part Decomposition b. Part Partition c. Part wise Disjoint These should he analogous to the definitions for Exhaustive Decomposition, Partition, and...
Examine the system flowchart for Rocky Mountain Outfitters in Figure. Develop a preliminary development plan based on IPO development order. Which programs are difficult to classify as input,...
Lithonia Lighting, located just outside of Atlanta, Georgia, is the world's largest manufacturer of light fixtures, with more than $1 billion in annual sales. One afternoon, the power transformer at...
Figure shows the top levels of a hierarchy for everything. Extend it to include as many real categories as possible. A good way to do this is to cover all the things in your everyday life. This...
Many versions of UNIX use an unsigned 32-bit integer to keep track of the time as the number of seconds since the origin of time. When will these systems wrap around (year and month)? Do you expect...
Find a suitably dirty carpet free of obstacles, and vacuum it. Draw the path taken by the vacuum cleaner as accurately as you can. Explain it, with reference to the forms of planning discussed in...
Compute the true utility function and the best linear approximation in x and y (as in Equation (21.9)) for the following environments: a. A 10 x 10 world with a single +1 terminal state at (10, 10)....
Describe how projects are selected in organizations.
Devise suitable features for stochastic grid worlds (generalizations of the 4 x 3 world) that contain multiple obstacles and multiple terminal states with +1 or 1 reward.
Draw an ISD for the DFD in Exercise I in Chapter 5.
What are several e-business applications that you might recommend to a small company to help it survive and succeed in challenging economic times? Why?
Suppose you had a neural network with linear activation functions. That is, for each unit the output is some constant times the weighted sum of the inputs. a. Assume that the network has one hidden...
Distinguish between business, user, and functional requirements.
Describe the primary activities of the design phase of the SDLC.
Telepresence is described in the case as a green technology because it replaces air travel with a more environmentally friendly alternative. Recently, many organizations are looking to IT to help...
Suppose we put into a logical database a segment of the U.S. census data listing the age, city of residence, date of birth, and mother of every person, using social security numbers as identifying...
As part of your job search, you decide to find out more about salaries and qualifications for systems analysts in the area where you would like to work. To increase your knowledge, search the...
A DMA controller serves four receive-only telecommunication links (one per DMA channel) having a speed of 64 Kbps each. a. Would you operate the controller in burst mode or in cycle-stealing mode? b....
Is it possible with a sequential file organization to permit sequential scanning of the data, based on several sorted orders? If not, why not? If it is possible, how?
The data flow symbols shown on page 185 were designed by Ed Yourdon, a well-known IT author, lecturer, and consultant. Many IT professionals consider him to be among the most influential men and...
In the public-key authentication protocol of Fig. 8-43, in message 7, RB is encrypted with KS. Is this encryption necessary, or would it have been adequate to send it back in plaintext? Explain your...
The force versus displacement for a spring is shown in Figure E2.3 for the spring-mass-damper system of Figure 2.1. Graphically find the spring constant for the equilibrium point of y = 0.5 cm and a...
Explain the process you would use to determine the feasibility of Garden Tracker.List data you need for such an assessment, and explain how you might obtain or estimate that data.
A remote manipulator control system has unity feedback and a loop transfer function We want the steady-state position error for a step input to be less than or equal to 10% of the magnitude of the...
How are a file and a database different from each other?
Describe the main building blocks for the sequence diagram and how they are represented on the model.
Suppose that we define the utility of a state sequence to be the maximum reward obtained in any state in the sequence. Show that this utility function does not result in stationary preferences...
Examine the data models that you created for Exercise D. How would the respective models change (if at all) on the basis of these corresponding new assumptions? Two patients have the same first and...
Why should you consider the storage formats that already exist in an organization when deciding on a storage format for a new system?
Search the Web to determine what existing vendors such as Oracle and Microsoft are doing with regard to NoSQL databases. Also, search to see what support such vendors are providing for Big Data data...
Based on the DFD fragments you developed in Chapter 6 and the structure charts from Chapter 10, develop a table of inputs along with the associated data couples and data fields for each input. Also,...
Go online and look at different companies in one of the industries mentioned in the case, noting which companies offer free wireless access and which ones do not. Break into small groups and...
Suppose that you are an analyst developing a new executive information system (EIS) intended to provide key strategic information from existing corporate databases to senior executives to help in...
Quinnipiac University is a four-year university in Hamden, Connecticut, with about 7400 students. The IT staff has to support academic functions- but, since the university has residence halls, the IT...
Locate a consumer products company on the Web and read its company description (so that you get a good understanding of the geographic locations of the company). Pretend that the company is about to...
Numerous browser features, add-ins, and other tools exist for blocking third-party cookies. Search the Web for block third-party cookies for xxx, and fill in the xxx with the name and version of your...
During the course of execution of a program, the processor will increment the contents of the instruction register (program counter) by one word after each instruction fetch, but will alter the...
A spring exhibits a force-versus-displacement characteristic as shown in Figure E2.11. For small deviations from the operating point x0, find the spring constant when x0 is (a) -1.4; (b) 0; (c) 3.5....
Consider the capabilities of the programming language and development tools used in your most recent programming or software development class. Are they powerful enough to implement developmental...
You have been selected to find the best client-server computing architecture for a Web-based order entry system that is being developed for L.L. Bean. Write a short memo that describes to the project...
This exercise concerns the expressiveness of decision lists (Section 18.5). a. Show that decision lists can represent any Boolean function, if the size of the tests is not limited. b. Show that if...
Consider the noisy-OR model for fever described in Section 14.3. Explain how to apply maximum-likelihood learning to fit the parameters of such a model to a set of complete data.
Calculate the size of the database that you created in question F. Provide size estimates for the initial size of the database as well as for the database in one year's time. Assume that the...
Computer control of a robot to spray-paint an automobile is accomplished by the system shown in Figure DP5.8(a) [7]. We wish to investigate the system when K = 1, 10, and 20. The feedback control...
Using your answer to question 7-2, describe an enterprise information system that will eliminate the silos. Would the implementation of your system require process reengineering? Explain why or why...
Define what is meant by a data store in a process model. How should a data store be named? What information about a data store should be stored in the CASE repository?
Consider the block diagram in Figure P3.21. (a) Verify that the transfer function is (b) Show that a state variable model is given by G(s) = Y(s, h,sta + ais + a 0 ao a y=[1 LE 0]x. Co FIGURE P3.21...
Create a Web page named repavg.html that simulates a large number of dice rolls and computes the average of the dice totals. The user should be able to enter a number of rolls in a text box and then...
Explain the relationship between a DFD context diagram and the DFD level 0 diagram.
1. How could Dell use each of the five basic SCM components? 2. How has Dell influenced visibility, consumer behaviour, competition and speed through the use of IT in its supply chain? 3. Explain the...
Design a chart of accounts for SDC. Explain how you structured the chart of accounts to meet the company's needs and operating characteristics. Keep total account code length to a minimum, while...
Write SQL data definition commands for each of the following queries: a. How would you add an attribute, Class, to the Student table? b. How would you remove the Registration table? c. How would you...
The following table shows some simple student data as of the date 06/20/2015: The following transactions occur on 06/21/2015: Student 004 changes major from Math to Business. Student 005 is deleted...
The Markov blanket of a variable is defined. a. Prove that a variable is independent of all other variables in the network, given its Markov blanket. b. Derive Equation (14.11).
For each of the following processes, suggest how an IS can improve the process. Specify if the improvement is due to improving an activity, improving data flow, improving control, implementing...
Consider XPs team-based programming approach in general and its principle of allowing any programmer to modify any code at any time in particular. No other development approach or programming...
Virtual Campus (VC) is a social media firm that specializes in creating virtual meeting places for students, faculty, staff, and others associated with different college campuses. VC was started as a...
Data loss prevention (DLP) was a technology mentioned in the case, and one that is garnering more and more attention from corporate security departments. Go online and research what DLP involves, and...
A second-order control system has the closed-loop transfer function T(s) = Y(s)/R(s). The system specifications for a step input follow: (1) Percent overshoot P.O. 5%. (2) Settling time Ts < 4s. (3)...
In Fig. 8-20, we see how Alice can send Bob a signed message. If Trudy replaces P, Bob can detect it. But what happens if Trudy replaces both P and the signature?
We outlined a flawed procedure for finding the most likely state sequence, given an observation sequence. The procedure involves finding the most likely state at each time step, using smoothing, and...
a. Depict full key functional dependencies, partial functional dependencies (if any), and transitive functional dependencies (if any) in the LANGUAGE SCHOOL Table. b. Show the result of normalizing...
The insatiable demand for everything wireless, video, and Web-enabled everywhere will be the driving force behind developments in telecommunications, networking, and computing technologies for the...
What symbols would you use to depict the following situations on a structure chart? A function occurs multiple times before the next module is invoked. A function is continued on the bottom of the...
Describe the shorthand representation of the structure of a relational database. Illustrate this technique by representing the database for Henry Books as shown in Chapter 1.
I have two very different stories regarding data models. First, when I worked with First American Corporation, the head of Marketing kept a data model for the marketing systems hanging on a wall in...
Develop a program specification for Module 4.2.5 (Calculate Dealer Cost) in minicase 1.
Where does the analyst find the information needed to create a structure chart?
The Prescriptions-R-X chain of pharmacies has offered to give you a free lifetime supply of medicine if you design its database. Given the rising cost of health care, you agree. Here's the...
Locking is not done explicitly in persistent programming languages. Rather, objects (or the corresponding pages) must be locked when the objects are accessed. Most modern operating systems allow the...
What are metadata? Why are they important to system developers?
Produce use case diagrams and a set of associated sequence diagrams for the DreamHome case study documented in Appendix A.
This exercise contains additional information in the form of deletion rules that will enable us to develop a Design-Specific ER diagram for the NCAA database in Exercise 18. a. Incorporate the above...
In any standard, such as RFC 822, a precise grammar of what is allowed is needed so that different implementations can interwork. Even simple items have to be defined carefully. The SMTP headers...
Investigate the complexity of exact inference in general Bayesian networks: a. Prove that any 3-SAT problem can be reduced to exact inference in a Bayesian network constructed to represent the...
1. Use computer magazines or the Internet to investigate one of these DBMSs: DB2, SQL Server, MySQL, Oracle, or Sybase. Then prepare a report that explains how that DBMS handles two of the following...
A Student object should validate its own data. The client runs this method, called validateData(), with a Student object, as follows: String result = student.validateData(); if (result == null) else...
Develop and test a Python program that determines how many images can be stored on a given size USB (flash) drive. The size of the USB drive is to be entered by the user in gigabytes (GB). The number...
Draw a class diagram for the course enrollment system completed in exercise 13. Be sure to use the correct notation for association classes.
Pretend that you are designing the new interface for a career services system at your university that accepts student rsums and presents them in a standard format to recruiters. Describe how you...
The shoulder joint of a robotic arm uses a DC motor with armature control and a set of gears on the output shaft. The model of the system is shown in Figure AP4.2 with a disturbance torque Td(s)...
What are the three key roles in any change management initiative?
IBM Credit was a wholly owned subsidiary of IBM responsible for financing mainframe computers sold by IBM. While some customers bought mainframes outright or obtained financing from other sources,...
Show that dominant strategy equilibrium is Nash equilibrium, hut not vice versa.
What formula do you use to calculate the payback period?
The Diffie-Hellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (719, 3 191). Bob responds with (543). Alice's secret number, x, is 16. What is the...
Down Town Videos is a chain of 11 video stores scattered throughout a major metropolitan area in the Midwest. The chain started with a single store several years ago and has grown to its present...
Pretend that the admissions office in your university has a Web-based application so that students can apply for admission online. Recently, there has been a push to admit more international students...
Assuming that the county has just changed from the system in Figure 7-12 to the one in Figure 7-13, which of your answers in questions 2 and 3 do you think is better? Justify your answer.
What is a SWOT analysis? Prepare a SWOT analysis of your school or your employer.
Visit a restaurant or the college food service and talk to a server (or talk with a friend who is a food server). Ask about the external events, temporal events, and data entities or objects, as you...
1. The log shown in Figure 7-19 includes four transactions that completed successfully. For each of the four transactions, list the transaction ID and the table(s) modified. Also, list whether the...
Assume that the transaction summary report for the RMO order-entry subsystem (see in Figure) contains a listing of every order that was created during a date range entered by the user. The report...
In Chapter 7, you developed a use case diagram, a domain model class diagram, and detailed documentation for three use cases. In Chapter 11 you developed a three layer architectural solution and CRC...
What is stakeholder analysis? Discuss three stakeholders that would be relevant for most projects.
A team of developers is considering including "warehouse" as an entity in its data model. The company for whom they are developing the system has just one warehouse location. Should "warehouse" be...
The following attributes represent data about a movie copy at an online video rental service. Each movie is identified by a movie number and has a title and information about the director and the...
MonsterMed Inc. (MMI) is an online pharmaceutical firm. MMI has a small systems staff that designs and writes MMI's customized software. The data center is installed in the basement of its two-story...
At the end of 1997, Oxford Health Plans posted a $120 million loss to its books. The company's unexpected growth was its undoing because the system, which was originally planned to support the...