The Fibonacci sequence is defined as follows: a. Could this sequence be used to establish a buddy system? b. What would be the advantage of this system over the binary buddy system described in this...
One obvious example for SM machines is for the machines to report operational status, say speed, temperature, fuel usage, and so on, depending on the type of machine, to a Chatter or other SM site....
The speed control of a high-speed train is represented by the system shown in Figure AP5.4 [17]. Determine the equation for steady-state error for K for a unit step input r(t). Consider the three...
Refer to the Real World Case on BPs IT transformation in the chapter. Dana Deasy discusses the long-term benefits of embedded IT while noting the need to centralize the department in the short term....
1. Using your local hospital as an example, answer the following questions: a. Where might information silos exist if an ERP system is not being used? b. Should the hospital pursue more efficient...
Use Google or Bing to search for the phrase what is a business analyst? Investigate several of the links that you find and answer the following questions. a. What are the primary job responsibilities...
The attack shown in Fig. 8-47 leaves out one step. The step is not needed for the spoof to work, but including it might reduce potential suspicion after the fact. What is the missing step?
For each of the SQL aggregate functions sum, count, min and max, show how to compute the aggregate value on a multiset S1 S2, given the aggregate values on multisets S1 and S2. Based on the above,...
On the Internet, small businesses have become big business, and a really big business, Microsoft, wants a piece of the action. The companys Small Business Center (www.microsoft.com/smallbusiness) is...
Consider processing the following SQL projection query: SELECT DISTINCT E.title, E.ename FROM Executives E You are given the following information: Executives has attributes ename, title, dname, and...
A startup Internet company has generated the following cash balance for the first six years of its IS projects: -$250,000, -$180,000, $225,000, $340,000, $410,000, and $425,000. Using the NPV...
Rewrite the function shown in Figure so that it is no longer vulnerable to a stack buffer overflow. Address gets (str2) gets (str2) Value of bffffbf4 34fcffbf 4. 01000000 34fcffbf argv bffffbf0...
Why is a process model typically composed of a set of DFDs? What is meant by decomposition of a business process?
Consider the following extension to the tree-locking protocol, which allows both shared and exclusive locks: A transaction can be either a read-only transaction, in which case it can request only...
What potential security problems do you see in the increasing use of intranets and extranets in business? What might be done to solve such problems? Give several examples.
How does implementing a maintenance change differ from developing a new system? How are they similar?
Describe how you would denormalize the model that you created in question E. Draw the new physical model on the basis of your suggested changes. How would performance be affected by your suggestions?
Describe the differences in the meanings between the two structure charts shown. How have the symbols changed themeanings? Books by Author Books by Author Author Author, " orgtock r Book Book Find...
Are companion viruses (viruses that do not modify any existing files) possible in UNIX? If so, how? If not, why not?
The case investigation undergoes several states in the Jones Legal Investigation Services system. The case investigation is first established when the attorney requests that an investigation be...
You work for a grocery chain that always has many customers in the stores. To facilitate and speed checkout, the company wants to develop self-service checkout stands. Customers can check their own...
A multi-loop block diagram is shown in Figure E3.9.The state variables are denoted by x1 and x2. (a) Determine a state variable representation of the closed-loop system where the output is denoted by...
Let's consider what dynamic scheduling might achieve here. Assume a microarchitecture as shown in Figure 2.42. Assume that the ALUs can do all arithmetic ops (MULTD, DIVD, ADDD, ADDI, SUB) and...
Review the description of the South Dakota workers' compensation project in Your Turn 1-3. There were legal hurdles to implementing a digital solution to handle workers' compensation claims. One...
In Chapter 7 you developed a use case diagram, a class diagram, and a system sequence diagram for the use cases Recording a traffic ticket and Scheduling a court date. Based on those solutions or...
Consider the graphic symbol for the S-R flip-flop in Figure 20.27. Add additional lines to depict a D flip-flop wired from the S-R flip flop. Figure 20.27 Basic Flip-Flops Name Graphical Symbol Truth...
You are going to design a database for your cooking club to track its recipes. Identify the database characteristics most important to you in choosing a DBMS. Which of the database management systems...
Use a query to compute the average purchase amount per product made by each customer. CUS CODE CUS BALANCE Total Purchases Number of Purchases Average Purchase Amount 10011 0012 10014 10015 10018...
Project Planning Projects have many dependencies, any of which could become points of failure. Without the cooperation or input from even one vital resource, a project may fail to meet its...
Compare and contrast system testing and acceptance testing.
What is a database schema? What information does it contain?
Give an alternative representation of bank information containing the same data as shown in figure but using attributes instead of subelements. Also give the DTD for this representation. A-101...
Figure is an activity diagram for the use case Return books in the university library system. Do the following: a. Develop a first-cut sequence diagram, which only includes the actor and problem...
Design a storyboard for Exercise I in Chapter 5.
What would be the baseline performance (in cycles, per loop iteration) of the code sequence in Figure 2.35 if no new instruction execution could be initiated until the previous instruction execution...
List and discuss three ways to ensure the overall quality of a structure chart.
A driver's license bureau maintains a database of licensed drivers. State whether each of the following represents data or metadata. If it represents data, state whether it is structured or...
Develop a unit test plan for a Web site that enables you to perform some function (e.g., make travel reservations, order books).
A single-station assembly machine is to be considered as an alternative to the dial-indexing machine in Problem 17.4. Use the data given in the table for that problem to determine (a) Production...
The following problem is based on a suggested illustration of I/O mechanisms in [ECKE90] (Figure 7.22): Two women are on either side of a high fence. One of the women, named Apple-server, has a...
Let R = (A, B) and S = (A, C), and let r(R) and s(S) be relations. Using the special constant null, write tuple-relational-calculus expressions equivalent to each of the following: a. r 1 s b. r 1 s...
Suppose each record in a file were connected to the prior record and the next record in key sequence using pointers. Thus, each record might have the following format: Primary key, other attributes,...
Explain the client-based architecture.
Pretend that you have been charged with the task of redesigning the interface for the ATM at your local bank. What type of prototyping and interface evaluation approach would you recommend?
In the text, we described a multithreaded Web server, showing why it is better than a single-threaded server and a finite-state machine server. Are there any circumstances in which a single-threaded...
a. Suppose we send into the Internet two IP datagrams, each carrying a different UOP segment. The first datagram has source IP address AI, destination IP address B, source port PI , and destination...
Review the initial Holiday Travel Vehicle functional requirements 2-72-8 in Figure. Now, based on your study of UC-5 in Figure, revise the list of functional requirements to provide more clarity and...
A negative feedback control system is depicted in Figure CP4.8. Suppose that our design objective is to find a controller Gc(s) of minimal complexity such that our closed-loop system can track a unit...
Investigate the Web site for Rational Software (www-306.ibm.com/software/rational/) and its repository of information about Unified Modeling Language (UML). Write a paragraph news brief on the...
In Oracle, what is a database schema?
Describe the following: TCP/IP, Router, HTML, HTTP, and URL.
The Pine Valley databases for this textbook (one small version illustrated in queries throughout the text and a larger version) are available to your instructor to download from the text's Web site....
The Avemar ferry, shown in Figure PI0.9(a), is a large 670-ton ferry hydrofoil built for Mediterranean ferry service. It is capable of 45 knots (52 mph) [29]. The boat's appearance, like its...
Distinguish between the two-tier, three-tier, and n-tier client-server architectures.
Figure 7-8 lists problems with the Procurement process at CBI. Which of these would apply to the university? Which would not? What are some procurement problems that might be unique to an athletics...
In the chapter we noted that attributes with many different possible values can cause problems with the gain measure. Such attributes tend to split the examples into numerous small classes or even...
A start-up is working on an online personal financial management system. The goal of the system is to provide the users an opportunity to obtain item-level purchase data from as many sources as...
What is meant by a concatenated identifier?
Using 32 bits to represent integers, the largest positive value that can be represented is 231-1, whereas the smallest negative value is 231. Why aren't these ranges symmetric? That is, why is there...
1. Draw a context DFD. 2. Draw an event-partitioned DFD. 3. Draw any required process decomposition DFDs. Refer to the description of the Real Estate Multiple Listing Service system in the Chapter 5...
Read through the following dialog, which shows a user trying to place an order with the system. Critique the dialog in terms of ease of learning and ease of use. User: I want to order a product....
Trace the execution of the backward chaining algorithm in figure when it is applied solves the crime problem. Show the sequence of values taken on by the goals variable, and arrange them into a tree.
Consider the network fragment shown below. x has only two attached neighbors, wand y. w has a minimum-cost path to destination u (not shown) of 5, and y has a minimum-cost path to u of 6. The...
A high-speed train is under development in Texas [21] with a design based on the French Train a Grande Vitesse (TGV). Train speeds of 186 miles per hour are foreseen. To achieve these speeds on tight...
Consider the following pseudo-WEP protocol. The key is 4 bits and the IV is 2 bits . The IV is appended to the end of the key when generating the keystream. Suppose that the shared secret key is 10...
Develop the interface standards (omitting the interface template) for the DFD in Exercise I in Chapter 5.
Answer the following questions: 1. Describe how a typical lock manager is implemented. Why must lock and unlock be atomic operations? What is the difference between a lock and a latch? What are...
What information is found on the physical DFD that is not included on the logical DFD?
Changing technology has, for centuries, eliminated the need for certain products and services and created the need for new products and services. What is new, today, however, is the rapid pace at...
Refer to the description of the Real Estate Multiple Listing Service system in the case studies of Chapter 5 and the DFDs you developed in the case studies for Chapter 6. Develop a structure chart...
Explain the client-server architecture.
Consider an organization with which you frequently interact, such as a bank, credit card company, university, or insurance company, from which you receive several computer-generated messages, such as...
How does a pizza shops Procurement process differ from CBIs? What do you believe is the corporate strategy of your favorite pizza franchise? What are the objectives and measures of its Procurement...
In Your Turn 14-3 you were asked to draw a use case diagram for the campus housing system. Select one of the use cases from the diagram and create a sequence diagram that represents the interaction...
Suppose that Anns utilities for cherry and lime candies are c A and l A, whereas Bobs utilities are c B and l B. (But once Ann has un-wrapped a piece of candy. Bob wont buy it.) Presumably, if Bob...
Using the output shown in Figure as your guide, generate the listing of customer purchases, including the subtotals for each of the invoice line numbers. CUS CODE INV NUMBER P DESCRIPT Units Bought...
Metro Marketers, Inc., wants to build a data warehouse for storing customer information that will be used for data marketing purposes. Building the data warehouse will require much more capacity and...
The data used for Figure can be viewed as being generated by h5. For each of the other four hypotheses, generate a data set of length 100 and plot the corresponding graphs for P (hi?d1... dm) and P...
Define what is meant by an attribute in a data model. How should an attribute be named? What information about an attribute should be stored in the CASE repository?
Explain how a test case relates to a test plan.
Explain three important user interface design principles.
Net Suite Inc. is a leading provider of on-demand enterprise applications, including CRM as featured in the case. Other important players in this market include Salesforce.com and Siebel on Demand....
Increased track densities for computer disk drives necessitate careful design of the head positioning control [1]. The loop transfer function is Plot the frequency response for this system when K =...
The ability to accurately forecast demand is one of the major issues involved in the efforts discussed in the case. Go online and research which technologies companies are employing today to improve...
Define what is meant by an entity in a data model. How should an entity be named? What information about an entity should be stored in the CASE repository?
Summarize the distinctions between the analysis phase and the design phase of the SDLC.
Define the five basic relational algebra operations. Define the Join, Intersection, and Division operations in terms of these five basic operations.
Which phase in the SDLC is the most important?
Give three examples of likely problems when operational data are integrated into the data warehouse.
Assume that you are an employee of a consultancy company that specializes in the analysis, design, and implementation of database systems. A client has recently approached your company with a view to...
What is the meaning of analysis? What is the purpose of the analysis phase of the SDLC?
Review the initial Holiday Travel Vehicle functional requirements 2-3-2-6 in Figure 3-3. Now, based on your study of UC-4 in Figure, revise the list of functional requirements to provide more clarity...
Whitlock Department Stores runs a multiuser DBMS on a LAN file server. Unfortunately, at the present time, the DBMS does not enforce concurrency control. One Whitlock customer had a balance due of...
Consider a system in which bus cycles takes 500 ns. Transfer of bus control in either direction, from processor to I/O device or vice versa, takes 250 ns. One of the I/O devices has a data transfer...
What distinguishes client/server computing from any other form of distributed data processing?
An RL circuit is shown in Figure PI 1.21. (a) Select the two stable variables and obtain the vector differential equation where the output is v0 (t). (b) Determine whether the state variables are...
Consider a multidatabase system in which it is guaranteed that at most one global transaction is active at any time, and every local site ensures local serializability. a. Suggest ways in which the...
Define what is meant by a relationship in a data model. How should a relationship be named? What information about a relationship should be stored in the CASE repository?
Describe the types of cultural and political requirements and how they may influence architecture design.
Suppose the password file of a system is available to a cracker. How much extra time does the cracker need to crack all passwords if the system is using the Morris-Thompson protection scheme with...