Service-oriented architecture (SOA) is a recent approach to systems development and implementation that has much in common (and some differences, as well) with enterprise architecture. Go online and...
Identify an organization that handles large, sporadic data loads. For example, organizations that have implemented data warehouses may have large data loads as they populate their data warehouses....
Monthly usage rate for a certain part is 15,000 units. The part is produced in batches and its manufacturing costs are estimated to be $7.40. Holding cost is 20% of piece cost. Currently the...
For your answers to the following Problems and Exercises from prior chapters, transform the EER diagrams into a set of relational schemas, diagram the functional dependencies, and convert all the...
How is the object approach different from the data and process approaches to systems development?
Explain the server-based architecture.
Define a function named Rotate that takes a string as input and returns a copy of that string in which all characters are rotated one position to the left. This means that the second character should...
What is the purpose of a request for proposal (RFP)? How does it differ from the RFI?
What would you say if one of the three principals were to ask you at this point, Is it worthwhile for me to even consider this idea anymore? Justify your answer. Without more data, you cannot make a...
Repeat Exercise 20.1, this time plotting the values of P (D m+1 = limeh MAP) and P (D m+1 = limehML).
This chapter presented the solutions for the Cancel an order use cases. It also presented a partial solution for Create new phone order. Complete the solution for the Create new phone order use case...
Visit the Web sites of the Agile Alliance (www. agilealliance.com/home) and Agile Modeling (www. agilemodeling.com/). Find some articles on project management in an agile environment. Summarize key...
Prepare a training plan that includes both what you would train and how the training would be delivered for the system described in Exercise E.
Pretend that you are a project manager for a bank, developing software for automated teller machines. Develop an online help system.
Using OLAP Query 1 shown in Figure 9.11 (based on data from Figure 9.7) as a starting point, give an example that illustrates a drill up operation.
Explain the distinction between identifying and non-identifying relationships.
What is the most popular kind of database today? Provide three examples of products that are based on this technology.
What offerings are available in the ERP marketplace today that was not available when the companies mentioned in the case first started investing in the technology? What new functionality do these...
Write SQL queries to answer the following questions: a. Which students are enrolled in Database and Networking? b. Which instructors cannot teach both Syst Analysis and Syst Design? c. Which courses...
Suppose that you are the project manager for a new library system for your university. The system will improve the way in which students, faculty, and staff can search for books by enabling them to...
1. How has Amazon used technology to revamp the bookselling industry? 2. Is Amazon using disruptive or sustaining technology to run its business? 3. How is Amazon using intranets and extranets to run...
Figure 7-28 lists the impacts of SAP on an organization. Which of these impacts would affect the athletics department?
Using the design class diagram you developed in Chapter 12 for the Down Town Videos rental system, develop an implementation and testing plan. Specify the order in which classes and their methods...
List and describe the three primary hardware components of a system.
Compare and contrast the online help resources at two different Web sites that enable you to perform the same function (e.g., make travel reservations, order books).
Shamrock Foods is a major food distributor centered in Tralee, Ireland. Originally a dairy cooperative, Shamrock branched into various food components (dried milk, cheese solids, flavorings [or...
Consider costs of a system in light of the five components: costs to buy and maintain the hardware; costs to develop or acquire licenses to the software programs and costs to maintain them; costs to...
List the IDs and names of all products that cost less than the average product price in their product line. List the IDs and names of those sales territories that have at least 50 percent more...
Police officers in San Jose, California, experienced a number of problems with a new mobile dispatch system that included a Windows-based touch-screen computer in every patrol car. Routine tasks were...
Examine the physical data model that you created in question F. Develop a clustering and indexing strategy for this model. Describe how your strategy will improve the performance of the database.
List the balance characteristics of the customers who have made purchases during the current invoice cyclethat is, for the customers who appear in the INVOICE table. The results of this query are...
Show the PRODUCT table from Figure 3.33 in chapter 3 accompanied by a PRODUCTNAME_INDEX table, using the ProductID value as the index pointer.
The rapid development face-off was a competition between rapid application development (RAD) teams from the leading consulting firms in the United States. The goal was to see which team could develop...
Describe the basic process of user interface design.
This chapter presented the solutions for two use cases for RMO Look up item availability and Process new order. Design three layer solutions for two more use cases, Create new order and Record order...
What is a source code control system? Why is such a system necessary when multiple programmers build a program or system?
Discuss why testing is so essential to the development of the new system.
In what ways is starting a data modeling project with a packaged data model different from starting a data modeling project with a clean sheet of paper?
For each process, specify an IS that supports the process and the first three steps of the procedure that links that IS to the process. a. IS: b. IS: c. IS: d. IS:
Given the set of functional dependencies F {fd1, fd2, fd3, fd4, fd5, fd6, fd7, fd8, fd9, fd10} where: a. Construct the universal relation schema that includes (i.e., preserves) the set of functional...
Suppose you lose your company laptop at an airport. What is more valuable the laptop or the data? Under what circumstances should you now focus on updating your resume?
Describe the steps used to create a sequence diagram.
A three-table database design for the data in the spreadsheet in Figure 5-17 is as follows: Choir Member (Last Name, First Name, Email, Phone, Part) Musical Work (Name of Work, Composer) Check Out...
Review Figure 11-6 and answer the following questions based on it. a. What has happened between Input and Input'? b. Assume that the values associated with each of the keys (kl, k2, etc.) are counts....
Consider the following C code fragment: if (EAX == 0) EBX = 1; else EBX = 2; Write an equivalent NASM code fragment.
What type of high-level business rule can be stated by an ERD? Give two examples.
For the simple pendulum shown in Figure CP2.7, the nonlinear equation of motion is given by where L = 0.5 m, m = 1 kg, and g = 9.8 m/s2. When the nonlinear equation is linearized about the...
A lateral beam guidance system has an inner loop as shown in Figure CP10.7, where the transfer function for the coordinated aircraft is [26] Consider the PI controller (a) Design a control system to...
We wish to determine the execution time for a given program using the various pipelining schemes discussed in Section 13.5. Let N = number of executed instructions D = number of memory accesses J =...
For the circuit of Figure P2.39, determine the transform of the output voltage V0(s). Assume that the circuit is in steady state when t Figure P2.39 Model of an electronic circuit. IF 2 H Ion 2 4
In the traditional UNIX file access model, UNIX systems provide a default setting for newly created files and directories, which the owner may later change. The default is typically full access for...
Compare break-even analysis and sensitivity analysis.
Create a data dictionary similar to the metadata table shown in Table 1-1 in Chapter 1 to document your choices. For each table in the relational schema you developed earlier, provide the following...
Explain how this team uses the shared whiteboard to generate minutes. What are the advantages of this technique?
Fitchwood is a relatively small company (annual premium revenues less than $1B per year) that insures slightly more than 500,000 automobiles and about 200,000 homes. For what types of purposes might...
For a paper processing plant, it is important to maintain a constant tension on the continuous sheet of paper between the wind-off and wind-up rolls. The tension varies as the widths of the rolls...
Create a data model for one of the processes in the end-of-chapter Exercises for Chapter 4. Explain how you would balance the data model and process model.
Many multinational organizations provide global Web-based e-learning courses to their employees. First, develop a set of nonfunctional requirements for such a system. Consider the operational...
Suppose that you are the project leader for the development of a new Web-based course registration system for your university that replaces an old system in which students had to go to the coliseum...
Consider the torsional mechanical system in Figure CP4.7(a). The torque due to the twisting of the shaft is -kθ; the damping torque due to the braking device is -bθ; the...
Show how the recursive multiplication algorithm computes XY, where X = 1234 and Y = 4321. Include all recursive computations.
1. Design a database for Ray. He is interested in movie DVDs and wants to keep information on movies, actors, and directors in a database. The only user is Ray, and he needs to produce the following...
Suppose that you are the project leader for the development of a new airline reservation system that will be used by the airline's in-house reservation agents. The system will replace the current...
Not all versions of this database include referential integrity constraints for all foreign keys. Use whatever commands are available for the RDBMS you are using, investigate if any referential...
How can the key and foreign key constraints be enforced by the DBMS? Is the enforcement technique you suggest difficult to implement? Can the constraint checks be executed in an efficient manner when...
Explain the difference between user documentation and system documentation.
3D printing requires a CAD data model, a 3D printer, and appropriate ink. Explain how a 3D printer vendor could use the business model of the Apple iTunes store to facilitate the sales of its...
Describe how Groupons IS supports this process.
The development of robotic microsurgery devices will have major implications on delicate eye and brain surgical procedures. The microsurgery devices employ feedback control to reduce the effects of...
A welding torch is remotely controlled to achieve high accuracy while operating in changing and hazardous environments [21]. A model of the welding arm position control is shown in Figure DP7.4, with...
Briefly describe how visual and audio databases can be used by companies today.
Which conditions must hold in order for a table to be a relation?
Using the PERT diagram in Figure 3.EX2 to determine answers: a. What activities can you expedite to complete the project a week ahead of schedule? b. Suppose Activity E is the least costly activity...
Write out a general algorithm for answering queries of the form P (Causee), using a naive Bayes distribution. You should assume that the evidence e may assign values to any subset of the effect...
An e-business operates a high-volume catalog sales center. Through the use of clustered servers and mirrored disk drives, the data center has been able to achieve data availability of 99.5 percent....
Robyn Cucurullo is developing a social networking app for tablet computers. She has the following stages completed so far: a. Create a table similar to the one in Figure 3.27. b. For Week 3,...
Select two pairs from the above list. For each pair of companies, answer the following questions: a. How do the companies market segments differ? b. How do their competitive pressures differ? c. How...
Examine the integrated log file shown in Figure 10-19. a) Identify the stages in this apparent attack. b) For each stage, describe what the attacker seems to be doing? c) Decide whether the actions...
Use STROBE to analyze Anna's written observations about Hy Perteks. Now compare your analysis with Hy's interview. Use two paragraphs to discuss whether STROBE confirms, negates, reverses, or serves...
Using the system sequence diagrams you developed in Chapter 7, develop a list of inputs and outputs, along with the necessary data fields, for the system.
The following locking calls are made by a collection of processes. For each call, tell what happens. If a process fails to get a lock, it blocks. (a) A wants a shared lock on bytes 0 through 10. (b)...
Describe a potential human safeguard for each of the vulnerabilities you identified in your answer to question 12-3. a. CBI b. Your university c. A neighborhood accounting firm
The processing of third-party cookies is hidden; we dont know what is being done behind the scenes with the data about our own behavior. Because there is so much of it and so many parties involved,...
Why is it important to understand the initial and projected size of a database during the design phase?
Explain how each of the four non routine skills-abstract reasoning, systems thinking, collaboration, and experimentation- can be used by an employee at Singing Valley to develop solutions for Singing...
1. Indicate the changes you need to make to the design of the Premiere Products database to support the following situation. A customer is not necessarily represented by a single sales rep but can be...
What is normalization?
Describe a potential data safeguard for each of the vulnerabilities you identified in your answer to question 12-3. If no data safeguard is appropriate to a business, explain why. a. CBI b. Your...
Produce an object-oriented database design for the Well meadows Hospital case study presented in Appendix B.3. State any assumptions necessary to support your design.
When transferring data from RAM to a network interface, pinning a page can be used, but suppose that system calls to pin and unpin pages each take 1 sec. Copying takes 5 bytes/nsec using DMA but 20...
1. What role do global networks play in the effective implementation of JIT? 2. What role does the "Dealer Daily" system play in Toyota's implementation of a GIS? 3. What is the function of Vehicle...
What is the transmission rate of Ethernet LANs? For a given transmission rate, can each user on the LAN continuously transmit at that rate?
Consider two car repair shops. One is newly renovated, has a bright, clean reception/office area at the front of the shop and standard company overalls for all employees. It has just invested in a...
Create requirements and the ER diagram for a scenario with two entities (both with several attributes) involved in a relationship with exact minimum and maximum cardinalities.
Consider the spacecraft single-axis attitude control system shown in Figure CP7.8. The controller is known as a proportional-derivative (PD) controller. Suppose that we require the ratio of KP/KD =...
Is the information system you proposed in your answer to question 3 of Collaboration Exercise 7 an application of CRM, ERP, or EAI? If so, which one and why? If not, explain why not.
A control system with PI control is shown in Figure AP7.12. (a) Let KI/KP = 0.2 and determine KP so that the complex roots have maximum damping ratio. (b) Predict the step response of the system with...
a. Depict full key functional dependencies, partial functional dependencies (if any), and transitive functional dependencies (if any) in the HEALTH CENTER Table. b. Show the result of normalizing the...
Analyze the spreadsheet shown in Figure 5-17and list all of the problems that occur when trying to track the assignment of sheet music using this spreadsheet.
If you worked at Google, what type of city might you want to pursue for the initial trial and why?