For the ER diagrams created in the following exercises, map the ER diagram into a relational schema and do the following: a. For exercise E2.2a, show several records in each relation and mark those...
Briefly describe the process of developing data warehouse front-end (BI) applications.
An organization has a database server with three disk devices. The accounting and payroll applications share one of these disk devices and are experiencing performance problems. You have been asked...
Draw the new process using BPMN.
Consider the feedback control system in Figure CP7.7. We have three potential controllers for our system: 1. Gc(s) = K (proportional controller) 2. Gc(s) = K/s (integral controller) 3. Gc(s) = K(1 +...
Summarize the advantages to this team of using Lync.
What do you need to do if a tutor signs up and wants to tutor in both reading and math? Draw the new ERD, create new relations, and write any SQL statements that would be needed to handle this...
Continue the process of normalizing the Client and Property Rental Owner 1NF relations shown in Figure 14.13 to 3NF relations. At the end of this process check that the resultant 3NF relations are...
Lasers have been used in eye surgery for more than 25 years. They can cut tissue or aid in coagulation [17]. The laser allows the ophthalmologist to apply heat to a location in the eye in a...
A simple unity feedback control system has a process transfer function The system input is a step function with an amplitude A. The initial condition of the system at time t0 is y(t0) = Q, where y(t)...
Using OLAP Query 1 shown in Figure 9.11 (based on data from Figure 9.7) as a starting point, give an example that illustrates a drill down operation.
Make a Facebook cause (www.facebook.com/causes). Invite several friends to join. Using paper and pencil or diagramming software, make a BPMN diagram of the three or four key activities in this...
A unity negative feedback control system has the loop transfer function (a) Determine the percent overshoot and settling time (using a 2% settling criterion) due to a unit step input. (b) For what...
a. For the quicksort implementation in this chapter, what is the running time when all keys are equal? b. Suppose we change the partitioning strategy so that neither i nor j stops when an element...
An interesting application of a PLA is conversion from the old, obsolete punched cards character codes to ASCII codes. The standard punched cards that were so popular with computers in the past had...
Discuss some of the languages that are associated with Internet application development. Classify these languages according to the functionality they provide for each application. It is not necessary...
Major appliances are assembled on a production line at the rate of 55 per hour. The products are moved along the line on work pallets (one product per pallet). At the final workstation the finished...
Imagine that the storage system is now configured to contain two 40 GB disks in a RAID 0 array; that is, the data is striped in blocks of 8 KB equally across the two disks with no redundancy. a. How...
After viewing the Web sites, and based on your reading of the chapter, write a 2 page paper that describes how an ERP can connect and integrate the revenue, expenditure, human resources/payroll, and...
Create a BPMN diagram of your teams weekly procurement process.
A system has the second-order characteristic equation s2 + as + b = 0, where a and b are constant parameters. Determine the necessary and sufficient conditions for the system to be stable. Is it...
Describe Porter's Five Forces Model and explain each of the five forces.
From the salesforce.com site, find three interesting Chatter applications other than General Electrics. Summarize those applications.
Chapter 1 explained four non routine cognitive skills: abstract reasoning, systems thinking, collaboration, and experimentation. Explain how implementing the new Procurement process at CBI will...
1. Identify the value chain involved in a obtaining a new bicycle from winter borne Custom Bicycles. Can you identify the primary activities that create value for the customer when purchasing a new...
How does the data storage trend affect your university? What types of data are growing the fastest? Of these, what amount is generated by students? By classroom activities? By administration? By...
How long had each student studied in the adult literacy program? Based on the relations shown in Figure 6-12. The database tracks an adult literacy program. Tutors complete a certification class...
Network Effects, Increasing Returns, and Lock In 1. How do the challenges faced by Stantec differ from those faced by other industries? 2. What are the implications of this case for companies that...
Amazon.com offers cloud services known as Amazon Web Services (AWS). Within the AWS offering is a set of services for accessing Dynamo. Search the Web for the term AWS Dynamo cases and find two...
Produce use case diagrams and a set of associated sequence diagrams for the University Accommodation Office case study documented in Appendix B.1.
Consider the ER diagram of Figure 5.5. State meaningful semantics for additional binary relationships among the entity types in the diagram and update the ER diagram accordingly with full...
Surf the Internet for information about the Department of Homeland Security. Examine the available information, and comment on the role of information technologies in the department.
Instead imagine that the storage system is configured to contain two 40 GB disks in a RAID 1 array; that is, the data is mirrored across the two disks. Use queuing theory to model this system for a...
Explain the difference between a static Web site and a dynamic one. What are the characteristics of a dynamic Web site that enable it to better support the development of e-business?
Create a view consisting of the Employee and Department tables without the address, DOB, and sex attributes.
High TouchHigh Tech 1. What challenges are created when providing anywhere, anytime services? 2. What business and technology issues would be faced by an organization that wants to have a complete...
1. How does Miller fit the profile of the average fraud perpetrator? 2. How does he differ? 3. How did these characteristics make him difficult to detect?
Search the Web for the term 3D printing vendors and identify three vendors that your team thinks represent excellent investment opportunities. Explain why you chose each.
What does this MIS class do differently than other classes? Maybe the assignments are a bit different, maybe the instructor does some things a little differently. What if a university instructional...
Adams, Ives, and Scott Incorporated is an agency that specializes in representing clients in the fields of sports and entertainment. Given the nature of the business, some employees are given a...
Given your answers to questions 2 and 3, a. What will be the function and goals of the Operations group (see Figure 11-1)? b. What will be the function and goals of the Development group? What job...
Using the Hotel schema given at the start of the Exercises at the end of Chapter 4, determine whether the following queries are semantically correct: (a) SELECT r.type, r.price FROM Room r, Hotel h...
Why did the ordering pattern between the suppliers in the supply chain evolve the way it did?
Map the ER diagram created in exercise E2.3 into a relation. Show several records in the mapped relation.
Locate three sites on the Web that have interactive database systems attached to them. Evaluate the functionality of each site and discuss how its interactive database system is likely to affect that...
The BusyB Company wants to store data about employee skills. Each employee may possess one or more specific skills and several employees may have the same skill. Include the following facts in the...
The vehicle Rover has been designed for maneuvering at 0.25 mph over Martian terrain. Because Mars is 189 million miles from Earth and it would take up to 40 minutes each way to communicate with...
Contrast the following terms: a. Two-tier architecture; three-tier architecture b. Fat client; thin client c. ODBQJDBC d. SOAP; XSLT e. SQL; XQuery f. Web services; SOA
Describe a potential technical safeguard for each of the vulnerabilities you identified in your answer to question 12-3. a. CBI b. Your university c. A neighborhood accounting firm
Match each of the following terms with the most appropriate definition: client/server system a. a client that is responsible for processing, including application logic and presentation logic...
Write SQL commands for the following: a. Create two different forms of the INSERT command to add a student with a student ID of 65798 and last name Lopez to the Student table. b. Now write a command...
Active suspension systems for modern automobiles provide a comfortable firm ride. The design of an active suspension system adjusts the valves of the shock absorber so that the ride fits the...
a. Show the dimension EMPLOYEE (with all of its records) if the Type 1 option for handling slowly changing dimensions is applied. b. Show the dimension EMPLOYEE (with all of its records) if the Type...
The four-wheel-steering automobile has several benefits. The system gives the driver a greater degree of control over the automobile. The driver gets a more forgiving vehicle over a wide variety of...
Explain how 3D printing could be used to enable customers to customize their own products.
Design an algorithm that generates a maze that contains no path from start to finish but has the property that the removal of a prespecified wall creates a unique path.
a. Develop a context diagram and a level 0 DFD of the acquisition/payment system at Oriental Trading. b. Prepare a document flowchart to document the acquisition/payment system at Oriental Trading.
Briefly describe the transformation process.
Search the Web for the term 3D printing examples and identify five applications that your team thinks are the most exciting, have the most potential, or represent the greatest opportunity. Explain...
Examine the documentation sets of Microsoft SQL Server, Oracle, and IBMs DB2 system to identify their support for the following: (a) Clientserver architecture (b) Web services (c) Service-oriented...
a. Draw a system flowchart of the billing operations, commencing with the computer preparation of the meter reading forms and ending with the mailing of customer bills. b. Draw a system flowchart...
Create requirements and the ER diagram for a scenario with two entities (both with several attributes) involved in two separate relationships.
This exercise is based on the three Presentation Layer ER diagrams that follow. a. Describe what is reflected by the entity types and relationship types in Presentation Layer ER diagram number 1. In...
The athletics director buys sports equipment from a supplier with a well-implemented ERP. What advantages are there for your school to buy from a supplier with an ERP system? You might expect to see...
What is the average length of time a student stayed (or has stayed) in the program?
During the Sarbanes-Oxley audit of a financial services company, you note the following issues. Categorize each of them into the area to which they belong: IT change management, logical access to...
Summarize the advantages to this team of using SharePoint.
Write a "carpet bombing" program in CodeBlue that zeros out all of memory (with the possible exception of the program locations).
What are the advantages and disadvantages of horizontal and vertical partitioning?
What is data quality, and why is it important?
Where is the IS? What would more data allow? What data are most needed?
a. Identify and discuss the basic factors of communication that must be considered in the presentation of the annual report. b. Discuss the communication problems a corporation faces in preparing the...
This project requires you to perform a systems analysis and then design a system solution using database software. Ace Auto Dealers specializes in selling new vehicles from Subaru in Portland,...
What are the objectives of each process in Questions 1 and 2? Label each as either an effective or efficient objective.
The Radisson Diamond uses pontoons and stabilizers to damp out the effect of waves hitting the ship. The block diagram of the ship's roll control system is shown. Determine the feedback gains K2 and...
You take a new job as a database administrator at an organization that has a globally distributed database. You are asked to analyze the performance of the database, and as part of your analysis, you...
Consider the feedback system shown in Figure CP7.1, where For what value of K is ζ = 0.707 for the dominant closed-loop poles? Go- G(s)2
Consider again the system of Example 11.7 when we desire that the steady-state error for a ramp input be zero and the roots of the characteristic equation be s = -2 j2 and s = -20.
The attitude control system of a space shuttle rocket is shown in Figure DP6.4 [17]. (a) Determine the range of gain K and parameter m so that the system is stable, and plot the region of stability....
Explain how 3D printing changes the economics of spare part manufacturing, inventory, and shipping.
Using the rlocus function, obtain the root locus for the following transfer functions of the system shown in Figure CP7.1 when 0 (a) (b) (c) (d) Figure CP7.1 A single-loop feedback system with...
A loop transfer function is Using the contour in the .y-plane shown in Figure E9.29, determine the corresponding contour in the F(s)-plane (B = - 1 + /). FIGURE E9.29 Contour in the s-plane. L(s) =...
Where are the information silos? Why did these silos develop over the years?
Map the entity created in exercise E2.5 into a relation. Show several records in the mapped relation.
Compute the partial fraction expansion of and verify the result using the residue function. Y(s) s(s + 5s + 4) %3!
Sparky's Amusement Park is an entertainment park run by recent college graduates. It caters to young people and others who are young at heart. The owners are very interested in applying what they...
What are the four common approaches to storing XML data?
Recall from Chapter 1 that computer memory is comprised of individual bits of data. A bit (short for binary digit) can store one of only two values, commonly referred to as 0 and 1. However, using...
Consider the 12 categories of vulnerability in Figure 12-14. Describe the three most serious vulnerabilities to each of the following businesses: a. CBI b. Your university c. A neighborhood...
Consider the relational schema for the Hotel case study given in the Exercises at the end of Chapter 4. Redesign this schema to take advantage of the new features of SQL:2011. Add user-defined...
The National Football League (NFL) is the biggest business in sports. Established in 1920, the NFL sets the standard for a successful profit-making sports league. It has been called one of America's...
Suppose that in an attempt to save time, we splay on every second tree operation. Does the amortized cost remain logarithmic?
In Exercise 7.2, you modified the round.html page so that it rounded the number to two decimal places instead of 1. This involved multiplying the number by 100 (instead of 10), rounding to the...
Section 8.7 described the generating of mazes. Suppose we want to output the path in the maze. Assume that the maze is represented as a matrix; each cell in the matrix stores information about what...
In Exercise 9.11, you wrote a Web page that selected a sequence of random letters from a string that was entered by the user. Similar to the modification in Exercise 11.2, modify your randSeq.html...
Create a Web page named classify.html that reads in a number entered by the user and then determines whether that number is positive, negative, or zero. The page should contain a text box in which...
Create a library file named weather.js that contains the definitions of your dew point and wind chill functions. Then, create a Web page named indexes.html that has text boxes where the user can...
Re-implement your repavg.html page, replacing the while loop with an equivalent for loop. Test the page repeatedly to verify that it behaves identically to the while loop version?
Create a variant of the resize1.html page from Exercise 4.2 named resize2.html. This page should contain an image and two buttons, labeled "Expand Image" and "Restore Image." When the "Expand Image"...
Consider the second-order system y = [1 0]x + [0]u. For what values of k1 and k2 is the system completely controllable? 1 k1 -1