Using the tables in Figure Q3.11, create the table that results from MACHINE DIFFERENCE BOOTH. MACHINE_PRODUCT MACHINE_PRICE Chips ............. 1.25 Chocolate Bar ........... 1
1. Create a decision table that describes the discount rules. 2. Simplify the table you just created. Describe the results. 3. Draw a simplified decision tree that shows the discount rules. 4. What...
a. Depict full key functional dependencies, partial functional dependencies (if any), and transitive functional dependencies (if any) in the SURGERY SCHEDULE Table. b. Show the result of normalizing...
Using the class Pet from Listing 6.1, write a program to read data for five pets and display the following data: name of smallest pet, name of largest pet, name of oldest pet, name of youngest pet,...
1. Consider the outcomes of the projects discussed in the case. In all of them, the payoffs are both larger and achieved more rapidly than in more traditional system implementations. Why do you think...
1. What should BoB have done to avoid this situation? 2. Should the sales support staff ask the IT department to rewrite the user manual as a maintenance project, or should they request more training...
The Public Safety office at Millennium College maintains a list of parking tickets issued to vehicles parked illegally on the campus. Table 4-6 shows a portion of this list for the fall semester....
Search the Web for the term computer crime statistics and find two sources other than the Ponemon surveys cited in Q2. For each source, explain the methodology used and explain strengths and...
Given the sample records in the CHARTER table shown in Table P6.11, do the following: a. Write the relational schema and draw the dependency diagram for the table structure. Make sure that you label...
User ahmed owns a directory, stuff, containing a text file called ourstuff.txt that he shares with users belonging to the group staff. Those users may read and change this file, but not delete it....
Write a program that will take as input two Web page URLs and find a path of links from one to the other. What is an appropriate search strategy is bidirectional search a good idea? Could a search...
Explain the differences between Gane and Sarson and Yourdon symbols. Provide examples of symbols that represent processes, data flows, data stores, and entities.
Make a BPMN of a new transportation process with driverless cars. Specify activities, actors, and the smartphone IS.
Your boss, the IT director, wants you to explain FDDs, BPM, DFDs, and UML to a group of company managers and users who will serve on a systems development team for the new marketing system. 1....
In the auto shop examples on page 348, what are some problems that might arise in Marios system? Why wont Danica run into the same problems? Provide specific examples in your answer.
Suppose that the vice president of marketing asks you to write a program to create labels for a onetime advertising promotion. As IT manager, you know that the labels can be prepared more efficiently...
1. To what events must the SBRU booking system respond? Create a complete event table listing the event, trigger, source, use case, response, and destination for each event. Be sure to consider only...
1. Develop questions to ask Way Outs owner to help her conduct a SWOT analysis. The first step in developing a SWOT analysis is for top management to respond to questions like these: 2. How could a...
Create a set of use cases for the process of buying glasses from the viewpoint of the patient, but do not bother to identify the steps within each use case. (Just complete the information at the top...
Explore the social media links on the kiwiexperience.com home page. a. What are you initial reactions? Does the layout and concept invite you to participate and provide your own content? b. This Web...
Compare and contrast outcome analysis, technology analysis, and activity elimination. What general contribution do these strategies play in determining requirements?
Create a set of use cases for the accompanying dentist office system, but do not bother to identify the steps within each use case. (Just complete the information at the top of the use case form.)...
United Broke Artists (UBA) is a broker for not-so-famous painters. UBA maintains a small network database to track painters, paintings, and galleries. A painting is painted by a particular artist,...
Again, using your knowledge of the college environment, determine the functional or multivalued dependencies that exist in the following table. After determining the functional dependencies, convert...
E-commerce has seen explosive growth in recent years. What are the most important reasons for this trend? Will it continue? Why or why not?
Suppose you own a travel agency in a large city. You have many corporate clients, but growth has slowed somewhat. Some long-term employees are getting discouraged, but you feel that there might be a...
1. Develop a business profile for Hudson Kayak Adventures. Create a separate section for each of the following: HKAs business activities, organization, resources, customers, and potential for...
This case implies that the frequent acquisition and disposition of tourism brands poses problems for information systems. Summarize what you think those problems might be. Consider all five...
Consider Figure 1-14. Explain the meaning of the line that connects CUSTOMER to ORDER and the line that connects ORDER to INVOICE. What does this say about how Pine Valley Furniture Company does...
Using your knowledge of the college environment, determine the functional dependencies that exist in the following table. After determining the functional dependencies, convert this table to an...
Consider the two-player game described in Figure. a. Draw the complete game tree, using the following conventions: Write each state as (SA, SB) where SA and 5B denote the token locations. Put each...
1. Create a context diagram for the new business. It is OK to use your imagination with respect to data flows that you envision. 2. Create a diagram 0 that includes at least three processes and two...
What are three types of sampling? Which one would you use to analyze data input errors?
Samantha Green owns and operates Twigs Tree Trimming Service. Recall from Chapter 3 that Samantha has a degree from a forestry program, and recently opened her business in Winnipeg. Her business...
1. One of the challenges that PayPal faces now that it has managed to overcome the polylingual obstacle is finding the best way to put this functionality in the hands of the business, so that they do...
a. Using the DOT PROJECT Table, describe an example that illustrates the insertion anomaly. b. Using the DOT PROJECT Table, describe an example that illustrates the deletion anomaly. c. Using the DOT...
Consider the two tables shown in Figure 6.37. The TerID column in the SALES_REP relation is a foreign key referring to the primary key column TerID in the TERRITORY relation. Figure 6.37 Relations...
An alternative algorithm for insertion into a B-tree is the following: As the insertion algorithm travels down the tree, each full node that is encountered is immediately split, even though it may...
How many solutions are there for the map-coloring problem inFigure? NT WA Northern Territory Queensland SA NSW Western Australia South Australia New South Wales Victoria Tasmania (a) (b)
1. Why would the Olympics benefit from creating a strong environmental enterprise infrastructure? 2. How can the Olympics help support ethical e-waste initiatives? 3. Why would a sporting event like...
What is the purpose of a benchmark test? Suggest at least two examples of benchmarks.
Consider the following program: const int n = 50; int tally; void total() { int count; for (count = 1; count
Consider the following two relations for Millennium College: Following is a typical query against these relations: a. On what attributes should indexes be defined to speed up this query? Give the...
Write the binary translation of the logical address 0001010010111010 under the following hypothetical memory management schemes, and explain your answer: a. A paging system with a 256-address page...
Consider the query P (Rain?Sprinkler = true, Wet-Grass = true) in Figure (a) and how MCMC can answer it. a. How many states does the Markov chain have? b. Calculate the transition matrix Q containing...
Refer to the Real World Case on Data-Driven Crime Fighting in the chapter. Given the very decentralized nature of law enforcement, with more than 18,000 units in the United States alone, what can be...
Write SQL retrieval commands for each of the following queries: a. Display the course ID and course name for all courses with an ISM prefix. b. Display all courses for which Professor Berndt has been...
Why should the system request be created by a businessperson as opposed to an IS professional?
Suppose you work at AllRoad and Kelly asks you to list five criteria she should use when considering whether AllRoad should develop a thin- or thick-client application for mobile devices. Justify...
Will online transactions eventually replace person-to-person contact? Why or why not?
1. Create a context diagram for the Reliable Pharmaceutical case based on the system description in Chapter 1 and the event table that you developed in Chapter 5. 2. Create DFD fragments for each...
A major retail store recently spent $24 million dollars on a large private satellite communication system that provides state-of-the-art voice, data, and video transmission between stores and...
Ten thousand airline reservation stations are competing for the use of a single slotted ALOHA channel. The average station makes 18 requests/hour. A slot is 125 sec. What is the approximate total...
The Hatcher Company is in the process of developing a new inventory management system. One of the event handling processes in that system is Receive Supplier Shipments. The (inexperienced) systems...
A good straw man learning algorithm is as follows: create a table Out of all the training examples identify which output occurs most often among the training examples; call it d. Then when given an...
1. Should Paperback Press have a specific process to manage future changes and enhancements? What should it be? 2. If new features are added, what methodology should the IT staff use to add functions...
Think about sending a first-class letter to an international pen pal. Describe the process that the letter goes through to get from your initial creation of the letter to being read by your friend,...
Draw an ERD for the following situation. (State any assumptions you believe you have to make in order to develop a complete diagram.) Also, draw a data model for this situation using the tool you...
A logical knowledge base represents the world using a set of sentences with no explicit structure. An analogical representation, on the other hand, has physical structure that corresponds directly to...
Assume that at time 5 no system resources are being used except for the processor and memory. Now consider the following events: At time 5: P1 executes a command to read from disk unit 3. At time 15:...
Draw an EER diagram for the following problem using this text's EER notation, the Visio notation, or the subtypes inside supertypes notation, as specified by your instructor. A nonprofit organization...
Use Armstrongs axioms to prove the soundness of the union rule. Use the augmentation rule to show that, if , then . Apply the augmentation rule again, using , and then apply the transitivity rule.
1. What benefits may Starwood Hotels derive from the introduction of touch-screen technology as noted in the case? What possible disruptions may occur as a result. Provide several examples of each....
1. Companies are developing ethical policies and guidelines for legal reasons, but also to clarify what is acceptable and what is not. Do you think any of the issues raised in the case required...
Give an example of a directed graph G = (V, E), a source vertex s V, and a set of tree edges E E such that for each vertex v V, the unique path in the graph (V, E ) from s to v is a shortest path...
Figure 1-21 shows an enterprise data model for a music store. a. What is the relationship between Album and Store (one-to-one, many-to-many, or one-to-many)? b. What is the relationship between...
Consider a computer system that contains an I/O module controlling a simple keyboard/printer Teletype. The following registers are contained in the CPU and connected directly to the system bus: INPR:...
Refer to the Real World Case IT asset management in the chapter. What advice would you provide to a growing company to avoid facing the issues discussed in the case?
Describe the habits of successful interface designers.
Devise a state space in which A* using GRAPH-SEARCH returns a suboptimal solution with an h(n) function that is admissible but inconsistent.
1. What competitive advantages can the companies described in the case derive from the use of faster technology and co-location of servers with the exchanges? Which would you say are sustainable, and...
Two statisticians go to the doctor and are both given the same prognosis: A 40% chance that the problem is the deadly disease A. and a 60% chance of the fatal disease B. Fortunately, there are anti-A...
Many current language specifications, such as for C and C++, are inadequate for multithreaded programs. This can have an impact on compilers and the correctness of code, as this problem illustrates....
A cellular operator needs a database to keep track of its customers, their subscription plans, and the handsets (mobile phones) that they are using. The E-R diagram in Figure 2-24 illustrates the key...
1. Convert your ERD to a domain class diagram. 2. Develop a use case diagram. 3. Create a fully developed use case description or an activity diagram for each use case. 4. Develop a system sequence...
Draw a physical level 0 data flow diagram (DFD) for the following dentist office system, and compare it with the logical model that you created in Chapter 5: Whenever new patients are seen for the...
A router has the following (CIDR) entries in its routing table: Address/mask Next hop 135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23 Router 1 Default Router 2 For each of the...
To ensure the quality, cost, and timeliness of the new system, you suggested that New Century use a project management approach. Dr. Jones agreed, and he wants you develop a brief presentation that...
Why is a post-implementation evaluation important? Who should conduct it, and why?
The dependency diagram in Figure indicates that authors are paid royalties for each book that they write for a publisher. The amount of the royalty can vary by author, by book, and by edition of the...
A popular childrens riddle is Brothers and sisters have I none, but that mans father my fathers son. Use the rules of the family domain to show who that man is. You may apply any of the inference...
Compare the performance of A and RBFS on a set of randomly generated problems in the 8-puzzle (with Manhattan distance) and TSP (with MSTsee Exercise 4.8) domains. Discuss your results. What happens...
Planning and budgeting processes are notorious for their rigidity and irrelevance to management action. How can planning be made relevant to the challenges facing a business?
Figure 4-37 includes an EER diagram describing a publisher specializing in large edited works. Transform the diagram into a relational schema that shows referential integrity constraints (see Figure...
10.3. Least laxity first (LLF) is a real-time scheduling algorithm for periodic tasks. Slack time, or laxity, is the amount of time between when a task would complete if it started now and its next...
a. Depict full key functional dependencies, partial functional dependencies (if any), and transitive functional dependencies (if any) in the Movie Actors Table. b. Show the result of normalizing the...
Five recovery techniques are listed below. For each situation described, decide which of the following recovery techniques is most appropriate. Backward recovery Forward recovery (from latest...
Why should an MTU value of at least 2,500 bytes be configured in a bridged iSCSI environment?
1. Applications for grid computing in this case include medical diagnosis and financial transaction processing. What other areas do you think would be well suited to the use of grid computing and...
Design a generic post-implementation evaluation form. The form should consist of questions that you could use to evaluate any information system. The form should evaluate the training received and...
a. Using the source data from Figures 8.43 and 8.44, illustrate how the empty tables in Figure 8.46 would be populated. b. Create a dimensional model containing an aggregated fact table, where a fact...
Give some examples of database utilities.
What assumptions do developers usually make while doing the initial use case realization?
Automata Inc. produces specialty vehicles by contract. The company operates several departments, each of which builds a particular vehicle, such as a limousine, a truck, a van, or an RV. Before a new...
a. Using the data in Figure 8.41, illustrate how the tables in the dimensional model shown in Figure 8.42 would be populated. b. Create a dimensional model containing an aggregated fact table, where...
Emily Pemberton is an IS project manager facing a difficult situation. Emily works for the First Trust Bank, which has recently acquired the City National Bank. Prior to the acquisition, First Trust...
Visit www.elance.com and identify five potential outsource vendors that you could use to develop your app. Describe criteria you would use for selecting one of these vendors.
The VAX/VMS operating system makes use of four processor access modes to facilitate the protection and sharing of system resources among processes. The access mode determines Instruction execution...
As an IT manager, would you assign newly hired systems analysts to maintenance projects? Why or why not?
Add a subtype discriminator for each of the supertypes shown in Figure 3-10. Show the discriminator values that assign instances to each subtype. Use the following subtype discriminator names and...