Explain the process of balancing a set of DFDs.
What is meant by a DFD semantic error? Provide an example.
Create a set of use cases for a university library borrowing system. (Do not worry about catalogue searching, etc.) The system will record the books owned by the library and will record who has...
Locate the independent entities on Figure. How do you know which of the entities are independent? Locate the nonidentifying relationships. How did you find them? Can you create a rule that describes...
Locate the dependent entities on Figure. Locate the identifying relationships. How did you find them? Can you create a rule that describes the association between dependent entities and...
Describe the three primary strategies that are available to obtain a new system.
What information is typically conveyed in an RFP?
Develop a hardware and software specification for the university course registration system described in Your Turn 8-1.
Explain the difference between concurrent multilingual systems and discrete multilingual systems.
What is white space, and why is it important?
Under what circumstances should densities be low? high?
What are use scenarios, and why are they important?
What is an interface structure diagram (ISD), and why is it used?
Compare and contrast the three types of interface design prototypes.
Describe three basic principles of navigation design.
Describe four types of navigation controls.
Why are menus the most commonly used navigation control?
Under what circumstances would you use a dropdown menu versus a tab menu?
Explain three principles in the design of outputs.
Describe the primary components of the interface standards for a Web site that sells some retail products (metaphors, objects, actions, icons, and templates).
What is the difference between a transaction structure and a transform structure? Can a module be a part of both types of structures? Why or why not?
List the seven types of cohesion. Why do the various types of cohesion range from good to bad? Give an example of good coupling and an example of bad coupling.
What are the five types of coupling? Give an example of good coupling and an example of bad coupling.
Create a structure chart based on the data flow diagrams (DFDs) that you created for the following exercises in Chapter 5: Question D Question E Question F Question G Question H
Develop the combination of conversion strategy dimensions that produces the least risk; the most risk. Develop the combination of conversion strategy dimensions that produces the least cost; the...
Why do people resist change? Explain the basic model for understanding why people accept or resist change.
Suppose that you are the project leader for the scenario described in Exercise J. Develop a migration plan (including both conversion and change management) for the independent travel agencies who...
You have been working with the system for the campus housing service that helps students find apartments. One of the dynamic classes in this system likely is the apartment class. Draw a behavioral...
Consider a system that is used to run a small clothing store. Its main functionality is maintaining inventory of stock, selling items to customers, and producing sales reports for management. List...
Create a use case diagram that would illustrate the use cases for the following online university registration system: The system should enable the staff members of each academic department to...
What problem would you encounter if you wanted to produce a listing by city? How would you solve this problem by altering the filestructure? PROJECT CODE PROJECT MANAGER MANAGER PHONE 21-52 25-2D...
If you wanted to produce a listing of the file contents by last name, area code, city, state, or zip code, how would you alter the filestructure? PROJECT CODE PROJECT MANAGER MANAGER PHONE 21-52...
Create the basic ERD for the database shown in Figure.
What is the difference between a database and a table?
For each table in the database, identify the primary key and the foreign key(s). If a table does not have a foreign key, write None in the assigned space provided.
Create the ERD to show the relationship between EMPLOYEE and JOB.
Identify the TRUCK tables candidate key(s).
For each table, where possible, identify: a. The primary key b. A superkey c. A candidate key d. The foreign key(s) e. A secondary key
Create the ERD. (Look at the table contents. You will discover that an AIRCRAFT can fly many CHARTER trips but that each CHARTER trip is flown by one AIRCRAFT. Similarly, you will discover that a...
Modify the ERD you created in Problem 25 to eliminate the problems created by the use of synonyms.
Create the table that would result from applying the SELECT and PROJECT relational operators to the CHARTER table to return only the CHAR_TRIP, CHAR_PILOT, and CHAR_COPILOT attributes for charters...
How would you (graphically) identify each of the following ERM components in a Crows Foot model? a. An entity b. The cardinality (0, N) c. A weak relationship d. A strong relationship
What two attributes must be contained in the composite entity between STORE and PRODUCT? Use proper terminology in your answer.
What is the difference between partial completeness and total completeness?
Under what circumstances are composite primary keys appropriate?
When implementing a 1:1 relationship, where should you place the foreign key if one side is mandatory and one side is optional? Should the foreign key be mandatory or optional?
What is the most common design trap, and how does it occur?
What is a surrogate key, and when should you use one?
Explain the difference between an ORDER BY clause and a GROUP BY clause.
Write the SQL code to create a copy of EMP_1, naming the copy EMP_2. Then write the SQL code that will add the attributes EMP_PCT and PROJ_NUM to its structure. The EMP_PCT is the bonus percentage to...
To keep track of office furniture, computers, printers, and so on, the FOUNDIT Company uses the table structure shown in Table P6.5. a. Given that information, write the relational schema and draw...
Should you create an index? If so, what would the index column(s) be, and why should you create that index?
Write a query to display the customer code, first name, and last name of all customers who have had at least one invoice completed by employee 83649 and at least one invoice completed by employee...
What is the SQL command to list the total sales by month and product category, with subtotals by month and a grand total for all sales?
The following state transition table is a simplified model of process management, with the labels representing transitions between states of READY, RUN, BLOCKED, and NONRESIDENT. Give an example of...
Is busy waiting always less efficient (in terms of using processor time) than a blocking wait? Explain.
Table lists typical elements found in a process control block for an unthreaded OS. Of these, which should belong to a thread control block and which should belong to a process control block for a...
What is the difference among deadlock avoidance, detection, and prevention?
Show that the four conditions of deadlock apply to Figure. 2
A pipeline algorithm is implemented so that a stream of data elements of type T produced by a process P0 passes through a sequence of processes P1, P2, ., Pn - 1, which operates on the elements in...
For Figure, provide a narrative description of each of the six depicted paths, similar to the description of the paths of Figure 6.2 provided in Section 6.1. Progress of Q Release P and Q want A...
List and briefly define five different categories of synchronization granularity.
Suppose that your roommate, a political science major, asks you to help her purchase a new laptop computer. She wants to use the computer for email, Internet access, and note-taking in class. She...
Search the Internet for evidence that Microsoft Azure complies with ISO 27001. Summarize your findings.
YourFire, Inc., (the same YourFire we met at the end of Chapter 3, p. 75) is a small business owned by Curt and Julie Robards. Based in Brisbane, Australia, YourFire manufacturers and sells the...
Summarize what you have learned from this exercise about choosing a CRM product. Formulate your summary as an answer to a job interviewers question about the difficulties that organizations face when...
Suppose you need to terminate an employee who works in your department. Summarize security protections you must take. How would you behave differently if this termination were a friendly one?
1. Create a view named PenguinBooks. It consists of the book code, book title, book type, and book price for every book published by Penguin USA. Display the data in the view. 2. Create a view named...
Using your knowledge of Premiere Products, determine the functional dependencies that exist in the following table. After determining the functional dependencies, convert this table to an equivalent...
Describe the relationship between columns that can be null and entity subtypes. Under what circumstances would these columns lead to more than one entity subtype?
Describe the entity-relationship model. How are entities, relationships, and attributes represented in this model? What is a composite entity? Describe the approach to diagrams that uses a crows...
While users were updating the Premiere Products database, one of the transactions was interrupted. You need to explain to management what steps the DBMS will take to correct the database. Using the...
Occasionally, users at Premiere Products obtain incorrect results when they run queries that include built-in (aggregate, summary, or statistical) functions. The DBA told management that unrepeatable...
The DBA at Premiere Products wants you to investigate biometric identification techniques for potential use at the company for computer authentication purposes. Use books, articles, and/or the...
What is an executive dashboard?
Visit the Open Source Initiatives Web site at opensource.org. Summarize the mission of this non-profit corporation. Find the definition of open source on this site and summarize that definition in...
List specific features and benefits for each of the five applications you selected in question 1.
Which of the analysis options in this exercise will provide Mary the best value? If you owned Carbon Creek Gardens and you were going to implement just one of these applications, which would you...
To learn phishing fundamentals, visit www.microsoft.com/protect/fraud/phishing/symptoms.aspx. To see recent examples of phishing attacks, visit www.fraudwatchinternational.com/phishing-alerts/. a....
You are required to create a conceptual data model of the data requirements for a company that specializes in IT training. The Company has 30 instructors and can handle up to 100 trainees per...
Describe the types of update anomalies that may occur on a relation that has redundant data.
On completion of Exercise 14.14 examine the 3NF relations created to represent the attributes shown in the Well meadows Hospital form shown in Figure 14.18. Determine whether these relations are also...
Describe business situations in which an individuals or businesses behavior would be considered: (a) Illegal and unethical; (b) Legal but unethical; (c) Illegal but ethical.
For each of the following schedules, state whether the schedule is serializable, conflict-serializable, view-serializable, recoverable, and whether it avoids cascading aborts: (a) Read(T1, balx),...
Using the ER diagram from Exercise 24.15, produce a distributed database design for this system, and include: (a) A suitable fragmentation schema for the system; (b) In the case of primary horizontal...
List 10 potential benefits of the database approach over conventional file systems.
State three conditions that suggest the designer should model a relationship as an associative entity type.
Contrast the following terms: a. Stored attribute; derived attribute b. Simple attribute; composite attribute c. Entity type; relationship type d. Strong entity type; weak entity type e. Degree;...
The Is Married To relationship in Figure 2-12a would seem to have an obvious answer in Problem and Exercise 2-33dthat is, until time plays a role in modeling data. Draw a data model for the PERSON...
Review your answer to Problem and Exercise 2-49; if necessary, change the names of the entities, attributes, and relationships to conform to the naming guidelines presented in this chapter. Then,...
Explain how each of the following types of integrity constraints is enforced in the SQL CREATE TABLE commands: a. Entity integrity b. Referential integrity
Match the following terms to the appropriate definitions: _________ View a. list of values _________ Referential b. description of a database _________ Integrity constraint c. view materialized as a...
In what clause of a SELECT statement is an IN operator used? What follows the IN operator? What other SQL operator can sometimes be used to perform the same operation as the IN operator? Under what...
What are SQL-92, SQL:1999, and SQL:2011? Briefly describe how SQL:2011 differs from SQD1999.
Explain what capabilities the new temporal features added to the SQL standard in SQL:2011.
Reread the case descriptions in Chapters 1 through 3 with an eye toward identifying the typical types of reports and displays the various stakeholders might want to retrieve from your database....
When is an outer join used instead of a natural join?
Explain the following statement regarding SQL: Any query that can be written using the subquery approach can also be written using the joining approach but not vice versa.
A food manufacturing company needs a data mart to summarize facts about orders to move goods. Some orders transfer goods internally, some are sales to customers, some are purchases from vendors, and...
What are the key components of a data governance program? How does data stewardship relate to data governance?