a. Using the source data from Figures 8.43 and 8.44, illustrate how the empty tables in Figure 8.46 would be populated. b. Create a dimensional model containing an aggregated fact table, where a fact...
Again using the suppliers parts projects database, write a program with embedded SQL statements to list all suppliers in supplier number order. Each supplier should be immediately followed in the...
Figure 4-37 includes an EER diagram describing a publisher specializing in large edited works. Transform the diagram into a relational schema that shows referential integrity constraints (see Figure...
A cellular operator needs a database to keep track of its customers, their subscription plans, and the handsets (mobile phones) that they are using. The E-R diagram in Figure 2-24 illustrates the key...
Emily Pemberton is an IS project manager facing a difficult situation. Emily works for the First Trust Bank, which has recently acquired the City National Bank. Prior to the acquisition, First Trust...
Professor Michener claims that there is no need to create a new source vertex in line 1 of JOHNSON. He claims that instead we can just use G = G and let s be any vertex in V [G]. Give an example of a...
Consider the following code using the POSIX Pthreads API: thread2.c #include #include #include #include int myglobal; void *thread_function(void *arg) { int i,j; for ( i=0; i <20; i++ ) { j=myglobal;...
1. Write a draft of the proposal explaining the advantages of a review committee, as your boss requested. 2. What would you tell your boss about the potential disadvantages of the committee approach...
In the chapter we developed a first-cut DCD, a set of CRC cards, and final DCD for the Process new order use case for RMO. Create the same three drawings for the Look up item availability use case.
1. Develop a use case diagram. 2. Create fully developed use case descriptions for two of the primary use cases, such as recording traffic ticket and Scheduling a court date. 3. Develop system...
Consider the problem of making change for n cents using the fewest number of coins. Assume that each coin's value is an integer. a. Describe a greedy algorithm to make change consisting of quarters,...
1. Barring illegal activities, why do you think that employees in the organizations featured in the case do not realize themselves the dangers of loosely managing proprietary and sensitive...
1. What are the business benefits of BI deployments such as those implemented by Avnet and Quaker Chemical? What roles do data and business processes play in achieving those benefits? 2. What are the...
1. What are the business and political challenges that are likely to occur as a result of the transformation of IT from a support activity to a partner role? Use examples from the case to illustrate...
1. What is the business value of XML to the organizations described in the case? How are they able to achieve such large returns on investment? 2. What are other ways in which XML could be used by...
1. Assume that system users and owners have indicated a strong desire for a system that can be accessed anytime, anywhere. Discuss the implications of their desire for the system scope. Given the...
Produce a wait-for-graph for the following transaction scenario and determine whether deadlock exists. Data items locked by transaction Data items transaction is waiting for Iransaction X1, X X7, X...
Explain how you would use the SDLC to develop Garden Tracker.
In the future, when everyone has a home terminal connected to a computer network, instant public referendums on important pending legislation will become possible. Ultimately, existing legislatures...
The dependency diagram in Figure indicates that authors are paid royalties for each book that they write for a publisher. The amount of the royalty can vary by author, by book, and by edition of the...
Explain how to implement the algorithm PERMUTE-BY-SORTING to handle the case in which two or more priorities are identical. That is, your algorithm should produce a uniform random permutation, even...
1. Perform research to learn how much consumers are projected to spend on Internet purchases during the next three years, and describe the results. Does the estimate seem reasonable? Why or why not?...
Emerging Electric wishes to create a database with the following entities and attributes: Customer, with attributes Customer ID, Name, Address (Street, City, State, Zip Code), and Telephone ...
Write out the axioms required for reasoning about the wumpuss location, using a constant symbol Wumpus and a binary predicate In (Wumpus, Location). Remember that there is only one wumpus.
What are the four organizational levels common to many businesses? Which level typically requires data that supports long-term strategic planning and the overall business enterprise? What level of...
Figure 4-40 shows an EER diagram for a university dining service organization that provides dining services to a major university. a. Transform the EER diagram to a set of relations and develop a...
Use the AC-3 algorithm to show that arc consistency is able to detect the inconsistency of the partial assignment {WA = red, V = blue} for the problem shown inFigure. NT WA Northern Territory...
Draw a level 0 data flow diagram (DFD) for the real estate system in Exercise E, Chapter 4.
UNIX treats file directories in the same fashion as files; that is, both are defined by the same type of data structure, called an inode. As with files, directories include a 9-bit protection string....
Create a memo describing your initial analysis of the situation at FAME as it relates to the design of the database application. Write this as though you are writing a memo to Martin Forondo. Ensure...
a. Based on the sources and requirements listed above, create a dimensional model that will be used for the dimensionally modeled data warehouse for Big Z Inc. b. Using data from Figures 9.31 and...
It is desired to send a sequence of computer screen images over an optical fiber. The screen is 480 x 640 pixels, each pixel being 24 bits. There are 60 screen images per second. How much bandwidth...
Figure 5.16 shows a simplified timing diagram for a DRAM read operation over a bus. The access time is considered to last from t1 to t2. Then there is a recharge time, lasting from t2 to t3, during...
Compute the fraction of the bandwidth that is wasted on overhead (headers and retransmissions) for protocol 6 on a heavily-loaded 50-kbps satellite channel with data frames consisting of 40 header...
Consider the a following scenario. At Albus International Academy, every incoming student makes a $1,000 deposit. Albus International Academy has 10 incoming students, and each of them has made a...
Argue that in a breadth-first search, the value d[u] assigned to a vertex u is independent of the order in which the vertices in each adjacency list are given. Using Figure 22.3 as an example, show...
1. Do you think the decision by CLT to build its own project managers from the existing employee base is a good one? What advice would you give to CLT to make sure that it has strong project...
Consider a modified version of the vacuum environment in Exercise 2.7, in which the geography of the environmentits extent, boundaries, and obstaclesis unknown, as is the initial dirt configuration....
Describe a (n lg n)-time algorithm that, given a set S of n integers and another integer x, determines whether or not there exist two elements in S whose sum is exactly x.
Table shows the process states for the VAX/VMS operating system. a. Can you provide a justification for the existence of so many distinct wait states? b. Why do the following states not have resident...
Three soccer teams A. B, and C, play each other once. Each match is between two (earns, and can be won, drawn, or lost. Each team has a fixed, unknown degree of quality an integer ranging from 0 to...
Consider the inverted pendulum shown in Figure El.13. Sketch the block diagram of a feedback control system using Figure 1.3 as the model. Identify the process, sensor, actuator, and controller. The...
Submersibles with clear plastic hulls have the potential to revolutionize underwater leisure. One small submersible vehicle has a depth-control system as illustrated in Figure E4.9. (a) Determine the...
Show that the running time of QUICKSORT is (n2) when the array A contains distinct elements and is sorted in decreasing order.
The monkey-and-bananas problem is faced by a monkey in a laboratory with some bananas hanging out of reach from the ceiling. A box is available that will enable the monkey to reach the bananas if he...
You are to construct a star schema for Simplified Automobile Insurance Company (see Kimball, 1996b, for a more realistic example). The relevant dimensions, dimension attributes, and dimension sizes...
Suppose that the case for checksum errors were removed from the switch statement of protocol 6. How would this change affect the operation of the protocol?
This case assumes that you have made the decision to develop an iOS application. Take an opposing view that developing a thin-client browser application would be a better decision. Explain how you...
Using the descriptions of the attributes given in the figure, convert the ERD shown in Figure P6.1 into a dependency diagram that is in at least 3NF.
Define the term what-if analysis. How could you use a spreadsheet in capacity planning?
Using the INVOICE table structure shown in Table P6.3, do the following: a. Write the relational schema, draw its dependency diagram and identify all dependencies, including all partial and...
Consider the following normalized relations for a sports league: What recommendations would you make regarding opportunities for denormalization? What additional in-formation would you need to make...
The cost of a fast microprocessor has dropped to the point where it is now possible to put one in each modem. How does that affect the handling of telephone line errors?
What are the five components of the driverless car IS, and which lessons from Chapter 2 can be applied to the concept of a Google car?
What type of tool might a systems analyst use to identify a relationship between two variables? What tool is useful for identifying and prioritizing causes of problems?
List five responsibilities of a database management system. For each responsibility, explain the problems that would arise if the responsibility were not discharged.
The table shown in Figure 14.19 lists dentist/patient appointment data. A patient is given an appointment at a specific time and date with a dentist located at a particular surgery. On each day of...
Professor Adam has two children who, unfortunately, dislike each other. The problem is so severe that not only do they refuse to walk to school together, but in fact each one refuses to walk on any...
Draw a class diagram for the cars and owners described in exercise 9 but include subclasses for sports car, sedan, and minivan with appropriate attributes.
Create a program specification for module 1.2.3.2, compute amount due, on the structure chart shown in Figure 10-13. QUESTION: On the basis of your specification, are there any changes to the...
In this exercise, you will complete the normalization calculation for the meningitis example. First, make up a suitable value for P(S M), and use it to calculate un-normalized values for P (MS) and P...
1. Which of Porters four competitive strategies (from Chapter 3) does Apple engage in? Explain. 2. What do you think are the three most important factors in Apples past success? Justify your answer....
Visit www.kiwiexperience.com and click Pass map. Select a variety of activities in the Adrenalin, Nature, and Kiwi Culture menus. Find a pass that would allow you to participate in all of your...
Distinguish between the DBMS and a file management system.
Consider a database used to record the marks that students get in different exams of different course offerings. a. Construct an E-R diagram that models exams as entities, and uses a ternary...
Write a business profile for a large business in your town. You can use your imagination to supply details you might not know.
Considering operational expenses, a. Which operational costs depend upon the number of doctors and the frequency of their use, and which do not? b. Which operational costs depend upon the number of...
How can the permit process be improved? Identify at least one flaw in each measure.
Determine the transfer function X2(s)/F(s) for the system shown in Figure E2.26. Both masses slide on a frictionless surface, and k = 1 N/m. m2 1 kg l kg Two connected masses on a frictionless FIGURE...
Study the Wellmeadows Hospital case study presented in Appendix B.3. (a) In what ways would a DBMS help this organization? (b) What do you think are the main objects that need to be represented in...
1. What is the correct total time? 2. What is the critical path? 3. Create a Gantt chart that shows the WBS. 4. Create a PERT/CPM chart. At Forest Point Construction, your boss says that he can...
Tom, Jan, and Julie are IS majors at Great State University. These students have been assigned to a class project by one of their professors, requiring them to develop a new Web-based system to...
In Chapter 8, you were asked to discuss the implications of the anytime, anywhere requirement for the application deployment environment and to describe the type(s) of hardware, network, and software...
Create a one-page questionnaire to distribute to users in a post-implementation evaluation of a recent information system project. Include at least 10 questions that cover the important information...
a. If the last operation performed on a computer with an 8-bit word was an addition in which the two operands were 00000010 and 00000011, what would be the value of the following flags? Carry Zero ...
Consider the LIBRARY relational schema shown in Figure 6.14, which is used to keep track of books, borrowers, and book loans. Referential integrity constraints are shown as directed arcs in Figure...
List the major functions performed by the DBA
A TCP machine is sending full windows of 65,535 bytes over a 1-Gbps channel that has a 10-msec one-way delay. What is the maximum throughput achievable? What is the line efficiency?
We consider a program which has the two segments shown below consisting of instructions in segment 0, and read/write data in segment 1. Segment 0 has read/execute protection, and segment 1 has just...
A power failure that occurs while a disk block is being written could result in the block being only partially written. Assume that partially written blocks can be detected. An atomic block write is...
1. Search for information about software outsourcing generally, using the search techniques described in Part D of the Systems Analysts Toolkit. 2. Visit the Bureau of Labor Statistics site at...
Create class diagrams that describe the classes and relationships depicted in the following scenarios: Researchers are placed into a database that is maintained by the state of Georgia. Information...
Draw a behavioral state machine diagram that describes the various states that a travel authorization can have through its approval process. A travel authorization form is used in most companies to...
1. Describe the pros and cons of the UP approach versus XP and Scrum development approaches to upgrading the existing systems or developing new ones. Do the pros and cons change if the systems are...
The state firefighters' association has a membership of 15,000. The purpose of the organization is to provide some financial support to the families of deceased member firefighters and to organize a...
Create a Crows Foot ERD to include the following business rules for the ProdCo Company: a. Each sales representative writes many invoices. b. Each invoice is written by one sales representative. c....
Refer to the Real World Case on Software-as-a-Service (SaaS) in the chapter. Do you think GE would have been better off developing a system specifically customized to their needs, given that GE's...
Discuss how well the standard approach to game playing would apply to games such as tennis, pool, and croquet, which take place in a continuous physical state space.
Java Masters is an employment exchange agency that has offices in Northern California. Java Masters operates as a broker that links its client companies with independent software experts (commonly...
Consider the following relations for an order-processing application database at ABC, Inc. ORDER (O#, Odate, Cust#, Total_amount) ORDER-ITEM (O#, I#, Qty_ordered, Total_price, Discount%) Assume that...
Suppose that the clock-driven scheme for generating initial sequence numbers is used with a 15-bit wide clock counter. The clock ticks once every 100 msec, and the maximum packet lifetime is 60 sec....
(Adapted from Bar wise and Etchemendy (1993)) Given the following, can you prove that the unicorn is mythical? How about magical? Horned? If the unicorn is mythical, then it is immortal, hut if it is...
Suppose that a 10-MB file is stored on a disk on the same track (track 50) in consecutive sectors. The disk arm is currently situated over track number 100. How long will it take to retrieve this...
Refer to the Real World Case on telemedicine and videoconferencing in the chapter. Not mentioned in the case are implications for both privacy and data security arising from the use of these...
Draw an ERD for each of the following situations. (If you believe that you need to make additional assumptions, clearly state them for each situation.) Draw the same situation using the tool you have...
Consider an employee database with two relations employee (employee-name, street, and city) works (employee-name, company-name, salary) where the primary keys are underlined. Write a query to find...
It should be possible to implement general semaphores using binary semaphores. We can use the operations semWaitB and semSignalB and two binary semaphores, delay and mutex. Consider the following:...
A channel has a bit rate of 4 kbps and a propagation delay of 20 msec. For what range of frame sizes does stop-and-wait give an efficiency of at least 50 percent?
Create a decision table with three conditions. You can make one up, or use a scenario from everyday life. Either way, be sure to show all possible outcomes.
Find the transfer function Y1(s) / R2(s) for the multivariate system in Figure E2.14. G4ls) Gs(s) Yals) FIGURE E2.14 Multivariable system.