Repeat Exercise 4.5, but use the AIRLINE schema of Figure 3.8. In exercise 4.5 What are the referential integrity constraints that should hold on the schema? Write appropriate SQL DDL statements to...
Specify the updates of Exercise 3.11 using the SQL update commands. In exercise 3.11 (a) Insert < 'Robert', 'F', 'Scott', '943775543', '21-JUN-42', '2365 Newcastle Rd, Bellaire, TX', M, 58000,...
This exercise asks you to converting business statements into dependencies. Consider the following relation DiskDrive(serialNumber, manufacturer, model, batch, capacity, retailer). Each tuple in the...
What advantage does a circuit-switched network have over a packet-switched network? What advantages does TDM have over FDM in a circuit-switched network?
A packet switch receives a packet and determines the outbound link to which the packet should be forwarded. When the packet arrives, one other packet is halfway done being transmitted on this...
Consider the discussion in Section 1.3 of statistical multiplexing in which an example is provided with a I Mbps link. Users are generating data at a rate of 100 kbps when busy, but are busy...
Consider the GBN protocol with a sender window size of 3 and a sequence number range of 1,024. Suppose that at time t. the next in-order packet that the receiver is expecting has a sequence number of...
Describe how loops in paths can be detected in BGP.
Consider the following network. ISP B provides national backbone service to regional ISP A. ISP C provides national backbone service to regional ISP D. Each ISP consists of one AS. Band C peer with...
Consider again the same scenario as in the previous problem, but suppose that packets from R6 destined for 0 are switched via R6-R4-R3, while packects from R5 destined to D are switched via...
For the multiprocessor illustrated in Figure 4.42 implementing the protocol described in Figure 4.43 and Figure 4.44, assume the following latencies: ¢ CPU read and write hits generate no stall...
Consider the relations Students, Faculty, Courses, Rooms, Enrolled, Teaches, and Meets In defined in Section 1.5.2. 1. List all the foreign key constraints among these relations. 2. Give an example...
Consider a database with the following schema: Suppliers(sid: integer, sname: string, address: string) Parts(pid: integer, pname: string, color: string) Catalog(sid: integer, pid: integer, cost:...
Is software engineering applicable when WebApps are built? If so, how might it be modified to accommodate the unique characteristics of WebApps?
Define two classes, Patient and Billing, whose objects are records for a Clinic. Derive Patient from the class Person given in Listing 8.1. A Patient record has the patient's name (defined in the...
Using a word processor, construct a nonoperational prototype for a Training Unit Project Reporting System. Include features brought up by the user stories you found. Hint: See sample screens in...
Use the Report Query feature to produce the following reports. Explain in a sentence what information the report is providing you with. a. The Undefined Elements report b. The Elements without...
Modify and print the ACCUMULATIVE HARDWARE SUBTOTALS Process entry. Add the Process Description, "Accumulate the hardware subtotals. These include the number of machines for each hardware brand."
Without looking at your phone or tablet, design three sample pages for the following apps. You do not need to use a mock-up app for this assignment. Just draw them on paper. (Note that each group may...
Design the HARDWARE INVENTORY LISTING Web page, showing the computers available in each room at each campus. The CAMPUS is selected from a drop-down list displaying the CAMPUS DESCRIPTION. When the...
Create the FIND SOFTWARE LOCATION decision table, representing the logic for an inquiry program for displaying all locations for a given SOFTWARE TITLE and VERSION. The conditions have been created...
Create a decision table for a batch update of the COMPUTER MASTER file. There are three types of updates: Add, Delete, and Change. The COMPUTER MASTER record must be read. If the transaction is an...
Design the SOFTWARE CROSS REFERENCE Web page. Refer to the repository description for the SOFTWARE CROSS REFERENCE REPORT data flow for the elements on the Web page. This Web page shows the computers...
After meeting with Cher Ware and Hy Perteks to discuss reporting needs, Anna has identified the fields for the partially completed NEW SOFTWARE INSTALLED REPORT. Design (or modify) the report to...
Both Dot and Mike need to know when new computers have been received. Create the NEW COMPUTER RECEIVED REPORT. The COMPUTER RECEIVED REPORT data flow contains the necessary elements.
Design the SOFTWARE MASTER REPORT containing pertinent information that helps Cher and Hy to locate the various copies of any software package easily. The elements necessary to produce the report are...
Design the SOFTWARE BY MACHINE screen report. Refer to the data flow repository entry for elements.
Explain why the UPGRADE SOFTWARE display screen would display machines rather than have Cher enter the machine IDs. In a paragraph, discuss why the display shows records in a CAMPUS/ROOM sequence.
Add the VENDOR entity to the diagram. The vendor warrants the computers, and the relationship between VENDOR and COMPUTER is that one VENDOR can warrant many COMPUTER(s). Add primary keys. Microsoft...
After speaking with Dot Matricks and Mike Crowe, it has become apparent that the campus codes must be sortable for installing hardware and software, as well as for creating inventory sheets. Use...
Explain in a paragraph why a phased conversion would be used to install the computer system.
You want to extend the schema shown in Table 4-16 to include information about customer payments. Some customers make installment payments on each invoice. Others write a check to pay for several...
Create the spreadsheet shown in Figure 14-11. Write formulas to calculate the total depreciation expense and to display the correct values in the following three columns: Age, Depreciation Rate, and...
The two most widely used billing systems are (1) pre-billing systems and (2) post-billing systems. a. Discuss the conditions under which each of these billing systems is most appropriate. b. Discuss...
How do information systems help businesses compete globally? a. Describe how globalization has increased opportunities for businesses. b. List and describe the four main ways of organizing a business...
Reloaded Games is an online games platform that powers leading massively multiplayer online games. The Reloaded platform serves more than 30 million users. The games can accommodate millions of...
Enter the InchesToCentimeters and CentimetersToInches functions from Figure 9.7 in a text file named convert.js. Then enter the text from Figure 9.8 into a new Web page (in the same location) and...
Add four new functions to your convert.js library file that convert between pounds and kilograms, and also between square feet and square meters. Note that: 1 kilogram = 2.205 pounds 1 square meter =...
Enter the ifdemo.html text from Figure 11.3 into a new Web page. Load this page, then describe how it behaves when you enter various grades in the text box. Once you have done this, modify the page...
Enter the slots.html text from Figure 11.10 into a new Web page, then load the page in the browser to verify that it behaves as described. Modify your page so that it simulates a slot machine, with...
In Chapter 9, you created a magic.html page that simulated the behavior of a Magic 8-Ball. As written, your page completely ignores the user's question while randomly selecting from a list of...
Modify your surface.html page from Exercise 9.8 so that it ensures that both the height and weight values entered by the user are positive values. If either of the values in the text boxes is less...
Enter the stats.html text from Figure 11.7 into a new Web page, then load the page in the browser to verify that it behaves as described. Add an additional text span to your stats.html page that...
Imagine that users of your stats.html page would like to perform repeated experiments with the dice simulator. It would greatly help these users if they were able to reset the roll and doubles counts...
There are six different dice combinations that add up to 7: 6-1, 5-2, 4-3, 3-4, 2-5, and 1-6, making it the most common dice roll. Add an additional text span to your stats.html page that keeps track...
In gambling circles, the combination of a 3 and 4 (in either order) is known as a natural seven. Add an additional text span to your stats.html page that keeps track of the number of natural sevens...
Enter the strdemo.html text from Figure 15.2 into a new Web page, then load this page to verify that it behaves as described. After experimenting with strdemo.html, augment the page so that a...
Define a function named Classify that takes a string as input and then determines whether the string is a single word (containing no spaces) or a phrase (containing one or more spaces). The function...
Define a function named PigLatin that takes a string as input and returns the Pig Latin translation. For example, the call PigLatin('oops') should return 'oopsway', whereas PigLatin('foo') should...
Technically speaking, the Pig Latin rules that we have established apply only to words, not phrases. However, your current piglatin.html page does nothing to prevent users from entering a string...
What is the goal of Health Insurance Portability and Accountability Act (HIPAA)?
1. How has Walmart improved its data communication systems for suppliers? 2. What are some typical data communication applications in Walmart? 3. What are some of the applications of wireless...
1. What are some of the reasons that IHG is moving into cloud computing? 2. Which platform is used for IHG CRM applications? 3. Which applications run in IHG's private cloud? 4. What are the three...
a. Write a program to convert an infix expression that includes (, ), +, -, *, and / to postfix. b. Add the exponentiation operator to your repertoire. c. Write a program to convert a postfix...
A linked list contains a cycle if, starting from some node p, following a sufficient number of next links brings us back to node p. p does not have to be the first node in the list. Assume that you...
Give a linear-time algorithm to sort N fractions, each of whose numerators and denominators are integers between 1 and N.
Part of the encoded file must be a header indicating the Huffman code. Give a method for constructing the header of size at most O(N) (in addition to the symbols), where N is the number of symbols.
List and define the basic organizational structures.
You can often gauge the role of information systems within a business by evaluating how the chief information officer (CIO), or head of information systems, interacts professionally with the...
Briefly discuss the difference between acting morally and acting legally. Give an example of acting legally and yet immorally.