Some experts argue that object-oriented techniques are simpler for novices to understand and use than are DFDs and ERDs. Do you agree? Why or why not?
Write a query to display the first name, last name, street, city, state, and zip code of any customer who purchased a Foresters Best brand top coat between July 15, 2013, and July 31, 2013. If a...
(Adapted from Pearl (1988)) Suppose you are a witness to a nighttime hit-and-run accident involving a taxi in Athens. All taxis in Athens are blue or green. You swear, under oath, that the taxi was...
Draw a physical level 0 DFD for the following system and compare it with the logical model that you created in Chapter 5. A Video Store (AVS) runs a series of fairly standard video stores. Before a...
Consider the project data model shown in Figure 1-15. a. Create a textual description of the diagrammatic representation shown in the figure. Ensure that the description captures the...
Some systems analysts find it better to start with a decision table, and then construct a decision tree. Others believe it is easier to do it in the reverse order. Which do you prefer? Why?
Consider the airline travel analogy in our discussion of layering in Section 1.5, and the addition of headers to protocol data units as they flow down the protocol stack. Is there an equivalent...
Given the following narrative, make a list of system capabilities: The new direct sales and accounting system for especially for You Jewelers is an important element in the future growth and success...
Refer to the Real World Case on LinkedIn, Umbria, Mattel and Others in the chapter. What is your take on the debate as to whether these influential individuals do really have an effect on others, or...
Wally Los Gatos, owner of Wally's Wonderful World of Wallcoverings, Etc., has hired you as a consultant to design a database management system for his new online marketplace for wallpaper, draperies,...
Automatic control of helicopters is necessary because, unlike fixed-wing aircraft which possess a fair degree of inherent stability, the helicopter is quite unstable. A helicopter control system that...
What is the fastest line speed at which a host can blast out 1500-byte TCP payloads with a 120-sec maximum packet lifetime without having the sequence numbers wrap around? Take TCP, IP, and Ethernet...
ROBCOR, Inc., whose sample data are contained in the database named Ch13_P4.mdb, provides "on demand" aviation charters using a mix of different aircraft and aircraft types. Because ROBCOR has grown...
A particular system is controlled by an operator through commands entered from a keyboard. The average number of commands entered in an 8-hour interval is 60. a. Suppose the processor scans the...
1. What application development methods will you use? Explain your answer. What development tools will help your team finish the business support system and how will you use them? 2. Prepare a...
According to this chapter, information systems, products, and technology are not malleable; they are difficult to change, alter, or bend. How do you think senior executives other than the CIO view...
Draw an ISD for the DFD in exercise C in Chapter 5.
Compare and contrast two major ways to provide system support.
What are the five components of a standard design pattern definition?
Compare enterprise computing systems to transaction processing systems. Provide three examples of each type of system.
Consider a disk with N tracks numbered from 0 to (N 1) and assume that requested sectors are distributed randomly and evenly over the disk. We want to calculate the average number of tracks traversed...
1. Is the proposed system an accounting system? A factory operations system? Or both? 2. Which life cycle variations might be appropriate for Sally to consider using? 3. Which activities of analysis...
Refer to the employee EER diagram in Figure 3-2. Make any assumptions that you believe are necessary. Develop a sample definition for each entity type, attribute, and relationship in the diagram....
The VMS scheme discussed in the preceding problem is often referred to as a ring protection structure, as illustrated in Figure. Indeed, the simple kernel/user scheme, as described in Section 3.3, is...
1. Summarize the problems associated with passwords. 2. Explain why you should not use your Facebook credentials to authenticate yourself to non-Facebook Web sites. 3. Describe three authentication...
Consider the following program. #define Size 64 int A[Size; Size], B[Size; Size], C[Size; Size]; int register i, j; for (j = 0; j < Size; j ++) for (i = 0; i < Size; i++) C[i; j] = A[i; j] + B[i; j];...
Map the BANK ER schema of Exercise 7.23 (shown in Figure 7.21) into a relational schema. Specify all primary keys and foreign keys. Repeat for the AIRLINE schema (Figure 7.20) of Exercise 7.19 and...
1. Create a set of menu hierarchies for the system based on the use cases in the case. Then add more menu hierarchies for system utilities based on controls, user preferences, and help. 2. Write out...
Figure is a system sequence diagram for the use case Record dental procedure in the dental clinic system. Do the following: a. Develop a first-cut sequence diagram, which only includes the actor and...
a. Based on the sources and requirements listed above, create a dimensional model that will be used for the dimensionally modeled data warehouse for Big Z Inc. b. Using data from Figures 8.47 and...
Design a 16-bit memory of total capacity 8192 bits using SRAM chips of size 64 1 bit. Give the array configuration of the chips on the memory board showing all required input and output signals for...
Explain why the results in Figure 9-11 do not show promise for the selling of these part designs. In light of these results, should Addison and Drew change their criteria? If so, how? If not, why not?
Explain in your own words how Addison used Access to implement each of the five criteria that she and Drew developed.
What problems might arise from vertically partitioning a relation? Given these potential problems, what general conditions influence when to partition a relation vertically?
Consider the following set of processes: Perform the same analysis as depicted in Table 9.5 and Figure 9.5 for this set. ProcessArrival Time Processing Time 12
Argue that the solution to the recurrence T (n) = T (n/3) + T (2n/3) + cn, where c is a constant, is (n lg n) by appealing to a recursion tree.
Techniques like memory overcommit and page sharing permits virtual machines to be allocated more resources than are physically in a single virtualization host. Does this allow the aggregate of the...
Not just any greedy approach to the activity-selection problem produces a maximum-size set of mutually compatible activities. Give an example to show that the approach of selecting the activity of...
Now consider a version of the bakery algorithm without the variable choosing. Then we have 1 int number[n]; 2 while (true) { 3 number[i] = 1 + getmax(number[], n); 4 for (int j = 0; j < n; j++){ 5...
In a number of early computers, an interrupt caused the register values to be stored in fixed locations associated with the given interrupt signal. Under what circumstances is this practical...
A consulting project involved a credit card bottom feeder (lets call it Credit Wonder). This company bought credit card accounts that were written off as uncollectable debts by major banks. Credit...
Describe or implement state descriptions, move generators, terminal tests, utility functions, and evaluation functions for one or more of the following games: Monopoly, Scrabble, bridge (assuming a...
Figure shows a blocks-world problem known as the Sussman anomaly. The problem was considered anomalous because the non interleaved planners of the early 1970s could not solve it. Write a definition...
Consider the following normalized relations from a database in a large retail chain: What opportunities might exist for denormalizing these relations when defining the physical records for this...
For n distinct elements x1, x2, ..., xn with positive weights w1, w2, ..., wn such that Σni =1 wi = 1, the weighted (lower) median is the element xk satisfying
In the new system for Holiday Travel Vehicles, the system users follow a two-stage process to record complete information on all of the vehicles sold. When an RV or trailer first arrives at the...
Divide -145 by 13 in binary twos complement notation, using 12-bit words. Use the algorithm described in Section 9.3.
As explained in the section 3.6, the catalog is self-describing that is, it includes entries for the catalog relvars themselves. Extend Fig. 3.6 to include the necessary entries for the TABLE and...
Suppose that you want to output 0 with probability 1/2 and 1 with probability 1/2. At your disposal is a procedure BIASED-RANDOM, that outputs either 0 or 1. It outputs 1 with some probability p and...
(Adapted from Pearl (1988)) Three prisoners, A, B, and C, are locked in their cells. It is common knowledge that one of them will be executed the next day and the others pardoned. Only the governor...
Figure 2-28 shows two diagrams (A and B), both of which are legitimate ways to represent that a stock has a history of many prices. Which of the two diagrams do you consider a better way to model...
Given the following narrative, make a list of expected business benefits: Especially for You Jewelers is a small jewelry company in a college town. Over the last couple of years, especially for you...
How will wireless information appliances and services affect the business use of the Internet and the Web? Explain.
Radio waves, microwaves, and infrared all belong to the electromagnetic radiation spectrum. These terms reference ranges of radiation frequencies we use every day in our wireless networking...
Binary search of a sorted array takes logarithmic search time, but the time to insert a new element is linear in the size of the array. We can improve the time for insertion by keeping several sorted...
Using the knowledge of this chapter and the intuition of the members of your team, summarize threats that cloud services present to such ISVs.
A large population of ALOHA users manages to generate 50 requests/sec, including both originals and retransmissions. Time is slotted in units of 40 msec. (a) What is the chance of success on the...
Create a class diagram for the Premiere Products database, as shown in Chapter 1, Figure 1-5. If you need to make any assumptions in preparing the diagram, document those assumptions.
Discuss the hierarchical nature of traditional structured design. What kinds of systems and architectures are naturally more inclined to a hierarchy?
Describe the sequence of steps involved in retrieving a particular external record occurrence.
Assume that you are developing a new system for a multistate chain of video stores. Each store will run a fairly standardized set of video store processes (cataloging video inventory, customer...
According to Paul Greenberg, Amazon.com is the master of the 2-minute relationship and Boeing is the master of the 10-year relationship. Visit www.boeing.com and www.amazon.com. From Greenbergs...
Consider a database consisting of 10 consecutive disk blocks (block 1, block 2, . . ., block 10). Show the buffer state and a possible physical ordering of the blocks after the following updates,...
Contrast the scheduling policies you might use when trying to optimize a time-sharing system with those you would use to optimize a multi-programmed batch system.
Skydive Chicago (www.SkydiveChicago.com) is one of the premier skydiving resorts in the United States, serving skydivers ranging in skills from first-time jumpers to internationally competitive free...
Pretend that you have been asked to build a system that tracks student involvement in activities around campus. You have been given a file with information that needs to be imported into the system,...
1. In what ways does Amazon, as a company, evidence the willingness and ability to collaborate? 2. In what ways does Amazon, as a company, evidence the willingness and ability to experiment? Use...
LargeCo is planning a new promotion in Alabama (AL) and wants to know about the largest purchases made by customers in that state. Write a query to display the customer code, customer first name,...
First, develop a three-layer architectural design of the book exchange system. In Chapter 7 you developed a use case diagram, a class diagram, and a system sequence diagram for the use cases add a...
Create the tables. (Use the MS Access example shown in Figure P8.1 to see what table names and attributes touse.) Database name: Ch08 SimpleCo Table name: CUSTOMER Table name: INVOICE CUST NUM CUST...
Pretend that your mother is a real estate agent and that she has decided to automate her daily tasks by using a laptop computer. Consider her potential hardware and software needs and create a...
What are the most significant differences among structured, object-oriented, and agile methods? What do they have in common?
Show that there is no comparison sort whose running time is linear for at least half of the n! input of length n. What about a fraction of 1/n of the inputs of length n? What about a fraction 1/2n?
The administrators of Tiny College are so pleased with your design and implementation of their student registration/tracking system that they want you to expand the design to include the database for...
Why is there a trend toward cross-functional integrated enterprise systems in business?
Suppose that the three-statement while loop near the end of protocol 6 were removed from the code. Would this affect the correctness of the protocol or just the performance? Explain your answer.
Give precise formulations for each of the following as constraint satisfaction problems: a. Rectilinear floor-planning: find non-overlapping places in a large rectangle for a number of smaller...
During peak periods, Temporary Employment Corporation (TEC) places temporary workers in companies. TECs manager gives you the following description of the business: TEC has a file of candidates who...
Calculate how much disk space (in sectors, tracks, and surfaces) will be required to store 300,000 120-byte logical records if the disk is fixed sector with 512 bytes/sector, with 96 sectors/track,...
Describe the order pattern from the customers to the retailer every week.
With a b-bit counter, we can ordinarily only count up to 2b 1. With R. Morris's probabilistic counting, we can count up to a much larger value at the expense of some loss of precision. We let a...
Using your own words, explain how third-party cookies are created.
Is the function lg n! Polynomially bounded? Is the function lg lg n! Polynomially bounded?
Draw an EER diagram for the following description of a law firm: Each case handled by the firm has a unique case number; a date opened, date closed, and judgment description are also kept on each...
Write a database description for each of the relations shown, using SQL DDL (shorten, abbreviate, or change any data names, as needed for your SQL version). Assume the following attribute data types:...
Distinguish between logical and physical data independence.
Suppose that you have been given the table structure and data shown in Table 6.9, which was imported from an Excel spreadsheet. The data reflect that a professor can have multiple advisees, can serve...
Professor Marceau objects to the loop invariant used in the proof of Lemma 5.5. He questions whether it is true prior to the first iteration. His reasoning is that one could just as easily declare...
Large microwave antennas have become increasingly important for radio astronomy and satellite tracking. A large antenna with a diameter of 60 ft, for example, is subject to large wind gust torques. A...
Having mastered the principles of normalization described in Chapter 4, you recognize immediately that the star schema you developed for Millennium College (Problem and Exercise 4-30) is not in third...
(Adapted from Pearl (1988)) A used-car buyer can decide to carry out various tests with various costs (e.g., kick the tires, take the car to a qualified mechanic) and then, depending on the outcome...
Assume you are flying to a vacation resort. Create a BPMN diagram of the five to seven key activities in the process of getting your suitcase to its destination. Specify objectives and measures for...
Many business computers have three distinct and worldwide unique identifiers. What are they?
For the Dream Home case study documented in Appendix A, suggest attributes and methods that would be appropriate for Branch, Staff, and Property for Rent classes.
Consider the following bitmap technique for tracking free space in a file. For each block in the file, two bits are maintained in the bitmap. If the block is between 0 and 30 percent full the bits...
Database systems that store each relation in a separate operating-system file may use the operating systems security and authorization scheme, instead of defining a special scheme themselves. Discuss...
Develop an activity diagram based on the following narrative. Note any ambiguities or questions that you have as you develop the model. If you need to make assumptions, also note them. The shipping...
Write a query to display the invoice number, line numbers, product SKUs, product descriptions, and brand ID for sales of sealer and top coat products of the same brand on the sameinvoice. nv Num...
Review the Amazon.com Web site. Develop the requirements definition for the site. Create a list of functional business requirements that the system meets. What different kinds of nonfunctional...
Consider the following set of normalized relations from a database used by a mobile service provide to keep track of its users and advertiser customers. Assume that the mobile service provider has...