A large telecommunications companys real estate holdings include more than 6 million square feet of property. To aid in its more than 400 real estaterelated transactions each year, the company...
Assume that you are an intern working with Maggie and that you are present at the initial conversations she has with Dr. Flores. Assume that Maggie asks you to help her investigate this opportunity....
Martial Arts R Us (MARU) needs a database. MARU is a martial arts school with hundreds of students. It is necessary to keep track of all the different classes that are being offered, who is assigned...
Many small businesses operate with local servers running in storerooms, broom closets, and the like. Summarize the major risks of this situation. How can using a cloud vendor that is scores well...
Use Microsoft Access or similar database software to create a DBMS for the imaginary company called TopText Publishing, which is described in Case In Point 9.1 on page 365. Add several sample records...
Draw a level 0 data flow diagram (DFD) for the dentist office system in Exercise B, Chapter 4.
Suppose your company wants to create a logical model of a proposed information system, and then decide whether to develop the system in-house and purchase a software package. You have been asked to...
Assuming that everyone on the Internet used PGP, could a PGP message be sent to an arbitrary Internet address and be decoded correctly by all concerned? Discuss your answer.
The systems analysts are developing the test plan for the user interface for the Holiday Travel Vehicles system. As the salespeople are entering a sales invoice into the system, they will be able to...
[Revised Question] An asset has a value of $1,000,000. In an attack, it is expected to lose 60 percent of its value. An attack is expected to be successful once every ten years. Countermeasure X will...
What are the advantages of using a database system? What are the disadvantages?
1. The case notes that a changing environment or business priorities can render an ongoing project obsolete even before it has been completed. What alternatives do CIOs who find themselves in this...
Draw a level 0 data flow diagram (DFD) for the health club system in Exercise G, Chapter 4.
Create an activity-data (CRUD) matrix for the course registration system inFigure. Context Diagram Acadernic department Schedule data Enroliment request Faculty Class list Student memberCourse...
1. Develop a relational database schema in 3NF. 2. Develop an ODL database schema. Refer to the description of the State Patrol ticket processing system in the Chapter 5 case studies. Using the ERD...
Consider the following relation for published books: BOOK (Book_title, Authorname, Book_type, Listprice, Author_affil, Publisher) Author_affil referes to the affiliation of the author. Suppose the...
The NCAA (National Collegiate Athletic Association) wants to develop a database to keep track of information about college basketball. Each university team belongs to only one conference (e.g., the...
The South Dakota Department of Labor, Workers' Compensation division was sinking under a load of paper files. As a state agency which ascertains that employees are treated fairly when they are...
Explore the Critical Thinking Community Web site at criticalthinking.org. Identify three important topics currently being discussed, and describe your findings.
Draw data models for the following entities: Movie (title, producer, length, director, genre) Ticket (price, adult or child, show-time, movie) Patron (name, adult or child, age)
Until June 2012, Pixel Sense was called Surface. At that time, Microsoft repurposed the name to use on its tablet devices. Surface was changed to Pixel Sense. What conclusions do you draw from these...
Consider the following two transactions: T1: read (A); read (B); if A = 0then B: = B + 1; write (B). T2: read (B); read (A); if B = 0 then A: = A + 1; write (A). Let the consistency requirement be A...
Calculate the bandwidth-delay product for the following networks: (1) T1 (1.5 Mbps), (2) Ethernet (10 Mbps), (3) T3 (45 Mbps), and (4) STS-3 (155 Mbps). Assume an RTT of 100 msec. Recall that a TCP...
Does voice over IP have the same problems with firewalls that streaming audio does? Discuss your answer.
Net Suite by Net Suite Inc. (www.netsuite.com) enables small businesses to develop and deploy ERP, CRM, and e-commerce applications quickly. Their Web site presents detailed information about this...
Create a sequence diagram for each of the following scenario descriptions for a health club membership system: When members join the health club, they pay a fee for a certain length of time. The...
Suppose you are given the following business rules to form the basis for a database design. The database must enable the manager of a company dinner club to mail invitations to the club's members, to...
1. What are the business benefits of CRM implementations for organizations such as Berlin Packaging and Churchill Downs? What other uses of CRM would you recommend to the latter? Provide several...
1. What problems occurred when Wolf Peak upgraded from QuickBooks to a new accounting software package? How could these problems have been avoided? 2. Why did SAP's Business One prove to be a better...
Describe the major elements and issues with parallel development.
Consider the EER diagram for Pine Valley Furniture shown in Figure 3-12. Figure 5-9 looks at a portion of that EER diagram. Let's make a few assumptions about the average usage of the system: There...
Describe an efficient algorithm that, given an interval i, returns an interval overlapping i that has the minimum low endpoint, or nil [T] if no such interval exists.
Refer to Real World Case 1 on enterprise architecture. What are the advantages of a centralized enterprise architecture? What are the advantages of a decentralized approach that leaves these...
Develop a use case diagram for the dental clinic. Part a. Based on the following descriptions; list the use cases and actors. The receptionist keeps track of patient and head-of household...
What are some of the limitations or dangers you see in the use of AI technologies such as expert systems, virtual reality, and intelligent agents? What could be done to minimize such effects?
Provide an example of technical obsolescence, and explain how it can be a threat to an information system.
The procedure BUILD-MAX-HEAP in Section 6.3 can be implemented by repeatedly using MAX-HEAP-INSERT to insert the elements into the heap. Consider the following implementation: BUILD-MAX-HEAP'(A) 1...
Provide three different options that are available for selecting an identifier for a student entity. What are the pros and cons of each option?
What is the principal difference between connectionless communication and connection-oriented communication?
Car dealers have realized how profitable it can be to sell automobiles by using the Web. Pretend that you work for a local car dealership that is part of a large chain such as CarMax. Create a system...
Consider Figure 5-7b. Assuming that the empty rows in the leaves of this index show space where new records can be stored, explain where the record for Sooners would be stored. Where would the record...
List and describe the four primary functional components of a software application.
Discuss the rationale for locating applications on the client, the server, or split between client and server.
Given the results in Figure 9-11, list three actions that AllRoad can take. Recommend one of these actions and justify your recommendation.
Suppose that instead of always selecting the first activity to finish, we instead select the last activity to start that is compatible with all previously selected activities. Describe how this...
What are the two most important factors in determining the type of data storage format that should be adopted for a system? Why are these factors so important?
1. Identify the major points you would include in a communications plan at this point in the project. 2. What advice would you give your project team to help it manage the user expectations? 3. What...
Tickets to a lottery cost $1. There are two possible prizes: a $10 payoff with probability 1/50, and a $1,000,000 payoff with probability 1/2,000,000. What is the expected monetary value of a lottery...
Provide an overview of the systems design phase.
Sometimes MDPs are formulated with a reward function R(s, a) that depends on the action taken or a reward function R (s, a, s) that also depends on the outcome state. a. Write the Bellman equations...
1. What do you think Mr Quan Rusk-Tieu meant by the term 'single source of the truth'? 2. What data would be useful in a university data warehouse? 3. Who would be expected to benefit most from using...
Is batch processing still relevant? Why or why not?
Write a query to display the manager name, department name, department phone number, employee name, customer name, invoice date, and invoice total for the department manager of the employee who made...
Show how to compute the length of an LCS using only 2 min (m, n) entries in the c table plus O (1) additional space. Then show how to do this using min (m, n) entries plus O (1) additional space.
Find the GPS locations for Atlanta, Georgia; Orlando, Florida; Savannah, Georgia; and Charlotte, North Carolina from www.gps-data-team.com/map/ and compute the estimated area enclosed by these four...
Compare and contrast phases, steps, techniques, and deliverables.
A stack is implemented as shown in Figure 10.14. Show the sequence of micro operations for a. Popping b. Pushing the stack Main memor Processor registers Stack limit pointer Free Block reserved c for...
Sonic authors have claimed that perception and motor skills are the most important part of intelligence, and that higher level capacities are necessarily parasiticsimple add-ons to these underlying...
Refer to the Real World Case on Medical IT in the chapter. What do these automated or semi-automated technologies spell for the future of medicine? How much of this discipline can be captured using...
A charter company owns boats that are used for charter trips to islands. The company has created a computer system to track the boats it owns, including each boat's ID number, name, and seating...
Consider organizational feasibility: a. Explain what organizational feasibility means in the context of an inter-enterprise system. b. List criteria you would use for assessing organizational...
Consider the EER diagram in Figure 4-33. Let's make the following assumptions: There are 12,500,000 customers. These customers have altogether 40,000,000 card accounts. Of these 80 percent are...
1. One approach to system development that Reliable might take is to start one large project that uses a waterfall model to the SDLC to thoroughly plan the project, analyze all requirements in...
The QUICKSORT algorithm of Section 7.1 contains two recursive calls to itself. After the call to PARTITION, the left subarray is recursively sorted and then the right subarray is recursively sorted....
A double-acting hydraulic cylinder is used to actuate a linear joint of an industrial robot. The inside diameter of the cylinder is 3.5 in. The piston rod has a diameter of 0.5 in. The hydraulic...
Suppose you are studying two hardware lease proposals. Option 1 costs $4,000, but requires that the entire amount be paid in advance. Option 2 costs $5,000, but the payments can be made $1,000 now...
Identify the use cases for the following system: Of the-Month Club (OTMC) is an innovative young firm that sells memberships to people who have an interest in certain products. People pay membership...
What are two reasons for using layered protocols?
In our analysis of the wumpus world, we used the fact that each square contains a pit with probability 0.2, independently of the contents of the other squares. Suppose instead that exactly N/5 pits...
1. To what events must the multiple listing service system respond? Create a complete event table listing the event, trigger, source, use case, response, and destination for each event. 2. Draw an...
Suppose now that the leftmost router in Figure S.38 is replaced by a switch. Hosts A, B, C, and D and the right router are all star-connected into this switch. Give the source and destination MAC...
Interviews should always be conducted as structured interviews." Do you agree with this statement? Why or why not?
1. Search Facebook for Sedona, Arizona. Examine a variety of Sedona-area pages that you find. Using the knowledge of this chapter and your personal social media experience, evaluate these pages and...
Directories can be implemented either as special files that can only be accessed in limited ways or as ordinary data files. What are the advantages and disadvantages of each approach?
The system development team at the Wilcon Company is working on developing a new customer order entry system. In the process of designing the new system, the team has identified the following data...
How are HTML, XML, and Java affecting business applications on the Web?
A new systems development project is Pete's first experience as a project manager, and he has led his team successfully to the programming phase of the project. The project has not always gone...
Fill in the two authorization tables for Pine Valley Furniture Company below, based on the following assumptions (enter Y for yes or N for no): Salespersons, managers, and carpenters may read...
The performance of a snooping cache-coherent multiprocessor depends on many detailed implementation issues that determine how quickly a cache responds with data in an exclusive or M state block. In...
What is the bandwidth-delay product for a 50-Mbps channel on a geostationary satellite? If the packets are all 1500 bytes (including overhead), how big should the window be in packets?
Brian Callahan, IS project manager, is just about ready to depart for an urgent meeting called by Joe Campbell, manager of manufacturing operations. A major BPI project, sponsored by Joe, recently...
What are main steps in the software acquisition process?
What is Camtasia and why would you use it? What is the Windows Snipping Tool and why would you use it?
Pick another government agency that you understand well. Explain what existing processes would be replaced, what the benefits of an ERP system would be, and the challenges faced.
Modify the HTML document below so that the word "Rover" is linked to the document whose URL is animals.org/pets/ dogs.html
Show how to maintain a dynamic set Q of numbers that supports the operation MIN-GAP, which gives the magnitude of the difference of the two closest numbers in Q. For example, if Q = {1, 5, 9, 15, 18,...
List and describe the four main system changeover methods. Which one generally is the least expensive? Which is the safest? Explain your answers.
Suppose a publicly traded large organization operates its own Web farm and has certifications indicating that it has complied with ISO 27001 and has issued a statement of controls in accordance with...
Refer to the Real World Case on Kennametal, Haworth, and Others in the chapter. Do the examples discussed in the case show that customization and ERPs should never go together? Discuss.
1. What is the difference between a dashboard and a scorecard? Why is it important that managers know the difference between the two? What can they learn from each? 2. In what ways have the companies...
Create an EER diagram for FAME that extends the E-R diagram you developed in Chapter 2, 2-60, but accommodates the information gleaned from the e-mails from Pat Smith and Shannon Howard.
Consider the relations specified in Problem and Exercise 5-37. Assume that the database has been implemented without denormalization. Further assume that the database is global in scope and covers...
In 1738, J. Bernoulli investigated the St. Petersburg paradox, which works as follows. You have the opportunity to play a game in which a fair coin is tossed repeatedly until it conies up heads. If...
What do you understand by the term data model? Explain the difference between a data model and its implementation. Why is the difference important?
A switch designed for use with fast Ethernet has a backplane that can move 10 Gbps. How many frames/sec can it handle in the worst case?
Prove that uniform-cost search and breadth-first search with constant step costs are optimal when used with the GRAPH-SEARCH algorithm. Show a state space with constant step costs in which...
Think about your school or local library and the processes involved in checking out books, signing up new borrowers, and sending out overdue notices, all from the librarys perspective. Describe three...
1. Before you start on the capstone project, you decide to hone your ERD skills by drawing your own version of the ERD shown in Figure 9-21 on page 364. You dont have to be precise its just a...
Here is a query on the suppliers and parts database. What does it do? What is the predicate for the result? ((S JOIN SP) WHERE P# = P# (P2) ) {S#, CITY}
a. Depict full key functional dependencies, partial functional dependencies (if any), and transitive functional dependencies (if any) in the STUDENT INTERNSHIP Table. b. Show the result of...