Consider the alternative of replacing the rental personnel from the business process in Figure 3-13. a. Describe the changes that will need to be made to the process documented in Figure 3-13.You can...
In your local nuclear power station, there is an alarm that senses when a temperature gauge exceeds a given threshold. The gauge measures the temperature of the core. Consider the Boolean variables A...
Are top managers likely to be more effective if they have IT experience? Why or why not?
[Revised Question] An asset has a value of $1,000,000. In an attack, it is expected to lose 60 percent of its value. An attack is expected to be successful once every ten years. Countermeasure X will...
Consider the following relation for published books: BOOK (Book_title, Authorname, Book_type, Listprice, Author_affil, Publisher) Author_affil referes to the affiliation of the author. Suppose the...
A large telecommunications companys real estate holdings include more than 6 million square feet of property. To aid in its more than 400 real estaterelated transactions each year, the company...
Many small businesses operate with local servers running in storerooms, broom closets, and the like. Summarize the major risks of this situation. How can using a cloud vendor that is scores well...
Use Microsoft Access or similar database software to create a DBMS for the imaginary company called TopText Publishing, which is described in Case In Point 9.1 on page 365. Add several sample records...
Assume that you are an intern working with Maggie and that you are present at the initial conversations she has with Dr. Flores. Assume that Maggie asks you to help her investigate this opportunity....
Assuming that everyone on the Internet used PGP, could a PGP message be sent to an arbitrary Internet address and be decoded correctly by all concerned? Discuss your answer.
Suppose your company wants to create a logical model of a proposed information system, and then decide whether to develop the system in-house and purchase a software package. You have been asked to...
Draw a level 0 data flow diagram (DFD) for the dentist office system in Exercise B, Chapter 4.
Find the transfer function for Y(s)/R(s) for the idle-speed control system for a fuel-injected engine as shown in Figure P2.33. K, Fuel gain K, Speed command Air bypass Manifold Dynamics G ls) Gs(s)...
The systems analysts are developing the test plan for the user interface for the Holiday Travel Vehicles system. As the salespeople are entering a sales invoice into the system, they will be able to...
Suppose you are given the following business rules to form the basis for a database design. The database must enable the manager of a company dinner club to mail invitations to the club's members, to...
1. The case notes that a changing environment or business priorities can render an ongoing project obsolete even before it has been completed. What alternatives do CIOs who find themselves in this...
What are the advantages of using a database system? What are the disadvantages?
Create an activity-data (CRUD) matrix for the course registration system inFigure. Context Diagram Acadernic department Schedule data Enroliment request Faculty Class list Student memberCourse...
1. What are the business benefits of CRM implementations for organizations such as Berlin Packaging and Churchill Downs? What other uses of CRM would you recommend to the latter? Provide several...
Draw a level 0 data flow diagram (DFD) for the health club system in Exercise G, Chapter 4.
The South Dakota Department of Labor, Workers' Compensation division was sinking under a load of paper files. As a state agency which ascertains that employees are treated fairly when they are...
1. Develop a relational database schema in 3NF. 2. Develop an ODL database schema. Refer to the description of the State Patrol ticket processing system in the Chapter 5 case studies. Using the ERD...
The NCAA (National Collegiate Athletic Association) wants to develop a database to keep track of information about college basketball. Each university team belongs to only one conference (e.g., the...
Explore the Critical Thinking Community Web site at criticalthinking.org. Identify three important topics currently being discussed, and describe your findings.
Does voice over IP have the same problems with firewalls that streaming audio does? Discuss your answer.
Draw data models for the following entities: Movie (title, producer, length, director, genre) Ticket (price, adult or child, show-time, movie) Patron (name, adult or child, age)
Consider the following two transactions: T1: read (A); read (B); if A = 0then B: = B + 1; write (B). T2: read (B); read (A); if B = 0 then A: = A + 1; write (A). Let the consistency requirement be A...
Until June 2012, Pixel Sense was called Surface. At that time, Microsoft repurposed the name to use on its tablet devices. Surface was changed to Pixel Sense. What conclusions do you draw from these...
Net Suite by Net Suite Inc. (www.netsuite.com) enables small businesses to develop and deploy ERP, CRM, and e-commerce applications quickly. Their Web site presents detailed information about this...
1. What problems occurred when Wolf Peak upgraded from QuickBooks to a new accounting software package? How could these problems have been avoided? 2. Why did SAP's Business One prove to be a better...
Refer to Real World Case 1 on enterprise architecture. What are the advantages of a centralized enterprise architecture? What are the advantages of a decentralized approach that leaves these...
Consider the EER diagram in Figure 4-33. Let's make the following assumptions: There are 12,500,000 customers. These customers have altogether 40,000,000 card accounts. Of these 80 percent are...
Calculate the bandwidth-delay product for the following networks: (1) T1 (1.5 Mbps), (2) Ethernet (10 Mbps), (3) T3 (45 Mbps), and (4) STS-3 (155 Mbps). Assume an RTT of 100 msec. Recall that a TCP...
Consider the EER diagram for Pine Valley Furniture shown in Figure 3-12. Figure 5-9 looks at a portion of that EER diagram. Let's make a few assumptions about the average usage of the system: There...
Describe the major elements and issues with parallel development.
Create a sequence diagram for each of the following scenario descriptions for a health club membership system: When members join the health club, they pay a fee for a certain length of time. The...
The procedure BUILD-MAX-HEAP in Section 6.3 can be implemented by repeatedly using MAX-HEAP-INSERT to insert the elements into the heap. Consider the following implementation: BUILD-MAX-HEAP'(A) 1...
Describe an efficient algorithm that, given an interval i, returns an interval overlapping i that has the minimum low endpoint, or nil [T] if no such interval exists.
List and describe the four primary functional components of a software application.
Develop a use case diagram for the dental clinic. Part a. Based on the following descriptions; list the use cases and actors. The receptionist keeps track of patient and head-of household...
Tickets to a lottery cost $1. There are two possible prizes: a $10 payoff with probability 1/50, and a $1,000,000 payoff with probability 1/2,000,000. What is the expected monetary value of a lottery...
What are some of the limitations or dangers you see in the use of AI technologies such as expert systems, virtual reality, and intelligent agents? What could be done to minimize such effects?
Car dealers have realized how profitable it can be to sell automobiles by using the Web. Pretend that you work for a local car dealership that is part of a large chain such as CarMax. Create a system...
Provide three different options that are available for selecting an identifier for a student entity. What are the pros and cons of each option?
Consider Figure 5-7b. Assuming that the empty rows in the leaves of this index show space where new records can be stored, explain where the record for Sooners would be stored. Where would the record...
Provide an example of technical obsolescence, and explain how it can be a threat to an information system.
Discuss the rationale for locating applications on the client, the server, or split between client and server.
Suppose now that the leftmost router in Figure S.38 is replaced by a switch. Hosts A, B, C, and D and the right router are all star-connected into this switch. Give the source and destination MAC...
What is the principal difference between connectionless communication and connection-oriented communication?
What are the two most important factors in determining the type of data storage format that should be adopted for a system? Why are these factors so important?
Suppose that instead of always selecting the first activity to finish, we instead select the last activity to start that is compatible with all previously selected activities. Describe how this...
1. Identify the major points you would include in a communications plan at this point in the project. 2. What advice would you give your project team to help it manage the user expectations? 3. What...
Given the results in Figure 9-11, list three actions that AllRoad can take. Recommend one of these actions and justify your recommendation.
A stack is implemented as shown in Figure 10.14. Show the sequence of micro operations for a. Popping b. Pushing the stack Main memor Processor registers Stack limit pointer Free Block reserved c for...
A double-acting hydraulic cylinder is used to actuate a linear joint of an industrial robot. The inside diameter of the cylinder is 3.5 in. The piston rod has a diameter of 0.5 in. The hydraulic...
Provide an overview of the systems design phase.
Sometimes MDPs are formulated with a reward function R(s, a) that depends on the action taken or a reward function R (s, a, s) that also depends on the outcome state. a. Write the Bellman equations...
1. Search Facebook for Sedona, Arizona. Examine a variety of Sedona-area pages that you find. Using the knowledge of this chapter and your personal social media experience, evaluate these pages and...
1. What do you think Mr Quan Rusk-Tieu meant by the term 'single source of the truth'? 2. What data would be useful in a university data warehouse? 3. Who would be expected to benefit most from using...
Show how to compute the length of an LCS using only 2 min (m, n) entries in the c table plus O (1) additional space. Then show how to do this using min (m, n) entries plus O (1) additional space.
A charter company owns boats that are used for charter trips to islands. The company has created a computer system to track the boats it owns, including each boat's ID number, name, and seating...
Compare and contrast phases, steps, techniques, and deliverables.
Write a query to display the manager name, department name, department phone number, employee name, customer name, invoice date, and invoice total for the department manager of the employee who made...
Find the GPS locations for Atlanta, Georgia; Orlando, Florida; Savannah, Georgia; and Charlotte, North Carolina from www.gps-data-team.com/map/ and compute the estimated area enclosed by these four...
Is batch processing still relevant? Why or why not?
Off-road vehicles experience many disturbance inputs as they traverse over rough roads. An active suspension system can be controlled by a sensor that looks "ahead" at the road conditions. An example...
Sonic authors have claimed that perception and motor skills are the most important part of intelligence, and that higher level capacities are necessarily parasiticsimple add-ons to these underlying...
Refer to the Real World Case on Medical IT in the chapter. What do these automated or semi-automated technologies spell for the future of medicine? How much of this discipline can be captured using...
1. One approach to system development that Reliable might take is to start one large project that uses a waterfall model to the SDLC to thoroughly plan the project, analyze all requirements in...
Consider organizational feasibility: a. Explain what organizational feasibility means in the context of an inter-enterprise system. b. List criteria you would use for assessing organizational...
The QUICKSORT algorithm of Section 7.1 contains two recursive calls to itself. After the call to PARTITION, the left subarray is recursively sorted and then the right subarray is recursively sorted....
Prove that uniform-cost search and breadth-first search with constant step costs are optimal when used with the GRAPH-SEARCH algorithm. Show a state space with constant step costs in which...
1. To what events must the multiple listing service system respond? Create a complete event table listing the event, trigger, source, use case, response, and destination for each event. 2. Draw an...
Identify the use cases for the following system: Of the-Month Club (OTMC) is an innovative young firm that sells memberships to people who have an interest in certain products. People pay membership...
Suppose you are studying two hardware lease proposals. Option 1 costs $4,000, but requires that the entire amount be paid in advance. Option 2 costs $5,000, but the payments can be made $1,000 now...
In our analysis of the wumpus world, we used the fact that each square contains a pit with probability 0.2, independently of the contents of the other squares. Suppose instead that exactly N/5 pits...
For programmed I/O, Figure 7.5 indicates that the processor is stuck in a wait loop doing status checking of an I/O device. To increase efficiency, the I/O software could be written so that the...
In 1738, J. Bernoulli investigated the St. Petersburg paradox, which works as follows. You have the opportunity to play a game in which a fair coin is tossed repeatedly until it conies up heads. If...
Interviews should always be conducted as structured interviews." Do you agree with this statement? Why or why not?
Brian Callahan, IS project manager, is just about ready to depart for an urgent meeting called by Joe Campbell, manager of manufacturing operations. A major BPI project, sponsored by Joe, recently...
Directories can be implemented either as special files that can only be accessed in limited ways or as ordinary data files. What are the advantages and disadvantages of each approach?
A portable operating system is one that can be ported from one system architecture to another without any modification. Explain why it is infeasible to build an operating system that is completely...
What are two reasons for using layered protocols?
How are HTML, XML, and Java affecting business applications on the Web?
The system development team at the Wilcon Company is working on developing a new customer order entry system. In the process of designing the new system, the team has identified the following data...
What is Camtasia and why would you use it? What is the Windows Snipping Tool and why would you use it?
A new systems development project is Pete's first experience as a project manager, and he has led his team successfully to the programming phase of the project. The project has not always gone...
Fill in the two authorization tables for Pine Valley Furniture Company below, based on the following assumptions (enter Y for yes or N for no): Salespersons, managers, and carpenters may read...
What are main steps in the software acquisition process?
Create an EER diagram for FAME that extends the E-R diagram you developed in Chapter 2, 2-60, but accommodates the information gleaned from the e-mails from Pat Smith and Shannon Howard.
What is the bandwidth-delay product for a 50-Mbps channel on a geostationary satellite? If the packets are all 1500 bytes (including overhead), how big should the window be in packets?
Consider the relations specified in Problem and Exercise 5-37. Assume that the database has been implemented without denormalization. Further assume that the database is global in scope and covers...
Modify the HTML document below so that the word "Rover" is linked to the document whose URL is animals.org/pets/ dogs.html
List and describe the four main system changeover methods. Which one generally is the least expensive? Which is the safest? Explain your answers.
Suppose a publicly traded large organization operates its own Web farm and has certifications indicating that it has complied with ISO 27001 and has issued a statement of controls in accordance with...
Show how to maintain a dynamic set Q of numbers that supports the operation MIN-GAP, which gives the magnitude of the difference of the two closest numbers in Q. For example, if Q = {1, 5, 9, 15, 18,...
Pick another government agency that you understand well. Explain what existing processes would be replaced, what the benefits of an ERP system would be, and the challenges faced.
Refer to the Real World Case on Kennametal, Haworth, and Others in the chapter. Do the examples discussed in the case show that customization and ERPs should never go together? Discuss.
1. What is the difference between a dashboard and a scorecard? Why is it important that managers know the difference between the two? What can they learn from each? 2. In what ways have the companies...
a. Depict full key functional dependencies, partial functional dependencies (if any), and transitive functional dependencies (if any) in the STUDENT INTERNSHIP Table. b. Show the result of...