A switch designed for use with fast Ethernet has a backplane that can move 10 Gbps. How many frames/sec can it handle in the worst case?
Think about your school or local library and the processes involved in checking out books, signing up new borrowers, and sending out overdue notices, all from the librarys perspective. Describe three...
1. Before you start on the capstone project, you decide to hone your ERD skills by drawing your own version of the ERD shown in Figure 9-21 on page 364. You dont have to be precise its just a...
Consider a fixed partitioning scheme with equal-size partitions of 216 bytes and a total main memory size of 224 bytes. A process table is maintained that includes a pointer to a partition for each...
What do you understand by the term data model? Explain the difference between a data model and its implementation. Why is the difference important?
Here is a query on the suppliers and parts database. What does it do? What is the predicate for the result? ((S JOIN SP) WHERE P# = P# (P2) ) {S#, CITY}
Which is a more efficient way to determine the optimal number of multiplications in a matrix chain multiplication problem: enumerating all the ways of parenthesizing the product and computing the...
Consider the failed attempt of Alice to get Bob's public key in Fig. 8-23. Suppose that Bob and Alice already share a secret key, but Alice still wants Bob's public key. Is there now a way to get it...
Suppose half of all the transactions in a clothes shop purchase jeans, and one third of all transactions in the shop purchase T-shirts. Suppose also that half of the transactions that purchase jeans...
Apply Porter's value chain model to Dell (www.dell.com). What is Dell's competitive strategy? Who are Dell's major competitors? Describe Dell's business model. Describe the tasks that Dell must...
Suppose you have a chess program that can evaluate 1 million nodes per second. Decide on a compact representation of a game state for storage in a transposition table. About how many entries can you...
A system is shown in Fig. E2.29(a). (a) Determine G(s) and H(s) of the block diagram shown in Figure E2.29(b) that are equivalent to those of the block diagram of Figure E2.29(a). (b) Determine...
Write the proper sequence of activities in the design of a video rental database. (The initial ERD was shown in Figure 9.9.) The design must support all rental activities, customer payment tracking,...
Suppose you are told that the business process in Figure 3-13 has a negative margin. Explain what that means. Suppose the margin of some business process is a negative $1 million. If costs are...
Locate the prototype currently proposed for use in one of MRE's departments. Suggest a few modifications that would make this prototype even more responsive to the unit's needs.
1. According to Visible Analyst, functional decomposition diagrams (FDDs) involve top-down business planning decisions, and should be the starting point for modeling business functions and processes....
Create an E-R diagram for FAME based on the enterprise data model you developed in 1-52. Clearly state any assumptions you made in developing the diagram.
A system has a block diagram as shown in Figure AP2.2. Determine the transfer function T(s) = Y2(s) / R1(s) It is desired to decouple Y2(s) from R1(s) by obtaining T(s) = 0. Select G5(s) in terms of...
Create a stored procedure named prc_inv_amounts to update the INV_SUBTOTAL, INV_TAX, and INV_TOTAL. The procedure takes the invoice number as a parameter. The INV_SUBTOTAL is the sum of the...
Consider the alternative of increasing the value delivered by existing rental personnel. The text suggests possibly renting more kinds of equipment or selling items of use to guests who are renting...
Consider the SQL query select p.a1 from p, r1, r2 where p.a1 = r1.a1 or p.a1 = r2.a1. Under what conditions does the preceding query select values of p.a1 that are either in r1 or in r2? Examine...
An important metric in this area considered by companies is the Total Cost of Ownership (TCO) of their IT assets. Go online and research what TCO is and how it is related to IT asset management. How...
Distinguish between a control module, subordinate module, and library module on a structure chart. Can a particular module be all three? Why or why not?
The case features technology developed by Brand Protect (www.brandprotect.com); competitors include Mark- Monitor (www.markmonitor.com) and Name Protect (www.cscprotectbrands.com).Visit their Web...
Why would a systems analyst have to act as a translator? What groups might be involved?
Sky View Aerial Photography offers a wide range of aerial photographic, video, and infrared imaging services. The company has grown from its early days of snapping pictures of client houses to its...
Suppose you manage the buyers at AllRoad and you have been asked to help determine the requirements for a new vendor selection information system. As you think about those requirements, you wonder...
A major public university graduates approximately 10,000 students per year, and its development office has decided to build a Web-based system that solicits and tracks donations from the university's...
What decisions have to be made to develop a field specification?
Write queries in XQuery on the bibliography DTD fragment as shown below to do the following. a. Find all authors who have authored a book and an article in the same year. b. Display books and...
Identify the syntactically incorrect statements in the following: 1. Loop intX = intX + 1 Do While intX < 100 2. Do lstOutput.Items.Add("Hello") intX = intX + 1 While intCount < 10 3. Loop Until intX...
Using the descriptions of the attributes given in the figure, convert the ERD shown in Figure into a dependency diagram that is in at least 3NF.
Should a use case be prepared for every item on the event-response list? Why or why not?
Compare and contrast an information change management strategy with a political change management strategy. Is one better than the other?
The table structure shown in Table P6.6 contains many unsatisfactory components and characteristics. For example, there are several multivalued attributes, naming conventions are violated, and some...
This exercise develops a space-efficient variant of the forward'backward algorithm described in Figure. We wish to compute P (X k?e l; t) for k = 1... t. This will be done with a divide-and-conquer...
Develop a physical DFD that models the process of grocery shopping, from the time you write down a shopping list until the time you store purchased groceries in your home. Construct your DFD as a...
Discuss the issues the project manager must consider when assigning programming tasks to the programmers.
Examine the set of relations in Figure 4-39. What normal form are these in? How do you know this? If they are in 3NF, convert the relations into an EER diagram. What assumptions did you have to make...
A GT cell will machine the components for a family of parts. The parts come in several different sizes and the cell will be designed to quickly change over from one size to the next. This will be...
Using OLAP Query 1 shown in Figure 9.11 (based on data from Figure 9.7) as a starting point, give an example that illustrates a pivot operation.
A database is stored on ten 9-GB RAID 1 LUNs. A cascade three-site remote replication solution involving a synchronous and disk-buffered solution has been chosen for disaster recovery. All the LUNs...
Explain why it makes sense to first go through the normalization process and then denormalize.
One of the purchasing managers is interested in the impact of product prices on the sale of products of each brand. Write a query to display the brand name, brand type, average price of products of...
Consider the snapshot of the Linear Hashing index shown in Figure 11.7. Assume that a bucket split occurs whenever an overflow page is created. In figure 11.7 1. What is the maximum number of data...
Punch cards, keyboards, bar code scanners-the trend is clear. Input devices have continued to promote faster and more accurate data entry. Key to this advance is capturing data at their source, and...
Conversion Strategies the city of London has been well known for its many historic sites, live theater, and heavy traffic. In spite of a sophisticated underground subway system known locally as the...
Three Ethical Scenarios Whether youre an employer or an employee, you should know what your rights are when it comes to Internet use in the workplace. Mark Grossman, a Florida attorney who...
Write the sequence of micro-operations required for the bus structure of Figure 15.6 to add a number to the AC when the number is a. An immediate operand b. A direct-address operand c. An...
Describe the major phases in the systems development life cycle (SDLC).
Name a company for which you would like to work. Using Figure 8-6 as a guide, describe, as specifically as you can, how that company could use social media. Include community type, specific focus,...
Reread pages 264-265 of Chapter 10 about the SDLC process. List tasks to perform and assess whether you could perform each task. If you cannot perform that task, describe how you could outsource that...
A transfer machine has six stations that function as follows: In addition, transfer time = 0.18 min. Average downtime per occurrence = 8.0 min. A total of 20,000 parts must be processed through the...
Relate the time complexity of LRTA* to its space complexity.
How can the DBA function be placed within the organization chart? What effect(s) will such placement have on the DBA function?
Create a process diagram in BPMN to show Groupons Sales process.
Modern automated highways are being implemented around the world. Consider two highway lanes merging into a single lane. Describe a feedback control system carried on the automobile trailing the lead...
To get around the problem of sequence numbers wrapping around while old packets still exist, one could use 64-bit sequence numbers. However, theoretically, an optical fiber can run at 75 Tbps. What...
What is meant by the characteristics of fan-in and fan-out? What are their roles in structure chart quality?
The engine, body, and tires of a racing vehicle affect the acceleration and speed attainable [9]. The speed control of the car is represented by the model shown in Figure E5.2. (a) Calculate the...
After some further analysis, you discover that the commission field in the Policies table is updated yearly to reflect changes in the annual commission paid to agents on existing policies. Would...
You and a few of your classmates decided to become entrepreneurs. You came up with a great idea for a new mobile phone application that you think will make lots of money. Your business plan won...
1. What problems were Scotts Miracle Gro facing? 2. Which software was used to analyze data collected by Scotts? 3. How does a software tool such as Luminoso analyze data? 4. What are some strategic...
Suppose that a system has 5000 objects and 100 domains at some time. 1% of the objects are accessible (some combination of r, w and x) in all domains, 10% are accessible in two domains, and the...
Suppose that you work at AllRoad Parts and Kelly tells you that she doesnt believe that cheap, elastic provisioning of servers is possible. There has to be a catch somewhere, she says. Write a...
Describe the circumstances in which you would choose to use embedded SQL rather than SQL alone or only a general-purpose programming language.
How would you assess the quality of Internet research results?
Given the full joint distribution shown in Figure, calculate the following: a. P (toothache) b. P (Cavity) c. P (Toothache ?cavity) d. P (Cavity ? toothache V catch). toothache toothache mcatch catch...
Check out CEO Express (www.ceoexpress.com), a to prated Web portal for busy executives. See Figure. The site provides links to top U.S. and international newspapers, business and technology...
Suppose we wish not only to increment a counter but also to reset it to zero (i.e., make all bits in it 0). Show how to implement a counter as an array of bits so that any sequence of n INCREMENT and...
Represent the ownerships and permissions shown in this UNIX directory listing as a protection matrix. (Note: asw is a member of two groups: users and devel; gmw is a member only of users.) Treat each...
In Poor Richards Almanac, Benjamin Franklin penned the familiar lines: For the want of a nail the shoe was lost, for the want of a shoe the horse was lost, for the want of a horse the rider was lost,...
In this exercise, we will explore the use of local search methods to solve TSPs of the type defined in Exercise 4.8. a. Devise a hill-climbing approach to solve TSPs. Compare the results with optimal...
Write SQL queries to answer the following questions: a. Which students have an ID number that is less than 50000? b. What is the name of the faculty member whose ID is 4756? c. What is the smallest...
Consider Jakes processes in the opening vignette of this chapter. a. Create a BPMN for the Burger Assembly process. b. Write a procedure for how the in-store employee inputs a customer order on the...
Do you see any justifiable opportunities to denormalize the tables? If so, provide appropriate justification and create a new denormalized schema. Do you need to update your ER diagram based on these...
a. Normalize the Bank Accounts Table to 1NF by increasing the number of records in the existing table. b. Normalize the Bank Accounts Table to 1NF by creating a new separate table in addition to the...
Use the narratives in Chapter 1 and above to identify the typical outputs (reports and displays) the various stakeholders might want to retrieve from your database. Now, revisit the E-R diagram you...
Marcus Weber, IS project manager at ICAN Mutual Insurance Co., is reviewing the staffing arrangements for his next major project, the development of an expert system-based underwriters assistant....
Given a directed graph G = (V, E), explain how to create another graph G = (V, E) such that (a) G has the same strongly connected components as G, (b) G has the same component graph as G, and (c) E...
Suppose that we are given a key k to search for in a hash table with positions 0, 1, ..., m - 1, and suppose that we have a hash function h mapping the key space into the set {0, 1, ..., m -1. The...
What types of data transformations might be needed in order to build the Fitchwood data mart?
Create an ER model for each of the following descriptions: (a) A large organization has several parking lots, which are used by staff. (b) Each parking lot has a unique name, location, capacity, and...
What are input masks? What are validation rules? Why are they important?
Suppose your team owns and manages one of these ISVs. You learn that more and more of your clients are choosing SaaS cloud services like Google for email, rather than setting up local email servers....
A fundamental cryptographic principle states that all messages must have redundancy. But we also know that redundancy helps an intruder tell if a guessed key is correct. Consider two forms of...
Using the Crows Foot methodology, create an ERD that can be implemented for a medical clinic, using at least the following business rules: a. A patient can make many appointments with one or more...
Describe a way to reassemble IP fragments at the destination.
1. What are the benefits that result from implementing the technologies described in the case? How are those different for hospitals, doctors, insurance companies and patients? Provide examples of...
The linear model of a phase detector (phase-lock loop) can be represented by Figure P6.7 [9].The phase-lock systems are designed to maintain zero difference in phase between the input carrier signal...
Consider a 100,000-customer video server, where each customer watches two movies per month. Half the movies are served at 8 P.M. How many movies does the server have to transmit at once during this...
What are some problems associated with using packaged software? How can these problems be minimized?
Give an O (V + E)-time algorithm to compute the component graph of a directed graph G = (V, E). Make sure that there is at most one edge between two vertices in the component graph your algorithm...
Get all pairs of supplier numbers, Sx and Su say, such that Sx and Sy supply exactly the same set of parts each. Note for simplicity, you might want to use the original suppliers-and-parts data-base...
Consider the two tables shown in Figure 6.37: Figure 6.37 Relations SALES_REP and TERRITORY a. If a DBMS enforces an UPDATE RESTRICT option on the referential integrity constraint between SALES_REP...
Marcia Wilson owns and operates Marcia's Dry Cleaning, which is an upscale dry cleaner in a well-to-do suburban neighborhood. Marcia makes her business stand out from the competition by providing...
Consider the relational database of Figure. Give an expression in the relational algebra for each request: a. Modify the database so that Jones now lives in Newtown. b. Give all employees of First...
Helen Jarvis wants to determine the most important customers for Home Office products. She requests a listing of total dollar sales year-to-date for each customer who bought these products, as...
Consider a single-platter disk with the following parameters: rotation speed: 7200 rpm; number of tracks on one side of platter: 30,000; number of sectors per track: 600; seek time: one ms for every...
Refer to the Real World Case on companies using smartphones in the chapter. Do you think smaller companies like Lloyd's Construction are ready for large-scale implementations of technology in their...