Describe the advantages of a client/server architecture.
Figure 4-14 introduces the concept of affinity clustering. Suppose that through affinity clustering it was found that three business functions provided the bulk of the use of five data entities. What...
For the project you described in Problem and Exercise 3-43, assume that the worst has happened. A key team member has dropped out of the project and has been assigned to another project in another...
One of the most difficult aspects of using the single location approach to installation is choosing an appropriate location. What factors should be considered in picking a pilot site?
Look again at the activities outlined in Problem and Exercise 3-40. Assume that your team is in its first week of the project and has discovered that each of the activity duration estimates is wrong....
Use the outline for the BPP provided in Figure 5-9 to present the system specifications for the information system you chose for Problem and Exercise 5-35. Problem and Exercise 5-35. Consider your...
Change the discount rate for Problem and Exercise 5-35 to 10 percent and redo the analysis. Problem and Exercise 5-35. Consider your use of a PC at either home or work and list tangible benefits from...
Change the recurring costs in Problem and Exercise 5-35 to $40,000 and redo the analysis. Problem and Exercise 5-35. Consider your use of a PC at either home or work and list tangible benefits from...
Change the time horizon in Problem and Exercise 5-35 to three years and redo the analysis. Problem and Exercise 5-35. Consider your use of a PC at either home or work and list tangible benefits from...
Consider the situation you addressed in Problem and Exercise 5-35. Create numeric cost estimates for each of the costs you listed. Calculate the net present value and return on investment. Include a...
Change the discount rate for Problem and Exercise 5-43 to 12 percent and redo the analysis. Problem and Exercise 5-43 Change the time horizon in Problem and Exercise 5-35 to three years and redo the...
Visit the website for an IT magazine and find an article that discusses business cases. Summarize the article and what you learned from it.
Change the recurring costs in Problem and Exercise 5-43 to $40,000 and redo the analysis. Problem and Exercise 5-43 Change the time horizon in Problem and Exercise 5-35 to three years and redo the...
For the system you chose for Problem and Exercise 5-35, complete section 1.0, A, Project Overview, of the BPP Report. How important is it that this initial section of the BPP Report is done well?...
List three characteristics each of traditional and web-based development.
Many financial tools are developed using Microsoft Excel. Identify three applications built using Excel, and describe how they are used in an organization.
How does cloud computing support Web 2.0 applications?
Which symbol is not used in a context diagram?
For the system you chose for Problem and Exercise 5-35, complete section 2.0, A, Alternatives, of the BPP Report. Without conducting a full-blown feasibility analysis, what is your gut feeling as to...
For the system you chose for Problem and Exercise 5-35, complete section 3.0, AF, Feasibility Analysis, of the BPP Report. How does this feasibility analysis compare with your gut feeling from the...
When might it be appropriate to violate the no crossed lines guideline in DFDs?
For the system you chose for Problem and Exercise 5-35, complete section 4.0, AC, Management Issues, of the BPP Report. Why might people sometimes feel that these additional steps in the project plan...
Prepare a plan, similar to Figure 6-2, for an interview with your academic advisor to determine which courses you should take to develop the skills you need to be hired as a programmer/analyst....
Describe several projects you are involved in or plan to undertake, whether they are related to your education or to your professional or personal life (e.g., purchasing a new vehicle, learning a new...
Figure 6-2 shows part of a guide for an interview. How might an interview guide differ when a group interview is to be conducted? Figure 6-2 Interview Outline Interviewee: Interviewer: Name of person...
What has been the impact of the Internet on system architecture?
What is client/server architecture?
What are the three functions that every business information system must carry out, irrespective of system architecture?
Effective interviewing is not something that you can learn from just reading about it. You must first do some interviewing, preferably a lot of it, because interviewing skills improve only with...
Draw an activity diagram for the following case. Maximum Software develops and supplies software products to individuals and businesses. As part of its operations, Maximum provides a 1-800 telephone...
What are three emerging trends in user interface design?
What is output security?
What are the seven habits of successful interface designers?
Draw a use case diagram for the following situation (state any assumptions you believe you have to make in order to develop a complete diagram). Then convert the use case diagram into a sequence...
Use BPMN to depict Hoosier Burgers food-ordering system from Figure 7-5 as a business process model. Figure 7-5 CUSTOMER KITCHEN 1.0 Customer Order Receive and Transform Food Order Receipt Customer...
Why is a transparent interface desirable?
What is SaaS?
List two reasons offshoring may be risky.
Why would a company choose in-house software development?
Draw a use case diagram for the situation described in Problem and Exercise 7-39, page 210. Problem and Exercise 7-39 Starting with a context diagram, draw as many nested DFDs as you consider...
Draw a use case diagram for the situation described in Problem and Exercise 7-42. Problem and Exercise 7-42 Develop a context diagram and a level-0 diagram for the contracting system described in the...
Draw a use case diagram for the situation described in Problem and Exercise 7-40. Problem and Exercise 7-40 Starting with a context diagram, draw as many nested DFDs as you consider necessary to...
How is the increased use of smartphones and tablets, with their smaller screen size, affecting user interface design practices?
Starting with a context diagram, draw as many nested DFDs as you consider necessary to represent all of the details of the system described in the following narrative. In drawing these diagrams, if...
Develop a context diagram and as many nested DFDs as you consider necessary to represent all the details of the training logistics system described in the following narrative. If you discover that...
In a relatively small company that sells thin, electronic keypads and switches, the rules for selling products specify that sales representatives are assigned to unique regions of the country. Sales...
Consider the foreign-key constraint from the dept name attribute of instructor to the department relation. Give examples of inserts and deletes to these relations that can cause a violation of the...
Read the narratives below and follow the directions for each. If you discover that the narrative is incomplete, make up reasonable explanations to complete the story. Supply these extra explanations...
At a local bank, loan officers must evaluate loan applications before approving or denying them. During this evaluation process, many factors regarding the loan request and the applicants background...
What trade-offs do write-optimized indices pose as compared to B+-tree indices?
Design a database for an airline. The database must keep track of customers and their reservations, flights and their status, seat assignments on individual flights, and the schedule and routing of...
Consider the ER diagram in Figure 3.21, which shows a simplified schema for an airline reservations system. Extract from the ER diagram the requirements and constraints that produced this schema. Try...
Draw an EER diagram for a game of chess as described in Exercise 4. 24. Focus on persistent storage aspects of the system. For example, the system would need to retrieve all the moves of every game...
Figure 4.12 shows an example of an EER diagram for a small-private-airport database; the database is used to keep track of airplanes, their owners, airport employees, and pilots. From the...
Consider a MAIL_ORDER database in which employees take orders for parts from customers. The data requirements are summarized as follows: The mail order company has employees, each identified by a...
Does it make sense for FAME to use enterprise keys? If so, create the appropriate enterprise keys and revise the relational schema accordingly.
In a normalized database, all customer information is stored in a Customer table, invoices are stored in an Invoice table, and related account manager information in an Employee table. Suppose a...
Consider the ER design for the MAIL_ORDER database that was modeled using a tool like ERwin or Rational Rose in Laboratory Exercise 3.32. Using the SQL schema generation feature of the modeling tool,...
Discuss the potential advantages, technical challenges, and disadvantages of using cloud-based database provisioning.
When using the UML to describe a single system, most designers would use __________ . a. A single type of diagram b. At least three types of diagrams c. Most of the available types of diagrams d. All...
You use a ________ diagram when you want to emphasize the files, database tables, documents, and other components used by a systems software. a. State machine b. Component c. Deployment d. Use case
How does Apache Spark differ from Hadoop?
Why does an information gap still exist despite the surge in data in most firms?
Visit an organization that has implemented a database approach and interview individuals there about the security measures they take routinely. Evaluate each of the following at the organization: a....
At a top level, what are the main design variables in a multicore organization?
A nested query is a query within a query. More specifically, a nested query is a parenthesized query whose result can be used as a value in a number of places, such as instead of a relation. Specify...
Let the language L be accepted by the transition graph T and let L not contain the word ba. We want to build a new TG that accepts exactly L and the word ba. (i) One suggestion is to draw an edge...
Specify queries a, b, c, and d of Exercise 8.17 in both tuple and domain relational calculus. Exercise 8.17 Consider the AIRLINE relational database schema shown in Figure 5.8, which was described in...
What update anomalies occur in the EMP_PROJ and EMP_DEPT relations of Figures 14.3 and 14.4? Figures 14.3 Figures 14.4 Redundancy MP DEPT Ename Smith, John B. Wong, Franklin T. Zelaya, Alicia J....
Consider the class definitions of Programming Exercise 5 in Chapter 14,Reusing Code in C++. If you havent yet done that exercise, do so now.Then do the following: Write a program that uses standard...
Specify queries a, b, c, e, f, i, and j of Exercise 8.16 in both tuple and domain relational calculus. Exercise 8.16 Specify the following queries on the COMPANY relational database schema shown in...
Write a function with an old-style interface that has this prototype: int reduce(long ar[], int n); The actual arguments should be the name of an array and the number of elements in the array.The...
Consider the AIRPORT database described in Exercise 4.21. Specify a number of operations/methods that you think should be applicable to that application. Specify the ODL classes and methods for the...
Consider the following relation: TRIP (Trip_id, Start_date, Cities_visited, Cards_used) This relation refers to business trips made by company salespeople. Suppose the TRIP has a single Start_date...
Let L be some regular language in which all the words happen to have an even length. Let us de fine the new language Twist(L) to be the set of all the words of L twisted, where by twisted we mean the...
Specify the following views as queries in XQuery on the company XML schema shown in Figure 13.5. a. A view that has the department name, manager name, and manager salary for every department b. A...
Why do spurious tuples occur in the result of joining the EMP_PROJ1 and EMP_ LOCS relations in Figure 14.5 (result shown in Figure 14.6)? Figure 14.5 Figure 14.6 Ssn Pnumber Hours Pname Plocation...
Consider the ER diagram in Figure 3.24. Assume that a course may or may not use a textbook, but that a text by definition is a book that is used in some course. A course may not use more than five...
Specify the following queries in SQL on the COMPANY relational database schema shown in Figure 5.5. Show the result of each query if it is applied to the COMPANY database in Figure 5.6. a. Retrieve...
Consider that the EMPLOYEE tables constraint EMPSUPERFK as specified in Figure 6.2 is changed to read as follows: CONSTRAINT EMPSUPERFK FOREIGN KEY (Super_ssn) REFERENCES EMPLOYEE(Ssn) ON DELETE...
Show the result of each of the sample queries in Section 8.5 as it would apply to the database state in Figure 5.6. Figure 5.6 MPLOYE Sen 123456789 1965-01-09 731 Fondren, Houston, TX M 30000...
Explain that some software development problems result in software that is difficult or impossible to deploy in a secure fashion. There are at least two dozen problem areas or categories in software...
Consider the AIRLINE relational database schema shown in Figure 5.8, which describes a database for airline flight information. Each FLIGHT is identified by a Flight_number, and consists of one or...
The body of a method is enclosed in __________. a. Curly braces { } b. Square brackets [] c. Parentheses () d. Quotation marks ""
Write a short C++ function to count the number of nodes in a circularly linked list.
Add a function size() to our C++ implementation of a singly link list. Can you design this function so that it runs in O(1) time?
Consider the LIBRARY relational database schema shown in Figure 8.14, which is used to keep track of books, borrowers, and book loans. Referential integrity constraints are shown as directed arcs in...
Repeat Laboratory Exercises 8.34 through 8.38 in domain relational calculus (DRC) by using the DRC interpreter. Exercises 8.34 Specify and execute the following queries in relational algebra (RA)...
Consider the following functional dependencies: Applicant_ID S Applicant_Name Applicant_ID S Applicant_Address Position_ID S Position_Title Position_ID S Date_Position_Opens Position_ID S Department...
Describe how to implement a capacity-limited stack, which uses the functions of a capacity-limited deque to perform the functions of the stack ADT in ways that do not throw exceptions when we attempt...
If we implemented the stack S from the previous problem with an array, as described in this chapter, then what is the current value of the top member variable?
Give a complete pseudo-code description of the recursive merge-sort algorithm that takes an array as its input and output.
Suppose that several secondary indexes exist on nonkey fields of a file, implemented using option 3 of Section 17.1.3; for example, we could have secondary indexes on the fields Department_code,...
Review the guidelines for attaining usability of forms and reports in Table 10-9. Consider an online form you might use to register a guest at a hotel. For each usability factor, list two examples of...
Consider the design of a registration system for a hotel. Following the design specification items in Figure 11-2, briefly describe the relevant users, tasks, and displays involved in such a system....
Describe an algorithm for counting the number of left external nodes in a binary tree, using the Binary tree ADT.
Write a method that searches a numeric array for a specified value. The method should return the subscript of the element containing the value if it is found in the array. If the value is not found,...
Write a program that creates a String Array List. Continually prompt the user for Strings to add to the list until the user enters a sentinel value. Display the Strings in a single line separated by...
Adapt Algorithms 17.2 and 17.3, which outline search and insertion procedures for a B + -tree, to a B-tree. Algorithm 17.2. Searching for a Record with Search Key Field Value K, Using a B + -Tree n ...
Write programs that implement Algorithms 15.4 and 15.5. Algorithm 15.4 Relational Synthesis into 3NF with Dependency Preservation and Nonadditive Join Property Input: A universal relation R and a set...