Compute the true utility function and the best linear approximation in x and y (as in Equation (21.9)) for the following environments: a. A 10 x 10 world with a single +1 terminal state at (10, 10)....
Consider the AIRLINE relational database schema shown in Figure 3.8, which describes a database for airline flight information. Each FLIGHT is identified by a flight NUMBER, and consists of one or...
Devise suitable features for stochastic grid worlds (generalizations of the 4 x 3 world) that contain multiple obstacles and multiple terminal states with +1 or 1 reward.
Suppose you lose your company laptop at an airport. What should you do? Does it matter what data is stored on your disk drive? If the computer contained sensitive or proprietary data, are you...
What are several e-business applications that you might recommend to a small company to help it survive and succeed in challenging economic times? Why?
Draw an ISD for the DFD in Exercise I in Chapter 5.
Distinguish between business, user, and functional requirements.
Describe the primary activities of the design phase of the SDLC.
Suppose you had a neural network with linear activation functions. That is, for each unit the output is some constant times the weighted sum of the inputs. a. Assume that the network has one hidden...
Is it possible with a sequential file organization to permit sequential scanning of the data, based on several sorted orders? If not, why not? If it is possible, how?
Suppose we put into a logical database a segment of the U.S. census data listing the age, city of residence, date of birth, and mother of every person, using social security numbers as identifying...
Telepresence is described in the case as a green technology because it replaces air travel with a more environmentally friendly alternative. Recently, many organizations are looking to IT to help...
The data flow symbols shown on page 185 were designed by Ed Yourdon, a well-known IT author, lecturer, and consultant. Many IT professionals consider him to be among the most influential men and...
A DMA controller serves four receive-only telecommunication links (one per DMA channel) having a speed of 64 Kbps each. a. Would you operate the controller in burst mode or in cycle-stealing mode? b....
In the public-key authentication protocol of Fig. 8-43, in message 7, RB is encrypted with KS. Is this encryption necessary, or would it have been adequate to send it back in plaintext? Explain your...
As part of your job search, you decide to find out more about salaries and qualifications for systems analysts in the area where you would like to work. To increase your knowledge, search the...
Search the Web to determine what existing vendors such as Oracle and Microsoft are doing with regard to NoSQL databases. Also, search to see what support such vendors are providing for Big Data data...
A remote manipulator control system has unity feedback and a loop transfer function We want the steady-state position error for a step input to be less than or equal to 10% of the magnitude of the...
How are a file and a database different from each other?
Examine the data models that you created for Exercise D. How would the respective models change (if at all) on the basis of these corresponding new assumptions? Two patients have the same first and...
Suppose that we define the utility of a state sequence to be the maximum reward obtained in any state in the sequence. Show that this utility function does not result in stationary preferences...
Describe the main building blocks for the sequence diagram and how they are represented on the model.
Explain the process you would use to determine the feasibility of Garden Tracker.List data you need for such an assessment, and explain how you might obtain or estimate that data.
Go online and look at different companies in one of the industries mentioned in the case, noting which companies offer free wireless access and which ones do not. Break into small groups and...
The force versus displacement for a spring is shown in Figure E2.3 for the spring-mass-damper system of Figure 2.1. Graphically find the spring constant for the equilibrium point of y = 0.5 cm and a...
Based on the DFD fragments you developed in Chapter 6 and the structure charts from Chapter 10, develop a table of inputs along with the associated data couples and data fields for each input. Also,...
Why should you consider the storage formats that already exist in an organization when deciding on a storage format for a new system?
Apply the classification algorithm to the following set of data records. The class attribute is Repeat Customer. RID Age City Gender Education Repeat Customer 101 20..30 NY F 102 20.30 SF 103 31.40...
Quinnipiac University is a four-year university in Hamden, Connecticut, with about 7400 students. The IT staff has to support academic functions- but, since the university has residence halls, the IT...
Locate a consumer products company on the Web and read its company description (so that you get a good understanding of the geographic locations of the company). Pretend that the company is about to...
Numerous browser features, add-ins, and other tools exist for blocking third-party cookies. Search the Web for block third-party cookies for xxx, and fill in the xxx with the name and version of your...
During the course of execution of a program, the processor will increment the contents of the instruction register (program counter) by one word after each instruction fetch, but will alter the...
This exercise concerns the expressiveness of decision lists (Section 18.5). a. Show that decision lists can represent any Boolean function, if the size of the tests is not limited. b. Show that if...
You have been selected to find the best client-server computing architecture for a Web-based order entry system that is being developed for L.L. Bean. Write a short memo that describes to the project...
Consider the capabilities of the programming language and development tools used in your most recent programming or software development class. Are they powerful enough to implement developmental...
Consider the noisy-OR model for fever described in Section 14.3. Explain how to apply maximum-likelihood learning to fit the parameters of such a model to a set of complete data.
Using your answer to question 7-2, describe an enterprise information system that will eliminate the silos. Would the implementation of your system require process reengineering? Explain why or why...
Suppose that you are an analyst developing a new executive information system (EIS) intended to provide key strategic information from existing corporate databases to senior executives to help in...
Define what is meant by a data store in a process model. How should a data store be named? What information about a data store should be stored in the CASE repository?
Calculate the size of the database that you created in question F. Provide size estimates for the initial size of the database as well as for the database in one year's time. Assume that the...
1. How could Dell use each of the five basic SCM components? 2. How has Dell influenced visibility, consumer behaviour, competition and speed through the use of IT in its supply chain? 3. Explain the...
Consider the closed-loop system in Figure P5.21. Determine values of the parameters k and a so that the following specifications are satisfied: (a) The steady-state error to a unit step input is...
Explain the relationship between a DFD context diagram and the DFD level 0 diagram.
The following table shows some simple student data as of the date 06/20/2015: The following transactions occur on 06/21/2015: Student 004 changes major from Math to Business. Student 005 is deleted...
The block diagram model of an armature-current-controlled DC motor is shown in Figure AP5.6. (a) Determine the steady-state tracking error to a ramp input r(t) = t, t ¥ 0, in terms of K, Kb, and...
Write SQL data definition commands for each of the following queries: a. How would you add an attribute, Class, to the Student table? b. How would you remove the Registration table? c. How would you...
Create a Web page named repavg.html that simulates a large number of dice rolls and computes the average of the dice totals. The user should be able to enter a number of rolls in a text box and then...
Consider XPs team-based programming approach in general and its principle of allowing any programmer to modify any code at any time in particular. No other development approach or programming...
Data loss prevention (DLP) was a technology mentioned in the case, and one that is garnering more and more attention from corporate security departments. Go online and research what DLP involves, and...
For each of the following processes, suggest how an IS can improve the process. Specify if the improvement is due to improving an activity, improving data flow, improving control, implementing...
The Markov blanket of a variable is defined. a. Prove that a variable is independent of all other variables in the network, given its Markov blanket. b. Derive Equation (14.11).
Describe the shorthand representation of the structure of a relational database. Illustrate this technique by representing the database for Henry Books as shown in Chapter 1.
A spring exhibits a force-versus-displacement characteristic as shown in Figure E2.11. For small deviations from the operating point x0, find the spring constant when x0 is (a) -1.4; (b) 0; (c) 3.5....
A second-order control system has the closed-loop transfer function T(s) = Y(s)/R(s). The system specifications for a step input follow: (1) Percent overshoot P.O. 5%. (2) Settling time Ts < 4s. (3)...
a. Depict full key functional dependencies, partial functional dependencies (if any), and transitive functional dependencies (if any) in the LANGUAGE SCHOOL Table. b. Show the result of normalizing...
We outlined a flawed procedure for finding the most likely state sequence, given an observation sequence. The procedure involves finding the most likely state at each time step, using smoothing, and...
The insatiable demand for everything wireless, video, and Web-enabled everywhere will be the driving force behind developments in telecommunications, networking, and computing technologies for the...
In Fig. 8-20, we see how Alice can send Bob a signed message. If Trudy replaces P, Bob can detect it. But what happens if Trudy replaces both P and the signature?
What symbols would you use to depict the following situations on a structure chart? A function occurs multiple times before the next module is invoked. A function is continued on the bottom of the...
Where does the analyst find the information needed to create a structure chart?
Develop a program specification for Module 4.2.5 (Calculate Dealer Cost) in minicase 1.
Design a chart of accounts for SDC. Explain how you structured the chart of accounts to meet the company's needs and operating characteristics. Keep total account code length to a minimum, while...
Locking is not done explicitly in persistent programming languages. Rather, objects (or the corresponding pages) must be locked when the objects are accessed. Most modern operating systems allow the...
Computer control of a robot to spray-paint an automobile is accomplished by the system shown in Figure DP5.8(a) [7]. We wish to investigate the system when K = 1, 10, and 20. The feedback control...
This exercise contains additional information in the form of deletion rules that will enable us to develop a Design-Specific ER diagram for the NCAA database in Exercise 18. a. Incorporate the above...
Investigate the complexity of exact inference in general Bayesian networks: a. Prove that any 3-SAT problem can be reduced to exact inference in a Bayesian network constructed to represent the...
What are metadata? Why are they important to system developers?
In any standard, such as RFC 822, a precise grammar of what is allowed is needed so that different implementations can interwork. Even simple items have to be defined carefully. The SMTP headers...
The Prescriptions-R-X chain of pharmacies has offered to give you a free lifetime supply of medicine if you design its database. Given the rising cost of health care, you agree. Here's the...
Produce use case diagrams and a set of associated sequence diagrams for the DreamHome case study documented in Appendix A.
1. Use computer magazines or the Internet to investigate one of these DBMSs: DB2, SQL Server, MySQL, Oracle, or Sybase. Then prepare a report that explains how that DBMS handles two of the following...
I have two very different stories regarding data models. First, when I worked with First American Corporation, the head of Marketing kept a data model for the marketing systems hanging on a wall in...
Draw a class diagram for the course enrollment system completed in exercise 13. Be sure to use the correct notation for association classes.
Suppose that a learning algorithm is trying to find a consistent hypothesis when the classifications of examples are actually random. There are u Boolean attributes, and examples are drawn uniformly...
Virtual Campus (VC) is a social media firm that specializes in creating virtual meeting places for students, faculty, staff, and others associated with different college campuses. VC was started as a...
A Student object should validate its own data. The client runs this method, called validateData(), with a Student object, as follows: String result = student.validateData(); if (result == null) else...
Develop and test a Python program that determines how many images can be stored on a given size USB (flash) drive. The size of the USB drive is to be entered by the user in gigabytes (GB). The number...
What are the three key roles in any change management initiative?
What formula do you use to calculate the payback period?
The Diffie-Hellman key exchange is being used to establish a secret key between Alice and Bob. Alice sends Bob (719, 3 191). Bob responds with (543). Alice's secret number, x, is 16. What is the...
IBM Credit was a wholly owned subsidiary of IBM responsible for financing mainframe computers sold by IBM. While some customers bought mainframes outright or obtained financing from other sources,...
Show that dominant strategy equilibrium is Nash equilibrium, hut not vice versa.
Assuming that the county has just changed from the system in Figure 7-12 to the one in Figure 7-13, which of your answers in questions 2 and 3 do you think is better? Justify your answer.
Down Town Videos is a chain of 11 video stores scattered throughout a major metropolitan area in the Midwest. The chain started with a single store several years ago and has grown to its present...
What is a SWOT analysis? Prepare a SWOT analysis of your school or your employer.
Pretend that you are designing the new interface for a career services system at your university that accepts student rsums and presents them in a standard format to recruiters. Describe how you...
Pretend that the admissions office in your university has a Web-based application so that students can apply for admission online. Recently, there has been a push to admit more international students...
Visit a restaurant or the college food service and talk to a server (or talk with a friend who is a food server). Ask about the external events, temporal events, and data entities or objects, as you...
Assume that the transaction summary report for the RMO order-entry subsystem (see in Figure) contains a listing of every order that was created during a date range entered by the user. The report...
MonsterMed Inc. (MMI) is an online pharmaceutical firm. MMI has a small systems staff that designs and writes MMI's customized software. The data center is installed in the basement of its two-story...
What is stakeholder analysis? Discuss three stakeholders that would be relevant for most projects.
The following attributes represent data about a movie copy at an online video rental service. Each movie is identified by a movie number and has a title and information about the director and the...
In Chapter 7, you developed a use case diagram, a domain model class diagram, and detailed documentation for three use cases. In Chapter 11 you developed a three layer architectural solution and CRC...
The Fibonacci sequence is defined as follows: a. Could this sequence be used to establish a buddy system? b. What would be the advantage of this system over the binary buddy system described in this...
1. Using your local hospital as an example, answer the following questions: a. Where might information silos exist if an ERP system is not being used? b. Should the hospital pursue more efficient...
One obvious example for SM machines is for the machines to report operational status, say speed, temperature, fuel usage, and so on, depending on the type of machine, to a Chatter or other SM site....
Use Google or Bing to search for the phrase what is a business analyst? Investigate several of the links that you find and answer the following questions. a. What are the primary job responsibilities...
At the end of 1997, Oxford Health Plans posted a $120 million loss to its books. The company's unexpected growth was its undoing because the system, which was originally planned to support the...
On the Internet, small businesses have become big business, and a really big business, Microsoft, wants a piece of the action. The companys Small Business Center (www.microsoft.com/smallbusiness) is...
A team of developers is considering including "warehouse" as an entity in its data model. The company for whom they are developing the system has just one warehouse location. Should "warehouse" be...