Refer to the Real World Case on BPs IT transformation in the chapter. Dana Deasy discusses the long-term benefits of embedded IT while noting the need to centralize the department in the short term....
1. The log shown in Figure 7-19 includes four transactions that completed successfully. For each of the four transactions, list the transaction ID and the table(s) modified. Also, list whether the...
The attack shown in Fig. 8-47 leaves out one step. The step is not needed for the spoof to work, but including it might reduce potential suspicion after the fact. What is the missing step?
Rewrite the function shown in Figure so that it is no longer vulnerable to a stack buffer overflow. Address gets (str2) gets (str2) Value of bffffbf4 34fcffbf 4. 01000000 34fcffbf argv bffffbf0...
For each of the SQL aggregate functions sum, count, min and max, show how to compute the aggregate value on a multiset S1 S2, given the aggregate values on multisets S1 and S2. Based on the above,...
How does implementing a maintenance change differ from developing a new system? How are they similar?
Why is a process model typically composed of a set of DFDs? What is meant by decomposition of a business process?
Consider the following extension to the tree-locking protocol, which allows both shared and exclusive locks: A transaction can be either a read-only transaction, in which case it can request only...
What potential security problems do you see in the increasing use of intranets and extranets in business? What might be done to solve such problems? Give several examples.
Consider the block diagram in Figure P3.21. (a) Verify that the transfer function is (b) Show that a state variable model is given by G(s) = Y(s, h,sta + ais + a 0 ao a y=[1 LE 0]x. Co FIGURE P3.21...
Are companion viruses (viruses that do not modify any existing files) possible in UNIX? If so, how? If not, why not?
Describe how you would denormalize the model that you created in question E. Draw the new physical model on the basis of your suggested changes. How would performance be affected by your suggestions?
Describe the differences in the meanings between the two structure charts shown. How have the symbols changed themeanings? Books by Author Books by Author Author Author, " orgtock r Book Book Find...
The case investigation undergoes several states in the Jones Legal Investigation Services system. The case investigation is first established when the attorney requests that an investigation be...
You work for a grocery chain that always has many customers in the stores. To facilitate and speed checkout, the company wants to develop self-service checkout stands. Customers can check their own...
In Chapter 7 you developed a use case diagram, a class diagram, and a system sequence diagram for the use cases Recording a traffic ticket and Scheduling a court date. Based on those solutions or...
Review the description of the South Dakota workers' compensation project in Your Turn 1-3. There were legal hurdles to implementing a digital solution to handle workers' compensation claims. One...
Consider processing the following SQL projection query: SELECT DISTINCT E.title, E.ename FROM Executives E You are given the following information: Executives has attributes ename, title, dname, and...
Project Planning Projects have many dependencies, any of which could become points of failure. Without the cooperation or input from even one vital resource, a project may fail to meet its...
Use a query to compute the average purchase amount per product made by each customer. CUS CODE CUS BALANCE Total Purchases Number of Purchases Average Purchase Amount 10011 0012 10014 10015 10018...
Give an alternative representation of bank information containing the same data as shown in figure but using attributes instead of subelements. Also give the DTD for this representation. A-101...
What is a database schema? What information does it contain?
Design a storyboard for Exercise I in Chapter 5.
Let's consider what dynamic scheduling might achieve here. Assume a microarchitecture as shown in Figure 2.42. Assume that the ALUs can do all arithmetic ops (MULTD, DIVD, ADDD, ADDI, SUB) and...
Figure is an activity diagram for the use case Return books in the university library system. Do the following: a. Develop a first-cut sequence diagram, which only includes the actor and problem...
A driver's license bureau maintains a database of licensed drivers. State whether each of the following represents data or metadata. If it represents data, state whether it is structured or...
Let R = (A, B) and S = (A, C), and let r(R) and s(S) be relations. Using the special constant null, write tuple-relational-calculus expressions equivalent to each of the following: a. r 1 s b. r 1 s...
Compare and contrast system testing and acceptance testing.
Develop a unit test plan for a Web site that enables you to perform some function (e.g., make travel reservations, order books).
What would be the baseline performance (in cycles, per loop iteration) of the code sequence in Figure 2.35 if no new instruction execution could be initiated until the previous instruction execution...
You are going to design a database for your cooking club to track its recipes. Identify the database characteristics most important to you in choosing a DBMS. Which of the database management systems...
Pretend that you have been charged with the task of redesigning the interface for the ATM at your local bank. What type of prototyping and interface evaluation approach would you recommend?
List and discuss three ways to ensure the overall quality of a structure chart.
Suppose each record in a file were connected to the prior record and the next record in key sequence using pointers. Thus, each record might have the following format: Primary key, other attributes,...
A startup Internet company has generated the following cash balance for the first six years of its IS projects: -$250,000, -$180,000, $225,000, $340,000, $410,000, and $425,000. Using the NPV...
The speed control of a high-speed train is represented by the system shown in Figure AP5.4 [17]. Determine the equation for steady-state error for K for a unit step input r(t). Consider the three...
Explain the client-based architecture.
Investigate the Web site for Rational Software (www-306.ibm.com/software/rational/) and its repository of information about Unified Modeling Language (UML). Write a paragraph news brief on the...
Review the initial Holiday Travel Vehicle functional requirements 2-72-8 in Figure. Now, based on your study of UC-5 in Figure, revise the list of functional requirements to provide more clarity and...
a. Suppose we send into the Internet two IP datagrams, each carrying a different UOP segment. The first datagram has source IP address AI, destination IP address B, source port PI , and destination...
Describe the following: TCP/IP, Router, HTML, HTTP, and URL.
In the chapter we noted that attributes with many different possible values can cause problems with the gain measure. Such attributes tend to split the examples into numerous small classes or even...
The Pine Valley databases for this textbook (one small version illustrated in queries throughout the text and a larger version) are available to your instructor to download from the text's Web site....
Figure 7-8 lists problems with the Procurement process at CBI. Which of these would apply to the university? Which would not? What are some procurement problems that might be unique to an athletics...
Distinguish between the two-tier, three-tier, and n-tier client-server architectures.
In Oracle, what is a database schema?
The Avemar ferry, shown in Figure PI0.9(a), is a large 670-ton ferry hydrofoil built for Mediterranean ferry service. It is capable of 45 knots (52 mph) [29]. The boat's appearance, like its...
In the text, we described a multithreaded Web server, showing why it is better than a single-threaded server and a finite-state machine server. Are there any circumstances in which a single-threaded...
Consider the graphic symbol for the S-R flip-flop in Figure 20.27. Add additional lines to depict a D flip-flop wired from the S-R flip flop. Figure 20.27 Basic Flip-Flops Name Graphical Symbol Truth...
What is meant by a concatenated identifier?
Using 32 bits to represent integers, the largest positive value that can be represented is 231-1, whereas the smallest negative value is 231. Why aren't these ranges symmetric? That is, why is there...
Trace the execution of the backward chaining algorithm in figure when it is applied solves the crime problem. Show the sequence of values taken on by the goals variable, and arrange them into a tree.
Read through the following dialog, which shows a user trying to place an order with the system. Critique the dialog in terms of ease of learning and ease of use. User: I want to order a product....
1. Draw a context DFD. 2. Draw an event-partitioned DFD. 3. Draw any required process decomposition DFDs. Refer to the description of the Real Estate Multiple Listing Service system in the Chapter 5...
A high-speed train is under development in Texas [21] with a design based on the French Train a Grande Vitesse (TGV). Train speeds of 186 miles per hour are foreseen. To achieve these speeds on tight...
A start-up is working on an online personal financial management system. The goal of the system is to provide the users an opportunity to obtain item-level purchase data from as many sources as...
A multi-loop block diagram is shown in Figure E3.9.The state variables are denoted by x1 and x2. (a) Determine a state variable representation of the closed-loop system where the output is denoted by...
Develop the interface standards (omitting the interface template) for the DFD in Exercise I in Chapter 5.
The following problem is based on a suggested illustration of I/O mechanisms in [ECKE90] (Figure 7.22): Two women are on either side of a high fence. One of the women, named Apple-server, has a...
Explain the client-server architecture.
What information is found on the physical DFD that is not included on the logical DFD?
How does a pizza shops Procurement process differ from CBIs? What do you believe is the corporate strategy of your favorite pizza franchise? What are the objectives and measures of its Procurement...
Refer to the description of the Real Estate Multiple Listing Service system in the case studies of Chapter 5 and the DFDs you developed in the case studies for Chapter 6. Develop a structure chart...
In Your Turn 14-3 you were asked to draw a use case diagram for the campus housing system. Select one of the use cases from the diagram and create a sequence diagram that represents the interaction...
Changing technology has, for centuries, eliminated the need for certain products and services and created the need for new products and services. What is new, today, however, is the rapid pace at...
The shoulder joint of a robotic arm uses a DC motor with armature control and a set of gears on the output shaft. The model of the system is shown in Figure AP4.2 with a disturbance torque Td(s)...
Metro Marketers, Inc., wants to build a data warehouse for storing customer information that will be used for data marketing purposes. Building the data warehouse will require much more capacity and...
Consider the following pseudo-WEP protocol. The key is 4 bits and the IV is 2 bits . The IV is appended to the end of the key when generating the keystream. Suppose that the shared secret key is 10...
Explain how a test case relates to a test plan.
Consider the network fragment shown below. x has only two attached neighbors, wand y. w has a minimum-cost path to destination u (not shown) of 5, and y has a minimum-cost path to u of 6. The...
Answer the following questions: 1. Describe how a typical lock manager is implemented. Why must lock and unlock be atomic operations? What is the difference between a lock and a latch? What are...
The data used for Figure can be viewed as being generated by h5. For each of the other four hypotheses, generate a data set of length 100 and plot the corresponding graphs for P (hi?d1... dm) and P...
Suppose that Anns utilities for cherry and lime candies are c A and l A, whereas Bobs utilities are c B and l B. (But once Ann has un-wrapped a piece of candy. Bob wont buy it.) Presumably, if Bob...
Using the output shown in Figure as your guide, generate the listing of customer purchases, including the subtotals for each of the invoice line numbers. CUS CODE INV NUMBER P DESCRIPT Units Bought...
Net Suite Inc. is a leading provider of on-demand enterprise applications, including CRM as featured in the case. Other important players in this market include Salesforce.com and Siebel on Demand....
Explain three important user interface design principles.
The ability to accurately forecast demand is one of the major issues involved in the efforts discussed in the case. Go online and research which technologies companies are employing today to improve...
Define what is meant by an attribute in a data model. How should an attribute be named? What information about an attribute should be stored in the CASE repository?
Consider an organization with which you frequently interact, such as a bank, credit card company, university, or insurance company, from which you receive several computer-generated messages, such as...
A single-station assembly machine is to be considered as an alternative to the dial-indexing machine in Problem 17.4. Use the data given in the table for that problem to determine (a) Production...
Increased track densities for computer disk drives necessitate careful design of the head positioning control [1]. The loop transfer function is Plot the frequency response for this system when K =...
Summarize the distinctions between the analysis phase and the design phase of the SDLC.
Define the five basic relational algebra operations. Define the Join, Intersection, and Division operations in terms of these five basic operations.
Define what is meant by an entity in a data model. How should an entity be named? What information about an entity should be stored in the CASE repository?
A negative feedback control system is depicted in Figure CP4.8. Suppose that our design objective is to find a controller Gc(s) of minimal complexity such that our closed-loop system can track a unit...
What is the meaning of analysis? What is the purpose of the analysis phase of the SDLC?
Which phase in the SDLC is the most important?
Review the initial Holiday Travel Vehicle functional requirements 2-3-2-6 in Figure 3-3. Now, based on your study of UC-4 in Figure, revise the list of functional requirements to provide more clarity...
Whitlock Department Stores runs a multiuser DBMS on a LAN file server. Unfortunately, at the present time, the DBMS does not enforce concurrency control. One Whitlock customer had a balance due of...
Give three examples of likely problems when operational data are integrated into the data warehouse.
Consider a multidatabase system in which it is guaranteed that at most one global transaction is active at any time, and every local site ensures local serializability. a. Suggest ways in which the...
Define what is meant by a relationship in a data model. How should a relationship be named? What information about a relationship should be stored in the CASE repository?
What distinguishes client/server computing from any other form of distributed data processing?
Describe the types of cultural and political requirements and how they may influence architecture design.
Assume that you are an employee of a consultancy company that specializes in the analysis, design, and implementation of database systems. A client has recently approached your company with a view to...
Monthly usage rate for a certain part is 15,000 units. The part is produced in batches and its manufacturing costs are estimated to be $7.40. Holding cost is 20% of piece cost. Currently the...
Service-oriented architecture (SOA) is a recent approach to systems development and implementation that has much in common (and some differences, as well) with enterprise architecture. Go online and...
How is the object approach different from the data and process approaches to systems development?
Suppose the password file of a system is available to a cracker. How much extra time does the cracker need to crack all passwords if the system is using the Morris-Thompson protection scheme with...
Consider a system in which bus cycles takes 500 ns. Transfer of bus control in either direction, from processor to I/O device or vice versa, takes 250 ns. One of the I/O devices has a data transfer...