During requirements modeling for the new system, Susan Park met with fitness center managers at several Personal Trainer locations. She conducted a series of interviews, reviewed company records,...
1. In deciding on your proposal, what options do the owners have? 2. If the owners decide to purchase or customize a software package, what steps will you take? 3. Explain the difference between...
Barbara Singleton, manager of western regional sales at the WAMAP Company, requested that the IS department develop a sales force management and tracking system that would enable her to better...
This problem exercises the basic concepts of game playing, using tic-tac-toe (noughts and crosses) as an example. We define Xn as the number of rows, columns, or diagonals with exactly n Xs and no Os...
The Jonesburgh County Basketball Conference (JCBC) is an amateur basketball association. Each city in the county has one team as its representative. Each team has a maximum of 12 players and a...
1. Identify possible actors and use cases involved in Personal Trainers operations. 2. Create an object relationship diagram for the Personal Trainer information system. 3. Create a use case diagram...
Read Turings original paper on Al (Turing, 1950). In the paper, he discusses several potential objections to his proposed enterprise and his test for intelligence. Which objections still carry some...
1. List possible objects in the library operation, including their attributes and methods. 2. Identify possible use cases and actors. 3. Select one of the use cases and create a sequence diagram. 4....
1. What is a prototype and why is it an important tool for system designers? 2. Explain two different ways that Global Earth might use prototypes. 3. What are some of the advantages and disadvantages...
Victoria Ephanor manages a small product distribution company. Because the business is growing fast, Ephanor recognizes that it is time to manage the vast information pool to help guide the...
Case-Based Marketing Selling on Amazon.com A case-based reasoning system is a type of expert system. It attempts to match the facts on hand to a database of prior cases. When a case-based reasoning...
1. Consider the contents of this textbook as a template for CPIs database content. Draw an ERD and class diagram that represents the book and its key content elements. Which diagram is a more...
What fact-finding methods are well-suited for complex technical issues? Which might be appropriate for the pursuit of new, cutting-edge features?
Kitchen Gadgets sells a line of high-quality kitchen utensils and gadgets. When customers place orders on the companys Web site or through electronic data interchange (EDI), the system checks to see...
1. How does virtualization work? In your own words, describe what you understand about the virtualization process as depicted in the case. 2. In software development and testing, where does...
Suppose you manage a sales department that uses the SaaS product Salesforce.com. One of your key salespeople refuses to put his data into that system. I just dont believe that the competition cant...
Zevo is currently reaching the end of the requirements modeling phase of a new inventory control system for their global company. As a systems analyst you are asked to support this ongoing project....
Describe modular design, and explain the two main prototyping methods.
Suppose you are an ad-serving company, and you maintain a log of cookie data for ads you serve to Web pages for a particular vendor (say Amazon). a. How can you use this data to determine which are...
Critique the structure chart shown, which depicts a guest making a hotel reservation. Describe the chart in terms of fan-in, fan-out, coupling, and cohesion. Redraw the chart to improve thedesign....
Figure 4-34 shows an EER diagram for a restaurant, its tables, and the waiters and waiting staff managers who work at the restaurant. Your assignment is to: a. Develop a relational schema. b. Show...
1. Review the fact statements in Chapter 1, and perform Internet research to find out as much as you can about fitness center operations. Using this background, conduct a SWOT analysis with at least...
What characteristics make a mobile application great? Describe at least five characteristics that compel you to buy applications. Explain what characteristics would make an application easy and cheap...
For each of the following Visual Basic code snippets, identify the syntax error. 1. If intX > 100 lblResult.Text = "Invalid Data" End If 2. Dim str As String = "Hello" Dim intLength As Integer...
Examine the Patient Medication Form for the Well meadows Hospital case study shown in Figure 14.18. (a) Identify the functional dependencies represented by the data shown in the form in Figure 14.18....
Describe four types of system maintenance and provide two examples of each type.
YourFire Inc. is a small business owned by Curt and Julie Robards. Based in Brisbane, Australia, YourFire manufactures and sells a lightweight camping stove called the YourFire. Curt, who previously...
1. What type of installation did Hudson Banc use for its new system? Was it an appropriate choice? 2. How could the operational problems have been avoided? Two regional banks with similar geographic...
1. Explain the advantages of locating the PRIDE database in the clouded. Flores and his partners could place it on one of their own servers in the practice. Give reasons why it would be unwise for...
Create an example of a relation (containing several records) that is prone to update anomalies.
Prove that with a positive linear transformation of leaf values (i.e., transforming a value x to ax + b where a > 0), the choice of move remains unchanged in a game tree, even when there are chance...
Prove the following assertion: for every game tree, the utility obtained by MAX using mini max decisions against a suboptimal MIN will be never be lower than the utility obtained playing against an...
Figure 4-35 shows an EER diagram for Vacation Property Rentals. This organization rents preferred properties in several states. As shown in the figure, there are two basic types of properties: beach...
ABC Department Stores would like to acquire software to do the following tasks. Identify which software packages they need. a. Surf the Web and their intranets and extranets. b. Send messages to one...
Give asymptotic upper and lower bounds for T(n) in each of the following recurrences. Assume that T(n) is constant for sufficiently small n. Make your bounds as tight as possible, and justify your...
Show how a single ternary constraint such as A + B = C can be turned into three binary constraints by using an auxiliary variable. You may assume finite domains. Next, show how constraints with more...
What strategies are Wal-Mart and Lowes using to gain more online customers?
Consider the following state of a system with four processes, P1, P2, P3, and P4, and five types of resources, RS1, RS2, RS3, RS4, and RS5: Using the deadlock detection algorithm described in Section...
This problem demonstrates that although Equation (10.2) for rate monotonic scheduling is a sufficient condition for successful scheduling, it is not a necessary condition (i.e., sometimes successful...
1. Should an organization choose a new system based on client/server architecture? Why or why not? 2. Explain the pros and cons of thick or thin client characteristics. 3. What is the difference...
Refer to the Real Word Case on eCourier, Cablecom, and Bryan Cave in the chapter. Jay Bregman, CTO and cofounder of eCourier, notes that the company hopes their innovative use of technology will...
Explore the data included in Table 4-9. Assume that the primary key of this relation consists of two components: Author's ID (AID) and Book number (BNbr). The relation includes data regarding...
AC-3 puts back on the queue every arc (Xk, Xi) whenever any value is deleted from the domain of Xi, even if each value of Xk is consistent with several remaining values of X. Suppose that, for every...
A d-ary heap is like a binary heap, but (with one possible exception) non-leaf nodes have d children instead of 2 children. a. How would you represent a d-ary heap in an array? b. What is the height...
1. Design a switchboard that includes the main information management functions that Mountain High might need. Create a storyboard with a design layout that allows customers to perform the following...
This chapter begins with an architecture checklist. If you had to rank the items, from most important to least important, what would your list look like? Explain your answer.
1. Health information management is a rapidly-growing sector that directly affects health care costs. Every specialized area has its own vocabulary, and health information management is no exception....
Figure 4-33 (page 196) shows an EER diagram for a simplified credit card environment. There are two types of card accounts: debit cards and credit cards. Credit card accounts accumulate charges with...
What are the three main task patterns? Provide an example of each.
Your supervisor said that Integration testing is a waste of time. If each program is tested adequately, integration testing isnt needed. Instead, we should move on to system testing as soon as...
You are the IT manager at a regional moving company that recently merged with a major competitor. The company president asked you to prepare requirements for a new information system to support the...
1. Consider statements made in the case about business often not having an overarching business strategy that can serve as guidance for the development of a strategy for IT. 2. Dave Aron of Gartner...
The materials manager at Pine Valley Furniture Company maintains a list of suppliers for each of the material items purchased by the company from outside vendors. Table 4-7 shows the essential data...
The program execution of Figure 3.5 is described in the text using six steps. Expand this description to show the use of the MAR and MBR. Memory CPU registers Memory CPU registers 3 0 0PC300 1 9 4 0...
The manager of a consulting firm has asked you to evaluate a database that contains the table structure shown in Table P6.10. Table P6.10 was created to enable the manager to match clients with...
Write the SQL queries that accomplish the following tasks in the HAFH Realty Company Property Management Database: a. Display the SMemberID and SMemberName for all staff members. b. Display the CCID,...
Describe the concept of software as a service rather than a product. Is this an important trend? Why or why not?
A path cover of a directed graph G = (V, E) is a set P of vertex-disjoint paths such that every vertex in V is included in exactly one path in P. Paths may start and end anywhere, and they may be of...
Williams Specialty Company is a small printing and engraving organization. When Pat Williams, the owner, brought computers into the business office eight years ago, the business was very small and...
After completing a course in database management, you are asked to develop a preliminary ERD for a symphony orchestra. You discover the entity types that should be included as shown in Table 2-3....
A bank has three types of accounts: checking, savings, and loan. Following are the attributes for each type of account: CHECKING: Acct No, Date Opened, Balance, Service Charge SAVINGS: Acct No, Date...
Refer to the Real World Case on Dow Corning and DirecTV in the chapter. Are mobile applications limited to be scaled-down versions of their enterprise counterparts, or will companies start to develop...
Suppose that an agent is in a 3 x 3 maze environment like the one shown in Figure. The agent knows that its initial location is (1, 1), that the goal is at (3, 3), and that the four actions Up, Down,...
What is a common problem in calculating start and finish times? Provide an example.
1. Use the background information to develop a business profile for Personal Trainer. Be sure to indicate where more information will be needed. 2. Each new supercenter service represents a business...
A simple telephone system consists of two end offices and a single toll office to which each end office is connected by a 1-MHz full-duplex trunk. The average telephone is used to make four calls per...
Consider the following string of page references 7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 2. Complete a figure similar to Figure 8.14, showing the frame allocation for: a. FIFO (first-in-first-out) b. LRU...
Identify the use cases for the following system: Picnics R Us (PRU) is a small catering firm with five employees. During a typical summer weekend, PRU caters 15 picnics for 20 to 50 people each. The...
Consider the two E-R diagrams in Figure 2-25, which represent a database of community service agencies and volunteers in two different cities (A and B). For each of the following three questions,...
1. Why do you think the practices described in the case led to success for these companies? 2. How do they change the structure of projects so that the likelihood of a positive outcome increases? 3....
Invent a heuristic function for the 8-puzzle that sometimes overestimates, and show how it can lead to a suboptimal solution on a particular problem. (You can use a computer to help if you want.)...
A coupled spring-mass system is shown in Figure P2.3. The masses and springs are assumed to be equal. Obtain the differential equations describing the system. itee Flay FIGURE P2.3 Two-masa system.
Figure 4-38 includes an EER diagram for a medium-size software vendor. Transform the diagram into a relational schema that shows referential integrity constraints (see Figure 4-5 for an example of...
List and describe the main tasks that are performed during systems implementation.
For each of the following E-R diagrams from Chapter 2: I. Transform the diagram to a relational schema that shows referential integrity constraints (see Figure 4-5 for an example of such a schema):...
Create an enterprise data model that captures the data needs of FAME. Use a notation similar to the one shown in Figure 1-4. In figure 1-4 INVENTORY PRICING HISTORY CUSTOMER Places Keeps Price...
1. Discuss the implications that such a change would have on the scope of the project. How might this new capability change the list of stakeholders the team would involve when collecting information...
1. Create an event table that lists information about system requirements based on the following specific system processing: When a nursing home needs to fill prescriptions for its patients, it...
Suppose you had a client who never used a network. Explain, in everyday terms, the role of network servers and clients.
We mentioned iterative lengthening search, an iterative analog of uniform cost search. The idea is in use increasing limits on path cost. If a node is generated whose path cost exceeds the current...
Imagine a flow specification that has a maximum packet size of 1000 bytes, a token bucket rate of 10 million bytes/sec, a token bucket size of 1 million bytes, and a maximum transmission rate of 50...
The dependency diagram in Figure Q6.8 indicates that a patient can receive many prescriptions for one or more medicines over time. Based on the dependency diagram, create a database whose tables are...
The OLTP system data for the Fitchwood Insurance Company is in a series of flat files. What process do you envision would be needed in order to extract the data and create the ERD shown in Figure...
Use the dependency diagram shown in Figure 6.8 to work the following problems. a. Break up the dependency diagram in Figure 6.8 to create two new dependency diagrams, one in 3NF and one in 2NF. b....
1. Develop DFD fragments for all of the events not documented in Figure. 2. Develop a single DFD that shows processing for all events, using one process for each subsystem and showing all needed data...
Apply the rank order clustering technique to the part-machine incidence matrix in the following table to identify logical part families and machine groups. Parts are identified by letters, and...
Develop an EER model for the following situation, using the traditional EER notation, the Visio notation, or the subtypes inside supertypes notation, as specified by your instructor: A technology...
Using Figure 7-5 as an example, redraw Figure 7-13 using an enterprise information system that processes a shared database. Explain the advantages of this system over the paper-based system in Figure...
Consider the following GRADEBOOK relational schema describing the data for a grade book of a particular instructor. CATALOG(Cno, Ctitle) STUDENTS(Sid, Fname, Lname, Minit) COURSES(Term, Sec_no, Cno,...
Explain the interactions among end user, data, information, and decision-making. Draw a diagram and explain the interactions.
1. Consider your own online shopping patterns. How much weight do you place on the presence of a name or logo or other trademark (such as the Kitchen Aid silhouette) on a Web site when purchasing...
Consider the following statement: In many ways, choosing an outsource vendor is a one-way street. Explain what this statement means. Do you agree with it? Why or why not? Does your answer change...
1. Based on what you know about e-commerce, how would you have tested a new Web-based system? 2. Should ISO standards have been considered? Explain your answer. 3. What should White Diamond do in the...
Consider a magnetic disk drive with 8 surfaces, 512 tracks per surface, and 64 sectors per track. Sector size is 1 KB. The average seek time is 8 ms, the track-to-track access time is 1.5 ms, and the...
Using the tables in Figure Q3.11, create the table that results from MACHINE DIFFERENCE BOOTH. MACHINE_PRODUCT MACHINE_PRICE Chips ............. 1.25 Chocolate Bar ........... 1
Consider the following workload: a. Show the schedule using shortest remaining time, non-preemptive priority (a smaller priority number implies higher priority) and round robin with quantum 30 ms....
Jim Smith's dealership sells Fords, Hondas, and Toyotas. The dealership keeps information about each car manufacturer with whom it deals so that employees can get in touch with manufacturers easily....
1. Consider the outcomes of the projects discussed in the case. In all of them, the payoffs are both larger and achieved more rapidly than in more traditional system implementations. Why do you think...
a. Depict full key functional dependencies, partial functional dependencies (if any), and transitive functional dependencies (if any) in the SURGERY SCHEDULE Table. b. Show the result of normalizing...
1. Create a decision table that describes the discount rules. 2. Simplify the table you just created. Describe the results. 3. Draw a simplified decision tree that shows the discount rules. 4. What...