Suppose one writes a logic program that carries out a resolution inference step. That is, let Resolve (c1, c2, c) succeed if c is the result of resolving cl and c2. Normally Resolve would be used as...
Suppose that FOIL is considering adding a literal to a clause using a binary predicate P and those previous literals (including the head of the clause) contain five different variables. a. How many...
This exercise investigates properties of the Beta distribution defined in Equation (20.6). a. Dy integrating over the range [0, 1], show that the normalization constant for the distribution beta [a,...
Implement a data structure for layered, feed-forward neural networks, remembering to provide the information needed for both forward evaluation and backward propagation. Using this data structure,...
Consider the application of EM to learn the parameters for the network in Figure (a), given the true parameters in Equation (20.7). a. Explain why the EM algorithm would not work if there were just...
Suppose that a training set contains only a single example, repeated 100 times. In 80 of the 100 cases, the single output value is I; in the other 20, it is 0. What will a back- propagation network...
How can the value determination algorithm be used to calculate the expected loss experienced by an agent using a given set of utility estimates U and an estimated model M, compared with an agent...
Write out the parameter update equations for TD learning with U (x, y) = 0 + 1x + 2y + 3 (x - xg) 2 + (y - y g) 2.
Extend the standard game-playing environment to incorporate a reward signal. Put two reinforcement learning agents into the environment (they may, of course, share the agent program) and have them...
Describe a technique you use to make sure you get assignments done on time. What are some tools you use with the technique?
The chapter identified six areas of project feasibility that need to be evaluated for any new project. However, as indicated, each of these areas of feasibility can also be considered an evaluation...
Develop an activity diagram based on the following narrative. Note any ambiguities or questions that you have as you develop the model. If you need to make assumptions, also note them. The purpose of...
What are the advantages of purchasing a packaged solution? What are the disadvantages or dangers?
Describe how structure charts for three-layer architecture are different from those for all-encompassing programs that execute on a single computer system.
What is the difference between doing design with CRC cards and designing with sequence diagrams?
Given the following narrative, do the following: a. Develop an activity diagram for each scenario, and b. Complete a fully developed use case description for each scenario. Quality Building Supply...
1. Refine and extend the domain model class diagram you developed in Chapter 5 as necessary. 2. Develop a use case diagram. Base it directly on the event table you created for Chapter 5. Be sure to...
Explain the three categories of user access privileges. Is three the right number or should there be more or fewer than three? Why or why not?
How can information technology support a company's business processes and decision making and give it a competitive advantage? Give examples to illustrate your answer.
Why are there so many conceptual classifications of information systems? Why are they typically integrated in the information systems found in the real world?
Refer to the real world example about responsibility and accountability for project failures in the chapter. Are these IT projects or business projects with a significant IT component? Who should be...
Search the Internet to help you evaluate the business performance of Sew What? Inc. and its competitors at the present time. What conclusions can you draw from your research about Sew whats prospects...
Are networks of PCs and servers making mainframe computers obsolete? Explain.
What are several trends that are occurring in computer peripheral devices? How do these trends affect business uses of computers?
1. What are the main business benefits of the collaboration technologies described in the case? 2. Michelle Damrow of Polycom notes Cisco is betting on a proprietary standard for its TelePresence...
Which of the following strategies do you think IT executives should adopt to improve their current situation: reject new projects, attempt to increase staff and funding, prioritize often, or all of...
What is the difference between intangible value and tangible value? Give three examples of each.
Describe the major elements and issues with throwaway prototyping.
Discuss the considerations that should be made when determining who to include in interviews and/or JAD sessions.
System projects are notorious for being late and over budget. When should management stop a project that is late or costing more than the intended budget? Consider this case: Valley Enterprises opted...
Pretend that you are going to build a new system that automates or improves the interview process for the career services department of your school. Develop a requirements definition for the new...
What is the purpose of an event-response list in the process of developing use cases?
Explain the use of structured English in process descriptions.
Suppose that your goal is to create a set of DFDs. How would you begin an interview with a knowledgeable user? How would you begin a JAD session?
Is an intersection entity dependent or independent? Explain your answer.
Describe how the data model and process model should be balanced against each other.
What is involved with systems integration? When is it necessary?
Explain the difference between a symmetric encryption algorithm and an asymmetric encryption algorithm.
What do you think are three common mistakes that novice analysts make in developing the architecture design and hardware/software specification?
Think about the system that your university currently uses for career services and pretend that you are in charge of replacing the system with a new one. Describe how you would decide on the...
Consider a Web form that a student would use to input student information and rsum information into a career services application at your university. Sketch out how this form would look and identify...
Compare and contrast the four types of interface evaluation.
Compare and contrast on-screen list boxes and dropdown list boxes. When would you use one versus the other?
Describe five types of input validation methods.
Develop two use scenarios for the DFD in Exercise I in Chapter 5.
What is meant by change control? How is it helpful to the programming effort?
What is the difference between alpha testing and beta testing?
What do you think are three common mistakes made by novice systems analysts in preparing user documentation?
In our experience, documentation is left to the very end of most projects. Why do you think this happens? How could it be avoided?
The awful truth is that every operating system and application system is defective. System complexity, the competitive pressure to hurry applications to market, and simple incompetence contribute to...
How is a problem report different from a change request?
Suppose you are installing a new payroll system in a very large multinational corporation. What conversion strategy would you use? Develop a conversion plan (i.e., technical aspects only).
Describe the steps in creating a use case diagram.
Create a use case diagram that would illustrate the use cases for the following dentist office system: Whenever new patients are seen for the first time, they complete a patient information form that...
Create a sequence diagram for each of the following scenario descriptions for a video store system: A Video Store (AVS) runs a series of fairly standard video stores: Every customer must have a...
Use the Internet to find two examples of corporate mission statements.
Discuss the importance of data modeling.
Suppose that you have the ERM shown in Figure Q3.14. During some time interval, a Driver can drive many Trucks and any Truck can be driven by many Drivers How would you convert this model into an ERM...
Identify and discuss the serious data redundancy problems exhibited by the file structure shown in Figure. (The file is meant to be used as a teacher class assignment schedule. One of the many...
Identify and describe the components of the table shown in Figure Q3.17, using correct terminology. Use your knowledge of naming conventions to identify the tables probable foreignkey(s). EMP NUM |...
What would be the conceptual view of the INDEX table that is described in question 22? Depict the contents of the conceptual INDEX table.
A database user manual notes that, The file contains two hundred records, each record containing nine fields. Use appropriate relational database terminology to translate that statement.
Do the tables exhibit entity integrity? Answer yes or no and then explain your answer.
Do the tables exhibit referential integrity? Answer yes or no and then explain your answer. Write NA (Not Applicable) if the table does not have a foreign key.
Create the ERD to show the relationship between STORE and REGION.
Create the relational diagram to show the relationships among EMPLOYEE, STORE, and REGION.
Create the relational diagram to show the relationship between EMPLOYEE and JOB.
Do the tables exhibit entity integrity? Answer yes or no and then explain your answer. Discuss.
Do the tables exhibit entity integrity? Answer yes or no and then explain your answer. Discuss in detail.
Create the ERD for this database.
Create the relational diagram.
What two conditions must be met before an entity can be classified as a weak entity? Give an example of a weak entity.
What are multivalued attributes, and how can they be handled within the database design?
What is an entity cluster, and what advantages are derived from its use?
What is a surrogate primary key, and when would you use one?
What is an entity supertype, and why is it used?
What are time-variant data, and how would you deal with such data from a database design point of view?
When is a table in 1NF?
Explain why it would be preferable to use a DATE data type to store date data instead of a character data type.
Write the SQL code that will produce a virtual table named REP_1. The virtual table should contain the same information that was shown in Problem.
The relational set operators UNION, INTERSECT, and MINUS work properly only if the relations are union-compatible. What does union-compatible mean, and how would you check for this condition?
Suppose that a PRODUCT table contains two attributes, PROD_CODE and VEND_CODE. Those two attributes have values of ABC, 125, DEF, 124, GHI, 124, and JKL, 123, respectively. The VENDOR table contains...
Create a procedure named prc_cus_balance_update that will take the invoice number as a parameter and update the customer balance.
List and discuss the five transaction properties.
Suppose that your database system has failed. Describe the database recovery process and the use of deferred-write and write-through techniques.
Create a simple transaction log (using the format shown in Table) to represent the actions of the two previous transactions.
Assuming that pessimistic locking is being used, but the two-phase locking protocol is not, create a chronological list of the locking, unlocking, and data manipulation activities that would occur...
Assuming that pessimistic locking with the two-phase locking protocol is being used, create a chronological list of the locking, unlocking, and data manipulation activities that would occur during...
Write a query to display the customer code, first name, last name, and sum of all invoice totals for customers with cumulative invoice totals greater than $1,500. Sort the output by the sum of...
Your data warehousing project group is debating whether to create a prototype of a data warehouse before its implementation. The project group members are especially concerned about the need to...
What is the SQL command to list the total sales by customer, month and product, with subtotals by customer and by month and a grand total for all product sales?
ABC Markets sell products to customers. The relational diagram shown in Figure represents the main entities for ABCs database. The following important characteristics: A customer may make many...
David Suker, the inventory manager for a marketing research company, wants to study the use of supplies within the different company departments. Suker has heard that his friend, Ephanor, has...
What are ODBC, DAO, and RDO? How are they related?
What does this statement mean: The Web is a stateless system? What implications does a stateless system have for database applications developers?
Define dirty data and identify some of its sources.
List and briefly define the four main elements of a computer
A DMA module is transferring characters to main memory from an external device transmitting at 9600 bits per second (bps). The processor can fetch instructions at the rate of 1 million instructions...
Generalize Equations (1.1) and (1.2) in Appendix 1A to n-level memory hierarchies.
What are the steps performed by an OS to create a new process?