In Solaris 9 and Solaris 10, there is a one-to-one mapping between ULTs and LWPs. In Solaris 8, a single LWP supports one or more ULTs. a. What is the possible benefit of allowing a many-to-one...
Consider a simple paging system with the following parameters: 232 bytes of physical memory; page size of 210 bytes; 216 pages of logical address space. a. How many bits are in a logical address? b....
A process references five pages, A, B, C, D, and E, in the following order: Assume that the replacement algorithm is first-in-first-out and find the number of page transfers during this sequence of...
Consider a variant of the RR scheduling algorithm where the entries in the ready queue are pointers to the PCBs. a. What would be the effect of putting two pointers to the same process in the ready...
Five batch jobs, A through E, arrive at a computer center at essentially the same time. They have an estimated running time of 15, 9, 3, 6, and 12 minutes, respectively. Their (externally defined)...
The following equation was suggested both for cache memory and disk cache memory: TS = TC + M * TD Generalize this equation to a memory hierarchy with N levels instead of just 2.
Repeat Problem 10.4, adding MUF to the diagrams. Comment on the results. Consider a set of three periodic tasks with the execution profiles of Table 10.9a. Develop scheduling diagrams similar to...
List and briefly define three classes of intruders.
Consider schedule feasibility: a. List criteria you would use for schedule feasibility for these alternatives. Differentiate criteria between the two alternatives if you think it is important to do...
Suppose you work for an organization that is being phished. a. How would you learn that your organization is being attacked? b. What steps should your organization take in response to the attack? c....
Explain the difference between the lookup table in cells A3:E4 of the Grades worksheet and the lookup table in cells A6:E7 in the same worksheet. 1 Grading Schemes: 3 900 800 700 600 700 800 900
Describe the steps you would take to import XML data as an XML Table in Excel.
Define second normal form. What types of problems would you find in tables that are not in second normal form?
Define third normal form. What types of problems would you find in tables that are not in third normal form?
Define fourth normal form. What types of problems would you find in tables that are not in fourth normal form?
What is the purpose of breaking down the overall design problem into a consideration of individual user views?
Describe the different ways of implementing one-to-one relationships. Assume you are maintaining information on offices (office numbers, buildings, and phone numbers) and faculty (numbers and names)....
How do some DBMSs use timestamping to handle concurrent update?
When does a DBA use backward recovery? What does the DBMS do to perform backward recovery?
What are integrity constraints? Describe four different ways to handle integrity constraints. Which approach is the most desirable?
What is a procedural language? What is a nonprocedural language?
What is a distributed database? What is a DDBMS?
What different design decisions do you make to access data rapidly in a centralized database compared to a distributed database?
What are dynamic Web pages? How can you augment HTML to provide the dynamic capability?
What is data fragmentation? What purpose does data fragmentation serve?
The staff of the marketing department at Premiere Products is scheduled to receive some statistical databases, and they need you to explain these databases to them. (A statistical database is a...
A user queries the Part table in the Premiere Products database over the company intranet. Assume the Part table contains 5,000 rows, each row is 1,000 bits long, the access delay is 2.5 seconds, the...
1. The DBA asks for your help in planning the data archive for the following Premiere Products database: Rep (RepNum, LastName, FirstName, Street, City, State, Zip, Commission, Rate) Customer...
Briefly describe the process of database implementation.
Create your own example that shows a collection of data, first without the metadata and then with the metadata.
What is denormalization and what is its purpose?
Briefly describe the process of creating ETL infrastructure.
What is the difference between OLAP and OLTP?
Effectiveness and efficiency: a. What does the term effectiveness mean when applied to business processes? List as many pertinent effectiveness objectives for class registration as possible. List...
How can your college use IS to make its processes better? Can you think of ways to use new IS tools like smartphones and social media to make college processes better? Specify the objective and...
Augmented reality will help employees find items in a warehouse, but this IS may also support many other processes. Name two and describe how AR will improve them. Use Google Glass as one example of...
List four government sectors in your country that use database systems.
Describe the relations that would be produced by the following tuple relational calculus expressions: (a) {H.hotelName | Hotel(H) H.city = London} (b) {H.hotelName | Hotel(H) ($R) (Room(R) H.hotelNo...
Generate the relational algebra, tuple relational calculus, and domain relational calculus expressions for the following queries: (a) List all hotels. (b) List all single rooms with a price below 20...
Provide the equivalent tuple relational calculus and domain relational calculus expressions for each of the relational algebra queries given in Exercise 4.8.
List the number of rooms in each hotel in London.
What is the average number of bookings for each hotel in August?
What is the most commonly booked room type for each hotel in London?
What is the lost income from unoccupied rooms at each hotel today?
Explain how the GROUP BY clause works. What is the difference between the WHERE and HAVING clauses?
Produce a report of book titles that have been borrowed by Peter Bloomfield.
Now create the Room, Booking, and Guest tables using the integrity enhancement features of SQL with the following constraints: (a) Type must be one of Single, Double, or Family. (b) Price must be...
What is a materialized view and what are the advantages of a maintaining a materialized view rather than using the view resolution process?
Consider whether it is appropriate to introduce the enhanced concepts of specialization / generalization, aggregation, and/or composition for the case studies described in Appendix B.
Discuss how the definitions of 2NF and 3NF based on primary keys differ from the general definitions of 2NF and 3NF. Provide an example to illustrate your answer.
Fired Up, Inc., is a small business owned by Curt and Julie Robards. Based in Brisbane, Australia, Fired Up manufacturers and sells Fired Now, a lightweight camping stove the. Recall from Chapter 3...
Choose one of the following basic business processes: inventory management, operations, manufacturing, HR management, or accounting/financial management. Use the Internet to identify three vendors...
The list below shows a set of customers that a company has and their RFM scores. Answer the following questions using information from the list. a. Which of the customers should the company focus...
1. What process would you use to identify your choice of a first round athletic draft? 2. Is choosing athletes any different from hiring any other kind of employee? 3. Why do you think these...
The following two tables could be used to store the data in Figure 5-15 in a database. ChoirMember (LastName, FirstName, Email, Phone, Part) MusicalWork (NameOfWork, Composer, Part, CopyNumber) This...
Consider the data needs of the student-run newspaper in your university or high school. What are the data entities of this enterprise? List and define each entity. Then, develop an enterprise data...
Consider Figure 1-11, which depicts a hypothetical multitier database architecture. Identify potential duplications of data across all the databases listed on this figure. What problems might arise...
Interview a systems analyst or database analyst and ask questions about the typical composition of an information systems development team. Specifically, what role does a database analyst play in...
List five costs or risks associated with the database approach.
List the four types of cardinality constraints, and draw an example of each.
Give an example, other than those described in this chapter, of a weak entity type. Why is it necessary to indicate an identifying relationship?
Give an example of each of the following, other than those described in this chapter, and clearly explain why your example is this type of relationship and not of some other degree. a. Ternary...
State a rule that says when to extract an attribute from one entity type and place it in a linked entity type.
What are the special guidelines for naming relationships?
In addition to explaining what action is being taken, what else should a relationship definition explain?
Give four reasons why a business rules approach is advocated as a new paradigm for specifying information systems requirements.
Figure 2-27 represents a situation of students who attend and work in schools and who also belong to certain clubs that are located in different schools. Study this diagram carefully to try to...
State six general guidelines for naming data objects in a data model.
What are the benefits of enforcing the integrity constraints as part of the database design and implementation process (instead of doing it in application design)?
Consider the composite usage map in Figure 5-1. After a period of time, the assumptions for this usage map have changed, as follows: There is an average of 50 supplies (rather than 40) for each...
Consider Figure 4-38 and your answer to Problem and Exercise 4-48 in Chapter 4. Assume that the most important reports that the organization needs are as follows: A list of the current developer's...
What is the average Read score for all students? What are the minimum and maximum Read scores? Based on the relations shown in Figure 6-12. The database tracks an adult literacy program. Tutors...
List ProductID, ProductDescription, ProductFinish, and ProductStandardPrice for oak products with a ProductStandardPrice greater than $400 or cherry products with a StandardPrice less than $300. Show...
For each order, list the order ID, customer ID, order date, and most recent date among all orders. Show how you constructed this query using a Venn diagram.
List the IDs of the tutors who are currently tutoring more than one student. Based on the relations shown in Figure 6-12. The database tracks an adult literacy program. Tutors complete a...
What are the TutorlDs for tutors who have not yet tutored anyone? Based on the relations shown in Figure 6-12. The database tracks an adult literacy program. Tutors complete a certification class...
This chapter discusses the data dictionary views for Oracle 12c. Research another RDBMS, such as Microsoft SQL Server, and report on its data dictionary facility and how it compares with Oracle.
Write the SQL command to find any tutors who have not submitted a report for July.
Where do you think student and tutor information such as name, address, phone, and e-mail should be kept? Write the necessary SQL commands to capture this information.
Which tutors, by name, are available to tutor? Write the SQL command.
Write an SQL command that will find any customers who have not placed orders.
List the names and number of employees supervised (label this value HeadCount) for each supervisor who supervises more than two employees.
The production manager at PVFC is concerned about support for purchased parts in products owned by customers. A simple analysis he wants done is to determine for each customer how many vendors are in...
Write an SQL query to list the order number and order quantity for all customer orders for which the order quantity is greater than the average order quantity of that product.
List the five major trends that necessitate data warehousing in many organizations today.
How can data capture processes be improved to improve data quality?
List five errors and inconsistencies that are commonly found in operational data.
Define each of the following terms: a. Hadoop b. MapReduce c. HDFS d. NoSQL e. Pig f. Data mining g. Online analytical processing h. Business intelligence
Match the following terms to the appropriate definitions: _______ Hive a. knowledge discovery using a variety of statistical and computational techniques _______ Text mining b. analytics that...
Identify six broad categories of implications of big data analytics and decision making.
What concerns would you have if you accept a job as a database administrator and discover that the database users are entering one common password to log on to the database each morning when they...
List four common problems of ineffective data administration.
What are the three functions of adaptive control?
The XYZ Company is planning to introduce a new product line and will build a new factory to produce the parts and assembly the final products for the product line. The new product line will include...
A continuous voltage signal is to be converted into its digital counterpart using an analog-to-digital converter. The maximum voltage range is (30 V. The ADC has a 12-bit capacity. Determine (a)...
A cast iron work piece is to be face milled on an NC machine using cemented carbide inserts. The cutter has 16 teeth and is 120 mm in diameter. Cutting speed = 200 m/min and feed = 0.005 mm/tooth....
An end milling operation is performed on an NC machining center. The total length of travel is 625 mm along a straight line path to cut a particular work piece. Cutting speed = 2.0 m/s and chip load...
A turning operation is to be performed on an NC lathe. Cutting speed = 2.5 m/s, feed = 0.2 mm/rev, and depth = 4.0 mm. Work piece diameter = 100 mm and its length = 400 mm. Determine (a) Rotational...
The arc-on time is a measure of efficiency in an arc welding operation. As indicated in our discussion of arc welding in Section 8.5.2, typical arc-on times in manual welding range between 20% and...
In the manual operation of a sheet metal stamping press, a two button safety interlock system is often used to prevent the operator from inadvertently actuating the press while his hand is in the...