List four activities of a typical operating system.
Write an application that displays a box, an oval, an arrow and a diamond using asterisks (*), as follows:
A yield sign encloses the word YIELD within a triangle. Write a program that displays a yield sign. (Use stars to represent the sides of the triangle.)
A network router has a failure rate of 0.02 percent per 1,000 hours. What is the MTBF of that component?
1. Which object does the variable mySet inherit from? Int[] mySet = new int[5]; a.System.Collection b.System.Collection.List c.System.Array d.None, this is a value type. 2. Which type should you use...
Which type of application benefits the most by bypassing write cache? Justify your answer.
Write a Java code segment that creates a blank image and converts its pixels to green. Your code should use an enhanced for loop.
One of the bit patterns 01011 and 11011 represents a value stored in excess 16 notation and the other represents the same value stored in two's complement notation. a. What can be determined about...
Research RAID 6 and its second parity computation.
A software company sells three packages, Package A, Package B, and Package C, which retail for $99, $199, and $299, respectively. Quantity discounts are given according to the following table:...
A storage array dials a support center automatically whenever an error is detected. The vendor's representative at the support center can log on to the service processor of the storage array through...
A retail store has a preferred customer plan where customers may earn discounts on all their purchases. The amount of a customer's discount is determined by the amount of the customer's cumulative...
Design a class to represent a credit card. Think about the attributes of a credit card; that is, what data is on the card? What behaviors might be reasonable for a credit card? Use the answers to...
Consider the following relation: CAR_SALE(Car#, Date_sold, Salesperson#, Commission%, Discount_amt) Assume that a car may be sold by multiple salespeople, and hence {Car#, Salesperson#} is the...
If you have a PC, identify some situations in which you can take advantage of its multitasking capabilities.
Suppose three items R, S, and T are placed in a queue in that order. Then one item is removed from the queue before a fourth item, X, is placed in the queue. Then one item is removed from the queue,...
Write a method that parses a binary number as a string into a decimal integer. The method header is as follows: public static int binary to Decimal(String binaryString) For example, binary string...
Create an application that stores data about your DVD collection in a file. The application should have a structure to hold the following fields: Video Name, Year Produced, Running Time, and Rating....
Design a database for your model. Your design should include a specification of tables and attributes as well as primary, candidate, and foreign keys. Also specify how you will enforce minimum...
Write an SQL statement to join EMPLOYEE, ASSIGNMENT, and PROJECT using the JOIN ON syntax. Run this statement.
What are the four elements that exist when an effective SCM system is implemented? Discuss each briefly.
What three instances call for expediting a systems project?
A movie theater only keeps a percentage of the revenue earned from ticket sales. The remainder goes to the distributor. Write a program that calculates a theater's gross and net box office profit for...
List all paths and calculate and determine the critical path for the Interviewing Users PERT diagram. List all paths and calculate and determine the critical path for the Interviewing Users PERT...
List 7 of the 14 app development steps that deal with design.
Chip, Dot, and Mike participated in several brainstorming sessions resulting in the outlining of several reports. Design (or modify using Access) the HARDWARE MASTER REPORT. This report is large, and...
Design the INSTALLED COMPUTER REPORT, showing personal computers that have been installed in each room. Use the CAMPUS DESCRIPTION and group print by CAMPUS DESCRIPTION and ROOM LOCATION. The...
Cher Ware has remarked several times that a good form would make the task of adding new software much easier. It would also provide permanent paper documentation for software additions. Design a form...
Explain why ERP served with a cloud platform might be more affordable to small and medium businesses than traditional ERP installations.
At present, no Berwick employees have auditing experience. To staff its new internal audit function, Berwick could train some of its computer specialists in auditing, hire experienced auditors and...
One control that is applicable for almost any system is "enter data close to the originating source." A customer entering a purchase into a sales system (such as at Amazon.com) is an excellent...
Wonder Corporation has an opportunity to buy stock in XL, Inc. The directors decide that, instead of Wonder buying the stock, the directors will buy it. Yvon, a Wonder shareholder, learns of the...
The local community feels that secondary school education is a necessity in our society and that lack of education leads to a number of social problems. As a result, the local school board has...
a. What is an accounts receivable aging report? b. Why is an accounts receivable aging report needed for an audit? c. What is an accounts receivable aging report used for in normal company...
Prepare a context diagram and a Level 0 DFD for each of the following situations. a. Prepare and file a tax return with the tax owed to the Internal Revenue Service. b. A customer pays an invoice...
How do the systems described in this case provide business intelligence?
Analyze Sears, using the competitive forces and value chain models.
Which internal control procedure would be most cost-effective in dealing with the following expenditure cycle threats? a. A purchasing agent orders materials from a supplier that he partially owns....
What is a database and how does a relational database organize data? 1. Define a database. 2. Define and explain the significance of entities, attributes, and key fields. 3. Define a relational...
What business benefits did the companies and services described in this case achieve by analyzing and using big data?
Identify two decisions at the organizations described in this case that were improved by using big data and two decisions that big data did not improve.
List and describe the limitations to using big data.
Don's Lumber Company on the Hudson River features a large selection of materials for flooring, decks, moldings, windows, siding, and roofing. The prices of lumber and other building materials are...
Analyze Walmart and Amazon.com, using the competitive forces and value chain models.
What role does information technology play in each of these businesses? How is it helping them refine their business strategies?
Describe two advantages of high-level language programming over machine-language programming?
A grayscale image is one in which each pixel can be white, or black, or various shades of gray in between. Assuming that there are 256 discernable shades of gray, how many bits would a bitmap require...
Estimate the average number of bytes per frame for an MPEG file you own. That is, divide the size of the file by the approximate number of frames (you may assume 24 frames per second). Is this...
Augment your cipher.html page so that it can both encode and decode messages. You will need to define a new function named Decode, which decodes the message in the text area using the entered cipher...
For each of the following statements, draw the memory cell associated with the variable after the assignment has been made:
The first statement that follows assigns a string to variable people, whereas the subsequent four assignments split people into various arrays. For each of these statements, draw the memory cell...
Define a function named Minimum that is similar to the Average function from Figure 17.11, but that takes an array of numbers as input and returns the smallest value from that array. For example, the...
What are Michael Porter's three strategies for successfully competing in the marketplace?
1. A point-of-sale (POS) system slows down service by reading the universal product codes (UPCs) on items in your shopping cart. True or False? 2. Organizations use social networking sites to give...
What are two reasons for the failure of an EIS?
What are two features of the robot named Cozmo?
What are five categories of NLP systems?
What is 2100 (mod 5)?
Write a recursive method that returns the number of 1's in the binary representation of N. Use the fact that this is equal to the number of 1's in the representation of N/2, plus 1, if N is odd.
Order the following functions by growth rate: N, N, N1.5, N2, N logN, N log logN, N log2 N, N log(N2), 2/N, 2N, 2N/2, 37, N2 logN, N3. Indicate which functions grow at the same rate.
a. Write an array implementation of self-adjusting lists. In a self-adjusting list, all insertions are performed at the front. A self-adjusting list adds a find operation, and when an element is...
Efficiently implement a stack class using a singly linked list, with no header or tail nodes.
Keys 1, 2, . . . , 2k 1 are inserted in order into an initially empty AVL tree. Prove that the resulting tree is perfectly balanced.
Design a recursive linear-time algorithm that tests whether a binary tree satisfies the search tree order property at every node.
Write a method that takes as input a binary search tree, T, and two keys k1 and k2, which are ordered so that k1 k2, and prints all elements X in the tree such that k1 Key(X) k2. Do not assume any...
Implement a hopscotch hash table and compare its performance with linear probing, separate chaining, and cuckoo hashing.
Merge the two leftist heaps in Figure 6.58. 11 (10 12 17 (18) 11 21 18 15 (31)
Show that the expected depth of the kth smallest element in a large complete heap (you may assume N = 2k 1) is bounded by log k.
We are given an array that contains N numbers. We want to determine if there are two numbers whose sum equals a given number K. For instance, if the input is 8, 4, 1, 6, and K is 10, then the answer...
Assume that the Hamiltonian cycle problem is NP-complete for undirected graphs. a. Prove that the Hamiltonian cycle problem is NP-complete for directed graphs. b. Prove that the unweighted simple...
The baseball card collector problem is as follows: Given packets P1, P2, . . . , PM, each of which contains a subset of the year's baseball cards, and an integer K, is it possible to collect all the...
a. Give an example where Dijkstra's algorithm gives the wrong answer in the presence of a negative edge but no negative-cost cycle. b. Show that the weighted shortest-path algorithm suggested in...
a. Use the exponentiation algorithm to prove that 2340 1 (mod 341). b. Show how the randomized primality test works for N = 561 with several choices of A.
A convex polygon is a polygon with the property that any line segment whose endpoints are on the polygon lies entirely within the polygon. The convex hull problem consists of finding the smallest...
Show that if the symbols are sorted by frequency, Huffman's algorithm can be implemented in linear time.
What are the most common types of computer-based information systems used in business organizations today? Give an example of each.
Identify at least six characteristics of valuable information.
What is a knowledge management system? Give an example.
Describe the "ideal" automated vehicle license plate renewal system for the drivers in your state. Describe the input, processing, output, and feedback associated with this system.
What is the total cost of ownership?
A video movie rental store is using a relational database to store information on movie rentals to answer customer questions. Each entry in the database contains the following items: Movie ID No....
Instant messaging is being widely used today. Describe how this technology could be used in a business setting. Are there any drawbacks or limitations to using instant messaging in a business setting?
Your company is about to develop a new Web site. Describe how you could use Web services for your site.
Identify and briefly describe three m-commerce applications you or a friend have used.
Assume that you are the owner of a large landscaping firm serving hundreds of customers in your area. Identify the kinds of customer information you would like to have captured by your firm's CRM...
You are the new head of corporate security for a large Fortune 1000 company and are alarmed at the number of laptop computers your firm's employees lose each month. What actions would you take to cut...
A project team has estimated the costs associated with the development and maintenance of a new system. One approach requires a more complete design and will result in a slightly higher design and...
Assume that your project team has been working for three months to complete the systems design of a new Web-based customer ordering system. Two possible options seem to meet all users' needs. The...
Companies in Canada are racing to see who can motivate Canadians to start paying at the register with their cell phones. You are probably familiar with MasterCard's PayPass technology that allows...
The use of information systems saves workers and businesses countless hours of tedious labor. Still, users of information systems often become frustrated with the system's inability to grasp simple...
System development projects get started for a variety of reasons. Often, they are intended to support a company's strategic plans. Other times they are launched out of necessity, such as to comply...
The president of the Specialty Paint Corp. gets the idea to work with a local beer brewer to produce an invisible beer can (as an anti-litter measure). The president tells her legal department to...
What is the difference, if any, between the demodulator part of a modem and the coder part of a codec? (After all, both convert analog signals to digital ones.)
What is the minimum overhead to send an IP packet using PPP? Count only the overhead introduced by PPP itself, not the IP header overhead.
A large number of consecutive IP address are available starting at 198.16.0.0. Suppose that four organizations, A, B, C, and D, request 4000, 2000, 4000, and 8000 addresses, respectively, and in that...
In our example transport primitives of Fig. 6-2, LISTEN is a blocking call. Is this strictly necessary? If not, explain how a non-blocking primitive could be used. What advantage would this have over...
A person's e-mail address is his or her login name @ the name of a DNS domain with an MX record. Login names can be first names, last names, initials, and all kinds of other names. Suppose that a...
A weak entity set can always be made into a strong entity set by adding to its attributes the primary key attributes of its identifying entity set. Outline what sort of redundancy will result if we...
Design a generalizationspecialization hierarchy for a motor-vehicle sales company. The company sells motorcycles, passenger cars, vans, and buses. Justify your placement of attributes at each level...
Consider the representation of a ternary relationship using binary relationships as described in Section 2.4.3 (shown in Figure b) a. Show a simple instance of E, A, B, C, RA, RB, and RC that cannot...