Using the class Pet from Listing 6.1, write a program to read data for five pets and display the following data: name of smallest pet, name of largest pet, name of oldest pet, name of youngest pet,...
Search the Web for the term computer crime statistics and find two sources other than the Ponemon surveys cited in Q2. For each source, explain the methodology used and explain strengths and...
Explain the differences between Gane and Sarson and Yourdon symbols. Provide examples of symbols that represent processes, data flows, data stores, and entities.
1. What options does Personal Trainer have for developing a new system? What are some specific issues and options that Susan should consider in making a decision? 2. Susan has been asked to prepare a...
Given the following business scenario, create a Crows Foot ERD using a specialization hierarchy if appropriate. Tiny Hospital keeps information on patients and hospital rooms. The system assigns each...
Make a BPMN of a new transportation process with driverless cars. Specify activities, actors, and the smartphone IS.
User ahmed owns a directory, stuff, containing a text file called ourstuff.txt that he shares with users belonging to the group staff. Those users may read and change this file, but not delete it....
Create a set of use cases for the following high-level requirements in a housing system run by the Campus Housing Service. The Campus Housing Service helps students find apartments. Owners of...
1. What should BoB have done to avoid this situation? 2. Should the sales support staff ask the IT department to rewrite the user manual as a maintenance project, or should they request more training...
Your boss, the IT director, wants you to explain FDDs, BPM, DFDs, and UML to a group of company managers and users who will serve on a systems development team for the new marketing system. 1....
In the auto shop examples on page 348, what are some problems that might arise in Marios system? Why wont Danica run into the same problems? Provide specific examples in your answer.
Suppose that the vice president of marketing asks you to write a program to create labels for a onetime advertising promotion. As IT manager, you know that the labels can be prepared more efficiently...
1. To what events must the SBRU booking system respond? Create a complete event table listing the event, trigger, source, use case, response, and destination for each event. Be sure to consider only...
1. Develop questions to ask Way Outs owner to help her conduct a SWOT analysis. The first step in developing a SWOT analysis is for top management to respond to questions like these: 2. How could a...
Write a program that will take as input two Web page URLs and find a path of links from one to the other. What is an appropriate search strategy is bidirectional search a good idea? Could a search...
Explore the social media links on the kiwiexperience.com home page. a. What are you initial reactions? Does the layout and concept invite you to participate and provide your own content? b. This Web...
Create a set of use cases for the process of buying glasses from the viewpoint of the patient, but do not bother to identify the steps within each use case. (Just complete the information at the top...
A bridged-T network is often used in AC control systems as a filter network [8]. The circuit of one bridged-T network is shown in Figure P2.8. Show that the transfer function of the network is Sketch...
Given the sample records in the CHARTER table shown in Table P6.11, do the following: a. Write the relational schema and draw the dependency diagram for the table structure. Make sure that you label...
Create a set of use cases for the accompanying dentist office system, but do not bother to identify the steps within each use case. (Just complete the information at the top of the use case form.)...
Compare and contrast outcome analysis, technology analysis, and activity elimination. What general contribution do these strategies play in determining requirements?
Suppose you own a travel agency in a large city. You have many corporate clients, but growth has slowed somewhat. Some long-term employees are getting discouraged, but you feel that there might be a...
E-commerce has seen explosive growth in recent years. What are the most important reasons for this trend? Will it continue? Why or why not?
The Public Safety office at Millennium College maintains a list of parking tickets issued to vehicles parked illegally on the campus. Table 4-6 shows a portion of this list for the fall semester....
1. Develop a business profile for Hudson Kayak Adventures. Create a separate section for each of the following: HKAs business activities, organization, resources, customers, and potential for...
This case implies that the frequent acquisition and disposition of tourism brands poses problems for information systems. Summarize what you think those problems might be. Consider all five...
United Broke Artists (UBA) is a broker for not-so-famous painters. UBA maintains a small network database to track painters, paintings, and galleries. A painting is painted by a particular artist,...
Again, using your knowledge of the college environment, determine the functional or multivalued dependencies that exist in the following table. After determining the functional dependencies, convert...
Using your knowledge of the college environment, determine the functional dependencies that exist in the following table. After determining the functional dependencies, convert this table to an...
Consider the two-player game described in Figure. a. Draw the complete game tree, using the following conventions: Write each state as (SA, SB) where SA and 5B denote the token locations. Put each...
Samantha Green owns and operates Twigs Tree Trimming Service. Recall from Chapter 3 that Samantha has a degree from a forestry program, and recently opened her business in Winnipeg. Her business...
What are three types of sampling? Which one would you use to analyze data input errors?
1. One of the challenges that PayPal faces now that it has managed to overcome the polylingual obstacle is finding the best way to put this functionality in the hands of the business, so that they do...
Consider Figure 1-14. Explain the meaning of the line that connects CUSTOMER to ORDER and the line that connects ORDER to INVOICE. What does this say about how Pine Valley Furniture Company does...
An alternative algorithm for insertion into a B-tree is the following: As the insertion algorithm travels down the tree, each full node that is encountered is immediately split, even though it may...
1. Create a context diagram for the new business. It is OK to use your imagination with respect to data flows that you envision. 2. Create a diagram 0 that includes at least three processes and two...
a. Using the DOT PROJECT Table, describe an example that illustrates the insertion anomaly. b. Using the DOT PROJECT Table, describe an example that illustrates the deletion anomaly. c. Using the DOT...
How many solutions are there for the map-coloring problem inFigure? NT WA Northern Territory Queensland SA NSW Western Australia South Australia New South Wales Victoria Tasmania (a) (b)
1. Why would the Olympics benefit from creating a strong environmental enterprise infrastructure? 2. How can the Olympics help support ethical e-waste initiatives? 3. Why would a sporting event like...
Consider the two tables shown in Figure 6.37. The TerID column in the SALES_REP relation is a foreign key referring to the primary key column TerID in the TERRITORY relation. Figure 6.37 Relations...
What is the purpose of a benchmark test? Suggest at least two examples of benchmarks.
Consider the following two relations for Millennium College: Following is a typical query against these relations: a. On what attributes should indexes be defined to speed up this query? Give the...
Suppose you work at AllRoad and Kelly asks you to list five criteria she should use when considering whether AllRoad should develop a thin- or thick-client application for mobile devices. Justify...
Refer to the Real World Case on Data-Driven Crime Fighting in the chapter. Given the very decentralized nature of law enforcement, with more than 18,000 units in the United States alone, what can be...
Why should the system request be created by a businessperson as opposed to an IS professional?
Will online transactions eventually replace person-to-person contact? Why or why not?
Write the binary translation of the logical address 0001010010111010 under the following hypothetical memory management schemes, and explain your answer: a. A paging system with a 256-address page...
1. Create a context diagram for the Reliable Pharmaceutical case based on the system description in Chapter 1 and the event table that you developed in Chapter 5. 2. Create DFD fragments for each...
Write SQL retrieval commands for each of the following queries: a. Display the course ID and course name for all courses with an ISM prefix. b. Display all courses for which Professor Berndt has been...
A major retail store recently spent $24 million dollars on a large private satellite communication system that provides state-of-the-art voice, data, and video transmission between stores and...
Consider the query P (Rain?Sprinkler = true, Wet-Grass = true) in Figure (a) and how MCMC can answer it. a. How many states does the Markov chain have? b. Calculate the transition matrix Q containing...
1. Should Paperback Press have a specific process to manage future changes and enhancements? What should it be? 2. If new features are added, what methodology should the IT staff use to add functions...
Think about sending a first-class letter to an international pen pal. Describe the process that the letter goes through to get from your initial creation of the letter to being read by your friend,...
A good straw man learning algorithm is as follows: create a table Out of all the training examples identify which output occurs most often among the training examples; call it d. Then when given an...
Consider the following program: const int n = 50; int tally; void total() { int count; for (count = 1; count
Ten thousand airline reservation stations are competing for the use of a single slotted ALOHA channel. The average station makes 18 requests/hour. A slot is 125 sec. What is the approximate total...
1. What benefits may Starwood Hotels derive from the introduction of touch-screen technology as noted in the case? What possible disruptions may occur as a result. Provide several examples of each....
1. Companies are developing ethical policies and guidelines for legal reasons, but also to clarify what is acceptable and what is not. Do you think any of the issues raised in the case required...
Describe the habits of successful interface designers.
Refer to the Real World Case IT asset management in the chapter. What advice would you provide to a growing company to avoid facing the issues discussed in the case?
The Hatcher Company is in the process of developing a new inventory management system. One of the event handling processes in that system is Receive Supplier Shipments. The (inexperienced) systems...
Assume that at time 5 no system resources are being used except for the processor and memory. Now consider the following events: At time 5: P1 executes a command to read from disk unit 3. At time 15:...
Give an example of a directed graph G = (V, E), a source vertex s V, and a set of tree edges E E such that for each vertex v V, the unique path in the graph (V, E ) from s to v is a shortest path...
1. Convert your ERD to a domain class diagram. 2. Develop a use case diagram. 3. Create a fully developed use case description or an activity diagram for each use case. 4. Develop a system sequence...
Use Armstrongs axioms to prove the soundness of the union rule. Use the augmentation rule to show that, if , then . Apply the augmentation rule again, using , and then apply the transitivity rule.
A logical knowledge base represents the world using a set of sentences with no explicit structure. An analogical representation, on the other hand, has physical structure that corresponds directly to...
Consider a computer system that contains an I/O module controlling a simple keyboard/printer Teletype. The following registers are contained in the CPU and connected directly to the system bus: INPR:...
Many current language specifications, such as for C and C++, are inadequate for multithreaded programs. This can have an impact on compilers and the correctness of code, as this problem illustrates....
Why is a post-implementation evaluation important? Who should conduct it, and why?
Figure 1-21 shows an enterprise data model for a music store. a. What is the relationship between Album and Store (one-to-one, many-to-many, or one-to-many)? b. What is the relationship between...
Compare the performance of A and RBFS on a set of randomly generated problems in the 8-puzzle (with Manhattan distance) and TSP (with MSTsee Exercise 4.8) domains. Discuss your results. What happens...
To ensure the quality, cost, and timeliness of the new system, you suggested that New Century use a project management approach. Dr. Jones agreed, and he wants you develop a brief presentation that...
A router has the following (CIDR) entries in its routing table: Address/mask Next hop 135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23 Router 1 Default Router 2 For each of the...
A popular childrens riddle is Brothers and sisters have I none, but that mans father my fathers son. Use the rules of the family domain to show who that man is. You may apply any of the inference...
Draw an EER diagram for the following problem using this text's EER notation, the Visio notation, or the subtypes inside supertypes notation, as specified by your instructor. A nonprofit organization...
Planning and budgeting processes are notorious for their rigidity and irrelevance to management action. How can planning be made relevant to the challenges facing a business?
1. What competitive advantages can the companies described in the case derive from the use of faster technology and co-location of servers with the exchanges? Which would you say are sustainable, and...
Five recovery techniques are listed below. For each situation described, decide which of the following recovery techniques is most appropriate. Backward recovery Forward recovery (from latest...
Give some examples of database utilities.
Why should an MTU value of at least 2,500 bytes be configured in a bridged iSCSI environment?
1. Applications for grid computing in this case include medical diagnosis and financial transaction processing. What other areas do you think would be well suited to the use of grid computing and...
Design a generic post-implementation evaluation form. The form should consist of questions that you could use to evaluate any information system. The form should evaluate the training received and...
What assumptions do developers usually make while doing the initial use case realization?
a. Using the data in Figure 8.41, illustrate how the tables in the dimensional model shown in Figure 8.42 would be populated. b. Create a dimensional model containing an aggregated fact table, where...
Draw an ERD for the following situation. (State any assumptions you believe you have to make in order to develop a complete diagram.) Also, draw a data model for this situation using the tool you...
Devise a state space in which A* using GRAPH-SEARCH returns a suboptimal solution with an h(n) function that is admissible but inconsistent.
Two statisticians go to the doctor and are both given the same prognosis: A 40% chance that the problem is the deadly disease A. and a 60% chance of the fatal disease B. Fortunately, there are anti-A...
Visit www.elance.com and identify five potential outsource vendors that you could use to develop your app. Describe criteria you would use for selecting one of these vendors.
Draw a physical level 0 data flow diagram (DFD) for the following dentist office system, and compare it with the logical model that you created in Chapter 5: Whenever new patients are seen for the...
Add a subtype discriminator for each of the supertypes shown in Figure 3-10. Show the discriminator values that assign instances to each subtype. Use the following subtype discriminator names and...
As an IT manager, would you assign newly hired systems analysts to maintenance projects? Why or why not?
10.3. Least laxity first (LLF) is a real-time scheduling algorithm for periodic tasks. Slack time, or laxity, is the amount of time between when a task would complete if it started now and its next...
You have been given a file that contains fields relating to CD information. Using the steps of normalization, create a logical data model that represents this file in third normal form. The fields...
a. Depict full key functional dependencies, partial functional dependencies (if any), and transitive functional dependencies (if any) in the Movie Actors Table. b. Show the result of normalizing the...
Suppose you are given two sets A and B, each containing n positive integers. You can choose to reorder each set however you like. After reordering, let ai be the ith element of set A, and let bi be...
Automata Inc. produces specialty vehicles by contract. The company operates several departments, each of which builds a particular vehicle, such as a limousine, a truck, a van, or an RV. Before a new...
1. Use the background information to create a business profile for New Century, and indicate areas where more information will be needed. The profile should include an organization chart of the...
What planning methods would you use to develop business/ IT strategies and applications for your own business? Explain your choices.
Draw an ERD to represent what you have discovered. Identify a business rule in this description and explain how this business rule is modeled on the E-R diagram. Also draw a data model for this...
The VAX/VMS operating system makes use of four processor access modes to facilitate the protection and sharing of system resources among processes. The access mode determines Instruction execution...