Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using the adaptive tree walk protocol. If all the stations whose addresses are prime numbers suddenly become...
Six stations, A through F, communicate using the MACA protocol. Is it possible that two transmissions take place simultaneously? Explain your answer.
Consider building a CSMA/CD network running at 1 Gbps over a 1-km cable with no repeaters. The signal speed in the cable is 200,000 km/sec. What is the minimum frame size?
Assuming that all routers and hosts are working properly and that all software in both is free of all errors, is there any chance, however small, that a packet will be delivered to the wrong...
The CPU in a router can process 2 million packets/sec. The load offered to it is 1.5 million packets/sec, if a route from source to destination contains 10 routers, how much time is spent being...
Consider the quoted-printable MIME encoding scheme. Mention a problem not discussed in the text and proposes a solution.
From an ISP's point of view, POP3 and IMAP differ in an important way. POP3 users generally empty their mailboxes every day. IMAP users keep their mail on the server indefinitely. Imagine that you...
An HTML page is as follows: "www.info-source.com/welcome.html" If the user clicks on the link, a TCP connection is opened and a series of lines is sent to the server. List all the lines sent.
In Fig. 7-57(c) quantization noise occurs due to the use of 4-bit samples to represent nine signal values. The first sample, at 0, is exact, but the next few are not. What is the percent error for...
Can a 1-bit error in an MPEG frame affect more than the frame in which the error occurs? Explain your answer.
In the Needham-Schroeder protocol, Alice generates two challenges, RA and RA2. This seems like overkill. Would one not have done the job?
Consider sorting n numbers stored in array A by first finding the smallest element of A and exchanging it with the element in A[1]. Then find the second smallest element of A, and exchange it with A...
Professor Armstrong suggests the following procedure for generating a uniform random permutation: PERMUTE-BY-CYCLIC (A) 1 n length [A] 2 offset RANDOM (1, n) 3 for i 1 to n 4 do dest i + offset 5 if...
Illustrate the operation of MAX-HEAP-INSERT (A, 10) on the heap A = 15, 13, 9, 5, 12, 8, 7, 4, 0, 6, 2, 1. Use the heap of Figure 6.5 as a model for the HEAP-INCREASE-KEY call.
Show how to sort n integers in the range 0 to n2 - 1 in O (n) time.
The next two parts will prove inequality (2.3). b. State precisely a loop invariant for the for loop in lines 2-4, and prove that this loop invariant holds. Your proof should use the structure of the...
A hash table of size m is used to store n items, with n m/2. Open addressing is used for collision resolution. a. Assuming uniform hashing, show that for i = 1, 2, ..., n, the probability that the...
During the course of an algorithm, we sometimes find that we need to maintain past versions of a dynamic set as it is updated. Such a set is called persistent. One way to implement a persistent set...
A directed graph G = (V, E) is said to be semi connected if, for all pairs of vertices u, v V, we have u v or v u. Give an efficient algorithm to determine whether or not G is semi connected. Prove...
Consider the relation of as shown below, which shows the result of the query ?Find the names of all customers who have a loan at the bank.? Rewrite the query to include not only the name, but also...
Show that, in SQL, < > all is identical to not in.
Consider the relational database of Figure. Using SQL, define a view consisting of manager-name and the average salary of all employees who work for that manager. Explain why the database system...
Consider the employee database of Figure, where the primary keys are underlined. Give an expression in SQL for each of the following queries. a. Find the names of all employees who work for First...
Consider the insurance database of Figure, where the primary keys are underlined. Construct the following QBE queries for this relational-database. a. Find the total number of people who owned cars...
Complete the SQL DDL definition of the bank database of Figure to include the relations loan andborrower. create table customer (customer-name char(20), customer-street char(30), customer-city...
Show that the following decomposition of the schema R of Exercise 7.2 is not loss less-join decomposition: (A, B, C) (C, D, E).
Give an example of a relation schema R` and set F` of functional dependencies such that there are at least three distinct lossless-join decompositions of R` into BCNF.
In designing a relational database, why might we choose a non-BCNF design?
Consider a system that provides persistent objects. Is such a system necessarily a database system? Explain your answer.
Give an SQL: 1999 schema definition of the E-R diagram in Figure below, which contains specializations. city street name person ISA credit-rating salary ploye customer ISA officer teller secretary...
Give the DTD for an XML representation of the following nested-relational schema Emp = (ename, ChildrenSet setof (Children), SkillsSet setof (Skills)) Children = (name, Birthday) Birthday = (day,...
Write a query in XQuery on the XML representation as shown below to compute the left outer join of customer elements with account elements. account-number ID #REQUIRED owners IDREFS #REQUIRED >...
Consider the following recursive DTD. ] > a. Give a small example of data corresponding to the above DTD. b. Show how to map this DTD to a relational schema. You can assume that part names are...
List two advantages and two disadvantages of each of the following strategies for storing a relational database: a. Store each relation in one file. b. Store multiple relations (perhaps even the...
Consider the relations r1 (A, B, C), r2 (C, D, E), and r3 (E, F), with primary keys A, C, and E, respectively. Assume that r1 has 1000 tuples, r2 has 1500 tuples, and r3 has 750 tuples. Estimate the...
Since every conflict-serializable schedule is view serializable, why do we emphasize conflict serializability rather than view serializability?
Consider a variant of the tree protocol called the forest protocol. The database is organized as a forest of rooted trees. Each transaction Ti must follow the following rules: The first lock in each...
When a transaction is rolled back under timestamp ordering, it is assigned a new timestamp. Why can it not simply keep its old timestamp?
Although SIX mode is useful in multiple-granularity locking, an exclusive and intend-shared (XIS) mode is of no use. Why is it useless?
Explain the difference between a system crash and a disaster.
For each of the following requirements, identify the best choice of degree of durability in a remote backup system: a. Data loss must be avoided but some loss of availability may be tolerated. b....
In typical clientserver systems the server machine is much more powerful than the clients; that is, its processor is faster, it may have multiple processors, and it has more memory and disk capacity....
What form of parallelism (interquery, interoperation, or intraoperation) is likely to be the most important for each of the following tasks? a. Increasing the throughput of a system with many small...
Every year the Loebner prize is awarded to the program that comes closest to passing a version of the Turing test. Research and report on the latest winner of the Loehner prize. What techniques does...
Surely animals, humans, and computers cannot be intelligentthey can do only what their constituent atoms are told to do by the laws of physics. Is the latter statement true, and does it imply the...
Both the performance measure and the utility function measure how well an agent is doing. Explain the difference between the two.
This exercise explores the differences between agent functions and agent programs. a. Can there be more than one agent program that implements a given agent function? Give an example, or show why one...
Let us examine the rationality of various vacuum-cleaner agent functions. a. Show that the simple vacuum-cleaner agent function described in Figure is indeed rational tinder the assumptions listed....
Explain why problem formulation must follow goal formulation.
Consider a state space where the start state is number 1 and the successor function for state n returns two states, numbers 2n and 2n + 1. a. Draw the portion of the state space for states 1 to 15....
We said that we would not consider problems with negative path costs. In this exercise, we explore this in more depth. a. Suppose that actions can have arbitrarily large negative costs; explain why...
Solve the crypt arithmetic problem in Figure by hand, using backtracking, forward checking, and the MRV and least-constraining-valueheuristics. F) R T WO + T W O FOUR ( (X2 (, (b)
Consider the following procedure for choosing moves in games with chance nodes; Generate some die-roll sequences (say, 50) down to a suitable depth (say, 8). With known die rolls, the game tree...
Represent the following sentences in first-order logic, using a consistent vocabulary (which you must define): a. Some students took French in spring 2001. b. Every student who takes French passes...
In this exercise, we will consider the implementation of search algorithms in Prolog. Suppose that successor (X, Y) is true when state Y is a successor of state X; and that goal (X) is true when X is...
From Horses are animals: it follows that The head of a horse is the head of animal. Demonstrate that this inference is valid by carrying out the following steps: a. Translate the premise and the...
In the blocks world we were forced to introduce two STRIPS actions, Move and Move to Table, in order to maintain the clear predicate properly. Show how conditional effects can be used to represent...
Consider the family of linear Gaussian networks, as illustrated. a. In a two-variable network, let X1 he the parent of X2, let X1 have a Gaussian prior, and let P (X2, X1) be a linear Gaussian...
The probit distribution defined, describes the probability distribution for a Boolean child, given a single continuous parent. a. How might the definition be extended to cover multiple continuous...
This exercise is concerned with the variable elimination algorithm in Figure. a. Section 14.4 applies variable elimination t the query P (Burglary?JohnCalls = true, Mary Calls = true). Perform the...
Consider the 4 x 3 world shown in Figure. a. Implement an environment simulator for this environment, such that the specific geography of the environment is easily altered. Some code for doing this...
Suppose you are running a learning experiment on a new algorithm. You have a data set consisting of 2 examples of each of two classes. Yon plan to use leave-one-nut cross-validation. As a baseline,...
Recall from that there are 22n distinct Boolean functions of n inputs. How many of these are representable by a threshold perceptron?
Consider the sentence ?Someone walked slowly to the supermarket? and the following lexicon: Pronoun ? someone V ? walked Adv ? slowly Prep ? to Det ? the Noun ? supermarket Which of the following...
Define project management.
Build a Gantt chart based on the following list of tasks and dependencies to build and test a screen form for a new system. Identify the criticalpath. Task ID Description Duration [days Predecessor...
You are a team leader of four systems analysts. You have one analyst who has never done a structured walkthrough of her work. How would you help the analyst to get started? How would you ensure that...
1. Now consider the way the project was probably initiated. To what extent is the project the result of (a) An opportunity, (b) A problem, or (c) A directive? 2. Many of the system users (such as...
Interpret and explain the use case diagram in Figure. Explain the various roles of those using the system and the functions that each role requires. Explain the relationships and the ways the use...
In Chapter 7, Thinking Critically exercises 7, 8, and 10, you developed a system sequence diagram for Add a new vehicle to an existing policy. You were also provided a list of classes. Based on the...
Compare the strengths and weaknesses of using a DFD to define inputs with using a system sequence diagram to define inputs. Which do you like the best? Why?
Assume the same facts as presented in the Chapter 8 Reliable Pharmaceutical case. Also assume that you are the project manager for the selected vendors development team. Your company, Rx Tech Sys,...
In Chapter 7, you developed a use case diagram, a fully developed use case description, and a system sequence diagram for the use cases add a seller and Record a book order. In Chapter 11 you...
A library makes an excellent information systems model. It serves as a very large information storage facility with text, audio, and video data archives. Look up the definitions for each term listed...
What are some of the toughest management challenges in developing IT solutions to solve business problems and meet new business opportunities?
Consider the virtual reality technologies employed by Procter & Gamble and described in this case. Break into small groups and brainstorm applications of these types of technologies for companies in...
Refer to the Real World Case on speech recognition in health care in the chapter. Although these and other technologies are becoming more prevalent in health care, doctors have traditionally been...
What are several important computer hardware developments that you expect to happen in the next 10 years? How will these affect the business use of computers?
The case talks about electronic medical or health records systems. These are slowly becoming standard in many hospitals and clinics, both private and public. Go online and search for reports of these...
XBRL stands for extensible Business Reporting Language, and it is one of the family of XML languages that is becoming standard for business communication across companies. Among other uses, the...
The legal and regulatory environment of the health care industry has changed significantly in recent times. How does this affect technology development and implementation in these organizations. Go...
Ms. Sapper, a marketing manager in a global accounting firm, was this years coordinator for her firms annual partner meeting. With 400 partners from around the world, Sapper faced daunting...
How can Internet technologies be involved in improving a process in one of the functions of business? Choose one example and evaluate its business value.
1. What are some of the business benefits of the technologies described in the case? Provide several examples beyond the mere automation of transaction-oriented processes. 2. Do you think the...
The CRM implementations in this case highlight the critical importance of information about customers, their preferences and activities, and how to use it to understand and develop better marketing...
Refer to the real-world example about copying CDs and music downloading in the chapter. Is copying music CDs an ethical practice? How about Internet music downloading? Explain.
Compare and contrast BPA, BPI, and BPR. Which is most risky? Which has the greatest potential value?
Describe two special issues that may be important to list on a system request.
The Spyware Problem Web surfers may feel anonymous as they use the Internet, but that feeling isnt always justified. IP addresses, cookies, site log-in procedures, and credit card purchases all help...
List two intangible benefits. Describe how these benefits can be quantified.
Explain the net present value and return on investment for a cost-benefit analysis. Why would these calculations be used?
Reread the "Your Turn 1-2" box (Implementing a Satellite Data Network). Create a list of the stakeholders that should be considered in a stakeholder analysis of this project.
How might the Internet, intranets, and extranets affect the business drivers or requirements responsible for a companys use of global IT, as shown in Figure? Give several examples to illustrate...
Describe the major elements and issues with system prototyping.
Compare and contrast extreme programming and throwaway prototyping.
I conducted a case study at Carlson Hospitality, a global leader in hospitality services, encompassing more than 1300 hotel, resort, restaurant, and cruise ship operations in 79 countries. One of its...
Describe the differences between a technical lead and a functional lead. How are they similar?
Describe three types of standards, and provide examples of each.
What belongs in the project binder? How is the project binder organized?
In 1997, Oxford Health Plans had a computer problem that caused the company to overestimate revenue and underestimate medical costs. Problems were caused by the migration of its claims processing...