What directory structure is described by the path X/Y/Z?
Repeat Programming Project 10 of Chapter 2, but include input checking Display the change only if a valid price is entered (no less than 25 cents, no more than 100 cents, and an integer multiple of 5...
Why are normal forms alone insufficient as a condition for a good schema design?
How does the navigation model differ from the interaction model?
Consider a class that keeps track of the sales of an item. An object of this class will have the attributes Number sold Total sales Total discounts Cost per item Bulk quantity Bulk discount...
The following table represents the addresses and contents (using hexadecimal notation) of some cells in a machine's main memory. Starting with this memory arrangement, follow the sequence of...
Write an alternate SQL statement that modifies your answer to Review Question 7.7 to make the relationship between EMPLOYEE and ASSIGNMENT a 1:1 relationship. Review Question 7.7; Write a CREATE...
Apply Algorithm 16.2(a) to the relation in Exercise 15.24 to determine a key for R. Create a minimal set of dependencies G that is equivalent to F, and apply the synthesis algorithm (Algorithm 16.6)...
From the following list, extract a collection of numbers whose sum is 3165. How efficient is your approach to the problem? 26, 39, 104, 195, 403, 504, 793, 995, 1156, 1677
The table below represents a stack stored in a contiguous block of memory cells, as discussed in the text. If the base of the stack is at address 10 and the stack pointer contains the value 12, what...
Discuss some types of database utilities and tools and their functions.
Assume that in a particular augmentation of a remote-file-access protocol, each client maintains a name cache that caches translations from file names to corresponding file handles. What issues...
Decode the following bit patterns using the floating-point format discussed in the text: a. 01001010 b. 01101101 c. 00111001 d. 11011100 e. 10101011
Identify the components of the following URL and describe the meaning of each. http://lifeforms.com/animals/moviestars/kermit.html
An Oracle database uses a block size of 4 KB for its I/O operation. The application that uses this database primarily performs a sequential read operation. Suggest and explain the appropriate values...
DAS provides an economically viable alternative to other storage networking solutions. Justify this statement.
You are hired by Expressimo Delivery Service to develop an application that computes the delivery charge. The company allows two types of packaging-letter and box-and three types of service-Next Day...
What are the benefits of using multiple HBAs on a host?
Write a program that uses a scanner to report some statistics about words in an input sentence (see Section 7.8). The outputs should be the number of words in the sentence, the average word length,...
The following are instructions written in the machine language described in Appendix C. Translate them into English. a. 7123 b. 40E1 c. A304 d. B100 e. 2BCD
Why is SCSI performance superior to that of IDE/ATA? Explain the reasons from an architectural perspective.
Suppose a computer contained 512MB (MiB) of main memory, and an operating system needed to create a virtual memory of twice that size using pages of 2KB (KiB). How many pages would be required?
Consider the following relational database for the Super Baseball League. It keeps track of teams in the league, coaches and players on the teams, work experience of the coaches, bats belonging to...
Consider a class motorboat that represents motorboats. A motorboat has attributes for The capacity of the fuel tank The amount of fuel in the tank The maximum speed of the boat The current speed...
Classify each of the following instructions (in the machine language of Appendix C) in terms of whether its execution changes the contents of the memory cell at location 3B, retrieves the contents of...
If a flaw in an operating system's security allows a malicious programmer to gain unauthorized access to sensitive data, to what extent should the developer of the operating system be held...
Write a Java method getLetterGrade that is based on the grading scale of Project 7-3. This method expects the numeric grade as a parameter and returns a string representing the letter grade. The...
Specify the minimum type(s) of operation(s) the database must support (remote request, remote transaction, distributed transaction, or distributed request) to perform the following operations: At...
You have been appointed a project manager for a small software products company. Your job is to build a breakthrough product that combines virtual reality hardware with state-of-the-art software....
Draw a class diagram representing a book defined by the following statement: "A book is composed of a number of parts, which in turn are composed of a number of chapters. Chapters are composed of...
How does file-level virtualization ensure non-disruptive file mobility?
Rewrite the following program segment using a repeat structure rather than a while structure. Be sure the new version prints the same values as the original. Count 2; while (Count < 7) do (print the...
Assuming a 1-KB page size, what are the page numbers and offsets for the following address references (provided as decimal numbers): a. 3085 b. 42095 c. 215201 d. 650000 e. 2000001
"Unreasonable" deadlines are a fact of life in the software business. How should you proceed if you're faced with one?
Rewrite Exercise 1.11 to prompt the user to enter the number of years and displays the population after that many years. Here is a sample run of the program: Enter the number of years: 5 The...
What problem arises as the lengths of the time slices in a multiprogramming system are made shorter and shorter? What about as they become longer and longer?
Write a recursive method printArray that displays all the elements in an array of integers, separated by spaces. Here is the template public class Print { // call helper function to do work public...
Suppose a small company has five employees and is planning to increase the number to six. Moreover, suppose one of the company's programs contained the following assignment statements. DailySalary =...
Write user requirements for the CPU case.
Design a test plan for the requirements created in Exercise E-7.
Modify and print the following elements with edit criteria placed in the Notes area: a. Element: SOFTWARE INVENTORY NUMBER A modulus-11 check digit must be verified when entering the number. The ADD...
a. Why should USAA collect data on which auto parts are fixed most frequently? What could it do with this data? b. Even though USAA offered to waive the deductible, the repair shops still managed to...
a. What kind of information do you think Tesco gathers? b. How do you think Tesco has motivated over 12 million customers to sign up for its Clubcard program? c. What can Tesco accomplish with the...
Match the following terms with their definitions: Term 1. Vulnerability 2. Exploit 3. Authentication 4. Authorization 5. Demilitarized zone (DMZ) 6. Deep packet inspection 7. Router 8. Social...
Lexsteel, a manufacturer of steel furniture, has facilities throughout the United States. Problems with the accounts payable system have prompted Lexsteel's external auditor to recommend a detailed...
Examine issues of the Journal of Accountancy, Strategic Finance, and other business magazines for the past three years to find stories about current developments in factory automation. Write a brief...
Describe your personal bill paying process. What control plans do you have in place to meet the control goals in this chapter? Consider effectiveness, efficiency, security and information goals.
Product innovation includes designing innovative products and getting them to market quickly. In a world where the design, production, and consumption may be on different continents, describe how an...
Creating and testing check digits. a. Create a spreadsheet that will take as input a five-digit account number and calculate a check digit using this formula: (5 x left-most digit + 4 x next digit +...
Mark Holifield, Home Depot's Vice President of Supply Chain, has noted that the company didn't have the most leading-edge technology, but it could make a major change in its supply chain. Discuss the...
How will a four-step method for business problem solving help you solve information system-related problems? a. List and describe each of the four steps for solving business problems. b. Give some...
How will information systems affect business careers, and what information system skills and knowledge are essential? a. Describe the role of information systems in careers in accounting, finance,...
Prepare a program flowchart to help Melanie program this process. Melanie is doing a study on various weight-loss plans and needs to determine an individual's weight status by calculating his body...
How do information systems help businesses compete using quality and design? a. Define quality and compare the producer and consumer definitions of quality. b. Describe the various ways in which...
What is the role of business process management (BPM) in enhancing competitiveness? a. Define BPM and explain how it helps firms become more competitive. b. Distinguish between BPM and business...
Compare the BYOD experiences of Michelin North America and Rosendin Electric. Why did BYOD at Michelin work so well?
In this exercise, you will use software at car-selling websites to find product information about a car of your choice and use that information to make an important purchase decision. You will also...
What are the major types of computer software used in business and the major software trends? a. Distinguish between application software and system software and explain the role the operating system...
Modify the mystery3.html page so that it acts as a simple slide show. You should add at least three more buttons, each associated with a different image. As before, these may be images located on the...
Create a Web page named grades.html that can be used to compute a student's overall average for a course. Your page should contain text boxes where the user can enter his or her homework average, lab...
Modify your form.html page (Exercise 5.4) so that the labels and text boxes for the words/phrases align in columns?
Modify your story.html page (Exercise 5.5) so that the labels and text boxes for the words/phrases align in columns?
Trace the execution of the following JavaScript statements and try to predict their behavior. For each assignment, fill in the values of the variables in their corresponding boxeseven those values...
1. TRUE or FALSE? An algorithm is a step-by-step sequence of instructions for carrying out some task. 2. TRUE or FALSE? A sequence of instructions for assembling a bookcase does not qualify as an...
As it is currently written, each call to the OldMacVerse function displays a new verse in the page division, overwriting any previous verse that may have been displayed. If we instead wanted each new...
Augment your grades.html page from Exercise 7.10 by inserting a cascading if-else statement similar to the one on the right-hand side of Figure 11.6. In addition to displaying the student's class...
What sequence of assembly-language instructions corresponds to the machine language instruction set you wrote in Exercise 14.9? Refer to Exercise 14.9, What sequence of machine-language instructions...
Consider a variation on the code in Figure 15.5, in which the string concatenation inside the while loop is reversed: str = foobar; i = str.search(/[aeiou]/); while (i != -1) {str = str.substring(0,...
Design and create a Web page named phoney.html that converts alphabetic phone numbers into entirely numeric ones. Your page should allow the user to enter the number (possibly containing letters) in...
Design and create a Web page named roman.html containing a text box in which the user can enter an ancient Roman numeral. When the user clicks a button, the number represented by that Roman numeral...
A more challenging programming exercise would be to modify your roman.html page so that it uses the modern style of Roman numerals. In this system, I can appear before V and X to represent 4 and 9,...
Define a function named Reverse that takes a string as input and returns a copy of that string in reverse order. For example, the function call Reverse('abcd') should return the string 'dcba'. Once...
Create a Web page named acronym.html that derives an acronym from a given phrase. The page should load the arrays.js library file (accessible at balance3e.com/arrays.js) and contain a text box in...
What is an omni channel? How does it combat showrooming?
What is a vertical market?
The sample table below shows 11 of the students enrolled in an MIS course. Organize the data in a relational format, and use Microsoft Access to list all ACC majors, all ACC majors with a GPA higher...
Twitter has become a very popular personal as well as business social networking site. After reading the information presented in this chapter and other sources, write a one-page paper that...
1. What is the function of Apple's iBeacon? 2. What are the differences between iBeacon and GPS? 3. How might a retail business benefit from iBeacon? 4. What are some of the concerns that customers...
1. What are some typical applications of crowdsourcing? 2. What are some advantages of crowdsourcing? 3. How could crowdsourcing bring down the systems design cost?
What is collaborative filtering (CF)?
1. What was the main reason for using an ERP system at JHI? 2. How did the ERP system that JHI adopted help address technical challenges? 3. What did the ERP system achieve at JHI?
1. What is My Starbucks Idea? 2. What has the Starbucks CRM achieved? How does it help the bottom line? 3. Which software platform is behind the Starbucks CRM system? 4. Is My Starbucks Idea a...
1. What does ORION stand for? 2. What are three advantages of using ORION at UPS? 3. What are three main components of ORION?
1. What are the three main components of Camden's Real Time Tactical Information Center? 2. By what percentages have the three major crimes been reduced? 3. How is the system able to reduce 911...
How much time is required to compute f (x) = Ni=0 aixi: a. Using a simple routine to perform exponentiation? b. Using the routine in Section 2.4.4?
Suppose T1(N) = O(f (N)) and T2(N) = O(f (N)). Which of the following are true? a. T1(N) + T2(N) = O(f (N)) b. T1(N) T2(N) = o(f (N)) c. T1(N) / T2(N) = O(1) d. T1(N) = O(T2(N))
Write the fast exponentiation routine without recursion.
Programs A and B are analyzed and found to have worst-case running times no greater than 150N log2 N and N2, respectively. Answer the following questions, if possible: a. Which program has the better...
Show how to implement three stacks in one array.
Given two sorted lists, L1 and L2, write a procedure to compute L1 L2 using only the basic list operations.
What is the running time of the following code? public static List makelist( int N ) ArrayList 1st = new ArrayListo( ); for( int i = 0; i < N; i++ ) { 1st.add( i); 1st.trimToSize();
Show that the maximum number of nodes in a binary tree of height h is 2h+1 1.
A full node is a node with two children. Prove that the number of full nodes plus one is equal to the number of leaves in a nonempty binary tree.
A planar graph is a graph that can be drawn in a plane without any two edges intersecting. a. Show that neither of the graphs in Figure 9.87 is planar. b. Show that in a planar graph, there must...
An adjacency matrix requires O(|V|2) merely to initialize using a standard double loop. Propose a method that stores a graph in an adjacency matrix (so that testing for the existence of an edge is...
Show how to modify the topological sort algorithm so that if the graph is not acyclic, the algorithm will print out some cycle. You may not use depth-first search.
The one-dimensional circle packing problem is as follows: You have N circles of radii r1, r2, . . . , rN. These circles are packed in a box such that each circle is tangent to the bottom of the box...
What are computer literacy and information systems literacy? Why are they important?
What is the difference between efficiency and effectiveness?
What is the difference between DSS and knowledge management?