What is business intelligence? Give some recent examples of BI usage, using the Internet for assistance. What BI benefits have companies found?
An automatic turning gear for windmills was invented by Meikle in about 1750 [1, 11]. The fantail gear shown in Figure P1.12 automatically turns the windmill into the wind. The fantail windmill at...
Two astronomers in different parts of the world make measurements M 1 and M 2 of the number of stars N in some small region of the sky, using their telescopes. Normally, there is a small possibility...
Consider the state diagrams of Figure 12.28. a. Describe the behavior of each. b. Compare these with the branch prediction state diagram in Section 12.4. Discuss the relative merits of each of the...
Write SQL queries to answer the following questions: a. What are the names of the course(s) that student Altvater took during the semester 1-2015? b. List names of the students who have taken at...
Define the term topology, and draw a sketch of each wired and wireless network topology.
For your proposed IS improvements, specify if they are activity, data flow, control, automation, or procedure improvements.
The original STRIPS program was designed to control Shakey the robot Figure shows a version of Shakeys world consisting of four rooms lined up along a corridor, where each room has a door and a light...
Apple invested more than $1 billion in the North Carolina data center shown in Figure 6-2. For Apple to spend such a sum, it must perceive the iCloud as being a key component of its future. Using the...
For each of the agent types listed in Exercise 2.5, characterize the environment according to the properties given in Section 2.3, and select a suitable agent design. The following exercises all...
Create a Crows Foot ERD for each of the following descriptions. (Note: The word many merely means more than one in the database modeling environment.) a. Each of the MegaCo Corporations divisions is...
Show that the worst-case running time of MAX-HEAPIFY on a heap of size n is (lg n). (Hint: For a heap with n nodes, give node values that cause MAX-HEAPIFY to be called recursively at every node on a...
One of the toughest problems in investigating system requirements is to make sure that they are complete and comprehensive. What things would you do to ensure that you get all of the right...
Professor Green street claims that there is a simpler way to re-weight edges than the method used in Johnson's algorithm. Letting w* = min (u, v)E {w(u, v)}, just define w(u, v) = w(u, v) - w* for...
Suppose you represent an investor group that is acquiring hospitals across the nation and integrating them into a unified system. List five potential problems and risks concerning information...
The following sequence of virtual page numbers is encountered in the course of execution on a computer with virtual memory: 3 4 2 6 4 7 1 3 2 6 3 5 1 2 3 Assume that a least recently used page...
1. What information-gathering methods are most appropriate to learn about requirements from Reliables own management staff and other employees? From client health-care organizations? From suppliers?...
New Century Wellness Group offers a holistic approach to healthcare with an emphasis on preventive medicine as well as traditional medical care. In your role as an IT consultant, you will help New...
Review Figure 2-8 and Figure 2-22. Figure 2-8 Figure 2-22 a. Identify any attributes in Figure 2-22 that might be composite attributes but are not shown that way. Justify your suggestions. Redraw the...
For this problem, use a formula from this chapter, but first state the formula. Frames arrive randomly at a 100-Mbps channel for transmission. If the channel is busy when a frame arrives, it waits...
Illustrate the physical-level design process by means of the design shown in Question 7. List the tables, identify the keys, and list the special restrictions that programs must enforce. In Question...
Construct a simple XML schema that describes a tutor. Include the tutor's last name, first name, phone, e-mail address, and certification date as child elements of the TUTOR element.
How is the trend toward open systems, connectivity, and interoperability related to business use of the Internet, intranets, and extranets?
As stated, third-party cookies usually do not contain, in themselves, data that identifies you as a particular person. However, Amazon, Facebook, and other first-party cookie vendors know who you are...
Apply the value chain model to a video game retail company, such as EB Games (www.EBGames.com). What is its competitive strategy? Describe the tasks EB Games must accomplish for each of the primary...
Database-system implementers have paid much more attention to the ACID properties than have file-system implementers. Why might this be the case?
Break the following columnar transposition cipher. The plaintext is taken from a popular computer textbook, so ''computer'' is a probable word. The plaintext consists entirely of letters (no spaces)....
Are software suites, Web browsers, and groupware merging together? What are the implications for a business and its end users?
Imagine a generalized n-army problem, in which the agreement of any two of the blue armies is sufficient for victory. Does a protocol exist that allows blue to win?
Give SQL formulations for the following updates to the suppliers parts projects database: a. Insert a new supplier S10 into table S (the name and city are Smith and New York respectively; the status...
Suppose that a system uses DMA for data transfer from disk controller to main memory. Further assume that it takes t1 nsec on average to acquire the bus and t2 nsec to transfer one word over the bus...
Suppose you decide to start a business that recruits students for summer jobs. You will match available students with available jobs. You need to learn what positions are available and what students...
Figure shows a grade report that is mailed to students at the end of each semester. Prepare an ERD reflecting the data contained in the grade report. Assume that each course is taught by one...
Draw a level 0 data flow diagram (DFD) for the video store system in Exercise F, Chapter 4.
Show that any second-order Markov process can be rewritten as a first-order Markov process with an augmented set of state variables. Can this always he done parsimoniously that is, without increasing...
1. Place yourself in the role of a manager at a company undergoing a merger or acquisition. What would be the most important things customers would expect from you while still in that process? What...
a. Depict full key functional dependencies, partial functional dependencies (if any), and transitive functional dependencies (if any) in the SHIPMENTS Table. b. Show the result of normalizing the...
In order to transform one source string of text x [1 m] to a target string y [1 n], we can perform various transformation operations. Our goal is, given x and y, to produce a series of...
Consider a magnetic disk consisting of 16 heads and 400 cylinders. This disk has four 100-cylinder zones with the cylinders in different zones containing 160, 200, 240. And 280 sectors, respectively....
Review the cellular telephone state machine diagram in Figure and then answer the following questions. (This telephone has unique characteristics that are not found in ordinary telephones. Base your...
Some have argued that Unix/Linux systems reuse a small number of security features in many contexts across the system; while Windows systems provide a much larger number of more specifically targeted...
Many control systems must operate in two dimensions, for example, the x- and the y-axes. A two-axis control system is shown in Figure P3.10, where a set of state variables is identified. The gain of...
Compare and contrast the role of a systems analyst, business analyst, and infrastructure analyst.
Create an ERD based on the Crows Foot model, using the following requirements: An INVOICE is written by a SALESREP. Each sales representative can write many invoices, but each invoice is written by a...
1. Many computer magazines and Web sites present comparisons of several DBMSs. Find one such DBMS comparison and compare the functions in this chapter to the listed features and functions in the...
The Hudson Engineering Group (HEG) has contacted you to create a conceptual model whose application will meet the expected database requirements for the companys training program. The HEG...
Give an efficient algorithm to find the length (number of edges) of a minimum-length negative-weight cycle in a graph.
There are two types of professional wrestlers: "good guys" and "bad guys." Between any pair of professional wrestlers, there may or may not be a rivalry. Suppose we have n professional wrestlers and...
What do we mean by use-case driven design, and what is use case realization?
Define cloud and explain the three key terms in our definition. Using Figure 6-3 as a guide, compare and contrast cloud-based and in-house hosting. In your opinion, explain the three most important...
Explain how to write any given 3-SAT problem of arbitrary size using a single first-order definite clause and no more than 30 ground facts.
An electromechanical open-loop control system is shown in Figure P2.13. The generator, driven at a constant speed, provides the field voltage for the motor. The motor has an inertia Jm and bearing...
Why is state-sponsored espionage more concerning than traditional corporate espionage?
Given a graph G and a minimum spanning tree T, suppose that we decrease the weight of one of the edges in T. Show that T is still a minimum spanning tree for G. More formally, let T be a minimum...
A pet store currently uses a legacy flat file system to store all of its information. The owner of the store, Peter Corona, wants to implement a Web-enabled database application. This would enable...
We wish to implement a dictionary by using direct addressing on a huge array. At the start, the array entries may contain garbage, and initializing the entire array is impractical because of its...
Ignoring overhead for directories and file descriptors, consider a file system in which files are stored in blocks of 16K bytes. For each of the following file sizes, calculate the percentage of...
For a library, the entity type HOLDING has four subtypes: BOOK, AUDIO BOOK, DVD, and SOFTWARE. Draw a separate EER diagram segment for each of the following situations: a. At a given time, a holding...
Nancy is the IS department head at MOTO Inc., a human resources management firm. The IS staff at MOTO Inc. completed work on a new client management software system about a month ago. Nancy was...
1. Review the principles of competitive advantage in Figure 3-7. Which types of competitive advantage has BOSU used to defeat copycat products? 2. What role did information systems play in your...
Suppose that you are the analyst charged with developing a new system for the university bookstore with which students can order books online and have them delivered to their dorms and off-campus...
Both UDP and TCP use port numbers to identify the destination entity when delivering a message. Give two reasons for why these protocols invented a new abstract ID (port numbers); instead of using...
Suppose you received the email in Figure 1 and mistakenly clicked See more details here. When you did so, you were taken to the Web page shown in Figure 2. List every phishing symptom that you find...
Contrast the items in the following sets of terms: Object; class; instance; entity relationship diagram (ERD) entity Property; method; attribute State; behavior Superclass; subclass Concrete...
Suppose you are an ad-serving company, and you have a log of cookie data for ads served to Web pages of all your customers (Amazon, Facebook, etc.). a. Describe, in general terms, how you can process...
Draw a level 0 data flow diagram (DFD) for the university system in Exercise D, Chapter 4.
Tots to Teens is a catalog retailer specializing in children's clothing. A project has been underway to develop a new order-entry system for the company's catalog clerks. The old system had a...
Consider a scenario in which Host A and Host B want to send messages to Host C. Hosts A and C are connected by a channel that can lose and corrupt (but not reorder) messages. Hosts Band C are...
Assume that RMO will begin asking a random sample of customers who order by telephone about purchases made from competitors. RMO will give customers a 15 percent discount on their current order in...
Suppose the memory cells at addresses F0 through FD in the machine described in Appendix C contain the following (hexadecimal) bit patterns: Address Contents F0 ............................. 20 F1...
It is important to ensure passenger comfort on ships by stabilizing the ship's oscillations due to waves [13]. Most ship stabilization systems use fins or hydrofoils projecting into the water to...
Write the SQL code to create the table structures for the entities shown in Figure P7.65. The structures should contain the attributes specified in the ERD. Use data types that would be appropriate...
Given the dependency diagram shown in Figure Q6.6, answer items 6a-6c: a. Identify and discuss each of the indicated dependencies. b. Create a database whose tables are at least in 2NF, showing the...
For each of the following EER diagrams from Chapter 3: I. Transform the diagram into a relational schema that shows referential integrity constraints (see Figure 4-5 for an example of such a schema)....
Does Web mail use POP3, IMAP, or neither? If one of these, why was that one chosen? If neither, which one is it closer to in spirit?
Draw a context diagram, a level 0 DFD, and a set of level 1 DFDs (where needed) for the campus housing use cases that you developed for the Your Turn 4-1 box in Chapter 4.
Examine the bus matrix for a university shown in Figure 32.12. The university is organized as schools such as the School of Computing, School of Business Studies and each school has a portfolio of...
Is there an ethical crisis in business today? What role does information technology play in unethical business practices?
Given the following business scenario, create a Crows Foot ERD using a specialization hierarchy if appropriate. Granite Sales Company keeps information on employees and the departments that they work...
Think about the system that handles student admissions at your university. The primary function of the system should be to track a student from the request for information through the admission...
Suppose that we order the edge relaxations in each pass of the Bellman-Ford algorithm as follows. Before the first pass, we assign an arbitrary linear order v1, v2,..., v |v| to the vertices of the...
An ERP can create a digital dashboard of important statistics and measures. What data would you like on your dashboard if you were the athletics director? Are they all measures of process objectives?...
We have defined four different binary logical connectives. a. Are there any others that might be useful? b. How many binary connectives can there be? c. Why are some of them not very useful?
Imagine that job hunting has been going so well that you need to develop a system to support your efforts. The system should allow you to input information about the companies with which you...
Prove from first principles that Universal Instantiation is sound and that Existential Instantiation produces an inferentially equivalent knowledge base.
Let R(i, j) be the number of times that table entry m[i, j] is referenced while computing other table entries in a call of MATRIX-CHAIN-ORDER. Show that the total number of references for the entire...
1. Several comments in the case note that chief information officers are in a unique position for companywide leadership, extending beyond their primary technological concerns. Why do you think this...
Create a star schema for this case study. How did you handle the time dimension? Fitchwood Insurance Company, which is primarily involved in the sale of annuity products, would like to design a data...
A spooling system consists of an input process I, a user process P, and an output process O connected by two buffers. The processes exchange data in blocks of equal size. These blocks are buffered on...
Describe the five major steps in conducting JAD sessions.
Draw a level 0 data flow diagram (DFD) for the university library system in Exercise J, Chapter 4.
Redo the enterprise data model you created in Chapter 1 to accommodate the information gleaned from Alex Martin, Dale Dylan, and Sandy Wallis' e-mails.
A load added to a truck results in a force F on the support spring, and the tire flexes as shown in Figure P2.46(a). The model for the tire movement is shown in Figure P2.46(b). Determine the...
a. You are given an array of integers, where different integers may have different numbers of digits, but the total number of digits over all the integers in the array is n. Show how to sort the...
Pretend that you have been charged with the task of redesigning the interface for the ATM at your local bank. Design an ISD that shows how a user would navigate among the screens.
A data source produces 7-bit IRA characters, to each of which is appended a parity bit. Derive an expression for the maximum effective data rate (rate of IRA data bits) over an R-bps line for the...
In your local nuclear power station, there is an alarm that senses when a temperature gauge exceeds a given threshold. The gauge measures the temperature of the core. Consider the Boolean variables A...
Anne has been given the task of conducting a survey of sales clerks who will be using a new order entry system being developed for a household products catalog company. The goal of the survey is to...
Are top managers likely to be more effective if they have IT experience? Why or why not?
Consider the alternative of replacing the rental personnel from the business process in Figure 3-13. a. Describe the changes that will need to be made to the process documented in Figure 3-13.You can...